Advertisement

Wavelet-Based Blind Watermarking Technique for Real-Time Watermark Interpretation

  • Kil-Sang Yoo
  • Won-Hyung Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2668)

Abstract

The Digital watermarking algorithm is embedding watermark into digital content without degradation of original image. The watermark should be robust against attacks to the copyrighted content. Also, extracted watermark can be able to identify the image ownership without ambiguity. In real-time watermarking system, watermark extract algorithm must be distinguishing the imitations from the originals on the instant. In this paper, the proposed watermarking algorithm shows unambiguity and security using pseudo-random linear congruention generators and binary code to decimal with student ID number. The experimental results show that the proposed algorithm successfully survives several kinds of image processing operations including JPEG lossy compression.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chiou-Ting Hsu, Ja-Ling Wu: Hidden digital watermarks in images, Image Processing, IEEE Transactions on, Vol. 8, Issue: 1, Jan. (1999) 58–68CrossRefGoogle Scholar
  2. 2.
    Siegmund Brandt: Data Analysis: Third edition, statistical and computational methods for scientists and engineers, Springer-Verlag, (1999) 49–53Google Scholar
  3. 3.
    Ming-Shing Hsieh, Din-Chang Tseng, Yong-Huai Huang: Hiding Digital Watermarks Using Multiresolution Wavelet Transform, IEEE Transactions on Industrial electronis, Vol 8,No 5, October(2001) 875–882CrossRefGoogle Scholar
  4. 4.
    S.K. Park and K.W. Miller: Random Number Generators: Good Ones Are Hard To Find, Communications of the ACM, October (1988) 1192–1201Google Scholar
  5. 5.
    Cox, I.J.; Kilian, J. Leighton, F.T., Shamoon,: Secure spread spectrum watermarking for multimedia Image Processing, IEEE Transactions on, Vol. 6 Issue. 12, Dec. (1997) 1673–1687Google Scholar
  6. 6.
    F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn.: Attacks on copyright marking systems, information hiding: 2nd int’l workshop, vol. 1525 of Lecture notes in computer science, Springer, April (1998) 218–238Google Scholar
  7. 7.
    Stefan Katzenbeisser and Fabien A. P. Peticolas: Information Hiding Techniques for Steganography and Digital Watermarking, ARTECH HOUSE INC, (2000) 111–112Google Scholar
  8. 8.
    Langelaar, G.C.; Setyawan, I.; Lagendijk, R.L.: Watermarking digital image and video data. A state-of-the-art overview, IEEE Signal Processing Magazine, Vol. 17, Issue:5, Sept.(2000) 20–46CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Kil-Sang Yoo
    • 1
  • Won-Hyung Lee
    • 1
  1. 1.Department of Image Engineering Graduate School of Advanced Imaging ScienceMultimedia & Film Chung-Ang UniversityDongjak-Gu, SeoulKorea

Personalised recommendations