Abstract
In digital watermarking performance evaluation at least three major metrics: imperceptibility, robustness and capacity have been widely used by researchers to analyze the performance of watermarking schemes; however, they constantly conflict with each other. In this paper we propose an effective method to evaluate the trade-off balanced degree among these measures using three threshold conditions. These thresholds comprise of three factors: imperceptibility effect ‘before attack and after watermarking’, perceptibility effect ‘after attack’, and robustness ‘after attack’. As a result of this study, the performance trade-off of a watermarking scheme can be stated based on degrees. Moreover, we proposed Reset Removal Attack as a severe geometric attack. Finally, the experimental investigation of the proposed technique using the bit-plane watermarking algorithms under several intensities of Reset Removal Attack revealed that the 3rd bit-plane algorithm behaved a better compromise among robustness, image quality, and capacity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Taoa, P., Eskicioglub, A.M.: A robust multiple watermarking scheme in the Discrete Wavelet Transform domain. In: Proc. SPIE, Internet Multimedia Management Systems V, Philadelphia, PA, USA, vol. 5601, p. 133 (2004)
Al-Otum, H.M., Samara, N.A.: A robust blind color image watermarking based on wavelet-tree bit host difference selection. In: Signal Processing, vol. 90, pp. 2498–2512. Elsevier, Amsterdam (2010)
Schyndel, R.G.V., Tirke, A.Z., Osborne, C.F.: A digital watermark. In: Proceeding of the 1st IEEE Image Processing Conference, Houston TX, November 15-17. RMIT, pp. 86–90 (1994), http://goanna.cs.rmit.edu.au/~ronvs/papers/ICIP94.PDF
Eugene, P.G.: Digital watermarking of bitmap images. In: Proc. International Conference on Computer Systems and Technologies, June 14-15, pp. 1–6. ACM Press, Rousse (2007)
Shieh, J., Lou, D., Chang, M.: A Semi-blind digital watermarking scheme basedon singular value decomposition. In: Computer Standards & Interfaces, vol. 28, pp. 428–440. Elsevier, Amsterdam (2006)
Wu, N.I., Hwang, M.: Data Hiding: Current Status and Key Issues. International Journal of Network Security 4(1), 1–9 (2007)
Burdescu, D.D., Stanescu, L., Ion, A., Mihaescu, C.M.: Spatial Watermarking Algorithm for Video Images. In: Burdescu, D.D., Stanescu, L., Ion, A., Mihaescu, C.M. (eds.) Computer Network Security- Communications in Computer and Information Science, vol. 1, pp. 402–407. Springer, Heidelberg (2007)
Ozturk, M., Akan, A., Cekic, Y.: A Robust Image Processing in the Joint Time-Frequency Domain. EURASIP Journal on Advances in Signal Processing, Hindawi Publishing Corporation (2010)
O’Ruanaidh, J., Pun, T.: Rotation Scale and Translation Invariant Digital Watermarking. In: Proc, IEEE Int’ Conf. on Image Processing, pp. 536–538. IEEE Computer Society, Los Alamitos (1997)
Barni, M., Bartoloni, F., Cappellini, V., Piva, A.: A DCT-domain System for Robust Image Image Watermarking. Signal Processing 66(3), 357–372 (1998)
Voloshynovskiy, S., Deguillaume, F., Pereira, S., Pun, T.: Optimal Adaptive Diversity Watermarking with Channe State Estimation. Proc,SPIE: Security and Watermarking of Multimedia Contents (2001)
Zeki, A.M., Manaf, A.A.: Robust Digital Watermarking Method based on Bit-Plane Ranges. Studies in Informatics and Control Journal, Romania (September 2007)
Zeki, A.M., Manaf, A.A.: A Novel Digital Watermarking Technique Based on ISB (Intermediate Significant Bit). International Journal of Information Technology 5(3) (2009)
Yang, C.: Inverted pattern approach to improve image quality of information hiding by LSB. Pattern Recognition 41, 2674–2683 (2008)
Chan, C., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition 37, 469–474 (2004)
Maity, S.P., Kundu, M.K.: Robust and blind spatial watermarking in digital image. Proc. of the 3rd Indian Conference on Computer Vision, Graphics and Image Processing (December 2002)
Dejun, Y., Rijing, Y., Yuhai, Y., Huijie, X.: Blind Digital Image Watermarking Technique Based On Intermediate Significant Bit and Discrete Wavelet Transform. In: Proc. of the International Conference on Computational Intelligence and Software Engineering, CISE 2009, IEEE Computer Soceity, Los Alamitos (2009)
Habes, A.: Information Hiding in BMP image Implementation, Analysis and Evaluation. Information Trnsmissions In Computer Networks, Tom. 6(1) (2006)
Mehemed, B.A., El-Tobely, T.E.A., Fahmy, M.M., Said Nasr, M.E.L., El-Aziz, M.H.A.: Robust digital watermarking based falling-off boundary in corners board-MSB-6 gray scale images. International Journal of Computer Science and Network Security 9(8), 227–240 (2009)
Rabah, K.: Steganography – The Art of Hiding Data. Information Technology Journal 3(3), 245–269 (2004)
Fazli, S., Khodaverdi, G.: Trade-off between Imperceptibility and Robustness of LSB Watermarking using SSIM Quality Metrics. In: Proc, Second International Conference on Machine Vision, IEEE Computer Society Press, Los Alamitos (2009)
Voloshynovskiy, S., Pereira, S., Pun, T.: Watermark Attacks. In: Proc. Erlangen Watermarking Workshop (1999)
Kamran, H., Mumtaz, A., Gilani, S.A.M.: Digital image watermarking in the wavelet transform domain. In: Proc. World Academy of Science, Engineering and Technology, vol. 13, pp. 86–89 (2006)
Al-Haj, A.: Combined DWT-DCT digital image Watermarking. Journal of Computer Science 3, 740–746 (2007)
Piao, C., Woo, D., Park, D., Han, S.: Medical Image Authentication Using Hash Function and Integer Wavelet Transform. Proc, IEEE Computer Society, Congress on Image and Signal Processing (2008)
El-Ghoneimy, M.M.: Comparison Between Two Watermarking Algorithms Using DCT Coefficient, And LSB Replacement. Journal of Theoretical and Applied Information Technology, 132–139 (2008)
Kung, C., Chao, S., Tu, Y., Yan, Y., Kung, C.: A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application. Journal of Multimedia 4(3) (June 2009)
Cheung, N.W.: Digital Image Watermarking in Spacial and Transform Domain. In: Proc, TENCON, pp. 374–378 (2000)
Eggers, J.J., Su, J.K., Girod, B.: Robustness of a Blind Image Watermarking Scheme. In: International Conference on Image Processing (ICIP 2000), Canada (2000)
Bennour, J., Dugelay, J.L., Matta, F.: Watermarking Attack: BOWS Contest. In: Proceeding of SPIE (February 2007)
Wu, N.: A Study on Data Hiding for Gray-Level and Binary Images, Master Thesis, Chaoyang University of Technology, Taiwan (2004)
Xuan, M., Jiang, J.: A Novel Watermarking Algorithm in Entropy Coding Based on Image Complexity Analysis. In: Xuan, M., Jiang, J. (eds.) Proc. of the International Conference on Multimedia Information Networking and Security, MINES 2009, pp. 128–129 (2009)
Muhammad, S.S., Dot, Y.: A watermarking scheme for digital images using multilevel wavelet composition. Malaysian Journal of Computer Science 16, 24–36 (2003)
Voloshynovskiy, S., Pereira, S., Herrigel, A., Baumgartner, N., Pun, T.: A generalized watermark attack based on stochastic watermark estimation and perceptual remodulation. In: Wong, P.W., Delp, E.J. (eds.) SPIE Proceedings IS&T/SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, San Jose, CA, USA, vol. 3971, pp. 23–28 (2000)
Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modelling-towards a second generation watermarking benchmark. Signal Processing 81, 1177–1214 (2001)
Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modelling-towards a second generation watermarking benchmark. Signal Processing 81, 1177–1214 (2001)
Song, C., Sudirman, S., Merabti, M., Llewellyn-Jones, D.: Analysis of Digital Image Watermark Attacks. In: 2010 7th IEEE Proc. Consumer Communications and Networking Conference (CCNC), IEEE Computer Society Press, Los Alamitos (2010)
Kougianos, E., Mohanty, S.P., Mahapatra, R.N.: Hardware Assisted Watermarking for Multimedia. Computers and Electrical Engineering 35, 339–358 (2009)
Meerwald, P., Pereira, S.: Attacks, applications, and evaluation of known watermarking algorithms with Checkmark. In: Proc. Security and Watermarking of Multimedia Contents IV. SPIE, vol. 4675, pp. 293–304 (2002)
Shapiro, J.M.: Embedded Image Coding Using Zerotrees of Wavelet Coefficients. IEEE Transactions on Signal Processing 41(12) (1993)
Licks, V., Jordan, R.: Geometric Attackes on Image Watermarking Systems. IEEE Multimedia, 68–78 (July-September 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Emami, M.S., Bin Sulong, G., Mohamad Zain, J. (2011). A New Performance Trade-Off Measurement Technique for Evaluating Image Watermarking Schemes. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_49
Download citation
DOI: https://doi.org/10.1007/978-3-642-22170-5_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22169-9
Online ISBN: 978-3-642-22170-5
eBook Packages: Computer ScienceComputer Science (R0)