Abstract
Watermarking in multimedia content has secured attractive approaches in research society since nowadays the transmission of digital content in wireless medium has been enormous. Along with the distribution of digital content, it is important to claim ownership. A non-blind detection technique is proposed in this paper. First, an original image undergoes the wavelet decomposition such as LL1, LH1, HL1, and HH2. Afterward, the medium level sub-band coefficients of the image are subject to the comfortable shares for merging. Next, one of the shares from the LH1 band is merging with another one of the shares in HL1 band. In this stage, the copyright mark is fetched into the merged sub-band coefficients. Finally, an inverse wavelet transform is applied to receive the watermarked image. To prove the authentication, the original image and the watermarked image undergo the same operation and acquire copyright information. Experimental results achieve that the proposed approach can withstand various image processing attacks.
Publisher
Taiwan Association of Engineering and Technology Innovation
Reference19 articles.
1. Q. Li and I. J. Cox, “Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking,” IEEE Transaction on Information Forensics and Security, vol. 2, no. 2, pp. 127-139, June 2007.
2. A. Piva, T. Bianchi, and A. De Rosa, “Secure Client-Side ST-DM Watermark Embedding,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 13-26, March 2010.
3. A. Piva, F. Bartolini, and M. Barni, “Managing Copyright in Open Networks,” IEEE Internet Computing, vol. 6, no. 3, pp. 18-26, May-June 2002.
4. B. Sridhar, “A Wavelet Based Watermarking in Video Using Layer Fusion Technique,” Pattern Recognition and Image Analysis, vol. 28, no. 3, pp. 537-545, July 2018.
5. V. M. Potdar, S. Han, and E. Chang, “A Survey of Digital Image Watermarking Techniques,” 3rd IEEE International Conference on Industrial Informatics (INDIN), August 2005, pp. 709-713.