The Image Watermarking System

2181 Words5 Pages

1 INTRODUCTION

With the rapid develpment in the field of computer science, internet has reached to mass and is continuously gaining popularity due to which it has become very easy to share things such as images, videos, documents, etc. But this ease comes at the cost of information security. For these reasons and many others, digital image watermarking has emerged as the appropriate solution for these cases.

The image watermarking system consists of an embedder and a detector, as illustrated in Figure 1. The embedder takes two inputs. One is the payload or watermark, and the other is the cover work or the host image. The output of the embedder is typically transmitted or recorded. Later that work is presented as an input to the detector. Most detectors try to determine whether a payload is present, and if so, output the message encoded by it.

1.1 BASIC MODEL OF DIGITAL IMAGE WATERMARKING

The basic model of image watermarking consists of three parts as described in Figure 2, they are:

Embedding: In this process the watermark is embedded into the host image with a certain technique.

Attack: This is the insecure part of the watermarking life cycle as it comprises of either transfer of the image or the storage of the image. If in between this process the image is altered then it is termed as attack.

Detection: In this, detector detects the watermark from the watermarked image which is generated at the time of embedding phase. This part is also insecure if proper techniques are not applied to make it secure.

1.2 PROPERTIES OF DIGITAL IMAGE WATERMARKING

The main requirements for the watermark are as follows:

A) Robustness: The robustness is the ability of detecting the watermark after some signal proc...

... middle of paper ...

...r watermark embedding.

REFERENCES

[1] Ingemar J. Cox, Mathew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, and Ton Kalker, Digital Watermarking and Steganography, Morgan Kaufmann Publishers, 2008.

[2] David Kilburn. Dirty linen, dark secrets. Adweek, 1997.

[3] A. M. Zeki and A. A. Manaf, A novel digital watermarking technique based on ISB (Intermediate Significant Bit), World Academy of Science, Engineering and Technology, vol. 50, pp. 989-996, 2009.

[4] Z. J. Yong, L. D. Hong, L. J. Zeng, and J. Miao, A DCT-BASED Digital Watermarking Algorithm for Image, in Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference, pp. 1217-1220, 2012.

[5] S. Craver, N. Memon, B. Yeo, and M. Young, On the invertibility of invisible watermarking techniques. Proc. Of the IEEE Int. Conf. On Image Processing, Vol. 1, p. 540-543, 1997.

Open Document