Abstract
Nowadays; information hiding has become a significant topic of computer science due to the increasing popularity of the Internet and the essential need of data security. With respect to the general information hiding problem, a tradeoff is involved between robustness, visibility and capacity. There are many watermarking techniques and models and each of them has some advantages and disadvantages. Mostly used in conjunction with spread spectrum watermarking, perceptual shaping refers to the idea of adjusting the strength of the watermark based on the perceptual sensitivity of a region in the image. All these methods use some model that assigns weights to various regions of the image. This weight determines the strength of the watermark that is added to that part of the image. This paper offers a way of embedding watermarks in a manner that increases robustness and reduces perceptual degradation and computational complexity. After an image is segmented, the entropy is calculated for each segment and only those segments that have entropy above some thresholds are considered for watermarking. This reduces the number of segments that are watermarked thereby economizing on computation and perceptual degradation. The choice of high entropy segments ensures that the method is robust, as low entropy segments would be more sensitive to attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, B., Wornell, G.W.: Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia. J. VLSI Signal Processing Systems 27, 7–33 (2001)
Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transaction on Information Theory 47, 1423–1443 (2001)
Mintzer, F., Braudaway, G.W.: If one watermark is good, are more better? In: International Conference on Accoustics, Speech, and Signal Processing, pp. 2067–2070. IEEE Computer Society, Washington (1999)
Wallace, G.K.: The JPEG Still Picture Compression Standard. Communications of the ACM 34, 30–44 (1991)
Cox, I.J.: Digital watermarking and steganography. Morgan Kaufmann, San Francisco (2002)
Cox, I.J., Kilian, J., Leighton, T.: Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing 6, 1673–1687 (1997)
Xiao, J., Wang, Y.: Multiple Watermarking Based on Spread Transform. In: 8th International Conference on Signal Processing, China (2006), ISBN: 0-7803-9736-3
Solanki, K.N., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Robust image-adaptive data hiding using erasure and error correction. IEEE Transaction on Image Processing 13, 1627–1639 (2004)
Sheppard, N.P., Safavi-Naini, R., Ogunbona, P.: On multiple watermarking. In: Workshop on Multimedia and Security at ACM Multimedia, Canada, pp. 3–6 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kamble, S., Maheshkar, V., Agarwal, S., Shrivastava, V. (2010). Robust Multiple Watermarking Using Entropy Based Spread Spectrum. In: Ranka, S., et al. Contemporary Computing. IC3 2010. Communications in Computer and Information Science, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14834-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-14834-7_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14833-0
Online ISBN: 978-3-642-14834-7
eBook Packages: Computer ScienceComputer Science (R0)