Research Article

A Multi-purpose Dual Watermarking Scheme

by  Jobin Abraham
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Issue 8
Published: September 2013
Authors: Jobin Abraham
10.5120/13411-1066
PDF

Jobin Abraham . A Multi-purpose Dual Watermarking Scheme. International Journal of Computer Applications. 77, 8 (September 2013), 1-4. DOI=10.5120/13411-1066

                        @article{ 10.5120/13411-1066,
                        author  = { Jobin Abraham },
                        title   = { A Multi-purpose Dual Watermarking Scheme },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 77 },
                        number  = { 8 },
                        pages   = { 1-4 },
                        doi     = { 10.5120/13411-1066 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Jobin Abraham
                        %T A Multi-purpose Dual Watermarking Scheme%T 
                        %J International Journal of Computer Applications
                        %V 77
                        %N 8
                        %P 1-4
                        %R 10.5120/13411-1066
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes an image watermarking scheme that cater to multiple purposes of copyright protection and fingerprinting. For fingerprinting images, an ID number or a unique code pertaining to the buyer is hidden with in the digital resources at the time of resource transfer. For copyright protection of the resource, a unique signature such as a logo of the owner creator is integrated imperceptibly. In the proposed method these embedding operations are performed in the transform domain using discrete wavelet transform. The embedding algorithm works in two stages; hides the fingerprint using DWT inside the logo in the first stage and in second stage, integrates this secondary watermark in the base image to be watermarked.

References
  • I. J Cox, Mat M Miller, Jeffrey A Bloom, "Watermarking Applications and their Properties", IEEE ITCC, March 2000.
  • Xin Liao, Qiao-yan Wen, jie Zhang, "A Steganographic method for Digital Images with four-pixel differencing and modified LSB Substitution", 2011.
  • Tribhuvan Kumar Tewari, Vikas Saxena, "An Improved and Robust DCT based Digital Image Watermarking Scheme", International Journal of Computer Applications, June2010.
  • Wai Chu, "DCT based Image Watermarking using Subsampling", IEEE Transactions on Multimedia, pp 34-38, Vol. 5, March 2003.
  • Vidyasagar m Potdar, Song Han, Elizabeth Chang, "A Survey of Digital Image Watermarking Techniques", IEEE Conference on Industrial Infomatics, pp 709-716, 2005.
  • Latha Parameswaran, K Anbumani, "Content-based Watermarking for Image Authentication using Independent Component Analysis", Informatica 32 pp299-306, 2008.
  • Qing Liu, Jun Ying, "Grayscale Image Digital Watermarking Technology Based on Wavelet Analysis", IEEE Symposium on Electrical & Electronics Engineering, 2012.
  • Nagaraj V Dharwadkar, B. B Amberker, " An Efficient non-blind Watermarking Scheme for Color Images using Discrete Wavelet Transform", International Journal of Computer Applications, May 2010.
  • Chi-Man Pun, Xiao-Chen Yuan, "Geometric Invariant Digital Image Watermarking Scheme Based on Histogram in DWT Domain", Journal of Multimedia, Vol. 5, pp 434-442, 2010.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Digital images watermarking copyright protection fingerprinting discrete wavelet transforms (DWT)

Powered by PhDFocusTM