Keywords : Watermarking

Chaotic Watermarking for Authentication

Melad Jader Saeed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 2, Pages 243-257
DOI: 10.33899/csmj.2013.163498

This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented.
The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate the watermark from the same cover picture then embedding it in another level of the cover depending on the chaotic positions in order to increase authenticity and fortification against attacks. As for the second phase, the chaotic function has been used to generate and retrieve the watermark and compare them to ensure authenticity. Through the practical results that were obtained using the measurements of Correlation, PSNR, and MSE the quality of this algorithm has been shown. Some of the image processing procedures have been used to measure the robustness of this algorithm through calculating the correlation coefficient.

Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform

Shaimaa Sh. Mohammad

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 87-97
DOI: 10.33899/csmj.2011.163645

In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing. To increase the effective of this algorithm chaotic logistic map are used to select the embedding position in host chaotically which increase the security and make it hard to be detected, experimental result which be measured by using (Mean Square error, Peak signal to noise ratio , Signal to Noise Ratio, CORLLATION) has value (0.3195, 53.0867, 45.9152, 0.9998) respectively reflect the effective of this algorithm, the watermarked image has no noticeable change, some image processing operation such as(filter ,noise and compression) are used to test the robustness which measured by calculate similarity between extracted watermark after attack and the original one, Programming based on Matlab9.

Dual Hiding in Digital Image Files

Farah Tareq Mohammed

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 1, Pages 131-147
DOI: 10.33899/csmj.2011.163629

The technique of information hiding is one of information security techniques, which works on embedding information on media in such a way that avoid bringing suspicion of discovering transmission between two ends.
In this paper, a modified algorithm is suggested depending on two principles: double information hiding and multiple watermarking. The first principle is represented by cryptography and steganography in a way that each method work separately from the other to ensure a secure content that embedded in the message. While the second principle depends on multiple watermarking represented by images with secret key in a gray image to achieve authentication and accuracy of sending data. Cryptography is used to protect binary image (original watermarking) by using a secret key and embedding more than watermarking (binary and gray images) inside cover file (color image) by using signature (data) that have been taken from the cover file and adopted in the spatial domain for hiding data.

Embedding and Extracting the Watermark in Video Files using Intelligent Techniques

Shahba I. Khaleel

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 1, Pages 25-44
DOI: 10.33899/csmj.2011.163620

This research, design a watermarking system for embedding and extracting the watermark in video files. This research presented four-efficient and powerful ways to embed and extract the watermark, the extract which in turn characterized as blind since it does not need the original cover in the process of extracting the watermark. The first method established the mean and SVD, which relied on the conversion of Singular values decomposition SVD and calculate the average of the unique values which are resulting from the application of the SVD on each data frame of the video file that required for embedding by, and then this method has been improved by hybrid intelligence by using a genetic algorithm for embedding the watermark, which is a second method. And other two methods has been implemented in this research. The third and fourth methods use artificial neural networks to embed the watermark. Depending on the characteristics of the data frame we use elman and Jordan neural networks and we use genetic algorithm to generate the secret key. The four methods of watermark were efficient and robust against various attacks which was found by measuring the efficiency of the methods by calculating the values of the Peak Signal-to-Noise Ratio PSNR and the correlation coefficient Normalized Correlation Coefficient NCC.

Digital Image Watermarking using Singular Value Decomposition

Sura Ramzi Sheriff

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 3, Pages 187-200
DOI: 10.33899/csmj.2010.163922

This paper  presents a digital image watermarking  that  applied theory of linear algebra called “Singular Value Decomposition (SVD)” to digital image watermarking .SVD watermarking scheme, which successfully embeds watermarks into images imperceptible way .SVD method can transform matrix A into product USV .
Watermarking, is the process of embedding data into a multimedia cover , and can be used primarily for copyright protection and other purposes.  Schemes that have recently been proposed modify the pixel values or Transform domain coefficients. The Singular Value Decomposition (SVD) is a practical numerical tool with applications in a number of signal processing fields including image compression. In an SVD-based watermarking scheme, the singular values of the cover image are modified to embed the watermark data. This method has been proposed an optimal SVD-based watermarking scheme that embeds the watermark in two steps. In the first step, the cover image is divided into smaller blocks and a piece of the watermark is embedded in each block. In the second step extracting the watermark  from the watermarked image.  
All tests and experiments are carried out using MATLAB as computing environment and programming language.