Anda di halaman 1dari 5

Visible Watermarking Techniques for Digital Images

- A Review Study
vsanthi@vit.ac.in
Saraswathi.M. V. Santhi
School of Computing Science and Associate Professor
Engineering School of Computing Science and
VIT University Engineering
Vellore, India VIT University
Vellore, India
Saraswathi2783@gmail.com
ABSTRACT - The decoder and comparator (detection
The advent of the Internet has resulted in many new algorithm).
opportunities for the creation and delivery of content in digital
form. An important issue that arises in these applications is the EMBEDDINGG AND EXTRACTION PROCESS
protection of the rights of all participants. This has led to an The process of watermarking a host signal is usually
interest towards developing protection mechanisms known as referred to as embedding a message in the host signal. Let us
Digital Watermarking. A visible watermark may convey denote an image by I, a signature by S and the watermarked
ownership information that identifies the originator of image image by W. E is an embedding function, it takes an image I and
and video. a signature S, and it generates a new image (W) which is called
The purpose of this review paper is to study the concepts of watermarked image. [3]
digital watermarking and visible watermarking images. To study
Original
how visible watermarking is implemented in different domain Image(I) Watermark
Watermarked
and in different ways. Embedder
Image (W)

Signature(S)
Keywords
Digital Watermarking, Visible Watermarking. EXTRACTION PROCESS
The process of reading the message at the receiver side is
usually referred to as detecting a message from the received
1. INTRODUCTION signal. A extraction function D takes an image J whose
1.1. Digital Watermarking ownership is to be determined and recovers a signature from the
image. In this process an additional image I can also be included
With the growing popularity of digital Medias through the which is often the original and unwatermarked version of J. This
World Wide Web, intellectual property needs copyright is due to the fact that some encoding schemes may make use of
protection, prevention of illegal copying and verification of the original images in the watermarking process to provide extra
content integrity. One way for copyright protection is robustness against intentional and unintentional corruption of
digital watermarking[1].Digital watermarking is pixels. The extracted signature will then be compared with the
defined as a process of embedding data, called owner signature sequence by a comparator function and a binary
a watermark, into a multimedia objects(host output decision generated. It is 1 if there is match and 0
signal) such that the embedded watermark can otherwise.[3]
be detected or extracted later to make an
assertion about the objects. The multimedia Original
Image(I) Extraction
Binary Output(0/1)

objects can be text, image, audio, video and Process Comparator

their compositions. If the host signal is represented by


x and the watermarked signal by y, then the watermark, Watermarked Original signature
represented by w, is defined as w , y − x, i.e., the difference Image(j)

between the watermarked and the host signal. A simple


example of a digital watermark would be a visible seal TYPES OF DIGITAL WATERMARKS
placed over an image to identify the copyright. However Watermarks and watermarking techniques can be divided into
the watermark might contain additional information various categories in various ways. According to working
including the identity of the purchaser of a particular copy domain watermarking is divided into frequency domain and
of the material. [2] spatial domain. Watermarking techniques can be divided into
General Framework for Watermarking four categories according to the type of document to be
In general, any watermarking scheme (algorithm) consists watermarked as follows.
of three parts. * Image Watermarking * Video Watermarking
- The watermark. *Audio Watermarking *Text Watermarking
- The encoder (insertion algorithm).
According to the human perception, the digital watermarks can Cropping
be divided into three different types as follows. A common editing operation is the spatial rejection of a portion
· Visible watermark of the marketed image. Such an operation is also considered to
· Invisible-Robust watermark be a serious threat to the watermarked information. This is a
· Invisible-Fragile watermark very important consideration when the watermarking is done in
the spatial domain. This requires the watermarked information
In visible watermarking, the information is visible in the picture
to be embedded in those areas of the original image which are
or video. Typically, the information is text or a logo which
significant, and if cropped away results in severe degradation of
identifies the owner of the media. . When a television
the actual image.
broadcaster adds its logo to the corner of transmitted video, this
Jitter Attack
is also a visible watermark.
A simple and yet devastating attack on the watermark is to add a
bit of jitter to the signal. In cases where the lower order bits are
In invisible watermarking, information is added as digital data
used to carry the watermark information, such an attack can
to audio, picture or video, but it cannot be perceived. The
totally destroy the hidden data.
invisible-robust watermark is embedded in such a way that an
alternation made to the pixel value is perceptually not noticed 1.2. Visible Watermarking
and it can be recovered only with appropriate decoding
mechanism. The invisible-fragile watermark is embedded in Visible watermarking is a type of digital watermarking used for
such a way that any manipulation or modification of the image protection of publicly available images [6]. Visible
would alter or destroy the watermark.[2] watermarking schemes are important intellectual property rights
(IPR) protection mechanisms for digital images and videos that
Properties of Watermarks have to be released for certain purposes but illegal reproductions
There are a number of measurable characteristics that a of them are prohibited. Visible watermarking techniques protect
watermark should exhibit. These include that it should be digital contents in a more active manner, which is quite different
difficult to notice, robust to common distortions of the signal, from the invisible watermarking techniques. Digital data
resistant to malicious attempts to remove the watermark, embedded with visible watermarks will contain recognizable but
support a sufficient data rate commensurate with these unobtrusive copyright patterns, and the details of the host data
application, allow multiple watermarks to be added and that the should still exist. The embedded pattern of a useful visible
decoder be scalable.[4] watermarking scheme should be difficult or even impossible to
Applications of Digital Watermarking be removed unless intensive and expensive human labors are
Digital watermarking techniques have wide ranging involved. [19]
applications. Some of the applications are enlisted below.[2] In visible watermarking, the information is visible in
• Copyright Protection: Digital watermarks can be used to the picture or video. Typically, the information is text or a logo
identify and protect copyright ownership. which identifies the owner of the media. A television
• Copy Protection: Digital content can be watermarked to broadcaster adds its logo to the corner of transmitted video; this
indicate that the content cannot be illegally replicated. is also a visible watermark. Visible watermarking has been more
• Tracking: Digital watermarks can be used to track the usage of popular in the case of protecting digital images due to the fact
digital content. Each copy of digital content can be uniquely that it allows users to easily identify their content due to the
watermarked with metadata specifying the authorized users of property of the scheme without the need for an explicit
the content. Such watermarks can be used to detect illegal extractor. This also allows owners to prevent the unauthorized
replication of content by identifying the users who replicated the usage of their images [12]. Visible watermarks change the signal
content illegally. The watermarking technique used for tracking altogether such that the watermarked signal is totally different
is called as fingerprinting. from the actual signal, e.g., adding an image as a watermark to
• Tamper Proofing: Digital watermarks, which are fragile in another image. Stock photography agencies often add a
nature, can be used for tamper proofing. Digital content can be watermark in the shape of a copyright symbol ("©") to previews
embedded with fragile watermarks that get destroyed whenever of their images, so that the previews do not substitute for high-
any sort of modification is made to the content. Such quality copies of the product included with a license. [18]
watermarks can be used to authenticate the content. The main advantage of using a visible watermark is that
• Broadcast Monitoring: Digital watermarks can be used to they convey an immediate claim of ownership, providing credit
monitor broadcasted content like television and broadcast radio to the owner. It also prevents or at least discourages
signals. Advertising companies can use systems that can detect unauthorized use of copyrighting high quality images. Such
the broadcast of advertisements for billing purposes by deterrence is considered useful which is evidenced by the
identifying the watermarks broadcast along with the content. common practice of the use of a visible watermark in television
Attacks on watermarking systems broadcasting where the channel logo is translucently placed at
The different types of watermarking systems include common the corner of the screen image. It also serves the dual purpose of
signal processing, geometric and other intentional attacks.[18] providing a recognizable identity to the content. [10].
Filtering • The ease of adding a visible watermark to an image
The marketed image may undergo several filtering operations often makes it a palatable option.
in the course of enhancement techniques. Such filtering • This type of watermarks is easily viewable without
operations include low pass, high pass, median or Gaussian any mathematical calculation.
filtering. It is absolutely necessary for the watermarked • Adding an invisible watermark to an image is often
information to be resistant to all such filtering processes. much more complicated than adding a visible
Rescaling watermark, although a number of available software
The watermark is also prone to be distorted or lost while the
marketed image is rescaled.
packages perform the necessary operations as input, depending on the input region either PVMA or PPSA
automatically. algorithm is used and the mapping will be done. During
• Only visible watermarking will not with stand general mapping the secret key will be introduced in order to maintain
image processing attacks (particularly watermark is security. Then the watermarked image is produced as the result.
completely removed by cropping the visible
information). In such cases spreading the visible
watermark all over the original image solves the above Tsai et al.[7] proposed the algorithm for removing the
problem. watermark from the watermarked image in order to get the
Three major requirements for visible watermarking: original image. The algorithm satisfies the three major
1. Visibility: The watermark must be easily identified. requirements of visible watermarking – visibility, transparency
2. Transparency: The watermark must not significantly obscure and robustness. Watermark bits are introduced to the gray scale
the image details beneath it. image using the mapping function to get the watermarked
3. Robustness: The original pixels in the watermarked areas image. During extraction the mapping produces only the
should not be easily recovered. [7] approximated image. In order to obtain the original image,
Characteristics of visible watermarks: Location image and the difference image is embedded along
• A visible watermark should be obvious in both color and with the watermarked image as the side information. The secret
monochrome images. key is introduced along the mapping to enhance the security.
• The watermark should be spread in a large or important area Only the user who has the correct secret key can extract the
of the image in order to prevent its deletion by clipping. The original image.
watermark should be visible yet must not significantly
obscure the image details beneath it.
• The watermark must be difficult to remove; removing a Lumini et al.[9] proposed a idea for selecting a best position for
watermark should be more costly and labor intensive than inserting the watermark such that the watermark is difficult to
purchasing the image from the owner. remove. The two conditions for selecting the best position are
• The watermark should be applied automatically with little the region should not be too detailed and the region should not
human intervention and labor.[6] be excessively uniform. For selecting the position, in a host
Visible watermarks can be used in following cases: image a local measure based on intensity variation is evaluated
Visible watermarking for enhanced copyright protection. then the region with the lowest mean value is selected for
In such situations, where images are made available through inserting the watermark. The intensity variation is found using
Internet and the content owner is concerned that the images will the difference between highest and the lowest pixel.
be used commercially (e.g. imprinting coffee mugs) without
payment of royalties. Here the content owner desires an Rajmohan et al [10] proposed a technique for selecting the
ownership mark, that is visually apparent, but which does not location and strength of the watermark to be inserted is based on
prevent image being used for other purposes. the content of the host image. The host image is converted from
Visible watermarking used to indicate ownership originals. RGB to YCbCr domain. Only the Y component is selected for
In this case images are made available through the Internet and embedding. The host image is divided into 8x8 blocks and the
the content owner desires to indicate the ownership of the block DCT is performed. DCT coefficients are analyzed based
underlying materials (library manuscript), so an observer might on texture, edge and luminance information. The scaling factors
be encouraged to patronize the institutions that own the are introduced based on the analysis. The DCT coefficients of
material.[12] the watermark image are added with host image DCT
coefficients and the scaling factors in order to get the
2. REVIEW STUDY ON VISIBLE watermarked image.
WATERMARKING IMAGES
A number of techniques have been proposed for embedding and
extracting a watermark in a digital image using visible Mohanty et al [6] proposed a visible watermarking scheme using
watermarking. A review has been done on the same area and it DCT domain. Mathematical model has been developed for
is given briefly below. finding the scaling and embedding factors without degrading the
quality of the image. The original image and the watermark
Yip et al.[13] proposed the importance of lossless visible image are divided into 8x8. Block DCT is applied. The scaling
watermarking. Since visible watermarking produces more factors were found and DCT coefficients of the watermark are
distortion, lossless property is introduced such that the original embedded with the host image DCT coefficients. Inverse DCT is
image is recovered perfectly during extraction with less applied in order to obtain the watermarked image.
distortion. In this paper watermark is inserted to the host image
using lossless visible algorithms, Pixel Value Matching
Algorithm(PVMA) and Pixel Position Shift Algorithm(PPSA). Yeh et al [15] proposed a method which is user key dependent
In PVMA the watermark is embedded to the host image using a removable visible watermarking scheme in compressed domain.
mapping function. PVMA treats both the low variance region The original image and the watermarked image are segmented
and high variance regions as the same. In order to overcome this into 8x8 blocks. Characteristics of the watermark is identified, if
disadvantage PPSA is introduced. Along with the mapping the watermark image’s segmented block contains any
function, a circular pixel shift is introduced which adds more foreground color then it is meaningful else it is unmeaningful.
energy to the high variance region. The secret key is introduced Coefficients of the segmented blocks of both original image and
during mapping to enhance the security. The embedding the watermark image are shifted by -128 gray levels. DCT is
procedure is original image and watermark image will be taken applied then the DCT coefficients of original image are
embedded into DCT coefficients of watermark. Then
Quantization is applied and quantized coefficients are encoded Tsung et al [17] proposed a generic lossless visible
by a Huffman encoder which results in a compressed watermark watermarking approach where the generic property leads to
image. When the user has the correct key the visible watermarks embed different types of visible watermarks which include
can be successfully removed. The extraction process is done by opaque monochrome and translucent full color ones. The
implementing the reverse operations of embedding process. method is based on one to one compound mapping which
Reuben [14] proposed a reversible watermarking scheme for replaces the pixels of original image by watermark image to
compressed images. In this algorithm the residual packet is produce the watermarked image. Security protection measures
embedded in the quantization transform coefficients which is were introduces for avoiding illicit recoveries. Lemmas are
used to restore the watermarked region. The information is proved for compound mapping. Embedding, extraction
embedded with the low frequency transform coefficients. The procedures were explained.
embedding process overlaps the binary watermark(w) on the
host image(I) to produce watermarked image(WI). Both host 3. CONCLUSION
image and the watermarked image are compressed using In this paper a review on visible watermarking images were
transformation and quantization. Then the compressed discussed. To minimize the distortion many papers
watermark image undergoes the estimation process which included the concept of lossless recovery during extraction
provides the information used at the decoder side during since it plays a major role in hospital and military
removal of watermark. The estimated image is subtracted from applications. The review study clearly specifies the success
the Compressed image and results in residual packet which is of visible image watermarking. Visible watermarking does
encoded and this information is used in the decoder side to not require any special software for viewing the watermark.
extract the original image. The encoded information is
embedded with the compressed watermarked image and entropy Further work can be carried out in visible watermarking
coded. The decoder carries the reverse operations of encoder to videos. Image can be extended to video. Video is
obtain the original image. essentially a superset of normal images. The new proposal
is to implement visible watermarking for videos with
lossless recovery.
Munesh [5] proposed Visible watermarking algorithm using
Discrete Wavelet transformation. This Paper provides the full
overview of watermarking concepts which includes definition of 4. REFERENCES
watermarking, general model of watermarking, types and 1. S Samuel and WT Penzhom, “Digital watermarking
applications of watermarking. Then the algorithm for visible for copyright protection”, IEEE Affricon, 2004.
watermarking using DWT transformation is proposed and the
coding for implementing the algorithm using MATLAB is given
in this paper. During embedding first the host image is retrieved.
2. Marek Candik, Dagmar Brechlerova “DIGITAL
WATERMARKING IN DIGITAL IMAGES”,
The size of the watermark is obtained and the watermark is
Proceedings of the IEEE,2008.
converted into vectors. DWT is applied for embedding
watermark and the host image. Then inverse DWT is applied to
obtain the watermarked image. In the decoding process, the size 3. Yanqun Zhang,” Digital Watermarking Technology: A
of the watermarked image and the watermark is calculated. Review”, ETP International Conference on Future
DWT is applied in order to display the recovered image. The Computer and Communication,2009.
quality of the recovered image is calculated by calculating the
PSNR values. 4. Michael Stumpfl, “Digital Watermarking”
Proceedings of the IEEE, 2001.

Tsai et al [16] proposed a visible watermarking technique for 5. Munesh Chandra, Shikha Pandey “A DWT Domain
copyright protection of palette images. Visible opaque Visible Watermarking Techniques for Digital Images”,
watermark is embedded to the host image and the watermark is International Conference on Electronics and
considered as binary watermark. In this paper watermarking area Information Engineering,2010
is always considered as the upper left corner. During embedding
process, the watermark area is divided into black watermark
embedded pixels and white watermark embedded pixels. The
occurrences of the colors of the white watermark embedded 6. Saraju P. Mohanty' K. R. Ramakrishnan Mohan S
pixels are calculated. The colors color palette is sorted in Kankanhalli,” A DCT Domain Visible Watermarking
descending order based on the calculation of the occurrences. Technique for Images”,
Euclidean distance for every color is calculated and the color Proceedings of the IEEE, 2000.
which has the maximum distance is selected. The difference
between the maximum Euclidean distance and each color is 7. Han-Min Tsai, Long-Wen Chang,” A HIGH SECURE
found and arranged in ascending order. Watermark is embedded REVERSIBLE VISIBLE WATERMARKING
to the watermark area where the black watermark embedded SCHEME”, Proceedings of the IEEE, 2007.
pixels are located. User defined keys are used during embedding
for security purposes. The Extraction process implements the 8. Pei-Min Chen,” A Visible Watermarking Mechanism
reverse operations of the embedding process. using a Statistic Approach”, Proceedings of
ICSP,2000.
9. Alessandra Lumini, Dario Maio,” Adaptive 17. Tsung-Yuan Liu, Student Member, IEEE, and Wen-
positioning of a visible watermark in a digital image”, Hsiang Tsai, Senior Member, IEEE,” Generic Lossless
IEEE International Conference on Multimedia and Visible Watermarking – A new approach”, IEEE
Expo,2004. TRANSACTIONS ON IMAGE PROCESSING, VOL.
19, NO. 5, MAY 2010.

10. Mohan S Kankanhalli Rajmohan* 6 Iil R


Ramakrishnan,” ADAPTIVE VISIBLE 18. Ingemar J.Cox, Matthew L.Miller, Jeffrey A.Bloom,
WATERMARKING OF IMAGES”, Proceedings of “Digital Wateramrking” The Morgan Kauffmann
IEEE,1999. series in Multimedia information and systems, series
editor, Edward Fox.

11. Shinfeng D. Lin, Member, IEEE, and Shih-Chieh Shie,


“Improving Robustness of Visible Watermarking 19. Chun-Hsiang Huang and Ja-Ling Wu,” Attacking
Schemes for images”, Proceedings of IEEE,2004. Visible Watermarking Schemes”, IEEE
TRANSACTIONS ON
MULTIMEDIA, VOL. 6, NO. 1,
FEBRUARY 2004.
12. J.J. Chen T.M. Ng A. Lakshminarayanan H.K.Garg,”
Adaptive visible watermarking using Otsu’s
Thresholding”, Proceedings of IEEE,2009. Prof..V.Santhi (vsanthi@vit.ac.in) is
currently working as Associate professor in VIT
University, Vellore , India. She is having more than 15
years of teaching and more than 3 years of Industry
13. Shu-Kei Yip, Oscar C. Au, Chi-Wang Ho, Hoi-Ming experience. She has pursued her B.E degree in Computer
Wong,” Lossless Visible Watermarking”, Proceedings Science and Engineering from Bharathidasan University,
of IEEE,2006. Trichy and M.Tech degree in Computer Science and
Engineering from Pondicherry University, Pondicherry.
She is currently doing PhD in VIT University. She is a
14. Reuben A. Farrugia, “A Reversible Visible member of IACSIT, IEEE and CSI. Her area of research
Watermarking Scheme for Compressed Images”, includes Image Processing, Digital Signal Processing,
Proceedings of IEEE,2010. Digital Watermarking and Data Compression. She has
published many papers in international conferences and
Journals.
15. F. H. Yeh, G. C. Lee, and Y. T. Lin, “Removable
Visible Watermarking in JPEG Compression Domain”
IEEE Asia-Pacific Services Computing Conference,
2008. Saraswathi
(saraswathi2783@gmail.com) is
currently doing her M.Tech degree in
16. Pei-Pei Chen, Wen-Hsiang Tsai, “COPYRIGHT Computer Science and Engineering in VIT University,
PROTECTION OF PALETTE IMAGES BY A Vellore, India. She completed her M.Sc degree in
ROBUST LOSSLESS VISIBLE WATERMARKING Computer Science and Engineering from Auxilium College,
TECHNIQUE”, NSC Project Advanced Technologies Thiruvalluvar University, Vellore, India. Her area of
and Applications for Next Generation Information interest includes Image Processing, Signal Processing,
Networks Digital Watermarking .

Anda mungkin juga menyukai