Skip to main content

A Novice Approach for Lossless Visible Watermarking Approach by Pioneering the Best Block (LVW-PBB)

  • Conference paper
Global Trends in Information Systems and Software Applications (ObCom 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 270))

Included in the following conference series:

Abstract

Watermarking techniques have been proposed to solve the problem of copyright protection and authentication. Using the idea from [1] in this paper [LVW-PBB], the best block for embedding the watermark is identified, that is based on similarity between DCT coefficients of original image and the watermark image. The embedding method is based on [2] which use the deterministic one-to-one compound mappings of image pixel values. The compound mappings are proved to be reversible, which allows for lossless recovery of original images from watermarked images. Different types of visible watermarks, including opaque monochrome and translucent color ones, are embedded by using the proposed approach. For Security protection, parameter and mapping randomizations have also been proposed. In case of various attacks such as JPEG compression, filtering, cropping, and additive Noise, the quality of cover image is acceptable even after the watermark extraction. Thus the proposed method is robust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rahmani, R., Mortezaei, R., Moghaddam, M.E.: A New Lossless Watermarking Scheme Based on DCT Coefficients. Electrical and Computer Engineering Department. Shahid Beheshti University,G.C Tehran, Iran

    Google Scholar 

  2. Liu, T.-Y., Tsai, W.-H.: Generic Lossless Visible Watermarking—A New Approach. IEEE Transactions on Image Processing 19(5) (May 2010)

    Google Scholar 

  3. Martin, V., Chabert, M., Lacaze, B.: An interpolation-based watermarking scheme. Signal Processing 88(3), 539–557 (2008)

    Article  MATH  Google Scholar 

  4. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3), 313–336 (1996)

    Article  Google Scholar 

  5. Saxena, V., Gupta, J.P.: A Novel Watermarking Scheme for JPEG Images. WSEAS Transactions on Signal Processing 5(2), 74–84 (2009)

    Google Scholar 

  6. Kang, X., Zeng, W., Huang, J.: A Multi-band Wavelet Watermarking Scheme. International Journal of Network Security 6(2), 121–126 (2008)

    Google Scholar 

  7. Wang, X.Y., Hou, L.M., Wu, J.: A feature-based robust digital image watermarking against geometric attacks. Image and Vision Computing 26(7), 980–989 (2008)

    Article  Google Scholar 

  8. Lee, Z., Lin, S.W., Su, S.F., Lin, C.Y.: A hybrid watermarking technique applied to digital images. Applied Soft Computing 8, 798–808 (2008)

    Article  Google Scholar 

  9. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transaction 12(6), 1673–1687 (1997)

    Google Scholar 

  10. Lu, C.S., Liao, H.Y.M., Huang, S.K., Sze, C.: Cocktail watermarking on images. In: Proceedings of the 3rd International Workshop on Information Hiding, pp. 333–347 (1999)

    Google Scholar 

  11. Hsu, C.T., Wu, J.L.: Hidden Signature in Images. IEEE Transaction on Image Processing 8(I), 58–68 (1999)

    Google Scholar 

  12. Wu, H.J., Shi, Y.Q., Dong, C.W.: Image Watermarking in DCT: an Embedding Strategy and algorithm. Acta Electronica Sinica 28(4), 57–60 (2000)

    Google Scholar 

  13. Hsu, C.T., Wu, J.L.: Hidden Digital Watermarks in Images. IEEE Transactions on Image Processing 8(I), 58–68 (1999)

    Google Scholar 

  14. Cheng, Y.J., Tsai, W.H.: A new method for copyright and integrity protection for bitmap images by removable visible watermarks and irremovable invisible watermarks. Presented at the Int. Computer Symp.—Workshop on Cryptology and Information Security, Hualien, Taiwan, R.O.C (December 2002)

    Google Scholar 

  15. Huang, P.M., Tsai, W.H.: Copyright protection and authentication of grayscale images by removable visible watermarking and invisible signal embedding techniques: A new approach. Presented at the Conf. Computer Vision, Graphics and Image Processing, Kinmen, Taiwan, R.O.C (August 2003)

    Google Scholar 

  16. Hu, Y., Jeon, B.: Reversible visible watermarking and lossless recovery of original images. IEEE Trans. Circuits Syst. Video Technol. 16(11), 1423–1429 (2006)

    Article  Google Scholar 

  17. Awrangjeb, M., Kankanhalli, M.S.: Reversible watermarking using a perceptual model. J. Electron. Imag. 14(013014) (March 2005)

    Google Scholar 

  18. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  19. Mohanty, S.P., Ramakrishnan, K.R., Kankanhalli, M.S.: A DCT domain visible watermarking technique for images. In: Proc. IEEE Int. Conf. Multimedia and Expo., vol. 2, pp. 1029–1032 (July 2000)

    Google Scholar 

  20. Tsai, H.M., Chang, L.W.: A high secure reversible visible watermarking scheme. In: Proc. IEEE Int. Conf. Multimedia and Expo., Beijing, China, pp. 2106–2109 (July 2007)

    Google Scholar 

  21. Yip, S.K., Au, O.C., Ho, C.W., Wong, H.M.: Lossless visible watermarking. In: Proc. IEEE Int. Conf. Multimedia and Expo., pp. 853–856 (July 2006)

    Google Scholar 

  22. de Vleeschouwer, C., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97–105 (2003)

    Article  Google Scholar 

  23. Li, X., Orchard, M.T.: Edge-directed prediction for lossless compression of natural simages. IEEE Trans. Image Process 10(6), 813–817 (2001)

    Article  MATH  Google Scholar 

  24. Hu, Y., Kwong, S., Huang, J.: An algorithm for removable visible watermarking. IEEE Trans. Circuits Syst. Video Technol. 16(1), 129–133 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sinduja, R., Rachel Rupala, I., Sathiya, R.D. (2012). A Novice Approach for Lossless Visible Watermarking Approach by Pioneering the Best Block (LVW-PBB). In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Information Systems and Software Applications. ObCom 2011. Communications in Computer and Information Science, vol 270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29216-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29216-3_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29215-6

  • Online ISBN: 978-3-642-29216-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics