TY - JOUR
T1 - Invisible watermarking framework that authenticates and prevents the visualization of anaglyph images for copyright protection
AU - Muñoz-Ramirez, David Octavio
AU - Ponomaryov, Volodymyr
AU - Reyes-Reyes, Rogelio
AU - Cruz-Ramos, Clara
AU - Garcia-Salgado, Beatriz P.
N1 - Publisher Copyright:
© TÜBİTAK.
PY - 2019
Y1 - 2019
N2 - In this work, a watermarking framework to authenticate and protect the copyright that prevents the visualization of nonauthorized anaglyph images is proposed. Designed scheme embeds a binary watermark and the Blue channel of the anaglyph image into the discrete cosine transform domain of the original image. The proposed method applies the quantization index modulation-dither modulation algorithm and a combination of Bose–Chaudhuri–Hocquenghem with repetition codes, which permit to increase the capability in recovering the watermark. Additionally, Hash algorithm is used to scramble the component where the watermark should be embedding, guaranteeing a higher security performance of the scheme. This new technique prevents the visualization of 3D content to unauthorized users. Additionally, its high robustness against the most common image processing attacks, such as JPEG compression, impulsive and Gaussian noises, etc. has been demonstrated in this study.
AB - In this work, a watermarking framework to authenticate and protect the copyright that prevents the visualization of nonauthorized anaglyph images is proposed. Designed scheme embeds a binary watermark and the Blue channel of the anaglyph image into the discrete cosine transform domain of the original image. The proposed method applies the quantization index modulation-dither modulation algorithm and a combination of Bose–Chaudhuri–Hocquenghem with repetition codes, which permit to increase the capability in recovering the watermark. Additionally, Hash algorithm is used to scramble the component where the watermark should be embedding, guaranteeing a higher security performance of the scheme. This new technique prevents the visualization of 3D content to unauthorized users. Additionally, its high robustness against the most common image processing attacks, such as JPEG compression, impulsive and Gaussian noises, etc. has been demonstrated in this study.
KW - Anaglyph
KW - Authentication
KW - Blind extraction
KW - Bose–Chaudhuri–Hocquenghem
KW - Copyright protection
KW - Discrete cosine transform
KW - Invisible watermark
KW - Quantization index modulation-dither modulation
UR - http://www.scopus.com/inward/record.url?scp=85065819306&partnerID=8YFLogxK
U2 - 10.3906/elk-1810-138
DO - 10.3906/elk-1810-138
M3 - Artículo
SN - 1300-0632
VL - 27
SP - 1571
EP - 1588
JO - Turkish Journal of Electrical Engineering and Computer Sciences
JF - Turkish Journal of Electrical Engineering and Computer Sciences
IS - 3
ER -