Skip to Main content Skip to Navigation

Watermarking approaches for images authentication in applications with time constraints

Abstract : In numerous applications such as those of medical and embedded domains, images authentication requires taking into account time constraints, embedding rate, perceptual quality and robustness against various attacks. Watermarking has been proposed as a complementary approach to cryptography, for improving the security of digital images. Watermarking can be applied either in the spatial domain on the pixels of the image, or in the frequency domain on the coefficient of its transform.In this thesis, the goal is to propose image watermarking approaches that make it possible to ensure high level of imperceptibility and robustness while maintaining a level of computational complexity fitting the requirements of time-constrained applications. The method adopted in this thesis has consisted, on the one hand, to rely on the benefit of zero-watermarking that does not degrade the perceptual quality of image data and has low computational complexity, and on the other hand, to analyze visual characteristics of digital image (characteristics that are correlated to the Human Visual System - HVS) in order to identify the locations the most adapted for embedding the watermark with good level of imperceptibility and robustness. A zero-watermarking has therefore been proposed in this thesis, as well as several watermarking approaches based on the analysis of visual characteristics of image and on artificial intelligence or related techniques. The proposed solutions have been analyzed with respect to imperceptibility, robustness and temporal performance and the results have shown significant improvements in comparison to existing approaches.
Document type :
Complete list of metadata

Cited literature [140 references]  Display  Hide  Download
Contributor : Abes Star :  Contact
Submitted on : Tuesday, January 1, 2019 - 1:12:17 AM
Last modification on : Monday, April 19, 2021 - 3:36:04 PM
Long-term archiving on: : Tuesday, April 2, 2019 - 5:22:21 PM


Version validated by the jury (STAR)


  • HAL Id : tel-01967625, version 1


Musab Qassem Al-Ghadi. Watermarking approaches for images authentication in applications with time constraints. Cryptography and Security [cs.CR]. Université de Bretagne occidentale - Brest, 2018. English. ⟨NNT : 2018BRES0029⟩. ⟨tel-01967625⟩



Record views


Files downloads