http://iet.metastore.ingenta.com
1887

Improved imperceptible visible watermarking algorithm for auxiliary information delivery

Improved imperceptible visible watermarking algorithm for auxiliary information delivery

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

An imperceptible visible watermarking (IVW) algorithm is proposed to deliver auxiliary information about the visual contents, including ownership information. The proposed algorithm overcomes several inconveniences presented in previously reported IVW algorithms using the just noticeable difference (JND) criterion, invisible watermarking and binarisation function. The proposed algorithm consists of the visible watermark embedding and the exhibition stages. The JND criterion is used to embed visible watermark pattern in an imperceptible manner by the human visual system, while invisible watermarking based on the discrete cosine transform is used to share crucial parameters between both stages, which makes possible the watermark visualisation without any side information. In the watermark exhibition stage, the imperceptibly embedded visible watermark pattern is exhibited by the binarisation function. The proposed algorithm can be applied to any class of images with different characteristics and several visible watermark patterns can be embedded into an input image. Evaluation results show that performance of the proposed algorithm is better compared with previously reported algorithms from several practical points of view.

References

    1. 1)
      • 1. Langelaar, G., Setyawan, I., Lagendijk, R.: ‘Watermarking digital image and video data. A state-of-the-art overview’, IEEE Signal Process. Mag., 2000, 17, (5), pp. 2046.
    2. 2)
      • 2. Cox, I., Kilian, J, Leighton, F., et al: ‘Secure spread spectrum watermarking for multimedia’, IEEE Trans. Image Process., 1997, 6, (12), pp. 16731687.
    3. 3)
      • 3. Cedillo, M., García, F., Nakano, M., et al: ‘Robust hybrid color image watermarking method based on DFT domain and 2D histogram modification’, J. Signal Image Video Process., 2015, 8, (1), pp. 4963.
    4. 4)
      • 4. Barni, M., Bartolini, F., Piva, A.: ‘Improved wavelet-based watermarking through pixel-wise masking’, IEEE Trans. Image Process., 2001, 10, (5), pp. 783791.
    5. 5)
      • 5. Rosales, L., Cedillo, M., Nakano, M., et al: ‘Watermarking-based image authentication with recovery capability using halftoning technique’, Signal Process., Image Commun., 2013, 28, pp. 6983.
    6. 6)
      • 6. Arab, F., Abdullah, S.M., Hashim, S.M., et al: ‘A robust video watermarking technique for the tamper detection of surveillance systems’, Multimedia Tools Appl., 2016, 75, (18), pp. 1085510885.
    7. 7)
      • 7. Yaslan, Y., Gunsel, B.: ‘An integrated on-line audio watermark decoding scheme for broadcast monitoring’, Multimedia Tools Appl., 2008, 40, (1), pp. 121.
    8. 8)
      • 8. Huang, C.-H., Chuang, S.-C., Huang, Y.-L., et al: ‘Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents’, IEEE Trans. Inf. Forensics Sec., 2009, 4, (2), pp. 193206.
    9. 9)
      • 9. Lin, P.-Y.: ‘Imperceptible visible watermarking based on post camera histogram operation’, J. Syst. Softw., 2014, 95, pp. 194208.
    10. 10)
      • 10. Juarez, O., Fragoso, E., Cedillo, M., et al: ‘Improved unseen-visible watermarking for copyright protection of digital image’. Proc. Int. Workshop on Biometrics and Forensics, Coventry, UK, April 2017..
    11. 11)
      • 11. Liu, A., Lin, W., Paul, M., et al: ‘Just Noticeable Difference for image with decomposition model for separating edge and textured regions’, IEEE Trans. Circuits Syst. Video Technol., 2010, 20, (11), pp. 16481652.
    12. 12)
      • 12. Barker, C., Wiatrowski, M.: ‘The age of Netflix: critical essays on streaming media, digital delivery and instant access’ (Mcfarland & Co., Inc. Pub., North Carolina, USA, 2017, 1st edn.).
    13. 13)
      • 13. Podilchuk, C., Zeng, W.: ‘Image-adaptive watermarking using visual model’, IEEE J. Sel. Areas Commun., 1998, 16, (4), pp. 525539.
    14. 14)
      • 14. Yu, P., Shang, Y., Li, C.: ‘A new visible watermarking technique applied to CMOS image sensor’. Proc. SPIE Multispectral Image Acquisition, Processing and Analysis, Wuhan, China, October 2013, p. 8917.
    15. 15)
      • 15. Chen, B., Wornell, G.W.: ‘Quantization index modulation: a class of provably good method for digital watermarking and information embedding’, IEEE Trans. Inf. Theor., 2001, 47, (4), pp. 14231443.
    16. 16)
      • 16. Schaefer, G., Stich, M.: ‘UCID – an uncompressed colour image database’. available at http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.101.8709&rep=rep1&type=pdf, accessed 1st July 2017..
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2017.0145
Loading

Related content

content/journals/10.1049/iet-bmt.2017.0145
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address