Digital Watermarking Method Based on Image Compression Algorithms

  • Sergey Bezzateev
  • Natalia Voloshina
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10531)


Digital watermarking is an efficient method for digital access rights management utilized in the scope of multimedia data. A possibility to combine the procedure of compression and watermarking in effective way for digital images is proposed in this manuscript. This research is focused on the compression methods considering the significance of the initial multimedia object (for example image) different elements to increase the quality of process (compressed) image. One of the most effective approaches for this task is to utilize Error Correcting Codes (ECC) allowing to maintain the number of resulting errors (distortion) as well as the value of resulting compression ratio. The application of such codes enables to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach based on Weighted Hamming Metric guarantying the limitation of maximum errors (distortions) with predefined significance is represented as an example.


Digital watermarking DWM Image compression MLSB ECC perfect in weighted Hamming metric 



This work was partly financially supported by Russian Foundation for Basic Research in 2017 (grant 17-07-00849-A).


  1. 1.
    Yahya, A.N., Jalab, H.A., Wahid, A., Noor, R.M.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ.-Comput. Inf. Sci. 27(4), 393–401 (2015)Google Scholar
  2. 2.
    Ometov, A., Orsino, A., Militano, L., Moltchanov, D., Araniti, G., Olshannikova, E., Fodor, G., Andreev, S., Olsson, T., Iera, A., Torsner, J., Koucheryavy, Y., Mikkonen, T.: Toward trusted, social-aware D2D connectivity: bridging across the technology and sociality realms. IEEE Wirel. Commun. 23(4), 103–111 (2016)CrossRefGoogle Scholar
  3. 3.
    Mosterman, P.J., Zander, J.: Industry 4.0 as a cyber-physical system study. Softw. Syst. Model. 15(1), 17–29 (2016)CrossRefGoogle Scholar
  4. 4.
    Yan, X., Zhang, L., Wu, Y., Luo, Y., Zhang, X.: Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks. Enterp. Inf. Syst. 11(2), 223–249 (2017)CrossRefGoogle Scholar
  5. 5.
    Orsino, A., Ometov, A.: Validating information security framework for offloading from LTE onto D2D links. In: Proceedings of the 18th Conference of Open Innovations Association FRUCT, pp. 241–247 (2016)Google Scholar
  6. 6.
    Chandrakar, N., Bagga, J., et al.: Performance comparison of digital image watermarking techniques: a survey. Int. J. Comput. Appl. Technol. Res. 2(2), 126–130 (2013)Google Scholar
  7. 7.
    Ometov, A., Masek, P., Malina, L., Florea, R., Hosek, J., Andreev, S., Hajny, J., Niutanen, J., Koucheryavy, Y.: Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices. In: Proceedings of International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1–6. IEEE (2016)Google Scholar
  8. 8.
    Andalibi, M., Chandler, D.M.: Digital image watermarking via adaptive logo texturization. IEEE Trans. Image Process. 24(12), 5060–5073 (2015)CrossRefGoogle Scholar
  9. 9.
    Bajracharya, S., Koju, R.: An improved DWT-SVD based robust digital image watermarking for color image. Int. J. Eng. Manuf. (IJEM) 7(1), 49 (2017)Google Scholar
  10. 10.
    Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060–3063 (2010)CrossRefGoogle Scholar
  11. 11.
    Belogolovyi, A.: Image compression based on LDPC codes. In: Proceedings of International Conference GraphiCon (2004)Google Scholar
  12. 12.
    Guyeux, C., Bahi, J.M.: Topological chaos and chaotic iterations application to hash functions. In: Proceedings of the 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1–7. IEEE (2010)Google Scholar
  13. 13.
    Bezzateev, S., Shekhunova, N.: Class of generalized Goppa codes perfect in weighted Hamming metric. Des. Codes Crypt. 66(1–3), 391–399 (2013)MathSciNetCrossRefMATHGoogle Scholar
  14. 14.
    Bezzateev, S., Voloshina, N., Zhidanov, K.: Steganographic method on weighted container. In: Proceedings of XIII International Symposium on Problems of Redundancy in Information and Control Systems (RED), pp. 10–12. IEEE (2012)Google Scholar
  15. 15.
    Dariti, R., Souidi, E.M.: An application of linear error-block codes in steganography. Int. J. Digit. Inf. Wirel. Commun. (IJDIWC) 1(2), 426–433 (2011)Google Scholar
  16. 16.
    Bezzateev, S., Voloshina, N., Minchenkov, V.: Special class of (L, G) codes for watermark protection in DRM. In: Proceedings of Eighth International Conference on Computer Science and Information Technologies, pp. 225–228 (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Saint-Petersburg University of Aerospace InstrumentationSt. PetersburgRussia
  2. 2.ITMO UniversitySt. PetersburgRussia

Personalised recommendations