Abstract
In this work we propose an efficient model for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number \(w\) which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we propose a watermarking algorithm that embeds marks on them using the 2D representation of \(w\) in the frequency domain. In particular, we propose a watermarking technique that uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression, Gaussian noise addition, and geometric transformations. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Garfinkel, S.: Web Security, Privacy and Commerce, 2nd edn. O’Reilly, Sebastopol (2001)
Chun-Shien, L., Shih-Kun, H., Chwen-Jye, S., Hong-Yuan, M.L.: Cocktail watermarking for digital image protection. IEEE Trans. Multimedia 4, 209–224 (2000)
Davis, J.C.: Intellectual property in cyberspace - what technological/legislative tools are necessary for building a sturdy global information infrastructure? In: IEEE Proceedings of the International Symposium on Technology and Society, pp. 66–74 (1997)
O’Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking digital images for copyright protection. In: IEEE Proceedings of the Vision, Image and Signal Processing, vol. 143, pp. 250–256 (1996)
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2008)
Grover, D.: The Protection of Computer Software - Its Technology and Applications. Cambridge University Press, New York (1997)
Collberg, C., Nagra, J.: Surreptitious Software. Addison-Wesley, Upper Saddle River (2010)
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)
Gonzalez, R.C., Woods, R.E., Eddins, S.L.: Digital Image Processing using Matlab. Prentice-Hall, Upper Saddle River (2003)
Sedgewick, R., Flajolet, P.: An Introduction to the Analysis of Algorithms. Addison-Wesley, Reading (1996)
Golumbic, M.C.: Design Patterns: Algorithmic Graph Theory and Perfect Graphs. Academic Press Inc., New York (1980)
Chroni, M., Nikolopoulos, S.D.: Encoding watermark integers as self-inverting permutations. In: International Conference on Computer Systems and Technologies (CompSysTech’10), ACM ICPS 471, pp. 125–130 (2010)
Chroni, M., Nikolopoulos, S.D.: An efficient graph codec system for software watermarking. In: IEEE Proceedings of the 36th International Conference on Computers, Software, and Applications (STPSA’12), pp. 595–600 (2012)
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Prentice-Hall, Upper Saddle River (2007)
Solachidis, V., Pitas, I.: Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans. Image Process. 10, 1741–1753 (2001)
Licks, V., Hordan, R.: On digital image watermarking robust to geometric transformations. In: IEEE Proceedings of the International Conference on Image Processing, vol. 3, pp. 690–693 (2000)
Petitcolas, P.: Image database for watermarking. http://www.petitcolas.net/fabien/watermarking/
Wang, Z., Bovic, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)
Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: Proceedings of the 20th International Conference on Pattern Recognition, pp. 2366–2369 (2010)
Kaur, M., Jindal, S., Behal, S.: A study of digital image watermarking. J. Res. Eng. Appl. Sci. 2, 126–136 (2012)
Zain, J.M.: Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. Eur. J. Sci. Res. 2, 250–256 (2011)
Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd edn. Prentice-Hall, Upper Saddle River (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chroni, M., Fylakis, A., Nikolopoulos, S.D. (2014). Watermarking Digital Images in the Frequency Domain: Performance and Attack Issues. In: Krempels, KH., Stocker, A. (eds) Web Information Systems and Technologies. WEBIST 2013. Lecture Notes in Business Information Processing, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44300-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-662-44300-2_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44299-9
Online ISBN: 978-3-662-44300-2
eBook Packages: Computer ScienceComputer Science (R0)