Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Digital Image Watermarking Using Different Levels of Intermediate Significant Bits with Zig-zag Embedding Approach
Ali Sharifara, Ghazali Bin Sulong, Mehran Ranjbar Seraydashti
Pages - 62 - 71     |    Revised - 15-01-2013     |    Published - 28-02-2013
Volume - 7   Issue - 1    |    Publication Date - February 2013  Table of Contents
Digital Image Watermarking, Invisible Watermarking, Imperceptibility In Watermarking, Copyright Protection, Intermediate Significant Bits (ISB)
The rapid growths of computer technologies have been increased over the last half century in terms of amount and complexity of data. Broadcasting of digital contents on the networks (especially Internet) has become more important and access to the data also has become much easier than before. Digital watermarking techniques are used to protect the copyrights of multimedia data by embedding secret information inside them. For example, embedding watermark in images, audios, and videos. Digital Image watermarking also has been using to detect original images against forged images by embedding an evidence of the owner of the digital image. Imperceptibility, on the other hand, is one of the problems in digital image watermarking which a repeated method in different bit planes of cover image has been presented to improve the imperceptibility of watermarking in both embedding and extracting processes. Moreover, embedding process aims to embed watermark in different bit planes by using a nonsequential method to improve security of image rather than simple sequential embedding.
CITED BY (0)  
1 Google Scholar
2 CiteSeerX
3 refSeek
4 Scribd
5 SlideShare
6 PdfSR
1 Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan,“Genetic watermarking based on transform-domain techniques”. Pattern Recognition,. 37(3): p.555-565, 2004.
2 Golea, N.E.-H., “A bind RGB color image watermarking based on singular value decomposition”, in Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010, IEEE Computer Society. p. 1-5. 2010.
3 Yongjian Hu,Guangzhou, China Kwong, S. “Using invisible watermarks to protect visibly watermarked images” ,p. 584-587. 2004.
4 Potdar, V.M., Han, S.,Chang, “A survey of digital image watermarking techniques”. 2005.p. 709- 716.
5 Bamatraf,A.Ibrahim,R.Salleh, M.N.B.M, “Digital watermarking algorithm using LSB”, in Computer Applications and Industrial Electronics (ICCAIE), Kuala Lumpur, 2010.
6 Dharwadkar, N.V., Amberker, B.B,Gorai, A., “Non-blind watermarking scheme for color images in RGB space using DWT-SVD”, in Communications and Signal Processing (ICCSP), 2011 International Conference, Calicut, 2011.
7 Dehkordi, A.B., Esfahani, S.N., Avanaki, A.N. , “Robust LSB watermarking optimized for local structural similarity”, in Electrical Engineering (ICEE), 2011 19th Iranian Conference.Tehran, 2011.
8 Arya, D.,“A Survey of Frequency and Wavelet Domain Digital Watermarking Techniques”. 2010. 1(2).
9 Zhao Xingyang, “A novel color image fragile watermarking based on the extended channel”, in Broadband Network & Multimedia Technology, 2009. IC-BNMT '09. 2nd IEEE International Conference, Beijing, Oct. 2009.
10 Gil-Je Lee, “A New LSB Based Digital Watermarking Scheme with Random Mapping Function”, in Ubiquitous Multimedia Computing. UMC '08. International Symposium:Hobart, ACT, Oct 2008.
11 Ker, A., “Improved Detection of LSB Steganography in Grayscale Images Information Hiding”, J. Fridrich, Editor, Springer Berlin / Heidelberg, 2005.
12 Kumar, N.M., Manikandan, T.,Sapthagirivasan, V. , “Non blind image watermarking based on similarity in contourlet domain”, in Recent Trends in Information Technology (ICRTIT), 2011 International Conference, Chennai, Tamil Nadu, 2011.
13 Maity, S.P. and M.K. Kundu, “DHT domain digital watermarking with low loss in image informations”. AEU - International Journal of Electronics and Communications. 64(3): p.243-257,2010.
14 MohammadReza Keyvanpour, Farnoosh Merrikh Bayat, “Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain”,Mathematical and Computer Modelling, Available online 27 July 2012, ISSN 0895-7177,2012.
15 Hu, M.-C., D.-C. Lou, and M.-C. Chang, “Dual-wrapped digital watermarking scheme for image copyright protection". Computers & Security 26 (4) , 319-330, 2007.
16 Jian Cao; Jiwu Huang; , "Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security," Information Forensics and Security, IEEE Transactions on , vol.7, no.2, pp.821-826, April 2012.
17 M.Padmaa, “ZIG-ZAG PVD – A Nontraditional Approach”. International Journal of Computer Applications. Volume 5– No.7, August 2010.
18 Mir Shahriar Emami , Ghazali Bin Sulong, “Set Removal Attack: A New Geometric Watermarking Attack” in 2011 International Conference on Future Informatio Technology IPCSIT. 2011, IACSIT Press: Singapore. 2011.
19 Akram M. Zeki. Khedher, Azizah Abdul Manaf. “Digital watermarking and data hiding techniques”. Proceedings of the Postgraduate Annual Research Seminar p. 79-84, 2006.
Mr. Ali Sharifara
Dept. of Software engineering, faculty of computing UTM – Malaysia – Skudai 81310 - Malaysia
Dr. Ghazali Bin Sulong
Dept. of Software engineering, faculty of computing UTM – Malaysia – Skudai 81310 - Malaysia
Mr. Mehran Ranjbar Seraydashti
Dept. of Software engineering, faculty of computing UTM – Malaysia – Skudai 81310 - Malaysia