Skip to main content

Abstract

In this paper, we propose a method of complex region selection for digital images using variance selection. In order to improve the imperceptibility of the watermarked image, our method selects blocks based on their variance. The watermark embedding process operates in the discrete fractional random transform and discrete cosine transform domains. The watermark is embedded into the selected blocks, which are transformed into the frequency domain. For security, visual cryptography is used to encode the watermark. The watermark extraction process is the reverse of the embedding process. The experimental results show that the proposed block selection method significantly improves imperceptibility over a randomly chosen block, and that the watermarking algorithm is robust against common attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, J., Kim, N., Lee, D., Park, S., Lee, S.: Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Processing: Image Communication 25, 559–576 (2010)

    Article  Google Scholar 

  2. Li, D., Kim, J.: Secure Image Forensic Marking Algorithm using 2D Barcode and Off-axis Hologram in DWT-DFRNT Domain. Applied Mathematics & Information Sciences (AMIS) 6(2S), 513–520 (2012)

    Google Scholar 

  3. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  4. Nah, J., Kim, J., Kim, J.: Video Forensic Marking Algorithm Using Peak Position Modulation. Applied Mathematics & Information Sciences (AMIS) 6(6S) (to be published, 2012)

    Google Scholar 

  5. Cox, I., Kilian, J., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proc. ICIP 1996, Lausanne, pp. 243–246 (1996)

    Google Scholar 

  6. Guo, J., Liu, Z., Liu, S.: Watermarking based on discrete fractional random transform. Optical Communications 272(2), 344–348 (2007)

    Article  Google Scholar 

  7. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  8. Hawkes, L., Yasinsac, A., Cline, C.: An Application of Visual Cryptography to Financial Documents. Technical Report TR001001, Florida State University (2000)

    Google Scholar 

  9. Hwang, R.: A digital Image Copyright Protection Scheme Based on Visual Cryptography. Tambang Journal of Science and Engineering 3(2), 97–106 (2000)

    Google Scholar 

  10. Zaghloul, R.I., Al-Rawashdeh, E.F.: HSV Image Watermarking Scheme Based on Visual Cryptography. World Academy of Science, Engineering and Technology 44, 482–485 (2008)

    Google Scholar 

  11. Liu, Z., Zhao, H., Liu, S.: A discrete fractional random transform. Optical Communications 255(4-6), 357–365 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin, X., Kim, J. (2012). Imperceptibility Improvement of Image Watermarking Using Variance Selection. In: Kim, Th., Mohammed, S., Ramos, C., Abawajy, J., Kang, BH., Ślęzak, D. (eds) Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition. ICHCI WSE SIP 2012 2012 2012. Communications in Computer and Information Science, vol 342. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35270-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35270-6_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35269-0

  • Online ISBN: 978-3-642-35270-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics