Science topic

Digital Watermarking - Science topic

Explore the latest questions and answers in Digital Watermarking, and find Digital Watermarking experts.
Questions related to Digital Watermarking
  • asked a question related to Digital Watermarking
Question
34 answers
I  have done a survey related to Stegnography most of the paper with LSB, DWTand  DCT. Please suggest some new technique of stegnography    
  • asked a question related to Digital Watermarking
Question
5 answers
Did anyone have MatLab code of 2-bit simple LSB substitution code for gray image steganography? Please share it. I need it for performance comparison purpose with my technique.
Relevant answer
Answer
% Clear the existing workspace
clear all;
% Clear the command window
clc;
% Read the input image
input = imread('peppers.png');
% Convert image to greyscale
input=rgb2gray(input);
% Resize the image to required size
input=imresize(input, [512 512]);
% Message to be embedded
message='geeksforgeeks';
% Length of the message where each character is 8 bits
len = length(message) * 8;
% Get all the ASCII values of the characters of the message
ascii_value = uint8(message);
% Convert the decimal values to binary
bin_message = transpose(dec2bin(ascii_value, 8));
% Get all the binary digits in separate row
bin_message = bin_message(:);
% Length of the binary message
N = length(bin_message);
% Converting the char array to numeric array
bin_num_message=str2num(bin_message);
% Initialize output as input
output = input;
% Get height and width for traversing through the image
height = size(input, 1);
width = size(input, 2);
% Counter for number of embedded bits
embed_counter = 1;
% Traverse through the image
for i = 1 : height
for j = 1 : width
% If more bits are remaining to embed
if(embed_counter <= len)
% Finding the Least Significant Bit of the current pixel
LSB = mod(double(input(i, j)), 2);
% Find whether the bit is same or needs to change
temp = double(xor(LSB, bin_num_message(embed_counter)));
% Updating the output to input + temp
output(i, j) = input(i, j)+temp;
% Increment the embed counter
embed_counter = embed_counter+1;
end
end
end
% Write both the input and output images to local storage
% Mention the path to a folder here.
imwrite(input, 'path_to_folder\originalImage.png');
imwrite(output, 'path_to_folder\stegoImage.png');
If you need Pixel adjustment code which provides better PSNR than simple LSB then contact with me.
  • asked a question related to Digital Watermarking
Question
6 answers
I want a hardware which support MATLAB code code for my data hiding algorithm . Kindly suggest me the hardware board which support MATLAB code.
Relevant answer
Answer
Dear all
I need a base paper to implement my algorithm in hardware. if anyone working in this area kindly share those details
  • asked a question related to Digital Watermarking
Question
3 answers
Digital watermarking is used for image copyright protection.is copyright protection is part of image forensics.
Relevant answer
Answer
I think so.
  • asked a question related to Digital Watermarking
Question
5 answers
In spatial and frequency domain.
Relevant answer
Answer
Search on www.Mathworks.com, Many codes are available there
  • asked a question related to Digital Watermarking
Question
9 answers
I need a Matlab code for an intelligent watermarking approach based particle swarm
optimization in discrete wavelet domain.
Relevant answer
Answer
link for DCT watermarking and pso matlab code
  • asked a question related to Digital Watermarking
Question
6 answers
Numerical example for each.
Relevant answer
Answer
Cryptography: change the data so it is not readable. Adversary can see there is a data communicated but can’t understand it.
Steganography: hide the very existence of the data. Adversary doesn’t know of a secret communication.
Watermarking: either visible or invisible and used to identify ownership and copyright.
  • asked a question related to Digital Watermarking
Question
6 answers
Dear Researchers,
I am novel researcher of image processing. I am researching  and developing new digital image watermarking method. For evaluation of this research, I need to compare the original image and watermarked image. Then I have to calculate degradation or information loss of watermarked image (after watermark embedding process). I need to know how this evaluation done and what are the tools I can use to this evaluation?
Thanks and Best Regards,
Relevant answer
Answer
you can use PSNR and structural similarity index metric (SSIM) to evaluate your algorithm.
  • asked a question related to Digital Watermarking
Question
6 answers
it is possible to implement watermarking algorithms with open CV. 
Relevant answer
Answer
Yes, it's easy to program your watermarking algorithms in OpenCV especially with C++. But you must code them because in my knowing it doesn't exist yet a predefined openCV function for this purpose.
  • asked a question related to Digital Watermarking
Question
7 answers
Hello,
        I am using OpenCV library to watermark a video but the problem is in the insertion step. I decompose the video into frames then i insert a mark in the frames and when i try to gather them to create a video using a codec the mark is lost because of compression. I  try to use a lossless codec ( CV_FOURCC('I', 'Y', 'U', 'V') ) but i didn't find the one which is supported by OpenCV and Ubuntu 14.04.
Please if someone can help me ?
Thank you very much
Relevant answer
Answer
There is a solution: we can get an uncompressed video from frames using this command
ffmpeg -i ./frame%d.png -vcodec png video.avi
  • asked a question related to Digital Watermarking
Question
3 answers
Can anyone can tell the term data coloring in cloud? How we can utilize digital watermarking algorithms to provide security for images that we are keeping in a cloud storage, that is actually managed by third party? or expecting some issues that can be focused to do research on image security on cloud. Any suggestion on this regard will be helpful for me.
Relevant answer
Answer
What is data coloring?
In a program, the consistency constraints with shared data structures.are called Colors.   Generally a programmer will be assigning colors to data. As a part of coloring,  the programmer also marks places in the control flow where data should be made consistent.
How we can utilize digital watermarking algorithms to provide security for images that we are keeping in a cloud storage, that is actually managed by third party?
Water mark is computed for a given digital object and placed along with the same object. Water mark is basically digitally signed emblem. This can be verified by any third party similar to that of process used for verifying the digitally signed certificates.
  • asked a question related to Digital Watermarking
Question
1 answer
website or book that gives details to how implement this algorithm programmatically in simple way
Relevant answer
Answer
  • asked a question related to Digital Watermarking
Question
1 answer
In table 1 of this paper, it is seen that for different payloads from 0.1 to 0.7, the effective payloads are same, eg. for image Lena, effective payloads are 0.58, I want to know how to achieve it? 
Relevant answer
Answer
Please go to the definition of the effective payload given between Eq. (1) & Eq. (2) in the second page of the paper.
  • asked a question related to Digital Watermarking
Question
12 answers
Hello
Please do you have some articles in fragile watermarking for videos?
Thank you very much
Relevant answer
Answer
Thank you mr Ersin
  • asked a question related to Digital Watermarking
Question
2 answers
Anybody have materials on the topic of "Image Retrieval Based upon Digital Watermarking"
Thanks in advance.
Relevant answer
Answer
Deniz Kilinç : Thank you very much  sir.
  • asked a question related to Digital Watermarking
Question
1 answer
Inquiry into the practical performance of audio watermarking.
Relevant answer
Answer
Payload depends upon the data you want to enter but with increasing the payload, your quality of the watermarked media file will going to be reduced. There must be a trade off between the payload and quality. So, this trade off depends upon your application. 
  • asked a question related to Digital Watermarking
Question
1 answer
So far I have an idea that in QIM we first modulate the index of the multiple orthogonal quantizers as per the code bits. In dither modulation good noise is added first and then quantized.
Can you explain a bit more to direct me in implementation of QIM? Also, it would be nice of you if you suggest some good references.
Relevant answer
Answer
In basic QIM, a quantizer maps a value to the nearest point belonging to a class of pre-defined discontinuous points. The function round (.) here denotes rounding value to the nearest integer and the standard quantization operation with step size is defined
as QΔ(x) = round(x/Δ)Δ.
Let Δ be the quantization step size and L represent the length of the host signal x and the message m (we embed one bit per sample). QIM embeds a message by modulating an index or sequence of indices with a watermark to be embedded and then quantizing the host signal with the associated quantizer. For QIM with dithering, we choose d0 pseudo-randomly with a uniform distribution over [-Δ/2, Δ/2] and
d1 = d0 + Δ/2,   if d0 <0
otherwise
d1 = d0 - Δ/2, if d0 >0
Here d0 or d1 is used for embedding message bit “0” or “1” respectively. The watermarked signal is given by:
yn = QΔ( xn , dm)
       = QΔ( xn + dm) − dm                             m∈[0, 1]                 n=1, 2, …, L
where QΔ(x) = round(x/Δ)Δ and the function round (:) denotes rounding value to the
nearest integer.
At the detector the received signal z, possibly a corrupted version of y, is requantized with the family of quantizers used while embedding to determine the embedded message bit, i.e.
As eqn are difficult to write refer my paper
or
  • asked a question related to Digital Watermarking
Question
1 answer
Dear... Friends... Digital watermark agents used as forgery detection on internet but its challenging task over internet due to huge amount of data. What is your point of view to solve this challenging task.
Relevant answer
Answer
  • asked a question related to Digital Watermarking
Question
3 answers
How can you implement DEW step by step?
Relevant answer
Answer
thank you so much  Maddali V S Murali Krishna for your answer. in,fact I want to know practical tutorial or book or website that explain to me. how to implement DEW practically  with video (step by step) even in c programming language, c++  or c#
please if you or anyone can help me
  • asked a question related to Digital Watermarking
Question
2 answers
I want to detect if a text based document's original form is tampered after publication.
Suppose that I have the original document and want to compare with another. Zero-watermark (zwm) is suggested to achieve this. Can zwm show me which parts or characters are tampered?
Relevant answer
Answer
The answer depends whether the product you are testing the legitimacy of is either software or printed matter. For software text documents digital signature is widely used and there are many models for you to try.
  • asked a question related to Digital Watermarking
Question
2 answers
I haven't found any paper that provides an elementary analysis.
Relevant answer
Answer
I agree with Peter. Adding a pseudo-random sequence in the time domain is equivalent to adding a pseudo-random sequence in the frequency domain because the transformation is usually linear and invertible. So one choose one domain rather than another because:
- one has a good perceptual model in this domain enabling to weight the watermark signal energy.
- one expects some attacks which are better modeled in this domain so that their impact on the watermark is better understood.
I strongly disagree with people making a clear difference between time and frequency watermarking, and claiming that frequency domain is better.   
  • asked a question related to Digital Watermarking
Question
8 answers
We know that some of the approaches work well on low embedding capacity and some on high embedding capacity.
Relevant answer
Answer
This Matlab code might help you to understand about reversible data hiding or reversible watermarking based on prediction error expansion and histogram shifting.
I have been studying  reversible data hiding or reversible watermarking for many years. I think reversible data hiding based on prediction error expansion and histogram shifting is the best  technique so far.
If the Matlab code has some mistakes, please let me know.
Good luck.
 
  
  • asked a question related to Digital Watermarking
Question
3 answers
In Digital Watermarking, Human Visual System is an important topic, to solve this topic Watson Visual Model analysis is required.
Relevant answer
Answer
This model takes into account some features of Human Visual System. A nice describtion of Watson model can be found in
I.J. Cox et al ''Digital Watermarking and Steganography''
  • asked a question related to Digital Watermarking
Question
3 answers
.
Relevant answer
Answer
Thank you Aria
  • asked a question related to Digital Watermarking
Question
1 answer
Here is the steps that I am successful so far :
1.Apply 3Level of DWT to host image
2.Apply SVD to one of the subbands
3.convert the subband and SV's to semi-binary using my own algorithm which will convert a number such as 205.36 to a semi-binary form like :
1.36 0 1 1 0 0 1 1
4.insert my watermark inside the frist and second LSB of the semi-binary form
5.Apply the reverse SVD
6.Apply the IDWT
Until here my watermark is remain intact But when I am going to write the image like
% convert back to uint8
WImg8=uint8(WImg);
imwrite(WImg8,'dwt_watermarked.bmp','bmp');
After extracting the watermark , the watermark is something else, I was wondering if I am doing something wrong? DO I have to convert the whole thing to uint8? because otherwise the written image is one blank image if I don't convert it to unit8
Relevant answer
Answer
I Think you don't pay attention to the matter that the image representation in spatial (color) domain contains only integer numbers, so if your watermarking is sensitive to the fractional part it will be discarded.
At the most of the practical methods, parameters are set in way that the method became robust against this quantization error.
  • asked a question related to Digital Watermarking
Question
9 answers
I am trying to write a code to watermark some binary information inside the SVD form of DWT of image. Here are the steps that I am successful with so far:
1. Apply 3 Level of DWT to host image
2. Apply SVD to one of the sub-bands
3. Convert the sub-band and SVs to semi-binary using my own algorithm, which will convert a number such as 205.36 to a semi-binary form like this:
1.36 0 1 1 0 0 1 1
4. Insert my watermark inside the first and second LSB of the semi-binary form
5. Apply the reverse SVD
6. Apply the IDWT
Until here my watermark remains intact, but when I am going to write the image like this:
% convert back to uint8
WImg8=uint8(WImg);
imwrite(WImg8,'dwt_watermarked.bmp','bmp');
after extracting the watermark , the watermark is something else, I was wondering if I am doing something wrong. Do I have to convert the whole thing to unit8? Otherwise the written image is one blank image if I don't convert it to unit8.
Relevant answer
Answer
Check the following, it may be useful to you,
1. Format of the image (imread, imwrite).
2. Transform and Inverse Transform must be applied correctly (levels).
3. There must be a solid reason to apply SVD.
  • asked a question related to Digital Watermarking
Question
4 answers
Convex optimization or classical optimization etc
Relevant answer
Answer
Frankly I am unaware of any watermarking optimisation method for a completely unknown attack. Your question is more related to signal processing attacks. You can possibly generalise the attack characteristics and investigate the effected image regions (mostly high frequency components). However if the attack is intentional, there are few works available in the literature, e.g. 'Oracle Attacks and Covert Channels' by Ilaria Venturini. This may lead you to create a similar model for signal processing attacks.
  • asked a question related to Digital Watermarking
Question
1 answer
I am researching on watermarking for supporting copy protection. Some articles mentioned that watermark can be used to bear copy control information (CCI) for DVD video, such as copy freely, copy once and copy never. Once DVD player or recorder detect such information, it will do the task according to the CCI. Currently, I want to know how this work can be implemented to protect an image and simulated using Matlab.
Relevant answer
Answer
Additionally, can any one inform me the references w.r.t such a work that I can access?