Abstract
In this paper, we propose a method of complex region selection for digital images using variance selection. In order to improve the imperceptibility of the watermarked image, our method selects blocks based on their variance. The watermark embedding process operates in the discrete fractional random transform and discrete cosine transform domains. The watermark is embedded into the selected blocks, which are transformed into the frequency domain. For security, visual cryptography is used to encode the watermark. The watermark extraction process is the reverse of the embedding process. The experimental results show that the proposed block selection method significantly improves imperceptibility over a randomly chosen block, and that the watermarking algorithm is robust against common attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kim, J., Kim, N., Lee, D., Park, S., Lee, S.: Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Processing: Image Communication 25, 559–576 (2010)
Li, D., Kim, J.: Secure Image Forensic Marking Algorithm using 2D Barcode and Off-axis Hologram in DWT-DFRNT Domain. Applied Mathematics & Information Sciences (AMIS) 6(2S), 513–520 (2012)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)
Nah, J., Kim, J., Kim, J.: Video Forensic Marking Algorithm Using Peak Position Modulation. Applied Mathematics & Information Sciences (AMIS) 6(6S) (to be published, 2012)
Cox, I., Kilian, J., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proc. ICIP 1996, Lausanne, pp. 243–246 (1996)
Guo, J., Liu, Z., Liu, S.: Watermarking based on discrete fractional random transform. Optical Communications 272(2), 344–348 (2007)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Hawkes, L., Yasinsac, A., Cline, C.: An Application of Visual Cryptography to Financial Documents. Technical Report TR001001, Florida State University (2000)
Hwang, R.: A digital Image Copyright Protection Scheme Based on Visual Cryptography. Tambang Journal of Science and Engineering 3(2), 97–106 (2000)
Zaghloul, R.I., Al-Rawashdeh, E.F.: HSV Image Watermarking Scheme Based on Visual Cryptography. World Academy of Science, Engineering and Technology 44, 482–485 (2008)
Liu, Z., Zhao, H., Liu, S.: A discrete fractional random transform. Optical Communications 255(4-6), 357–365 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jin, X., Kim, J. (2012). Imperceptibility Improvement of Image Watermarking Using Variance Selection. In: Kim, Th., Mohammed, S., Ramos, C., Abawajy, J., Kang, BH., Ślęzak, D. (eds) Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition. ICHCI WSE SIP 2012 2012 2012. Communications in Computer and Information Science, vol 342. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35270-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-35270-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35269-0
Online ISBN: 978-3-642-35270-6
eBook Packages: Computer ScienceComputer Science (R0)