Watermarking Scheme for Color Images using Wavelet Transform based Texture Properties and Secret Sharing

In this paper, a new secure watermarking scheme for color image is proposed. It splits the watermark into two shares using (2, 2)- threshold Visual Cryptography Scheme (V CS) with Adaptive Order Dithering technique and embeds one share into high textured subband of Luminance channel of the color image. The other share is used as the key and is available only with the super-user or the author of the image. In this scheme only the super-user can reveal the original watermark. The proposed scheme is dynamic in the sense that to maintain the perceptual similarity between the original and the watermarked image the selected subband coefficients are modified by varying the watermark scaling factor. The experimental results demonstrate the effectiveness of the proposed scheme. Further, the proposed scheme is able to resist all common attacks even with strong amplitude.


Keywords:


References:
[1] I.J. Cox, M.L. Miller and J. A. Bloom, J. Fridrich, T. Kalker, Digital
Watermarking and Steganography, Second edition, Morgan Kaufmann
Publishers, 2008.
[2] Ching-Tang Hsieh, Yeh-Kuang Wu, Digital Image Multiresolution Watermark
Based on Human Visual System Using Error Correcting
Code,Tamkang Journal of Science and Engineering, Vol. 4, No. 3, 2001,
pp. 201-208.
[3] Cox, I. Robust watermarking, ENCRYPT Summer School on Multimedia
Security, Salzburg, Austria, Sept. 22, 2005.
[4] Podilchuk, C., Zeng, W.,Image-Adaptive Watermarking Using Visual
Models, IEEE Journal on Selected Areas in Communications, Issue 16,
vol.4, 1998, pp. 525-539.
[5] Barni, M., Bartolini, F., Piva, A Improved wavelet-based watermarking
through pixel-wise masking, IEEE Transaction, Image Processing, Issue
10, vol. 5, 2001, pp. 783-791.
[6] J. R. Smith and S. F. Chang., Automated Binary Texture Feature Sets for
Image Retrieval, International Proceedings, International Conference on
Acoustics, Speech, and Signal Processing, 1996, pp. 2241-2246.
[7] Mallat,S., A theory for multiresolution signal decomposition: the wavelet
representation, IEEE Transaction. Pattern Analysis and Machine Intelligence,
vol.11, No.7, 1989, pp. 674-693.
[8] S. Arivazhagan, L. Ganesan, Texture classification using wavelet transform,
Elsevier, Pattern Recognitation letter.24, 2003, pp.1513-1521.
[9] M. Naor, A. Shamir, Visual cryptography, Advances in Cryptology,
Eurocrypt 94, Lecture Notes in Computer Science, Vol. 950, 1995, pp.
1-12.
[10] Young-Chang Hou,Pei-Min Chen, An Asymmetric Watermarking
Scheme based on Visual Cryptography, IEEE Proceedings of ICSP, 2000,
pp. 992-995.
[11] Shang-Lin Hsieh, I-Ju Tsai, Bin-Yuan Huang, and Jh-Jie Jian, Protecting
Copyrights of Color Images using a Watermarking Scheme Based on
Secret Sharing and Wavelet Transform, Journal of Multimedia, vol. 3,
No. 4, 2008, pp. 42-49.
[12] Verheul, Van Tilborg, Construction and Properties of k out of n visual
secret sharing scheme Designs, Codes and Cryptography, Vol. 11, 1997,
pp. 179-196.
[13] C. Lin, T.H. Tsai, Visual cryptography for gray-level images by dithering
techniques, Pattern Recognition Letters 24, 2003, pp. 349-358.
[14] Yuefeng Zhang, Space-Filling Curve Ordered Dither, Elsevier, Computer
& Graphics Journal, Vol. 22, No. 4, 1998, pp. 559-563.
[15] Yuefeng Zhang, Adaptive Ordered Dither, Graphical, Models and Image
Processing, Vol. 59, No. 1, 1997, pp. 49-53.
[16] L.Velho and J.Gomes, Stochastic screening dithering with adaptive
clustering, Proceedings of SIGGRAPH-95, ACM Computer Graphics,
Annual Conference Series, 1995, pp. 273-276.