Digital image ownership authentication via camouflaged unseen-visible watermarking

In recent years, end users can easily capture digital images using several devices, such as smartphones, mobile devices and digital imaging cameras, allowing such images to be easily copied, manipulated, transmitted or format converted without any restrictions. This fact suggests the necessity to develop digital tools, such as digital watermarking, to solve the issues associated with copyright protection and ownership authentication of digital images. To claim the ownership of a digital image, we propose a camouflaged, unseen-visible watermarking technique based on luminance and texture properties in conjunction with an image enhancement criterion. The proposed method has some advantages over invisible and visible watermarking methodologies in terms of readability and imperceptibility of the watermark, respectively. The experimental results demonstrate that the proposed scheme is effective and applicable for digital images on a variety of topics, including natural scenes and man-made objects, both indoors and outdoors. A comparison with previously reported methods based on unseen-visible watermarking techniques is also provided.

[1]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[2]  Héctor M. Pérez Meana,et al.  Robust watermarking method in DFT domain for effective management of medical imaging , 2015, Signal Image Video Process..

[3]  Héctor M. Pérez Meana,et al.  A Visible Watermarking with Automated Location Technique for Copyright Protection of Portrait Images , 2016, IEICE Trans. Inf. Syst..

[4]  Kiyoharu Aizawa,et al.  Robust Object-Based Watermarking Using Feature Matching , 2008, IEICE Trans. Inf. Syst..

[5]  Ainuddin Wahid Abdul Wahab,et al.  Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network , 2015, J. King Saud Univ. Comput. Inf. Sci..

[7]  Pei-Yih Ting,et al.  Photograph watermarking , 2015, Multimedia Tools and Applications.

[8]  Ingemar J. Cox,et al.  Chapter 2 – Applications and Properties , 2008 .

[9]  Ja-Ling Wu,et al.  Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents , 2009, IEEE Transactions on Information Forensics and Security.

[10]  G. C. Langelaar,et al.  Watermarking digital image and video data , 2000 .

[11]  Jiwu Huang,et al.  Adaptive image watermarking scheme based on visual masking , 1998 .

[12]  Soo-Chang Pei,et al.  Auxiliary Metadata Delivery in View Synthesis Using Depth No Synthesis Error Model , 2015, IEEE Transactions on Multimedia.

[13]  Ahmed N. Abdalla,et al.  Robust Image Watermarking Theories and Techniques: A Review , 2014 .

[14]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[15]  Héctor M. Pérez Meana,et al.  Improved unseen-visible watermarking for copyrigth protection of digital image , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[16]  Ja-Ling Wu,et al.  Unseen visible watermarking for color plus depth map 3D images , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  Jihah Nah,et al.  Digital Watermarking Robust to Geometric Distortions , 2012 .

[18]  Manuel Cedillo-Hernandez,et al.  Robust encoded spread spectrum image watermarking in contourlet domain , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[19]  Athanassios N. Skodras,et al.  Hybrid watermarking based on chaos and histogram modification , 2014, Signal Image Video Process..

[20]  Héctor M. Pérez Meana,et al.  Robust hybrid color image watermarking method based on DFT domain and 2D histogram modification , 2014, Signal Image Video Process..

[21]  Hung-An Chang,et al.  Stochastic Color Interpolation for Digital Cameras , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  Ja-Ling Wu,et al.  Unseen Visible Watermarking , 2007, 2007 IEEE International Conference on Image Processing.

[23]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[24]  Yan Shang,et al.  A new visible watermarking technique applied to CMOS image sensor , 2013, Other Conferences.

[25]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[26]  Xiaobo Jia,et al.  An Anti-geometric Digital Watermark Algorithm Based on Histogram Grouping and Fault-Tolerance Channel , 2011, IScIDE.

[27]  Chalee Vorakulpipat,et al.  Digital Watermarking: Techniques and Trends , 2016 .

[28]  Dai Jing-min New technology of infrared image contrast enhancement based on human visual properties , 2008 .

[29]  Ioannis Pitas,et al.  Circularly symmetric watermark embedding in 2-D DFT domain , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[30]  Mariko Nakano-Miyatake,et al.  Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras , 2017, Secur. Commun. Networks.

[31]  Chin-Chen Chang,et al.  Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism , 2013, Image Vis. Comput..

[32]  Soo-Chang Pei,et al.  A new 3D unseen visible watermarking and its applications to multimedia , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[33]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[34]  Seyed Mojtaba Mousavi,et al.  Watermarking Techniques used in Medical Images: a Survey , 2014, Journal of Digital Imaging.

[35]  Teddy Furon,et al.  A Quick Tour of Watermarking Techniques , 2016 .

[36]  Hector Perez-Meana,et al.  Digital Color Images Ownership Authentication via Efficient and Robust Watermarking in a Hybrid Domain , 2017 .

[37]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[38]  Alain Trémeau,et al.  Color in Image Watermarking , 2010 .

[39]  Pei-Yu Lin Imperceptible visible watermarking based on postcamera histogram operation , 2014, J. Syst. Softw..