Abstract
The spreading wings of the Internet are facing significant obstacles for preserving the intellectual property of individuals and organizations. Threats to digital data and the rights of its creator are always an issue of concern as copying of digital data is easy. The ease of dissemination of digital data leads to penetration in intellectual property rights. Here, rights mean financial and moral interests of the author. The authors have faced risk in protecting their unique ideas, products and/or services. It can be achieved by embedding some copyright information with digital data. Digital watermarking allows the authentication of the data over the intrusion of the attackers. In this paper, we will consider a reversible technique for digital watermarking where the original message or cover is recovered after the extraction of hidden data. A digest of the hidden data is created and embedded with the cover that can be extracted on the receiver end using the extracting algorithm. In addition, the use of private key increases the security level. The cover image can be retrieved in lossless manner and can be reused for further moderations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
What is intellectual property? World Intellectual Property Organization. Retrieved February 2, 2019, from http://www.wipo.int/about-ip/en/.
Cox, I., Miller, M., Bloom, J., Fridrich, J., & Kalker, T. (2007). Digital watermarking and steganography (2nd ed.). Kaufmann.
Sharma, G., & Kumar, V. (2015). Reversible information hiding and its application in watermarking. International Journal of Engineering Technology, Management and Applied Sciences, 3(Special Issue). ISSN 2349-4476.
Shi, Y.Q., Ni, Z., Zou, D., Liang, C., & Xuan, G. (2004). Lossless data hiding: fundamentals, algorithms and applications. In Proceedings IEEE International Symposium on Circuits and Systems (Vol. II, pp. 33–36). Vancouver, BC, Canada.
Ni, Z., Shi, Y.-Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuit and Systems for Video Technology, 16(3).
Tsai, P., Hu, Y.-C., & Yeh, H.-L. (2009). Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing, 89, 1129–1143.
Mehran, Y. Z., Nafari, M., Nafari, A., & Mehran, N. Z. (2011). Histogram shifting as a data hiding technique: an overview of recent developments. In DICTAP 2011, Part I, CCIS (Vol. 166, pp. 770–786).
Chaturvedi, R., Sharma, A., Dwivedi, U., Kumar, S., & Praveen, A. (2016) Security enhanced image watermarking using mid-band DCT coefficient in YCbCr space. International Journal of Control Theory and Applications, 9(23), 277–284.
Lee, C.-W., & Tsai, W.-H. (2011). A lossless large-volume data hiding method based on histogram shifting using an optimal hierarchical block division scheme. Journal of Information Science and Engineering, 27(4), 1265–1282.
Sharma, G., & Kumar, V. (2017). A novel technique for reversible information hiding. Advances in Computational Sciences and Technology, 10(7), 2069–2078. ISSN 0973-6107.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, G., Kumar, V. (2020). Preserving IPR Using Reversible Digital Watermarking. In: Sharma, H., Govindan, K., Poonia, R., Kumar, S., El-Medany, W. (eds) Advances in Computing and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0222-4_38
Download citation
DOI: https://doi.org/10.1007/978-981-15-0222-4_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0221-7
Online ISBN: 978-981-15-0222-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)