Skip to main content

Watermarking Digital Images in the Frequency Domain: Performance and Attack Issues

  • Conference paper
  • First Online:
  • 549 Accesses

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 189))

Abstract

In this work we propose an efficient model for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number \(w\) which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we propose a watermarking algorithm that embeds marks on them using the 2D representation of \(w\) in the frequency domain. In particular, we propose a watermarking technique that uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression, Gaussian noise addition, and geometric transformations. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Garfinkel, S.: Web Security, Privacy and Commerce, 2nd edn. O’Reilly, Sebastopol (2001)

    Google Scholar 

  2. Chun-Shien, L., Shih-Kun, H., Chwen-Jye, S., Hong-Yuan, M.L.: Cocktail watermarking for digital image protection. IEEE Trans. Multimedia 4, 209–224 (2000)

    Google Scholar 

  3. Davis, J.C.: Intellectual property in cyberspace - what technological/legislative tools are necessary for building a sturdy global information infrastructure? In: IEEE Proceedings of the International Symposium on Technology and Society, pp. 66–74 (1997)

    Google Scholar 

  4. O’Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking digital images for copyright protection. In: IEEE Proceedings of the Vision, Image and Signal Processing, vol. 143, pp. 250–256 (1996)

    Google Scholar 

  5. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2008)

    Google Scholar 

  6. Grover, D.: The Protection of Computer Software - Its Technology and Applications. Cambridge University Press, New York (1997)

    Google Scholar 

  7. Collberg, C., Nagra, J.: Surreptitious Software. Addison-Wesley, Upper Saddle River (2010)

    Google Scholar 

  8. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 317–333. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  9. Gonzalez, R.C., Woods, R.E., Eddins, S.L.: Digital Image Processing using Matlab. Prentice-Hall, Upper Saddle River (2003)

    Google Scholar 

  10. Sedgewick, R., Flajolet, P.: An Introduction to the Analysis of Algorithms. Addison-Wesley, Reading (1996)

    MATH  Google Scholar 

  11. Golumbic, M.C.: Design Patterns: Algorithmic Graph Theory and Perfect Graphs. Academic Press Inc., New York (1980)

    Google Scholar 

  12. Chroni, M., Nikolopoulos, S.D.: Encoding watermark integers as self-inverting permutations. In: International Conference on Computer Systems and Technologies (CompSysTech’10), ACM ICPS 471, pp. 125–130 (2010)

    Google Scholar 

  13. Chroni, M., Nikolopoulos, S.D.: An efficient graph codec system for software watermarking. In: IEEE Proceedings of the 36th International Conference on Computers, Software, and Applications (STPSA’12), pp. 595–600 (2012)

    Google Scholar 

  14. Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Prentice-Hall, Upper Saddle River (2007)

    Google Scholar 

  15. Solachidis, V., Pitas, I.: Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans. Image Process. 10, 1741–1753 (2001)

    Article  MATH  Google Scholar 

  16. Licks, V., Hordan, R.: On digital image watermarking robust to geometric transformations. In: IEEE Proceedings of the International Conference on Image Processing, vol. 3, pp. 690–693 (2000)

    Google Scholar 

  17. Petitcolas, P.: Image database for watermarking. http://www.petitcolas.net/fabien/watermarking/

  18. Wang, Z., Bovic, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)

    Article  Google Scholar 

  19. Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: Proceedings of the 20th International Conference on Pattern Recognition, pp. 2366–2369 (2010)

    Google Scholar 

  20. Kaur, M., Jindal, S., Behal, S.: A study of digital image watermarking. J. Res. Eng. Appl. Sci. 2, 126–136 (2012)

    Google Scholar 

  21. Zain, J.M.: Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. Eur. J. Sci. Res. 2, 250–256 (2011)

    Google Scholar 

  22. Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd edn. Prentice-Hall, Upper Saddle River (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maria Chroni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chroni, M., Fylakis, A., Nikolopoulos, S.D. (2014). Watermarking Digital Images in the Frequency Domain: Performance and Attack Issues. In: Krempels, KH., Stocker, A. (eds) Web Information Systems and Technologies. WEBIST 2013. Lecture Notes in Business Information Processing, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44300-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44300-2_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44299-9

  • Online ISBN: 978-3-662-44300-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics