Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
WAV'09 Proceedings of the 3rd WSEAS international symposium on Wavelets theory and applications in applied mathematics, signal processing & modern science
A discrete wavelet transform based robust watermarking for copyright protection
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Geometric invariant semi-fragile image watermarking using real symmetric matrix
SIP'06 Proceedings of the 5th WSEAS international conference on Signal processing
Lossless compression of biometric image data
SIP'06 Proceedings of the 5th WSEAS international conference on Signal processing
IEEE Transactions on Image Processing
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
Hi-index | 0.00 |
In the paper is presented one approach for image content protection based on layered still image decomposition with Inverse Difference Pyramid (IDP) and digital watermark insertion. Unlike the famous pyramid decompositions (Laplacian, Gaussian, etc.), the IDP starts from the pyramid top, which comprises smallest number of coefficients, and continues with the next decomposition layers (i.e., it represents the processed image with consecutive approximations of increasing quality). The new approach permits the insertion of multiple watermarks in the consecutive decomposition layers (resistant and fragile) and their reliable extraction by authorized users only. The fragile watermark is added as additional information in the corresponding decomposition layers. Any change in the extracted fragile watermark indicates unauthorized image editing. The resistant watermark embedding is performed in the image spectrum phase domain. For this, the decomposition is accomplished with Complex Hadamard Transform (CHT). The resistant watermark is inserted in the transform coefficients' imaginary part, which permits the insertion of relatively large amounts of watermark data in the protected image. The images are transformed into new format, based on the IDP decomposition. This approach affords the opportunity for the successful developing of various applications - image content protection; historical heritage protection; telemedicine and healthcare; transfer of confidential information with restricted access and many others.