Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography

Advancement in communication medium is producing large volume of digital information which needs to be protected. Watermarking is a technique that is used to hide secret signal into digital signal in a manner that does not reduce overall quality of the original signal. In relation to digital image watermarking, another area that is drawing attention is the multiple watermarking, where more than one watermark is embedded into single multimedia object. Multiple watermarks are normally proposed as a method to provide extra security to an image by embedding two or more secret messages into the cover image. In the present research work, the concept of multiple watermarking is used to hide both copyright and authentication information into a color image. For this purpose a wavelet transformation based on texture properties and secret sharing us ing visual cryptography is used. Experimental results indicate that the proposed watermarking scheme is highly robust and does not degrade the original signal. General Terms Steganography, Cryptography, Watermarking.

[1]  Ton Kalker,et al.  Streaming video and rate-scalable compression: What are the challenges for watermarking? , 2001, IS&T/SPIE Electronic Imaging.

[2]  Luiz Velho,et al.  Stochastic screening dithering with adaptive clustering , 1995, SIGGRAPH.

[3]  Nalini K. Ratha,et al.  Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.

[4]  Wen-Yuan Chen,et al.  Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique , 2006 .

[5]  Annalisa De Bonis,et al.  Randomness in secret sharing and visual cryptography schemes , 2004, Theor. Comput. Sci..

[6]  Philip Ogunbona,et al.  On multiple watermarking , 2001, MM&Sec '01.

[7]  Ioannis Pitas,et al.  Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution , 2001, IEEE Trans. Image Process..

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[10]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[11]  Ching-Nung Yang,et al.  A Note on Efficient Color Visual Encryption , 2002, J. Inf. Sci. Eng..

[12]  Jianhua Sun,et al.  Multiple Watermarking Relational Databases Using Image , 2008, 2008 International Conference on MultiMedia and Information Technology.

[13]  Mauro Barni,et al.  Managing Copyright in Open Networks , 2002, IEEE Internet Comput..

[14]  L. Kamoun,et al.  A new medical image watermarking scheme for a better telediagnosis , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[15]  Mauro Barni,et al.  Robust video watermarking for wireless multimedia communications , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[16]  Aree Ali Mohammed,et al.  Efficient Video Watermarking Using Motion Estimation Approach , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.

[17]  Sotiris Pavlopoulos,et al.  A medical image watermarking scheme based on wavelet transform , 2003, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439).

[18]  Yuefeng Zhang,et al.  Space-filling curve ordered dither , 1998, Comput. Graph..

[19]  Arivazhagan Selvaraj,et al.  Texture classification using wavelet transform , 2003, Pattern Recognit. Lett..

[20]  Jiang Xuehua Digital Watermarking and its Application in Image Copyright Protection , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.

[21]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[22]  Xingming Sun,et al.  Multi-mark: Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks , 2011 .

[23]  Lahouari Ghouti,et al.  Protecting Fingerprint Data Using Watermarking , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[24]  Yuefeng Zhang Adaptive Ordered Dither , 1997, CVGIP Graph. Model. Image Process..

[25]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[26]  Kyung-Ae Moon,et al.  A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[27]  Gordon W. Braudaway,et al.  If one watermark is good, are more better? , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[28]  Michael Shneier,et al.  Exploiting the JPEG Compression Scheme for Image Retrieval , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[29]  Shahrokh Ghaemmaghami,et al.  A Digital Image Watermarking Scheme Based on Visual Cryptography , 2005 .

[30]  Jeng-Shyang Pan,et al.  Multiple Watermarking in Visual Cryptography , 2008, IWDW.

[31]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[32]  Oscar C. Au,et al.  Novel blind multiple watermarking technique for images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[33]  Ying Weng,et al.  Robust multiple watermarking in color images with correlation coefficient detector , 2008 .

[34]  Xiushan Nie,et al.  A Blind Video Watermarking Scheme Based on DWT , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[35]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[36]  L. W. Hawkes,et al.  An Application of Visual Cryptography To Financial Documents , 2000 .

[37]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[38]  Wen-Yuan Chen,et al.  Multiple-watermarking scheme for still images using the discrete cosine transform and modified code division multiple-access techniques , 2006 .

[39]  Long-Wen Chang,et al.  Visual Cryptography for Digital Watermarking in Still Images , 2004, PCM.

[40]  B. B. Amberker,et al.  Watermarking Scheme for Color Images using Wavelet Transform based Texture Properties and Secret Sharing , 2010 .

[41]  S. Behnia,et al.  Multiple-watermarking scheme based on improved chaotic maps , 2010 .