© The Institution of Engineering and Technology
Some of the most important classes of watermark detection methods in image watermarking are correlation-based algorithms. In these methods usually a pseudorandom noise pattern is embedded in the host image. The receiver can regenerate this pattern by having a key that is the seed of a random number generator. After that if the correlation between this pattern and the image that is assumed to have the watermark is higher than a predefined threshold, it means that the watermark exists and vice versa. Here, we show the advantage of using the Julian set patterns as a watermark, instead of the commonly used pseudorandom noise pattern. Julian set patterns can be regenerated in receiver with few parameters such as coefficients of its function and an initial point. These parameters can be embedded in the key. Our experiments show that the Julian set patterns not only manipulate a lower number of pixels (and therefore provide better visual quality) but also, compared with the pseudorandom noise pattern, it increases the robustness of watermark against attacks.
References
-
-
1)
-
C. Pickover
.
(1990)
, Computers patterns chaos and beauty.
-
2)
-
, Corel Stock photo Library.
-
3)
-
M. Kutter ,
F.A.P. Petitcolas
.
A fair benchmark for image watermarking systems.
Proc. SPIE
,
226 -
239
-
4)
-
Wolfgang, R., Delp, J.: `A watermark for digital Images', Proc.IEEE Int. Conf, Image Processing, September 1996, Switzerland, 3, p. 219–222.
-
5)
-
G. Langelaar ,
I. Setyvan
.
Watermarking digital image and video data.
IEEE Signal Process. Mag.
,
20 -
46
-
6)
-
Miller, M., Cox, I.J., Bloom, J.A.: `Informed embedding: Exploiting image and detector information during watermark insertion', IEEE Int. Con. Image Processing, Canada, 2000.
-
7)
-
George, M., Chouinard, J.: `Spread spectrum spatial and spectral watermarking for images and video', Canadian Workshop on Information Theory, 15–18 June 1999, Kingston, Ontario, Canada.
-
8)
-
Yaghmaee, F., Jamzad, M.: `Using Julian set patterns for higher robustness in correlation based watermarking methods', Fifth Int. Symp. on Signal Processing and Information Technology, IEEE ISSPIT 2005, December 2005, Athens, Greece.
-
9)
-
J. Lichtenauer ,
I. Setyawan ,
R. Lagendijk
.
Hiding correlation-based watermark templates using secret modulation.
Proc. SPIE
,
501 -
512
-
10)
-
Herrigel, V.A., Baumgartner, N.: `A stochastic approach to content adaptive digital image watermarking', Proc. Third Int. Workshop on Information Hiding, 1999, p. 211–236, (Lect. Notes Comput. Sci. 1768).
-
11)
-
Christian, J., van den Branden, Lambrecht, Farrell, J.E.: `Perceptual quality metric for digitally coded color images', Proc. EUSIPCO, 1996, Trieste, Italy, p. 1175–1178.
-
12)
-
C. Podilchuk ,
J. Delp
.
Digital watermarking: Algorithms and applications.
IEEE Signal Process. Mag.
,
4 ,
33 -
46
-
13)
-
M. Miller ,
I. Cox ,
M. Linnartz ,
K.K. Parhi ,
T. Nishitani
.
(1999)
A review of watermarking principles and practices, Digital signal processing for multimedia systems.
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-ifs_20060025
Related content
content/journals/10.1049/ip-ifs_20060025
pub_keyword,iet_inspecKeyword,pub_concept
6
6