AN APPROXIMATION APPROACH FOR DIGITAL IMAGE OWNER IDENTIFICATION USING HISTOGRAM INTERSECTION TECHNIQUE

Researchers have documented a wide variety of attacks again st digital image watermarking techniques. Meanwhile, many strong attacks have been appearing at a reasonable rate. The investigations emphasize that modelling of the behaviours regarding such attacks is difficult. Studies have revealed that existing watermarking algorithms have a tendency to be severely affected by such strong attacks which results in destroyed watermarks. Hence, in the influence of such attacks, the ownership identification of the property cannot be established. This paper proposes an approximation approach for identification of the rightful owner of the property utilizing the remaining information of the attacked watermarks regardless of the attack behaviour . Here, we coupled the BiISB (Duo-ISB-Bit-Plane) watermarking algorithm together wit h the HI (Histogram Intersection) technique in order to identify the ownership of the property. In BiISB approach, while the main watermark delivers the ownership identification information, the sub- watermark which is a bit-pattern histogram, is the statistical information regarding the main watermark. In addition, three bit-pattern histograms namely, original, extracted and computed sub-watermarks have been used for approximation purpose. An investigation has been achieved using a standard Lena gray-scale host image of 512 × 512 pixels, a trademark image of 38 × 89 pixels as a sub-watermark and JPEG2000 loss compression, Cropping and Reset Removal watermarking attacks. The results have revealed that the proposed approach highly balanced the trade-off between imperceptibility and robustness. This was successfully achieved by preserving the quality of the watermarked image and, at the same time, identifying the ownership of the property even though the attack totally corrupted the embedded watermarks.

[1]  Ghazali Sulong,et al.  A novel multiple semi-blind enhanced ISB watermarking algorithm using watermark bit-pattern histogram for copyright protection , 2012 .

[2]  Aydin Akan,et al.  A Robust Image Watermarking in the Joint Time-Frequency Domain , 2010, EURASIP J. Adv. Signal Process..

[3]  Jihane Bennour,et al.  Watermarking attack: BOWS contest , 2007, Electronic Imaging.

[4]  Mingyan Li,et al.  Tracing Medical Images Using Multi-Band Watermarks , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[5]  Michael J. Swain,et al.  Color indexing , 1991, International Journal of Computer Vision.

[6]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .

[7]  Julie Delon,et al.  A Nonparametric Approach for Histogram Segmentation , 2007, IEEE Transactions on Image Processing.

[8]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[9]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[10]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[11]  Bernd Girod,et al.  Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[12]  Hazem Al-Otum,et al.  A robust blind color image watermarking based on wavelet-tree bit host difference selection , 2010, Signal Process..

[13]  Dong-Chul Park,et al.  Medical Image Authentication Using Hash Function and Integer Wavelet Transform , 2008, 2008 Congress on Image and Signal Processing.

[14]  Elliot M. Cramer,et al.  Statistics in Psychology , 2004 .

[15]  S.Maruthu Perumal,et al.  A Wavelet based Digital Watermarking Method using Thresholds on Intermediate Bit Values , 2011 .

[16]  M. G. Martini,et al.  Subjective and objective quality assessment in wireless teleultrasonography imaging , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[17]  Eugene P. Genov Digital watermarking of bitmap images , 2007, CompSysTech '07.

[18]  Ahmet M. Eskicioglu,et al.  A robust multiple watermarking scheme in the discrete wavelet transform domain , 2004, SPIE Optics East.

[19]  Mehemed Bashir Aliwa,et al.  Robust Digital Watermarking Based Falling-off-Boundary in Corners Board-MSB-6 Gray Scale Images , 2009 .

[20]  Cláudio T. Silva,et al.  Revisiting Histograms and Isosurface Statistics , 2008, IEEE Transactions on Visualization and Computer Graphics.

[21]  Malay Kumar Kundu,et al.  Robust and Blind Spatial Watermarking In Digital Image , 2002, ICVGIP.

[22]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[23]  Jeng-Shyang Pan,et al.  Genetic Watermarking for Copyright Protection , 2009 .

[24]  Der-Chyuan Lou,et al.  A semi-blind digital watermarking scheme based on singular value decomposition , 2006, Comput. Stand. Interfaces.

[25]  Cheng-Hsing Yang,et al.  Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..

[26]  Dan Wang,et al.  A Novel Geometrical Robust Image Data Hiding Scheme , 2007, Eighth International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS '07).

[27]  Amirhossein Taherinia,et al.  A New Watermarking Attack Using Long-Range Correlation Image Restoration , 2009, 2009 International Conference on Availability, Reliability and Security.

[28]  D. Levicky,et al.  Log-polar Mapping in Robust Digital Image Watermarking , 2007, 2007 17th International Conference Radioelektronika.

[29]  Akram M. Zeki,et al.  ISB watermarking embedding: A block based model , 2011 .

[30]  Huijie Xin,et al.  Blind Digital Image Watermarking Technique Based On Intermediate Significant Bit and Discrete Wavelet Transform , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[31]  Akram M. Zeki,et al.  A Novel Digital Watermarking Technique Basedon ISB (Intermediate Significant Bit) , 2009 .

[32]  Chin-Chen Chang,et al.  AN SVD ORIENTED WATERMARK EMBEDDING SCHEME WITH HIGH QUALITIES FOR THE RESTORED IMAGES , 2007 .

[33]  Yongdong Wu Nonlinear collusion attack on a watermarking scheme for buyer authentication , 2006, IEEE Trans. Multim..

[34]  Jasni Mohamad Zain,et al.  A New Performance Trade-Off Measurement Technique for Evaluating Image Watermarking Schemes , 2011, ICSECS.