Open Access Open Access  Restricted Access Subscription or Fee Access

A Multi-Quadrant, Integrated and Secure Model of Multiple Watermarking

Vineet Mehan, Renu Dhir, Y. S. Brar

Abstract


Watermarking safeguards the copyright of digital images with its original owner. A watermarking model is projected by conjoining three distinct multiple watermarking approaches. The secure model is obtained by integrating multiple watermarking with the latest secure cryptographic algorithms. The proposed model will improve copyright protection, achieve large embedding capacity and provide a stronger association amongst image and watermark for integrity and authentication. The multiple watermarking model partitions the cover image into distinct quadrants. Different algorithm is applied to each Quadrant (Q) for inserting watermarks (W) and fingerprint in succession. Combinations of fragile and robust watermarks are embedded in frequency domain and spatial domain. Quantitative analysis of image quality parameters reveals the effectiveness of the proposed model. Simulation results demonstrate the robustness by launching a number of attacks like blurring, cropping, JPEG compression, median filtering, noising and scaling against the watermarks without affecting with the quality of the image.

Keywords


Composite fingerprinting, multiple watermarking, re-watermarking, segmented watermarking

Full Text:

PDF

References


K. Hill. A Perspective: The Role of Identifiers in Managing and Protecting Intellectual Property in the Digital Age. Proc. IEEE. 1999; 87: 1228–1238p.

B. Macq, J. Dittmann, E. J. Delp. Benchmarking of Image Watermarking Algorithms for Digital Rights Management. Proc. IEEE. 2004; 92: 971–984p.

A. M. Kampfer, H. Stogner, A. Uhl. Multiple Re-Watermarking Scenarios, in 13th IWSSIP. 2006; 53–56p.

N. P. Sheppard, R. S. Naini, P. Ogunbona. On Multiple Watermarking, in Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, Ottawa, Ontario, Canada: ACM. 2001; 3–6p.

J. H. Uhl, C. Koidl, A. Uhl. Multiple Blind Re-Watermarking with Quantisation-Based Embedding, in 18th IEEE (ICIP). 2011; 265–268p.

X. Feng, H. Zhang, H.-C. Wu, Y. Wu.A New Approach for Optimal Multiple Watermarks Injection. IEEE Signal Proc Let. 2011; 18: 575–578p.

NIST, Advanced Encryption Standard. FIPS. 2001; 1–47p.

NIST, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised). NIST SP. 2007; 1–114p.

L. Harn, W. J. Hsin, M. Mehta.Authenticated Diffie-Hellman Key Agreement Protocol Using a Single Cryptographic Assumption. IEE Proc-Comm. 2005; 152: 404–410p.

K. D. Akdemir, D. Karakoyunlu, B. Sunar. Non-Linear Error Detection for Elliptic Curve Cryptosystems. IET Inform Secur. 2012; 6: 28–40p.

NIST, Recommendation for Key Management–Part 1: General (Revised). NIST SP. 2007; 1–142p.

J. Hu. The Improved Elliptic Curve Digital Signature Algorithm, in International Conference on EMEIT. 2011; 257–259p.

NIST, Secure Hash Standard (SHS), FIPS. 2012; 1–30p.

J. R. Vacca. Computer and Information Security, Morgan Kaufmann Publishers, 2009.

NIST, Mathematical Routines for the NIST Prime Elliptic Curves. NSA. 2010; 1–43p.

X. Li, J. Chen, D. Qin, et al. Research and Realization Based on Hybrid Encryption Algorithm of Improved AES and ECC. ICALIP. 2010; 396–400p.

E. L. Tan, W. S. Gan, S. K. Mitra. Fast Arbitrary Resizing of Images in the Discrete Cosine Transform Domain. IET Image Process. 2011; 5: 73–86p.

J. Jeon, J. Lee, J. Paik. Robust Focus Measure for Unsupervised Auto-Focusing Based on Optimum Discrete Cosine Transform Coefficients. IEEE Trans. Consumer Electron. 2011; 57: 1–5p.

NIST, Secure Hash Standard (SHS). FIPS Pubs, 2008; 1–27p.

A. L. Varna, H. Shan, A. Swaminathan, et al. Fingerprinting Compressed Multimedia Signals. IEEE Trans. Inf. Forensics Security. 2009; 4: 330–345p.

L. Pei-Yu, L. Jung-San, C. Chin-Chen. Dual Digital Watermarking for Internet Media Based on Hybrid Strategies. IEEE Trans. Circuits Syst. Video Technol. 2009; 19: 1169–1177p.

J. A. Hussein. Spatial Domain Watermarking Scheme for Colored Images Based on Log-average Luminance. Journal of Computing. 2010; 2: 100–103p.

Q. Yang, Y. Zhang, C. Yang, et al. Information Entropy Used in Digital Watermarking, in SOPO. 2012; 1–4p.

Z. Wang, A. C. Bovik, H. R. Sheikh, et al. Image Quality Assessment: from Error Visibility to Structural Similarity. IEEE Trans Image Process. 2004; 13: 600–612p.

G. A. Sathishkumar, S. Ramachandran, K. B. Bagan. Image Encryption Using Random Pixel Permutation by Chaotic Mapping, in IEEE Symposium on Computers and Informatics. 2012; 247–251p.

P. Hong, L. Hung, L. Hua. A Novel Fractal Image Watermarking. IEEE Trans. Multimedia. 2006; 8: 488–99p.

L. Zhang, F. Qian, Y. Gao, et al. A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking, in International Colloquium on CCCM. 2008; 312–316p.

T. K. Tsui, X.-P. Zhang, D. Androutsos. Color Image Watermarking Using Multidimensional Fourier Transforms. IEEE Trans. Inf. Forensics Security. 2008; 3: 16–28p.


Refbacks

  • There are currently no refbacks.