Secure Digital Image Watermarking Scheme for Copyright Protection and Buyer Fingerprinting

Digital Image Watermarking is a technique for inserting information into an image that can be later extracted for a variety of purpose including identification, ownership authentication, and copyright protections. The goal of this paper is to design a secure watermarking scheme in spatial domain to identify the true buyer and to protect the ownership copyright of digital still images. The scheme inserts a binary watermark in an original image that serves as a fingerprint for a specific buyer. Utilizing the one-way property of the hash function, it generates the unique buyer fingerprint. An image index concept has been used to split the image randomly into disjoint blocks. A threshold is defined for manipulation of pixel intensities of these blocks. The amount of manipulation in pixel intensities absolutely depends upon the buyer fingerprint. The recovery of the watermark not only identifies the buyer but also protects the owner's copyright. The extracted buyer fingerprint identifies the buyer of the original image. The scheme has the ability to trace the buyer involved in forgery. The experimental results show that the watermark can be retrieved from the attacked watermarked image even if the opponent has the complete information of watermarking scheme.

[1]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[2]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.

[3]  William Stallings,et al.  Cryptography and network security , 1998 .

[4]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[5]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[6]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[7]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .