Maria Chroni, Stavros D. Nikolopoulos, Iosif Polenakis, Vasileios Vouronikos
{"title":"一种基于自反转排列的数字图像重复水印方案","authors":"Maria Chroni, Stavros D. Nikolopoulos, Iosif Polenakis, Vasileios Vouronikos","doi":"10.1109/IISA56318.2022.9904378","DOIUrl":null,"url":null,"abstract":"In this work we present a novel watermarking scheme based on the repetitive application of watermarks inside a digital image. Our approach extends the technique proposed initially in [1] and [2] by implementing the corresponding approach repetitively over the wider area of the digital image and embedding the whole watermark in the corresponding cells instead of parts of it. The approach proposed in this work focuses mainly on securing the watermarked image against crop attacks and compression attacks that constitute the most important attacks through the attack vectors. Our approach provides a significant improvement over the computational cost required for the embed procedure of the watermark inside a digital image, achieving an adequately imperceptible and robust watermarking technique. The experimental results exhibited through the evaluation of our proposed model prove its potentials against these types of attacks and ensure that the embedded information will be successful extracted from the watermarked image after the deployment of such attacks.","PeriodicalId":217519,"journal":{"name":"2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Repetitive Watermarking Scheme for Digital Images based on Self-Inverting Permutations\",\"authors\":\"Maria Chroni, Stavros D. Nikolopoulos, Iosif Polenakis, Vasileios Vouronikos\",\"doi\":\"10.1109/IISA56318.2022.9904378\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work we present a novel watermarking scheme based on the repetitive application of watermarks inside a digital image. Our approach extends the technique proposed initially in [1] and [2] by implementing the corresponding approach repetitively over the wider area of the digital image and embedding the whole watermark in the corresponding cells instead of parts of it. The approach proposed in this work focuses mainly on securing the watermarked image against crop attacks and compression attacks that constitute the most important attacks through the attack vectors. Our approach provides a significant improvement over the computational cost required for the embed procedure of the watermark inside a digital image, achieving an adequately imperceptible and robust watermarking technique. The experimental results exhibited through the evaluation of our proposed model prove its potentials against these types of attacks and ensure that the embedded information will be successful extracted from the watermarked image after the deployment of such attacks.\",\"PeriodicalId\":217519,\"journal\":{\"name\":\"2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IISA56318.2022.9904378\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IISA56318.2022.9904378","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Repetitive Watermarking Scheme for Digital Images based on Self-Inverting Permutations
In this work we present a novel watermarking scheme based on the repetitive application of watermarks inside a digital image. Our approach extends the technique proposed initially in [1] and [2] by implementing the corresponding approach repetitively over the wider area of the digital image and embedding the whole watermark in the corresponding cells instead of parts of it. The approach proposed in this work focuses mainly on securing the watermarked image against crop attacks and compression attacks that constitute the most important attacks through the attack vectors. Our approach provides a significant improvement over the computational cost required for the embed procedure of the watermark inside a digital image, achieving an adequately imperceptible and robust watermarking technique. The experimental results exhibited through the evaluation of our proposed model prove its potentials against these types of attacks and ensure that the embedded information will be successful extracted from the watermarked image after the deployment of such attacks.