Skip to main content

Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images

  • Conference paper
Advanced Computing, Networking and Security (ADCONS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7135))

Abstract

Rapid growth in the number and types of devices accessing the Internet from anywhere, anytime has greatly enhanced the accessibility and distribution of digital media content. Digital media has several inherent advantages such as ease of use, easy reproduction and distribution, etc. However, digital media is still not secure enough for an explosive growth in making it available online. It is not easy to prove the ownership of digital media and some of the existing security controls can easily be defeated. Digital watermarking has emerged as a preferred solution to tackle some of these security challenges. In this paper, a dual watermarking method, resistant to tampering attacks, is proposed which embeds copyright information (watermark) in metadata as well as pixel data. Metadata is non-pixel data and offers more robustness to attacks such as cropping, noising, etc. However, metadata can be dropped automatically by image editing softwares. In such cases, watermark is recovered from pixel data. Experiments have been carried out by tampering the watermarked image to check the robustness of proposed method. Simulation results show the efficiency of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tesic, J.: Metadata practices for consumer photos. IEEE Multimedia 12(3), 86–92 (2005)

    Article  Google Scholar 

  2. Mintzer, F., Braudaway, G.W., Yeung, M.M.: Effective and ineffective digital watermarks. In: Proceedings of International Conference on Image Processing, vol. 3, pp. 9–12 (1997)

    Google Scholar 

  3. Yeung, M.M., Mintzer, F.C., Braudaway, G.W., Rao, A.R.: Digital watermarking for high-quality imaging. In: IEEE First Workshop on Multimedia Signal Processing, pp. 357–362 (1997)

    Google Scholar 

  4. Memon, N., Wong, P.W.: Protecting digital media content. Commun. ACM 41(7), 33–43 (1998)

    Article  Google Scholar 

  5. Yang, C.T., Chang, L.W.: Image Authentication By Watermarking with Error Correction Based on Wavelet Packet Transform. In: IEEE International Conference on Multimedia and Expo, ICME 2001, p. 78 (2001)

    Google Scholar 

  6. Zhang, F., Zhang, X., Chen, Z.: Digital Image Authentication Based on Error-correction Codes. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 433–438. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Chang, Y.J., Wang, R.Z., Lin, J.C.: A sharing-based fragile watermarking method for authentication and self-recovery of image tampering. EURASIP Journal of Advances in Signal Processing, 200:1–200:17 (2008)

    Google Scholar 

  8. Wang, N., Kim, C.H.: Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD. In: 9th International Symposium on Communications and Information Technology, ISCIT 2009, pp. 157–162 (2009)

    Google Scholar 

  9. Huang, H.C., Chen, Y.H., Chen, S.C.: Copyright Protection for Images with EXIF Metadata. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 239–242 (2008)

    Google Scholar 

  10. Huang, H.C., Fang, W.C., Chen, S.C.: Copyright Protection with EXIF Metadata and Error Control Codes. In: International Conference on Security Technology, SECTECH 2008, pp. 133–136 (2008)

    Google Scholar 

  11. Qin, C., Mao, Q., Zhang, X.: Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes. Journal of Multimedia 5, 427–433 (2010)

    Article  Google Scholar 

  12. Chen, L., Yao, Z.: A Novel Watermarking Extraction Based on Error Correction Code and Evidence Theory. In: Fourth International Conference on Natural Computation, ICNC 2008, pp. 613–617 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mehta, S., Varadharajan, V., Nallusamy, R. (2012). Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29280-4_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29279-8

  • Online ISBN: 978-3-642-29280-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics