Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A New Performance Trade-Off Measurement Technique for Evaluating Image Watermarking Schemes

  • Conference paper
Software Engineering and Computer Systems (ICSECS 2011)

Abstract

In digital watermarking performance evaluation at least three major metrics: imperceptibility, robustness and capacity have been widely used by researchers to analyze the performance of watermarking schemes; however, they constantly conflict with each other. In this paper we propose an effective method to evaluate the trade-off balanced degree among these measures using three threshold conditions. These thresholds comprise of three factors: imperceptibility effect ‘before attack and after watermarking’, perceptibility effect ‘after attack’, and robustness ‘after attack’. As a result of this study, the performance trade-off of a watermarking scheme can be stated based on degrees. Moreover, we proposed Reset Removal Attack as a severe geometric attack. Finally, the experimental investigation of the proposed technique using the bit-plane watermarking algorithms under several intensities of Reset Removal Attack revealed that the 3rd bit-plane algorithm behaved a better compromise among robustness, image quality, and capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Taoa, P., Eskicioglub, A.M.: A robust multiple watermarking scheme in the Discrete Wavelet Transform domain. In: Proc. SPIE, Internet Multimedia Management Systems V, Philadelphia, PA, USA, vol. 5601, p. 133 (2004)

    Google Scholar 

  2. Al-Otum, H.M., Samara, N.A.: A robust blind color image watermarking based on wavelet-tree bit host difference selection. In: Signal Processing, vol. 90, pp. 2498–2512. Elsevier, Amsterdam (2010)

    Google Scholar 

  3. Schyndel, R.G.V., Tirke, A.Z., Osborne, C.F.: A digital watermark. In: Proceeding of the 1st IEEE Image Processing Conference, Houston TX, November 15-17. RMIT, pp. 86–90 (1994), http://goanna.cs.rmit.edu.au/~ronvs/papers/ICIP94.PDF

  4. Eugene, P.G.: Digital watermarking of bitmap images. In: Proc. International Conference on Computer Systems and Technologies, June 14-15, pp. 1–6. ACM Press, Rousse (2007)

    Google Scholar 

  5. Shieh, J., Lou, D., Chang, M.: A Semi-blind digital watermarking scheme basedon singular value decomposition. In: Computer Standards & Interfaces, vol. 28, pp. 428–440. Elsevier, Amsterdam (2006)

    Google Scholar 

  6. Wu, N.I., Hwang, M.: Data Hiding: Current Status and Key Issues. International Journal of Network Security 4(1), 1–9 (2007)

    Google Scholar 

  7. Burdescu, D.D., Stanescu, L., Ion, A., Mihaescu, C.M.: Spatial Watermarking Algorithm for Video Images. In: Burdescu, D.D., Stanescu, L., Ion, A., Mihaescu, C.M. (eds.) Computer Network Security- Communications in Computer and Information Science, vol. 1, pp. 402–407. Springer, Heidelberg (2007)

    Google Scholar 

  8. Ozturk, M., Akan, A., Cekic, Y.: A Robust Image Processing in the Joint Time-Frequency Domain. EURASIP Journal on Advances in Signal Processing, Hindawi Publishing Corporation (2010)

    Google Scholar 

  9. O’Ruanaidh, J., Pun, T.: Rotation Scale and Translation Invariant Digital Watermarking. In: Proc, IEEE Int’ Conf. on Image Processing, pp. 536–538. IEEE Computer Society, Los Alamitos (1997)

    Google Scholar 

  10. Barni, M., Bartoloni, F., Cappellini, V., Piva, A.: A DCT-domain System for Robust Image Image Watermarking. Signal Processing 66(3), 357–372 (1998)

    Article  MATH  Google Scholar 

  11. Voloshynovskiy, S., Deguillaume, F., Pereira, S., Pun, T.: Optimal Adaptive Diversity Watermarking with Channe State Estimation. Proc,SPIE: Security and Watermarking of Multimedia Contents (2001)

    Google Scholar 

  12. Zeki, A.M., Manaf, A.A.: Robust Digital Watermarking Method based on Bit-Plane Ranges. Studies in Informatics and Control Journal, Romania (September 2007)

    Google Scholar 

  13. Zeki, A.M., Manaf, A.A.: A Novel Digital Watermarking Technique Based on ISB (Intermediate Significant Bit). International Journal of Information Technology 5(3) (2009)

    Google Scholar 

  14. Yang, C.: Inverted pattern approach to improve image quality of information hiding by LSB. Pattern Recognition 41, 2674–2683 (2008)

    Article  MATH  Google Scholar 

  15. Chan, C., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition 37, 469–474 (2004)

    Article  MATH  Google Scholar 

  16. Maity, S.P., Kundu, M.K.: Robust and blind spatial watermarking in digital image. Proc. of the 3rd Indian Conference on Computer Vision, Graphics and Image Processing (December 2002)

    Google Scholar 

  17. Dejun, Y., Rijing, Y., Yuhai, Y., Huijie, X.: Blind Digital Image Watermarking Technique Based On Intermediate Significant Bit and Discrete Wavelet Transform. In: Proc. of the International Conference on Computational Intelligence and Software Engineering, CISE 2009, IEEE Computer Soceity, Los Alamitos (2009)

    Google Scholar 

  18. Habes, A.: Information Hiding in BMP image Implementation, Analysis and Evaluation. Information Trnsmissions In Computer Networks, Tom. 6(1) (2006)

    Google Scholar 

  19. Mehemed, B.A., El-Tobely, T.E.A., Fahmy, M.M., Said Nasr, M.E.L., El-Aziz, M.H.A.: Robust digital watermarking based falling-off boundary in corners board-MSB-6 gray scale images. International Journal of Computer Science and Network Security 9(8), 227–240 (2009)

    Google Scholar 

  20. Rabah, K.: Steganography – The Art of Hiding Data. Information Technology Journal 3(3), 245–269 (2004)

    Article  MathSciNet  Google Scholar 

  21. Fazli, S., Khodaverdi, G.: Trade-off between Imperceptibility and Robustness of LSB Watermarking using SSIM Quality Metrics. In: Proc, Second International Conference on Machine Vision, IEEE Computer Society Press, Los Alamitos (2009)

    Google Scholar 

  22. Voloshynovskiy, S., Pereira, S., Pun, T.: Watermark Attacks. In: Proc. Erlangen Watermarking Workshop (1999)

    Google Scholar 

  23. Kamran, H., Mumtaz, A., Gilani, S.A.M.: Digital image watermarking in the wavelet transform domain. In: Proc. World Academy of Science, Engineering and Technology, vol. 13, pp. 86–89 (2006)

    Google Scholar 

  24. Al-Haj, A.: Combined DWT-DCT digital image Watermarking. Journal of Computer Science 3, 740–746 (2007)

    Article  Google Scholar 

  25. Piao, C., Woo, D., Park, D., Han, S.: Medical Image Authentication Using Hash Function and Integer Wavelet Transform. Proc, IEEE Computer Society, Congress on Image and Signal Processing (2008)

    Google Scholar 

  26. El-Ghoneimy, M.M.: Comparison Between Two Watermarking Algorithms Using DCT Coefficient, And LSB Replacement. Journal of Theoretical and Applied Information Technology, 132–139 (2008)

    Google Scholar 

  27. Kung, C., Chao, S., Tu, Y., Yan, Y., Kung, C.: A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application. Journal of Multimedia 4(3) (June 2009)

    Google Scholar 

  28. Cheung, N.W.: Digital Image Watermarking in Spacial and Transform Domain. In: Proc, TENCON, pp. 374–378 (2000)

    Google Scholar 

  29. Eggers, J.J., Su, J.K., Girod, B.: Robustness of a Blind Image Watermarking Scheme. In: International Conference on Image Processing (ICIP 2000), Canada (2000)

    Google Scholar 

  30. Bennour, J., Dugelay, J.L., Matta, F.: Watermarking Attack: BOWS Contest. In: Proceeding of SPIE (February 2007)

    Google Scholar 

  31. Wu, N.: A Study on Data Hiding for Gray-Level and Binary Images, Master Thesis, Chaoyang University of Technology, Taiwan (2004)

    Google Scholar 

  32. Xuan, M., Jiang, J.: A Novel Watermarking Algorithm in Entropy Coding Based on Image Complexity Analysis. In: Xuan, M., Jiang, J. (eds.) Proc. of the International Conference on Multimedia Information Networking and Security, MINES 2009, pp. 128–129 (2009)

    Google Scholar 

  33. Muhammad, S.S., Dot, Y.: A watermarking scheme for digital images using multilevel wavelet composition. Malaysian Journal of Computer Science 16, 24–36 (2003)

    Google Scholar 

  34. Voloshynovskiy, S., Pereira, S., Herrigel, A., Baumgartner, N., Pun, T.: A generalized watermark attack based on stochastic watermark estimation and perceptual remodulation. In: Wong, P.W., Delp, E.J. (eds.) SPIE Proceedings IS&T/SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, San Jose, CA, USA, vol. 3971, pp. 23–28 (2000)

    Google Scholar 

  35. Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modelling-towards a second generation watermarking benchmark. Signal Processing 81, 1177–1214 (2001)

    Article  MATH  Google Scholar 

  36. Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.: Attack modelling-towards a second generation watermarking benchmark. Signal Processing 81, 1177–1214 (2001)

    Article  MATH  Google Scholar 

  37. Song, C., Sudirman, S., Merabti, M., Llewellyn-Jones, D.: Analysis of Digital Image Watermark Attacks. In: 2010 7th IEEE Proc. Consumer Communications and Networking Conference (CCNC), IEEE Computer Society Press, Los Alamitos (2010)

    Google Scholar 

  38. Kougianos, E., Mohanty, S.P., Mahapatra, R.N.: Hardware Assisted Watermarking for Multimedia. Computers and Electrical Engineering 35, 339–358 (2009)

    Article  MATH  Google Scholar 

  39. Meerwald, P., Pereira, S.: Attacks, applications, and evaluation of known watermarking algorithms with Checkmark. In: Proc. Security and Watermarking of Multimedia Contents IV. SPIE, vol. 4675, pp. 293–304 (2002)

    Google Scholar 

  40. Shapiro, J.M.: Embedded Image Coding Using Zerotrees of Wavelet Coefficients. IEEE Transactions on Signal Processing 41(12) (1993)

    Google Scholar 

  41. Licks, V., Jordan, R.: Geometric Attackes on Image Watermarking Systems. IEEE Multimedia, 68–78 (July-September 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Emami, M.S., Bin Sulong, G., Mohamad Zain, J. (2011). A New Performance Trade-Off Measurement Technique for Evaluating Image Watermarking Schemes. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22170-5_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22169-9

  • Online ISBN: 978-3-642-22170-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics