Skip to main content
Log in

An improved double image digital watermarking scheme using the position property

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the last few years, researchers have found that the security of multiple watermarking schemes are more than single watermarking schemes. In 2007, Hu et al. proposed a robust and simple scheme that used two watermark images. However, it had an ambiguity problem that the holder can claim ownership of the others copyright holder’s images. This paper solves the problem of Hu et al.’s scheme by using the position property of the original image. Although our results show that the robustness test of the proposed scheme presented a slightly lower quality than Hu et al.’s scheme, the ambiguity problem does not occur in our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Agreste S, Andaloro G (2008) A new approach to pre-processing digital image for wavelet-based watermark. J Comput Appl Math 221(2):274–283

    Article  MATH  MathSciNet  Google Scholar 

  2. Caronni G (1993) Ermitteln unauthorisierter verteiler von maschinenlebaren daten. ETH Technical report

  3. Chang CC, Hwang HF, Hwang MS (2002) Robust authentication scheme for protecting copyrights of images and graphics. IEE Proc Vision Image Sig Process 149(1):43–50

    Article  Google Scholar 

  4. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital Watermarking and Steganography, 2nd edn. Elsevier, New York

    Google Scholar 

  5. Dan Y, Sattar F, Barkat B (2006) Multiresolution fragile watermarking using complex chirp signals for content authentication. Pattern Recog 39(5):935–952

    Article  MATH  Google Scholar 

  6. Dhanalakshmi R, Thaiyalnayaki K (2010) Dual watermarking scheme with encryption. Int J Comput Sci Inf Secur 7(1):248–253

    Google Scholar 

  7. Gogi M, Bhuyan HMKR, Mahanta K, Das DJ, Dutta A (2013) Image and video based double watermark extrction spread spectrum watermarking in low variance region. Int J Adv Comput Sci Appl 4(6):112–116

    Google Scholar 

  8. Gonzalez RC, Woods RE (2001) Digital image processing, 2nd edn. Prentice Hall, Upper Saddle River

    Google Scholar 

  9. Guo J, Liu Z, Liu S (2007) Watermarking based on discrete fractional random transform. Opt Commun 272(2):344–348

    Article  Google Scholar 

  10. Horng S-J, Rosiyadi D, Fan P, Wang X, Khan MK (2013) An adaptive watermarking scheme for e-government document images. Int J MTAP-Springer 19(3):62–73

    Google Scholar 

  11. Hsia SC, Jou IC, Hwang SM (2002) A gray level watermarking algorithm using double layer hidden approach. IEICE Trans Fundam E85-A(2):463–471

    Google Scholar 

  12. Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House

  13. Lee WB, Chen TH (2002) A public verifiable copy protection technique for still images. J Syst Softw 62(3):195–204

    Article  Google Scholar 

  14. Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757

    Article  Google Scholar 

  15. Lin W-H, Horng S-J, Kao T-W, Chen R-J, Chen Y-H, Lee C-L, Terano T (2009) Image copyright protection with forward error correction. Expert Syst Appl 36(9):11888–11894

    Article  Google Scholar 

  16. Lin SD, Shie SC, Chen CF (2003) A DCT based image watermarking with threshold embedding. Int J Comput Appl 25(2):130–135

    Google Scholar 

  17. Lin W-H, Wang Y-R, Horng S-J, Yi P (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516

    Article  Google Scholar 

  18. Lin W-H, Wang Y-R, Horng S-J (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878

    Article  Google Scholar 

  19. Lou DC, Tso HK, Liu JL (2007) A copyright protection scheme for digital images using visual cryptography technique. Comput Stand Interfaces 29(1):125–131

    Article  Google Scholar 

  20. Lou DC, Liu JL, Chang MC (2003) Digital watermarking using multi-resolution wavelet transform. In: Proceedings of the IEEE 37th annual 2003 international Carnahan conference on security technology, pp 370–377

  21. Ming Chiang H, Lou DC, Chang MC (2007) Dual-wrapped digital watermarking scheme for image copyright protection. Comput Secur 26(4):319–330

    Article  Google Scholar 

  22. Mohammad AA, Alhaj A, Shaltaf S (2008) An improved SVD-based watermarking scheme for protecting rightful ownership. Sig Process 88(9):2158–2180

    Article  MATH  Google Scholar 

  23. Peng Z, Liu W (2008) Color image authentication based on spatiotemporal chaos and svd. Chaos Solitons Fractals 36(4):946–952

    Article  Google Scholar 

  24. Preda RO, Vizireanu DN (2010) A robust digital watermarking scheme for video copyright protection in the wavelet domain. Meas 43(10):1720–1726

    Article  Google Scholar 

  25. Preda RO, Vizireanu DN (2011) Quantization based video watermarking in the wavelet domain with spatial and temporal redundancy. Int J Electron 98(03):393–405

    Article  Google Scholar 

  26. Preda RO, Vizireanu DN (2011) Robust wavelet based video watermarking scheme for copyright protection using the human visual system. J Electron Imaging 20:013–022

    Article  Google Scholar 

  27. Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Yi Pan (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimedia 19(3):62–73

    Article  Google Scholar 

  28. Tanaka K, Nakamura Y, Matsui K (1990) Embedding secret information into a dithered multilevel image. In: Proceedings of IEEE international conference on image processing, pp 216–220

  29. Tirkel AZ, Rankin GA, van Schyndel RM, Ho WJ, Mee NRA, Osborne CF (1993) Electronic water mark. In: Proceedings DICTA, pp 666–672

  30. Wu YT, Shih FY (2007) Digital watermarking based on chaotic map and reference register. Patt Recog 40(12):3753–3763

    Article  MATH  Google Scholar 

  31. Zhang X, Wang S (2005) Stego-encoding with error correction capability. IEICE Trans Fundam E88-A(12):3663–3667

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology(2012008348) and the IT R&D program of MSIP/KEIT. [10041145, Self-Organized Software platform(SoSp) for Welfare Devices].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kee-Young Yoo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, GJ., Yoo, KY. An improved double image digital watermarking scheme using the position property. Multimed Tools Appl 74, 7261–7283 (2015). https://doi.org/10.1007/s11042-014-1980-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-1980-8

Keywords

Navigation