Collusion Attack Resistant Watermarking Scheme for Images using DCT

Image Watermarking with both insensible detection and high robustness capabilities is still a challenging problem for copyright protection up to now. This paper presents a new scheme for watermarking of still image by introducing redundancy in conjunction with low frequency coefficient, in classical middle frequency coefficients exchange scheme to make it collusion attack resistant. Experimental results show the robustness of the proposed scheme against the JPEG compression and other common image manipulations.

[1]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[2]  Ja-Ling Wu,et al.  Hidden signatures in images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[3]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[6]  Jan Biemond,et al.  Image and Video Databases: Restoration, Watermarking and Retrieval , 2000 .

[7]  Wenjun Zeng,et al.  Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[8]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[9]  Mauro Barni,et al.  DWT-based technique for spatio-frequency masking of digital signatures , 1999, Electronic Imaging.

[10]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[11]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[12]  Andreas Uhl,et al.  Survey of wavelet-domain watermarking algorithms , 2001, IS&T/SPIE Electronic Imaging.

[13]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[14]  Joshua R. Smith,et al.  Modulation and Information Hiding in Images , 1996, Information Hiding.

[15]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[16]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.

[17]  G. C. Langelaar,et al.  Watermarking digital image and video data , 2000 .

[18]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[19]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[20]  Edward J. Delp,et al.  Overview of image security techniques with applications in multimedia systems , 1998, Other Conferences.

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[22]  B. Liu,et al.  On resolving rightful ownerships of digital images by invisible watermarks , 1997, Proceedings of International Conference on Image Processing.

[23]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[24]  Jiri Fridrich,et al.  Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[25]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[26]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[27]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[28]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[29]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[30]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[31]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[32]  Paul G. Flikkema,et al.  Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..