Abstract

Two fragile image watermarking methods are proposed for image authentication. The first method is based on time-frequency analysis and the second one is based on time-scale analysis. For the first method, the watermark is chosen as an arbitrary nonstationary signal with a particular signature in the time-frequency plane. Experimental results show that this technique is very sensitive to many attacks such as cropping, scaling, translation, JPEG compression, and rotation, making it very effective in image authentication. For the second method, based on a wavelet-domain multiresolution analysis, quantization index modulation (QIM) embedding scheme and arbitrary frequency-modulated (FM) chirp watermarks are used in the implementation. In this blind technique, the original watermark is needed neither for the content integrity verification of the original image nor for the content quality assessment of the distorted image.

Highlights

  • Watermarking techniques are developed for the protection of intellectual property rights

  • Let us consider the analysis of a nonstationary signal consisting of a quadratic frequency modulated (FM) signal given by s(t) = ΠT

  • We investigate the sensitivity of the proposed watermarking scheme for the following attack scenarios: (i) JPEG compression of quality factors 90%, 80%, 70%, 60%, 50%, and 40%; (ii) histogram equalization; (iii) sharpening—processed by Adobe Photoshop 7.0; Table 2: Bit error rate (BER) values of the extracted watermarks obtained for the JPEG compression attacks for various values of the quality factor (QF), and at each Discrete Wavelet Transform (DWT) level l

Read more

Summary

Introduction

Watermarking techniques are developed for the protection of intellectual property rights. They can be used in various areas, including broadcast monitoring, proof of ownership, transaction tracking, content authentication, and copy control [1]. In the last two decades a number of watermarking techniques have been developed [2,3,4,5,6,7,8,9,10]. There are basically two main objectives: (i) the verification of the image ownership and (ii) the detection of any forgery of the original data. In the authentication, we check whether the embedded information (i.e., the invisible watermark) has been altered or not in the receiver side

Objectives
Methods
Results
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call