用户名: 密码: 验证码:
A Semi-Blind Robust DCT Watermarking Approach for Sensitive Text Images
详细信息    查看全文
  • 作者:Lamri Laouamer (1) (2)
    Omar Tayan (3)

    1. Department of Information Systems
    ; CBE ; University of Al Qassim ; Buraidah ; KSA
    2. Lab-STICC (UMR CNRS 6285)
    ; European University of Brittany ; 20 Avenue Victor Le Gorgeu ; BP 817 - CS 93837 ; 29238 ; Brest Cedex ; France
    3. IT Research Centre for the Holy Quran (NOOR)
    ; College of Computer Science and Engineering ; Taibah University ; Al-Madinah Al-Munawwarah ; KSA
  • 关键词:Semi ; blind watermarking ; Robustness ; DCT ; Quran text image ; Authentication ; Attacks
  • 刊名:Arabian Journal for Science and Engineering
  • 出版年:2015
  • 出版时间:April 2015
  • 年:2015
  • 卷:40
  • 期:4
  • 页码:1097-1109
  • 全文大小:3,873 KB
  • 参考文献:1. Dong, P.; Brankov, J.G.; Galatsanos, N.P.; Yang, Y.; Davoine, F.: Digital watermarking robust to geometric distortions. IEEE Trans. Image Process. 14(12), 2140鈥?150 (2005)
    2. Ghouti, L.; Bouridane, A.; Ibrahim, M.K.; Boussakta, S.: Digital image watermarking using balanced multiwavelets. IEEE Trans. Signal Process. 54(4), 1519鈥?536 (2006)
    3. Jin, C., Qu, Z.-G., Zhang, Z.-M., Jiang, Y. (2007) Web dual watermarking technology using an XML document. IET Inf. Secur. 1: pp. 37-41 CrossRef
    4. Wang, X.; Wu, J.; Niu, P.: A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Trans. Inf. For. Secur. 2(4), 655鈥?63 (2007)
    5. Lin, P.-Y.; Lee, J.-S.; Chang, C.-C.: Dual digital watermarking for internet mediabased on hybrid strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8), 1169鈥?177 (2009)
    6. Lo-varco, G.; Puech, W.: DCT-based data hiding for securing ROI of color images. In: Proceedings of the International Conference on Image Processing ICIP-2005, Genova, Italy (2005)
    7. Norcen, R.; Uhl, A.: Robust authentication of the JPEG 2000 bitstream. In: Proceedings of the 6th Nordic Signal Processing Symposium鈥擭ORSIG 2004, June 9鈥?1, 2004 Espoo, Finland
    8. Kutter, M.; Petitcola, F.: A fair benchmark for image watermarking systems. In: Electronic Imaging: Security and Watermarking of Multimedia Content, vol. 3657 of SPIE Proceedings, San Jose, California, USA (1999)
    9. Lin, S.D., Shie, S.-C., Guo, J.Y. (2010) Improving the robustness of DCT-based image watermarking against JPEG compression. Comput. Stand. Interfaces 32: pp. 54-60 CrossRef
    10. Lai, C.-C.; Tsai, C.-C.: Digital image watermarking using discrete wavelettransform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060鈥?063 (2011)
    11. Bhatnagar, G., Raman, B., Wu, Q.M.J. (2012) Robust watermarking using fractional wavelet packet transform. IET Image Process. 6: pp. 386-397 CrossRef
    12. Khalili, M., Asatryan, D. (2013) Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map. IET Signal Process. 7: pp. 177-187 CrossRef
    13. Singh, S.P.; Rawat, P.; Agrawal, S.: A robust watermarking approach using DCT-DWT. Int. J. Emerg. Technol. Adv. Eng. 2(8), 300鈥?05 (2012)
    14. Soumya, M.; Pal, A.K.: A DCT-SVD based robust watermarking scheme for grayscale image. In: ICCACI Proceedings of the IEEE International Conference on Advances in Computing, Communication and Informatics, pp. 573鈥?78, Chennai, India (2012)
    15. Khan, M.I.; Rahman, M.; Sarker, I.H.: Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation. Int. J. Comput. Sci. Issues 10(3), 223鈥?30 (2013)
    16. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G. (1998) Attacks on copyright marking systems. Lect. Notes Comput. Sci. 1525: pp. 15-17
    17. Laouamer, L.; Tayan, O.: An enhanced SVD technique for authentication and protection of text-images using a case study on digital Quran content with sensitivity constraints. Life Sci. J. 10(2), 2591鈥?597 (2013) (ISSN:1097-8135)
    18. Dubolia, R.; Singh, R.; Bhadoria, S.S.; Gupta, R.: Digital image watermarking by using discrete wavelet transform and discrete cosinetransform and comparison based on PSNR. In: International Conference on Communication Systems and Network Technologies, pp. 593鈥?96 (2011)
    19. Brunet, D., Vrscay, E.R., Wang, Z. (2012) On the mathematical properties of the structural similarity index. IEEE Trans. Image Process. 21: pp. 1488-1499 CrossRef
    20. Sheikh, H.R., Bovik, A.C. (2006) Image information and visual quality. IEEE Trans. Image Process. 15: pp. 430-444 CrossRef
    21. Wang, Z., Bovik, A.C. (2002) A universal image quality index. IEEE Signal Process. Lett. 9: pp. 81-84 CrossRef
    22. Damera-Venkata, N.; Kite, T.D.; Geisler, W.S.; Evans, B.L.; Bovik, A.C: Image quality assessment based on a degradation model. IEEE Trans. Image Process. 9(4), 636鈥?50 (2000)
    23. Jagdish, C.P., Jiliang, E.P., Cedric, B. (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Process. 20: pp. 1597-1611 CrossRef
    24. Phadikar, A., Santi, P.M., Verma, B. (2011) Region based QIM digital watermarking scheme for image database in DCT domain. Comput. Electr. Eng. 37: pp. 339-355 CrossRef
    25. Abadpour, A.; Kasaei, S.: Unsupervised, fast and efficient color-image copy protection. IEEE Proc-Commun. 152(5), 605鈥?16 (2005)
    26. Lin, P.-Y.; Lee, J.-S.; Chang, C.-C.: Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8), 1169鈥?177 (2009)
    27. Jin, C., Qu, Z.-G., Zhang, Z.-M., Jiang, Y. (2007) Web dual watermarking technology using an XML document. IET Inf. Secur. J. 1: pp. 37-42 CrossRef
    28. Liu, R., Tan, T. (2001) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 4: pp. 121-128
    29. Yang, W.; Zhao, X.: A digital watermarking algorithm using singular value decomposition in wavelet domain. In: International Conference on Multimedia Technology (ICMT), 26鈥?8 July 2011
    30. Ma, X.; Shen, X.: A novel blind greyscale watermark algorithm based on SVD. In: International Conference on Audio, Language and Image Processing, Shanghai, 7鈥? July 2008
    31. Shi, F.; Shi, Y.; Lai, L.: Optimization on digital watermarking algorithm based on SVD-DWT. In: IEEE International Conference on Granular Computing (GrC), Kaosiung, 8鈥?0 Nov. 2011
    32. Li, Y.; Gou, W.; Li, B.: A new digital watermark algorithm based on the DWT and SVD. In: 10th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 14鈥?7 October 2011
    33. Tianming, G.; Yanjie, W.: DWT-based digital image watermarking algorithm. In: Tenth International Conference on Electronic Measurement and Instruments (ICEMI 鈥?011), Chengdu (2011)
    34. Pun, C.-M.: A novel DFT-based digital watermarking system for images. In: 8th International Conference on Signal Processing, Vol. 2. Beijing, China (2006)
    35. Lahoulou, A.; Bouridane, A.; Viennet, E.; Haddadi, M.: Full-reference image quality metrics performance evaluation over image quality databases. Arab. J. Sci. Eng. 38(9) (2013)
  • 刊物类别:Engineering
  • 刊物主题:Engineering, general
    Mathematics
    Science, general
  • 出版者:Springer Berlin / Heidelberg
文摘
This paper presents a new approach to address the challenges associated with integrity verification, proof of authenticity, tamper detection and assurance of copyright protection for digital images propagated online. In particular, the problem addressed here primarily relates to the protection of sensitive online textual images that may be targeted for counterfeiting or intentional/unintentional modifications which would result with a fake copy being disseminated. Typically, sensitive text images are characteristic of further challenges and constraints on embedding/extraction techniques compared to their more general digital picture/image counterparts. With many digital protection schemes addressing the problem of less-sensitive content comprising of a rich set of colours and textures, this paper proposes a novel watermarking approach for the case of sensitive text images in order to confirm content originality and integrity verification under some known constraints of the image type. Hence, a new approach based on discrete cosine transform and linear interpolation is proposed and applied on digital Quran text images, which are considered as ideal samples of content with stringent sensitivity requirements. Detailed results had presented the significance of this approach and had demonstrated the high robustness obtained when faced with various attack scenarios that include rotational attacks, JPEG compression attacks, noising attacks and median filtering attacks. Significantly, a major contribution of this paper was found in the novel watermark extraction approach which had enabled perfect watermark extraction under a range of attack scenarios. Finally, a significant advantage of the proposed approach was found in its broad applicability for authentication and protection of other sensitive and less-sensitive digital image content.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700