A visible watermarking algorithm based on the content and contrast aware (COCOA) technique

A novel visible watermarking algorithm based on the content and contrast aware (COCOA) technique with the consideration of Human Visual System (HVS) model is presented in this study. In order to determine the optimal watermark locations and strength at the watermark embedding stage, the COCOA visible watermarking utilizes the global and local characteristics of the host and watermark images in the discrete wavelet transform (DWT) domain. To achieve the best tradeoff between the embedding energy of watermark and the perceptual translucence, the utilization of contrast-sensitive function, noise visible function of perceptual model, and the basis function amplitudes of DWT coefficients are fine tuned, for the best quality of perceptual translucence and noise reduction of the COCOA algorithm. The experimental results demonstrate that COCOA technique not only provides high PSNR values for the watermarked images, but also preserves the watermark visibility under various signal processing operations, especially the watermark removal attack.

[1]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[2]  Patrick C. Teo,et al.  Perceptual image distortion , 1994, Electronic Imaging.

[3]  Shih-Fu Chang,et al.  Embedding visible video watermarks in the compressed domain , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[4]  Yongjian Hu,et al.  An image fusion based visible watermarking algorithm , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[5]  Xiuzi Ye,et al.  Region of Interest Fragile Watermarking for Image Authentication , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[6]  Pei-Min Chen,et al.  A visible watermarking mechanism using a statistic approach , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.

[7]  Soo-Chang Pei,et al.  A Novel Image Recovery Algorithm for Visible Watermarked Images , 2006, IEEE Trans. Inf. Forensics Secur..

[8]  Guillaume Julien Durieu Survey of watermarking techniques , 2001 .

[9]  Kai-Kuang Ma,et al.  Watermark Detection and Extraction Using Independent Component Analysis Method , 2002, EURASIP J. Adv. Signal Process..

[10]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[12]  A. E. Bell,et al.  Design and evaluation of perceptual masks for wavelet image compression , 2002, Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop..

[13]  Mohan S. Kankanhalli,et al.  A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[14]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[15]  Luo Yong Translucent Digital Watermark Base on Wavelets and Error-Correct Code , 2004 .

[16]  Thrasyvoulos N. Pappas,et al.  Structural Similarity Quality Metrics in a Coding Context: Exploring the Space of Realistic Distortions , 2006, IEEE Transactions on Image Processing.

[17]  David J. Sakrison,et al.  The effects of a visual fidelity criterion of the encoding of images , 1974, IEEE Trans. Inf. Theory.

[18]  John D. Villasenor,et al.  Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.

[19]  Zhou Wang,et al.  An adaptive linear system framework for image distortion analysis , 2005, IEEE International Conference on Image Processing 2005.

[20]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[21]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[22]  Sung-Hwan Jung,et al.  A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).

[23]  Ja-Ling Wu,et al.  Attacking visible watermarking schemes , 2004, IEEE Transactions on Multimedia.

[24]  Yongjian Hu,et al.  Wavelet domain adaptive visible watermarking , 2001 .

[25]  Benjamin Belzer,et al.  Wavelet filter evaluation for image compression , 1995, IEEE Trans. Image Process..

[26]  Brian D. O. Anderson,et al.  Stable fixed-lag smoothing of continuous time processes , 1974, IEEE Trans. Inf. Theory.

[27]  Min-Jen Tsai,et al.  The Collaboration of Noise Reduction and Human Vision System Models for a Visible Watermarking Algorithm , 2007, 2007 IEEE International Conference on Image Processing.

[28]  Andrew B. Watson,et al.  Toward a perceptual video-quality metric , 1998, Electronic Imaging.

[29]  Guillermo Sapiro,et al.  Image inpainting , 2000, SIGGRAPH.

[30]  Mohan S. Kankanhalli,et al.  Adaptive visible watermarking of images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[31]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[32]  Abdelhakim Saadane,et al.  Coded image quality assessment based on a new contrast masking model , 2004, J. Electronic Imaging.

[33]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[34]  Yun Q. Shi,et al.  A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[35]  D. Levicky,et al.  Human Visual System Models in Digital Image Watermarking , 2004 .

[36]  Biao-Bing Huang,et al.  A contrast-sensitive visible watermarking scheme , 2006, IEEE Multimedia.

[37]  I. Daubechies,et al.  Factoring wavelet transforms into lifting steps , 1998 .

[38]  Ke Ding,et al.  Wavelet-Based Semi-Fragile Watermarking with Tamper Detection , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[39]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[40]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[41]  Deepa Kundur,et al.  Special Issue on Enabling Security Technologies for Digital Rights Management , 2004, Proc. IEEE.