Explore chapters and articles related to this topic
Robust Reversible Watermarking Using Binary Xored
Published in B. K. Mishra, Samarjeet Borah, Hemant Kasturiwale, Computing and Communications Engineering in Real-Time Application Development, 2023
Reversible watermarking is basically used to enforce ownership rights or copyrights on shared data. The primary use of watermark is to protect with copyright violation and content authentication. Different reversible watermarking techniques are design for the purpose of rights protection of the sender/owner along with data recovery. Proposed technique of this chapter is based on reversible watermarking (fragile) and image sharing with the target to maintain image quality with exact content recovery. Watermarked data is inserted into the image with the help of LSB technique. This technique is based on key generation that generates a random key and original data is encrypted to form watermarked data using binary XORed. Encrypted data and watermarked images send it to the receiver using e-mail that is quite secure. Results of proposed watermarking system increase image resolution as well as increase capacity of data to hide. It also preserves copyright along with the additional e-mail facility.
Basics of Image Processing
Published in Maheshkumar H. Kolekar, Intelligent Video Surveillance Systems, 2018
Image watermarking is the technique of embedding information into a digital image in order to attach ownership. Watermarking is performed in such a way that it is difficult to remove. If the image is copied, then the watermark information is also carried with the copy. If the watermark information is visible in the image, it is called visible watermarking. Usually the information is text or a logo that indicates the ownership of a particular group. An example of a visible watermark is the logo at the corner of transmitted video included by a television broadcaster to inform viewers about the owner of the media. In invisible watermarking, information is added as digital data to an image, but it cannot be perceived as such. In steganography applications, the invisible watermark contains secret messages embedded in the digital signal.
Image Classification and Retrieval
Published in R. Suganya, S. Rajaram, A. Sheik Abdullah, Big Data in Medical Image Processing, 2018
R. Suganya, S. Rajaram, A. Sheik Abdullah
The two different ways in which the watermarking can be applied are visible and invisible watermarking. Invisible watermarking is when the watermark will not be visible to human perception. In visible watermarking, after embedding the watermark into the cover image it will be visible to all. For example, a company logo will be embedded into all the documents that they are using. Based on the detection algorithm, two types of watermarking are there—blind and Non-blind. In blind watermarking, there is no need for the original image for the extraction process. For Non-blind watermarking, original image is needed at the receiver end for the watermark purpose. Robustness is a property which specifies the ability of the stego image to resist the attack. A robust watermark is that the stego image can withstand various attacks. Even for a slight modification, a fragile watermark will be easily destroyed. Semi-fragile will resist only a few attacks. There are two steps in watermarking.
Research on Region Selection Strategy for Visible Watermark Embedding
Published in IETE Technical Review, 2021
Zhongjie Cui, Wenfa Qi, Yuxin Liu, Jia Guo
Visible watermarking usually contains complex structures, such as thin lines and shadows, to make it more difficult to delete. In fact, it is a very difficult task to delete watermark from a single image without user supervision or prior information. However, visible watermarking is usually added to many images in a consistent manner, such as embedding watermark in same location and in same way. In [21], it proves that this consistency can automatically estimate watermark and restore original image with high accuracy. In [23], the independent component analysis (ICA) method is used to separate visible watermark image from host image. In addition, the classical image inpainting method [22,24,25] can select appropriate texture to fill the selected area to remove visible watermark image. These technologies operate on a single image, requiring users to manually mark the watermark area, and cannot deal with large watermark area. Sun et al. [26] propose a structure propagation method to complete image reconstruction, and block-based texture synthesis method is used to restore the selected region.
An Overview of Digital Audio Steganography
Published in IETE Technical Review, 2020
Hrishikesh Dutta, Rohan Kumar Das, Sukumar Nandi, S. R. Mahadeva Prasanna
Steganography is also used in digital watermarking applications [15]. Watermarking is the process of concealing auxiliary information (like watermarked bits, logo, and text message) in the host signal, which includes image, video, audio, speech, and text without the perceptibility of the presence of any additional information [16]. The auxiliary data which is incorporated in the original signal should be such that it can be retrieved easily and at the same time it must withstand various attacks. Digital watermarking is practised to protect the copyright information by embedding it in the form of a text, image, audio, or video in a particular media [17]. A watermark is embedded into a digital signal such that in future if any copy of the work is found, both the source and the copy can be identified by the watermark. Watermarking technique is used to protect confidential information from illegal access of unauthorized user. It is also used for banknote authentication. In [18], the authors proposed a method of image steganography using least significant bit (LSB), discrete cosine transform (DCT), and compression technique to enhance security in transferring information to the destination without being detected.
A machine learning approach for digital watermarking
Published in Australian Journal of Multi-Disciplinary Engineering, 2023
There are some scenarios that the watermark must be removed which is known as watermark removal or watermark detection techniques. Below, some of these applications are briefly explained. When the data is captured or collected, it is checked for watermark. If the watermark exists inside the data, it means some attacks (replay attacks) have happened. When the data is clear of any watermark, it can store or use for secure application.Another application can be named when forensic data should be recovered. For example, embedding the watermark degrades the original biometric and forensic features by modifying the original data. The original data might be recovered if the watermarking algorithm is known (Nematollahi et al. 2016).Medical applications where the original images or biomedical signal e.g. ECG are required (Bhalerao, Ansari, and Kumar 2022; Daoui et al. 2022). Thus, many researchers use reversible watermarking or zero watermarking techniques for this purpose (Daoui et al. 2022).The other application could be checking any data before sending outside organisations or companies, for example, according to B.B.C (Daoui et al. 2022), an American citizen had hidden the confidential info in a digital photograph of a sunset and sent it via steganography/watermarking technology which caused a huge disputation.