Robust and Blind Watermarking Approach Based on Modified Delaunay Triangulation

被引:0
|
作者
Essaidani, Dhekra [1 ]
Seddik, Hassene [1 ]
Ben Braiek, Ezzedine [1 ]
机构
[1] ENSIT, CEREP, Prod Res Ctr, 5 Av Taha Hussein, Tunis 1008, Tunisia
关键词
asynchronous attacks; Delaunay triangulation; feature-points; geometrical transformation; Sobel edge detector; Digital image watermarking;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
the development of the World Wide Web has not only facilitated the digital data processing and transmission but also has led to ease the illegal distribution and reproduction of digital multimedia online. Several techniques have been proposed to limit the illegal use of transmitted data such as steganography, cryptography and watermarking techniques. The watermarking approach consists in embedding an unnoticeable watermark in the host media by using a private approach. Its performance is considered by the robustness of the algorithm against attacks, the embedding capacity and the imperceptibility of the watermark. Obviously, the synchronous and asynchronous attacks represent the major problem of watermarking technique which limits its robustness quality. Especially, the geometric transformations destroyed the synchronization between the hidden information and the cover image. It can make the detection of the embedded data difficult or even impossible. In fact, the development of a robust image watermarking scheme against geometric distortion represents an interesting research topic. In this order, this research presents a new robust, blind and imperceptible watermarking approach based on a modified Delaunay triangulation constructed by using the features contents of the cover image. Computer simulation using MATLAB applied to 100 images collected from Internet has been used to prove the robustness of the proposed watermarking scheme.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [1] A blind robust QR Code Watermarking Approach Based on DCT
    Hsu, Ling-Yuan
    Hu, Hwai-Tsu
    Chou, Hsien-Hsin
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON CONTROL, ROBOTICS AND CYBERNETICS (CRC 2019), 2019, : 174 - 178
  • [2] ROBUST BOUNDARY TRIANGULATION AND DELAUNAY TRIANGULATION OF ARBITRARY PLANAR DOMAINS
    SUBRAMANIAN, G
    RAVEENDRA, VVS
    KAMATH, MG
    [J]. INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN ENGINEERING, 1994, 37 (10) : 1779 - 1789
  • [3] Modified DAG location for Delaunay triangulation
    Kolingerová, I
    [J]. COMPUTATIONAL SCIENCE-ICCS 2002, PT III, PROCEEDINGS, 2002, 2331 : 125 - 134
  • [4] A Delaunay triangulation based approach for cleaning rough sketches
    Parakkat, Amal Dev
    Pundarikaksha, Uday Bondi
    Muthuganapathy, Ramanathan
    [J]. COMPUTERS & GRAPHICS-UK, 2018, 74 : 171 - 181
  • [5] Robust Blind Approach for Digital Speech Watermarking
    Merrad, Ahmed
    Saadi, Slami
    Benziane, Ali
    Hafaifa, Ahmed
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE AND SPEECH PROCESSING (ICNLSP), 2018, : 4 - 8
  • [6] Robust Delaunay Triangulation for Domain with Acute Angles
    Meng, Xianhai
    Mei, Guoyi
    [J]. FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [7] Robust framework of Delaunay triangulation matching based on feature saliency analysis
    Yang, Yan
    Ji, Zhihang
    Wang, Fan
    Liu, Peiqi
    Hu, Xiaopeng
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2019, 28 (02)
  • [8] Robust image matching constrained by delaunay triangulation
    Jiang, San
    Jiang, Wanshou
    [J]. Cehui Xuebao/Acta Geodaetica et Cartographica Sinica, 2020, 49 (03): : 322 - 333
  • [9] Invariant digital image watermarking based on Defragmented Delaunay Triangulation for optimal watermark synchronization
    Essaidani, Dhekra
    Seddik, Hassene
    Ben Braiek, Ezzedine
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6148 - 6172
  • [10] Robust Image Watermarking Based on SIFT Feature and Optimal Triangulation
    Liu Jing
    Liu Gang
    Zhang Jiulong
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 337 - +