Abstract

Zero-watermarking of digital images is a powerful method with respect to transparency in the watermarked image. However, robustness is still a challenging characteristic for researchers. The proposed method of zero-watermarking provides a novel solution for increasing robustness by obtaining resident features of gray scale image that are robust against common signal processing operations. The proposed solution is based on image scanning to produce NDD (Neighboring Distance Difference) profile. This scheme is used to extract image features for generating redundancy binary profile with the help of image scanning and identification of robust image areas for embedding a binary watermark. Redundant areas from binary profile show perceptually insignificant regions of gray scale image according to human visual system. Resident features from robust areas of image are collected to generate the zero watermarking binary key image using reversible XOR operation. The binary key is used for extraction of binary watermark. Experimental results of the proposed method have been compared with the results of various zero-watermarking schemes as well as traditional watermarking methods and found much better at slightly higher computational cost. The comparison analysis for testing robustness has been carried out against image processing attacks like Gaussian filtering, block average filtering, motion blur filtering, image resizing, image rotation, image compression and cropping. For each attack maximum correlated watermark from the set of recovered watermarks is selected to evaluate the performance of proposed zero-watermarking scheme. It has been recorded that perfect matching is observed between original and extracted watermarks for a number of signal processing attacks.

Highlights

  • Zero-watermarking of digital images is a powerful method with respect to transparency in the watermarked image

  • We present a novel technique based on image scanning and BRF (Binary Robust Feature) profile generation rather than the use of transformations

  • Grayscale host images are subjected to different kinds of image processing attacks to analyse the robustness

Read more

Summary

INTRODUCTION

Dtwo decades for applications such as copyright protection, document identification, authentication, colour or quality hiding, secret data hiding, etc. A payload called digital watermark is inserted into the host image. Inserting the watermark into host image, faces contradictory requirements of transparency and robustness. The inserted watermark needs to be robust against intentional and unintentional attacks on the watermarked image. Rather than embedding a watermark in the host image, zerowatermarking applies cryptography by encrypting host image features matrix with digital watermark to produce a watermarking key. This key image with its host image and watermark is stored in the database of intellectual property for copyright protection.

BACKGROUNDAND LITERATURE REVIEW
PROPOSED ZERO-WATERMARKING SCHEME
Generation of Watermarking Binary Key
Identification of Disputed Image Using Registered Binary Key
EXPERIMENTAL RESULTS AND DISCUSSIONS
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.