skip to main content
10.1145/1516241.1516278acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Robustness-set in watermarking embedding systems using codebook classifications

Published: 15 February 2009 Publication History

Abstract

In this paper we propose a new watermark technique which combines bit rotation, codebook and coordinate plane division for gray-level image. We embedded binary watermark into the gray-level image successfully by selecting and rotating the pixel bits, classifying codebook and dividing the coordinate plane. Besides that to achieve more robustness, parameter setting is more important. Our scheme is flexible since the user can choose the properties of the stego image, in terms of watermarking size, randomized bit embedding and robustness to avoid frequent image multimedia attacks in computer systems. From the experimental results, it can be visualized that our scheme can extract the identifiable watermark even after image processing attacks such as cropping and JPEG compression. Proposed scheme is better than the recent study of Wu and Chang scheme in terms of robustness.

References

[1]
S. Agreste and G. Andaloro, "A new approach to preprocessing digital image for wavelet-based watermark," Journal of Computational and Applied Mathematics, In Press, Corrected Proof, Available online 5 November 2007.
[2]
S. Agreste, G. Andaloro, D. Prestipino and L. Puccio, "An image adaptive, wavelet-based watermarking of digital images," Journal of Computational and Applied Mathematics, Vol. 210, Issues 1--2, pp.13--21, 2007.
[3]
M. Barni, F. Bartolini, and A. Piva, "Improved wavelet-based watermarking through pixel-wise masking," IEEE Transactions on Image Processing 10, pp.783--791, 2001.
[4]
W. Bender, D. Gruhl, and N. Morimoto, "Techniques for data hiding," IBM Systems J. 35, pp. 313--336, 1996.
[5]
C. C. Chang and P. Y. Lin, "Adaptive watermark mechanism for rightful ownership protection," Journal of Systems and Software, In Press, Corrected Proof, Available online 28 August 2007.
[6]
N. Chen and J. Zhu, "Multipurpose speech watermarking based on multistage vector quantization of linear prediction coefficients," The Journal of China Universities of Posts and Telecommunications, Vol. 14, Issue 4, pp. 64--69, 2007.
[7]
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing 6, pp. 1673--1687, 1997.
[8]
Y. G. Fu and R. M. Shen, "Color image watermarking scheme based on linear discriminant analysis," Computer Standards & Interfaces, Vol. 30, Issue 3, pp. 115--120, 2008.
[9]
M. S. Hwang, C. C. Chang, and K. F. Hwang, "A watermarking technique based on one-way hash functions," IEEE Transactions on Consumer Electronics, Vol. 45, No.2, pp. 286--294, 1999.
[10]
C. T. Kuo and S. C. Cheng, "Fusion of color edge detection and color quantization for color image watermarking using principal axes analysis," Pattern Recognition, Vol. 40, Issue 12, pp. 3691--3704, 2007.
[11]
Y. S. Kim, O. H. Kwon, and R. H. Park, "Wavelet based watermarking method for digital images using the human visual system," Electronics Letters 35, pp. 466--468, 1999.
[12]
P. L. Lin, "Robust transparent image watermarking system with spatial mechanisms," Journal of Systems and Software, Vol. 50, Issue 2, pp. 107--116, 2000.
[13]
L. D. Li and B. L. Guo, "Localized image watermarking in spatial domain resistant to geometric attacks," AEU - International Journal of Electronics and Communications, In Press, Corrected Proof, Available online 20 December 2007.
[14]
W. Lu, H. T. Lu, and F. L. Chung, "Chaos-based spread spectrum robust watermarking in DWT domain," in Proceedings of the 4th International Conference on Machine Learning and Cybernetics, Vol. 9, pp. 5308--5313, 2005.
[15]
T. V. Nguyen and J. C. Patra, "A simple ICA-based digital image watermarking scheme," Digital Signal Processing, In Press, Corrected Proof, Available online 16 October 2007.
[16]
F. Y. Shih and S. Y. T. Wu, "Combinational image watermarking in the spatial and frequency domains," Pattern Recognition, Vol. 36, Issue 4, pp. 969--975, 2003.
[17]
H. C. Wu and C. C Chang, "A novel digital image watermarking scheme based on the vector quantization technique," Computers & Security, Vol. 24, pp. 460--471, 2005.
[18]
Y. T. Wu and F. Y. Shih, "Digital watermarking based on chaotic map and reference register," Pattern Recognition, Vol. 40, Issue 12, pp. 3753--3763, 2007.
[19]
F. H. Wang, K. K. Yen, L. C. Jain and J. S. Pan, "Multiuser-based shadow watermark extraction system," Information Sciences, Vol. 177, Issue 12, pp. 2522--2532, 2007.
[20]
E. Yen and K. S. Tsai, "HDWT-based grayscale watermark for copyright protection," Expert Systems with Applications, In Press, Corrected Proof, Available online 13 July 2007.
[21]
H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen and G. Y. Dong, "Image watermarking based on an iterative phase retrieval algorithm and sine--cosine modulation in the discrete-cosine-transform domain," Optics Communications, Vol. 278, Issue 2, pp. 257--263, 2007.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
February 2009
704 pages
ISBN:9781605584058
DOI:10.1145/1516241
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 February 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. JPEG compression
  2. bit rotation
  3. codebook
  4. gray-level image
  5. robustness
  6. watermark

Qualifiers

  • Research-article

Conference

ICUIMC '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 151
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media