Abstract
Watermarking techniques have been proposed to solve the problem of copyright protection and authentication. Using the idea from [1] in this paper [LVW-PBB], the best block for embedding the watermark is identified, that is based on similarity between DCT coefficients of original image and the watermark image. The embedding method is based on [2] which use the deterministic one-to-one compound mappings of image pixel values. The compound mappings are proved to be reversible, which allows for lossless recovery of original images from watermarked images. Different types of visible watermarks, including opaque monochrome and translucent color ones, are embedded by using the proposed approach. For Security protection, parameter and mapping randomizations have also been proposed. In case of various attacks such as JPEG compression, filtering, cropping, and additive Noise, the quality of cover image is acceptable even after the watermark extraction. Thus the proposed method is robust.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Rahmani, R., Mortezaei, R., Moghaddam, M.E.: A New Lossless Watermarking Scheme Based on DCT Coefficients. Electrical and Computer Engineering Department. Shahid Beheshti University,G.C Tehran, Iran
Liu, T.-Y., Tsai, W.-H.: Generic Lossless Visible Watermarking—A New Approach. IEEE Transactions on Image Processing 19(5) (May 2010)
Martin, V., Chabert, M., Lacaze, B.: An interpolation-based watermarking scheme. Signal Processing 88(3), 539–557 (2008)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3), 313–336 (1996)
Saxena, V., Gupta, J.P.: A Novel Watermarking Scheme for JPEG Images. WSEAS Transactions on Signal Processing 5(2), 74–84 (2009)
Kang, X., Zeng, W., Huang, J.: A Multi-band Wavelet Watermarking Scheme. International Journal of Network Security 6(2), 121–126 (2008)
Wang, X.Y., Hou, L.M., Wu, J.: A feature-based robust digital image watermarking against geometric attacks. Image and Vision Computing 26(7), 980–989 (2008)
Lee, Z., Lin, S.W., Su, S.F., Lin, C.Y.: A hybrid watermarking technique applied to digital images. Applied Soft Computing 8, 798–808 (2008)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transaction 12(6), 1673–1687 (1997)
Lu, C.S., Liao, H.Y.M., Huang, S.K., Sze, C.: Cocktail watermarking on images. In: Proceedings of the 3rd International Workshop on Information Hiding, pp. 333–347 (1999)
Hsu, C.T., Wu, J.L.: Hidden Signature in Images. IEEE Transaction on Image Processing 8(I), 58–68 (1999)
Wu, H.J., Shi, Y.Q., Dong, C.W.: Image Watermarking in DCT: an Embedding Strategy and algorithm. Acta Electronica Sinica 28(4), 57–60 (2000)
Hsu, C.T., Wu, J.L.: Hidden Digital Watermarks in Images. IEEE Transactions on Image Processing 8(I), 58–68 (1999)
Cheng, Y.J., Tsai, W.H.: A new method for copyright and integrity protection for bitmap images by removable visible watermarks and irremovable invisible watermarks. Presented at the Int. Computer Symp.—Workshop on Cryptology and Information Security, Hualien, Taiwan, R.O.C (December 2002)
Huang, P.M., Tsai, W.H.: Copyright protection and authentication of grayscale images by removable visible watermarking and invisible signal embedding techniques: A new approach. Presented at the Conf. Computer Vision, Graphics and Image Processing, Kinmen, Taiwan, R.O.C (August 2003)
Hu, Y., Jeon, B.: Reversible visible watermarking and lossless recovery of original images. IEEE Trans. Circuits Syst. Video Technol. 16(11), 1423–1429 (2006)
Awrangjeb, M., Kankanhalli, M.S.: Reversible watermarking using a perceptual model. J. Electron. Imag. 14(013014) (March 2005)
Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)
Mohanty, S.P., Ramakrishnan, K.R., Kankanhalli, M.S.: A DCT domain visible watermarking technique for images. In: Proc. IEEE Int. Conf. Multimedia and Expo., vol. 2, pp. 1029–1032 (July 2000)
Tsai, H.M., Chang, L.W.: A high secure reversible visible watermarking scheme. In: Proc. IEEE Int. Conf. Multimedia and Expo., Beijing, China, pp. 2106–2109 (July 2007)
Yip, S.K., Au, O.C., Ho, C.W., Wong, H.M.: Lossless visible watermarking. In: Proc. IEEE Int. Conf. Multimedia and Expo., pp. 853–856 (July 2006)
de Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97–105 (2003)
Li, X., Orchard, M.T.: Edge-directed prediction for lossless compression of natural simages. IEEE Trans. Image Process 10(6), 813–817 (2001)
Hu, Y., Kwong, S., Huang, J.: An algorithm for removable visible watermarking. IEEE Trans. Circuits Syst. Video Technol. 16(1), 129–133 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sinduja, R., Rachel Rupala, I., Sathiya, R.D. (2012). A Novice Approach for Lossless Visible Watermarking Approach by Pioneering the Best Block (LVW-PBB). In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-29216-3_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29215-6
Online ISBN: 978-3-642-29216-3
eBook Packages: Computer ScienceComputer Science (R0)