Abstract
In this paper, a spatial domain based digital image watermarking scheme has been developed to serve the purpose of copyright protection for digital images. This scheme proposes how to embed copyright information, i.e. the watermark bits by adaptive LSB replacement technique. Here, to improve imperceptibility, imperfect nature of human visual system has been exploited by means of saliency map generation. Robustness and data hiding capacity are also optimized by modifying the higher bit-planes instead of only the LSB. A few signal processing attacks are applied to evaluate the robustness, and several image quality metrics are involved in this purpose. The quality metrics are also used in verifying experimental results in terms of imperceptibility; and finally the system proficiency is compared to some existing frameworks. A proper benchmarking is also employed for a quantitative justification of the visual image degradation, caused by watermark insertion.




Similar content being viewed by others
References
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB Indicator. International Journal of Signal and Image Processing 1(3):196–204
Alanazi N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. Journal of Research in Engineering and Applied Sciences 3(4):118–124
Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl, Springer 78(12):16283–16310
Al-Juaid NA, Gutub AA, Khan EA (2018) Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography. Journal of Information Security and Cybercrimes Research 1(1)
Alsaidi A, Al-Lehaibi K, Alzahrani H, Al Ghamdi M, Gutub A (2018) Compression multi-level crypto Stego security of texts utilizing colored email forwarding. Journal of Computer Science and Computational Mathematics 8(3):33–42
Basu, A., Das, T.S., Sarkar, S.K., 2011, “On the implementation of a information hiding design based on saliency map”, Int Conf Image Information Processing, IEEE, p. 1–6.
Basu A, Sarkar SK (2013) “On the implementation of robust copyright protection scheme using visual attention model”, information security journal: A global perspective. Taylor & Francis 22(1):10–20
Basu A, Sinha Roy S, Chattopadhayay A (2016) Implementation of a spatial domain salient region based digital image watermarking scheme”, Int. Conf. Research in computational intelligence and communication networks, IEEE, p. 269-272
Chopra D, Purohit R, Gaur SBC (2014) Quality evaluation for LSB replacement watermarking of Grayscale images. Int Journal of Advanced Research in Computer and Communication Engineering 3(5)
Chu Y, Zhang Y, Zhang S, Ye X (2006) Region of interest fragile watermarking for image authentication. First International Multi-Symposiums on Computer and Computational Sciences 1:726–731
Duan L, Wu C, Miao J, Qing L (2011) Visual saliency detection by spatially weighted dissimilarity. IEEE Conference on Computer Vision and Pattern Recognition:473–480
Fan YC, Chiang A, Shen JH (2008) ROI-based watermarking scheme for JPEG 2000. Circuits, Systems & Signal Processing 27(5):763–774
Foris P, Levicky D (2007) Implementations of HVS models in digital image watermarking. Radio Engineering 16(1):45–50
Goferman S, Zelnik-Manor L, Tal A (2013) Context-aware saliency detection. IEEE Trans Pattern Anal Mach Intell 34(10):1915–1926
Goyal R, Kumar N (2014) LSB based digital watermarking technique. International Journal of Application or Innovation in Engineering & Management 3(9):15–18
Gui X, Li X, Yang B (2014) A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process 98:370–380
Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res, Springer 10(1)
Han S, Yang J, Wang R, Jia G (2018) A robust color image watermarking algorithm against rotation attacks. Optoelectron Lett 14(1):61–66
Harel J, Koch C, Perona P (2006) Graph-based visual saliency. Proc Neural Information Processing Systems:545–552
Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensics And Security 7(1):176–184
Hou X, Harel J, Koch C (2012) Image signature: highlighting sparse salient regions. IEEE Trans Pattern Anal Mach Intell 34(1):194–201
Hou X, Zhang L (2007) Saliency detection: A spectral residual approach. Int Conf Computer Vision and Pattern Recognition, IEEE:1–8
Huang J, Shi YQ (1998) Adaptive image watermarking scheme based on visual masking. IEE Electronics Letters 34(8):748–750
Itti L, Koch C (2000) A saliency-based search mechanism for overt and covert shifts of visual attention. Vis Res 40(10–12):1489–1506
Katzenbeisser S, Petitcolas FAP (2000) Information hiding techniques for steganography and digital watermarking. Artech House, Boston, London
Kim YS, Kwon OH, Park RH (1999) Wavelet based watermarking method for digital images using the human visual system. IEE Electronics Letters 35(6):466–468
Kumar C, Singh AK, Kumar P (2018) Improved wavelet-based image watermarking through SPIHT. Journal of Multimedia Tools and Application, Springer:1–14
Kutter M, Hartung F (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107
Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. Electronic Imaging ‘99, Security and Watermarking of Multimedia Contents, 3657
Lee HK, Kim HJ, Kwon SG, Lee JK (2005) ROI medical image watermarking using DWT and bit-plane. Asia-Pacific Conference on Communications:512–515
Li J, Dong C, Han X, et al (2012) DFT based Multiple Watermarks for Medical Image Robust to Common and Geometrical Attacks. 6th International Conference on New Trends in Information Science and Service Science and Data Mining (ISSDM), IEEE, p. 472–477
Li W, Yang C, Li C, Yang Q (2012) JND Model Study in Image Watermarking”, Advances in Multimedia, Software Engineering and Computing, 2, (Advances in Intelligence and Soft Computing, 129), p. 535–543
Majumdar S, Das TS, Sarkar SK (2011) DWT and SVD based image watermarking scheme using noise visibility and contrast sensitivity. Int Conf on Recent Trends in Information Technology, IEEE:938–942
Makbol NM, Khoo BE (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Journal of Digital Signal Processing, Elsevier 33:134–147
Mishra S, Mahapatra M, Mishra P (2013) A survey on digital watermarking techniques. Int Journal of Computer Science and Information Technologies 4(3):451–456
Mohanty SP. Digital Watermarking: A Tutorial Review. http://www.csee.usf.edu. Accessed 1999
Mohanty SP, Bhargava BK (2008) Invisible watermarking based on creation and robust insertion–extraction of image adaptive watermarks. ACM Trans Multimed Comput Commun Appl 5(2):12:1–12:22
Ni R, Ruan Q (2006) Region of interest watermarking based on fractal dimension. Proc Int Conf Pattern Recogn 3:934–937
Niu Y, Kyan M, Ma L, Beghdadi A (2011) A visual saliency modulated just noticeable distortion profile for image watermarking. European signal processing conference, p. 2039-2043
Pareek R, Ghosh PK (2012) Discrete cosine transformation based image watermarking for authentication and copyright protection. International Journal of Engineering and Advanced Technology (IJEAT) 1(3)
Parvez MT, Gutub AA (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering 38(1B):127–142
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding – A survey. Proc of the IEEE 87(7):1062–1078
Prasanna S, Toshanlal M, Ankit S, Vivek G, Amit K (2015) A DWT-SVD based digital watermarking technique for copyright protection. Int Conf on Electrical, Electronics, Signals, Communication and Optimization
Que D, Zhang L, Lu L, Shi L (2006) A ROI image watermarking algorithm based on lifting wavelet transform. Proc Int Conf Signal Processing 4. https://doi.org/10.1109/ICOSP.2006.345979
Shaikh S, Deshmukh M (2013) Modulation of watermarking using JND parameter in DCT domain. Int Journal of Engineering and Advanced Technology 3(2):158–161
Sinha Roy S, Basu A, Chattopadhyay A (2019) Perspectives on Digital Image Watermarking, Intelligent Copyright Protection for Images, 1st edn. CRC, Taylor and Francis, New York
Sinha Roy S, Saha S, Basu A (2015) Generic testing architecture for digital watermarking. Proc. FRCCD-2015, (50-58)
Su Q, Chen B (2017) Robust color image watermarking technique in the spatial domain. Springer Journal on Soft Computing - A Fusion of Foundations, Methodologies and Applications 22(1):91–106
Sur A, Sagar SS, Pal R, Mitra P, Mukherjee J (2009) A new image watermarking scheme using saliency based visual attention model. India Conference, IEEE:1–4
The USC-SIPI Image Database. http://sipi.usc.edu/database/database.php?volume=misc
Verma M, Yadav P (2013) Capacity and security analysis of watermark image truly imperceptible. Int Journal of Advanced Research in Computer and Communication Engineering 2(7):2913–2917
Wang Q, Yuan Y, Yan P, Li. (2013) Saliency detection by multiple-instance learning. IEEE Transactions on Cybernetics 43(2):660–672
Wong MLD, Lau SIJ, Chong NS, Sim KY (2013) A salient region watermarking scheme for digital mammogram authentication. Int Journal of Innovation, Management and Technology 4(2):228–232
Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. Journal of Information Security and Applications 26:1–7
Xu H, Wanga J, Kim HJ (2010) Near-optimal solution to pair wise LSB matching via an immune programming strategy. Inf Sci 180(8):1201–1217
Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn 41(8):2674–2683
Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sinha Roy, S., Basu, A. & Chattopadhyay, A. On the implementation of a copyright protection scheme using digital image watermarking. Multimed Tools Appl 79, 13125–13138 (2020). https://doi.org/10.1007/s11042-020-08652-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08652-9