Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermarks

被引:31
作者
Mohanty, Saraju P. [1 ]
Bhargava, Bharat K. [2 ]
机构
[1] Univ N Texas, Dept Comp Sci & Engn, Denton, TX 76207 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
Security; Algorithms; Watermarking; invisible watermarking; image; content protection; copyright protection;
D O I
10.1145/1413862.1413865
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a novel invisible robust watermarking scheme for embedding and extracting a digital watermark in an image. The novelty lies in determining a perceptually important subimage in the host image. Invisible insertion of the watermark is performed in the most significant region of the host image such that tampering of that portion with an intention to remove or destroy will degrade the esthetic quality and value of the image. One feature of the algorithm is that this subimage is used as a region of interest for the watermarking process and eliminates the chance of watermark removal. Another feature of the algorithm is the creation of a compound watermark using the input user watermark (logo) and attributes of the host image. This facilitates the homogeneous fusion of a watermark with the cover image, preserves the quality of the host image, and allows robust insertion-extraction. Watermark creation consists of two distinct phases. During the first phase, a statistical image is synthesized from a perceptually important subimage of the image. A compound watermark is created by embedding a watermark (logo) into the statistical synthetic image by using a visible watermarking technique. This compound watermark is invisibly embedded into the important block of the host image. The authentication process involves extraction of the perceptive logo as well statistical testing for two-layer evidence. Results of the experimentation using standard benchmarks demonstrates the robustness and efficacy of the proposed watermarking approach. Ownership proof could be established under various hostile attacks.
引用
收藏
页数:22
相关论文
共 52 条
[1]  
[Anonymous], THESIS INDIAN I SCI
[2]  
BARNETT R, 1999, IEE ELECT COMMUN AUG, P173
[3]   Applications for data hiding [J].
Bender, W ;
Butera, W ;
Gruhl, D ;
Hwang, R ;
Paiz, FJ ;
Pogreb, S .
IBM SYSTEMS JOURNAL, 2000, 39 (3-4) :547-568
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]   The first 50 years of electronic watermarking [J].
Cox, IJ ;
Miller, ML .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (02) :126-132
[6]   A review of watermarking and the importance of perceptual modeling [J].
Cox, IJ ;
Miller, ML .
HUMAN VISION AND ELECTRONIC IMAGING II, 1997, 3016 :92-99
[7]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[8]   An overview of multimedia content protection in consumer electronics devices [J].
Eskicioglu, AM ;
Delp, EJ .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2001, 16 (07) :681-699
[9]   Analysis and design of watermarking algorithms for improved resistance to compression [J].
Fei, CH ;
Kundur, D ;
Kwong, RH .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (02) :126-144
[10]   Watermark evaluation testbed [J].
Guitart, Oriol ;
Kim, Hyung Cook ;
Delp, Edward J., III .
JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)