Browse > Article
http://dx.doi.org/10.3745/KIPSTB.2004.11B.3.289

A Wavelet-Based Watermarking Scheme of Digital Image Using ROI Method  

Kim, Tae-Jung (한국과학기술정보연구원)
Hong, Choong-Seon (경희대학교 전자정보학)
Sung, Ji-Hyun ((주)플래넷 기술연구)
Hwang, Jae-Ho (수원여자대학 전자상거래)
Lee, Dae-Young (경희대학교 전자정보학부)
Abstract
General watermarking techniques tend not to consider intrinsic characteristics of image, so that watermarks are embeded to entire images. In this paper, we present a watermarking algorithm based on wavelet domain, and the watermark is embedded into large coefficients in region of interest(ROI) being based on principle of multi-threshold watermark coding(MTWC) for robust watermark insertion. We try to accomplish both image duality and robustness using human visual system(HVS). The watermarks are embedded in middle frequency bands because the distortion degree of watermarked images appears to be less than lower frequency bands, and the embedded watermarks in the middle bands showed high extraction ratios after some distortion. The watermarks are consisted of pseudo random sequences and detected using Cox's similarity mesurement.
Keywords
Watermarking; Multi-Threshold Watermark Coding(MTWC); Human Visual System(HVS);
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. S. Lewis and G. Knowles, 'Image Compression Using the 2-D Wavelet Transform,' IEEE Trans. Image Proc e..sing; Vol.1, No.2, pp.244-250, Apr., 1992   DOI
2 M. Barni, F. Bartolini and A. Piva, 'Improved Wavelet Based Watermarking Through Pixel Wise Masking,' IEEE Trans. Image Processing, Vol.10, No.3, pp.783-791, May, 2001   DOI   ScienceOn
3 I. Cox and M. L. Miller, 'A Review of Watermarking and the Importance of Perceptual Modeling,' in Proc. Electronic imaging, Feb., 1997   DOI
4 M. Antonini, M. Barlaud. P. Mathieu and I. Daubechies, 'Image Coding Using Wavelet Transform,' IEEE Trans. Image Processing, Vol.1, No.2, pp.205-220, Apr., 1992   DOI
5 J. D. Villasenor, B. Belzer and J Liao, 'Wavelet Fiter Evaluation for Image Compression,' IEEE Trans. Image Processing, Vol.4, No.8, pp.1053-1060, Aug., 1995   DOI   ScienceOn
6 G. Caronni, 'ssuring Ownership Rights for Digital Images,' in Proc. Reliable IT Systems, VIS '95, Vieweg Publishing Company, pp.1074-1077, 1995
7 W. Bender, D. Gruhl and N. Morimoto, 'Techniques for Data Hiding,' In Proc. of SPIE, Vol.2420, pp.1088, 1995   DOI
8 H,J. Wang and Jay Kuo, 'A Multi Threshold Wavelet Coder For High Fidelity Image Compression,' IEEE Image Processing, Vol.1, No.2, pp.652-655, 1997   DOI
9 B. M. Macq and J-J Quisquater, 'Cryptology for digital TV broadcasting,' Proc. of the IEEE, Vol.7, No.2, 1995   DOI   ScienceOn
10 Yiwei Wang and John F. Doherty and Robert E., 'A Wavelet-based Watermarking Algorithm for Ownership Verification of Digital Images,' IEEE Transactions on Image Processing, Vol.3, No.9, 2002
11 Yu Jin Zhang, Ting Chen and Juan Li, 'Embedding Watermarks into Both DC and AC Components of DCT, Proceeding of SPIE, 2001
12 I. J. Cox, j. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, Vol.6, No.12, pp.1673-1687, Dec., 1997   DOI   ScienceOn