Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2816839.2816915acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciipConference Proceedingsconference-collections
research-article

A Robust Watermarking Scheme for Ownership Protection and Deadlock Prevention

Published: 23 November 2015 Publication History

Abstract

The digital watermarking is used to protect the intellectual property rights in the multimedia. In this paper, we present a blind robust watermarking procedure to embed the watermark into an image A using the polar decomposition, the watermark is constructed by using a secret key K1 (the owner's identities) and inserted between the positive component and the orthogonal component of A. The watermark extraction process requires a secret key K2 which is image dependent. Our scheme is based on matrix multiplication (not commutative), in case of deadlock, this leads to know who watermarked the image first and determines the rightful owner, this scheme is thus performed to avoid the deadlock attack and for ownership protection. Experimental results show the high robustness of the proposed scheme under different image processing attacks.

References

[1]
Musrrat Ali and Chang Wook Ahn. 2013. An optimized watermarking technique employing SVD in DWT domain. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication (ICUIMC '13). ACM, New York, NY, USA, Article 86, 7 page.
[2]
Ghaderi, K.; Akhlaghian, F.; Moradi, P., "A new robust semi-blind digital image watermarking approach based on LWT-SVD and fractal images," Electrical Engineering (ICEE), 2013 21st Iranian Conference on, vol., no., pp.1,5, 14-16 May 2013
[3]
Soumya Mukherjee and Arup Kumar Pal. 2012. A DCT-SVD based robust watermarking scheme for grayscale image. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI '12). ACM, New York, NY, USA, 573--578.
[4]
Nasrin M. Makbol, Bee Ee Khoo, Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition, AEU - International Journal of Electronics and Communications, Volume 67, Issue 2, February 2013, Pages 102--112, ISSN 1434-8411.
[5]
Chinmayee Das, Swetalina Panigrahi, Vijay K. Sharma, K. K. Mahapatra, A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation, AEU - International Journal of Electronics and Communications, Available online 3 September 2013, ISSN 1434-8411.
[6]
S. Craver, N. Memon, B. L and M. M Yeung "Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications," BEE Journal on Selected Areas in Communications, Vol. 16 Issue: 4, May 1998, pp. 573--586.
[7]
L. Qiao and K. Nahrstedt. "Watermarking Schemes and protocolos for protecting ownerships and customer's rights. Journal of visual Communication and image representation, 9(3):194--210, 1998.
[8]
Wenjun Zeng and B. Liu, "A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images" Image Processing, IEEE Transactions on, Volume: 8 no. 11.
[9]
G. H. Golub and C. F. van Loan, Matrix Computations, Johns Hopkins University Press, Baltimore, MD, 1983.
[10]
Higham, N., 'Computing the Polar Decomposition---with applications' SIAM Journal on Scientific and Statistical Computing 1986 7:4, 1160--1174M.
[11]
Oussama, N., & Lemnouar, N. a robust blind and secure watermarking scheme using positive semi definite matrices. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 5, October 2014.
[12]
Bergman, C., & Davidson, J. (2005, March). Unitary embedding for data hiding with the SVD. In Electronic Imaging 2005 (pp. 619--630). International Society for Optics and Photonics.
[13]
Lai, C. C., & Tsai, C. C. (2010). Digital image watermarking using discrete wavelet transform and singular value decomposition. Instrumentation and Measurement, IEEE Transactions on, 59 (11), 3060--3063.
[14]
Tsai, H. H., Jhuang, Y. J., & Lai, Y. S. (2012). An SVD-based image watermarking in wavelet domain using SVR and PSO. Applied Soft Computing, 12(8), 2442--2453.
[15]
Lagzian, S., Soryani, M., & Fathy, M. (2011). A new robust watermarking scheme based on RDWT-SVD. International Journal of Intelligent Information Processing, 2(1), 22--29.
[16]
Bhatnagar, G., & Raman, B. (2009). A new robust reference watermarking scheme based on DWT-SVD. Computer Standards & Interfaces, 31(5), 1002--1013
[17]
Lai, C. C. (2011). A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Processing, 21(4), 522--527.
[18]
Liu, R., & Tan, T. (2002). An SVD-based watermarking scheme for protecting rightful ownership. Multimedia, IEEE Transactions on, 4(1), 121--128.
[19]
Lai, C. C., Huang, H. C., & Tsai, C. C. (2008, August). Image watermarking scheme using singular value decomposition and micro-genetic algorithm. In Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP'08 International Conference on (pp. 469--472). IEEE.

Index Terms

  1. A Robust Watermarking Scheme for Ownership Protection and Deadlock Prevention

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IPAC '15: Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication
    November 2015
    495 pages
    ISBN:9781450334587
    DOI:10.1145/2816839
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 November 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Digital watermarking
    2. copyright protection
    3. deadlock
    4. polar decomposition
    5. robustness

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    IPAC '15

    Acceptance Rates

    Overall Acceptance Rate 87 of 367 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 72
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media