A Blind Digital Watermarking for PDF Document

2013 ◽  
Vol 392 ◽  
pp. 1006-1009
Author(s):  
Qing Chen ◽  
Qi Wen Hu ◽  
Shao Kun Feng ◽  
Ze Fu

In this paper, a text blind watermarking is proposed and implemented for copyright protection. Based on the characteristics of PDF format, this algorithm uses character spacing coding throughout whole PDF document to embed watermark into it. Robustness and security is further increased by using synchronous coding, cycle encryption and majority decision. Watermark embedding and extracting are implemented under the software environment of VC++ 6.0, and performances are tested and analyzed. Experiments show that the algorithm has good transparency, large capacity and good robustness. It can apply to both of Chinese and English PDF documents.

2012 ◽  
Vol 503-504 ◽  
pp. 23-26 ◽  
Author(s):  
Jun Xiang Wang ◽  
Li Fu

The traditional digital watermarking, as a copyright protection technique, has been widely applied for the multimedia information, such as text, picture, video, etc. In this paper, a new scheme is planned to embed watermark into the porcelain decal for describing the property declaration of Jingdezhen ceramics. Since the images on Jingdezhen ceramic are manually created, it cannot be regularly modulated by the watermark during the watermark embedding process. Therefore, the digital watermarking technique cannot be directly applied to the ceramics. This paper presents a specially designed digital watermarking system for the protection of the ceramic property. The results from the experiment show that our proposed algorithm achieves the purpose.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


2012 ◽  
Vol 433-440 ◽  
pp. 2504-2508 ◽  
Author(s):  
Li Li Li ◽  
Jin Guang Sun

In this paper it proposes a meaningful digital watermarking algorithm for remote sensing image based on DFT and watermarking segmentation. At First, it normalizes the host remote sensing image and determines an invariant centroid, then selects a square area around the invariant centroid for watermark embedding. Next, it generates a pseudo-random sequence as digital watermarking, and divides it into two parts. Finally it applies DFT to the selected region and embeds watermark into DFT phase and amplitude components of the selected square area of the host remote sensing image. Experiments have shown the algorithm’s characteristics of good robustness, simple calculation, easy realization, and extracting watermark without the original remote sensing image, and it has value of copyright protection for remote sensing images.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Amin Banitalebi-Dehkordi ◽  
Mehdi Banitalebi-Dehkordi ◽  
Jamshid Abouei ◽  
Said Nader-Esfahani

Digital watermarking is extensively used in ownership authentication and copyright protection. In this paper, we propose an efficient thresholding scheme to improve the watermark embedding procedure in an image. For the proposed algorithm, watermark casting is performed separately in each block of an image, and embedding in each block continues until a certain structural similarity threshold is reached. Numerical evaluations demonstrate that our scheme improves the imperceptibility of the watermark when the capacity remains fixed, and at the same time, robustness against attacks is assured. The proposed method is applicable to most image watermarking algorithms. We verify this issue on watermarking schemes in discrete cosine transform (DCT), wavelet, and spatial domain.


2019 ◽  
Vol 8 (3) ◽  
pp. 7284-7288

Digital watermarking has emerged as a potential solution to copyright-related issues of digital data. A novel, highly secure robust digital watermarking method using DWT-SVD is presented in this paper. Instead of using the conventional watermark embedding process where the watermark gets embedded over the entire host image, the coefficients for embedding the watermark inside the host image has been identified in this proposed method. Such selection of pixels used for insertion of watermark makes this algorithm highly secure, robust, and imperceptible. The experimental results demonstrate the efficiency of the proposed method in aspects of high robustness and good imperceptibility


2012 ◽  
Vol 60 (2) ◽  
pp. 317-321 ◽  
Author(s):  
P. Lipiński

Abstract. Recently, a variety of digital watermarking schemes have been developed for copyright protection of digital images. In robust watermarking, which is used in copyright protection, transform-based algorithms are used to ensure resilience of the watermark to common signal processing attacks. The most frequently used watermarking algorithms for additive watermark embedding involve DCT, DFT, SVD and DWT domains. In this article we verify which domain is optimal for robust, the additive watermark embedding scheme. We demonstrate that in additive watermark embedding the embedding domain plays more important role than the embedding formula.


2013 ◽  
Vol 321-324 ◽  
pp. 2609-2612
Author(s):  
Yan Liang ◽  
Gao Yan ◽  
Chun Xia Qi

Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia data in a networked environment. It makes possible to tightly associated to a digital document a code allowing the identification of the data creator, owner, authorized consumer, and so on. In this paper a new DCT-domain system for digital watermarking algorithm for digital images is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of scrambled image in a selected set of DCT coefficients. After embedding, the watermark is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility. By exploiting the statistical properties of the embedded sequence, the mark can be reliably extracted without resorting to the original uncorrupted image. Experimental results demonstrate that the watermark is robust to several signal processing techniques, including JPEG compression, cut, fuzzy, addition of noise, and sharpen.


Author(s):  
Hiroaki Date ◽  
Satoshi Kanai ◽  
Takeshi Kishinami

Abstract Recently, much interest is being taken in a method to protect the copyright of digital data and prevent illegal duplication of it. However, in the area of CAD/CAM and CG, there are no effective ways to protect the copyright of the 3D geometric models. As a first step to solve this problem, a new digital watermarking method for 3D polygonal models is introduced in this paper. Watermarking is one of the copyright protection methods where an invisible watermark is secretly embedded into the original data. The proposed watermarking method is based on the wavelet transform (WT) and multi-resolution representation (MRR) of the polygonal model. The watermark can be embedded in the large wavelet coefficient vectors at various resolution levels of the MRR. This makes the embedded watermark imperceptible and invariant to the affine transformation, and also makes the control of the geometric error caused by the watermarking reliable.


2007 ◽  
Vol 26 (4) ◽  
pp. 319-330 ◽  
Author(s):  
Ming-Chiang Hu ◽  
Der-Chyuan Lou ◽  
Ming-Chang Chang

Sign in / Sign up

Export Citation Format

Share Document