TAILIEUCHUNG - A Watermark Algorithm Against De-Synchronization Attacks

In this paper, a robust method to the ability of the watermark to resist against attacks is proposed for hiding information into images. The proposed method is blind because the original image is not required at the decoder to recover the embedded data. The robustness of the watermarking scheme is inspired by using a PJND (Pyramidal Just Noticeable Difference) model and the message is inserted into these DoG. | VNU Journal of Science: Comp. Science & Com. Eng., Vol. 32, No. 2 (2016) 49-62 A Watermark Algorithm Against De-Synchronization Attacks☆ Luong Viet Nguyen*, Trinh Nhat Tien, Ho Van Canh VNU University of Engineering and Technology, Hanoi, Vietnam Abstract In this paper, a robust method to the ability of the watermark to resist against attacks is proposed for hiding information into images. The proposed method is blind because the original image is not required at the decoder to recover the embedded data. The robustness of the watermarking scheme is inspired by using a PJND (Pyramidal Just Noticeable Difference) model and the message is inserted into these DoG (Difference of Gaussians) [1, 2]. Our proposal takes into account three main characteristics of Human Visual System, namely: contrast sensitivity, luminance adaptation and contrast marking. Therefore, it not only provides an invisible and robust watermarking but also optimizes watermarking capacity. The performance of the proposed technique is evaluated by a series of experiments with different input images. In terms of transparency, besides using the subjective experiments, eight objective metrics are calculated in comparison with other methods such as PSNR, MSSIM, SVDm, etc. Our approach always presents the outperform values. In terms of robustness, many kinds of attacks from global transformation (rotation, scaling, etc) to local transformation (stirmark, checkmark benchmarks, de-synchronization attacks) are implemented. Many image processing tools are applied to simulate the attacks such as Print-Screen, Using Photo editing software, Camcorder, Print-Scan, etc. The experimental results show an outstanding robustness in resisting these attacks. Received 04 December 2015, revised 09 January 2016, accepted 14 January 2016 Keywords: Digital Watermarking, Print-Scan process, DoG, De-synchronization attacks, Camcorder. 1. Introduction* embedding phase to encode the watermark. In the detection phase, the same

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.