Use of both Invisible and Emergable Watermarks to Deter Illegal Copying of Images

Abstract Emergable watermarks become visible in content that has been copied under designated conditions so that their use should deter illegal copying. However, the message presented by an emerged watermark is easily removed from the copied content because it is visible to the copier. One way to overcome this problem is to also use invisible watermarks which are robust against removal. However, mutual interference caused by embedding two different types of watermarks would degrade the performance of both types. A method has thus been developed in which frequency filtering is used to divide the content into two types of region, one for embedding an emergable watermark and one for embedding invisible one. The emergable one is embedded in a plain large region with low spatial frequency while the invisible one is not. Experimental evaluation demonstrated that the image quality of an image with watermarks embedded by using the proposed method was improved better than that of an image watermarked using the previous method for embedding only emergable watermarks.

[1]  Roger D. Hersch,et al.  Mathematical moiré models and their limitations , 2010 .

[2]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[3]  Minghui Shi,et al.  Dual Image Watermarking Algorithm Based on Block Truncation Code , 2012 .

[4]  Takaaki Yamada,et al.  Use of "Emergable Watermarks" as Copy Indicators for Securing Video Content , 2011, IWDW.

[5]  Roger D. Hersch,et al.  Band moiré images , 2004, SIGGRAPH 2004.

[6]  Takaaki Yamada,et al.  Video watermark application for embedding recipient ID in real-time-encoding VoD server , 2013, Journal of Real-Time Image Processing.

[7]  Zheng-bing Zhang,et al.  Digital Image Watermarking Using Iterative Blending Based on Wavelet Technique , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[8]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[9]  D. D. Kamble,et al.  OPTICAL WATERMARKING FOR PRINTED DOCUMENT AUTHENTICATION , 2012 .

[10]  Heung-Kyu Lee,et al.  Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents , 2008, IEICE Trans. Inf. Syst..

[11]  Sud Sudirman,et al.  A robust region-adaptive dual image watermarking technique , 2012, J. Vis. Commun. Image Represent..

[12]  Sang Ho Kim,et al.  Embedding positional-independent hidden data into hardcopy , 2011, Pattern Recognition and Image Analysis.

[13]  Andreas Uhl,et al.  An Efficient Robust Watermarking Method Integrated in H.264/SVC , 2012, Trans. Data Hiding Multim. Secur..

[14]  R. L. van Renesse,et al.  Paper based document security-a review , 1997 .