An Algorithm for Secure Visible Logo Embedding and Removing in Compression Domain
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32827
An Algorithm for Secure Visible Logo Embedding and Removing in Compression Domain

Authors: Hongyuan Li, Guang Liu, Yuewei Dai, Zhiquan Wang

Abstract:

Digital watermarking is the process of embedding information into a digital signal which can be used in DRM (digital rights managements) system. The visible watermark (often called logo) can indicate the owner of the copyright which can often be seen in the TV program and protects the copyright in an active way. However, most of the schemes do not consider the visible watermark removing process. To solve this problem, a visible watermarking scheme with embedding and removing process is proposed under the control of a secure template. The template generates different version of watermarks which can be seen visually the same for different users. Users with the right key can completely remove the watermark and recover the original image while the unauthorized user is prevented to remove the watermark. Experiment results show that our watermarking algorithm obtains a good visual quality and is hard to be removed by the illegally users. Additionally, the authorized users can completely remove the visible watermark and recover the original image with a good quality.

Keywords: digital watermarking, visible and removablewatermark, secure template, JPEG compression

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1073341

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1493

References:


[1] I. Cox, J. Kilian, F. Leighton, F. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, Vol. 6, No. 12, Dec. 1997, pp.1673-1687.
[2] Barni, M., "Improved wave-Based Watermarking through Pixel-Wise Marking." IEEE Transactions On Image Processing, 2001. 10(5): p. 783-791.
[3] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," in Proc. IEEE Int. Symp. Circuits and Systems, Vol. 2, BANGKOK, THAILAND, MAY 2003, PP. 912-915.
[4] M.S. Kankanhalli, R. Lil, and R. Ramakrishnan, "Adaptive Visible Watermarking of Images," Proc. IEEE Int-l Conf. Multimedia Computing and Systems, IEEE CS Press, 1999, pp. 68-73.
[5] S.P. Mohanty, K.R. Ramakrishnan, and M.S. Kankanhalli, A dual watermarking technique for image, Proc.7th ACM Int. Multimedia Conf. 2(1999) 9-51.
[6] Yongjian Hu, Sam Kwong, Jiwu Huang. "An Algorithm for Removable Visible Watermarking." Ieee Transaction on Circuits and Systems for Video Technology, Vol. 16, No.1, January 2006.
[7] Meng and S. -F Chang, "Embedding Visible Video Watermarks in the Compressed Domain," IN PROC. ICIP, OCT. 4-7, 1998, VOL. 1, PP. 474-477.
[8] Min-Jen Tsai, Chih-Wen Lin. "The Collaboration of Noise Reduction and Human Vision System Models for a Visible Watermarking Algorithm." Image Processing, 2007. ICIP 2007. IEEE International Conference on. Volume: 3, On page(s): III - 273-III - 276, 2007.
[9] P.-M. Chen, "A Visible Watermarking Mechanism Using A Statistic Approach," IN PROC. 5TH INT. CONF. SIGNAL PROCESSING, 2000, VOL. 2, PP. 910-913.
[10] B. M. Macq And J. J. Quisquater. "Cryptology for Digital TV Broadcasting." PROCEEDINGS OF THE IEEE, 83(6): 944-957, 1995.