Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents

A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.

[1]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[2]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[3]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[4]  Shih-Fu Chang,et al.  Embedding visible video watermarks in the compressed domain , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[6]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[7]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[8]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[9]  Long-Wen Chang,et al.  Visual Cryptography for Digital Watermarking in Still Images , 2004, PCM.

[10]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[11]  Soo-Chang Pei,et al.  DCT-Based Image Protection using Dual-Domain Bi-Watermarking Algorithm , 2006, 2006 International Conference on Image Processing.

[12]  Soo-Chang Pei,et al.  Automatic video diagnosing method using embedded crypto-watermarks , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[13]  Chai Wah Wu,et al.  Multiple images viewable on twisted-nematic mode liquid-crystal displays , 2003, IEEE Signal Processing Letters.

[14]  Ja-Ling Wu,et al.  Unseen Visible Watermarking , 2007, 2007 IEEE International Conference on Image Processing.

[15]  Mohan S. Kankanhalli,et al.  Adaptive visible watermarking of images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[16]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[17]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[18]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[19]  Ja-Ling Wu,et al.  Attacking visible watermarking schemes , 2004, IEEE Transactions on Multimedia.

[20]  Mohan S. Kankanhalli,et al.  A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[21]  Liisa Hakola,et al.  Detection of printed codes with a camera phone , 2005 .