Using Watermarking Techniques to prove Rightful Ownership of Web Images

This article introduces intelligent watermarking scheme to protect Web images from attackers who try to counterfeit the copyright to damage the rightful ownership. Using secret signs and logos that are embedded within the digital images, the technique can investigate technically the ownership claim. Also, the nature of each individual image is taken into consideration which gives more reliable results. The colour channel used was chosen depending on the value of its standard deviation to compromise between robustness and invisibility of the watermarks. Several types of test images, logos, attacks and evaluation metrics were used to examine the performance of the techniques used. Subjective and objective tests were used to check visually and mathematically the solidity and weakness of the used scheme.

[1]  Abdelmajid Ben Hamadou,et al.  Adaptability and Adaptivity in The Generation of Web Applications , 2009, Int. J. Inf. Technol. Web Eng..

[2]  Moh’d A. Radaideh,et al.  Database High Availability: An Extended Survey , 2009 .

[3]  Ina Fourie Managing Web‐enabled Technologies in Organizations: A Global Perspective , 2001 .

[4]  Ioannis Pitas,et al.  Circularly symmetric watermark embedding in 2-D DFT domain , 2001, IEEE Trans. Image Process..

[5]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[6]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[7]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[8]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[9]  Nikos Karacapilidis,et al.  Web-Based and Blended Educational Tools and Innovations , 2012 .

[10]  Gwoboa Horng,et al.  A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model , 2003 .

[11]  Wen-Liang Hwang,et al.  Enhancing image watermarking methods with/without reference images by optimization on second-order statistics , 2002, IEEE Trans. Image Process..

[12]  John C. Grundy,et al.  Experiences in Developing a Micro-payment System for Peer-to-Peer Networks , 2010, Int. J. Inf. Technol. Web Eng..

[13]  Mike Thelwall,et al.  Handbook of Research on Web Log Analysis , 2009, J. Assoc. Inf. Sci. Technol..

[14]  Borko Furht,et al.  Survey of Watermarking Techniques and Applications , 2004 .

[15]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[16]  Wenjun Zeng,et al.  A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..

[17]  Deepa Kundur,et al.  Toward robust logo watermarking using multiresolution image fusion principles , 2004, IEEE Transactions on Multimedia.

[18]  Stefan Winkler,et al.  A vision-based masking model for spread-spectrum image watermarking , 2002, IEEE Trans. Image Process..

[19]  Chang-Hsing Lee,et al.  An adaptive digital image watermarking technique for copyright protection , 1999, IEEE Trans. Consumer Electron..

[20]  Zhi-Hong Guan,et al.  A hybrid SVD-DCT watermarking method based on LPSNR , 2004, Pattern Recognit. Lett..

[21]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[22]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[23]  Ahmet M. Eskicioglu,et al.  Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition , 2005, J. Electronic Imaging.

[24]  Darko Kirovski,et al.  Multimedia Watermarking Techniques and Applications (Internet and Communications Series) , 2006 .

[25]  Ali Al-Haj,et al.  An improved SVD-based watermarking scheme for protecting rightful ownership , 2008, Signal Process..

[26]  Omar Banimelhem,et al.  An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks , 2013, Int. J. Inf. Technol. Web Eng..

[27]  Ghazi Alkhatib,et al.  Web Engineered Applications for Evolving Organizations : Emerging Knowledge , 2011 .

[28]  Ioannis Pitas,et al.  Watermarking Polygonal Lines Using Fourier Descriptors , 2004, IEEE Computer Graphics and Applications.

[29]  Christopher C. Yang,et al.  Processing and Analysis of Search Query Logs in Chinese , 2008 .

[30]  Xiangchu Feng,et al.  A New Watermarking Method Based on DWT , 2005, CIS.

[31]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[32]  Kathleen Scalise Crowdsourcing and Education with Relation to the Knowledge Economy , 2011, Int. J. Web Based Learn. Teach. Technol..

[33]  Aapo Hyvärinen,et al.  Sparse Code Shrinkage: Denoising of Nongaussian Data by Maximum Likelihood Estimation , 1999, Neural Computation.

[34]  R. Barnett,et al.  Digital watermarking: applications, techniques and challenges , 1999 .

[35]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[36]  Chun-Shien Lu,et al.  Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector , 2002, IEEE Trans. Image Process..