Improvement to a Method of Embedding Robust Watermarks into Digital Color
ثبت نشده
چکیده
nearly zero. (3) A watermark is randomized so that a pattern of cyclic cross stripes may disappear and an embedded watermark may be inconspicuous. The embedded watermark is extracted by multiplying the conversely randomized image embedding a watermark by the random sequence. (4) An ID pattern is extracted by summing up the products of any part of the random sequence and the corresponding part of a watermark-embedded image so that the ID pattern may correctly extracted. 2. Embedding Method We consider embedding an ID pattern into a color image X (a) = {x ij (a) } with nxm pixels, where (a) denotes color components (a = R, G and B). The ID pattern is a sequence of length h consisting of +1 and –1, where h divides m. Let P be a sequence of length m which is an arrangement of the same m/h ID patterns. We spread the sequence P into an nxm two-dimensional pattern W, which is a watermark, by a random sequence K of length n consisting of real number from –1 to 1 as follows: W K P k p k p k p k p k p T m i j n n m = = ⋅⋅⋅ ⋅⋅⋅ ⋅⋅⋅ ⋅⋅⋅ 1 1 1 1 (1) where K = (k 1 , k 2 , ···, k n) (–1 ≤ k i ≤ 1), P = (p 1 , p 2 , ···, p m) (p j = +1 or –1) and T represents transpose. As the pattern W is cyclic cross stripes, W is randomized into W'. The pattern W' = {w' ij } is weighted in order to heighten robustness with preserving quality and added to an image as {x ij (a) + A (a) w' ij }, where A (a) is a constant value depending on the SN ratio of a watermark-embedded image. The elements {x ij (a) + A (a) w' ij } of a watermark-embedded image are quantized into integers. We conversely randomize the watermark-embedded image Y (a) = {x ij (a) + A (a) w' ij } into Y' (a) = {x' ij (a) + A (a) w ij } and extract the arrangement P of the ID pattern by multiplying Y' (a) by the random sequence K which is used in Eq.(1), where {x' ij (a) } is a …
منابع مشابه
Digital Watermarking for Gray-level Watermarks
Digital watermarking has recently emerged as an important area of research to protect the copyright of multimedia and internet data. Most of other literatures focus on the algorithms of embedding one-dimensional watermarks or twodimensional binary digital watermarks. In this work, a robust method of embedding a gray-level digital watermark into an image is proposed. A gray-level digital waterma...
متن کاملA Color Image Watermarking Scheme Resistant against Geometrical Attacks
The geometrical attacks are still a problem for many digital watermarking algorithms at present. In this paper, we propose a watermarking algorithm for color images resistant to geometrical distortions (rotation and scaling). The singular value decomposition is used for watermark embedding and extraction. The log-polar mapping (LPM) and phase correlation method are used to register the position...
متن کاملTowards Blind Detection of Robust Watermarks
We describe a Digital Watermarking system dedicated for embedding watermarks into 3D polygonal models. The system consists of three watermarking algorithms, one named Vertex Flood Algorithm (VFA) suitable for embedding fragile public readable watermarks with high capacity and offering a way of model authentication, one realizing affine invariant watermarks, named Affine Invariant Embedding (AIE...
متن کاملEmbedding color watermarks in color images
Robust watermarking with oblivious detection is essential to practical copyright protection of digital images. Effective exploitation of the characteristics of human visual perception to color stimuli helps to develop the watermarking scheme that fills the requirement. In this paper, an oblivious watermarking scheme that embeds color watermarks in color images is proposed. Through color gamut a...
متن کاملRobust Digital Image-Adaptive Watermarking Using BSS Based Extraction Technique
In a digital watermarking scheme, it is not convenient to carry the original image all the time in order to detect the owner's signature from the watermarked image. Moreover, for those applications that require different watermarks for different copies, it is preferred to utilize some kind of watermark-independent algorithm for extraction process i.e. dewatermarking. Watermark embedding is perf...
متن کاملA Secure and Robust Cdma Digital Image Watermarking Algorithm Based on Dwt2, Yiq Color Space and Arnold Transform
In this paper, a secure and robust cryptographic CDMA watermark algorithm based on DWT2, YIQ color space and Arnold transform is proposed. In the approach, for more security of watermark, the binary watermark image W, after scrambling with Arnold cat map is converted to a sequence and then, to determine the pixel to be used on a given key, a random binary sequence R of size n is adopted to encr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999