Advertisement

Blind Invisible Watermarking Technique in DT-CWT Domain Using Visual Cryptography

  • Meryem Benyoussef
  • Samira Mabtoul
  • Mohamed El Marraki
  • Driss Aboutajdine
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8156)

Abstract

A method for digital image copyright protection is presented in this paper. The proposed method is a blind invisible and robust image watermarking scheme based on Dual Tree Complex Wavelet Transform (DT-CWT) and Visual Cryptography concept (VC). This method does not require that the watermark to be embedded into the original image which leaves the marked image equal to the original one. In the concealing and extracting process, the image is transformed in the complex wavelet domain to generate a secret and a public share respectively, using LL sub-band features and a VC codebook. To extract the watermark from the attacked image, the secret and public shares are stacked together. To improve the visual quality of the extracted watermark, a post process called reduction procedure is also proposed. The experimental results show that the proposed method can withstand several image processing attacks such as cropping, filtering and compression etc…

Keywords

Robust Blind Watermarking Visual Cryptography Complex Wavelet Transform Copyright Protection 

References

  1. 1.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Liu, J.C., Chen, S.Y.: Fast two-layer image watermarking without referring to the original image and watermark. Image and Vision Computing 19, 1083–1097 (2001)CrossRefGoogle Scholar
  3. 3.
    Chu, S.C., Roddick, J.F., Lu, Z.M., Pan, J.S.: A digital image watermarking method based on labeled bisecting clustering algorithm. IEICE Trans. E87-A(1), 282–285 (2004)Google Scholar
  4. 4.
    Hwang, R.J.: A Digital Copyright Protection Scheme Based on Visual Cryptography. Tamkang Journal of Science and Engineering 3(3), 97–106 (2001)Google Scholar
  5. 5.
    Abusitta, A.H.: A Visual Cryptography Based Digital Image Copyright Protection. Journal of Information Security 3, 96–104 (2012)CrossRefGoogle Scholar
  6. 6.
    Wang, C.C., Tai, S.C., Yu, C.S.: Repeating Image Watermarking Technique by the Visual Cryptography. IEICE Trans. E83-A(8), 1589–1598 (2000)Google Scholar
  7. 7.
    Sleit, A., Abusitta, A.: A Visual Cryptography BasedWatermark Technology for Individual and Group Images. Systemics, Cybernetics and Informatics 5(2), 24–32 (2006)Google Scholar
  8. 8.
    Surekha, B., Swamy, G.N.: Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography. International Journal of Computer Applications 23(3), 29–36 (2011)CrossRefGoogle Scholar
  9. 9.
    Surekha, B., Swamy, G.N.: Sensitive Digital Image Watermarking for Copyright Prottection. International Journal of Network Security 15(1), 95–103 (2013)Google Scholar
  10. 10.
    Kingsbury, N.G.: Complex wavelets for shift invariant analysis and filtering of signals. Journal of Applied and Computational Harmonic 10(3), 234–253 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Selesnick, I.W., Baraniuk, R.G., Kingsbury, N.G.: The Dual-Tree Complex Wavelet Transform. IEEE Signal Processing Magazine 22(6), 123–151 (2005)CrossRefGoogle Scholar
  12. 12.
    Loo, P., Kingsbury, N.G.: Watermarking using complex wavelets with resistance to geometric distortion. In: EUSIPCO, pp. 5–8 (2001)Google Scholar
  13. 13.
    Hu, Y., Huang, J., Kwong, S., Chan, Y.K.: Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 86–100. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Joong-Jae, L., Kim, W., Na-Young, L., Kim, G.: A New Incremental Watermarking Based on Dual-Tree Complex Wavelet Transform. JSC 33(1-2), 133–140 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Meryem Benyoussef
    • 1
  • Samira Mabtoul
    • 1
  • Mohamed El Marraki
    • 1
  • Driss Aboutajdine
    • 1
  1. 1.Faculty of Science, Department of Physics, LRIT Associated Unit to the CNRST-URAC N 29Mohammed V-Agdal UniversityMorocco

Personalised recommendations