Skip to main content

Image Watermarking Based on Pyramid Decomposition with CH Transform

  • Chapter
  • First Online:
Data Engineering

Part of the book series: International Series in Operations Research & Management Science ((ISOR,volume 132))

Abstract

The new method for digital image watermarking , presented in this chapter, could be used for intellectual property right protection of digital still images of any kind (natural, scanned documents, computer graphics, etc.). The method is suitable for distance learning applications; access control for medical or biometric information in corresponding databases; detection of forgeries and illegal distribution of electronic or scanned documents; data hiding in medical, cartographic, and other images; authorized contents editing; etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Arnold M, Schmucker M, Wolthusen ST (2003) Techniques and Applications of Digital Watermarking and Content Protection. Artech House.

    Google Scholar 

  • Barni M, Bartolini F (2004) Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker.

    Google Scholar 

  • Cox I, Miller M, Bloom J (2002) Digital Watermarking. Morgan-Kaufmann, San Francisco.

    Google Scholar 

  • Furht B (2006) Multimedia Watermarking Techniques and Applications (Internet and Communications Series). Auerbach.

    Google Scholar 

  • Falkowski B, Lim L (2000) Image watermarking using Hadamard transforms. Electronic Letters Vol 36 No 3 Feb, pp. 211-213.

    Article  Google Scholar 

  • Katzenbeisser S, Petitcolas F (2000) Information Hiding Techniques for Steganography and Digital Watermarking. Artech House.

    Google Scholar 

  • Kountchev R, Milanova M, Ford C, Rubin S (2003) Multimedia Watermarking with Complex Hadamard Transform in the Inverse Pyramid Decomposition. Proc. of the 2003 IEEE Intern. Conf. on Information Reuse and Integration, USA pp. 305-310.

    Google Scholar 

  • Kountchev R, Milanova M, Ford C, Kountcheva R (2005) Multi-layer Image Transmission with Inverse Pyramidal Decomposition. In: Computational Intelligence for Modelling and Predictions, S. Halgamuge, L. Wang (Eds.), Vol. 2, Chapter No 13, Springer-Verlag, pp. 179-196.

    Google Scholar 

  • Kountchev R, Todorov Vl, Kountcheva R, Milanova M (2006) Lossless Compression of Biometric Images and Digital Watermarking with IDP Decomposition. WSEAS Trans. on Signal Processing Vol. 2 pp. 684-691.

    Google Scholar 

  • Kountchev R, Milanova M, Todorov Vl, Kountcheva R (2007) Multiple audio Watermarking with Spectrum Pyramid. International Journal of Computer Science and Network Security (IJCSNS) pp. 191-200.

    Google Scholar 

  • Kountchev R, Todorov Vl, Kountcheva R (2007) Compression and Contents Protection of Images, Texts and Graphics for Distance Learning Applications. Proc. of the 6th WSEAS Intern. Conf. on Signal Processing, Robotics and Automation, Greece pp. 83-90.

    Google Scholar 

  • Mironov R, Kountchev R, Mirchev V (2007) Ordered Complex Hadamard Transform of Images. XLII Intern. Scientific Conf. on Information, Communication and Energy Systems and Technologies (ICEST’07) Macedonia pp. 369-372.

    Google Scholar 

  • Moulin P, Mihcak M (Sept. 2002) A framework for evaluating the data-hiding capacity of image sources. IEEE Transactions on Image Processing, Vol. 11, Issue 9, pp. 1029-1042.

    Article  Google Scholar 

  • O’Ruanaidh J, Dowling W, Boland F (1996) Phase Watermarking of Digital Images. In: Proceedings of Int. Conf. on Image Processing Vol. 3, Sept, pp. 239-242.

    Google Scholar 

  • Tewfik A (2000) Digital Watermarking. IEEE Signal Processing Magazine Vol. 17, Sept, pp.17-88.

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the National Fund for Scientific Research of the Bulgarian Ministry of Education and Science (Contract VU-I -305/07) and the US-Bulgarian project in the Science of Learning, National Academy of Science, USA.

Special thanks to the Laboratory for Image and Sound Processing of the Technical University of Sofia – Bulgaria, which provided the test images from their own database.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Kountchev, R., Milanova, M., Todorov, V., Kountcheva, R. (2009). Image Watermarking Based on Pyramid Decomposition with CH Transform. In: Chan, Y., Talburt, J., Talley, T. (eds) Data Engineering. International Series in Operations Research & Management Science, vol 132. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-0176-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-0176-7_16

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-0175-0

  • Online ISBN: 978-1-4419-0176-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics