Blind detection attack resistant image watermarking

A new scheme is proposed which uses the features of Discrete Cosine Transform (DCT) for the embedding of the watermark coefficients and uses a pseudo-random sequence for selection of the DCT coefficients to embed the watermark. These coefficients are different in different watermarked images so there is no chance of collusion of the watermarked images to detect the watermark illegally. The scheme is better than the spatial watermarking algorithms such as LSB based watermarking. It is also better than the DCT mid-band scheme where the coefficients to embed the watermark are always fixed, and the watermark is embedded by simply exchanging the coefficients according to the watermark bits. Having all the properties of DCT watermarking this algorithm enhances the robustness of the watermark by involving the coefficient averaging concept. The chance of a successful attack on the watermark by an attacker is very less due to use of this averaging technique. The main advantage of the scheme is that the image is scrambled before embedding of the watermark and descrambled after embedding.

[1]  Minerva M. Yeung,et al.  Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.

[2]  Xin-Yang Huang,et al.  An image digital watermarking based on DCT in invariant wavelet domain , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.

[3]  V. Saxena,et al.  Collusion Attack Resistant Watermarking Scheme for Colored Images using DCT , 2007 .

[4]  Patrick Gaydecki,et al.  A blind block based DCT watermarking technique for gray level images using one dimensional Walsh coding , 2009, 2009 International Conference on the Current Trends in Information Technology (CTIT).

[5]  Vijay Laxmi,et al.  Robust Watermarking through Spatially Disjoint Transformations , 2011, ACC.

[6]  M. Jamzad,et al.  A new watermarking attack based on content-aware image resizing , 2009, 2009 International Multimedia, Signal Processing and Communication Technologies.

[7]  R.H.I. Saleh Efficient Mid-band Exchange Coefficient Watermarking System , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.

[8]  Minerva M. Yeung Digital watermarking , 1998, CACM.

[9]  Choubisa Manish,et al.  Permutation Based Invisible Digital Watermarking Technique using DCT Domain , 2011 .

[10]  W. C. Chu,et al.  DCT-based image watermarking using subsampling , 2003, IEEE Trans. Multim..

[11]  B. S Ujwala,et al.  An efficient DCT based fingerprinting scheme for thwarting collusion attacks , 2010, 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application.

[12]  Xiaoqun Zhao,et al.  DCT image watermarking technique based on the mix of time-domain , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[13]  Vijay Laxmi,et al.  Permuted Image DCT Watermarking , 2010, CISIS.