Study of Measures to Secure Video Phone Service Safety through a Preliminary Evaluationof the Information Security of the New IT Service

In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The efficiency of an image watermarking technique depends on the preservation of visually significant information. This is attained by embedding the watermark transparently with the maximum possible strength. The watermark embedding process is carried over the subband coefficients that lie on edges, where distortions are less noticeable, with a subband level dependent strength. Also, the watermark is embedded to selected coefficients around edges, using a different scale factor for watermark strength, that are captured by a morphological dilation operation. The experimental evaluation of the proposed method shows very good results in terms of robustness and transparency to various attacks such as median filtering, Gaussian noise, JPEG compression and geometrical transformations. Keywords—Watermarking, wavelet transform, edge detection.

[1]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[2]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[3]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[4]  Jong Ryul Kim,et al.  A robust wavelet-based digital watermarking using level-adaptive thresholding , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[5]  Cynthia E. Irvine,et al.  Quality of security service , 2001, NSPW '00.

[6]  John N. Ellinas,et al.  A robust watermarking scheme based on edge detection and contrast sensitivity function , 2007, VISAPP.

[7]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[8]  Sunghoon Kim,et al.  Study of Information Security Pre-Evaluation Model for New IT Service , 2005 .

[9]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999 .

[11]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[12]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  Venansius Baryamureeba,et al.  PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8 , 2005 .

[14]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[15]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..