Skip to main content

Digital Watermarking Method Based on Image Compression Algorithms

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10531))

Abstract

Digital watermarking is an efficient method for digital access rights management utilized in the scope of multimedia data. A possibility to combine the procedure of compression and watermarking in effective way for digital images is proposed in this manuscript. This research is focused on the compression methods considering the significance of the initial multimedia object (for example image) different elements to increase the quality of process (compressed) image. One of the most effective approaches for this task is to utilize Error Correcting Codes (ECC) allowing to maintain the number of resulting errors (distortion) as well as the value of resulting compression ratio. The application of such codes enables to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach based on Weighted Hamming Metric guarantying the limitation of maximum errors (distortions) with predefined significance is represented as an example.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yahya, A.N., Jalab, H.A., Wahid, A., Noor, R.M.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ.-Comput. Inf. Sci. 27(4), 393–401 (2015)

    Google Scholar 

  2. Ometov, A., Orsino, A., Militano, L., Moltchanov, D., Araniti, G., Olshannikova, E., Fodor, G., Andreev, S., Olsson, T., Iera, A., Torsner, J., Koucheryavy, Y., Mikkonen, T.: Toward trusted, social-aware D2D connectivity: bridging across the technology and sociality realms. IEEE Wirel. Commun. 23(4), 103–111 (2016)

    Article  Google Scholar 

  3. Mosterman, P.J., Zander, J.: Industry 4.0 as a cyber-physical system study. Softw. Syst. Model. 15(1), 17–29 (2016)

    Article  Google Scholar 

  4. Yan, X., Zhang, L., Wu, Y., Luo, Y., Zhang, X.: Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks. Enterp. Inf. Syst. 11(2), 223–249 (2017)

    Article  Google Scholar 

  5. Orsino, A., Ometov, A.: Validating information security framework for offloading from LTE onto D2D links. In: Proceedings of the 18th Conference of Open Innovations Association FRUCT, pp. 241–247 (2016)

    Google Scholar 

  6. Chandrakar, N., Bagga, J., et al.: Performance comparison of digital image watermarking techniques: a survey. Int. J. Comput. Appl. Technol. Res. 2(2), 126–130 (2013)

    Google Scholar 

  7. Ometov, A., Masek, P., Malina, L., Florea, R., Hosek, J., Andreev, S., Hajny, J., Niutanen, J., Koucheryavy, Y.: Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices. In: Proceedings of International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1–6. IEEE (2016)

    Google Scholar 

  8. Andalibi, M., Chandler, D.M.: Digital image watermarking via adaptive logo texturization. IEEE Trans. Image Process. 24(12), 5060–5073 (2015)

    Article  Google Scholar 

  9. Bajracharya, S., Koju, R.: An improved DWT-SVD based robust digital image watermarking for color image. Int. J. Eng. Manuf. (IJEM) 7(1), 49 (2017)

    Google Scholar 

  10. Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060–3063 (2010)

    Article  Google Scholar 

  11. Belogolovyi, A.: Image compression based on LDPC codes. In: Proceedings of International Conference GraphiCon (2004)

    Google Scholar 

  12. Guyeux, C., Bahi, J.M.: Topological chaos and chaotic iterations application to hash functions. In: Proceedings of the 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1–7. IEEE (2010)

    Google Scholar 

  13. Bezzateev, S., Shekhunova, N.: Class of generalized Goppa codes perfect in weighted Hamming metric. Des. Codes Crypt. 66(1–3), 391–399 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  14. Bezzateev, S., Voloshina, N., Zhidanov, K.: Steganographic method on weighted container. In: Proceedings of XIII International Symposium on Problems of Redundancy in Information and Control Systems (RED), pp. 10–12. IEEE (2012)

    Google Scholar 

  15. Dariti, R., Souidi, E.M.: An application of linear error-block codes in steganography. Int. J. Digit. Inf. Wirel. Commun. (IJDIWC) 1(2), 426–433 (2011)

    Google Scholar 

  16. Bezzateev, S., Voloshina, N., Minchenkov, V.: Special class of (L, G) codes for watermark protection in DRM. In: Proceedings of Eighth International Conference on Computer Science and Information Technologies, pp. 225–228 (2011)

    Google Scholar 

Download references

Acknowledgment

This work was partly financially supported by Russian Foundation for Basic Research in 2017 (grant 17-07-00849-A).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergey Bezzateev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Bezzateev, S., Voloshina, N. (2017). Digital Watermarking Method Based on Image Compression Algorithms. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART NsCC NEW2AN 2017 2017 2017. Lecture Notes in Computer Science(), vol 10531. Springer, Cham. https://doi.org/10.1007/978-3-319-67380-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67380-6_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67379-0

  • Online ISBN: 978-3-319-67380-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics