A Novel Dual-Purpose Image Watermarking Technique
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
A Novel Dual-Purpose Image Watermarking Technique

Authors: Maha Sharkas, Dahlia R. ElShafie, Nadder Hamdy

Abstract:

Image watermarking has proven to be quite an efficient tool for the purpose of copyright protection and authentication over the last few years. In this paper, a novel image watermarking technique in the wavelet domain is suggested and tested. To achieve more security and robustness, the proposed techniques relies on using two nested watermarks that are embedded into the image to be watermarked. A primary watermark in form of a PN sequence is first embedded into an image (the secondary watermark) before being embedded into the host image. The technique is implemented using Daubechies mother wavelets where an arbitrary embedding factor α is introduced to improve the invisibility and robustness. The proposed technique has been applied on several gray scale images where a PSNR of about 60 dB was achieved.

Keywords: Image watermarking, Multimedia Security, Wavelets, Image Processing.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1331547

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1649

References:


[1] E.-H. Fu, "Literature survey on digital image watermarking," Technical Report, submitted to EE 381K Multidimensional Signal Processing.
[2] F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, Vol.87, no.7, pp 1079-1107, 1999.
[3] W. Chu, "DCT-Based image watermarking using subsampling." IEEE Transactions on Multimedia, pp. 34-38, Mar. 2003.
[4] M.-J. Tsai, H.-Y. Hung, "DCT and DWT-Based image watermarking by using subsampling," Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, MNSA (ICDCSW'04), Hachioji, Tokyo, Japan, pp. 184-189, March 23 - 24, 2004.
[5] Xiangui Kang, Jiwu Huang, Yun. Q.Shi, and Yan Lin, "A DWT-DFT composite watermarking scheme robust to both affine transformation and JPEG compression." IEEE transactions on Circuits and Systems for Video Technology, Vol.13, no.8, August 2003.
[6] P. Meerwald, and A.Uhl, " A survey of Wavelet-Domain watermarking algorithms," in P.W. Wong and E.J. Delp, (eds.), Proceedings of electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, San Jose, CA, January pp. 505-516,2001.
[7] H. Inoue, et al. "A digital watermark technique based on the Wavelet Transform and its robustness on image compression and transformation," Proceedings of the 1998 IEEE International Conference on Image Processing(ICIP-98), Vol.2, Chicago, pp. 391- 395, October 1998.
[8] H.-J. Wang, P.-C. Su, and C.-C. J.Kuo, "Wavelet-based digital image watermarking," Optics Express, Vol.3, No.12,pp. 491-496, December 1998.
[9] D. Kundur, and D. Hatzinakos, "Digital watermarking using multiresolution Wavelet decomposition," International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seattle, pp.2969- 2972, May 1998.
[10] R. Safabakhsh, S. Zaboli, A. Tabibiazar, "Digital watermarking on still images using Wavelet transform," Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 05-07, 2004, Las Vegas, Nevada.
[11] W. Bender, D. Gruhl, and N. Morimoto, "Techniques for data hiding," in Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video Databases III, pp. 164-173, 1995.
[12] X. Xia, C. Boncelet, and G. Arce, "A multiresolution watermark for digital images," in Proc. IEEE Int. Conf. Image Processing 1997(ICIP'97), vol.1, Santa Barbara, CA, pp. 548-551, Oct. 1997.
[13] J. Liu, X. Zhang, J. Sun and M. A. Lagaunas, "A digital watermarking scheme based on ICA detection," Proceedings of the 4th International Symposium on Independent Component Analysis and Blind Signal Separation(ICA2003), April 2003, Nara, Japan.
[14] E. T. Lin and E. J. Delp, "A review of fragile image watermarks," Proceedings of the Multimedia and Security Workshop (ACM Multimedia '99) Multimedia Contents, Orlando, FL, October, pp. 25-29, 1999.
[15] E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, January 23 - 28, 2000, pp. 152-163.