Mohammad Dehghani Soltani, Iman Tavakkolnia, H. Azami
{"title":"使用阿诺德变换和内曼-皮尔逊解码器进行安全稳健的水印","authors":"Mohammad Dehghani Soltani, Iman Tavakkolnia, H. Azami","doi":"10.1109/ICSAE.2016.7810228","DOIUrl":null,"url":null,"abstract":"In this paper, we propose an adaptive multiplicative method to watermark binary data by scaling low frequency wavelet coefficients in the first level of decomposition. We decode message using hypothesis testing with optimum threshold value according to Neyman-Pearson test. We define a detection factor, k0, which is equivalent to Lagrange Multiplier and use PSO optimization algorithm to obtain optimum threshold value. To increase security, we impose Arnold transform with optimum iteration number both on the host image and logo before embedding data. The robustness of the method is analyzed against well-known Stir-Mark attack set and compared with similar methods. Experimental results confirm the imperceptibility of the proposed method and more robustness against attacks.","PeriodicalId":214121,"journal":{"name":"2016 International Conference for Students on Applied Engineering (ICSAE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure and robust watermarking using arnold transform and Neyman-Pearson decoder\",\"authors\":\"Mohammad Dehghani Soltani, Iman Tavakkolnia, H. Azami\",\"doi\":\"10.1109/ICSAE.2016.7810228\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose an adaptive multiplicative method to watermark binary data by scaling low frequency wavelet coefficients in the first level of decomposition. We decode message using hypothesis testing with optimum threshold value according to Neyman-Pearson test. We define a detection factor, k0, which is equivalent to Lagrange Multiplier and use PSO optimization algorithm to obtain optimum threshold value. To increase security, we impose Arnold transform with optimum iteration number both on the host image and logo before embedding data. The robustness of the method is analyzed against well-known Stir-Mark attack set and compared with similar methods. Experimental results confirm the imperceptibility of the proposed method and more robustness against attacks.\",\"PeriodicalId\":214121,\"journal\":{\"name\":\"2016 International Conference for Students on Applied Engineering (ICSAE)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference for Students on Applied Engineering (ICSAE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSAE.2016.7810228\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference for Students on Applied Engineering (ICSAE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSAE.2016.7810228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure and robust watermarking using arnold transform and Neyman-Pearson decoder
In this paper, we propose an adaptive multiplicative method to watermark binary data by scaling low frequency wavelet coefficients in the first level of decomposition. We decode message using hypothesis testing with optimum threshold value according to Neyman-Pearson test. We define a detection factor, k0, which is equivalent to Lagrange Multiplier and use PSO optimization algorithm to obtain optimum threshold value. To increase security, we impose Arnold transform with optimum iteration number both on the host image and logo before embedding data. The robustness of the method is analyzed against well-known Stir-Mark attack set and compared with similar methods. Experimental results confirm the imperceptibility of the proposed method and more robustness against attacks.