Skip to main content

Information Hiding by Digital Watermarking

  • Chapter
Information Hiding and Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 227))

Summary

Digital information and data are transmitted more often over the Internet now than ever. Free-access digital multimedia communication unfortunately provides virtually unprecedented opportunities to pirate copyrighted material. Therefore, the idea of using a digital watermark to detect and trace copyright violations has stimulated significant interests among engineers, scientists, lawyers, artists and publishers. In this chapter, we present robust high-capacity digital watermarking techniques based on genetic algorithm (GA) and chaotic map. A GA-based technique is presented to correct the rounding errors. The fundamental is to adopt a fitness function for choosing the best chromosome which determines the conversion rule of real numbers into integers during the cosine transformation. We develop a block-based chaotic map, which outperforms the traditional one by breaking local spatial similarity, to increase the amount of significant coefficients in the transformed image. We demonstrate the superiority of the proposed scheme in terms of better embedding capacity and lower message error rate. Furthermore, we show the proposed algorithm works well under some image-processing distortions, such as the JPEG compression, Gaussian noise, and low-pass filter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berghel, H., O’Gorman, L.: Protecting ownership rights through digital watermarking. IEEE Computer Mag. 29, 101–103 (1996)

    Google Scholar 

  2. Bruyndonckx, O., Quisquater, J.-J., Macq, B.: Spatial method for copyright labeling of digital images. In: Proc. IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, pp. 456–459 (1995)

    Google Scholar 

  3. Celik, M.U., et al.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Processing 11, 585–595 (2002)

    Article  Google Scholar 

  4. Cox, I.J., et al.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  5. Eggers, J., Girod, B.: Informed Watermarking. Kluwer Academic Publishers, Dordrecht (2002)

    Google Scholar 

  6. Huang, J., Shi, Y.Q., Shi, Y.: Embedding image watermarks in DC components. IEEE Trans. Circuits and Systems for Video Technology 10, 974–979 (2000)

    Article  Google Scholar 

  7. Lin, S.D., Chen, C.-F.: A robust DCT-based watermarking for copyright protection. IEEE Trans. Consumer Electronics 46, 415–421 (2000)

    Article  Google Scholar 

  8. Miller, M.L., Doerr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Processing 13, 792–807 (2004)

    Article  Google Scholar 

  9. Mukherjee, D.P., Maitra, S., Acton, S.T.: Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans. Multimedia 6, 1–15 (2004)

    Article  Google Scholar 

  10. Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Processing 66, 385–403 (1999)

    Article  Google Scholar 

  11. Shih, F.Y., Wu, Y.T.: Combinational image watermarking in the spatial and frequency domains. Pattern Recognition 36, 969–975 (2003)

    Article  Google Scholar 

  12. Shih, F.Y., Wu, Y.T.: Enhancement of image watermark retrieval based on genetic algorithm. Journal of Visual Communication and Image Representation 16, 115–133 (2005)

    Article  Google Scholar 

  13. Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proc. IEEE Int’l Conf. on Image Processing, Lausanne, Switzerland, vol. 2, pp. 237–240 (1996)

    Google Scholar 

  14. Wang, H., Chen, H., Ke, D.: Watermark hiding technique based on chaotic map. In: Proc. IEEE Int’l Conf. on Neural Networks and Signal Processing, Nanjing, China, pp. 1505–1508 (2003)

    Google Scholar 

  15. Wong, P.W.: A public key watermark for image verification and authentication. In: Proc. IEEE Int’l Conf. Image Processing, Chicago, IL, pp. 455–459 (1998)

    Google Scholar 

  16. Wu, Y.T., Shih, F.Y.: An adjusted-purpose digital watermarking technique. Pattern Recognition 37, 2349–2359 (2004)

    Article  Google Scholar 

  17. Wu, Y.T.: Multimedia Security, Morphological Processing, and Applications, Ph.D. Dissertation, New Jersey Institute Technology, Newark, NJ (2005)

    Google Scholar 

  18. Wu, Y.T., Shih, F.Y.: Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans. Systems, Man, and Cybernetics – Part B, 36, 24–31 (2006)

    Google Scholar 

  19. Zhao, D., Chen, G., Liu, W.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons and Fractals 22, 47–54 (2004)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Shih, F.Y., Wu, YT. (2009). Information Hiding by Digital Watermarking. In: Pan, JS., Huang, HC., Jain, L.C. (eds) Information Hiding and Applications. Studies in Computational Intelligence, vol 227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02335-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02335-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02334-7

  • Online ISBN: 978-3-642-02335-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics