Open Access Open Access  Restricted Access Subscription or Fee Access

Interpolation based Invariant Image Watermarking Resisting to Geometrical Attacks

Dr.J. Veerappan, G. Pitchammal

Abstract


The main theme of this application is to provide an algorithm for grayscale and color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the attacks. In order to solve this problem this application focus on certain parameters rather than the pixel position for watermarking. Two statistical features such as the histogram shape and the mean of Gaussian filtered low-frequency component of images are taken for this proposed application to make the watermarking algorithm robust to attacks and also interpolation technique is used to increase the number of bites to be needed.


Keywords


Cropping, Gaussian Filter, Histogram, Image Watermarking, Random Bending Attacks, MAX, MSE, PSNR

Full Text:

PDF

References


” Data Embedding in JPEG Bit stream by Code Mapping” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 4, APRIL 2010.

”Reversible Image Watermarking Using Interpolation Technique” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010

”Perceptual Image Hashing Based on Virtual Watermark Detection” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 4,APRIL 2010

”Efficient Generalized Integer Transform for Reversible Watermarking” IEEE SIGNAL PROCESSING LETTERS, VOL. 17, NO. 6, JUNE 2010.

“Contour let-Based Image Watermarking Using Optimum Detector in a Noisy Environment “IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 4, APRIL 2010. .

Shijun Xiang, Member, IEEE, Hyoung Joong Kim, Member, IEEE, and Jiwu Huang, Senior Member, IEEE,Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain VOL. 18, NO. 6, JUNE 2008.

D.ColtucandP.Bolon,“Watermarking by histogram specification,” in proc.SPIE security watermarking of multimedia contents II, 1999 ,vol.3657,pp.252-263.

P. Dong, J. Brankov, N. Galatsanos, and Y. Yang, “Geometric robust watermarking based on a new mesh model correction approach,” inProc. IEEE Int. Conf. Image Process., 2002, pp. 493–496.

P. Bas, J.-M. Chassery, and B. Macq, “Geometrically invariant watermarking using feature points,” IEEE Trans. Image Process, vol. 11, no.9, pp. 1014–1028, Sep. 2002.

X. Kang, J. Huang, Y. Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,”IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp.776–786, Aug. 2003.

M. Barni, “Effectiveness of exhaustive search and template matchingagainst watermark desynchronization,” IEEE Signal Process. Lett., vol.12, no. 2, pp. 158–161, Feb. 2005.

P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Y. Yang, and F. Davoine,“Affine transformation resistant watermarking based on image normalizaton,”IEEE Trans. Image Process., vol. 14, no. 12, pp. 2140–2150,Dec. 2005.

J. S. Seo and C. D. Yoo, “Image watermarking based on invariant regions of scale-space representation,” IEEE Trans. Signal Process., vol.54, no. 4, pp. 1537–1549, Apr. 2006.

C. S. Lu, S. W. Sun, C. Y. Hsu, and P. C. Chang, “Media hashdependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection, IEEE Trans. Multimedia, vol. 8, no. 4, pp. 668–685, Aug. 2006.

D. Coltuc, P. Bolon, and J. M. Chassery, “Fragile and robust watermarking by histogram specification,” in Proc. SPIE Security Watermarking of Multimedia Contents IV, 2002, vol. 4675, pp. 701–710.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.