IJIGSP Vol. 9, No. 9, 8 Sep. 2017
Cover page and Table of Contents: PDF (size: 1083KB)
Full Text (PDF, 1083KB), PP.40-50
Views: 0 Downloads: 0
Image security, ownership, authentication, invisible watermarking, DCT, JPEG compression, re-watermarking
Rapid growth of internet service attains better security of multimedia contents now a days. Heading this problem a DCT-based color image watermarking framework is proposed in this article. Many earlier works have suggested embedding watermark information in the low frequencies of the image to enhance the robustness against JPEG compression because low frequencies hold the most significant information of the image and not affected significantly by the quantization method of JPEG algorithm. Replacement of low-frequency components with watermark directly may incur undesirable degradation to the image quality. To preserve the visual quality of watermarked images, we are proposing a watermarking framework that adjusts the DCT low-frequency coefficients by scaled averaging. The security issue is well-taken care with double secret keys. Experimental result set demonstrates that the embedded watermark can be extracted efficiently from the JPEG-compressed images even after very high compression, re-watermarking, other image processing attacks. The extraction algorithm is blind i.e., neither host image nor the watermark is needed at the time of extraction.
Soumik Das, Monalisa Banerjee, Atal Chaudhuri,"An Improved DCT based Image Watermarking Robust Against JPEG Compression and Other Attacks", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.9, No.9, pp.40-50, 2017. DOI: 10.5815/ijigsp.2017.09.05
[1]Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker. 2008. Digital Watermarking and Steganography. 2nd Edition, Morgan Kaufmann Publishers. (ISBN 978-0-12-372585-1).
[2]Monalisa Banerjee. 2007. Theory and application of cellular automata for authentication and watermarking. Ph.D. thesis, Jadavpur University.
[3]I.J Cox, J. Kilian, F.T. Leighton, and T. Shamoon. 1997. Secure spread spectrum watermarking for multimedia. in IEEE Transactions on Image Processing, vol: 6 Issue: 12, Page(s):1673 -1687.
[4]Yuan Jun, Cui Guo-hua, Zhang Yi-jia. 2006. A Practical Multipurpose Color Image Watermarking Algorithm for Copyright Protection and Image Authentication. Proc. Digital Telecommunications, 2006. ICDT '06, Page(s):72–77. Digital Object Identifier 10.1109/ICDT.2006.10.
[5]Shinfeng D. Lin, Shih-Chieh Shie, and Jim Yi Guo. 2009. Improving the Robustness of DCT-Based Image Watermarking Against JPEG Compression. Elsevier, Journal of Computer Standard and Interfaces Volume 32, Issues 1-2, Page(s): 54-60.
[6]Gregory K. Wallace. 1991. The JPEG Still Picture Compression Standard. Communications of the ACM.
[7]K. R. Rao, Ping Wip. 1990. Discrete Cosine Transform: algorithms, advantages, applications. Academic Press.
[8]Soumik Das, Pradosh Bandyopadhyay, Shauvik Paul, Atal Chaudhuri, Monalisa Banerjee. 2010. An Invisible Color Watermarking Framework for Uncompressed Video Authentication. International Journal of Computer Applications (IJCA). (ISBN: 978-93-80746-10-4).
[9]Soumik Das, Pradosh Bandyopadhyay, Atal Chaudhuri, Monalisa Banerjee. 2012. A Secured Key-based Digital Text Passing System through Color Image Pixel. Proc. IEEE International Conference on Advances in Engineering, Science and Management (IEEE-ICAESM 2012). (ISBN: 978-1-4673-0213-5).
[10]Soumik Das, Pradosh Bandyopadhyay, Monalisa Banerjee, Atal Chaudhuri. 2011. A Chip-Based Watermarking Framework for Color Image Authentication for Secured `Communication. Communications in Computer and Information Science, 1, Volume 125, Springer. Advances in Computing, Communication and Control, Part 2, Springer.
[11]Keta Raval, Sameena Zafar. 2013. Digital Watermarking with Copyright Authentication for Image Communication. Proc. IEEE International Conference on Intelligent Systems and Signal Processing (ISSP-13), Page(s): 111-116. (ISBN: 978-1-4799-0316-0).
[12]Kaushik Deb, Md. Sajib Al-Seraj, Md. Moshiul Hoque, Md. Iqbal Hasan Sarkar. “Combined DWT-DCT based digital image watermarking technique for copyright protection”. Proc. 7th International Conference on Electrical and Computer Engineering. 2012. IEEE.
[13]Tianrui Zong, Yong Xiang, Song Guo, Yue Rong. “Rank-Based Image Watermarking Method With High Embedding Capacity and Robustness”. IEEE Access. 2016 IEEE. vol. 4. Page(s): 1689 – 1699.
[14]Anuja Dixit, Rahul Dixit. “A Review on Digital Image Watermarking Techniques”. I.J. Image, Graphics and Signal Processing, 2017, 4, 56-66.