Image watermarking has become a popular technique for authentication and copyright protection with the development of Internet and computer. However, current image watermarking approaches especially blind techniques are not strongly robust with respect to attacks or combinations of several attacks. In this paper a new intelligent second generation blind image watermarking technique is proposed, which adopts independent component analysis (ICA) for watermarking process. The characteristics of the human visual system (HVS) are incorporated into the watermark embedding, so that the watermark can be adaptive to the protected image. The edge of original image which extracted by Sobel operator is used as watermark in this paper. The watermark is rearranged by chaotic before watermark embedding in order to enhance the robustness of watermarking and the embedding process can be performed in any image domain, including spatial and transform domain. Watermark can be extracted correctly not merely be detected without any information about the original image and original watermark, and the accuracy of watermark extraction depends on the statistical independence between the original image, original watermark and the key. This proposed intelligent system can also extract multiple watermarks embedded in the test image one by one. Experimental results demonstrate that the proposed intelligent second generation watermarking technique based on ICA is robust with respect to attacks produced by popular watermark test software - Stirmark, including rotation, scaling, translation, skew, cropping, filtering, image compression, and combined attacks.
In this paper, a scheme which following the second generation watermarking paradigm is proposed. The goal of this proposed scheme is basically to increase the robustness against geometric attacks. The host image is decomposed with the wavelet packet. The bit stream of binary watermark is coded into several patterns with salient feature. The circular feature is used in this paper, because: (a) the computational complexity of the method grows rapidly with more complex shapes. (b) circle is rotation-invariant and partially scale-invariant. (c) circular feature can be detected by Hough transform effectively. These patterns are embedded into wavelet packet coefficients according to human perceptual characteristics. A new HVS mask based on wavelet transform is proposed with consideration of local texture characteristics. The introduction of HVS characteristics boosts the performance of the whole scheme. For the detection of watermark, the geometric distortion is calibrated for the contaminated watermarked image. Hough transform is used to detect the circular features in the WP Coefficients. This scheme has the following characteristics: (a) robustness against the common geometric attacks(rotation, scaling, cropping, and etc) is improved significantly. (b) human perceptual characteristics is taken into consideration, so the tradeoff between invisibility and robustness is improved. Results of extensive experiments indicate that this proposed scheme is significantly effective in resisting various geometric attacks such as rotation, scaling, JPEG compression, adding noise, etc.
KEYWORDS: Digital watermarking, Wavelets, Complex systems, Wavelet transforms, Signal generators, Tolerancing, Binary data, Chromium, Information security, Digital imaging
Multiple digital watermarking technique can resolve the problems of multiple copyright claim and keep the traces of digital products in the different phase of publishing, selling and using. In this paper, a multiple digital watermarking algorithm based on chaotic sequences is proposed. The chaotic sequences have the advantages of massive, high security, and weakest correlation. The massive and independent digital watermark signals are generated through 1-D chaotic maps, which are determined by different initial conditions and parameters. The chaotic digital watermark signals effectively resolve the construction of massive watermarks with good performance. The capacity of the multiple watermarking is also analyzed in this paper. The length of the watermark can be selected adaptively according to the number of the watermarks. Multiple digital watermarking algorithm is more complex than the single watermarking algorithm in the embedding method. The principal problem is how to ensure that the late-coming watermark will not damage the embedded watermarks. Each watermark is added to the middle frequency coefficients of wavelet domain randomly by exploiting 2-D chaotic system, so the embedding and extracting of each watermark does not disturbed each other. Thinking of the parameters of 2-D chaotic system as the key to embedding procedure can prevent the watermarks to be removed malevolently, therefore the performance of security is better. The embedding algorithm based on noise analysis and wavelet transform is also exploited in this paper. To meet the transparence and robustness of the watermark, the watermark strength is adapted to the noise strength within the tolerance of wavelet coefficients. The experimental results demonstrate that this proposed algorithm is robust to many common attacks and the performance can satisfy the requirements in the application.
Most digital watermarking algorithms are not robust against geometric attacks. In this paper several improvements of watermarking algorithms are proposed. It may present additional advantages in terms of detection and recovery from geometric attacks by exploiting chaotic spread spectrum and synchronization techniques. These improvements come from three aspects. First, based on the randomness, noise like and extreme sensitivity to initial conditions of chaotic signal, chaotic sequence is exploited as spread spectrum code in the watermarking algorithms. The code spread from chaotic sequence has better performance than pseudo random code because it is massive, arbitrary length and high security. The robustness of the watermarking is improved greatly due to the original watermarking signal is modulated in broadband chaotic signal. Second, a synchronization code generated from chaotic sequence is inserted into the watermarking signal at specified intervals. A watermark cannot be detected correctly after geometric attacks because the synchronization information is lost in watermarking extracting. By locating the synchronization code, re-synchronization can be achieved. Hence, the watermark can be recovered furthest from geometric attacks. Third, the extracted watermark will be post processed with noise reduction filter in order to improve the accuracy of watermarking verification. Based on the characteristics of chaotic sequence, the noise signal can be separated from chaotic background by exploiting wavelet multi-scaling decomposition method. These improvements, which take full advantage of the characteristic of chaotic sequences, are feasible to resist geometric attacks. Experiment results demonstrate its effectiveness.
This paper represents a new spatial domain digital watermarking method, which can trade off between spatial domain and frequency domain approaches. This technique produces a watermarked image that closely retains the quality of the original host image while concurrently surviving various image processing operations such as lowpass/highpass filtering, lossy JPEG compression, and cropping. This image watermarking algorithm takes full advantage of permutation and 2-D barcode, which is PDF417 coding. The actual watermark embedding in spatial domain is followed using permutated image for improving the resistance to image cropping. Much higher robustness of watermark is obtainable via forward error correction (FEC) technique, which is the main feature of PDF417 codes. Additional features of this technique include the easy determination of the existence of the watermark and that the watermark verification procedure does not need the original host image.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.