Fig. 1. Watermark Embedding Procedure Method-2
Fig. 2. 8x8 DCT Blocks
Fig. 3. Proposed Watermark Embedding Scheme
Fig. 4. 8x8 DCT Block Density
Fig. 5. Extract Procedure in the Proposed Scheme
Fig. 6. Watermark Embedding Procedure
Fig. 8. Proposed Watermarking Procedure at QF 70[%]
Fig. 7. Test Images. (a) Lena (b) Baboon (c) Airplane
Table 1. Comparison of Computation Time Complexity
Table 2. Comparison of PSNR and TAF when JPEG Compression Attack and No Attack
Table 3. TAF Identification and Performance Comparison for Step-By-Step JPEG Compression
References
- Gongsoo Jang, Hongjin Lee, Jooseung Yun and Yongsoo Park, "The Trend of Digital / Software Watermarking Technology for Digital Management," Proceedings of The KISS Conferences, Vol. 35, No. 1D, pp. 10-14, Jun, 2008.
- I. J. Cox, M. L. Miller and J. A. Bloom, Digital Watermarking, Academic Press, San Diego, 2002
- V. M. Potdar, S. Han and E. Chang, "A survey of digital image watermarking techniques", IEEE Intl. Conf. Industrial Informatics, Perth, Australia, Aug.2005, pp.709-716.
- C-T. Hsu and J-L. Wu, "Hidden digital watermarks in images", IEEE Trans. Image Processing, vol. 8, no. 1, pp.58-68, Jan. 1999 https://doi.org/10.1109/83.736686
- I. J. Cox, J. Killian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec 1997. https://doi.org/10.1109/83.650120
- Shinfeng D. Lin, Shih-Chieh Shie, Jian-Yi Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression", International Conference on Consumer Electronics, pp. 343-344, 8-12 Jan., 2005.
- P. Meerwald and A. Uhl, "Survey of wavelet-domain watermarking algorithms", Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 505-516, 2001
- A. A. Mohammad, A. Alhaj and S. Shaltaf, "An improved SVD-based watermarking scheme for protecting rightful ownership", Signal Processing, vol. 88, pp. 2158-2180, 2008 https://doi.org/10.1016/j.sigpro.2008.02.015
- Ali, M., Ahn, C. W., Pant, M., Siarry, P, "An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony", Information Sciences, 301, 44-60, 2015. https://doi.org/10.1016/j.ins.2014.12.042
- Sung-Ho Bae, "Improved CRT-based Image Watermak ing in DCT Domain for Copyright Protection," Journal of Korea Multimedia Society, Vol. 16, No. 10, pp. 1163-1170, Oct, 2013. https://doi.org/10.9717/kmms.2013.16.10.1163
- J. C. Patra, A. Karthik and C. Bornand, "A Novel CRT-based watermarking technique for authentication of multimedia contents," Digital Signal Processing, vol. 20, no. 2, pp. 442-453, July 2009 https://doi.org/10.1016/j.dsp.2009.07.004
- J. C. Patra, J. E. Phua and C. Bornand, "A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression", Digital Signal Processing, vol. 20, no. 6, pp. 1597-1611, Mar. 2010 https://doi.org/10.1016/j.dsp.2010.03.010
- Patra, Jagdish C., A. K. Kishore, and Cedric Bornand. "Improved CRT-based DCT domain watermarking technique with robustness against JPEG compression for digital media authentication." In Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pp. 2940-2945.
- J. C. Patra, J. E. Phua and D. Rajan, "DCT Domain watermarking scheme using Chinese Remainder Theorem for image authentication", in Proc. IEEE Intl. Conf. Multimedia and Expo (ICME 2010), Singapore, July 2010, pp. 111-116.
- U. Sudibyo, F. Eranisa, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, "A Secure Image Watermarking using Chinese Remainder Theorem Based on Haar Wavelet Transform," 2017 4th Int. Conf. Inf. Technol. Comput. Electr. Eng., pp. 208-212, 2017.
- Hwai-Tsu HU, Hsu L-Y, "Exploring dwt-svd-dct feature parameters for robust multiple watermarking against jpeg and jpeg2000 compression". Comput Electr Eng 41:52-63, 2015. https://doi.org/10.1016/j.compeleceng.2014.08.001
- Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G, "Secure and robust fragile watermarking scheme for medical images", IEEE Access 6:10269-10278, 2018. https://doi.org/10.1109/ACCESS.2018.2799240
- M.-K. Kim, S. Lee, and G.-Y. Kim, "Fake Iris Image Detection based on Watermark," Journal of the Korea Society of Computer and Information vol. 23, no. 4, pp. 33-39, Apr. 2018. https://doi.org/10.9708/JKSCI.2018.23.04.033
- W. Stallings, Cryptography and Network Security, Fifth Edition, Pearson Education Inc., 2011.