A Novel Intelligent Multiple Watermarking Schemes for the Protection of the Information Content of a Document Image

Most of the past document image watermarking schemes focus on providing same level of integrity and copyright protection for information present in the source document image. However, in a document image the information contents possess various levels of sensitivity. Each level of sensitivity needs different type of protection and this demands multiple watermarking techniques. In this paper, a novel intelligent multiple watermarking techniques are proposed. The sensitivity of the information content of a block is based on the homogeneity and relative energy contribution parameters. Appropriate watermarking scheme is applied based on sensitivity classification of the block. Experiments are conducted exhaustively on documents. Experimental results reveal the accurate identification of the sensitivity of information content in the block. The results reveal that multiple watermarking schemes has reduced the amount of data to be embedded and consequently improved perceptual quality of the watermarked image.

[1]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[2]  Er. Sandeep Kaur,et al.  An Efficient Watermarking Algorithm to Improve Payload and Robustness without Affecting Image Perceptual Quality , 2010, ArXiv.

[3]  Ming-Shi Wang,et al.  A majority-voting based watermarking scheme for color image tamper detection and recovery , 2007, Comput. Stand. Interfaces.

[4]  Giuseppe Schirripa Spagnolo,et al.  Fragile digital watermarking by synthetic holograms , 2004, SPIE Security + Defence.

[5]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.

[6]  Cheng Dao-fang Document watermarking scheme for information tracking , 2008 .

[7]  Jeng-Shyang Pan,et al.  Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..

[8]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[9]  M. L. Valarmathi,et al.  A Study on Watermarking Schemes for Image Authentication , 2010 .

[10]  F. Chung,et al.  Fragile watermarking scheme for image authentication , 2003 .

[11]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[12]  Goldberg,et al.  Genetic algorithms , 1993, Robust Control Systems with Genetic Algorithms.

[13]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[14]  Philip Ogunbona,et al.  On multiple watermarking , 2001, MM&Sec '01.

[15]  Li Wenbo,et al.  A chaos-based robust wavelet-domain watermarking algorithm , 2004 .

[16]  Jie Ding,et al.  Normalized Correlation-Based Quantization Modulation for Robust Watermarking , 2014, IEEE Transactions on Multimedia.

[17]  Shivananda Nirmala,et al.  An efficient and secure robust watermarking scheme for document images using Integer wavelets and block coding of binary watermarks , 2015, J. Inf. Secur. Appl..

[18]  Benoit M. Macq,et al.  Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..

[19]  Shahrokh Ghaemmaghami,et al.  Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect , 2018, SIGMAP.

[20]  Won-Hyung Lee,et al.  A Content-Based Fragile Watermarking Scheme for Image Authentication , 2004, AWCC.

[21]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[22]  Shivananda Nirmala,et al.  An intelligent fragile watermarking scheme based on contourlets for effective detection, localization and recovery of tampered regions in handwritten document images , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[23]  Zensho Nakao,et al.  Color Image Watermarking and Self-recovery Based on Independent Component Analysis , 2008, ICAISC.

[24]  Xinpeng Zhang,et al.  Watermarking Scheme Capable of Resisting Sensitivity Attack , 2007, IEEE Signal Processing Letters.

[25]  Lama Rajab,et al.  A Robust-Fragile Dual Watermarking System in the DCT Domain , 2005, KES.

[26]  Mohan S. Kankanhalli,et al.  Adaptive visible watermarking of images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.