Digital Watermarking

Author(s):  
Aidan Mooney

As Internet usage continues to grow, people are becoming more aware of the need to protect the display and presentation of digital documents. Digital watermarking offers a means to protect such documents. It works by embedding a piece of information into these documents – either visibly or invisibly – which can be detected or extracted from the document at a later stage to prove ownership of the document. This chapter will review, in detail, the process of digital image watermarking and will evaluate the different types of watermarks which may be used and the different techniques used to embed the watermarks. An examination of the domains used to embed the watermarks and some of the techniques used for detection of the embedded watermark are provided. Finally future trends within the area of digital watermarking are outlined.

2012 ◽  
Vol 546-547 ◽  
pp. 410-415
Author(s):  
Chun Ge Tang ◽  
Tie Sheng Fan ◽  
Lei Liu ◽  
Zhi Hui Li

A new blind digital watermarking algorithm based on the chain code is proposed. The chain code is obtained by the characteristics of the original image -the edge contour. The feather can reflect the overall correlation of the vector image, and chain code expression can significantly reduce the boundary representation of the amount of data required. For the watermarking embedding, the original vector image is divided into sub-block images, and two bits of the watermarking information are embedded into sub-block images repeatedly by quantization. For watermarking extracting, the majority decision method is employed to determine the size of the extracted watermark. Experimental results show that the image quality is not significantly lowered after watermarking. The algorithm can resist the basic conventional attacks and has good robustness on the shear attacks.


Author(s):  
Alessandro Piva ◽  
Roberto Caldelli ◽  
Alessia De Rosa ◽  
Mauro Barni ◽  
Vito Cappellini

The need to safeguard the property rights of multimedia content from unauthorized copying and the possibility to determine the true owners of the asset can be faced by resorting to efficient digital watermarking systems. This chapter presents a mathematical formulation to define a digital watermarking system and describes the general requirements to be satisfied, with more emphasis given to the aspects of security, robustness, and imperceptibility. After this general discussion, the two main classes of digital watermarking schemes, namely the spread-spectrum watermarking and the side-informed watermarking are explained by highlighting their main advantages and drawbacks. This analysis is completed by the description of a practical implementation of a digital image watermarking scheme. Finally, the use of watermarking systems in the framework of a DRM is deeply analyzed.


Author(s):  
Khaldoon Aldwairi ◽  
Meran M. Al-Hadidi

Digital watermarking can be defined simply as hiding a message in a digital image, song or video. Watermarking is widely being used for many applications.  In this paper a secure image watermarking algorithm using array extraction from the original image will be implemented on different types of images using MATLAB code.  The algorithm was proposed to send a message through an image by extracting 5 binary arrays of size (1x5) containing 1 and 0 from that used image, and then the binary arrays would be updated in a way that they can carry the secret message of 5 letters or less. In this paper the same algorithm will be implemented by extracting first, 5 binary arrays of size (1x5) containing 1 and 0 from that image to send a message composed of 5 numbers, each number of two digits. Then extracting 6 binary arrays of size (1x6) containing 1 and 0 from the same image, and the binary arrays also would be updated in a way that they can carry the secret message of 6 numbers, each number of two digits. Also this algorithm by extracting 5 arrays or 6 arrays will be implemented on different image format types to find out what is the suitable image format to be used in this algorithm, with no noticeable image distortion or loss in its size, to ensure the algorithm strength and security to send secret numbers or passwords through images. The same algorithm will be implemented to send secret numbers. First by using the first 25 pixels from any used image by extracting 5 binary arrays of size (1x5), then by using the first 36 pixels from the same used image by extracting 6 binary arrays of size (1x6) and making a comparison between both results using MATLAB.


Cyber Crime ◽  
2013 ◽  
pp. 587-599
Author(s):  
Nikos Tsirakis

This chapter describes image watermarking, the most common and widespread category of media files are images. The evolution of the Internet and the ease by which images can be duplicated and distributed has led to the need for effective copyright protection tools and techniques in order to provide a secure way to the producers and the owners of these media files. These techniques are described below with an introduction to information hiding. Various software products have been introduced with an aim to address these growing concerns; some categories are presented here. The fundamental technique which allows an individual to add hidden copyright notices or other verification messages to digital images is called digital image watermarking and constitutes the main part of the chapter. Finally authors provide future trends and directions of image watermarking.


2011 ◽  
Vol 271-273 ◽  
pp. 389-393
Author(s):  
Yan Ling Li ◽  
Yun Peng Zhang

The Digital Watermarking Technique Has Attracted Increased Interests on the past Decades. the General Framework of Robust Watermarking Is Described, and some Typical Robust Digital Image Watermarking Patents Are Surveyed in this Paper. the Main Principles and Functions of these Patents Are Reviewed and Discussed. then a Summarization about these Patents, the Challenge and Potential Research Directions in the Future Are Given Briefly.


Author(s):  
Nikos Tsirakis

This chapter describes image watermarking, the most common and widespread category of media files are images. The evolution of the Internet and the ease by which images can be duplicated and distributed has led to the need for effective copyright protection tools and techniques in order to provide a secure way to the producers and the owners of these media files. These techniques are described below with an introduction to information hiding. Various software products have been introduced with an aim to address these growing concerns; some categories are presented here. The fundamental technique which allows an individual to add hidden copyright notices or other verification messages to digital images is called digital image watermarking and constitutes the main part of the chapter. Finally authors provide future trends and directions of image watermarking.


This paper speaks to various Digital Watermarking systems which allows a person to include unseen copyright see just as some other confirmation messages to pictures with the goal that it very well may be shielded from the unapproved get to. The principle point of paper is to investigate the examination of different digital picture watermarking schemes and it likewise exhibits that all these watermarking strategies gives picture watermarking full protection and sensible limit. Here hybrid Image watermarking procedure which takes the benefits of various transforms like DWT, DCT, SVD and Arnold Transform, which improves greater security and gives heartiness to the watermark. In this paper technique, picture is separated into a few gatherings of edges, and one of the casings is chosen where watermark will be implanted. Before embed watermark in a choose casing it will be pre-handled with Arnold Transform which will give security to it.


Sign in / Sign up

Export Citation Format

Share Document