Buradasınız

PRN’a BAĞLI RENKLİ RESİM DAMGALAMA METODU

PRN BASED WATERMARKING SCHEME FOR COLOR IMAGES

Journal Name:

Publication Year:

Abstract (2. Language): 
Robust image watermarking is the process of embeddingan invisible watermark in an image in order to make it very difficult to remove the watermark after intentional attacks and normal audio/visual processes. A recent DWT-based semi-blind image watermarking scheme leaves out the low pass band, and embeds the watermark in the other three bands into the coefficients that are higher than a given threshold T1. During watermark detection, all the high pass coefficients above another threshold T2(T2> T1) are used in correlation with the original watermark. In our extension to the DWT-based approach, we embed the same watermark in two bands (LL and HH) using different scaling factors for each band. In the watermark detection algorithm, the watermarked RGB (and possibly attacked) image is converted to the YUV model. After computing the DWT of the luminance layer, all the DWT coefficients higher than a given threshold T2 in the LL and HH bands are selected. The next step is to compute the sum Z, where i runs over all DWT coefficients higher than a given threshold T2 in the LL and HH bands. In each band, if Z exceeds T, the watermark is present. Experimental results indicate that detection in the LL band is robust for one group of attacks, and detection in the HH band is robust for another group of attacks
Abstract (Original Language): 
Dayanikli resim damgalama gorunmeyen damganin kasitli saldiri ve goruntu islemlerinden sonra damganin silinmesini oldukca zorlastiran resimlere gomulmesi islemidir. DWT ile yapilan yari-kor resim damgalama yontemi LL bantini disari atip, digger uc bandin daha onceden belirlenen basmaktan buyuk katsayilarina gomme yapilir. Damga Ortaya cikarma esnasinda ise, uc banttaki T2’den buyuk katsayilarin gercek damga ile korelasyonu hesaplanir. Bizim genisletilmis DWT algoritmamizda ayni damgayi LL ve HH bantlarina farkli katsayilar kullanarak gommekteyiz. Damga tespitinde ise damgalanmis RGB (ve saldirilmis olmasi mumkun) resim YUV resim modeline cevrilir. Luminance tabakasi DWT’ye cevrildikten sonra T2’den buyuk LL ve HH bantlari katsayilari secilir. Sonraki adimda ise toplam Z degeri hesaplanir bu katsayilar icin. Eger Z degeri T degerinden buyuk ise resim damgalanmis, aksi takdirde damgalanmamis demektir. Deney sonuclarimiz LL bantta gommek bir grup saldiriya karsi dayanikli olurken, HH banta gomme diger bir grup saldiriya karsi dayanikli olmaktadir.
119-131

REFERENCES

References: 

Caldelli R., Barni M., Bartolini F. and Piva A., (2000), “Geometric-Invariant Robust
Watermarking through Constellation Matching in the Frequency Domain”,
Proceedings of the 2000 International Conference onImage Processing (ICIP 2000),
Vancouver, BC, Canada, September 10-13, 2000, Vancouver, Vol. II, 65-68.
Cox I. J., Kilian J., Leighton T. and Shamoon T., (1997), “Secure Spread Spectrum
Watermarking for Multimedia”, IEEE Transactions on Image Processing, 6 (12),
1673-1687.
İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Güz 2006/2
131
Dugad R., Ratakonda K., and Ahuja N., (1998), “A New Wavelet-Based Scheme for
Watermarking Images”, Proceedings of 1998 International Conference on Image
Processing (ICIP 1998), Chicago, IL, Vol. 2, 419-423.
Elbasi E. and Eskicioglu A.M., (2006), “A DWT-basedRobust Semi-blind Image
Watermarking Algorithm Using Two Bands”, IS&T/SPIE’s 18th Symposium on
Electronic Imaging, Security, Steganography, and Watermarking of Multimedia
Contents VIII Conference, San Jose, CA.
Eskicioglu A.M. and Delp E.J., (2001), “Overview ofMultimedia Content Protection
in Consumer Electronics Devices”, Signal Processing: Image Communication, 16
(7), 681-699.
Eskicioglu A. M., Town J. and Delp E. J., (2003), “Security of Digital Entertainment
Content from Creation to Consumption”, Signal Processing: Image Communication,
Special Issue on Image Security, 18 (4), 237-262.
Langelaar G.C. and Lagendijk R.L., (2001), “OptimalDifferential Energy
Watermarking of DCT Encoded Images and Video”, IEEETransactions on Image
Processing, 10 (1), 148-158.
Lee C.H. and Lee Y.K., (1999), “An Adaptive DigitalImage Watermarking
Technique for Copyright Protection”, IEEE Transactions on Consumer Electronics,
45 (4), 1005-1015.
Lin C.Y., Wu M., Bloom J.A., Cox I. J., Miller M. L. and Lui Y. M., (2001),
“Rotation, Scale, and Translation Resilient Watermarking for Images”, IEEE
Transactions on Image Processing, 10 (5), 767-782.
Liu R. and Tan T., (2002), “A SVD-Based Watermarking Scheme for Protecting
Rightful Ownership”, IEEE Transactions on Multimedia, 4 (1), 121-128.
Pereira S. and Pun T., (2000), “Robust Template Matching for Affine Resistant
Image Watermarks”, IEEE Transactions on Image Processing, 9 (6), 1123-1129.
Piva A., Barni M., Bartolini F. and Cappellini V., (1997), “DCT-based Watermark
Recovering without Resorting to the Uncorrupted Original Image”, Proceedings of
the 1997 International Conference on Image Processing (ICIP ’97), Washington, DC,
USA.
Zhu W., Xiong Z. and Zhang Y.Q., (1999), “Multiresolution Watermarking for
Images and Video”, IEEE Transactions on Circuits and Systems for Video
Technology, 9 (4), 545-550.

Thank you for copying data from http://www.arastirmax.com