Advertisement

A Robust Zero-Watermark Copyright Protection Scheme Based on DWT and Image Normalization

  • Mahsa Shakeri
  • Mansour Jamzad
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7088)

Abstract

Recently, protecting the copyright of digital media has become an imperative issue due to the growing illegal reproduction and modification of digital media. A large number of digital watermarking algorithms have been proposed to protect the integrity and copyright of images. Traditional watermarking schemes protect image copyright by embedding a watermark in the spatial or frequency domain of an image. However, these methods degrade the quality of the original image in some extend. In recent years, a new approach called zero-watermarking algorithms is introduced. In these methods, the watermark does not require to be embedded into the protected image but is used to generate a verification map which is registered to a trusted authority for further protection. In this paper a robust copyright proving scheme based on discrete wavelet transform is proposed. It uses a normalization procedure to provide robustness against geometric distortions and a cellular automaton for noise robustness. Experimental results on images with different complexity demonstrate that our proposed scheme is robust against common geometric and non geometric attacks including blurring, JPEG compression, noise addition, sharpening, scaling, rotation, and cropping. In addition, our experimental results obtained on images with different complexities showed that our method could outperform the related methods in most cases.

Keywords

Zero-watermarking copyright protection discrete wavelet transform image normalization cellular automata robustness 

References

  1. 1.
    Langelaar, G., Setyawan, I., Lagendijk, R.: Watermarking digital image and video data: A state-of-the-art overview. IEEE Signal Processing Magazine 17(5), 20–46 (2000)CrossRefGoogle Scholar
  2. 2.
    Lee, W.B., Chen, T.H.: A public verifiable copy protection technique for still images. J. Syst. Softw. 62, 195–204 (2002)CrossRefGoogle Scholar
  3. 3.
    Hsu, C.T., Wu, J.L.: Multiresolution watermarking for digital images. IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process. 45(8), 1097–1101 (1998)CrossRefGoogle Scholar
  4. 4.
    Chen, T.H., Horng, G., Lee, W.B.: A publicly verifiable copyright proving scheme resistant to malicious attacks. IEEE Transactions on Industrial Electronics 52(1), 327–334 (2005)CrossRefGoogle Scholar
  5. 5.
    Abdel-Wahab, M.A., Selim, H., Sayed, U.: A novel robust watermarking scheme for copyright-proving. In: The 2009 International Conference on Computer Engineering and Systems, ICCES 2009, art. no. 5383216, pp. 482–486 (2009)Google Scholar
  6. 6.
    Chang, C.C., Lin, P.Y.: Adaptive watermark mechanism for rightful ownership protection. The Journal of Systems and Software 81, 1118–1129 (2008)CrossRefGoogle Scholar
  7. 7.
    Kazakova, N., Margala, M., Durdle, N.G.: Sobel edge detection processor for a real-time volume rendering system. In: Proceedings of the 2004 International Symposium on Circuits and Systems, vol. 2, pp. 913–916 (2004)Google Scholar
  8. 8.
    Lee, M.T., Chen, S.S.: Image Copyright Protection Scheme Using Sobel Technology and Genetic Algorithm. In: International Symposium on Computer, Communication, Control and Automation (2010)Google Scholar
  9. 9.
    Lin, W.H., Horng, S.J., Kao, T.W., Chen, R.J., Chen, Y.H.: Image copyright protection with forward error correction. Expert Systems with Applications 14(12) (2005)Google Scholar
  10. 10.
    Popovici, A., Popovici, D.: Cellular automata in image processing. In: Proceedings of 15th International Symposium on Mathematical Theory of Networks and Systems (2002)Google Scholar
  11. 11.
    Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital Watermarking Robust to Geometric Distortions. IEEE Transaction on Image Processing 36, 11888–11894 (2009)Google Scholar
  12. 12.
    Rothe, I., Susse, H., Voss, K.: The method of normalization to determine invariants. IEEE Transaction on Pattern Analysis and Machine Intelligence 18(4), 366–376 (1996)CrossRefGoogle Scholar
  13. 13.
    Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Transaction on Image Processing 8(1), 58–68 (1999)CrossRefGoogle Scholar
  14. 14.
    Yaghmaee, F., Jamzad, M.: Computing watermark capacity in images according to their quad tree. In: Int. IEEE 5th Symposium on Signal Processing and Information Technology, pp. 823–826. IEEE Press (2005)Google Scholar
  15. 15.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Mahsa Shakeri
    • 1
  • Mansour Jamzad
    • 1
  1. 1.Computer Engineering DepartmentSharif University of TechnologyTehranIran

Personalised recommendations