Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/14581
Title: | MULTIPURPOSE INVISIBLE AND VISIBLE DIGITAL IMAGE WATERMARKING SCHEMES |
Authors: | Agarwal, Himanshu |
Keywords: | Watermarking;Various Applications;Broadcast Monitoring;Piracy |
Issue Date: | Jul-2014 |
Publisher: | Dept. of Mathematics iit Roorkee |
Abstract: | Watermarking is an advanced research topic in multimedia community. It is used for various applications such as broadcast monitoring, piracy, owner identification, copyright protection, copy deterrence, proof of ownership, media authentication, fingerprint/transaction tracking, copy control, legacy enhancement, security of biometric system etc. The requirements of an efficient watermarking system depend on the application scenario. Nowadays, the main research issues in watermarking are development of new watermarking schemes, developing the testing tools for new and developed watermarking schemes, analysis of a watermarking system and broaden the usefulness of watermarking to multimedia applications. In this thesis, we have examined the solutions of five watermarking related problems. The first problem has been discussed in Chapter 2. Here, the digital image watermarking and biometrics have been combined to improve the owner identification/verification technology. This problem is related to broaden the watermarking application. For the solution, we have developed four watermarking schemes. Two watermarking schemes operate on discrete wavelet transform domain and rest two schemes operate on redundant discrete wavelet transform domain. One watermarking scheme in each transform domain incorporates a weighted binary coding. We have observed that the discrete wavelet transform based watermarking scheme coupled with the weighted binary coding provides the best solution for the first problem. i ii Both non-blind and blind watermarking schemes in the real oriented wavelet transform domain are proposed in the second problem (chapter 3). One challenge in this problem arises due to the fact that the product of the left inverse of real oriented wavelet transform followed by the real oriented wavelet transform (ROWT) is not the identity transform. A key contribution towards the solution is that we have obtained a product of left inverse of ROWT followed by the ROWT itself. This product has been used in both the proposed schemes. Further, derived mathematical properties based on the quotient-remainder-theorem have been used in the proposed blind watermarking scheme. The third problem (Chapter 4) is to provide a solution to improve the security/integrity of a compromised biometric system. In the solution of the third problem, we have proposed a spatial domain and a discrete cosine transform based watermarking schemes. The spatial domain based watermarking scheme is blind, reversible and fragile while the discrete cosine transform based watermarking scheme is blind and robust. The fourth problem (Chapter 5) is motivated by the fact that visible watermark is embedded at predefined positions in an image/video frame, which leads occlusion of important portion of multimedia objects by the visible watermark, for instance, TV channel logo used for television broadcasting. As a solution, we have proposed a visible watermarking technique that embeds a binary logo watermark at N non-overlapping positions in an image such that important portions of the image are not occluded. In the last problem of the thesis (Chapter 6), we have analysed watermarking systems of binary watermarks. The analysis is based on an assumption that negative paired images provide same information, which is the basic fundamental of information theory. We have analysed watermarking systems with respect to five comparators. These five comparators are based on the normalized Hamming iii similarity (NHS), the normalized correlation coefficient (NCC/NC), the mean subtracted NCC (MSNCC), symmetric NHS (SNHS, a version derived from NHS), absolute MSNCC (AMSNCC, a version derived from MSNCC). A main observation of this analysis is that SNHS and AMSNCC based comparators treat negative of watermark same as itself. The solution of each problem has been tested against several signal distortions such as Geometric attacks, filtering, format conversion and noise addition. |
URI: | http://hdl.handle.net/123456789/14581 |
Research Supervisor/ Guide: | Balasubramanian, R. |
metadata.dc.type: | Thesis |
Appears in Collections: | DOCTORAL THESES (Maths) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
G24479-HIMANSHU-T.pdf | 28.75 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.