An Improved Method to Watermark Images Sensitive to Blocking Artifacts

A new digital watermarking technique for images that are sensitive to blocking artifacts is presented. Experimental results show that the proposed MDCT based approach produces highly imperceptible watermarked images and is robust to attacks such as compression, noise, filtering and geometric transformations. The proposed MDCT watermarking technique is applied to fingerprints for ensuring security. The face image and demographic text data of an individual are used as multiple watermarks. An AFIS system was used to quantitatively evaluate the matching performance of the MDCT-based watermarked fingerprint. The high fingerprint matching scores show that the MDCT approach is resilient to blocking artifacts. The quality of the extracted face and extracted text images was computed using two human visual system metrics and the results show that the image quality was high.

Authors:



References:
[1] T. Liu, Z.-D. Qiu, "The survey of digital watermarking-based image
authentication techniques," in Proc. 6th Intl. Conf. on Signal Processing,
vol.2, pp. 1556-1559, 2002.
[2] Y. Wang, J.F. Doherty, R.E. Van Dyck, "A wavelet-based watermarking
algorithm for ownership verification of digital images," IEEE Trans.
Image Processing, vol. 11, no. 2, pp. 77-88, 2002.
[3] D.P. Mukherjee, S. Maitra, S.T. Acton, "Spatial Domain Digital
Watermarking of Multimedia Objects for Buyer Authentication," IEEE
Trans.on Multimedia, vol. 6, no. 1, pp. 1-15, 2004.
[4] W. N. Cheung, "Digital image watermarking in spatial and transform
domains," in Proc. TENCON 2000, vol. 3, pp. 374 - 378, September
2000.
[5] B. Chen and G. W. Wornell, "Quantization index modulation: a class of
provably good methods for digital watermarking and information
embedding," IEEE Trans. Information Theory, vol. 47, no. 4, pp. 1423-
1443, May 2001.
[6] A. Piva, M. Barni, F. Bartolini, and V. Cappellini, "DCT-based
watermarking recovering without restoring to the uncorrupted original
image," in Proc. IEEE Intl. Conference on Image Processing, vol. 1, pp.
520-523, 1997.
[7] A. G. Bors and I. Pitas, "Image watermarking using DCT domain
constraints," in Proc. IEEE Intl. Conference on Image Processing, vol.
3, pp. 231-234, 1996.
[8] C. T. Hsu and J. L. Wu, "DCT-based watermarking for video," IEEE
Trans. Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb 1998.
[9] I. J. Cox, J. Killian, T. Leighton, T. Shamoon, "Secure Spread Spectrum
Watermarking for Multimedia," NEC Research Institute, Technical
Report 95 - 10, 1995.
[10] O.-H Kwon, Y.-S Kim, R.-H Park, "Watermarking for still images using
the human visual system in the DCT domain," in Proc. 1999 IEEE Intl.
Symp. on Circuits and Systems, vol. 4, pp. 76 - 79, June 1999.
[11] I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure Spread
Spectrum Watermarking for Multimedia," IEEE Trans. Image
Processing, vol. 6, no. 12, pp. 1673-1687, Dec.1997.
[12] Hsu, C. T., and Wu, J. L. "Hidden Digital Watermarks in Images," IEEE
Trans. Image Processing, vol. 8, pp. 58-68, 1999.
[13] X. Xia, C. Boncelet, and G. Arce, "Multiresolution Watermark for
Digital Images," in Proc. IEEE Int. Conf. on Image Processing, vol. 1,
pp. 548-551, Oct. 1997.
[14] J. R. Kim and Y. S. Moon, "A Robust Wavelet-Based Digital Watermark
Using Level-Adaptive Thresholding," in Proc. 6th IEEE Intl. Conf. on
Image Processing, pp. 202, Kobe, Japan, Oct. 1999.
[15] Z. Wang, A. C. Bovik, H. R. Sheikh, E. P. Simoncelli, "Image quality
assessment: From error measurement to structural similarity," IEEE
Trans. Image Processing, vol. 13, no. 1, 2004.
[16] Z. Wang, A. C. Bovik, H. R. Sheikh, E. P. Simoncelli, "A Universal
Image Quality Index," IEEE Signal Processing Letters, vol. 9, no. 3, pp.
81-84, 2002.
[17] C. I. Podilchuk, W. Zeng, "Image-adaptive watermarking using visual
models," IEEE Journal on Selected Areas in Communications, vol. 16,
no. 4, pp. 525-539, 1998.