Skip to main content
Log in

On the implementation of a copyright protection scheme using digital image watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a spatial domain based digital image watermarking scheme has been developed to serve the purpose of copyright protection for digital images. This scheme proposes how to embed copyright information, i.e. the watermark bits by adaptive LSB replacement technique. Here, to improve imperceptibility, imperfect nature of human visual system has been exploited by means of saliency map generation. Robustness and data hiding capacity are also optimized by modifying the higher bit-planes instead of only the LSB. A few signal processing attacks are applied to evaluate the robustness, and several image quality metrics are involved in this purpose. The quality metrics are also used in verifying experimental results in terms of imperceptibility; and finally the system proficiency is compared to some existing frameworks. A proper benchmarking is also employed for a quantitative justification of the visual image degradation, caused by watermark insertion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB Indicator. International Journal of Signal and Image Processing 1(3):196–204

    Google Scholar 

  2. Alanazi N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. Journal of Research in Engineering and Applied Sciences 3(4):118–124

    Google Scholar 

  3. Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl, Springer 78(12):16283–16310

    Google Scholar 

  4. Al-Juaid NA, Gutub AA, Khan EA (2018) Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography. Journal of Information Security and Cybercrimes Research 1(1)

  5. Alsaidi A, Al-Lehaibi K, Alzahrani H, Al Ghamdi M, Gutub A (2018) Compression multi-level crypto Stego security of texts utilizing colored email forwarding. Journal of Computer Science and Computational Mathematics 8(3):33–42

    Google Scholar 

  6. Basu, A., Das, T.S., Sarkar, S.K., 2011, “On the implementation of a information hiding design based on saliency map”, Int Conf Image Information Processing, IEEE, p. 1–6.

  7. Basu A, Sarkar SK (2013) “On the implementation of robust copyright protection scheme using visual attention model”, information security journal: A global perspective. Taylor & Francis 22(1):10–20

    Google Scholar 

  8. Basu A, Sinha Roy S, Chattopadhayay A (2016) Implementation of a spatial domain salient region based digital image watermarking scheme”, Int. Conf. Research in computational intelligence and communication networks, IEEE, p. 269-272

  9. Chopra D, Purohit R, Gaur SBC (2014) Quality evaluation for LSB replacement watermarking of Grayscale images. Int Journal of Advanced Research in Computer and Communication Engineering 3(5)

  10. Chu Y, Zhang Y, Zhang S, Ye X (2006) Region of interest fragile watermarking for image authentication. First International Multi-Symposiums on Computer and Computational Sciences 1:726–731

    Google Scholar 

  11. Duan L, Wu C, Miao J, Qing L (2011) Visual saliency detection by spatially weighted dissimilarity. IEEE Conference on Computer Vision and Pattern Recognition:473–480

  12. Fan YC, Chiang A, Shen JH (2008) ROI-based watermarking scheme for JPEG 2000. Circuits, Systems & Signal Processing 27(5):763–774

    MathSciNet  Google Scholar 

  13. Foris P, Levicky D (2007) Implementations of HVS models in digital image watermarking. Radio Engineering 16(1):45–50

    Google Scholar 

  14. Goferman S, Zelnik-Manor L, Tal A (2013) Context-aware saliency detection. IEEE Trans Pattern Anal Mach Intell 34(10):1915–1926

    Google Scholar 

  15. Goyal R, Kumar N (2014) LSB based digital watermarking technique. International Journal of Application or Innovation in Engineering & Management 3(9):15–18

    Google Scholar 

  16. Gui X, Li X, Yang B (2014) A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process 98:370–380

    Google Scholar 

  17. Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res, Springer 10(1)

  18. Han S, Yang J, Wang R, Jia G (2018) A robust color image watermarking algorithm against rotation attacks. Optoelectron Lett 14(1):61–66

    Google Scholar 

  19. Harel J, Koch C, Perona P (2006) Graph-based visual saliency. Proc Neural Information Processing Systems:545–552

  20. Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensics And Security 7(1):176–184

    Google Scholar 

  21. Hou X, Harel J, Koch C (2012) Image signature: highlighting sparse salient regions. IEEE Trans Pattern Anal Mach Intell 34(1):194–201

    Google Scholar 

  22. Hou X, Zhang L (2007) Saliency detection: A spectral residual approach. Int Conf Computer Vision and Pattern Recognition, IEEE:1–8

  23. Huang J, Shi YQ (1998) Adaptive image watermarking scheme based on visual masking. IEE Electronics Letters 34(8):748–750

    Google Scholar 

  24. Itti L, Koch C (2000) A saliency-based search mechanism for overt and covert shifts of visual attention. Vis Res 40(10–12):1489–1506

    Google Scholar 

  25. Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Boston, London

    Google Scholar 

  26. Kim YS, Kwon OH, Park RH (1999) Wavelet based watermarking method for digital images using the human visual system. IEE Electronics Letters 35(6):466–468

    Google Scholar 

  27. Kumar C, Singh AK, Kumar P (2018) Improved wavelet-based image watermarking through SPIHT. Journal of Multimedia Tools and Application, Springer:1–14

  28. Kutter M, Hartung F (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107

    Google Scholar 

  29. Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. Electronic Imaging ‘99, Security and Watermarking of Multimedia Contents, 3657

  30. Lee HK, Kim HJ, Kwon SG, Lee JK (2005) ROI medical image watermarking using DWT and bit-plane. Asia-Pacific Conference on Communications:512–515

  31. Li J, Dong C, Han X, et al (2012) DFT based Multiple Watermarks for Medical Image Robust to Common and Geometrical Attacks. 6th International Conference on New Trends in Information Science and Service Science and Data Mining (ISSDM), IEEE, p. 472–477

  32. Li W, Yang C, Li C, Yang Q (2012) JND Model Study in Image Watermarking”, Advances in Multimedia, Software Engineering and Computing, 2, (Advances in Intelligence and Soft Computing, 129), p. 535–543

  33. Majumdar S, Das TS, Sarkar SK (2011) DWT and SVD based image watermarking scheme using noise visibility and contrast sensitivity. Int Conf on Recent Trends in Information Technology, IEEE:938–942

  34. Makbol NM, Khoo BE (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Journal of Digital Signal Processing, Elsevier 33:134–147

    Google Scholar 

  35. Mishra S, Mahapatra M, Mishra P (2013) A survey on digital watermarking techniques. Int Journal of Computer Science and Information Technologies 4(3):451–456

    Google Scholar 

  36. Mohanty SP. Digital Watermarking: A Tutorial Review. http://www.csee.usf.edu. Accessed 1999

  37. Mohanty SP, Bhargava BK (2008) Invisible watermarking based on creation and robust insertion–extraction of image adaptive watermarks. ACM Trans Multimed Comput Commun Appl 5(2):12:1–12:22

    Google Scholar 

  38. Ni R, Ruan Q (2006) Region of interest watermarking based on fractal dimension. Proc Int Conf Pattern Recogn 3:934–937

    Google Scholar 

  39. Niu Y, Kyan M, Ma L, Beghdadi A (2011) A visual saliency modulated just noticeable distortion profile for image watermarking. European signal processing conference, p. 2039-2043

  40. Pareek R, Ghosh PK (2012) Discrete cosine transformation based image watermarking for authentication and copyright protection. International Journal of Engineering and Advanced Technology (IJEAT) 1(3)

  41. Parvez MT, Gutub AA (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering 38(1B):127–142

    Google Scholar 

  42. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding – A survey. Proc of the IEEE 87(7):1062–1078

    Google Scholar 

  43. Prasanna S, Toshanlal M, Ankit S, Vivek G, Amit K (2015) A DWT-SVD based digital watermarking technique for copyright protection. Int Conf on Electrical, Electronics, Signals, Communication and Optimization

  44. Que D, Zhang L, Lu L, Shi L (2006) A ROI image watermarking algorithm based on lifting wavelet transform. Proc Int Conf Signal Processing 4. https://doi.org/10.1109/ICOSP.2006.345979

  45. Shaikh S, Deshmukh M (2013) Modulation of watermarking using JND parameter in DCT domain. Int Journal of Engineering and Advanced Technology 3(2):158–161

    Google Scholar 

  46. Sinha Roy S, Basu A, Chattopadhyay A (2019) Perspectives on Digital Image Watermarking, Intelligent Copyright Protection for Images, 1st edn. CRC, Taylor and Francis, New York

    Google Scholar 

  47. Sinha Roy S, Saha S, Basu A (2015) Generic testing architecture for digital watermarking. Proc. FRCCD-2015, (50-58)

  48. Su Q, Chen B (2017) Robust color image watermarking technique in the spatial domain. Springer Journal on Soft Computing - A Fusion of Foundations, Methodologies and Applications 22(1):91–106

    MathSciNet  Google Scholar 

  49. Sur A, Sagar SS, Pal R, Mitra P, Mukherjee J (2009) A new image watermarking scheme using saliency based visual attention model. India Conference, IEEE:1–4

  50. The USC-SIPI Image Database. http://sipi.usc.edu/database/database.php?volume=misc

  51. Verma M, Yadav P (2013) Capacity and security analysis of watermark image truly imperceptible. Int Journal of Advanced Research in Computer and Communication Engineering 2(7):2913–2917

    Google Scholar 

  52. Wang Q, Yuan Y, Yan P, Li. (2013) Saliency detection by multiple-instance learning. IEEE Transactions on Cybernetics 43(2):660–672

    Google Scholar 

  53. Wong MLD, Lau SIJ, Chong NS, Sim KY (2013) A salient region watermarking scheme for digital mammogram authentication. Int Journal of Innovation, Management and Technology 4(2):228–232

    Google Scholar 

  54. Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. Journal of Information Security and Applications 26:1–7

    Google Scholar 

  55. Xu H, Wanga J, Kim HJ (2010) Near-optimal solution to pair wise LSB matching via an immune programming strategy. Inf Sci 180(8):1201–1217

    Google Scholar 

  56. Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn 41(8):2674–2683

    MATH  Google Scholar 

  57. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhrajit Sinha Roy.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sinha Roy, S., Basu, A. & Chattopadhyay, A. On the implementation of a copyright protection scheme using digital image watermarking. Multimed Tools Appl 79, 13125–13138 (2020). https://doi.org/10.1007/s11042-020-08652-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08652-9

Keywords

Navigation