The International Arab Journal of Information Technology (IAJIT)


Block Size Analysis for Discrete Wavelet Watermarking and Embedding a Vector Image as a

As telecommunication and computer technologies proliferate, most data are stored and transferred in digital format. Content owners, therefore, are searching for new technologies to protect copyrighted products in digital form. Image watermarking emerged as a technique for protecting image copyrights. Early studies on image watermarking used the pixel domain whereas modern watermarking methods convert a pixel based image to another domain and embed a watermark in the transform domain. This study aims to use, Block Discrete Wavelet Transform (BDWT) as the transform domain for embedding and extracting watermarks. This study consists of 2 parts. The first part investigates the effect of dividing an image into non- overlapping blocks and transforming each image block to a DWT domain, independently. Then, effect of block size on watermark success and, how it is related to block size, are analyzed. The second part investigates embedding a vector image logo as a watermark. Vector images consist of geometric objects such as lines, circles and splines. Unlike pixel-based images, vector images do not lose quality due to scaling. Vector watermarks deteriorate very easily if the watermarked image is processed, such as compression or filtering. Special care must be taken when the embedded watermark is a vector image, such as adjusting the watermark strength or distributing the watermark data into the image. The relative importance of watermark data must be taken into account. To the best of our knowledge this study is the first to use a vector image as a watermark embedded in a host image.

[1] Amira-biad S., Bouden T., Nibouche M., and Elbaşı E., “A Bi-Dimensional Empirical Mode Decomposition Based Watermarking Scheme,” The International Arab Journal of Information Technology, vol. 12, no. 1, pp. 24-31, 2015.

[2] Chamlawi R., Khan A., Idris A., and Munir Z., “A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform,” International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 2, no. 11, pp. 727-7319, 2008.

[3] Chen B., Coatrieux G., Chen G., Sun X., Louis J., and Shu H., “Full 4-D Quaternion Discrete Fourier Transform Based Watermarking for Color Images,” Digital Signal Processing, vol. 28, pp. 106-119, 2014.

[4] Cox I., Kilian J., Leighton F., and Shamoon T., “Secure Spread Spectrum Watermarking for Multimedia, in Image Processing,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.

[5] Dharwadkar N. and Amberker B., “An Efficient Non-blind Watermarking Scheme for Color Images using Discrete Wavelet Transformation,” International Journal of Computer Applications, vol. 2, no. 3, pp. 60-66, 2010.

[6] Huang H. and Fang W., “Metadata-Based Image Watermarking for Copyright Protection,” Simulation Modelling Practice and Theory, vol. 18, no. 4, pp. 436-445, 2010.

[7] Inamdar V. and Rege P., “Dual Watermarking Technique with Multiple Biometric Watermarks,” Sadhana, vol. 39, no. 1, pp. 3-26, 2014.

[8] Jane O., İlk H., and Elbaşı E., “A Robust Transform Domain Watermarking Technique by Triangular and Diagonal Factorization,” in Proceedings of 36th International Conference on Telecommunications and Signal Processing, Roma, pp. 867-871, 2013. Block Size Analysis for Discrete Wavelet Watermarking and Embedding ... 1043

[9] Jane O. and Elbaşı E., “A New Approach in Non- Blind Watermarking Method Based on DWT and SVD Via LU Decomposition,” Turkish Journal of Electrical Engineering and Computer Sciences, vol. 22, no. 5, pp. 1354-1366, 2014.

[10] Jin R. and Kim J., “A Robust Watermarking Scheme for City Image,” International Journal of Security and Its Applications, vol. 10, no. 1, pp. 303-314, 2016.

[11] Kusyk J. and Eskicioglu A., “A Semi-Blind Logo Watermarking Scheme for Color Images by Comparison and Modification of DFT Coefficients,” in Proceedings of SPIE-The International Society for Optical Engineering, pp. 107-121, 2005.

[12] Lai C. and Tsai C., “Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition,” IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 11, pp. 3060-3063, 2010.

[13] Lang J. and Zhang Z., “Blind Digital Watermarking Method in the Fractional Fourier Transform Domain,” Optics and Lasers in Engineering, vol. 53, pp. 112-121, 2014.

[14] Minamoto T. and Ohura R., “A Blind Digital Image Watermarking Method Based on the Dyadic Wavelet Transform and Interval Arithmetic,” Applied Mathematics and Computation, vol. 226, pp. 306-319, 2014.

[15] Piva A., Barni M., Bartolini F., and Cappellini V., “DCT-Based Watermark Recovering without Resorting to the Uncorrupted Original Image,” in Proceedings of International Conference on Image Processing, Santa Barbara, pp. 520-523, 1997.

[16] Ratakonda K., Dugad R., and Ahuja N., “Digital Image Watermarking: Issues in Resolving Rightful Ownership,” in Proceedings International Conference on Image Processing, Chicago, pp. 414-418, 1998.

[17] Saryazdi S. and Nezamabadi-pour H., “A Blind Digital Watermark in Hadamard Domain,” World Academy of Science, Engineering and Technology, pp. 126-129, 2005.

[18] Swanson M., Zhu B., and Tewfik A., “Transparent Robust Image Watermarking,” in Proceedings of 3rd IEEE International Conference on Image Processing, Switzerland, pp. 211-214, 1996.

[19] Şenol A., Elbaşı E., Dinçer K., and Sever H., “A Block Size Analysis for Blocked Discrete Wavelet Watermarking,” in Proceedings of 7th International Conference on Information Security and Cryptology, Istanbul, pp. 77-81, 2014.

[20] Şenol A., Elbaşı E., Dinçer K., and Sever H., “Bloklu Ayrık Dalgacık Dönüşümü ile Vektör Resim Damgalama,” in Proceedings of 23nd Signal Processing and Communications Applications Conference, Malatya, 2015.

[21] Tao P. and Eskicioglu A., “A Robust Multiple Watermarking Scheme in the DWT Domain,” in Proceedings of Internet Multimedia Management Systems, Philadelphia, pp. 133-144, 2004.

[22] Van Schyndel R., Tirkel A., and Osborne C., “A Digital Watermark,” IEEE International Conference Image Processing, vol. 2, pp. 86-90, 1994.

[23] Wang X., Yang H., and Cui C., “An SVM-Based Robust Digital Image Watermarking Against Desynchronization Attacks,” Signal Processing, vol. 88, no. 9, pp. 2193-2205, 2008. Hayri Sever got his Bsc degree from Hacettepe University Computer Eng. Faculty, Ankara in 1986, MSc degree from Maine University, USA in 1991, Phd degree Louisiana University, Center of Advanced Computer Studies, in 1995. His research areas are Knowledge Discovery in Databases, Multimedia Retrieval Models and Systems, Multimedia Systems, Uncertainty Reasoning, Business Process Management, Machine Learning, and Speech Analysis. Ahmet ŞENOL got his B.Sc. degree from Middle East Technical University(METU), Computer Engineering(CENG) Department in 1993, M.Sc. degree in 1993, METU CENG Department, Phd from Hacettepe University Computer Engineering Department. His current interest is on “Image Processing”, “Image Watermarking”, “Image Authentication”, “Computer Forensics”. Ersin Elbasi is currently working for American University of the Middle East. He received MSc degree in computer science at Syracuse University; MPhil and PhD degrees in computer science at Graduate Center, The City University of New York. His research interests include multimedia security, event mining in video sequences and medical image processing