Image Watermarking Analysis: Using Discrete Cosine Transform and LSB Substitution

Ruby Shukla, Manish ., Prof. A.K. Arora

Abstract


In this paper, we describe a new very accurate and reliable method that can detect watermarked image by LSB embedding in randomly scattered pixels in both 24-bit color images and 8-bit grayscale or color images, the LSB Modification and DCT are two techniques are analyzed by using various distortion metrics the methods for their robustness.


Keywords


Image watermarking, Discrete Cosine Transform, Least Significant Bit technique, Robustness

References


Special Issue on Copyright and Privacy Protection, IEEE J. Select. Areas

Commun., vol. 16, May 1998.

Special Issue on Identification and Protection of Multimedia Information,

Proc. IEEE, vol. 87, no. 7, July 1999.

“IS&T and SPIE electronic imaging,” presented at the Conference on Security

and Watermarking of Multimedia Contents, San Jose, CA, 1999, 2000.

Erlangen Watermarking Workshop, Erlangen, Germany, 5-6 Oct. 1999.

International Workshop on Information Hiding, 1996.

http://www.digimarc.com.

C. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual

models,” IEEE J. Select. Areas Commun., vol. 16, pp. 525-539, May 1998.

R.B. Wolfgang, C.I. Podilchuk, and E.J. Delp, “Perceptual watermarks for

digital images,” Proc. IEEE, no. 7, pp. 1108-1126, July 1999.

R. Wolfgang and E. Delp, “Overview of image security techniques with applications

in multimedia systems,” in Proc. SPIE Int. Conf. on Multimedia

Networks: Security, Displays, Terminals and Gateways, Nov. 1997, vol. 3228,

pp. 297-308.

M. Swanson, M. Kobayashi, and A. Tewfik, “Multimedia data-embedding

and watermarking strategies,” Proc. IEEE, vol. 86, pp. 1064-1087, June

F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proc.

IEEE, vol. 87, pp.1-79-1107, July 1999.

J. Su, F. Hartung, and B. Girod, “Digital watermarking of text, image,

and video documents,” Comput. Graph., vol. 22, no. 6, pp. 687-695, Feb.

F. Petitcolas, R. Anderson, and M. Kuhn, “Information hiding—A survey,”

Proc. IEEE, vol. 87, pp. 1062-1078, July 1999.

G. Braudway, K. Magerlein, and F. Mintzer, “Protecting publicly available

images with a visible watermark,” in Proc. SPiE Conf. Optical Security and

Counterfeit Deterrence Techniques, vol. 2659, Feb. 1996, pp. 126-132

I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum

watermarking for multimedia,” NEC Research Institute, Princeton,

NJ, Technical Report 95-10, 1995.

I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum

watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, pp.

-1687, Dec. 1997.

M.D. Swanson, B. Zhu, and A.H. Tewfik, “Transparent robust image

watermarking,” in IEEE Proc. Int. Conf. Image Processing, Lausanne, Switzerland,

, pp. 211-214.

M. Swanson, B. Zhu, and A. Tewfik, “Multiresolution scene-based video

watermarking using perceptual models,” IEEE J. Select. Areas Commun., vol.

, pp. 525-539, May 1998.

C.I. Podilchuk and W. Zeng, “Digital image watermarking using visual

models,” IS&T, SPIE Human Vision and Electronic Imaging II, pp. 100-111,

Feb. 1997.

C. Podilchuk and W. Zeng, “Perceptual watermarking of still images,” in

Proc. IEEE Workshop Multimedia Signal Processing, pp. 363-368, June 1997.

M. Swanson, B. Zhu, A. Tewfik, and L. Boney, “Robust audio

watermarking using perceptual masking,” Signal Process., Special Issue on

Watermarking, 1997, pp. 337-355.

J.F. Delaigle, C.D. Vleeschouwer, and B. Macq, “A psychovisual approach

for digital picture watermarking,” J. Electron. Imaging, vol. 7, no. 3, pp.

-640, July 1998.

R.G. Schyndel, A. Tirkel, and C. Osborne, “A digital watermark,” in Proc.

IEEE Int. Conf. Image Processing (ICIP), 1994, pp. 86-90.

G. Caronni, “Assuring ownership rights for digital images,” in Proc. Reliable

IT Systems, VIS ‘95,1995, pp. 251-263.

W. Bender, D. Gruhl, and N. Morimoto, “Techniques for data hiding,”

IBM Syst. J., vol. 35, nos. 3-4, pp. 313-336, 1996.

K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding secret information

into a dithered muti-level image,” in IEEE Proc. Military Communications

Conf.’90, 1990, pp. 216-220.

I. Pitas, “A method for signature casting on digital images,” in IEEE Proc.

Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 3, pp.

-218.

R.B. Wolfgang and E.J. Delp, “A watermark for digital images,” in IEEE

Proc. Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996, vol. 3,

pp. 219-222.

R.G. van Schyndel and C. Osborne, “A two-dimensional watermark,” in

Proc. DICTA, 1993, pp. 378-383.

R. Wolfgang and E. Delp, “Fragile watermarking using the vw2d watermark,”

in Proc. SPIE, Security and Watermarking of Multimedia Contents,

San Jose, CA, Jan. 1999, vol. 3657, pp. 204-213.

S. Walton, “Information authentication for a slippery new age,” Dr. Dobbs

J., vol. 20, no. 4, pp. 18-26, Apr. 1995.

M. Kutter, F. Jordan, and F. Bossen, “Digital watermarking of color images

using amplitude modulation,” J. Electron. Imaging, vol. 7, no. 2, pp.

-332, Apr. 1998.

B.G. Haskell, A. Puri, and A.N. Netravali, Digital Video: An Introduction

to MPEG-2. New York: Chapman & Hall, 1997.

E. Koch and J. Zhao, “Towards robust and hidden image copyright labeling,”

presented at Nonlinear Signal Processing Workshop, Thessaloniki,

Greece, 1995.

F.M. Boland, J.J.K. O’Ruanaidh, and C. Dautzenberg, “Watermarking

digital images for copyright protection,” in IEEE Int. Conf. Image Proc. and

its Applications, 1995, pp. 321-326.

A.B. Watson, “DCT quantization matricies visually optimized for individual

images,” in Proc. SPIE, Conf. on Human Vision, Visual Processing and

Digital Display IV, 1992, pp. 202-216.

A.B. Watson, G.Y. Yang, J.A. Solomon, and J. Villasenor, “Visibility of

wavelet quantization noise,” IEEE Trans. Image Processing, vol. 6, pp.

-1175, Aug. 1997.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




 


All Rights Reserved © 2012 IJARCSEE


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.