Loading...
Search for: watermarking-schemes
0.006 seconds

    A solution to gain attack on watermarking systems: logarithmic homogeneous rational dither modulation

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 142010 through 19 March 2010 ; March , 2010 , Pages 1746-1749 ; 15206149 (ISSN) ; 9781424442966 (ISBN) Akhaee, M. A ; Amini, A ; Ghorbani, G ; Marvasti, F ; Sharif University of Technology
    2010
    Abstract
    Among the many attacks against watermarked data, the gain attack is less supported with countermeasures. The effectiveness of this attack becomes more evident in quantization-based embedding algorithms such as Dither Modulation (DM). In this paper, the general solution for both block and sample type DM schemes that are robust against gain attacks is considered. Among the solutions, we concentrate on a subclass of the algorithms which are insensitive to additive noise attacks; i.e., we introduce watermarking schemes which are both robust against gain and additive noise attacks. The simulation results confirm the desired performance of the final algorithm against these attacks while outperform... 

    Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 3 , 2009 , Pages 1928-1932 ; 17389445 (ISSN); 9788955191387 (ISBN) Kourkchi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi-fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is utilized. Using entropy is compatible with Human Visual System (HVS); therefore it is suitable to determine the weight of watermark in image blocks. Since entropy is a sensitive feature, it is used to improve the watermarking method performance against the proposed attack. It is shown that this modification... 

    A new blind energy based DWT-SVD domain watermarking using error control coding

    , Article International Journal of Knowledge-Based and Intelligent Engineering Systems ; Volume 19, Issue 2 , 2015 , Pages 135-141 ; 13272314 (ISSN) Tahzibi, M ; Sahebjamiyan, M ; Shahbahrami, A ; Sharif University of Technology
    IOS Press  2015
    Abstract
    The growth of data communication networks has made digital watermarking an important issue for copyright and content protection. Achieving high level of robustness and good transparency are the main objectives of developing every digital watermarking algorithm. From among transform domains as the basis of watermark hiding place, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) are the most commonly used transforms in literature. In this paper we propose a new hybrid DWT-SVD domain watermarking scheme taking into account the energy content of every chosen block of the selected DWT sub-band coefficients. Before embedding, we append a... 

    A new method for using a psychoacoustic model with patchwork audio watermarking in DFT domain

    , Article 34th Annual Conference of the IEEE Industrial Electronics Society, IECON 2008, Orlando, FL, 10 November 2008 through 13 November 2008 ; 2008 , Pages 1822-1827 ; 9781424417667 (ISBN) Tavakoli, E ; Tabandeh, M ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    This paper presents a novel patchwork audio watermarking scheme with a psychoacoustic model of HAS in DFT domain that has significantly higher detection robustness compared to standard and modified patchwork watermarking algorithms. In addition, watermark is perceptually tuned, so that its embedding is transparent. The proposed algorithm can be used for transmitting hidden data through telephone channel. Experimental results show that the proposed watermarking algorithm is sustainable against compression algorithms such as MP3, LPF, resampling, requantization and AWGN attacks. © 2008 IEEE  

    Two techniques for audio watermarking based on a novel transformation

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 1139-1142 ; 9781424412365 (ISBN) Feizi khankandi, S ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    2007
    Abstract
    The main purpose of this paper is to embed data in the transform domain of audio signals. Data embedding is similar to Quantization Index Modulation (QIM) approach. But the embedding process is performed in a novel transformation named PPG (Point to Point Graph) which converts the audio signal to a set of points in the Cartesian Coordinates. Two watermarking schemes are proposed in this paper. The first approach uses the QIM method on the radius of the PPG points while the second approach employs the logical operand for this aim. Simulation results show that these two methods have great robustness against the common attack (such as White Gaussian noise, echo and filtering). Subjective... 

    Robust watermarking against print and scan attack through efficient modeling algorithm

    , Article Signal Processing: Image Communication ; Vol. 29, issue. 10 , November , 2014 , p. 1181-1196 ; ISSN: 09235965 Amiri, S. H ; Jamzad, M ; Sharif University of Technology
    Abstract
    This article proposes a blind discrete wavelet transform-discrete cosine transform (DWT-DCT) composite watermarking scheme that is robust against print and scan distortions. First, two-dimensional DWT is applied to the original image to obtain the mid-frequency subbands. Then, a one-dimensional DCT is applied to the selected mid-frequency subbands to extract the final coefficients for embedding the watermark. To specify watermarking parameters, we utilize a Genetic Algorithm to achieve a predefined image quality after watermark insertion. Suitable locations for watermarking are determined by analyzing the effect of a modeling algorithm. This model simulates noise and nonlinear attacks in... 

    A robust zero-watermark copyright protection scheme based on DWT and image normalization

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 20 November 2011 through 23 November 2011 ; Volume 7088 LNCS, Issue PART 2 , November , 2011 , Pages 359-370 ; 03029743 (ISSN) ; 9783642253454 (ISBN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Recently, protecting the copyright of digital media has become an imperative issue due to the growing illegal reproduction and modification of digital media. A large number of digital watermarking algorithms have been proposed to protect the integrity and copyright of images. Traditional watermarking schemes protect image copyright by embedding a watermark in the spatial or frequency domain of an image. However, these methods degrade the quality of the original image in some extend. In recent years, a new approach called zero-watermarking algorithms is introduced. In these methods, the watermark does not require to be embedded into the protected image but is used to generate a verification... 

    Blind dewatermarking method based on wavelet transform

    , Article Optical Engineering ; Volume 50, Issue 5 , 2011 ; 00913286 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Along with the improvement of image watermarking techniques, the necessity for effectively and comprehensively evaluating various algorithms becomes imperative. In this paper, we first propose a new categorization that fits for most of the existing watermarking algorithms that work in the wavelet domain. Then an adaptive watermarking attack for evaluating the robustness of watermarking schemes that are based on the proposed categorization is presented. This attack determines the flat regions, edges, and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information. This is done by separately manipulating the... 

    Robust audio and speech watermarking using Gaussian and Laplacian modeling

    , Article Signal Processing ; Volume 90, Issue 8 , 2010 , Pages 2487-2497 ; 01651684 (ISSN) Akhaee, M. A ; Khademi Kalantari, N ; Marvasti, F ; Sharif University of Technology
    2010
    Abstract
    In this paper, a semi-blind multiplicative watermarking approach for audio and speech signals has been presented. At the receiver end, the optimal maximum likelihood (ML) detector aided by the archived information for Gaussian and Laplacian signals in noisy environment is designed and implemented. The performance of the proposed scheme is analytically calculated and verified by simulation. Then, we adapt the proposed scheme to speech and audio signals. To improve robustness, the algorithm is applied to low frequency components of the host signal. Besides, the power of the watermark is controlled elegantly to have inaudibility using perceptual evaluation of audio quality (PEAQ) and perceptual... 

    Robust multiplicative audio and speech watermarking using statistical modeling

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Akhaee, M. A ; Khademi Kalantari, N ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, a semi-blind multiplicative watermarking approach for audio and speech signals has been presented. At the receiver end, the optimal Maximum Likelihood (ML) detector aided by the channel side information for Gaussian and Laplacian signals in noisy environment is designed and implemented. The performance of the proposed scheme is analytically calculated and verified by simulation. Then, we adapt the proposed scheme to speech and audio signals. To improve robustness, the algorithm is applied to low frequency components of the host signal. Besides, the power of the watermark is controlled elegantly to have inaudibility using Perceptual Evaluation of Audio Quality (PEAQ) and... 

    A robust spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 2, Issue 3 , 2009 , Pages 280-305 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, a DCT-based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply block-based DCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained because of embedding... 

    Robust multiplicative patchwork method for audio watermarking

    , Article IEEE Transactions on Audio, Speech and Language Processing ; Volume 17, Issue 6 , 2009 , Pages 1133-1141 ; 15587916 (ISSN) Khademi Kalantari, N ; Akhaee, M. A ; Ahadi, M ; Amindavar, H ; Sharif University of Technology
    2009
    Abstract
    This paper presents a Multiplicative Patchwork Method (MPM) for audio watermarking. The watermark signal is embedded by selecting two subsets of the host signal features and modifying one subset multiplicatively regarding the watermark data, whereas another subset is left unchanged. The method is implemented in wavelet domain and approximation coefficients are used to embed data. In order to have an error-free detection, the watermark data is inserted only in the frames where the ratio of the energy of subsets is between two predefined values. Also in order to control the inaudibility of watermark insertion, we use an iterative algorithm to reach a desired quality for the watermarked audio... 

    Audio watermarking based on quantization index modulation in the frequency domain

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 1127-1130 ; 9781424412365 (ISBN) Khademi, N ; Akhaee, M. A ; Ahadi, S. M ; Moradi, M ; Kashi, A ; Sharif University of Technology
    2007
    Abstract
    In this paper, our main purpose is to embed data in the frequency domain of audio signals. Data was embedded by means of Quantization Index Modulation (QIM) in the frequency domain. With this aim, the spectrum of the audio signal was divided into two parts. The first part consisted of the first 19 Barks and the second included the remaining 6 Barks. Each of these parts had a different quantization step size. In order to have large quantization step sizes which yield more robustness, Human Auditory System (HAS) has been used. Decoder detects the watermark signal, without using the original audio signal. Simulation results have shown that this watermarking scheme has better robustness against... 

    A new spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 3, Issue 1 , 2010 , Pages 1-26 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, a discrete cosine transform (DCT) based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT (BDCT) on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply BDCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained... 

    A robust image watermarking using two level DCT and wavelet packets denoising

    , Article International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Fukuoka Prefecture, 16 March 2009 through 19 March 2009 ; 2009 , Pages 150-157 ; 9780769535647 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper we present a blind low frequency watermarking scheme on gray level images, which is based on DCT transform and spread spectrum communications technique. We compute the DCT of non overlapping 8x8 blocks of the host image, then using the DC coefficients of each block we construct a low-resolution approximation image. We apply block based DCT on this approximation image, then a pseudo random noise sequence is added into its high frequencies. For detection, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method,...