Skip to main content
Log in

More secure lossless visible watermarking by DCT

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This study proposes a scheme for using modified coefficients of the DCT of an image to generate a lossless visible watermark. The major contribution of the proposed technique is the improved security against attack to remove watermarks under stricter assumption of Kerckhoffs’ principle. After the host images and watermarks are decomposed into several frequencies, the DCT coefficients of the watermark are embedded into the DCT coefficients of the host image. Integer mapping is then used to perform 2-dimensional DCT. The major advantage of the method is the improved security achieved by using a random permutation matrix to factorize the transformation matrix. That is, since the embedding stage multiplies the transformation matrix by a random permutation matrix, illicit users, even under the stricter assumption of Kerckhoffs principle that the proposed embedding method is known by illicit users, cannot properly recover the host image without the correct permutation matrix. Unlike methods that embed the watermark in quantized frequency-domain coefficients, the watermarked image remains in raw lossless image form instead of some lossy form of quantized coefficients e.g., JPEG-formatted. Maintaining the lossless format of the watermarked image provides reversibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int. J. Signal Image Process. (IJSIP) 1(3):196– 204

    Google Scholar 

  2. Al-Otaibi N, Gutub A (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lect Notes Inf Theory 2(2):151–157

    Google Scholar 

  3. Al-Otaibi N, Gutub A, Khan E (2015) Stego-system for hiding text in images of personal computers, the 12th learning and technology conference: wearable tech/wearable learning. Effat University, Jeddah, Kingdom of Saudi Arabia, pp 12–13

    Google Scholar 

  4. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35:313–316

    Article  Google Scholar 

  5. Farrugia FA (2010) A reversible visible watermarking scheme for compressed images. MELECON 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference, pp 212–217

  6. Hao P, Shi Q (2001) Matrix factorizations for reversible integer mapping. IEEE Trans Signal Process 49(10):2314–2324

    Article  MathSciNet  MATH  Google Scholar 

  7. Hu Y, Jeon B (2006) Reversible visible watermarking and lossless recovery of original images. IEEE Trans Circ Syst Video Technol 16(11):1423–1429

    Article  Google Scholar 

  8. Kerckhoffs A (1883) La cryptographie militaire. J Sci Militaires IX(5-83):161–191

    Google Scholar 

  9. Li X, Yang B, Cheng DF, Zeng TY (2009) A generalization of LSB matching. IEEE Signal Process Lett 16(2):69–72

    Article  Google Scholar 

  10. Lin SD, Shie SC Improving robustness of visible watermarking schemes for images. the 2004 IEEE International Symposium on Consumer Electronics (ISCE2004)

  11. Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85(10):2395–2404

    Article  Google Scholar 

  12. Liu TY, Tsai WH (2010) Generic lossless visible watermarking – A new approach. IEEE Trans Image Process 19(5):1224–1235

    Article  MathSciNet  MATH  Google Scholar 

  13. Mohanty SP, Ramakrishnan KR, Kankanhal MS (2000) A DCT domain visible watermarking technique for images. In: Proceeding of IEEE International Conference of Multimedia and Expo, vol 2, pp 1029–1032

  14. Rao KR, Yip P (1990) Discrete cosine transform: algorithms, advantages, applications. Academic Press, Boston

    Book  MATH  Google Scholar 

  15. Sinduja R, Rachel RL, Sathiya RD (2012) A novice approach for lossless visible watermarking approach by pioneering the best block (LVW-PBB), Computer and Information Science, vol 270. Springer,

  16. Tsai HM, Chang LW (2007) A high secure reversible visible watermarking scheme. In: Proceeding of IEEE International Conference of Multimedia and Expo, Beijing, China, pp 2106–2109

    Google Scholar 

  17. Wu MH, Hsu FH, Yang CH, Wang SJ (2011) Reversible watermarking scheme with visibility using randomize distance. ICGEC,

  18. Yang Y, Sun X, Yang H, Li C (2008) Removable visible image watermarking algorithm in the discrete cosine transform domain. J Electron Imaging 17(3):1–11

    Google Scholar 

  19. Yang Y, Sun X, Yang H, Li C, Xiao R (2009) A contrast-sensitive reversible visible image watermarking technique. IEEE Trans Circ Syst Video Technol 19(5)

  20. Yip SK, Au OC, Ho CW, Wong HM (2006) Lossless visible watermarking. In: Proceeding of International Conference of Multimedia and Expo, pp 2106–2109

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yih-Kai Lin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, YK., Yang, CH. & Tsai, JT. More secure lossless visible watermarking by DCT. Multimed Tools Appl 77, 8579–8601 (2018). https://doi.org/10.1007/s11042-017-4753-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4753-3

Keywords

Navigation