Multiple Watermarking Algorithm Based on Spread Transform Dither Modulation

01/18/2016
by   Xinchao Li, et al.
0

Multiple watermarking technique, embedding several watermarks in one carrier, has enabled many interesting applications. In this study, a novel multiple watermarking algorithm is proposed based on the spirit of spread transform dither modulation (STDM). It can embed multiple watermarks into the same region and the same transform domain of one image; meanwhile, the embedded watermarks can be extracted independently and blindly in the detector without any interference. Furthermore, to improve the fidelity of the watermarked image, the properties of the dither modulation quantizer and the proposed multiple watermarks embedding strategy are investigated, and two practical optimization methods are proposed. Finally, to enhance the application flexibility, an extension of the proposed algorithm is proposed which can sequentially embeds different watermarks into one image during each stage of its circulation. Compared with the pioneering multiple watermarking algorithms, the proposed one owns more flexibility in practical application and is more robust against distortion due to basic operations such as random noise, JPEG compression and volumetric scaling.

READ FULL TEXT
research
12/28/2020

Spread-Transform Dither Modulation Watermarking of Deep Neural Network

DNN watermarking is receiving an increasing attention as a suitable mean...
research
10/17/2021

Improving Dither Modulation based Robust Steganography by Overflow Suppression

Nowadays, people are sharing their pictures on online social networks (O...
research
03/17/2020

Hide Secret Information in Blocks: Minimum Distortion Embedding

In this paper, a new steganographic method is presented that provides mi...
research
07/16/2020

Robust adaptive steganography based on dither modulation and modification with re-compression

Traditional adaptive steganography is a technique used for covert commun...
research
11/18/2022

Improving Robustness of TCM-based Robust Steganography with Variable Robustness

Recent study has found out that after multiple times of recompression, t...
research
02/28/2023

A study on the use of perceptual hashing to detect manipulation of embedded messages in images

Typically, metadata of images are stored in a specific data segment of t...
research
11/18/2016

A Novel Architecture for Computing Approximate Radon Transform

Radon transform is a type of transform which is used in image processing...

Please sign up or login with your details

Forgot password? Click here to reset