Security Evaluation of DWT Based Watermarking Schemes and its Improvement Using RS Coding
نویسندگان
چکیده
In this study, information theory is used to provide both theoretical and practical analysis of security offered by watermarking and data hiding techniques based on wavelet transform. In this context, security level is defined as the equivocation of the secret parameters. On the theoretical side, the measure of security is estimated by means of information theory tools for all possible attacks. On the practical side, simulations assess the security levels derived in the theoretical part of paper to reveal the fundamental limits and bounds on security and show the trade off between security and other properties, such as robustness and imperceptibility. Also, the error correcting codes is used to decline effects of these limits. Experimental works indicate that the error correcting codes, such as Reed-Solomon code can be greatly effective for increasing the security of many watermarking schemes.
منابع مشابه
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملWavelet Based Watermarking Detection Using Multiresolution Image Registration
Due to the lack of invariant property of discrete wavelet transform (DWT), the DWT based watermarking schemes are relatively vulnerable to the watermarking attacks such as geometric variations (i.e., rotation and translation etc.). To improve the reliability of the DWT based watermark detection, this paper introduces the new multiresolution based image registration method that is used to recove...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012