AN EFFICIENT DIGITAL IMAGE WATERMARKING SCHEME

被引:0
作者
El-Iskandarani, M. A. [1 ]
Saad, Saad M. [1 ]
Abubahia, Ahmed. M. [1 ]
机构
[1] Univ Alexandria, IGSR, Alexandria, Egypt
来源
42ND ANNUAL 2008 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2008年
关键词
Image watermarking; lifting wavelet transform; normalization;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Intellectual property protection of digital data has been important task due to the rabid growth of multimedia data distribution and the wide availability of the information via global networks. In this paper, a robust and secure blind image watermarking scheme is proposed. It presents a method which can add the watermark to the significant coefficients in Lifting Wavelet Transform (LWT) due to its good feature representation, fast computing speed and easy implementation. The original image is firstly moment normalized in order to achieve the robustness to geometric attacks. Then, the produced image is gone under 1-level parametric integer lifting wavelet transform to achieve the security. The watermark is embedded into the transformed-normalized image according to the difference values between the normalized image and its reference image. The watermark extraction is blind. Experimental results show the effectiveness of the proposed scheme against variety kinds of attacks such as removal and interference attacks, geometric attacks and cryptographic attacks.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 16 条
[1]   Geometric invariance in image watermarking [J].
Alghoniemy, M ;
Tewfik, AH .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (02) :145-153
[2]  
Arnold M, 2003, Techniques and applications of digital watermarking and content protection
[3]   Digital watermarking robust to geometric distortions [J].
Dong, P ;
Brankov, JG ;
Galatsanos, NP ;
Yang, YY ;
Davoine, F .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (12) :2140-2150
[4]  
Jansen M., 2005, 2 GENERATION WAVELET
[5]  
Katzenbeisser S., 2001, INFORM HIDING TECHNI
[6]  
LIU J, 2005, ELSEVIER COMPUTER ST, V28, P356
[7]  
Lu C., 2005, MULTIMEDIA SECURITY
[8]   Attacks, applications and evaluation of known watermarking algorithms with Checkmark [J].
Meerwald, P ;
Pereira, S .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :293-304
[9]  
MEERWALD P, 2001, P IEEE INT C IM PROC, V3, P1027
[10]  
MIYAZAKI A, 2006, IEEE ISPACS, P155