Skip to main content
Log in

Content protection in grayscale and color images based on robust digital watermarking

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The concept of digital rights management architecture for multimedia will be presented in this paper, with focus on robust digital image watermarking, which is able to undergo geometrical attacks performed against the embedded watermarks. Geometrical attacks are still an open problem for many digital watermarking algorithms used in present time. Most of geometrical attacks can be described by using affine transforms. A new approach to improve robustness against geometrical attacks is presented. The discrete Fourier transform and log-polar mapping are used for watermark embedding and for watermark detection. Some attacks against the embedded watermarks are performed and the results are given. Also two modifications, usage of the proposed method as a synchronization template and implementation for the color images, are presented and experimental results are given too.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Čižmár, A., Doboš, L., & Papaj, J. (2009). Integration of modified security service vector to the Manet. Journal of Electrical and Electronics Engineering, 2(1), 135–140. ISSN 1844–6035.

    Google Scholar 

  2. Deguillaume, F., Voloshynovskiy, S., & Pun, T. (2002). A method for the estimation and recovering from general affine transforms in digital watermarking applications. In Security and watermarking of multimedia contents IV: Vol. 4675. Proc. SPIE, 04/2002 (pp. 313–322). Bellinghem: SPIE Press.

    Google Scholar 

  3. Akalu, R., & Kundur, D. (2004). Technological protection measures in the courts: law, engineering, and DRM lessons learned from the failure of the content scrambling system. In digital rights: management, protection, standardization. IEEE Signal Processing Magazine, 21(2), 109–117.

    Article  Google Scholar 

  4. Furht, B., Muharemagic, E., & Soced, D. (2005). Multimedia encryption and watermarking. Berlin: Springer.

    Google Scholar 

  5. Hovančák, R., & Levický, D. (2003). Comparison of watermarking methods using DCT transformation. In Radioelektronika 2003: 13th international Czech–Slovak scientific conference. Conference proceedings, Brno, Czech Republic, May 6–7, 2003, (pp. 403–406). Brno: University of Technology. ISBN 80-214-2383-8.

    Google Scholar 

  6. Kundur, D., & Karthik, K. (2004). Video fingerprinting and encryption principles for digital rights management. In enabling security technologies for digital rights management. Proceeding of the IEEE, 92(8), 918–932.

    Article  Google Scholar 

  7. Katzenbeisser, S., & Petitcolas, F. A. (2000). Information hiding techniques for steganography and digital watermarking. Norwood: Artech House.

    Google Scholar 

  8. Liu, Y., & Zhao, J. (2004). Rotation, scaling, translation invariant image watermarking based on radon transform. In First Canadian conference on computer and robot vision, Ottawa, Canada, May 17–19 (pp. 225–232).

    Google Scholar 

  9. Ridzoň, R., & Levický, D. (2007). Robust digital watermarketing based on the log-polar mapping. Radioengineering, 16(4), 76–81. ISSN 1210-2512.

    Google Scholar 

  10. Ridzoň, R., & Levický, D. (2008). Robust digital watermarking in color images. In IWSSIP 2008: proceedings of 15th international conference on systems, signals and image processings, Bratislava, Slovak Republic, 25–28 June, 2008 (pp. 425–428). Bratislava: Slovak University of Technology. ISBN 978-80-227-2856-0.

    Chapter  Google Scholar 

  11. Ruanaidh, J. J. K., & Pun, T. (1997). Rotation, scale and translation invariant digital image watermarking. In Proc. IEEE int. conf. image processing 1997 (ICIP 97), Santa Barbara, CA, Oct. 1997 (Vol. 1, pp. 536–539).

    Google Scholar 

  12. Sencar, H. T., Ramkumar, M., & Akansu, A. N. (2004). Data hiding fundamentals and applications. Content security in digital multimedia. Amsterdam: Elsevier.

    Google Scholar 

  13. Shih, F. Y. (2008). Digital watermarking and steganography. Boca Raton: CRC Press. ISBN 978-1-4200-4757-8.

    Book  Google Scholar 

  14. Voloshynovskiy, S., et al. (2001). Attack modeling: towards a second generation watermarking benchmark. Signal Processing, 81(6), 1177–1214. Special Issue on Information Theoretic Issues in Digital Watermarking.

    Article  Google Scholar 

  15. Zheng, D., Zhao, J., & EL Saddik, A.: (2003). RST invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 753–765. Special Issue on Authentication, Copyright Protection and Information Hiding.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Radovan Ridzoň.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ridzoň, R., Levický, D. Content protection in grayscale and color images based on robust digital watermarking. Telecommun Syst 52, 1617–1631 (2013). https://doi.org/10.1007/s11235-011-9655-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9655-5

Keywords

Navigation