2011
DOI: 10.4304/jmm.6.4.359-368
|View full text |Cite
|
Sign up to set email alerts
|

Oblivious Image Watermarking in Discrete Multiwavelet Domain using QIMM

Abstract:

This paper proposes a novel  oblivious image watermarking technique for the copyright protection and authentication of still images, based on Discrete Multiwavelet Transform (DMWT) and Quantization Index Modulus Modulation (QIMM). The multiwavelet coefficients of an image are quantized using QIMM and the coefficients are modified according to the binary watermark logo. Watermark extraction does not require the original image. Experimental results show that, the proposed watermarking sc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…Table 13 and Table 14 also present the comparative analysis of "Traffic.avi" and "FoxCatcher.mp4" with the selected video watermarking algorithms (Sinha et al, 2011;Sharmai and Swami, 2013;Kala and Thaiyalnayaki, 2013) in terms of BER and NC. From the results in both tables, it is evident that the video embedding algorithm of PSUM (Leelavathy et al, 2011) provides superior performance against median filtering, low-pass filtering, rotation and H.264 compression attacks than the compared algorithms. Thus, the selected fingerprint embedding algorithm satisfies the fingerprint's robustness requirement.…”
Section: Robustness Of Fingerprinted Audio and Video Filesmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 13 and Table 14 also present the comparative analysis of "Traffic.avi" and "FoxCatcher.mp4" with the selected video watermarking algorithms (Sinha et al, 2011;Sharmai and Swami, 2013;Kala and Thaiyalnayaki, 2013) in terms of BER and NC. From the results in both tables, it is evident that the video embedding algorithm of PSUM (Leelavathy et al, 2011) provides superior performance against median filtering, low-pass filtering, rotation and H.264 compression attacks than the compared algorithms. Thus, the selected fingerprint embedding algorithm satisfies the fingerprint's robustness requirement.…”
Section: Robustness Of Fingerprinted Audio and Video Filesmentioning
confidence: 99%
“…This gives the approximation coefficient matrix in which the pirated code pc ∈ {0, 1} * is embedded. The watermark detection technique (Leelavathy et al, 2011;Xinkai et al, 2013) is applied on the approximation coefficient matrix to extract pc. Then M sends the extracted pc to MO which performs the tracing algorithm of Nuida's codes to identify the colluder(s).…”
Section: Traitor Tracingmentioning
confidence: 99%
See 1 more Smart Citation
“…In this scheme, the watermark is created using PCA and embedded in the LL and HH components of DWT. In continuation to scene based watermarking and more techniques in transform domain, N. Leelavathy et al [27] have proposed a technique for video watermarking by combining Discrete Multiwavelet Transform (DMWT) with Quantization Index Modulation (QIM) orthogonality. The proposed method is found to be robust against attacks like averaging, frame dropping, swapping, etc.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Results show that the scheme is effective to robustness and imperceptible. Another work that was referred is based on watermarking in scene based which was introduced by Leelavathy et al [2]. DMWT (Discrete Multiwavelet Transform) was used along with Quantization index to embed a watermark in uncompressed part of the video.…”
Section: Related Workmentioning
confidence: 99%