-
Spread Spectrum based Robust Image Watermark Authentication
Authors:
T. S. Das,
V. H. Mankar,
S. K. Sarkar
Abstract:
In this paper, a new approach to Spread Spectrum (SS) watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications like internet when copyright protection of digital image is required. The approach exploits two-predecessor single attractor (TPSA) cellular automata (CA) suitability to work as efficient authentication function in wavel…
▽ More
In this paper, a new approach to Spread Spectrum (SS) watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications like internet when copyright protection of digital image is required. The approach exploits two-predecessor single attractor (TPSA) cellular automata (CA) suitability to work as efficient authentication function in wavelet based SS watermarking domain. The scheme is designed from the analytical study of state transition behaviour of non-group CA and the basic cryptography/encryption scheme is significantly different from the conventional SS data hiding approaches. Experimental studies confirm that the scheme is robust in terms of confidentiality, authentication, non-repudiation and integrity. The transform domain blind watermarking technique offers better visual & statistical imperceptibility and resiliency against different types of intentional & unintentional image degradations. Interleaving and interference cancellation methods are employed to improve the robustness performance significantly compared to conventional matched filter detection.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Robust Image Watermarking Under Pixel Wise Masking Framework
Authors:
V. H. Mankar,
T. S. Das,
S. Saha,
S. K. Sarkar
Abstract:
The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive t…
▽ More
The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive threshold scheme. The threshold is computed based on the statistical analysis of the wavelet coefficients. The watermark is embedded several times to achieve better robustness. Here, a new type of non-oblivious detection method is proposed. The improvement in robustness performance against different types of deliberate and non-intentional image impairments (lossy compression, scaling, cropping, filtering etc) is supported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data. The proposed method is compared with a state of the art frequency based watermarking technique, highlighting its performance. This algorithmic architecture utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Discrete Chaotic Sequence based on Logistic Map in Digital Communications
Authors:
V. H. Mankar,
T. S. Das,
S. K. Sarkar
Abstract:
The chaotic systems have been found applications in diverse fields such as pseudo random number generator, coding, cryptography, spread spectrum (SS) communications etc. The inherent capability of generating a large space of PN sequences due to sensitive dependence on initial conditions has been the main reason for exploiting chaos in spread spectrum communication systems. This behaviour suggests…
▽ More
The chaotic systems have been found applications in diverse fields such as pseudo random number generator, coding, cryptography, spread spectrum (SS) communications etc. The inherent capability of generating a large space of PN sequences due to sensitive dependence on initial conditions has been the main reason for exploiting chaos in spread spectrum communication systems. This behaviour suggests that it is straightforward to generate a variety of initial condition induced PN sequences with nice statistical properties by quantising the output of an iterated chaotic map. In the present paper the study has been carried out for the feasibility and usefulness of chaotic sequence in SS based applications like communication and watermarking.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Performance Evaluation of Spread Spectrum Watermarking using Error Control Coding
Authors:
T. S. Das,
V. H. Mankar,
S. K. Sarkar
Abstract:
This paper proposes an oblivious watermarking algorithm with blind detection approach for high volume data hiding in image signals. We present a detection reliable signal adaptive embedding scheme for multiple messages in selective sub-bands of wavelet (DWT) coefficients using direct sequence spread spectrum (DS-SS) modulation technique. Here the impact of volumetric distortion sources is analyzed…
▽ More
This paper proposes an oblivious watermarking algorithm with blind detection approach for high volume data hiding in image signals. We present a detection reliable signal adaptive embedding scheme for multiple messages in selective sub-bands of wavelet (DWT) coefficients using direct sequence spread spectrum (DS-SS) modulation technique. Here the impact of volumetric distortion sources is analyzed on the ability of analytical bounds in order to recover the watermark messages. In this context, the joint source-channel coding scheme has been employed to obtain the better control of the system robustness. This structure prevents the desynchronisation between encoder and decoder due to selective embedding. The experimental results obtained for Spread Spectrum (SS) transformed domain watermarking demonstrate the efficiency of the proposed system. This algorithmic architecture utilizes the existing allocated bandwidth in the data transmission channel in a more efficient manner.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Multimedia Steganographic Scheme using Multiresolution Analysis
Authors:
Tirtha sankar Das,
Ayan K. Sau,
V. H. Mankar,
Subir K. Sarkar
Abstract:
Digital steganography or data hiding has emerged as a new area of research in connection to the communication in secured channel as well as intellectual property protection for multimedia signals. The redundancy in image representation can be exploited successfully to embed specified characteristic information with a good quality of imperceptibility. The hidden multimedia information will be commu…
▽ More
Digital steganography or data hiding has emerged as a new area of research in connection to the communication in secured channel as well as intellectual property protection for multimedia signals. The redundancy in image representation can be exploited successfully to embed specified characteristic information with a good quality of imperceptibility. The hidden multimedia information will be communicated to the authentic user through secured channel as a part of the data. This article deals with a transform domain, block-based and signal non-adaptive/adaptive technique for inserting multimedia signals into an RGB image. The robustness of the proposed method has been tested compared to the other transform domain techniques. Proposed algorithm also shows improvement in visual and statistical invisibility of the hidden information.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.