Image Watermarking Based on Pyramid Decomposition with CH Transform

The new method for digital image watermarking , presented in this chapter, could be used for intellectual property right protection of digital still images of any kind (natural, scanned documents, computer graphics, etc.). The method is suitable for distance learning applications; access control for medical or biometric information in corresponding databases; detection of forgeries and illegal distribution of electronic or scanned documents; data hiding in medical, cartographic, and other images; authorized contents editing; etc.

[1]  Darko Kirovski,et al.  Multimedia Watermarking Techniques and Applications (Internet and Communications Series) , 2006 .

[2]  Mariofanna G. Milanova,et al.  Multi-layer Image Transmission with Inverse Pyramidal Decomposition , 2005, Computational Intelligence for Modelling and Prediction.

[3]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[4]  Stuart Harvey Rubin,et al.  Multimedia watermarking with complex Hadamard transform in the inverse pyramid decomposition , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[6]  Roumen Kountchev,et al.  Compression and contents protection of images, texts and graphics for distance learning applications , 2007 .

[7]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[8]  Roumen Kountchev,et al.  Multiple Audio Watermarking With Spectrum Pyramid , 2007 .

[9]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[10]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[11]  Darko Kirovski,et al.  Multimedia Watermarking Techniques and Applications , 2006 .

[12]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[13]  B. Falkowski,et al.  Image watermarking using Hadamard transforms , 2000 .

[14]  Ahmed H. Tewfik Digital watermarking , 2000 .

[15]  Lang Tong,et al.  Single-user channel estimation and equalization , 2000, IEEE Signal Process. Mag..

[16]  Ingemar J. Cox,et al.  8 – Robust Watermarking , 2002 .