Skip to main content
Top
Published in: Wireless Personal Communications 1/2020

19-06-2020

Watermark Visibility Adjustable RVW Scheme for JPEG Images

Authors: D. R. Denslin Brabin, J. Raja Paul Perinbam, D. Meganathan

Published in: Wireless Personal Communications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In digital images, visible watermarks are embedded to convey the ownership information directly to the world so that copyright violations can be prevented. The removable visible watermarking (RVW) techniques allow the authorized user to remove the watermark from the watermarked image and restore the host image with permissible loss. Usually the visibility of the watermark can’t be increased or decreased based on the application requirement. In most of the commercial communication, JPEG images are used over the internet because of its reduced size. In this paper a RVW scheme is proposed for JPEG images which allows the user to embed watermark in the host image with variable visibility levels. In this scheme, the watermark embedding is performed by modifying the frequency coefficients of host image during forward Discrete Cosine Transform phase of JPEG compression. Inverse operation is performed to remove the watermark and to recover the host image. Watermark key is used to enhance the security of watermarking scheme. Quality metrics of visible watermarking technique are confirmed through experiments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sarkar, A., Madhow, U., & Manjunath, B. S. (2010). Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Transaction on Information Forensics and Security, 5(2), 225–239. Sarkar, A., Madhow, U., & Manjunath, B. S. (2010). Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Transaction on Information Forensics and Security, 5(2), 225–239.
2.
go back to reference Hong, W., & Chen, T. S. (2012). A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensic and Security, 7(1), 176–184. Hong, W., & Chen, T. S. (2012). A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensic and Security, 7(1), 176–184.
3.
go back to reference Tsai, M. J., Liu, J., Yin, J. S., & Yuadi, I. (2014). A visible wavelet watermarking technique based on exploiting the contrast sensitivity function and noise reduction of human vision system. Multimedia Tools and Applications, 72, 1311–1340. Tsai, M. J., Liu, J., Yin, J. S., & Yuadi, I. (2014). A visible wavelet watermarking technique based on exploiting the contrast sensitivity function and noise reduction of human vision system. Multimedia Tools and Applications, 72, 1311–1340.
4.
go back to reference Guo, L., Ni, J., & Shi, Y. Q. (2014). Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security, 9(5), 814–825. Guo, L., Ni, J., & Shi, Y. Q. (2014). Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security, 9(5), 814–825.
5.
go back to reference Zong, T., Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W., & Beliakov, G. (2015). Robust histogram shape-based method for image watermarking. IEEE Transaction on Circuits and Systems for Video Technology, 25(5), 717–729. Zong, T., Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W., & Beliakov, G. (2015). Robust histogram shape-based method for image watermarking. IEEE Transaction on Circuits and Systems for Video Technology, 25(5), 717–729.
6.
go back to reference Agarwal, H., Sen, D., Raman, B., & Kankanhalli, M. (2016). Visible watermarking based on importance and just noticeable distortion of image regions. Multimedia Tools and Applications, 75, 7605–7629. Agarwal, H., Sen, D., Raman, B., & Kankanhalli, M. (2016). Visible watermarking based on importance and just noticeable distortion of image regions. Multimedia Tools and Applications, 75, 7605–7629.
7.
go back to reference Taha, T. B., Ngadiran, R., & Ehkan, P. (2018). Adaptive image watermarking algorithm based on an efficient perceptual mapping model. IEEE Access, 6, 66254–66267. Taha, T. B., Ngadiran, R., & Ehkan, P. (2018). Adaptive image watermarking algorithm based on an efficient perceptual mapping model. IEEE Access, 6, 66254–66267.
8.
go back to reference Noor, R., Khan, A., & Sarfaraz, A. (2019). High performance and energy efficient image watermarking for video using a mobile device. Wireless Personal Communications, 104, 1535–1551. Noor, R., Khan, A., & Sarfaraz, A. (2019). High performance and energy efficient image watermarking for video using a mobile device. Wireless Personal Communications, 104, 1535–1551.
9.
go back to reference Hu, Y., Lee, H. K., & Li, J. (2009). DE- based reversible data hiding with improved overflow location map. IEEE Transaction on Circuits and Systems for Video Technology, 19(2), 250–260. Hu, Y., Lee, H. K., & Li, J. (2009). DE- based reversible data hiding with improved overflow location map. IEEE Transaction on Circuits and Systems for Video Technology, 19(2), 250–260.
10.
go back to reference Lee, C. F., Chen, H. L., & Tso, H. K. (2010). Embedding capacity raising in reversible data hiding based on prediction of difference expansion. Journal of Systems and Software, 83, 1864–1872. Lee, C. F., Chen, H. L., & Tso, H. K. (2010). Embedding capacity raising in reversible data hiding based on prediction of difference expansion. Journal of Systems and Software, 83, 1864–1872.
11.
go back to reference Leung, H. Y., Cheng, L. M., Liu, F., & Fu, Q. K. (2013). Adaptive reversible data hiding based on block median preservation and modification of prediction errors. Journal of Systems and Software, 86, 2204–2219. Leung, H. Y., Cheng, L. M., Liu, F., & Fu, Q. K. (2013). Adaptive reversible data hiding based on block median preservation and modification of prediction errors. Journal of Systems and Software, 86, 2204–2219.
12.
go back to reference Qiu, Y., Qian, Z., & Yu, L. (2016). Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Signal Processing Letters, 23(1), 130–134. Qiu, Y., Qian, Z., & Yu, L. (2016). Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Signal Processing Letters, 23(1), 130–134.
13.
go back to reference Huang, F., Qu, X., Kim, H. J., & Huang, J. (2016). Reversible data hiding in JPEG images. IEEE Transaction on Circuits and Systems for Video Technology, 26(9), 1610–1621. Huang, F., Qu, X., Kim, H. J., & Huang, J. (2016). Reversible data hiding in JPEG images. IEEE Transaction on Circuits and Systems for Video Technology, 26(9), 1610–1621.
14.
go back to reference Brabin, D. R. D., Perinbam, J. R. P., & Meganathan, D. (2017). A block based reversible data hiding scheme for digital images using optimal value computation. Wireless Personal Communications, 94(4), 2583–2596. Brabin, D. R. D., Perinbam, J. R. P., & Meganathan, D. (2017). A block based reversible data hiding scheme for digital images using optimal value computation. Wireless Personal Communications, 94(4), 2583–2596.
15.
go back to reference Xie, X., Lin, C., & Chang, C. (2019). A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients. Multimedia Tools and Applications, 78, 11443–11462. Xie, X., Lin, C., & Chang, C. (2019). A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients. Multimedia Tools and Applications, 78, 11443–11462.
16.
go back to reference Yang, Y., Sun, X., Yang, H., Li, C. T., & Xiao, R. (2009). A contrast-sensitive reversible visible image watermarking technique. IEEE Transactions on Circuits and Systems for Video Technology, 19(5), 656–667. Yang, Y., Sun, X., Yang, H., Li, C. T., & Xiao, R. (2009). A contrast-sensitive reversible visible image watermarking technique. IEEE Transactions on Circuits and Systems for Video Technology, 19(5), 656–667.
17.
go back to reference Tsai, H. M., & Chang, L. W. (2010). Secure reversible visible image watermarking with authentication. Signal Processing: Image Communication, 25, 10–17. Tsai, H. M., & Chang, L. W. (2010). Secure reversible visible image watermarking with authentication. Signal Processing: Image Communication, 25, 10–17.
18.
go back to reference Farrugia, R. A. (2010). A reversible visible watermarking scheme for compressed images. In Proceedings of fifteenth IEEE Mediterranean electrotechnical conference (pp. 212–217). Farrugia, R. A. (2010). A reversible visible watermarking scheme for compressed images. In Proceedings of fifteenth IEEE Mediterranean electrotechnical conference (pp. 212–217).
19.
go back to reference Mehra, N., & Shandilya, M. (2013). Imprecise reversible visible watermarking. CSIT, 1(4), 355–365. Mehra, N., & Shandilya, M. (2013). Imprecise reversible visible watermarking. CSIT, 1(4), 355–365.
20.
go back to reference Hsu, F. H., Wu, M. H., Yang, C. H., & Wang, S. J. (2014). Visible watermarking with reversibility of multimedia images for ownership declarations. Journal of Supercomputing, 70(1), 247–268. Hsu, F. H., Wu, M. H., Yang, C. H., & Wang, S. J. (2014). Visible watermarking with reversibility of multimedia images for ownership declarations. Journal of Supercomputing, 70(1), 247–268.
21.
go back to reference Zhang, X., Wang, Z., Yu, J,. & Qian Z. (2015). Reversible visible watermark embedded in encrypted domain. In Proceedings of IEEE international conference on signal and information processing (pp. 826–830). Zhang, X., Wang, Z., Yu, J,. & Qian Z. (2015). Reversible visible watermark embedded in encrypted domain. In Proceedings of IEEE international conference on signal and information processing (pp. 826–830).
22.
go back to reference Yang, H., & Yin, J. (2015). A secure removable visible watermarking for BTC compressed images. Multimedia Tools and Applications, 74, 1725–1739. Yang, H., & Yin, J. (2015). A secure removable visible watermarking for BTC compressed images. Multimedia Tools and Applications, 74, 1725–1739.
23.
go back to reference Mohammad, N., Sun, X., Yang, H., Yin, J., Yang, G., & Jiang, M. (2017). Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images. Multimedia Tools and Applications, 76(11), 13301–13313. Mohammad, N., Sun, X., Yang, H., Yin, J., Yang, G., & Jiang, M. (2017). Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images. Multimedia Tools and Applications, 76(11), 13301–13313.
24.
go back to reference Lin, Y., Yang, C., & Tsai, J. (2018). More secure lossless visible watermarking by DCT. Multimedia Tools and Applications, 77, 8579–8601. Lin, Y., Yang, C., & Tsai, J. (2018). More secure lossless visible watermarking by DCT. Multimedia Tools and Applications, 77, 8579–8601.
25.
go back to reference Shiu, P. F., Lin, C. C., Jan, J. K., & Chang, Y. F. (2018). A DCT-based robust watermarking scheme surviving JPEG compression with voting strategy. Journal of Network Intelligence, 3(4), 259–277. Shiu, P. F., Lin, C. C., Jan, J. K., & Chang, Y. F. (2018). A DCT-based robust watermarking scheme surviving JPEG compression with voting strategy. Journal of Network Intelligence, 3(4), 259–277.
26.
go back to reference Yao, Y., Zhang, W., Wang, H., Zhou, H., & Yu, N. (2019). Content-adaptive reversible visible watermarking in encrypted images. Signal Processing, 164, 386–401. Yao, Y., Zhang, W., Wang, H., Zhou, H., & Yu, N. (2019). Content-adaptive reversible visible watermarking in encrypted images. Signal Processing, 164, 386–401.
Metadata
Title
Watermark Visibility Adjustable RVW Scheme for JPEG Images
Authors
D. R. Denslin Brabin
J. Raja Paul Perinbam
D. Meganathan
Publication date
19-06-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07567-w

Other articles of this Issue 1/2020

Wireless Personal Communications 1/2020 Go to the issue