Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 249))

Abstract

Digital Watermarking is an information hiding technique in which an identifying piece of information is embedded into a cover work so as to identify the ownership of some important information or document. It is widely used for enforcing copyright infringement protection for various types of digital data including images. In images, various watermarking techniques have been proposed over time. The watermarking techniques are often susceptible to geometric attacks such as rotation and cropping. This paper proposes an image watermarking scheme which uses the geometric properties of an image to ensure invariance of the watermark to rotation and cropping. It also incorporates a checksum based mechanism for tracking any distortion effect in the cover work. Efforts have been given to ensure that the proposed algorithm conforms to high Robustness and Fidelity which are the primary quality requirements for any Digital Watermarking system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dekker, M.: Security of the Internet. The Froehlich/Kent Encyclopedia of Telecommunications 15, 231–255 (1997), Source: http://www.cert.org/encyc_article/ (last accessed July 12, 2013)

  2. Artz, D.: Digital Steganography: Hiding Data within Data. IEEE Internet Computing Journal (June 2001)

    Google Scholar 

  3. Digital Watermarking, Source: http://www.alpvision.com/watermarking.html/ (last accessed July 12, 2013)

  4. Petitcolas, F.A.P.: Digital Watermarking. In: Becker, E., et al. (eds.) Digital Rights Management. LNCS, vol. 2770, pp. 81–92. Springer, Heidelberg (2003)

    Google Scholar 

  5. Zhang, Y.: Digital Watermarking Technology: A Review. In: ETP International Conference on Future Computer and Communication. IEEE (2009)

    Google Scholar 

  6. Stokes, S.: Digital copyright: law and practice, Source: http://www2.law.ed.ac.uk/ahrc/script-ed/vol6-3/gs_review.asp (last accessed July 18, 2013)

  7. Silman, J.: Steganography and Steganalysis: An Overview. SANS Institute (2001)

    Google Scholar 

  8. Serdean, C.V., Tomlinson, M., Wade, J., Ambroze, A.M.: Protecting Intellectual Rights: Digital Watermarking in the wavelet domain. In: IEEE Int. Workshop Trends and Recent Achievements in IT, pp. 16–18 (2002)

    Google Scholar 

  9. Cox, I., Miller, M., Bloom, J., Miller, M.: Watermarking applications and their properties. Information Technology: Coding and Computing, 6–10 (2000)

    Google Scholar 

  10. Attacks on Digital Watermarks: Classification. Estimation-based Attacks and Benchmarks, Source: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.84.5061&rep=rep1&type=pdf (last accessed July 23, 2013)

  11. Checksum, Source: http://www.accuhash.com/what-is-checksum.html (last accessed July 17, 2013)

  12. Xuehua, J.: Digital Watermarking and its Application in Image Copyright Protection. Intelligent Computation Technology and Automation (ICICTA), 114–117 (2010)

    Google Scholar 

  13. Ni, J., Zhang, R., Huang, J., Wang, C., Li, Q.: Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform. In: 5th International Workshop IWDW, Jeju island Korea, pp. 246–260 (2006)

    Google Scholar 

  14. Gao, L., Qi, L., Yang, S., Wang, Y., Yun, T., Guan, L.: 2D-FRFT based rotation invariant digital image watermarking. In: IEEE International Symposium on Multimedia, pp. 286–289 (2012)

    Google Scholar 

  15. Joseph, J.K., Ruanaidh, O., Thierry, P.: Rotation, Scale and Translation Invariant Digital Image Watermarking. In: Proc. International Conference on Image Processing, pp. 536–539 (1997)

    Google Scholar 

  16. Crandall, R.: Some Notes on Steganography. Posted on Steganography Mailing List (1998), Source: http://www.dia.unisa.it/~ads/corsosecurity/www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf (last accessed July 17, 2013)

  17. The Bitwise Operators Source: http://www.cs.cf.ac.uk/Dave/PERL/node36.html (last accessed July 10, 2013)

  18. Simoncelli, E.P., Freeman, W.T.: The steerable pyramid: a flexible rchitecture for multi-scale derivative computation. In: 2nd Annual IEEE Intl. Conference on Image Processing, Washington, DC (October 1995)

    Google Scholar 

  19. Moller, R., Salguero, H., Salguero, E.: Image recognition using the Fourier-Mellin Transform. LIPSE-SEPI-ESIME-IPN, Mexico

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tauheed Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Ahmed, T., Roy, R., Changder, S. (2014). Cropping and Rotation Invariant Watermarking Scheme in the Spatial Domain. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II. Advances in Intelligent Systems and Computing, vol 249. Springer, Cham. https://doi.org/10.1007/978-3-319-03095-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03095-1_31

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03094-4

  • Online ISBN: 978-3-319-03095-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics