Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2024, Volume 39 Issue 1   
    Article

    ADAPTIVE DIGITAL IMAGE WATERMARKING WITH CONVOLUTIONAL NEURAL NETWORKS: ADDRESSING VARIED WATERMARK CHARACTERISTICS AND IMAGE RESOLUTIONS
    M. Narasimhulu, D. Veera Mounika, P. Varshini, Amarendra K, B. Siddartha Reddy, P V V S Srinivas
    Journal of Data Acquisition and Processing, 2024, 39 (1): 628-637 . 

    Abstract

    Due to the simplicity of picture tampering, ensuring the authenticity of digital photographs has grown to be a crucial concern in the age of digital transformation. Researchers have been actively tackling this problem for the past few decades, attempting to create efficient image watermarking methods suited to varied applications. The challenge of developing a watermarking system that balances security and resilience still exists. This article summarizes common watermarking frameworks and identifies the important criteria that need be met before developing new techniques for various purposes. It also examines contemporary developments in digital picture watermarking with the purpose of identifying novel approaches and their accompanying drawbacks. Additionally, the report examines conventional attacks and offers prospective lines of inquiry for further study. This research used a novel blind. A digital picture watermarking technique that functions well with both color and grayscale photos is introduced. The method uses the Discrete Cosine Transform (DCT) as a first step before embedding the watermark. Before performing the DCT, the host image is partitioned into 8x8 nonoverlapping blocks, and the watermark bit is integrated by adjusting the difference between the DCT coefficients of neighboring blocks. The Arnold transform and chaotic encryption are coupled to increase security, resulting in a two-layer security strategy for the watermark. The findings from simulations show that the suggested method demonstrates resilience to various image processing operations such as compression, sharpening, cropping, and median filtering. The paper studies and evaluates three alternative iterations of this algorithm. In comparison with current methods, the suggested scheme performs better than average in terms of imperceptibility, security, and robustness. Given these benefits, the suggested technique shows promise for use in fields like telemedicine and e-healthcare, providing a reliable solution for hiding electronic health records within medical photographs

    Keyword

    Sentence case; Separate by semicolon (;) between keyword


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved