- A Review Study
vsanthi@vit.ac.in
Saraswathi.M. V. Santhi
School of Computing Science and Associate Professor
Engineering School of Computing Science and
VIT University Engineering
Vellore, India VIT University
Vellore, India
Saraswathi2783@gmail.com
ABSTRACT - The decoder and comparator (detection
The advent of the Internet has resulted in many new algorithm).
opportunities for the creation and delivery of content in digital
form. An important issue that arises in these applications is the EMBEDDINGG AND EXTRACTION PROCESS
protection of the rights of all participants. This has led to an The process of watermarking a host signal is usually
interest towards developing protection mechanisms known as referred to as embedding a message in the host signal. Let us
Digital Watermarking. A visible watermark may convey denote an image by I, a signature by S and the watermarked
ownership information that identifies the originator of image image by W. E is an embedding function, it takes an image I and
and video. a signature S, and it generates a new image (W) which is called
The purpose of this review paper is to study the concepts of watermarked image. [3]
digital watermarking and visible watermarking images. To study
Original
how visible watermarking is implemented in different domain Image(I) Watermark
Watermarked
and in different ways. Embedder
Image (W)
Signature(S)
Keywords
Digital Watermarking, Visible Watermarking. EXTRACTION PROCESS
The process of reading the message at the receiver side is
usually referred to as detecting a message from the received
1. INTRODUCTION signal. A extraction function D takes an image J whose
1.1. Digital Watermarking ownership is to be determined and recovers a signature from the
image. In this process an additional image I can also be included
With the growing popularity of digital Medias through the which is often the original and unwatermarked version of J. This
World Wide Web, intellectual property needs copyright is due to the fact that some encoding schemes may make use of
protection, prevention of illegal copying and verification of the original images in the watermarking process to provide extra
content integrity. One way for copyright protection is robustness against intentional and unintentional corruption of
digital watermarking[1].Digital watermarking is pixels. The extracted signature will then be compared with the
defined as a process of embedding data, called owner signature sequence by a comparator function and a binary
a watermark, into a multimedia objects(host output decision generated. It is 1 if there is match and 0
signal) such that the embedded watermark can otherwise.[3]
be detected or extracted later to make an
assertion about the objects. The multimedia Original
Image(I) Extraction
Binary Output(0/1)
Tsai et al [16] proposed a visible watermarking technique for 5. Munesh Chandra, Shikha Pandey “A DWT Domain
copyright protection of palette images. Visible opaque Visible Watermarking Techniques for Digital Images”,
watermark is embedded to the host image and the watermark is International Conference on Electronics and
considered as binary watermark. In this paper watermarking area Information Engineering,2010
is always considered as the upper left corner. During embedding
process, the watermark area is divided into black watermark
embedded pixels and white watermark embedded pixels. The
occurrences of the colors of the white watermark embedded 6. Saraju P. Mohanty' K. R. Ramakrishnan Mohan S
pixels are calculated. The colors color palette is sorted in Kankanhalli,” A DCT Domain Visible Watermarking
descending order based on the calculation of the occurrences. Technique for Images”,
Euclidean distance for every color is calculated and the color Proceedings of the IEEE, 2000.
which has the maximum distance is selected. The difference
between the maximum Euclidean distance and each color is 7. Han-Min Tsai, Long-Wen Chang,” A HIGH SECURE
found and arranged in ascending order. Watermark is embedded REVERSIBLE VISIBLE WATERMARKING
to the watermark area where the black watermark embedded SCHEME”, Proceedings of the IEEE, 2007.
pixels are located. User defined keys are used during embedding
for security purposes. The Extraction process implements the 8. Pei-Min Chen,” A Visible Watermarking Mechanism
reverse operations of the embedding process. using a Statistic Approach”, Proceedings of
ICSP,2000.
9. Alessandra Lumini, Dario Maio,” Adaptive 17. Tsung-Yuan Liu, Student Member, IEEE, and Wen-
positioning of a visible watermark in a digital image”, Hsiang Tsai, Senior Member, IEEE,” Generic Lossless
IEEE International Conference on Multimedia and Visible Watermarking – A new approach”, IEEE
Expo,2004. TRANSACTIONS ON IMAGE PROCESSING, VOL.
19, NO. 5, MAY 2010.