A Novel Invisible Color Image Watermarking Scheme Using Image Adaptive Watermark Creation and Robust Insertion-Extraction

In this paper we present a robust and novel strategic invisible approach for insertion-extraction of a digital watermark, a color image, into color images. The novelty of our scheme lies in determining a perceptually important sub-image in the host image so that slight tampering of the sub-image will affect the aesthetic of the host image significantly. This eliminates the possibility of watermark removal, which in turn makes the watermark secure and robust. The other novel feature of our algorithm is the creation of a compound watermark image, called effective watermark, using the input user watermark (logo) and attributes of host image, which facilitates robust insertion-extraction processes. The effective watermark creation consists of two distinct phases: in the first phase, a statistical image is synthesized from a perceptually important sub-image of the host image and in the second phase, a compound image is created by fusing the input logo and synthetic statistical image. Results of exhaustive experimentation using standard benchmarks demonstrates the robustness and efficacy of our approach

[1]  Mohan S. Kankanhalli,et al.  A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[2]  Jerry D. Gibson,et al.  Distributions of the Two-Dimensional DCT Coefficients for Images , 1983, IEEE Trans. Commun..

[3]  Shih-Kun Huang,et al.  Cocktail Watermarking on Images , 1999, Information Hiding.

[4]  Deepa Kundur,et al.  Analysis and design of watermarking algorithms for improved resistance to compression , 2004, IEEE Transactions on Image Processing.

[5]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[7]  Deepa Kundur,et al.  Dual domain watermarking for authentication and compression of cultural heritage images , 2004, IEEE Transactions on Image Processing.

[8]  Mikhail J. Atallah,et al.  ViWiD : Visible Watermarking Based Defense Against Phishing , 2005, IWDW.

[9]  Shanq-Jang Ruan,et al.  Energy-Efficient Watermark Algorithm Based on Pairing Mechanism , 2005, KES.

[10]  Jack C. Lee,et al.  Toward on-line, worldwide access to Vatican Library materials , 1996, IBM J. Res. Dev..

[11]  Anthony J. Maeder,et al.  Automatic identification of perceptually important regions in an image , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[12]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[13]  Xiao Liu,et al.  New blind image watermarking in DCT domain , 2002, 6th International Conference on Signal Processing, 2002..

[14]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[15]  Bo Shen,et al.  Direct feature extraction from compressed images , 1996, Electronic Imaging.

[16]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[17]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.

[18]  Reginald L. Lagendijk,et al.  Watermarking by DCT coefficient removal: a statistical approach to optimal parameter settings , 1999, Electronic Imaging.