(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 2, February 2011
A Quantization based blind and Robust ImageWatermarking Algorithm
Mohamed M. Fouad
Electronics and Communication Department- Faculty of Engineering- Zagazig University- Egypt
Security and privacy issues of the transmitted datahave become an important concern in multimedia technology.Watermarking which belong to the field of information hidinghas seen a lot of research interest recently. Watermarking is usedfor a variety of reasons including security, content protection,copyright management, trust management, contentauthentication, tamper detection and privacy. Recently manywatermarking techniques have been proposed to support theseapplications but one major issue with most of the watermarkingtechniques is that these techniques fail in the presence of severeattacks. This has been a major threat to content providersbecause if the digital content is dramatically changed then itwould be difficult to prove the existence of a watermark in it andconsequently its ownership. To tackle this security threat towardsownership issues in this paper, we propose a computationallyefficient and secure two quantization based watermarkingalgorithms which offer incredible performance in presence of malicious attacks which try to remove ownership information.The performance of the proposed techniques is compared withthat of other watermarking techniques and it gives a very goodperceptual quality especially at lower bit rates. We presentexperimental results which show that the proposed techniquesoutperform many techniques for multimedia over wirelessapplications. The proposed schemes are backed up with excellentresults.
Keywords-component; Watermark Detection; Watermarking; DCT; DWT; Quantization
I. INTRODUCTIONWatermarking is a method of hiding proprietaryinformation in digital media like photographs, digital music, or digital video. The ease with which digital content can beexchanged over the Internet has created copyrightinfringement issues. Copyrighted material can be easilyexchanged over peer-to-peer networks, and this has causedmajor concerns for those content providers who produce thesedigital contents. In order to protect the interest of the content providers these digital contents can be watermarked.The process of
is termed as watermarking. A Watermark can beconsidered as a kind of a signature, which reveals the owner of the multimedia object. Content providers want to embedwatermarks in their multimedia objects (digital content) for several reasons like copyright protection, contentauthentication, tamper detection etc. A watermarkingalgorithm embeds a
in a givenmulti-media object. The embedding process is guided by useof a
, which decides the locations within themultimedia object (image) where the watermark would beembedded. Once the watermark is embedded it can experienceseveral
because the multimedia object can be digitally processed. The attacks can be unintentional (in the case of images, low pass filtering or gamma correction or compression) or intentional (like cropping). Hence, thewatermark has to be very robust against all these possibleattacks. When the owner wants to check the watermarks in the possibly attacked and distorted multimedia object, s/he relieson the secret key that was used to embed the watermark. Usingthe secret key, the embedded watermark sequence can beextracted. This extracted watermark may or may not resemblethe original watermark, because the object might have beenattacked.Hence, to validate the existence of a watermark, either theoriginal object is used to compare and ascertain the watermark signal (
), or a correlation measure isused to detect the strength of the watermark signal from theextracted watermark (
). In correlation based detection, the original watermark sequence is comparedwith the extracted watermark sequence, and a statisticalcorrelation test is used to determine the existence of thewatermark.A.
Requirements of Digital Watermarking
There are three main requirements of digitalwatermarking. They are
.Transparency or Fidelity, The digital watermark shouldnot affect the quality of the original image after it iswatermarked. Cox et al. (2002) defines transparency or fidelityas ‘perceptual similarity between the original and thewatermarked versions of the cover work’ . Watermarkingshould not introduce visible distortions because if suchdistortions are introduced it reduces the commercial value of the image.