CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Copyright Protection using Digital Watermarking

Published on May 2012 by Deepa Merin Jose, R. Karuppathal, A. Vincent Antony Kumar
National Conference on Advances in Computer Science and Applications (NCACSA 2012)
Foundation of Computer Science USA
NCACSA - Number 3
May 2012
Authors: Deepa Merin Jose, R. Karuppathal, A. Vincent Antony Kumar
d06c1ec8-e099-4f07-8846-9d1735d45ec7

Deepa Merin Jose, R. Karuppathal, A. Vincent Antony Kumar . Copyright Protection using Digital Watermarking. National Conference on Advances in Computer Science and Applications (NCACSA 2012). NCACSA, 3 (May 2012), 24-27.

@article{
author = { Deepa Merin Jose, R. Karuppathal, A. Vincent Antony Kumar },
title = { Copyright Protection using Digital Watermarking },
journal = { National Conference on Advances in Computer Science and Applications (NCACSA 2012) },
issue_date = { May 2012 },
volume = { NCACSA },
number = { 3 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 24-27 },
numpages = 4,
url = { /proceedings/ncacsa/number3/6495-1020/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%A Deepa Merin Jose
%A R. Karuppathal
%A A. Vincent Antony Kumar
%T Copyright Protection using Digital Watermarking
%J National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%@ 0975-8887
%V NCACSA
%N 3
%P 24-27
%D 2012
%I International Journal of Computer Applications
Abstract

One way for copyright protection is digital watermarking. Digital watermarking is the process of embedding information regarding the authenticity or the identity of the owners into a image or any piece of data. Digital watermarking has been classified into two types :Visible and Invisible Watermarking. In visible digital watermarking, the embedded information is visible. Typically, the information is text or a logo, which identifies the owner of the image. In invisible digital watermarking, information is added as digital data to audio, picture, or video, but it is not visible. Watermarking degrades the quality of an image. By the use of Reversible watermarking the embedded watermark can be removed and restore the original content. The lossless image recovery is a difficult task but; it is important in most of the applications where the quality of the image is concerned. There are many methods for visible watermarking with lossless image recovery. One to One compound mapping is one of the technique. The compound mapping is reversible and it allows lossless recovery of original images from the watermarked images. Security protection measures can be used to prevent illegal attackers.

References
  1. B. Mac(2000) 'Lossless multiresolution transform for image authenticating watermarking' presented at the European Signal Processing Conf. , Tampere, Finland,.
  2. C. de Vleeschouwer, J. F. Delaigle, and B. Macq(2003),'Circular interpretation of bijective transformations in lossless watermarking for media asset management' IEEE Trans. Multimedia, Vol. 5, No. 1, pp. 97–105.
  3. C. De Vleeschouwer, J. F. Delaigle, and B. Macq(2001),'Circular Interpretation of Histogram for Reversible Watermarking' IEEE Workshop on Multimedia Signal Processing, Cannes, France, pp. 345-350.
  4. D. Zou, Y. Q. Shi, and Z. Ni(2004),Semi-FragileLosslessDigital Watermarking Scheme Based on Integer Wavelet Transform,' IEEE Workshop on Multimedia Signal Processing, Vol. 5, pp. 195-198.
  5. F. A. P. Petitcolas,R. J. Anderson, and M. G. Kuhn(1999), 'Information hiding—A survey' IEEE, Vol. 87, No. 7, pp. 1062– 1078.
  6. H. M. Tsai and L. W. Chang(2007),'A high secure reversible visible watermarking scheme' in IEEE Int. Conf. Multimedia and Expo, Beijing, China, , pp. 2106–2109.
  7. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon(1997)"Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process. , Vol. 6, No. 12, pp. 1673–1687.
  8. J. Fridrich, M. Goljan, and R. Du(2002), 'Lossless data embedding—New paradigm in digital watermarking' J. Appl. Signal Process. , Vol. 2002,No. 2, pp. 185–196.
  9. J. Tian(2003), Reversible data embedding using a difference expansion,' IEEE Trans. Circuits Syst. Video Technol. , Vol. 13, No. 8, pp. 890– 896.
  10. M. Awrangjeb and M. S. Kankanhalli (2003). ' Lossless watermarking considering the human visual system,' presented at the Int. Workshop on Digital Watermarking, Seoul, Korea
  11. M. Awrangjeb and M. S. Kankanhali (2005),'Reversible watermarking using a perceptual model,'J. Electron. Imag. Vol. 14, No. 013014.
  12. N. F. Johnson, Z. Duric, and S. Jajodia ( 2001), ' Information Hiding. Steganography and Watermarking—Attacks and Countermeasures'. Boston, MA: Kluwer.
  13. P. M. Huang and W. H. Tsai( 2003), 'Copyright protection, authentication of grayscale images by removable visible watermarking and invisible signal embedding techniques: A new approach,' presented at the Conf. Computer Vision, Graphics and Image Processing, Kinmen, Taiwan, R. O. C.
  14. S. K. Yip, O. C. Au, C. W. Ho, and H. M. Wong(2006), 'Lossless visible watermarking,' IEEE Int. Conf. Multimedia and Expo, pp. 853–856.
  15. Y. J. Cheng and W. H. Tsai (2002), 'A new method for copyright and integrity protection for bitmap images by removable visible watermarks and irremovable invisible watermarks' presented at the Int. Computer Symp. —Workshop on Cryptology and Information Security, Hualien, Taiwan, R. O. C.
Index Terms

Computer Science
Information Sciences

Keywords

One To One Compound Mappping Reversible Mapping Translucent Watermark Opaque Watermark Mapping Randomization