Retrieved logos from the cropped watermarked images: (a) The recovered logo from the cropped image in Figure 8(a). (b) The recovered logo from the cropped image in Figure 8(b). (c) The recovered logo from the cropped image in Figure 8(c).

Retrieved logos from the cropped watermarked images: (a) The recovered logo from the cropped image in Figure 8(a). (b) The recovered logo from the cropped image in Figure 8(b). (c) The recovered logo from the cropped image in Figure 8(c).

Source publication
Article
Full-text available
This paper presents an adaptive and robust method for image copyright protection to control ownership and prevent unauthorized usage of image property. The image is transformed into a wavelet domain using a multi-level of lifting wavelet transform; the lowest frequency band is globally divided into several concentric rectangles to withstand croppin...

Contexts in source publication

Context 1
... image and the three logos (Matlab, Tierney, and magnifying lens) are used as watermarking images. Firstly, each of the logos is embedded in a cover to get a watermarked image. Subsequently, several crop sizes are applied to the watermarked image for different logos. Fig. 8 shows the crop sizes which are applied to watermarked image in the tests. Fig. 9 shows the reconstructed watermark logos after cropping various columns and rows from the watermarked host image. Fig. 9 shows that the watermark logo is partially retrievable even though the watermarked image is cropped to be useless for the attacker. Therefore; the proposed watermark technique is robust against cropping ...
Context 2
... logos is embedded in a cover to get a watermarked image. Subsequently, several crop sizes are applied to the watermarked image for different logos. Fig. 8 shows the crop sizes which are applied to watermarked image in the tests. Fig. 9 shows the reconstructed watermark logos after cropping various columns and rows from the watermarked host image. Fig. 9 shows that the watermark logo is partially retrievable even though the watermarked image is cropped to be useless for the attacker. Therefore; the proposed watermark technique is robust against cropping ...

Similar publications

Article
Full-text available
Watermarking of multimedia gives more attention to the research society. This paper presents the non-blind watermarking technique on video; initially, a watermark is reshaped and grouped into odd and even row images. Next, the luminance band of the frame is shared into alternative pixel shares and it is concatenated. Further, gatefold operation is...

Citations

... The perceptual hash (pHash) algorithm proves to be highly effective in identifying copyright infringements in multimedia content, surpassing the performance of traditional hashing algorithms. The method successfully detects tampering in photos and videos, except for cases of video rotation and alterations in speed [27]. ...
Article
Full-text available
On a daily basis, a significant number of individuals distribute several photos and videos that have been marginally modified from the original material produced by copyright owners, such as photographers, graphic designers, and video producers. Individuals that infringe upon the rights of others, lacking the legal authority to access multimedia content, employ various digital image and picture manipulation techniques, it involves converting to gray scale, trimming, rotating, contracting the frame, and adjusting the background speed, to modify said content. Blockchain technology obviates the necessity of an intermediary, hence circumventing the possibility of a singular point of failure. Infractions to copyright poses a significant barrier to protecting commercial image and video information. The IPFS blockchain technology offers on-chain preservation for copyright information and off-chain storing for distinct multimedia files. The enhanced perceptual hashing algorithm significantly enhances the precision of identifying connections to identify digital image piracy. The photographers and designers that submit their photographs on websites are experiencing significant dissatisfaction due to a prevalent practice in which others attempt to claim credit and profit from the initial creator's effort.
... This solution was mainly to solve the situation of unauthorized data redistribution and sale. A new image copyright protection scheme was adopted in [29] to control the ownership of images and prevent unauthorized direct use. A new watermarking scheme was proposed, which used concentric matrix to protect image data and resist various common image attacks. ...
Article
Full-text available
In the digital age, digital asset is becoming increasingly important and digital rights management system can provide protection for digital content. However, the existing distributed digital rights managements are unable to fully detect plagiarized and illegally sensitive digital content, which greatly affects the benefit of content owner and reduces the confidence of users. A distributed management system for digital rights based on redactable blockchain and perceptual hash is proposed in the paper. The perceptual hash is adopted to detect similarities and judge whether or not it is the original piece. In addition, an incentive scheme based on redactable blockchain is proposed to ensure that plagiarized and illegally sensitive digital content can be removed in a timely manner when uploaded to the blockchain. Evidence of rights confirmation is provided by use of hidden watermarks in copyright dispute. At the same time on-chain detection and off-chain storage are applied to effectively reduce the storage burden of the blockchain. Smart contracts are established to ensure fairness in content transactions. Finally, the correctness and efficiency of the scheme is proven by simulation experiments.
... Digital watermarking technology has shown promise in recent years, having been extensively used in copyright protection of digital images concealment of electronic patient records verification of region of interest (ROI) integrity in medical images, and source authentication Notably there is a higher demand for medical images with verified integrity and authenticity for transmission which makes the pursuit of imperceptibility, robustness, capacity, and security increasingly challenging yet critical. Watermarks embedded in digital images can either be visible or non-visible [1]. Invisible watermarks can be divided into three categories: fragile, semifragile, and robust watermarking. ...
Article
The Internet of Medical Things, smart healthcare systems are becoming ubiquitous in our daily lives. Patients, doctors, and other medical personnel rely on the safe and efficient storage, transmission, and analysis of electronic health records , medical images such as scanning reports X-rays for successful treatment and management of different ailments. A Multi watermarking method is proposed for medical images based on quantum random walk and optimization algorithm. A logo image is used to verifying medical image integrity is embedding in region of interest and text data are embedded in the region of non interest to conceal private hospital and patient informations. This method improves the authenticity and integrity of medical images. A number of experiments are conducted to validate the security ,robustness and capacity of the proposed multi watermarking scheme.
... In the literature review, many watermarking methods have been proposed to prove ownership rights to digital images. Shahadi et al. [9] proposed a novel and robust approach to protect the copyright of digital images and restrict unauthorized persons from using this property. The discreet wavelet transform (DWT) transforms the digital image into multi-level wavelet levels. ...
Article
Full-text available
It became possible to send and reformat underwater images for copyright theft due to the rapid advancement of computer networks and image forgery tools. Acquiring underwater images is dangerous and requires much efforts, expensive imaging equipment, and professional photographers. Therefore, there is an urgent need to develop copyright protection methods to ensure that property rights are not lost. This paper presents a robust watermarking technique that ensures proof of ownership for underwater images, preventing unauthorized individuals from claiming ownership. The suggested watermarking technique's main contribution depends on using the Hough transform in order to find appropriate regions to hide the watermark information within the underwater images. The Hough transform is useful for identifying areas of difficult texture that can be used as a host for watermark information with minimal distortion. Also, the Twofish algorithm has been used to encrypt the watermark information before being hidden in the underwater image. The performance of the suggested watermarking technique is tested by two metrics: quality and robustness. The results show that the suggested method works because of the quality of the images that were made after the watermark was added and because it could withstand the attacks on it.
... Digital watermarking schemes represent a solution (Benrhouma et al., 2015;2016;Bravo-Solorio et al., 2018), it consists of embedding some information into the data called "watermark", then the watermark is extracted to serve different goals: In Robust watermarking schemes, the watermark should resist any intentional or unintentional attempt of removal to ensure copy-rights protection (Lu et al., 2006;Simitopoulos et al., 2003;Tang and Hang, 2003;Shahadi et al., 2020). On the other hand, Fragile and semi-fragile watermarking schemes are designed to control the integrity of images, the watermark should be affected by any intentional or unintentional modification of the cover image and that will make locating tampering regions possible (Celik et al., 2002;Chang et al., 2003;Fridrich et al., 2000;Lin and Chang, 2001;Benrhouma et al., 2015;2016;Di Martino and Sessa, 2012;Haghighi et al., 2019;Bravo-Solorio et al., 2018;Molina-Garcia et al., 2020). ...
Article
Full-text available
In this paper, we present an improvement of a previously proposed watermarking scheme. We proved in a previous work that the scheme suffers from security flaws and we exploited those flaws to attack the scheme resulting in the revelation of the secret keys used in the embedding process. With possession of the keys watermarked images could be manipulated without being detected by the extraction scheme. In this paper, we propose an improvement of the scheme to cover the security flaws in the scheme. This work falls into the context of improving the design of security systems taking into consideration the different cryptanalysis techniques.
... Digital watermarking techniques (Singh et al., 2020;Hassan and Gutub, 2020) can be categorized as robust, fragile and semi-fragile. Robust watermarking techniques (Song et al., 2012; are used for copy write protection (Shahadi et al., 2020) and ownership verification. Fragile watermarking techniques (Benhfid et al., 2020;Bravo-Solorio et al., 2018;Singh and Agarwal, 2016) and semi-fragile watermarking techniques- (Preda, 2013) both are used for tamper detection and content authentication. ...
Article
Full-text available
When the secret message is placed inside a highly compressed image, the transmission will be more secure and cost efficient. In this article, two-layer data embedding and extraction approaches are provided that use a combination ofAbsolute Moment Block Truncation Coding (AMBTC) and Difference Expansion (DE) to enhance hiding capacity on a large scale while producing minimum distortion. The first layer embedding strategy is classified into three situations according to the amount of bit patterns that are concatenated to improve performance. DE is used to build the second layer algorithm. Bitmap has been retaining its previous layer values through DE. The two-layer embedding technique is effective for concealing large volumes of data. In comparison to existing popular AMBTC data hiding strategies, this suggested design provides a low-cost, high-capacity, two-layer efficient data embedding procedure. The anticipated consequence highlighted certain outstanding magnificent aspects in the fields of tampered detection, recovery and authentication schemes, all of which are essential to the modern technological life. This system benefits a wide range of government and business sectors, including health care, commercial security, defence, and intellectual property rights.
... The database is completely centralized, thus, single point of failure is a major issue with the proposed model [43] 2020 ...
... [42] 2020 × × × × × Shahadi et el. [43] 2020 × × × × × Proposed Framework 2020 Figure 16: Similarity after Video Compression similarity as compared to the other algorithms. However, all the algorithms including pHash generate similarities less than 50% with respect to to the rotation operation and speed alteration for speeds 0.5x and 2x. ...
Article
Copyright infringement adversely affects the interest of copyright holders of images and videos which are uploaded to different websites and peer-to-peer image sharing systems. This paper addresses the problem of detecting copyright infringement so that the copyright holders are given due credit for their work. There are several photographs and videos that are shared every day by millions of users with some amount of modification in images and videos originally uploaded by the copyright holders such as photographers, graphic designers, and video providers. Copyright violators, who are not the original authors of the images and videos modify them using image processing and frame modification techniques such as grayscale conversion, cropping, rotation, frame compression, frame speed manipulation, and so on and upload the tampered images and videos. To address this problem, we propose an IPFS-based (InterPlanetary File System-based) decentralized peer-to-peer image and video sharing platform built on top of blockchain technology. We use a perceptual hash (pHash) technique to detect copyright violations of images and videos. When an image or video is to be uploaded to the IPFS, the pHash of the same is determined and checked against existing pHash values in the blockchain network. Similarity with existing pHash values would result in the image or video being detected as tampered. Blockchain technology offers the advantage of non-involvement of a third party and consequently the avoidance of a single point of failure.