All Title Author
Keywords Abstract

Publish in OALib Journal
ISSN: 2333-9721
APC: Only $99

ViewsDownloads

Relative Articles

More...

An Improvement Technique Based on Structural Similarity Thresholding for Digital Watermarking

DOI: 10.1155/2014/580697

Full-Text   Cite this paper   Add to My Lib

Abstract:

Digital watermarking is extensively used in ownership authentication and copyright protection. In this paper, we propose an efficient thresholding scheme to improve the watermark embedding procedure in an image. For the proposed algorithm, watermark casting is performed separately in each block of an image, and embedding in each block continues until a certain structural similarity threshold is reached. Numerical evaluations demonstrate that our scheme improves the imperceptibility of the watermark when the capacity remains fixed, and at the same time, robustness against attacks is assured. The proposed method is applicable to most image watermarking algorithms. We verify this issue on watermarking schemes in discrete cosine transform (DCT), wavelet, and spatial domain. 1. Introduction The rapid growth of the Internet and multimedia technologies has revealed the need for the copyright protection and the proof of the ownership of digital documents [1]. In particular, with images widely available on the Internet, digital watermarking is a common way of identifying images and protecting them from unauthorized usage in online advertisements. In this regard, the most important characteristic of watermark casting is its imperceptibility, where a certain degree of the statistical invisibility of the embedded watermark is required. In addition, in most watermarking techniques, it is desirable to embed messages with appropriate length so that the accurate extraction is assured, and at the same time, the embedded watermark should be perceptually invisible and robust to common signal processing and intentional attacks. Thus, there exists a trade-off between the imperceptibility, capacity, and robustness of the watermarking methods [2]. Broadly, watermarking techniques are divided into two categories: (i) spatial domain watermarking and (ii) transform domain watermarking. Spatial domain watermarking approaches, where the mark is directly embedded into each pixel of the host image, benefit from the advantages of a low degree of complexity and delay [3–5]. In addition, the temporal/spatial localization of the watermark in the spatial domain watermarking schemes is automatically achieved. This permits a better characterization of the distortion introduced by the watermark and reduces the annoying effects. In transform domain watermarking techniques, however, the watermark is inserted into the coefficients of a digital transform of the host asset [6, 7], for instance, Barni’s work [6] on watermarking using the discrete cosine transform (DCT) and the discrete Fourier

References

[1]  I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann, Boston, Mass, USA, 2nd edition, 2008.
[2]  X. Gong and H.-M. Lu, “Towards fast and robust watermarking scheme for H.264 video,” in Proceedings of the 10th IEEE International Symposium on Multimedia (ISM '08), pp. 649–653, Berkeley, Calif, USA, December 2008.
[3]  S. S. Bedi and S. Verma, “A design of secure watermarking scheme for images in spatial domain,” in Proceedings of the Annual India Conference (INDICON '06), pp. 1–6, New Delhi, India, September 2006.
[4]  H. H. Larijani and G. R. Rad, “A new spatial domain algorithm for gray scale images watermarking,” in Proceedings of the International Conference on Computer and Communication Engineering (ICCCE '08), pp. 157–161, May 2008.
[5]  V. Licks, F. Ourique, R. Jordan, and F. Perez-Gonzalez, “The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking,” in Proceedings of the International Conference on Image Porcessing (ICIP '03), pp. 455–458, September 2003.
[6]  M. Barni, F. Bartolini, A. De Rosa, and A. Piva, “Capacity of the watermarking channel: how many bits can be hidden within a digital image,” in Security and Watermarking of Multimedia Contents, vol. 3654 of Procedeeings of SPIE, pp. 437–448, January 1999.
[7]  A. Banitalebi, S. Nader-Esfahani, and A. N. Avanaki, “Robust LSB watermarking optimized for local structural similarity,” in Proceedings of the 19th Iranian Conference on Electrical Engineering (ICEE '11), May 2011.
[8]  Y. Yusof and O. O. Khalifa, “Imperceptibility and robustness analysis of DWT-based digital image watermarking,” in Proceedings of the International Conference on Computer and Communication Engineering (ICCCE '08), pp. 1325–1330, Kuala Lumpur, Malaysia, May 2008.
[9]  G. P. Betancourth, A. Haggag, M. Ghoneim, T. Yahagi, and L. Jianming, “Robust watermarking in the DCT domain using dual detection,” in Proceedings of the International Symposium on Industrial Electronics (ISIE '06), pp. 579–584, Montreal, Canada, July 2006.
[10]  M. Jayalakshmi, S. N. Merchant, and U. B. Desai, “Significant pixel watermarking in contourlet domain,” in Proceedings of the IET International Conference on Visual Information Engineering (VIE '06), pp. 416–421, September 2006.
[11]  Z. Wang and A. C. Bovik, “Mean squared error: love it or leave it? A new look at signal fidelity measures,” IEEE Signal Processing Magazine, vol. 26, no. 1, pp. 98–117, 2009.
[12]  A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “DCT-based watermark recovering without resorting to the uncorrupted original image,” in Proceedings of the International Conference on Image Processing (ICIP '97), pp. 520–523, October 1997.
[13]  R. Dugad, K. Ratakonda, and N. Ahuja, “A new wavelet-based scheme for watermarking images,” in Proceedings of the International Conference on Image Processing (ICIP '98), vol. 2, pp. 419–423, Chicago, Ill, USA, October 1998.
[14]  S. P. Maity and M. K. Kundu, “A blind CDMA image watermarking scheme in wavelet domain,” in Proceedings of the International Conference on Image Processing (ICIP '04), pp. 2633–2636, October 2004.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413