• Title/Summary/Keyword: Asymmetric Watermarking

Search Result 13, Processing Time 0.02 seconds

A Polarity Based Blind Watermarking Method Considering Wavelet Coefficients Change (웨이블릿 계수 변화량을 고려한 극성 기반 블라인드 워터마킹 기법)

  • 신창둔
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.744-754
    • /
    • 2004
  • In this paper, a polarity based blind watermarking method considering wavelet coefficients modification is proposed. In this proposed method, we use an asymmetric thresholds watermarking(ATW) in which detection threshold is higher than inserting threshold in order to enhance watermark detection ratio in attacked images. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient values when detecting watermarks, it set the range for movement variation of the coefficients and lowered the sensitivity of variation by ignoring the variations that fall into this range. For this purpose, the polarity preservation threshold $\beta$ was set and a watermark was detected based on the polarity only for the difference that was larger than $\beta$. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, etc.

  • PDF

A Robust Watermarking Method Using Binary Images (이진 영상을 사용하는 강인한 워터마킹 기법)

  • Shin, Chang-Doon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.630-633
    • /
    • 2007
  • In this paper, a blind watermarking method using binary images as watermarks is proposed. In order to enhance the detection capability against various attacks that transform watermarked image, the method uses asymmetric thresholds for inserting and detecting. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient values when detecting watermarks, it set the range for movement variation of the coefficients and lowered the sensitivity of variation by ignoring the variations that fall into this range. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring etc.

  • PDF

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.