TAILIEUCHUNG - A Watermark Algorithm Against De-Synchronization Attacks
In this paper, a robust method to the ability of the watermark to resist against attacks is proposed for hiding information into images. The proposed method is blind because the original image is not required at the decoder to recover the embedded data. The robustness of the watermarking scheme is inspired by using a PJND (Pyramidal Just Noticeable Difference) model and the message is inserted into these DoG. | VNU Journal of Science: Comp. Science & Com. Eng., Vol. 32, No. 2 (2016) 49-62 A Watermark Algorithm Against De-Synchronization Attacks☆ Luong Viet Nguyen*, Trinh Nhat Tien, Ho Van Canh VNU University of Engineering and Technology, Hanoi, Vietnam Abstract In this paper, a robust method to the ability of the watermark to resist against attacks is proposed for hiding information into images. The proposed method is blind because the original image is not required at the decoder to recover the embedded data. The robustness of the watermarking scheme is inspired by using a PJND (Pyramidal Just Noticeable Difference) model and the message is inserted into these DoG (Difference of Gaussians) [1, 2]. Our proposal takes into account three main characteristics of Human Visual System, namely: contrast sensitivity, luminance adaptation and contrast marking. Therefore, it not only provides an invisible and robust watermarking but also optimizes watermarking capacity. The performance of the proposed technique is evaluated by a series of experiments with different input images. In terms of transparency, besides using the subjective experiments, eight objective metrics are calculated in comparison with other methods such as PSNR, MSSIM, SVDm, etc. Our approach always presents the outperform values. In terms of robustness, many kinds of attacks from global transformation (rotation, scaling, etc) to local transformation (stirmark, checkmark benchmarks, de-synchronization attacks) are implemented. Many image processing tools are applied to simulate the attacks such as Print-Screen, Using Photo editing software, Camcorder, Print-Scan, etc. The experimental results show an outstanding robustness in resisting these attacks. Received 04 December 2015, revised 09 January 2016, accepted 14 January 2016 Keywords: Digital Watermarking, Print-Scan process, DoG, De-synchronization attacks, Camcorder. 1. Introduction* embedding phase to encode the watermark. In the detection phase, the same
đang nạp các trang xem trước