Novel Approach in Watermarking of Digital Image

  • Chan Choong Wah
Conference paper

Abstract

Watermarking techniques, also referred to as digital signature, sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. In this paper, we present an approach to digital image watermark based on multiresolution wavelet decomposition. The watermarking technique consists of fusing the level-1 watermark coefficients with the host level-4 image coefficients. Three simple fusion algorithms are examined. We discuss the extraction of the watermark and access the retrieved watermark as compared to the original watermark. Simulation results demonstrate the ease of insertion of watermark without image degradation.

Keywords

Pyramid Acoustics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. (1).
    Nasir Memon and Ping Wah Wong, “Protecting Digital Media Contents,” Communication of ACM, July 1998, Vol. 41, No 7., pp. 35–43.CrossRefGoogle Scholar
  2. (2).
    I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. on Image Processing, 6,12, pp. 1673–1687, 1997.CrossRefGoogle Scholar
  3. (3).
    I. J. Cox and J-P Linnartz, “Public watermarks and resistance to tampering,” Proc. IEEE Int. Conf. on Image Processing, 1997.Google Scholar
  4. (4).
    I. J. Cox and J-P Linnartz, “Some general methods for tampering with watermarks,” IEEE Journal Selected Areas of Communications (JSAC).Google Scholar
  5. (5).
    I. J. Cox and M. L. Miller, “A review of watermarking and the importance of perceptual modeling,” Proc. SPIE Conf. on Human Vision and Electronic Imaging II, Vol 3016, 92–99, February 1987.CrossRefGoogle Scholar
  6. (6).
    I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure Spread Spectrum Watermarking for Images, Audio and Video,” Proc. of 1996 Int’l. Conf. on Image Processing (ICIP′96), Vol. III, pp. 243–246, 1996.Google Scholar
  7. (7).
    I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, “A Secure, Robust Watermark for Multimedia,” Workshop on Information Hiding, Newton Institute, Univ. of Cambridge, May 1996.Google Scholar
  8. (8).
    Jean-Paul M. G. Linnartz, A. A. C. Kalker, G. F. G. Depovere and R. A. Beuker, “A Reliability model for detection of electronic watermarks in digital images”.Google Scholar
  9. (9).
    Jean-Paul M. G. Linnartz and Marten van Dijk, “Analysis of the Sensitivity Attack against Electronic Watermarks in Images”.Google Scholar
  10. (10).
    Ching-Yung Lin and Shih-Fu Chan, “A Water-Based Robust Image Authentication Method Using Wavelets”.Google Scholar
  11. (11).
    I. Pitas, “A method for signature casting on digital images,” Proc. IEEE Int. Conf. on Image Processing, Vol. 3, pp. 215–218, 1996.CrossRefGoogle Scholar
  12. (12).
    R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” Proc. IEEE Int Conf. on Image Processing, Vol. 3, p 219–222, 1996.CrossRefGoogle Scholar
  13. (13).
    G. Vayatzi, N. Nikolaidis and I. Pitas, “Digital Watermarking: An Overview”.Google Scholar
  14. (14).
    M. D. Swanson, B. Zhu, and A. H. Tewfik, “Transparent robust image marking,” Proc. IEEE Int. Conf. on Image Processing, Vol 3, pp. 211–214, 1996.CrossRefGoogle Scholar
  15. (15).
    D. Kundur and D. Hatzinakos, “Towards a Telltale Watermarking Technique for Tamper-Proofing,” Proc. IEEE Int. Conf. on Image Processing, Chicago, Illinois, October 1998.Google Scholar
  16. (16).
    D. Kundur and D. Hatzinakos, “Digital Watermarking using Multiresolution Wavelet Decomposition,” Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Seattle, Washington, Vol. 5, pp. 2969–2972, May 1998.Google Scholar
  17. (17).
    D. Kundur and D. Hatzinakos, “A Robust Digital Image Watermarking Scheme using Wavelet-Based Fusion,” Proc. IEEE Int. Conf. on Image Processing, Santa Barbara, California, Vol. 1, pp. 544–547, October 1997.CrossRefGoogle Scholar
  18. (18).
    Houngjyh Mike Wang, “A fast wavelet based watermark embedding and blind detecting algorithm,”@http://biron.usc.edu/~houngjyh/.Google Scholar
  19. (19).
    Mucahit K. Uner, Liane C. Ramac and Pramod K. Varshney, “Concealed Weapon Detection: An image fusion approach,” SPIE Vol. 2942, pp. 123-132.Google Scholar
  20. (20).
    G. Voyatzis and I. Pitas, “Applications of Toral automorphisms in image watermarking”, Proceedings of ICIP′96, vol II, pp. 237–240, 1996.Google Scholar
  21. (21).
    G. Voyatzis and I. Pitas, “Embedding Robust Logo Watermarks in Digital Images”, Proceedings of DSP′97, vol 1, pp. 213–216, 1997.Google Scholar
  22. (22).
    N. Nikolaidis and I.Pitas “Robust image watermarking in the spatial domain”, Signal Proc. special issue on Copyright Protection and Access control, 1998.Google Scholar
  23. (23).
    A. Piva, M. Barni, F. Bartolini, V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original image”, Proceedings of ICIP′97, Santa Barbara, CA, USA, October 26-29, 1997, Vol I, pp. 520–523.Google Scholar
  24. (24).
    Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik, “Transparent Robust Image Watermarking,” Proc. of the 1996 IEEE Int. Conf. on Image Processing, Vol. III, pp. 211–214, 1996.Google Scholar
  25. (25).
    J. O’Ruanaidh, W. Dowling, F. Boland, “Watermarking digital images for copyright protection”, IEE Proceedings on Vision, Image and Signal Processing, 143(4), pp. 250–256, August 1996.CrossRefGoogle Scholar
  26. (26).
    X.-G. Xia, C. G. Boncelet, and G. R. Arce, “A Multiresolution Watermark for Digital Images” Proceedings of ICIP′97, Santa Barbara, CA, USA, October 26–29, 1997, Vol I, pp. 548–551.Google Scholar
  27. (27).
    J. O’Ruanaidh, W. Dowling, F. Boland, “Phase watermarking of digital images”, Proc. 1996 IEEE Int. Conference on Image Processing (ICIP 96), vol III, pp 239-242.Google Scholar
  28. (28).
    J. O’Ruanaidh, T. Pun, “Rotation, Scale and Translation Invariant Digital Image Watermarking”, Proceedings of ICIP′97, Santa Barbara, CA, USA, October 26–29, 1997, Vol I, pp. 536–539.Google Scholar
  29. (29).
    Chan Choong Wah, “Watermarking Technique for Protection of Digital Images and Extend to Information Hiding,” 9th MINDEF-NTU Joint R&D Seminar, NTU, Singapore, 18 January 1999, pp. 130-135.Google Scholar

Copyright information

© Springer-Verlag London 2000

Authors and Affiliations

  • Chan Choong Wah
    • 1
  1. 1.School of Electrical & Electronic EngineeringNanyang Technological UniversitySingaporeSingapore

Personalised recommendations