Copyright protection for digital image by watermarking technique

被引:2
作者
Ali S.A. [1 ]
Jawad M.J. [1 ]
Naser M.A. [1 ]
机构
[1] Dept. of Computer Science, Faculty of Science for Women, Babylon University, Babylon
来源
Journal of Information Processing Systems | 2017年 / 13卷 / 03期
关键词
Digital watermarking; Discrete Cosine Transform (DCT); Normalized Correlation (NC); PSNR;
D O I
10.3745/JIPS.03.0074
中图分类号
学科分类号
摘要
Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks. © 2017 KIPS.
引用
收藏
页码:599 / 617
页数:18
相关论文
共 15 条
[1]  
Goyal L., Raman M., Diwan P., Vijay M., A robust method for integrity protection of digital data in text document watermarking,, International Journal for Innovative Research in Science & Technology, 1, 6, pp. 14-18, (2014)
[2]  
Mulya M., Utama Y., Implementation of audio watermarking using fast fourier transform for audio digital copyright protection,, Proceeding of International Conference on Electrical Engineering, (2015)
[3]  
Yesilyurt M., Yalman Y., Ozcerit A.T., A new DCT based watermarking method using luminance component,, Elektronika ir Elektrotechnika, 19, 4, pp. 47-52, (2013)
[4]  
Jeswani J., Sarode T., A new DCT based color video watermarking using luminance component,, IOSR Journal of Computer Engineering, 16, 2, pp. 83-90, (2014)
[5]  
Ahmed K.A., "Digital watermarking of still images,", (2013)
[6]  
El Hossaini A.E., El Aroussi M., Jamali K., Mbarki S., Wahbi M., A new robust blind watermarking scheme based on steerable pyramid and DCT using Pearson product moment correlation,, Journal of Computers, 9, 10, pp. 2315-2327, (2014)
[7]  
Ali K., Kumar V., Robust binary image watermarking using DCT,, International Journal of Advance Foundation and Research in Computer, 1, 6, pp. 50-58, (2014)
[8]  
Abdullah M.A., Dlay S.S., Woo W.L., Securing iris images with a robust watermarking algorithm based on discrete cosine transform,, Proceedings of 10th International Conference on Computer Vision Theory and Applications, pp. 108-114, (2015)
[9]  
Gonge S.S., Bakal J.W., Robust digital watermarking techniques by using DCT and spread spectrum,, International Journal of Electrical, Electronics and Data Communication, 1, 2, pp. 111-124, (2013)
[10]  
Huynh-Thu Q., Ghanbari M., Scope of validity of PSNR in image/video quality assessment,, Electronics Letters, 44, 13, pp. 800-801, (2008)