More secure lossless visible watermarking by DCT

This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility.

[1]  Xingming Sun,et al.  A Contrast-Sensitive Reversible Visible Image Watermarking Technique , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[3]  Mohan S. Kankanhalli,et al.  A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[4]  Byeungwoo Jeon,et al.  Reversible Visible Watermarking and Lossless Recovery of Original Images , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Shinfeng D. Lin,et al.  Improving robustness of visible watermarking schemes for images , 2004, IEEE International Symposium on Consumer Electronics, 2004.

[6]  Adnan Gutub,et al.  Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator , 2010 .

[7]  Bo Li,et al.  Preestimation-Based Array Interpolation Approach to Coherent Source Localization Using Multiple Sparse Subarrays , 2009, IEEE Signal Processing Letters.

[8]  Reuben A. Farrugia A reversible visible watermarking scheme for compressed images , 2010, Melecon 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference.

[9]  I. Rachel Rupala,et al.  A Novice Approach for Lossless Visible Watermarking Approach by Pioneering the Best Block (LVW-PBB) , 2011 .

[10]  Pengwei Hao,et al.  Matrix factorizations for reversible integer mapping , 2001, IEEE Trans. Signal Process..

[11]  Long-Wen Chang,et al.  A High Secure Reversible Visible Watermarking Scheme , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[12]  Cheng-Hsing Yang,et al.  Reversible Watermarking Scheme with Visibility Using Randomize Distance , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.

[13]  Wen-Hsiang Tsai,et al.  Generic Lossless Visible Watermarking—A New Approach , 2010, IEEE Transactions on Image Processing.

[14]  Xingming Sun,et al.  Removable visible image watermarking algorithm in the discrete cosine transform domain , 2008, J. Electronic Imaging.

[15]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[16]  P. Yip,et al.  Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .

[17]  Yih-Kai Lin,et al.  High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..

[18]  Oscar C. Au,et al.  Lossless Visible Watermarking , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[19]  Nouf A. Al-Otaibi,et al.  2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .