A Novel Image Watermarking Scheme Based on MCA Neural Networks

Abstract:

Article Preview

Minor component analysis (MCA) plays an important role in signal processing and data analysis. In this paper, we propose a novel watermarking scheme using MCA neural networks. The proposed scheme can detect and localize any modification made to the image, which can be used for integrity verification and authentication. Another important property of this proposed scheme is that any gray scale watermark can be easily inserted into the image compared to some other watermarking method such as LSB (least significant bit) method. Furthermore, the proposed scheme can insert any watermark into one image without making any visible changes to the image. Since the minor component of each image is different, and it requires a user key during both the insertion and extraction procedures, it is not possible for an infringer to insert a new watermark or alter the existing one that could pass the test. Finally, various experiments also confirm such properties of the proposed scheme.

Info:

Periodical:

Edited by:

Mohamed Othman

Pages:

1874-1877

Citation:

Y. M. Li and J. Luo, "A Novel Image Watermarking Scheme Based on MCA Neural Networks", Applied Mechanics and Materials, Vols. 229-231, pp. 1874-1877, 2012

Online since:

November 2012

Authors:

Export:

Price:

$38.00

[1] Oja E. Principal components, minor components and linear neural networks. Neural Networks 6, pp.927-935.

DOI: https://doi.org/10.1016/s0893-6080(05)80089-9

[2] Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), pp.432-441.

DOI: https://doi.org/10.1109/83.826780

[3] Rivest R L. The MD5 MESSAGE DIGEST ALGORITHM. Tech. Rep. 1, Rfc 1321.

[4] Rivest R L, shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), pp.120-126.

DOI: https://doi.org/10.1145/359340.359342

[5] Kutter M, Petitcolas FAP. A fair benchmark for image watermarking systems. Proceedings of SPIE 3657, pp.226-239.