Image Watermarking Based on Pyramid Decomposition with CH Transform

  • R. Kountchev
  • M. Milanova
  • Vl. Todorov
  • R. Kountcheva
Part of the International Series in Operations Research & Management Science book series (ISOR, volume 132)


The new method for digital image watermarking , presented in this chapter, could be used for intellectual property right protection of digital still images of any kind (natural, scanned documents, computer graphics, etc.). The method is suitable for distance learning applications; access control for medical or biometric information in corresponding databases; detection of forgeries and illegal distribution of electronic or scanned documents; data hiding in medical, cartographic, and other images; authorized contents editing; etc.


Watermark Image JPEG Compression Hide Data Difference Matrix Watermark Extraction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work was supported by the National Fund for Scientific Research of the Bulgarian Ministry of Education and Science (Contract VU-I -305/07) and the US-Bulgarian project in the Science of Learning, National Academy of Science, USA.

Special thanks to the Laboratory for Image and Sound Processing of the Technical University of Sofia – Bulgaria, which provided the test images from their own database.


  1. Arnold M, Schmucker M, Wolthusen ST (2003) Techniques and Applications of Digital Watermarking and Content Protection. Artech House.Google Scholar
  2. Barni M, Bartolini F (2004) Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker.Google Scholar
  3. Cox I, Miller M, Bloom J (2002) Digital Watermarking. Morgan-Kaufmann, San Francisco.Google Scholar
  4. Furht B (2006) Multimedia Watermarking Techniques and Applications (Internet and Communications Series). Auerbach.Google Scholar
  5. Falkowski B, Lim L (2000) Image watermarking using Hadamard transforms. Electronic Letters Vol 36 No 3 Feb, pp. 211-213.CrossRefGoogle Scholar
  6. Katzenbeisser S, Petitcolas F (2000) Information Hiding Techniques for Steganography and Digital Watermarking. Artech House.Google Scholar
  7. Kountchev R, Milanova M, Ford C, Rubin S (2003) Multimedia Watermarking with Complex Hadamard Transform in the Inverse Pyramid Decomposition. Proc. of the 2003 IEEE Intern. Conf. on Information Reuse and Integration, USA pp. 305-310.Google Scholar
  8. Kountchev R, Milanova M, Ford C, Kountcheva R (2005) Multi-layer Image Transmission with Inverse Pyramidal Decomposition. In: Computational Intelligence for Modelling and Predictions, S. Halgamuge, L. Wang (Eds.), Vol. 2, Chapter No 13, Springer-Verlag, pp. 179-196.Google Scholar
  9. Kountchev R, Todorov Vl, Kountcheva R, Milanova M (2006) Lossless Compression of Biometric Images and Digital Watermarking with IDP Decomposition. WSEAS Trans. on Signal Processing Vol. 2 pp. 684-691.Google Scholar
  10. Kountchev R, Milanova M, Todorov Vl, Kountcheva R (2007) Multiple audio Watermarking with Spectrum Pyramid. International Journal of Computer Science and Network Security (IJCSNS) pp. 191-200.Google Scholar
  11. Kountchev R, Todorov Vl, Kountcheva R (2007) Compression and Contents Protection of Images, Texts and Graphics for Distance Learning Applications. Proc. of the 6th WSEAS Intern. Conf. on Signal Processing, Robotics and Automation, Greece pp. 83-90.Google Scholar
  12. Mironov R, Kountchev R, Mirchev V (2007) Ordered Complex Hadamard Transform of Images. XLII Intern. Scientific Conf. on Information, Communication and Energy Systems and Technologies (ICEST’07) Macedonia pp. 369-372.Google Scholar
  13. Moulin P, Mihcak M (Sept. 2002) A framework for evaluating the data-hiding capacity of image sources. IEEE Transactions on Image Processing, Vol. 11, Issue 9, pp. 1029-1042.CrossRefGoogle Scholar
  14. O’Ruanaidh J, Dowling W, Boland F (1996) Phase Watermarking of Digital Images. In: Proceedings of Int. Conf. on Image Processing Vol. 3, Sept, pp. 239-242.Google Scholar
  15. Tewfik A (2000) Digital Watermarking. IEEE Signal Processing Magazine Vol. 17, Sept, pp.17-88.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • R. Kountchev
    • 1
  • M. Milanova
    • 2
  • Vl. Todorov
    • 3
  • R. Kountcheva
    • 3
  1. 1.Department of Radio CommunicationsTechnical University of SofiaSofiaBulgaria
  2. 2.Department of Computer ScienceUniversity of Arkansas at Little RockLittle RockUSA
  3. 3.T&K Engineering Co.SofiaBulgaria

Personalised recommendations