Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

2.10

CiteScore

Ren-Junn Hwang This email address is being protected from spambots. You need JavaScript enabled to view it.1

1Department of Computer Science and Information Engineering, TamKang University, Tamsui, Taipei Hsien, 251, Taiwan, R.O.C.


 

Received: January 1, 2000
Accepted: June 1, 2000
Publication Date: June 1, 2000

Download Citation: ||https://doi.org/10.6180/jase.2000.3.2.04  


ABSTRACT


A simple and efficient watermark method is proposed in this paper. The watermark method is an excellent technique to protect the copyright ownership of a digital image. The proposed watermark method is built up on the concept of visual cryptography. According to the proposed method, the watermark pattern does not have to be embedded into the original image directly, which makes it harder to detect or recover from the marked image in an illegal way. It can be retrieved from the marked image without making comparison with the original image. The notary also can off-line adjudge the ownership of the suspect image by this method. The watermark pattern can be any significant black/white image that can be used to typify the owner. Experimental results show that the watermark pattern in the marked image has good transparency and robustness. By the proposed method, all the pixels of the marked image are equal to the original image.


Keywords: image watermark, visual cryptography, copyright protection.


REFERENCES


  1. [1] Bender W., Gruhl D., Morimoto N. and Lu A., “Techniques for Data Hiding,” IBM System Journal. Vol. 35, No. 3, pp. 313-336 (1996).
  2. [2] Braudaway G. W., Magerlein K. A. and Mintzer F., “Protecting Publicly-available Images with a Visible Image Watermark,” In the Proceedings of SPIE, Vol. 2659, pp. 126-133(1996).
  3. [3] Cox I. J., Kiliant J., Leighton T. and Shamoon T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687(1997).
  4. [4] Hsu C. and Wu J., “DCT-Based Watermarking for Video,” IEEE Transactions on Consumer Electronics, Vol. 44, No.1, pp.206-215(1998).
  5. [5] Hsu C. T. and Wu J. L., “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processng, Vol. 8, No. 1, Jan, pp. 58-68(1999).
  6. [6] Hwang M. S., Chang C. C., and Hwang K. F., “A Watermarking Technique Based on One-way Hash Functions,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, pp. 286-294(1999).
  7. [7] Inoue H., Miyazaki A., Yamamoto A. and Katsura T., “A Digital Watermark Technique Based on the Wavelet Transform and Its Robustness on Image Compression and Transformation,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 1, pp.2-10(1999).
  8. [8] Low S. and Maxemchuk N., “Performance Comparison of Two Text Marking Methods,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp.561-572(1998).
  9. [9] Matsui K., Ohnishi J., and Nakamura Y., “Embedding a Signature to Pictures under Wavelet Transform,” IEICE Transactions, Vol. J79-D-II, No. 6, pp. 1017-1024(1996).
  10. [10] Naor N. and Shamir A. “Visual Cryptography,” Advances in Cryptology: Eurocrypt’94, Springer-Verlag, Berlin, pp. 1-12(1995).
  11. [11] Ohbuchi R., Masuda H., and Aono M., “Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp.551-560(1998).
  12. [12] Ohnishi J. and Matsui K., “Embedding a Seal into a Picture under Orthogonal Wavelet Transform,” The Proceedings of IEEE International Conference on Multimedia Computing and Systems, pp. 514-512(1996).
  13. [13] O’Ruanaidh J. J. K., Dowling W. J., and Boland F. M., “Watermarking Digital Images for Copyright Protection,” IEE Proceedings-Visual Image Signal Processing, Vol. 143, No. 4, pp. 250-256(1996).
  14. [14] Swanson M. D., Zhu B. and Tewfik A. H., “Transparent Robust Image Watermarking,” The Proceedings of IEEE International Conference on Image Processing, Vol. 3, pp. 211-214(1996).
  15. [15] Voyatzis G. and Pitas I. “Applications of Toral Automorphisms in Image Watermarking,” The Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 237-240(1996).
  16. [16] Xia X. G., Boncelet C. G. and Arce G. R., “A Multiresolution Watermark for Digital Images,” The Proceedings of IEEE International Conference on Image Processing, Vol. 1, pp. 548-551(1997).