首页 | 本学科首页   官方微博 | 高级检索  
     


Robust logo watermarking using biometrics inspired key generation
Affiliation:1. Center for System Science, Indian Institute of Technology Jodhpur, Rajasthan, India;2. Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada;3. Department of Applied Computer Science, University of Winnipeg, Winnipeg, MB, Canada;1. Faculty of Engineering & Computer Science, Concordia University, 1515 Ste-Catherine Street West, EV7.640, Montreal, Quebec, Canada H3G 2W1;2. College of Engineering, Khalifa University of Science, Technology, & Research, Abu Dhabi, United Arab Emirates;3. Faculty of Science, McGill University, Dawson Hall, 853 Sherbrooke St. West Montreal, Quebec, Canada H3A 0G5;1. National Taipei University, No. 151, University Road, San Shia District, Taipei 23741, Taiwan;2. Takming University of Science and Technology, No.56, Sec.1, Huanshan Rd., Taipei 11451, Taiwan;3. National Chengci University, No. 64, Sec. 2, Zhi-Nan Road, Taipei 11605, Taiwan;1. University of Information Technology, Vietnam National University, Ho Chi Minh, Viet Nam;2. Information Technology Department, Ton Duc Thang University, Ho Chi Minh, Viet Nam;3. Department of Computer Science, University of Science, Vietnam National University, Ho Chi Minh, Viet Nam
Abstract:In this paper, a novel logo watermarking technique with key concept is proposed using fractional wavelet packet transform (FrWPT), non-linear chaotic map and singular value decomposition (SVD). The core idea is to use biometrically generated keys in the embedding process of gray-scale watermark. Therefore, this paper first proposes a method for generating keys from biometrics efficiently. Then the host image is first randomized with the help of non-linear chaotic map followed by the embedding in the FrWPT domain by modifying the singular values of the randomized image. Further, in order to enhance the security, an authentication key is formed to authenticate the watermarked image. Finally, a reliable extraction process is proposed to extracted watermark from the possibly attacked authenticate watermarked image. The security, attack and comparative analysis confirm high security, efficiency and robustness of the proposed watermarking technique. Further, an efficient solution is also proposed to deal with the ambiguous situations created by SVD in watermarking.
Keywords:Digital watermarking  Biometrics  Fractional wavelet packet transform  Singular value decomposition  Chaotic map
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号