Skip to main content

Abstract

In this paper, we propose a digital watermarking scheme that uses hologram quantization to spread the watermark information and analyze the cover image detail. The watermark is a hologram generated using a QR code and quantization based on the cover image. This hologram is transformed by a discrete fractional random transform with a random seed β to make the watermark. The generated watermark can then be embedded into the subband of the discrete wavelet transform (DWT). The proposed scheme includes encryption techniques for security, and is robust because the watermark is inserted in the DWT. When conventional methods are used to watermark an image, the invisibility is poor in the boundary region, but using the proposed method reduces the bit error rate to just 0–0.45%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, J., Kim, N., Lee, D., Park, S., Lee, S.: Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Processing: Image Communication 25, 559–576 (2010)

    Article  Google Scholar 

  2. Lee, Y., Kim, J.: Robust Blind Watermarking Scheme for Digital Images Based on Discrete Fractional Random Transform. In: Kim, T.-h., Gelogo, Y. (eds.) MulGraB 2011, Part II. CCIS, vol. 263, pp. 139–145. Springer, Heidelberg (2011)

    Google Scholar 

  3. Li, D., Kim, J.: Secure Image Forensic Marking Algorithm using 2D Barcode and Off-axis Hologram in DWT-DFRNT Domain. Applied Mathematics & Information Sciences (AMIS) 6(2S), 513–520 (2012)

    Google Scholar 

  4. Nah, J., Kim, J., Kim, J.: Video Forensic Marking Algorithm Using Peak Position Modulation. Applied Mathematics & Information Sciences (AMIS) 6(6S) (to be published, 2012)

    Google Scholar 

  5. Takai, N., Mifune, Y.: Digital Watermarking by a holographic technique. Applied Optics 41(5), 865–873 (2002)

    Article  Google Scholar 

  6. Guo, J., Liu, Z., Liu, S.: Watermarking based on discrete fractional random transform. Optical Communications 272(2), 344–348 (2007)

    Article  Google Scholar 

  7. Wikipedia, http://www.wikipedia.org

  8. Gabor, D.: A New Microscope Principle. Nature 161, 777 (1948)

    Article  Google Scholar 

  9. Leith, E.N., Upatnieks, J.: Reconstructed Wavefronts and Communication Theory. Journal of the Optical Society of America 52, 1377 (1962)

    Article  Google Scholar 

  10. Liu, Z., Zhao, H., Liu, S.: A discrete fractional random transform. Optical Communications 255(4-6), 357–365 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin, R., Kim, J. (2012). A Digital Watermarking Scheme Using Hologram Quantization. In: Kim, Th., Mohammed, S., Ramos, C., Abawajy, J., Kang, BH., Ślęzak, D. (eds) Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition. ICHCI WSE SIP 2012 2012 2012. Communications in Computer and Information Science, vol 342. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35270-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35270-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35269-0

  • Online ISBN: 978-3-642-35270-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics