A Hybrid Method of Information Embedding for Digital Watermark

Article Preview

Abstract:

Nowadays, the development of information technology is keeping in a fast speed. Large amount of information are exchanged too active to identify the original owner. A serious problem of digital contents copyright violation is happening today and the most effective manner to avoid it is digital watermark technology. In this work, a new approach for digital watermark embedding is presented. This method is different from the traditional ways which are pixel-exchanging and frequency-domain-based watermarking scheme. It combines the pixel-exchanging scheme and frequency-domain-based scheme by exchanges the lower bit plane and imitates the imaging process of a true-lens-imaging system respectively. On the other hand, This method use the point spread function as secret key that keeps the security and spread the embedded information to all bit plane of the image that keeps the robustness. Numerical simulation examples show the effect.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

667-672

Citation:

Online since:

September 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, Information hiding—A survey, Proc. IEEE, vol. 87, no. 7, p.1062–1078, Jul. (1999).

DOI: 10.1109/5.771065

Google Scholar

[2] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding. Steganography and Watermarking-Attacks and Countermeasures. Boston, MA: Kluwer, (2001).

DOI: 10.1007/978-1-4615-4375-6_4

Google Scholar

[3] Tsung-Yuan Liu, Wen-Hsiang Tsai, Generic Lossless Visible Watermarking—A New Approach, IEEE Trans. Image Process., vol. 19, no. 5 , p.1224–1235, may. (2010).

DOI: 10.1109/tip.2010.2040757

Google Scholar

[4] Y. Hu and S. Kwong, Wavelet domain adaptive visiblewatermarking, Electron. Lett., vol. 37, no. 20, p.1219–1220, Sep. (2001).

Google Scholar

[5] S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, A DCT domain visible watermarking technique for images, in Proc. IEEE Int. Conf. Multimedia and Expo, Jul. 2000, vol. 2, p.1029–1032.

DOI: 10.1109/icme.2000.871535

Google Scholar

[6] G. Braudaway, K. A. Magerlein, and F. Mintzer, Protecting publicly available images with a visible image watermark, in Proc. SPIE Int. Conf. Electronic Imaging, Feb. 1996, vol. 2659, p.126–133.

DOI: 10.1117/12.235469

Google Scholar

[7] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for images, audio and video, IEEE Int. Conf. Image Process., vol. 3, p.243–246, (1996).

DOI: 10.1109/icip.1996.560429

Google Scholar

[8] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process., vol. 6, no. 12, p.1673–1687, Jun. (1997).

DOI: 10.1109/83.650120

Google Scholar

[9] I. J. Cox, M. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd Ed., Morgan Kaufmann, (2007).

DOI: 10.1016/b978-012372585-1.50015-2

Google Scholar