Cropping Resilient Watermarking Based on Histogram Modification

نویسندگان

  • M. Cedillo-Hernandez
  • M. Nakano-Miyatake
  • F. Garcia-Ugalde
  • H. Perez-Meana
چکیده

This paper proposes a watermarking scheme robust against most common geometric and signal processing operations, for applications that require an accurate detection of the owner watermark even if the digital image suffers intentional and non-intentional attacks. The proposed scheme is based on two modifications introduced in two 2D histograms. In the first modification a selected region of a 2D histogram, composed by red and green (R-G) color components, is modified according to the watermark bit sequence; while in the second modification another 2D histogram, composed by blue (B) and filtered red (R) components, is partitioned into several blocks to embed the watermark data bits. The experimental results show fairly good robustness against several geometric distortions, common signal processing operations and some quite aggressive combined attacks. A watermark robustness comparison with the related works and an analysis of the embedding method from the watermark robustness point of view are provided, in order to explain the robustness improvement of the proposed algorithm, especially against rotation and cropping attacks. The ROC curves also provided to show the desirable detection performance of the proposed method. Comparisons with the previously reported methods, based on different techniques, are also provided

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Robust Watermarking Technique Based on Nonsubsampled Contourlet Transform and SVD

The paper proposes a novel robust watermarking technique based on newly introduced Nonsubsampled contourlet transform(NSCT) and singular value decomposition(SVD) for multimedia copyright protection. The NSCT can give the asymptotic optimal representation of the edges and contours in image by virtue of the characteristics of good multi resolution shift invariance and multi directionality. After ...

متن کامل

A Robust Watermarking Technique based on Nonsubsampled Contourlet Transform and SVD

The paper proposes a novel robust watermarking technique based on newly introduced Nonsubsampled contourlet transform(NSCT) and singular value decomposition(SVD) for multimedia copyright protection. The NSCT can give the asymptotic optimal representation of the edges and contours in image by virtue of the characteristics of good multi resolution shift invariance and multi directionality. After ...

متن کامل

Statistical Features Based Image Watermarking Resisting to Geometrical Attacks

The aim of our robust technique using watermarking is to reconstruct watermark from geometric attacks. Various geometric transformations, such as rotation, scaling, cropping, shear, translation, resize, scattering, bending, and so on, provides the displacement of some of its picture elements. The existing watermarking algorithms countermeasures the attacks related to pixel positions. In our pap...

متن کامل

Robust watermarking of color images based on the Discrete Wavelet Transform

This article presents a method of semi-blind watermarking based on the discrete wavelet transform, that uses the chrominance components of the image for watermark embedding. The watermark is resistant to usual image processing operations such as compression, noise addition, cropping, histogram adjustment and filtering. Keywords—watermarking;discrete wavelet transform

متن کامل

Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain

In audio watermarking, the robustness to desynchronization attacks such as TSM (Time-Scale Modification) operations, is still an open issue. In this paper, both mathematical proof and experimental testing show that the histogram shape (represented as the relative relation in the number of samples among three different histogram bins) and the audio mean are two robust features to the TSM attacks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013