Robust Digital Image Watermarking against Cropping and Salt & Pepper Noise using two-step Sudoku
Journal Title: روش های هوشمند در صنعت برق - Year 2017, Vol 8, Issue 31
Abstract
Several methods are exploited to watermark digital images as a safety measure for storing information, but an attacker can destroy the information by cropping a segment of the watermarked image or doing salt and pepper noise. In recent years, numerous schemes were proposed that reduce the impact of such attacks. A new method has been proposed to confront cropping attack and salt and pepper noise that is carried out using two Sudoku tables. In this method, the watermark image is scattered in two Sudoku table layouts with different solutions and is watermarked in the host image with Least Significant Bit(LSB). Using this method, the watermark image is repeated 81 times in the host image, and to this effect the watermark image can be reconstructed using other segments when cropped or salt and pepper noise by the attacker. Both Sudokus used in this paper are in the classic 9x9 form and using this method, resistance to cropping attacks increases up to 98.8% and resistance to salt and pepper noise increase up to 80%.
Authors and Affiliations
Mohammad Shahab Goli, Alireza Naghsh
Upper Bound for Queue length in Regulated Burst Service Scheduling
Quality of Service (QoS) provisioning is very important in next computer/communication networks because of increasing multimedia services. Hence, very investigations are performed in this area. Scheduling algorithms effe...
Content-Based Medical Image Retrieval Based on Image Feature Projection in Relevance Feedback Level
The purpose of this study is to design a content-based medical image retrieval system and provide a new method to reduce semantic gap between visual features and semantic concepts. Generally performance of the retrieval...
Stability of nonlinear load electric arc furnaces in the presence of reactive power sources
This paper first discusses about Electric arc.the model used in this paper is a dynamic model shown with a differential equation. Then, this model is placed with power system model which is considered as a thevenin equiv...
Improvement of Networked Control Systems Performance Using a New Encryption Algorithm
Networked control systems are control systems which controllers and plants are connected via telecommunication network. One of the most important challenges in networked control systems is the problem of network time del...
A Novel Approach in Text-Independent Speaker Recognition in Noisy Environment
In this paper, robust text-independent speaker recognition is taken into consideration. The proposed method performs on manual silence-removed utterances that are segmented into smaller speech units containing few phones...