Skip to main content

Wavelet-Based Blind Watermarking Technique for Real-Time Watermark Interpretation

  • Conference paper
  • First Online:
Book cover Computational Science and Its Applications — ICCSA 2003 (ICCSA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2668))

Included in the following conference series:

Abstract

The Digital watermarking algorithm is embedding watermark into digital content without degradation of original image. The watermark should be robust against attacks to the copyrighted content. Also, extracted watermark can be able to identify the image ownership without ambiguity. In real-time watermarking system, watermark extract algorithm must be distinguishing the imitations from the originals on the instant. In this paper, the proposed watermarking algorithm shows unambiguity and security using pseudo-random linear congruention generators and binary code to decimal with student ID number. The experimental results show that the proposed algorithm successfully survives several kinds of image processing operations including JPEG lossy compression.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chiou-Ting Hsu, Ja-Ling Wu: Hidden digital watermarks in images, Image Processing, IEEE Transactions on, Vol. 8, Issue: 1, Jan. (1999) 58–68

    Article  Google Scholar 

  2. Siegmund Brandt: Data Analysis: Third edition, statistical and computational methods for scientists and engineers, Springer-Verlag, (1999) 49–53

    Google Scholar 

  3. Ming-Shing Hsieh, Din-Chang Tseng, Yong-Huai Huang: Hiding Digital Watermarks Using Multiresolution Wavelet Transform, IEEE Transactions on Industrial electronis, Vol 8,No 5, October(2001) 875–882

    Article  Google Scholar 

  4. S.K. Park and K.W. Miller: Random Number Generators: Good Ones Are Hard To Find, Communications of the ACM, October (1988) 1192–1201

    Google Scholar 

  5. Cox, I.J.; Kilian, J. Leighton, F.T., Shamoon,: Secure spread spectrum watermarking for multimedia Image Processing, IEEE Transactions on, Vol. 6 Issue. 12, Dec. (1997) 1673–1687

    Google Scholar 

  6. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn.: Attacks on copyright marking systems, information hiding: 2nd int’l workshop, vol. 1525 of Lecture notes in computer science, Springer, April (1998) 218–238

    Google Scholar 

  7. Stefan Katzenbeisser and Fabien A. P. Peticolas: Information Hiding Techniques for Steganography and Digital Watermarking, ARTECH HOUSE INC, (2000) 111–112

    Google Scholar 

  8. Langelaar, G.C.; Setyawan, I.; Lagendijk, R.L.: Watermarking digital image and video data. A state-of-the-art overview, IEEE Signal Processing Magazine, Vol. 17, Issue:5, Sept.(2000) 20–46

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoo, KS., Lee, WH. (2003). Wavelet-Based Blind Watermarking Technique for Real-Time Watermark Interpretation. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds) Computational Science and Its Applications — ICCSA 2003. ICCSA 2003. Lecture Notes in Computer Science, vol 2668. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44843-8_37

Download citation

  • DOI: https://doi.org/10.1007/3-540-44843-8_37

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40161-2

  • Online ISBN: 978-3-540-44843-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics