Abstract
Ownership evidence can be directly exposed through visible watermarks which can avoid the attempts of copyright abuses. JPEG images are widely used for many commercial applications in Internet, because of its reduced size and the requirement of low bandwidth. In this paper, a visible watermarking scheme is proposed for JPEG compressed images. This scheme is based on the modification of frequency coefficients of original image with respect to the frequency coefficients of watermark image. In JPEG compression, forward discrete cosine transform (DCT) phase is processed to embed visible watermarks. Different sizes of color and grayscale watermark images can be embedded in the carrier image with high visibility. Experimental results confirm the quality of the proposed visible watermarking scheme.
Similar content being viewed by others
REFERENCES
Hong, W. and Chen, T.-S., A novel data embedding method using adaptive pixel pair matching, IEEE Trans. Inf. Forensic Secur., 2012, vol. 7, no. 1, pp. 176–184. https://doi.org/10.1109/TIFS.2011.2155062
Guo, L., Ni, J., and Shi, Y.Q., Uniform embedding for efficient JPEG steganography, IEEE Trans. Inf. Forensic Secur., 2014, vol. 9, no. 5, pp. 814–825. https://doi.org/10.1109/TIFS.2014.2312817
Denslin Brabin, D.R. and Paul Perinbam, J.R., A high capacity data hiding scheme for digital images using normalization, Int. J. Appl. Eng. Res., 2015, vol. 10, no. 1, pp. 1341–1350.
Sergeichik, V.V. and Ivaniuk, A.A., Digital watermark and fingerprint in variable rank linear-feedback shift register, Autom. Control Comput. Sci., 2016, vol. 50, no. 2, pp. 107–115. https://doi.org/10.3103/S0146411616020048
Taha. T.B., Ngadiran, R., and Ehkan, P., Adaptive image watermarking algorithm based on an efficient perceptual mapping model, IEEE Access, 2018, vol. 6, pp. 66254–66267. https://doi.org/10.1109/ACCESS.2018.2878456
Shiu, P.-F., Lin, C.-C., Jan, K.-K., and Chang, Y.-F., A DCT-based robust watermarking scheme surviving JPEG compression with voting strategy, J. Network Intell., 2018, vol. 3, no. 4, pp. 259–277.
Sharmin, F. and Khan, M.I., Image steganography using combined nearest and farthest neighbors methods, Int. J. Adv. Comput. Sci. Appl., 2019, vol. 10, no. 11, pp. 213–219.
Tsai, M.-J. Liu, J., and Wang, C.-S., A game-theoretic framework for the security system of visible watermarking, Expert Syst. Appl., 2011, vol. 38, no. 5, pp. 5748–5754. https://doi.org/10.1016/j.eswa.2010.10.058
Weng, C.-Y., Zhang, Y.H., Lin, L.C., and Wang, S.-J., Visible watermarking images in high quality of data hiding, J. Supercomput., 2013, vol. 66, no. 2, pp. 1033–1048. https://doi.org/10.1007/s11227-013-0969-9
Lin, P.-Y., Chen, Y.-H., Chang, C.-C., and Lee, J.-S., Contrast-adaptive removable visible watermarking (CARVW) mechanism, Image Vision Comput., 2013, vol. 31, no. 4, pp. 311–321. https://doi.org/10.1016/j.imavis.2013.02.002
Lin, P.-Y., Imperceptible visible watermarking based on postcamera histogram operation, J. Syst. Software, 2014, vol. 95, pp. 194–208. https://doi.org/10.1016/j.jss.2014.04.038
Tsai, M.-J., Liu, J., Yin, J.-S., and Yuadi, I., A visible wavelet watermarking technique based on exploiting the contrast sensitivity function and noise reduction of human vision system, Multimedia Tools Appl., 2014, vol. 72, no. 2, pp. 1311–1340. https://doi.org/10.1007/s11042-013-1423-y
Yang H. and Yin, J., A secure removable visible watermarking for BTC compressed images, Multimedia Tools Appl., 2015, vol. 74, no. 6, pp. 1725–1739. https://doi.org/10.1007/s11042-013-1714-3
Shih, F.Y. and Zhong, X., High-capacity multiple regions of interest watermarking for medical images, Inf. Sci., 2016, vols. 367–368, pp. 648–659. https://doi.org/10.1016/j.ins.2016.07.015
Agarwal, H., Sen, D., Raman, B., and Kankanhalli, M., Visible watermarking based on importance and just noticeable distortion of image regions, Multimedia Tools Appl., 2016, vol. 75, no. 13, pp. 7605–7629. https://doi.org/10.1007/s11042-015-2685-3
Thanki, R., Borra, S., Dwivedi, V., and Borisagar, K., A RONI based visible watermarking approach for medical image authentication, J. Med. Syst., 2017, vol. 41, no. 9, p. 143. https://doi.org/10.1007/s10916-017-0795-3
Santoyo-Garcia, H., Fragoso-Navarro, E., Reyes-Reyes, R., Cruz-Ramos, C., and Nakano-Miyatake, M., Visible watermarking technique based on human visual system for single sensor digital cameras, Secur. Commun. Networks, 2017, vol. 2017, p. 7903198. https://doi.org/10.1155/2017/7903198
Mohammad, N., Sun, X., Yang, H., Yin, J., Yang, G., and Jiang, M., Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images, Multimedia Tools Appl., 2017, vol. 76, no. 11, pp. 13301–13313. https://doi.org/10.1007/s11042-016-3757-8
Chen, C.-C. and Yeh, H.-C., Using dynamic pixel value mapping method to construct visible and reversible image watermarking scheme, Multimedia Tools Appl., 2018, vol. 77, no. 15, pp. 19327–19346. https://doi.org/10.1007/s11042-017-5370-x
Ye, Z., Wang, H., Xiong, J., and Wang, K., Simultaneous full-color single-pixel imaging and visible watermarking using Hadamard-Bayer illumination patterns, Opt. Lasers Eng., 2020, vol. 127, p. 105955. https://doi.org/10.1016/j.optlaseng.2019.105955
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflict of interest.
About this article
Cite this article
Denslin Brabin, D.R., Bojjagani, S. & Braja, D.D. A Visible Watermarking Scheme for JPEG Images Based on Modification of Frequency Coefficients. Aut. Control Comp. Sci. 55, 444–453 (2021). https://doi.org/10.3103/S0146411621050023
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411621050023