Intelligent Watermarking for High-Capacity Low-Distortion Data Embedding

被引:3
作者
Shih, Frank Y. [1 ,2 ]
Zhong, Xin [2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] New Jersey Inst Technol, Dept Comp Sci, Newark, NJ 07102 USA
关键词
Saliency detection; image watermarking; ROI; authentication; data hiding; DIFFERENCE EXPANSION; MEDICAL IMAGES; AUTHENTICATION; SEGMENTATION;
D O I
10.1142/S0218001416540033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Image watermarking intends to hide secret data for the purposes of copyright protection, image authentication, data privacy, and broadcast monitoring. The ultimate goal is to achieve highest embedding capacity and lowest image distortion. In this paper, we present an intelligent watermarking scheme which can automatically analyze an image content to extract significant regions of interest (ROIs). A ROI is an area involving crucial information, and will be kept intact. The remaining regions of non-interest (RONIs) are collated for embedding watermarks, and will be ranked according to their entropy fuzzy memberships into a degree of importance. They are embedded by different amounts of bits to achieve optimal watermarking. The watermark is compressed and embedded in the frequency domain of the image. Experimental results show that the proposed technique has accomplished high capacity, high robustness, and high PSNR (peak signal-to-noise ratio) watermarking.
引用
收藏
页数:17
相关论文
共 29 条
[1]   Compact storage of medical images with patient information [J].
Acharya, UR ;
Anand, D ;
Bhat, PS ;
Niranjan, UC .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2001, 5 (04) :320-323
[2]   Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold [J].
Al-Qershi, Osamah M. ;
Khoo, Bee Ee .
SIGNAL PROCESSING, 2013, 93 (01) :154-162
[3]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[4]   Image watermarking: an evolution to content based approaches [J].
Bas, P ;
Chassery, JM ;
Macq, B .
PATTERN RECOGNITION, 2002, 35 (03) :545-561
[5]  
Chadha R., 1988, TECHNICAL REPORT, P1
[6]  
Cheng G., 2008, Transportation Research Board 87th Annual Meeting Compendium of Papers, P1
[7]  
Dittmann J., 2000, IEEE Multimedia, V7, P14, DOI 10.1109/93.895150
[8]   A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks [J].
Guo, Ping ;
Wang, Jin ;
Geng, Xue Hua ;
Kim, Chang Seob ;
Kim, Jeong-Uk .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06) :929-935
[9]  
Han J, 1995, LECT NOTES COMPUT SC, V930, P195
[10]   Embedding image watermarks in DC components [J].
Huang, JW ;
Shi, YQ ;
Shi, Y .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2000, 10 (06) :974-979