Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31231
A Dual Digital-Image Watermarking Technique

Authors: Maha Sharkas, Dahlia ElShafie, Nadder Hamdy

Abstract:

Image watermarking has become an important tool for intellectual property protection and authentication. In this paper a watermarking technique is suggested that incorporates two watermarks in a host image for improved protection and robustness. A watermark, in form of a PN sequence (will be called the secondary watermark), is embedded in the wavelet domain of a primary watermark before being embedded in the host image. The technique has been tested using Lena image as a host and the camera man as the primary watermark. The embedded PN sequence was detectable through correlation among other five sequences where a PSNR of 44.1065 dB was measured. Furthermore, to test the robustness of the technique, the watermarked image was exposed to four types of attacks, namely compression, low pass filtering, salt and pepper noise and luminance change. In all cases the secondary watermark was easy to detect even when the primary one is severely distorted.

Keywords: Wavelets, DWT, image watermarking, watermarkingtechniques

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1078454

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2381

References:


[1] Er-Hsien Fu, "Literature Survey on Digital Image Watermarking". EE 381K Multidimensional Signal Processing.
[2] F. Hartung and M. Kutter, "Multimedia Watermarking Techniques", Proc. IEEE, Vol.87, no.7, pp 1079-1107, 1999.
[3] Wai Chu, "DCT-Based Image Watermarking Using Subsampling." IEEE Transactions on Multimedia, Mar. 2003. pp. 34-38.
[4] Min-Jen Tsai, Hsiao-Ying Hung, "DCT and DWT-Based Image Watermarking by Using Subsampling" Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, MNSA (ICDCSW'04), March 23 - 24, 2004, Hachioji, Tokyo, Japan, pp. 184-189.
[5] Xiangui Kang, Jiwu Huang, Yun. Q.Shi, and Yan Lin, "A DWT-DFT Composite Watermarking Scheme Robust to both affine Transformation and JPEG Compression", IEEE transactions on Circuits and Sysytems for Video Technology, Vol.13, no.8, August 2003.
[6] Meerwald, P., and A.Uhl, " A survey of Wavelet-Domain Watermarking Algorithms," in P.W. Wong and E.J. Delp, (eds.), Proceedings of electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, San Jose, CA, January 2001, pp. 505-516.
[7] Inoue, H., et al. " A Digital Watermark Technique Based on the Wavelet Transform and its Robustness on Image Compression and Transformation, "Proceedings of the 1998 IEEE International Conference on Image Processing(ICIP-98), Vol.2, Chicago, October 1998,pp. 391-395.
[8] Wang, H.-J.M., P.-C.Su, and C.-C. J.Kuo, "Wavelet Based Digital Image Watermarking," Optics Express 491, Vol.3, No.12, December 1998.
[9] Kundur, D., and D. Hatzinakos, "Digital Watermarking Using Multiresolution Wavelet Decomposition," International conference on Acoustics, Speech and Signal Processing(ICASSP), Seattle, May 1998, pp.2969-2972.
[10] Reza Safabakhsh, Shiva Zaboli, Arash Tabibiazar, "Digital Watermarking on Still Images Using Wavelet Transform", Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 1, April 05-07, 2004, Las Vegas, Nevada.
[11] Bender, W., D. Gruhl, and N. Morimoto, "Techniques for data hiding," in Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video Databases III, 1995, pp. 164-173.
[12] X. Xia, C. Boncelet, and G. Arce, "A multiresolution watermark for digital images," in Proc. IEEE Int. Conf. Image Processing 1997(ICIP'97), vol.1, Santa Barbara, CA, Oct. 1997, pp. 548-551.
[13] Ju Liu, Xiangang Zhang, Jiande Sun and Miguel Angel Lagaunas, "A Digital Watermarking Scheme Based on ICA detection", Proceedings of the 4th International Symposium on Independent Component Analysis and Blind Signal Separation(ICA2003), April 2003, Nara, Japan.
[14] E. T. Lin and E. J. Delp, "A Review of Fragile Image Watermarks," Proceedings of the Multimedia and Security Workshop (ACM Multimedia '99) Multimedia Contents, Orlando, FL, October 1999, pp. 25-29.
[15] E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of Image Alterations Using Semi-Fragile Watermarks," Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, January 23 - 28, 2000, pp. 152- 163.