Journal Title: International Journal of Modern Trends in Engineering and Science

Author’s Name : Chong.M.S, Low.S.Y

Volume 01 Issue o2 February 2014

ISSN no: 2348-3121

Page No: 1-5

AbstractThe  possibility of  adding  several  watermarks  to the  same  image  would  enable  many   interesting  applications such as multimedia document  tracing, data usage monitoring, multiple property management. In this paper, we present a novel watermarking scheme which allows to insert and reliably detect multiple watermarks sequentially embedded into a digital image. This method  proposed based on elementary linear algebra, is asymmetric, secure under  projection attack and robust against distortion due to basic operations such as storage, transmission, format conversion, etc.

Keywords— Multiplewatermarking,linear  algebra,asymmetric, DCT, sequential watermarking


[1] C. Busch and S. D. Wolthusen, “Tracing Data Diffusion in Industrial Research with Robust Watermarking”, Proc. of IEEE Fourth Workshop on Multimedia Signal Processing(2001), pp. 207-212,(2001).
[2] G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland and R. Collorec, ”Relevance of Watermarking in Medical Imaging”, Proc. of IEEE EMBS International Conference on Information technology Applications in Biomedicine (2000), pp. 250-255,(2000)
[3] A. Giakoumaki, S. Pavlopoulos, D. koutsouris, “A Multiple Watermark- ing Scheme Applied to Medical Image Management”, Proc. of IEEE International Conference of the Engineering in Medicine and Biology Society (2004), Vol. 2, pp. 3241-3244,(2004).
[4] A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, “Multiple Image Wa- termaking Applied to Health Information Management”, IEEE Transac- tions on Information Technology in Biomedicine(to appear).
[5] M. Li, S. Narayanan and R. Poovendran, “Tracing Medical Images Using Multi-Band Watermarks”, Proc. of the 26th Annual International Conference of the Engineering in Medicine and Biology Society 2004, vol. 2, pp. 3233-3236,(2004).
[6] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon,”Secure spread Spectrum Watermarking for Multimedia”, IEEE Transactions on Image Processing, vol. 6, pp. 1673–1687, Dec(1997).
[7] F. Mintzer, G. W. Braudaway, ”If One Watermark is Good, are More Better?”, Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing 1999, Vol. 4, pp. 2067-2069, Mar (1999).
[8] A. Giakoumaki, S. Pavlopoulos and D. Koutsouris, ”A Medical ImageWatermarking Scheme Based on wavelet Transform”, Proc. of the 25thAnnual International Conference of the IEEE-EMBS 2003, pp. 856–859,(2003).
[9] C.-S. Lu, H.-Y. Liao, ”Multipurpose Watermarking for Image Authen- tication and Protection”, IEEE Transactions on Image Processing, Vol.10, pp. 1579–1592, Oct. (2001).
[10] Z.-M. Lu, D.-G. Xu and S.-H. Sun, “Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization”, IEEE Transac- tions on Image Processing, Vol. 14, pp. 822–831, Jun.(2005).
[11] G. Boato, F. G. B. De Natale, C. Fontanari, “An Improved Asymmetric Watermarking Scheme Suitable for Copy Protection”, IEEE Transactions on Signal Processing, Vol. 54,pp. 2833-2834, Jul (2006).
[12] P.H.W. Wong, A. Chang, O.C. Au, ”A Sequential Multiple Watermarks Embedding Technique”, Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing (2004), Vol. 3, pp. 393–396, May (2004).
[13] A. Piva, M. Barni, F. Bartolini and A. De Rosa, “Data Hiding Technologies for Digital Radiography”, IEE Proceedings Image, and Signal Processing, Vol. 152, pp. 604-610, Oct.(2005).

Full  Pdf Paper-Click Here

Scroll Up