Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
This paper gives a general introduction to the digital watermarking procedures and their security aspects. The first issue is to clarify unifying and differentiating properties of steganography and watermarking. Then the most important aspects of digital watermarking are reviewed by studying application, requirement and design problems. We put emphasis on the importance of digital watermark as an effective technology to protect intellectual property rights and legitimate use of digital images. In the paper we provide an overview of the most popular digital watermarking methods for still images available today. The watermarking algorithms are divided into two major categories of spatial and transform domains. Because of outstanding robustness and imperceptibility the transform domain algorithms are the mainstream of research. Popular transforms of images include the DFT (Discrete Fourier Transform) ([1, 2, 3, 4, 5]), DCT (Discrete Cosine Transform) ([1, 3, 6, 5]) and DWT (Discrete Wavelet Transform) ([1, 3, 4, 7, 6, 5]). In the paper we emphasize the advantageous features of DWT such as local time-frequency and multi-scale analysis, preserving the quality of host image and ensuring high robustness of watermark. Finally, we present three algorithms which are based on the combination of DWT and some other transformations like DFT ([4]), DCT ([6]) and the Arnold transform ([7, 6]). Finally, we discuss security requirements and possible attacks on the watermarking systems.
Słowa kluczowe
Wydawca
Rocznik
Tom
Strony
123--139
Opis fizyczny
Bibliogr. 9 poz., rys.
Twórcy
autor
- AGH University of Science and Technology, 30 Mickiewicza Ave, 30-059 Krakow, Poland
autor
- AGH University of Science and Technology, 30 Mickiewicza Ave, 30-059 Krakow, Poland
Bibliografia
- 1] ArnoldM., Schmucker, M.,Wolthusen S.D., Techniques and Applications of Digital Watermarking and Content Protection, Artech House (2003).
- [2] Cox I. J., Miller M. L. et al., Digital watermarking and steganography, Morgan Kaufmann Publishers (2008).
- [3] Katzenbeisser, S., Petitcolas, F.A., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House (2000).
- [4] Manoochehri, M., Pourghassem, H., Shahgholian, G., A Novel Synthetic Image Watermarking Algorithm Based on Discrete Wavelet Transform and Fourier-Mellin Transform, IEEE 3rd International Conference on Communication Software and Networks (ICCSN) (2011): 265.
- [5] Zieliński T.P., Cyfrowe przetwarzanie sygnałów, Wydawnictwa Komunikacji i Łącznosci (2005).
- [6] Wang Huai-bin, Yang Hong-liang, Wang Chun-dong, Wang Shao-ming, A new Watermarking Algorithm Based on DCT and DWT Fusion, International Conference on Electrical and Control Engineering (ICECE) (2010): 2614.
- [7] QiWei Lin, JiSheng, XuFeng Wu, A New DWT and Multi-Strategy Watermark Embedding Algorithm, IEEE International Conference on Anti-Counterfeiting, Security and Identification (ASID) (2011): 57.
- [8] Kołodziejczyk M., Ogiela M. R., Applying of security mechanisms to middle and high layers of OSI/ISO network model, Theoretical and Applied Informatics 24 (1) (2012): 95.
- [9] Ogiela, M. R., Systemy utajania informacji - od algorytmów do kryptosystemów szyfrujących, Wydawnictwa AGH (2003).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-873e451b-9a05-4f53-bd17-eb501331acab