Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 85))

Abstract

This paper presents a novel watermarking technique for digital images using Pseudo Random(PN) Sequence. The host image is permuted by PN Sequence. The watermark is embedded into the mid band DCT coefficients of the image. The image is re-permuted using the same PN sequence to obtain the watermarked image. To ensure security, a PN sequence has been used which is known only to an authorized person. Extensive simulation results show that the proposed scheme can resist signal processing attacks such as median, average, motion and Gaussian filter as well as compression, blurring and sharpening of watermarked image. The proposed paper also analyzes the results obtained by varying the degree of permutation proving that the DCT along with permutation making the frequency domain watermarking arguably robust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barni, M., Bartolini, F.: Data hiding for fighting piracy. IEEE Signal Processing Magazine 21, 28–39 (2004), doi:10.1109/MSP.2004.1276109

    Article  Google Scholar 

  2. Li, S., Wu, Y.: A Robust Chaos-Based Watermarking for Copyright Protection. In: International Conference on Biomedical Engineering and Computer Science (ICBECS), pp. 1–3 (2010), doi:10.1109/ICBECS.2010.5462439

    Google Scholar 

  3. Liwei, C., Mingfu, L.: An effective blind watermark algorithm based on DCT. In: 7th World Congress on Intelligent Control and Automation, WCICA 2008, pp. 6822–6855 (2008)

    Google Scholar 

  4. Mingwei, Z., Yanzhong, D.: Color Image Copyright Protection Digital Watermarking Algorithm Based on DWT, DCT. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing WiCOM 2008, pp. 1–4 (2008), doi:10.1109/WiCom.2008.2913

    Google Scholar 

  5. Perez-Gonzalez, F., Hernandez, J.: A tutorial on digital watermarking. In: Proceedings of IEEE 33rd Annual International Carnahan Conference on Security Technology, pp. 286–292 (1999), doi:10.1109/CCST.1999.797926

    Google Scholar 

  6. Yanling, W., Xiuhua, J.: A new algorithm for watermarking based on DCT and chaotic scrambling. In: 4th International Conference on Computer Science Education, ICCSE 2009, pp. 25–28 (2009), doi:10.1109/ICCSE.2009.5228222

    Google Scholar 

  7. Yantao, Z., Yunfei, M., Zhiquan, L.: A Robust Chaos-Based DCT-Domain Watermarking Algorithm. In: International Conference on Computer Science and Software Engineering, pp. 935–938 (2008), doi:10.1109/CSSE.2008.332

    Google Scholar 

  8. Yen, J.: Watermarks embedded in the permuted image. In: The 2001 IEEE International Symposium on Circuits and Systems, ISCAS 2001, vol. 2, pp. 53–56 (2001), doi:10.1109/ISCAS.2001.921004

    Google Scholar 

  9. Zhang, D., Dong, H., Zhou, C.: Researches on Digital Image Watermarking. In: 8th International Conference on Electronic Measurement and Instruments, ICEMI 2007, pp. 2-818 –2-821 (2007), doi:10.1109/ICEMI.2007.4350805

    Google Scholar 

  10. Zhen, J., Jihong, Z., Weixin, X.: A watermarking algorithm based on permutation and 2-D barcode. Journal of Electronics (China) 18, 375–381 (2001), doi:10.1007/s11767-001-0056-x

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gunjan, R., Maheshwari, S., Gaur, M.S., Laxmi, V. (2010). Permuted Image DCT Watermarking. In: Herrero, Á., Corchado, E., Redondo, C., Alonso, Á. (eds) Computational Intelligence in Security for Information Systems 2010. Advances in Intelligent and Soft Computing, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16626-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16626-6_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16625-9

  • Online ISBN: 978-3-642-16626-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics