Skip to main content
Log in

Adaptive removable visible watermarking technique using dual watermarking for digital color images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a removable visible watermarking system based on a dual watermark technique and blind removal. A visible watermark pattern is embedded in the cosine discrete transform (DCT) domain, taking into consideration the texture and luminance features of the watermark and host images to create a visible watermarked image. To prevent illegal visible watermark removal, the original watermark is embedded in an invisible manner in the visible watermarked image by employing the Quantization Index Modulation-Dither Modulation (QIM-DM) technique, thus ensuring that the original watermark cannot be obtained by malicious attacks. The visible watermark removal process is carried out using only the correct user’s keys, without the need for additional information, such as the original watermark or the original host image, which allows a high-quality image to be obtained; however, if the user’s keys used in the removal process are wrong, the visible watermarked image suffers higher distortion in its content, even in non-visible watermarked regions. The experimental results show that the proposed system outperforms previous related works in terms of blind removal, preservation of the quality of the unmarked recovered image, and higher visual degradation of the content in the recovered image if an illegal removal attempt is performed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Chen B, Wornell GW (1998) Digital watermarking and information embedding using dither modulation, Workshop on Multimedia Signal Processing pp 273–278

  2. Chen B, Wornell GW (2001) Quantization index modulation methods for digital watermarking and information embedding of multimedia. J VLSI Sig Proc Syst Sig, Image and Video Technol 27:7–33

    Article  MATH  Google Scholar 

  3. Chen CC, Tsai YH, Yeh HC (2016) Difference-expansion based reversible and visible image watermarking scheme. Multimed Tools Appl 76:8497–8516

    Article  Google Scholar 

  4. Farfoura ME, Horng SJ, Lai JL, Run RS, Chen RJ, Khan MK (2012) A blind reversible method for watermarking relational database on a time-stamping protocol. Expert Syst Appl 39:3185–3192

    Article  Google Scholar 

  5. Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2014) Adaptive watermarking scheme for e-government document image. Multimed Tools Appl 72:3085–3103

    Article  Google Scholar 

  6. Hu Y, Kwong S, Huang J (2006) An algorithm for removable visible watermarking. IEEE Trans Circuits Syst Video Technol 16:129–133

    Article  Google Scholar 

  7. Huang BB, Tang SX (2006) A contrast-sensitive visible watermarking scheme. IEEE Multimedia 13:60–66

    Article  Google Scholar 

  8. Kankanhalli MS, Ramakrishnan KR (1999) Adaptive visible watermarking of images. International Conference on Multimedia Computing and Systems, Florence, Italy, pp 568–573

  9. Lin PY, Chen YH, Chang CC, Lee JS (2013) Contrast-adaptive removable visible watermarking (CARVW) mechanism. Image Vis Comput 31:311–321

    Article  Google Scholar 

  10. Matheson LR, Mitchell SG, Shamoon TG, Tarjan RE, Zane F (1998) Robustness and security of digital watermarks, International Conference on financial cryptography. Lect Notes Comput Sci 1465:227–240

    Article  Google Scholar 

  11. Phadikar A, Maity SP (2010) An efficient m-ary QIM data hiding algorithm for the application to image error concealment. Int J Netw Security Appl 2:169–188

    Article  Google Scholar 

  12. Poisel R, Tjoa S (2011) Forensics investigations of multimedia data: a review of the state-of-the-art, sixth International Conference on IT security incident management and IT forensics, pp 48-61

  13. Qi H, Zheng D, Zhao J (2008) Human visual system based adaptive digital image watermarking. Signal Process 88:174–188

    Article  MATH  Google Scholar 

  14. Strang G (1999) The discrete cosine transform. SIAM Rev 41:135–147

    Article  MathSciNet  MATH  Google Scholar 

  15. Tsai MJ (2009) A visible watermarking algorithm based on the content and contrast aware (COCOA) technique. J Vis Commun Image Represent 20:323–338

    Article  Google Scholar 

  16. Tsai HM, Chang LW (2010) Secure reversible visible image watermarking with authentication. Signal Process Image Commun 25:10–17

    Article  Google Scholar 

  17. Weng CY, Zhang YH, Lin CL (2013) Visible watermarking images in high quality of data hiding. J Supercomput 66:1033–1048

    Article  Google Scholar 

  18. Yang H, Yin J (2015) A secure removable visible watermarking for BTC compressed images. Multimed Tools Appl 74:1725–1739

    Article  Google Scholar 

  19. Yang Y, Sun X, Yang H (2008) Removable visible image watermarking algorithm in the discrete cosine transform domain. J Electron Imaging 17:033008–033008

    Article  Google Scholar 

Download references

Acknowledgements

Authors thank the National Council of Science and Technology of Mexico (CONACyT) and IPN for financial support to carry out this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rogelio Reyes-Reyes.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rangel-Espinoza, K., Fragoso-Navarro, E., Cruz-Ramos, C. et al. Adaptive removable visible watermarking technique using dual watermarking for digital color images. Multimed Tools Appl 77, 13047–13074 (2018). https://doi.org/10.1007/s11042-017-4931-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4931-3

Keywords

Navigation