The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


A Region Adaptive Robust Watermarking Scheme

#
 To counter the security breaches, came the need of watermarking which is one of the efficient methods to maintain the integrity of the digital content and prove the rightful ownership. Region adaptive watermarking is the technique which is based on the content of the image which is required to be protected against the various possible attacks. Homogeneity analysis of the image has been made using the quad tree base d image segmentation method to chalk out the approp riate sites for embedding the secret information. The information i s itself extracted from the image in terms of a feature which is hidden using the Singular Value Decomposition (SVD) proper ties in the cover image. The robustness of the proposed algorithm against the various attacks has been validated by a ttaining high Peak to Signal Noise Ratio (PSNR) and Normalized Cross Correlation (NCC) values in the experiments carried out.  


[1] Amirgholipour S. and Aboosaleh S., A Pre- Filtering Method to Improve Watermark Detection Rate in DCT Based Watermarking, The International Arab Journal of Information Technology , vol. 11, no. 2, pp. 178-185, 2014.

[2] Bangaleea R. and Rughooputh H., Effect of Channel Coding on the Performance of Spatial Watermarking for Copyright Protection, in Proceedings of the 6 th IEEE Africon Conference in Africa , pp. 149-153, 2002.

[3] Bao P. and Ma X., Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition, IEEE Transactions on Circuits and Systems for Video Technology , vol. 15, no. 1, pp. 96-102,2005.

[4] Barni M., Bartolini F., Rosa A., and Pivaa A., Optimum Decoding and Detection of Multiplicative Watermarks, IEEE Transaction Signal Processing , vol. 51, no. 4, pp. 1118-1123, 2003.

[5] Bas P., Chassery J., and Macq B., Geometrically Invariant Watermarking using Feature Points, IEEE Transactions on Image Processing, vol. 11, no. 9, pp. 1014-1028, 2002.

[6] Basso A., Bergadano F., Cavagnino D., Pomponiu V., and Vernone A., A Novel Block- Based Watermarking Scheme Using the SVD Transform, available at: mdpi.com/journal/algorithms, last visited 2009.

[7] Bovik A., Huang T., and Munson D., Robust Wavelet-based Video Watermarking using Edge Detection, Adv. Elect. Eng. Comp. Sci. , 399, pp. 173-182, 2009.

[8] Calagna M., Guo H., Mancini, L., and Jajodia, S., A Robust Watermarking System based on SVD Compression in Proceedings of ACM Symposium on Applied Computing, Dijon, France, pp. 1341-1347, 2006. 522 The International Arab Journal of Information Techn ology, Vol. 13, No. 5, September 2016

[9] Chandra D., Digital Image Watermarking using Singular Value Decomposition, in Proceedings of the 45 th Midwest Symposium on Circuits and Systems , pp. 264-272, 2002.

[10] Chang C., Hu Y., and Lin C., A Digital Watermarking Scheme Based on Singular Value Decomposition, in Proceedings of the 1 st International Symposium, ESCAPE 2007 , Hangzhou, China, pp. 82-93, 2007.

[11] Cox I., Killian J., Leighton F., and Shamoon T., Secure Spread Spectrum Watermarking for Multimedia, IEEE Transaction Image Processing , vol. 6, no. 12, pp. 1673-1687, 1997.

[12] Djurovic I., Stankovic S., and Pitas I., Digital Watermarking in the Fractional Fourier Transformation Domain, Journal of Network and Computer Applications , vol. 24, no. 2, pp. 167-173, 2001.

[13] Ganic E. and Eskicioglu A., Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies, in Proceedings of ACM Multimedia and Security Workshop (MM and SEC04 ), pp. 166-174, 2004.

[14] Ganic E., Zubair N., and Eskicioglu A., An Optimal Watermarking Scheme based on Singular Value Decomposition, in Proceedings of IASTED International Conference on Communication, Network and Information Security, New York, USA, pp. 1-6, 2003.

[15] Gorodetski V., Popyack L., and Samoilov V., SVD Based Approach to Transparent Embedding Data into Digital Images, in Proceedings of the International Workshop on Mathematical Methods , Models and Architectures for Computer Network Security , pp. 263-274, 2001.

[16] Hsieh M., Tseng D., and Huang Y., Hiding Digital Watermarks Using Multiresolution Wavelet Transform, IEEE Transactions on Industrial Electronics, vol. 48, no. 5, pp. 875- 882, 2001.

[17] Huang F. and Guan Z., A Hybrid SVD-DCT Watermarking Method based on LPSNR, Pattern Recognition Letters , vol. 25, no. 15, pp. 1769-1775,2004.

[18] Kim Y., and Oh I., Watermarking Text Document Images using Edge Direction Histograms, Pattern Recognition Letter , vol. 25, no. 11, pp. 1243-1251, 2004.

[19] Lee C. and Lee Y., An Adaptive Digital Image Watermarking Technique for Copyright Protection, IEEE Transactions on Consumer Electronic , vol. 45, no. 4, pp. 363-370, 1999.

[20] Liu R. and Tan T., A SVD-Based Watermarking Scheme for Protecting Rightful Ownership, IEEE Transactions on Multimedia , vol. 4, no. 1, pp. 121-128, 2002.

[21] Meerwald P. and Uhl A., A Survey of Wavelet-Domain Watermarking Algorithms, in Proceedings of Symposium, Electronic Imaging, Conference on Security and Watermarking of Multimedia Contents , San Jose, USA, 2001.

[22] Quan L. and Qmgsong A., A Combination of DCT-Based and SVD-Based Watermarking Scheme, in Proceedings of 7th International Conference on Signal Processing , pp. 873- 876,2004.

[23] Senthi V., Bhaskar I., and Bhaskar R., Digital Image Watermarking using Edge Detection and Wavelets with Robustness Analysis against JPEG Compression Attacks, in Proceedings of International Conference on Innovations in Information Technology , Al Ain, pp. 583-587, 2008.

[24] Sverdlov A., Dexter S., and Eskicioglu A., Robust DCT-SVD Domain Image Watermarking for Copyright Protection: Embedding Data in All Frequencies, available at: http://kilyos.ee.bilkent.edu.tr/~signal/ defevent/papers/cr1023.pdf, last visited 2005.

[25] Tsekeridou S., Nikolaidis N., Sidiropoulos N., and Pitas I., Copyright Protection of Still Images using Self-Similar Chaotic Watermarks, in Proceedings of IEEE International Conference on Image Processing , Vancouver, pp. 411-414, 2000.

[26] Wong P. and Memon N., Secret and Public Key Image Watermarking Schemes for image Authentication and Ownership Verification, IEEE Transactions on Image Processing , vol. 10, no. 10, pp. 1593-1600, 2001.

[27] Wu M. and Liu B., Data hiding in image and Video. I. Fundamental Issues and Solutions, IEEE Transaction Image Process , vol. 12, no. 6, pp. 685-695, 2003. Priyanka Singh received BTech degree from HBTI, Kanpur, MTech degree from MNNIT, Allahabad and presently pursuing PhD from MNNIT, Allahabad. Her areas of interests include digital watermarking, vi sual cryptography, and security related concepts. Suneeta Agarwal received PhD degree from IIT, Kanpur is Head of Department of Computer Science and Engineering Department in MNNIT, Allahabad and professor at the same. She has numerous contributions in various International and National Journals. Her areas of interests include image processing, automata theory, compression, pattern matching and fingerprint recognitions.