Digital Image Watermarking Techniques And Its Applications

DOI : 10.17577/IJERTV2IS3541

Download Full-Text PDF Cite this Publication

Text Only Version

Digital Image Watermarking Techniques And Its Applications

Tahera Akhtar Laskar1, K. Hemachandran2 1,2Department of Computer Science 1,2Assam University, Silchar, Assam, India

Abstract

In image watermarking, the hidden information is embedded into cover media to prove ownership. Copyright abuse is the motivating factor in developing new encryption technologies. One such technology is digital watermarking. The focus of this proposed research work will give emphasis on detail digital image watermarking techniques and its applications in various fields. Areas that will be covered are definition of digital watermarking, purpose, techniques, and types of watermarking attacks and its applications in digital image processing.

  1. Introduction

    The earliest forms of information hiding can actually be considered to be highly crude forms of private-key cryptography. Greek messengers had messages tattooed into their shave head, concealing the message when their hair finally grew back. Over time these primitive cryptographic techniques improved, increasing both speed, capacity and security of the transmitted message.

    The digital revolution has resulted in explosion of knowledge in todays technology-driven economy. It has resulted in encouragement and motivation for digitization of the intellectual artefact. Nowadays anybody can duplicate the digital data without other permissions. Thats why, it raises the awareness of the copyright problems in the e-commerce age. Digital watermarking is an approach or technique of embedding a hidden signal into digital contents( image, audio or video) to identify the legitimate owner, to tract unauthorized use or to intentional tampering of the original data or signal.

    During the last years, the world is rapidly becoming digital in many aspects. Among the most interesting of these aspects is multimedia. Many new technologies have come into our lives along with multimedia and one of the most recent is watermarking. Digital technology has offered users easy ways to create, process, and distribute digital assets. However, these facilities this may become disadvantages at the same time since it is also much easier to illegally copy and manipulate them. In 2000, the Motion Picture Association of America (MPAA) has calculated lost revenues for American motion picture companies from worldwide piracy to be of the amount $2.5 billion a year. Copyright protection is a very important subject but not the only one in which watermarking appears as one of the very promising solutions. In this communication, we are attempting to go back to the early beginning of this exciting new research field, make an overview of its history, discuss the applications and stakes involved, classify the proposed methods, present the problems and benchmarking tools and finally, try to peak into the future. Steganography or Stego as it is often referred to in the IT community, literally means, "covered writing" which is derived from the Greek language. Steganography is defined by Markus Kahn as follows, "Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to Cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second message present".

    In a digital world, Steganography and Cryptography are both intended to protect information from unwanted parties. Both Steganography and

    Cryptography are excellent means by which to accomplish this but neither technology alone is perfect and both can be broken. It is for this reason that most experts would suggest using both to add multiple layers of security. While encryption technologies can be used to prevent unauthorized access to digital content, it is clear that encryption has its limitations in protecting intellectual property rights: once a content is decrypted, theres nothing to prevent an authorized user from illegally replicating digital content. Some other technology was obviously needed to help establish and prove ownership rights, track content usage, ensure authorized access, facilitate content authentication and prevent illegal replication. This need attracted attention from the research community and industry leading to a creation of a new information hiding form, called Digital Watermarking. Basic idea is to create a metadata containing information about a digital content to be protected, and hide it within that content. The information to hide, the metadata, can have different formats. For example, it may be formatted as a character string or a binary image pattern. The metadata is first mapped into its bit stream representation, and then into a watermark, a pattern of the same type and dimension as the cover work, the digital content to be protected. The watermark is then embedded into the cover work. The embedded watermark should be imperceptible, and it should be robust enough to survive not only most common signal distortions, but also distortions caused by malicious attacks.

    Requirements and design of watermarking techniques are impacted by the different types of content in two major ways: imperceptibility and robustness requirements. The first challenge is designing a watermark embedding algorithm which provides an imperceptible mark, that is, one which does not noticeably degrade the original host signal. By taking advantage of psychovisual and psychoauditory properties, we can design effective watermarking schemes which remain transparent under particular conditions. Ideally, the marking algorithm should be adapted by using perceptual models appropriate for the different media types. The perceptual models used for representations of continuous tone images are not appropriate for text or graphics. The other factor for designing watermarking schemes for multimedia is the type of degradations that the watermark is expected to survive and system requirements for media specific applications. For instance, it may be desirable for a still image watermarking technique to be able to survive JPEG compression and photocopying while for some video

    watermarking applications, it may be important to do watermark embedding and detection in real time on a compressed bit stream. In the next section we describe watermarking for different media types including an overview of some sample algorithms proposed in the literature. This is followed by a description of a general framework for watermark embedding and watermark detection and decoding, outlining some of the differences for different applications. We then review some work on modeling the general watermarking problem and drawing parallels to communication and information theory to help understand the fundamental properties and limitations of a watermarking system. This work is very useful for future algorithm design and helping to define open areas of research. Lastly, we review and summarize future directions in this new and exciting area.

    DIGITAL WATERMARKING AND STEGANOGRAPHY:

    • Common:

      • Similar techniques applied to embed information into cover.

    • Differences:

    • Different fields of application result in different requirements.

    WATERMARK

    A watermark is a recognizable image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed y reflected light, at a dark background), caused by thickness or density variations in the paper.Encoding an identifying code into digitized music, video, image or other file is known as a digital watermark. Digital watermarking technique is thus implementing the concept of watermarking in digital media.

    DIGITAL WATERMARKING

    The term "digital watermark" was first coined in 1992 by Andrew Tirkel and Charles Osborne [2]. Actually, the term used by Tirkel and Osborne was originally used in Japan– from the Japanese– "denshi sukashi" — literally, an "electronic watermark"[3].

  2. Literature Review

    The idea of watermarking can be dated back to the late Middle Ages. The earliest use has been to record the manufactures trademark on the product so that

    authenticity could be easily established. The term "digital watermark" was first coined in 1992 by Andrew Tirkel and Charles Osborne [2]. Actually, the term used by Tirkel and Osborne was originally used in Japan– from the Japanese– "denshi sukashi"

    — literally, an "electronic watermark"[2]. A.Z.Tirkel et al. [1995] discuss the feasibility of coding a robust, undetectable, digital watermark on a standard 512*512 intensity image with an 8 bit gray scale image [3]. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation. J.J.K. O Ruanaidh et al. [1995] discuss the watermarking digital images for copyright protection. They have demonstatrated a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images [4]. Jian Zhao [1996] describes a digital watermarking service which allows the publisher and information provider to mark and identify their copyrighted materials through the World Wide Web (WWW) [5]. J.J.K. O Ruanaidh et al. [1997] describes an invisible mark embedded in a digital image which may be used for Copyright protection. The embedded marks are designed to be unaffected by any combination of rotation, scale and translation transformations. The original image is not required for extracting the embedded mark [6]. Jian Zhao et al. [1998] describe digital watermark for copyright protection, digital watermark for hidden annotation, digital watermark for proving authenticity, steganographic communication, functions and technical requirements [7]. M. Barni et al. [1998] derived a new watermarking algorithm for digital images is presented the method, which operates in the frequency domain, embeds a pseudo-random sequence of real numbers in a selected set of DCT coefficients. After embedding, the watermark is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility [8]. Nasir Memon et al. [1998] describe protecting digital media content and Watermark insertion integrates the input image and a watermark to form the output watermarked image. Watermark extraction uncovers the watermark in watermarked images, a technique usually applicable in verification watermarks [9]. Saraju Prasad Mohanty[1999] describe the four algorithms appear under the following headings in his thesis:

    • An Adaptive Visible Watermarking Technique for Image Data.

    • An Adaptive Visible Watermarking for Image Data in DCT Domain.

    • An Invisible Image Watermarking Technique in Spatial Domain.

    • A Spread Spectrum Watermarking Technique for Digital Images.

    The thesis concludes with a discussion of the advantages and disadvantages of the techniques proposed and the future directions of research [10].

    Juan R. Hernandez et al. [1999] addresses the problem of the performance analysis of image watermarking systems that do not require the availability of the original image during ownership verification. They focus on a statistical approach to obtain models that can serve as a basis for the application of the decision theory to the design of efficient detector structures. Special attention is paid to the possible nonexistence of a statistical description of the original image [11]. Ingemar J. Cox et al. [2000] describe a number of applications of digital watermarking and they examine the common properties of robustness, tamper resistance, fidelity, computational cost and false positive rate. They observe that these properties vary greatly depending on the application. Consequently, they conclude that evaluation of a watermarking algorithm is difficult without first indicating the context in which it is to be applied [12]. Ching-Yung Lin et al. [2000], in this thesis, they first propose robust digital signature methods that have proved to be useful for such types of content authentication. Also, they have developed a novel semi-fragile watermarking technique to embed the proposed robust digital signatures. They have implemented a unique Self- Authentication-and-Recovery Images (SARI) system, which can accept quantization-based lossy compression to a determined degree without any false alarms and can sensitively detect and locate malicious manipulations [13]. Chun-Shien Lu et al. [2001] they propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host images wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are embedded using cocktail watermarking and they can be blindly extracted without access to the host image. For the purpose of image protection, the new scheme guarantees that, no matter what kind of attack is encountered, at least one watermark can survive well. On the other hand, for the purpose of image authentication, our approach can locate the part of the image that has been tampered with and tolerate some incidental processes that have been executed [14]. Minya Chen et al. [2001], in this paper, they present an overview and summary of recent developments on this important topic, and discuss important issues such as robustness

    and data hiding capacity of the different techniques [15]. P.Tay et al. [2002], in this paper they propose a novel image watermarking scheme. This technique uses a 2-D discrete wavelet transform to decompose an image into various frequency channels. A scaled image is used as watermark and inserted into a mid- frequency wavelet channel. The watermark embedded image is produced by taking the inverse 2- D discrete wavelet transform of the altered wavelet decomposition. The image size, the non-zero scaling factor, the channel in which the watermark is inserted, and the wavelet transform filters can be used as security keys for the extraction of the inserted watermark. The propose watermark extraction technique is independent of the original image [16]. Bilge Gunsel et al. [2002], in this paper they introduce two spatial methods in order to embed watermark data into fingerprint images, without corrupting their features. The first method inserts watermark data after feature extraction, thus preventing watermarking of regions used for fingerprint classification. The method utilizes an image adaptive strength adjustment technique which results in watermarks with low visibility. The second method introduces a feature adaptive watermarking technique for fingerprints, thus applicable before feature extraction. For both of the methods, decoding does not require original fingerprint image. Unlike most of the published spatial watermarking methods, the proposed methods provide high decoding accuracy for fingerprint images. High data hiding and decoding performance for color images is also observed [17]. Vassilis E. Fotopoulos et al. [2003], derives copyright protection is a very important subject but not the only one in which watermarking appears as one of the very promising solutions. In this communication, they have attempted to go back to the early beginning of this exciting new research field make an overview of its history, discuss the applications and stakes involved, classify the proposed methods, present the problems and benchmarking tools and finally, try to peak into the future [18]. Saraju P. Mohanty et al. [2003], in this paper, they develop hardware system that can insert both robust and fragile invisible watermarks in images. The hardware module can be easily incorporated into a JPEG encoder to develop a secure JPEG encoder. A prototype chip is implemented using 0.35µ CMOS technology. According to them, this is the first watermarking chip implementing both invisible-robust and invisible-fragile watermarking capabilities [19]. Chang-Chou Lin et al. [2004], they work a novel approach to secret image sharing based on a ok; nP-threshold scheme with the additional capabilities of steganography and authentication is

    proposed [20]. Vidyasagar M. Potdar et al. [2005] present a detailed survey of existing and newly proposed steganographic and watermarking techniques [21]. G. Coatrieux et al. [2006] focus on the complementary role of watermarking with respect to medical information security and management [22]. Benoit Macq et al. [2007] discuss the issues related to image watermarking benchmarking and scenarios based on digital rights management requirements [23]. A new robust digital image watermarking algorithm based on Joint DWT-DCT Transformation is proposed by Saeed K. Amirgholipour et al. [2008] [24]. Two modified image adaptive watermarking techniques based on multi-scale morphological segmentation are presented by B. S. Anami et al. [2011] [25]. M. Kaur et al. [2012] aim to present a survey on different types of digital watermarks and methods to do image watermarking [26].

    The main reason for development of digital watermarking research is the endeavor for coming up with innovations to protect intellectual properties of the digital world. This is because the recent technological advancement in generation, storage, and communication of digital content has created/generated problems like copying the digital contents without any constraints, forgery, and editing without any prohibitive professional efforts. The absence of protecting techniques makes it doubtful to use the digital communication system in medical, business, and military applications. Watermarking is one of the most common solutions to make the data transferring

    secure from the illegal interference.

  3. Definition of Digital Watermarking

    Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the identity of its owners, in the same manner as paper bearing a watermark for visible identification. In digital watermarking, the signal may be audio, pictures, or video. If the signal is copied, then the information also is carried in the copy (Yeung, Yeo, & Holliman, 1998). The concept of digital watermarking is associated with steganography.

    Steganography is defined as covered writing. It has a long history of being associated with methods of secret communication. Steganography does not immediately arise the suspicion of something secret or valuable. Instead, it hides an important message in an unimportant one. Therefore, digital watermarking is a way to hide a secret or personal message to

    protect a products copyright or to demonstrate data integrity (Voyatzis & Pitas, 1999).

    In visible digital watermarking, the information is visible in the picture or video. Typically, the information is text or a logo, which identifies the owner of the media. The image on the right has a visible watermark. When a television broadcaster adds its logo to the corner of transmitted video, this also is a visible watermark.

    1. Digital Image Watermarking Techniques

      The most important properties of any digital watermarking techniques are robustness, security, imperceptibility, complexity, and verification. Robustness is defined as if the watermark can be detected after media (normal) operations such as filtering, lossy compression, color correction, or geometric modifications. Security means the embedded watermark cannot be removed beyond reliable detection by targeted attacks. Imperceptibility means the watermark is not seen by the human visual system. Complexity is described as the effort and time required for watermark embedding and retrieval. Lastly, verification is a procedure whereby there is a private key or public key function (Dittmann, Mukherjee, & Steinebach, 2000).

      Each of these properties must be taken into consideration when applying a certain digital watermarking technique. The following sections describe a few of the most common digital watermarking techniques.

    2. Spatial and Frequency Domain

      Spatial and frequency domain watermarking are applied to graphic images and text. Spatial domain watermarking slightly modifies the pixels of one or two randomly selected subsets of an image. Modifications might include flipping the low-order bit of each pixel. However, this technique is not reliable when subjected to normal media operations such as filtering or lossy compression (Berghel, 1998).

      Frequency domain watermarking technique is also called transform domain. Values of certain frequencies are altered from their original. Typically, these frequency alterations are done in the lower frequency levels, since alternations at the higher frequencies are lost during compression. The watermark is applied to the whole image so as not to be removed during a cropping operation. However, there is a tradeoff with the frequency domain technique. Verification can be difficult since this watermark is applied indiscriminately across the whole image (Berghel, 1998).

        1. Attacks

          Digital watermarking does not have the same capability or level of security as data encryption. It does not prevent the viewing or listening of content, nor does it prevent accessing that content. Therefore, digital watermarking is not immune to hacker attacks (Yeung et al., 1998). The following are some intentional attacks on watermarks (Cox, Miller, & Bloom, 2000).

          • Active Attacks hacker tries to remove the watermark or make it undetectable. An example is to crop it out.

          • Passive Attacks hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done.

          • Collusion Attacks hacker uses several copies of one piece of media, each with a different watermark, to construct a copy with no watermark.

          • Forgery Attacks hacker tries to embed a valid watermark of their own rather than remove one.

          • Distortive Attacks hacker applies some distortive transformation uniformly over the object in order to degrade the watermark so that it becomes undetectable/unreadable (Collberg & Thomborson, 1999).

        1. Choice of Watermark-Object

          The first question we need to ask with any watermarking or stenographic system, is what form will the embedded message take? The most straight- forward approach would be to embed text strings into an image, allowing an image to directly carry information such as author, title, dateand so forth. The drawback however to this approach is that ASCII text in a way can be considered to be a form of LZW compression, which each letter being represented with a certain pattern of bits. By compressing the watermark-object before insertion, robustness suffers.

          Due to the nature of ASCII codes, a single bit error due to an attack can entirely change the meaning of that character, and thus the message. It would be quite easy for even a simple task such as JPEG compression to reduce a copyright string to a random collection of characters. Rather then characters, why not embed the information in an already highly redundant form, such as a raster image? Not only do images lend themselves to image watermarking applications, but the properties of the HVS can easily be exploited in recogniton of a degraded watermark.

          There are different watermarks are used, based on the theoretical and experimental information capacity of

          the watermarking algorithm, as shown in figures 1,2 and 3.

          Figure 1 – Ideal Watermark-Object vs. Object with 25% Additive Gaussian Noise

          Figure 2 – Small Watermark (12 x 9 pixels)

          Figure 3 – Normal Watermark (50 x 20 pixels)

          Note that despite the high number of errors made in watermark detection, the retrieved watermark is still highly recognizable.

        2. Purpose of Digital Watermarking

          Watermarks added to digital content serve a variety of purposes. The following list details six purposes of digital watermarking (Memon & Wong, 1998).

          • Ownership Assertion to establish ownership of the content (i.e. image)

          • Fingerprinting to avoid unauthorized duplication and distribution of publicly available multimedia content

          • Authentication and integrity verification the authenticator is inseparably bound to the content whereby the author has a unique key associated with the content and can verify integrity of that content by extracting the watermark

          • Content labeling bits embedded into the data that gives further information about the content such as a graphic image with time and place information

          • Usage control added to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD)

          • Content protection content stamped with a visible watermark that is very difficult to

      remove so that it can be publicly and freely distributed.Unfortunately, there is not an universal watermarking technique to satisfy all of these purposes (Memon & Wong, 1998). The content in the environment that it will be used determines the digital watermarking technique.

  4. Applications Of Digital Watermarking

    One application of watermarking is in copyright protection systems, which are intended to prevent or deter unauthorized copying of digital media. In this use, a copy device retrieves the watermark from the signal before making a copy; the device makes a decision whether to copy or not, depending on the contents of the watermark. Another application is in source tracing. A watermark is embedded into a digital signal at each point of distribution. If a copy of the work is found later, then the watermark may be retrieved from the copy and the source of the distribution is known. This technique reportedly has been used to detect the source of illegally copied movies. Annotation of digital photographs with descriptive information is another application of invisible watermarking.

    Digital watermarking may be used for a wide range of applications, such as:

    1. Copyright Protection:

      When a new work is produced, copyright information can be inserted as a watermark. In case of dispute of ownership, this watermark can provide evidence.

    2. Broadcast Monitoring:

      This application is used to monitor unauthorized broadcast station. It can verify whether the content is really broadcasted or not.

    3. Tamper Detection:

      Fragile watermarks are used for tamper detection. If the watermark is destroyed or degraded, it indicates presence of tampering and hence digital content cannot be trusted.

    4. Authentication and Integrity Verification:

      Content authentication is able to detect any change in digital content. This can be achieved through the use of fragile or semi-fragile watermark which has low robustness to modification in an image.

    5. Fingerprinting:

      Fingerprints are unique to the owner of digital content and used to tell when an illegal copy appeared.

    6. Content Description:

      This watermark can contain some detailed information of the host image such as labelling and captioning. For this kind of application, capacity of watermark should be relatively large and there is no strict requirement of robustness.

    7. Covert Communication:

      It includes exchange of messages secretly embedded within images. In this case, the main requirement is that hidden data should not raise any suspicion that a secret message is being communicated.

  5. Conclusion

In this review paper, an attempt has been made to study the Digital Image Watermarking Techniques and its applications in digital image processing. Some of the applications of Image Watermarking are described. The review was conducted to study the different suitable areas of Digital Image Watermarking and its applications in digital image processing.

References

  1. Christine I. Podilchuk and Edward J. Delp,Digital Watermarking Algorithms and Applications, IEEE SIGNAL PROCESSING MAGAZINE, JULY 2001.

  2. A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. Electronic Water Mark. DICTA 93, Macquarie University. p.666-673

  3. A.Z.Tirkel, R.G.van Schyndel, C.F.Osborne, A TWO-DIMENSIONAL DIGITAL WATERMARK, DICTA 95, Macquarie University.

  4. Jian Zhao, A WWW SERVICE TO EMBED AND PROVE DIGITAL COPYRIGHT WATERMARKS, In: Proc. of the European Conference on Multimedia Applications, Services and techniques, Louvain-La-Neuve, Belgium, May 1996.

  5. J.J.K. O Ruanaidh,W.J. Dowling, F.M. Boland,Watermarking Digital Images for Copyright Protection, IEEE, 1995.

  6. Joseph J.K. O Runaidh and Thierry Pun, Rotation.Scale and Translation Invarient Digital Image Watermarking,Submitted to Signal Processing,21 August 1997.

  7. Jian Zhao, Eckhard Koch, and Chenghui Luo, In Business Today and Tomorrow, COMMUNICATIONS OF THE ACM July 1998/Vol. 41, No. 7.

  8. Mauro Barni, Franco Bartolini, Vito Cappellini, and Alessandro Piva, A DCT-domain system for robust image watermarking,. Signal Processing 66 (1998) p.357-372.

  9. Nasir Memon and Ping Wah Wong, Protecting Digital MediaContent,COMMUNICATIONS OF THE ACM July 1998/Vol. 41, No. 7.

  10. Saraju Prasad Mohanty, A Project Report Submitted in Partial Fulfillment of the Requirement for the degree of Master of Engineering In System Science and Automation, Department of Electrical Engineering INDIAN INSTITUE OF SCIENCE, JANUARY, 1999.

  11. JUAN R. HERNANDEZ, AND FERNANDO PEREZ-GONZA LEZ, Statistical Analysis of Watermarking Schemes for Copyright Protection of Images, PROCEEDINGS OF THE IEEE, VOL. 87, NO. 7, JULY 1999.

  12. Ingemar J. Cox, Matt L. Miller and Jeffrey A. Bloom, Watermarking applications and their properties, the proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2000, March 27-29, 2000, Las Vegas, Nevada.

  13. Ching-Yung Lin, Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection, Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences Columbia University, 2000.

  14. Chun-Shien Lu and Hong-Yuan Mark Liao, MultipurposeWatermarking for Image Authentication and Protection, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 10, p.1579-1592, OCTOBER 2001.

  15. Minya Chen, Edward K. Wong, Nasir Memon and Scott Adams, Recent Developments in Document Image Watermarking and Data Hiding, Department of Computer and Information Science Polytechnic University 5 Metrotech Center,Brooklyn, NY 11201, 2001.

  16. P.Tay and J.P. Havlicek, Image Watermarking Using Wavelets,Copyright@IEEE,2002.

  17. Bilge Gunsel, Umut Uludag, A. Murat Tekalp, Robust watermarking of "fingerprint images, 0031- 3203/02/$22.00 2002 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved. PII: S0031-3203(01)00250-3,2002.

  18. Vassilis E. Fotopoulos and Athanassios N. Skodras, Digital Image Watermrking: An Overview, European Association for Signal, Speech, and Image Processing, ISSN 1687-1421, Volume 14, Number 4, December 2003.

  19. Saraju P. Mohanty, N. Ranganathan and Ravi K. Namballa, VLSI IMPLEMENTATION OF INVISIBLE DIGITAL WATERMARKING ALGORITHMS TOWARDS THE DEVELOPMENT OF A SECURE JPEG ENCODER,2003.

  20. Chang-Chou Lin, Wen-Hsiang Tsai, Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405414.

  1. Basavaraj. S. Anami, J.D.Pujari, Rajesh. Yakkundimath, Multi-Scale Morphological Image Segmentation Based Modified Watermarking Techniques,International Journal of Graphics & Image Processing, Vol1 issue 1 August 2011.

  2. Manpreet Kaur, Sonika Jindal,Sunny Behal, A STUDY OF DIGITAL IMAGE WATERMARKING, International Journal of Research in Engineering & Applied Sciences,2012.

  3. Bret Dunbar, A detailed look at Steganographic Techniques and their use in an Open-Systems Environment© SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights.

  4. Donovan Artz, Digital Steganography:Hiding Data within Data, IEEE INTERNET COMPUTING, http://computer.org/internet/,MAY , JUNE 2001.

  5. Edin Muharemagic and Borko Furht, Survey Of Watermarking Techniques And Applications.

  6. Vassilis E. Fotopoulos and Athanassios N. Skodras, Digital ImageWatermarking: An Overview.

  1. Vidyasagar M. Potdar, Song Han, Elizabeth Chang, A Survey of Digital Image Watermarking Techniques, 3rd International Conference on Industrial Informatics(INDIN 2005)

    ©2005 IEEE.

  2. G. Coatrieux, L. Lecornu, Ch. Roux, B. Sankur, A Review of Image Watermarking Applications in Healthcare,2006.

  3. BENOIT MACQ, JANA DITTMANN, AND EDWARD J. DELP, Benchmarking of Image Watermarking Algorithms for Digital Rights Management, PROCEEDINGS OF THE IEEE, VOL. 92, NO. 6, JUNE 2007 971.

  4. Saeed K. Amirgholipour ,Ahmad R. Naghsh- Nilchi, Robust Digital Image Watermarking Based on Joint DWT-DCT, International Journal of Digital Content Technology and its Applications,Volume 3, Number 2, June 2009.

Leave a Reply