Blind and invisible watermarking techniquies for color images 227
Blind and invisible watermarking techniquies
for color images
Soni Atmik M.
1
.
Metkar Shilpa P.
1
.
Lande Pankaj U.
2
1
College of Engineering, Pune, India
2
University of Pune, Pune, India
1. Introduction
With the recent proliferation and success of the internet, to-
gether with the availability of relatively inexpensive digital
recording and storage devices has created an environment
in which it becomes very easy to obtain, replicate and dis-
tribute digital content without any loss in quality. This has
become a great concern to the multimedia content (music,
video and image) publishing industries, because technolo-
gies or techniques to protect intellectual property rights for
digital media and to prevent unauthorized copying did not
exist. Exactly identical copies of digital information, be
it images, text or audio, can be produced and distributed
easily. In such a scenario, who is the artist and who the
plagiarist? It’s impossible to tell or was, until now.
Encryption technologies can be used to prevent unauthor-
ized access to digital content. However, encryption has
its limitations in protecting intellectual property rights
because once digital content gets decrypted; there is
nothing to prevent an authorized user from illegally
replicating it. Another technology is obviously needed
to help establish and prove ownership rights, then track
content usage, ensure authorized access, facilitate content
authentication and prevent illegal replication. This need
attracted attention from the research community and
industry leading to creation of new information hiding
form, called Digital Watermarking. The basic idea of digital
watermarking is to create a metadata containing informa-
tion about the digital content to be protected, and then hide
the metadata within that content. The information stored
as metadata can have different formats, such as character
string or binary image pattern.
The watermarking technique is one of the solutions to
different issues of copyright protection, image authenti-
cation, proof of ownership, etc. This technique embeds
information so that it is not easily perceptible, that is, the
viewer cannot see any information embedded in the con-
tents. There are still several important issues existing in the
watermarking system.
• First, the embedded watermark should not degrade
the quality of the image and should be perceptually
invisible to maintain its protective secrecy.
• Second, the watermark must be robust enough to
resist common image processing attacks and not be
easily removable, only the owner of the image is able
to extract the watermark.
• Third, the blind Watermarking technique is necessary
since sometimes it is not easy to obtain the original
image or original watermark during Extraction,
furthermore, a lot of space is needed for storing the
original image and original watermark.
Watermarking techniques are mainly classified into 1) spa-
tial domain [1] watermarking techniques, where watermark
is embedded directly by changing pixels value, and 2)
frequency domain [2] the pixel values are transformed into
another domain by applying appropriate transform.
N. Nikolaidis and I. Pitas give an overview of Digital
Image Watermarking [1]. They described the watermarking
schemes and data hiding techniques for copyright protection
of still images. They also described some recent research
results on that field and a number of distinct application
areas, each with different requirements and limitation. The
Spread -spectrum communication is robust against many
types of interference and jamming [3]. Cox et al. [4] pro-
posed a watermarking method to embed a watermark by the
spread-spectrum technique. The watermark is inserted in
the perceptually significant portion of an image where in a
predetermined range of low frequency components exclude
the dc component. The watermark is spread over many
frequency coefficients, so that the number of coefficients
which are modified is very small and difficult to detect.
Podilchuk and Zeng [5] improved Cox’s method and
added the model of the just noticeable difference (JND)
to select the maximum length and maximum power water-
mark sequence. Their method can be used for both the DCT
and the discrete wavelet transform (DWT) domains [5].
In [6], the watermark was embedded by quantizing the
S.J. Pise (ed.), ThinkQuest 2010, DOI 10.1007/978-81-8489-989-4_42,
© Springer India Pvt. Ltd. 2011