Loading...
Search for: blind-watermarking
0.007 seconds

    Blind Steganalysis Based on Multi- resolution Transforms

    , M.Sc. Thesis Sharif University of Technology Zohourian, Mehdi (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Gholampour, Iman (Supervisor)
    Abstract
    Blind image steganalysis is a technique used for detecting the existence of the data hidden in an image, where no information about the stenographic algorithm is available or usable. In this way, an important problem is to find sensitive features which make noticeable statistical distinction between cover and stego images. New steganalysis methods based on multi-resolution transform, specifically the wavelet and the contourlet transforms, have been proposed in this thesis in order to enhance the detection accuracy of system especially at low embedding rates. In fact, multi-resolution transforms are powerful space-frequency analysis tools that have been found quite successful in detection of... 

    Steganalysis Method Based on Image Class

    , M.Sc. Thesis Sharif University of Technology Abolhasani, Amir (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Steganalysis is the art of detecting hidden message in a cover such as an image. All steganalysis methods either are designed for a specific steganographer or are blind. Since for a stego image, the steganography method is not available, this is important to detect a stego image without any knowledge about the steganography method using which the secret image was embedded. Therefore in order to dominate all steganography method, if a given image is a stego one, we need to use voting over several steganalysis methods applied on the stego image to improve the accuracy of detection. But this approach needs a long time to process that is not practical for most steganalysis applications. We know... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; 2016 , Pages 1-21 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; Volume 76, Issue 22 , 2017 , Pages 23459-23479 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    Quantization based audio watermarking in a new transform domain

    , Article 2008 International Symposium on Telecommunications, IST 2008, Tehran, 27 August 2008 through 28 August 2008 ; October , 2008 , Pages 682-687 ; 9781424427512 (ISBN) Akhaee, M. A ; Nikooienejad, A ; Marvasti, F ; Sharif University of Technology
    2008
    Abstract
    In this paper, a novel blind watermarking technique based on quantization is proposed. Quantization is performed in a special domain which converts one dimensional signal to a 2-D one named Point to Point Graph (PPG). Basis of the method is on the separation of this domain into two portions; while, only one portion is quantized. Furthermore, in the dewatermarking procedure, by using the unquantized portion and zero norm, the embedded data can be extracted. The performance of the proposed method is analytically investigated and verified by simulation with artificial Gaussian signals. Experimental results over several audio signals shows the great robustness of the technique in comparison with... 

    Improve Performance of Higher Order Statistics in Spatial and Frequency Domains in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Shakeri, Ehsan (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Blind image steganalysis is a technique used to, which require no prior information about the steganographic method applied to the stego im- age, determine whether the image contains an embedded message or not. The basic idea of blind steganalysis is to extract some features sensitive to information hiding, and then exploit classifiers for judging whether a given test image contains a secret message.The main focus of this research is to design an choose features sen-sitive to the embedding changes. In fact, we use high order moments in different domains, such as spatial, DCT and multi-resolution do-main, in order to improve the performance of existing steganalyzers.Accordingly, First, we... 

    Information Hiding of Visual Multimedia Signals Based on an Entropic Transcript

    , M.Sc. Thesis Sharif University of Technology Diyanat, Abolfazl (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. In this thesis, we focus on entropic issue of multimedia signal in the two branches of Information hiding namely Steganography and Watermarking. How to choose the block and noise estimation in the watermarking, and analysis of the singular values decomposition in steganography are examples of using entopic issue which we use in our thesis. The two new designs for video signals AVI are presented in Watermarking. For the both proposed method ,first AVI video signal will be divided... 

    A two-step watermarking attack using long-range correlation image restoration

    , Article Security and Communication Networks ; Volume 5, Issue 6 , AUG , 2012 , Pages 625-635 ; 19390122 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking... 

    A content-based digital image watermarking algorithm robust against JPEG compression

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2011, 14 December 2011 through 17 December 2011 ; Dec , 2011 , Pages 432-437 ; 9781467307529 (ISBN) Najafi, A ; Siahkoohi, A ; Shamsollahi, M. B ; Sharif University of Technology
    Abstract
    Watermarking (imperceptible insertion of data into the host image or soundtracks) has attracted many research interests in the recent decade. The aim of this correspondence is to introduce a none-blind, content-based method for image watermarking. It employs properties of Human Visual System (HVS) and is capable of embedding a high-energy watermark (consequently robust against lossy compressions and other kinds of attacks) while prevents perceptible degradation in the host image. To modulate the binary coded watermark on a spread-spectrum noise, the introduced algorithm is followed by spread-spectrum watermarking. The algorithm was simulated and experimental results represent magnificent... 

    Adaptive watermarking scheme based on ICA and RDWT

    , Article IET Seminar Digest, 3 December 2009 through 3 December 2009 ; Volume 2009, Issue 2 , 2009 ; 9781849192071 (ISBN) Ghaedi Oskooei, S ; Dadgostar, M ; Rezai Rad, G ; Fatemizadeh, E ; Sharif University of Technology
    Abstract
    This paper proposes a new approach to watermarking multimedia products based on the combination of redundant discrete wavelet transform and independent component analysis. The original image is decomposed by RDWT, and watermark is embedded in to LL sub-band frequency according mixing model of the ICA, after that for enhancing the robustness of the watermark, the perceptual model is applied via stochastic approach for watermark adapting. This is based on computation of a noise visibility function (NVF) which has local image properties so the strength of watermarking is controllable. Principal component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind... 

    A robust spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 2, Issue 3 , 2009 , Pages 280-305 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, a DCT-based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply block-based DCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained because of embedding... 

    A new spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 3, Issue 1 , 2010 , Pages 1-26 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, a discrete cosine transform (DCT) based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT (BDCT) on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply BDCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained...