0% found this document useful (0 votes)
9 views11 pages

IJMER2

Uploaded by

Gamal Fahmy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views11 pages

IJMER2

Uploaded by

Gamal Fahmy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

International Journal of Modern Engineering Research (IJMER)

www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645

Joint Watermarking and Compression for Images in Transform


Domain

Gamal Fahmy
Electrical Engineering Dept., Assiut University, Egypt,

Abstract: Image watermarking, authentication and encryption have gained an increased importance during the last decade.
This is due to the widespread use of visual media over the Internet and in several digital media applications. Several
watermarking techniques have been proposed, some in spatial domain, and more recently in the transform/frequency domain
and have been reported to be robust against different attacks, namely compression. It is also well known the importance and
effectiveness of compression techniques to store transmit and retrieve visual information. However, the creation or
development of a joint watermarking and compression framework for images has yet to be explored, where watermarking
and compression could be pursued jointly on a trade-off manner. In other words, watermarking embedding/extraction can be
performed on compressed domain data, while compression parameters could be used as watermarking keys. The primary
focus of this paper is to explore this novel/unique idea. We propose a joint watermarking and compression (JWC) technique
in the transform domain. This transform domain is based on the Natural Preserve Transform and can be utilized to achieve a
balance between watermarking and compression for visual information. Watermarking performance is evaluated blindly for
different compressed domain data scenarios, while compression performance is analyzed for other watermarking cases.
Extensive simulation results that demonstrate the efficiency of the proposed joint watermarking and compression technique
are presented.

Keywords: Image Watermarking, Natural Preserve Transform, Image Compression; Hartley Transform

I. Introduction
The rapid growth of visual media based applications necessitates sophisticated compression techniques in order to store,
transmit and retrieve audio-visual information. The recent MPEG 4 and JPEG 2000 standards address the need for content
based coding and manipulation of visual media. With the widespread use of the Internet and the rapid and massive
development of multimedia, there is an impending need for efficient and powerfully effective copyright protection
techniques [1-3]. Digital watermarking schemes are typically classified into three categories. (1) Private watermarking which
requires the prior knowledge of the original information and secret keys, at the receiver, (2) Semi-private or semi-blind
watermarking where the watermark information and secret keys may be available at the receiver, and (3) public or blind
watermarking where the receiver must only know the secret keys [4]. The robustness of private watermarking schemes is
high to endure signal processing attacks. While private watermarking is suitable for high security applications such as
financial or defense data, it is are not feasible in real applications, such as DVD copy protection where the original
information may not be available for watermark detection. On the other hand, semi-blind and blind watermarking schemes
are more feasible in that situation [5], but they have lower robustness than the private watermarking schemes [6]. Hence,
while private watermarking is mainly utilized for authentication and verification, blind or public watermarking is for copy
protection applications. In general, the requirements of a watermarking system fall into three categories: robustness,
visibility, and capacity [7]
A variety of image watermarking methods have been proposed mostly based on transform domain [7-9]. In spite of
the successful performance of most watermarking techniques reported in the literature, they still suffer from being semi-
fragile due to the energy concentration of their transform domains (DCT and Wavelets), which makes them discard much of
the mid and high frequency watermarked data in compression [10-13].
Watermarking compressed domain data will obviate the need for it to be decompressed for watermark extraction, while
compressing watermarks would store and transmit visual data efficiently. Hence, there is an impending need for
sophisticated joint watermarking and compression techniques that could compress, protect and watermark data
simultaneously. While compression aims at concentrating data in the least possible information, watermarking aims at
distributing and hiding logos and parameters. Hence, compression and watermarking are inversely related and they have to
be treated on a trade-off manner. The amount of extracted/retrieved watermarked data is affected by the compression degree
of the host data, while the efficiency of compression is affected by the amount of data that needs to be embedded and
extracted.
In this paper we propose a transform domain based technique for data watermarking that has been previously
reported in [14], and [15]. This transform domain is based upon the Natural Preserve Transform (NPT) originally reported in
[16]. We utilized this transform domain to present our main contribution in this paper, which is to develop a joint
compression and watermarking system based on the NPT and wavelet domains for visual data. We try to achieve a
framework/equation that includes both compression and watermarking jointly in our proposed system. The organization of
this paper is as follows. Section 2 contains necessary mathematical background about the NPT based watermarking
approach. Section 3 briefly explains the watermarking embedding and extraction process in the NPT domain. Section 4
shows the robustness of the watermarking technique against several attacks. Section 5 shows our proposed joint

www.ijmer.com 2341 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645
watermarking and compression framework, analysis and results. Discussion is in section 6, followed by conclusions in
section 7.

2. Mathematical Background for NPT based Watermarking


The NPT was first used as a new orthogonal transform that holds some unusual properties that can be used for encoding and
reconstructing lost data from images. The NPT transform of an image S of size N x N is given by:
S tr   ( ) S  ( ) (1)
As  ( ) is the transformation kernel defined as in [17-18].
 ( )   I N  (1   ) H N (2)
IN is N order identity matrix, 0   1 , and HN is any orthogonal transform, like Hadamard, DCT, Hartley, etc. Throughout
th

this paper, we use the 2-D Hartley transform, defined by


1   2(k  1)   2( j  1) 
H (k , j )   cos    sin    (3)
N    
N 
N N
We note here that the Hartley transform was utilized due to its circular symmetry performance, as it evenly distributes the
energy of the original image in the 4 corners of the orthogonally projected transform image, Fig. 1(a). Hence the Hartley
transform achieves a trade-off point between the energy concentration feature (which is crucial for any transform domain for
compression purposes) and the even distribution and spreading feature (which is crucial for watermarking and data hiding
applications).
After the transformation kernel  is calculated in eq. 2, it is multiplied by the input image as a separable 2-D
kernel, eq.1. The value of  in eq. 2, gives a balance between the original domain (that would be multiplied by the identity
matrix) and the transform domain (that would be multiplied by the Hartley basis). Clearly, when   1 , the transformed
image is the original image, whereas when   0 , it is its orthogonal projection (which is the Hartley transform as in this
paper). Hence the NPT transform is capable of concentrating energy of the image while still preserving its original sample
values on a trade-off basis. This makes the NPT transform domain image has both almost original pixel values (that can not
be visually distinguished from the original image) and a capability feature of retrieving the logo watermark image from a
small part of the transformed image (provided that this small part has enough energy concentration in it).
The original image can be retrieved from the transformed image Str, using
S   1( ) Str  1( ) (4)
If H is symmetric, as in Hartley matrices, the matrix  1
( ) can be computed as follows:
1 1 1  1  
2 3

 1 ( )    I  H  H   H   ... (5)
         
Fig. 1(b-c) shows the Lena image and its NPT transformed image.  is adjusted to a value of 0.994, which yields a nominal
PSNR of around 45 dB. The high similarity between the original and transformed images, suggests that NPT is very
convenient for watermarking and data hiding.

www.ijmer.com 2342 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645

Host Image NPT Transformed Image PSNR =44.17 dB

(a) (b) (c)

NPT WaterMarked image A w Watermarked Image A w m

(d) (e)

Fig. 1. (a) Transform basis of the Hartely. (b-c) Original image and its NPT image, computed
with   0.994 . (d) NPT watermarked image with logo in last r rows. (e) NPT watermarked image
with last r rows replace with last r rows of original image
3.1 Watermark Embedding
Let the host image S, (size N x N) be watermarked by a watermarking logo (image) w, of size (m x n). In the bottom
embedding technique [14-15], the logo is embedded to S as the last r bottom lines. Hence, the logo matrix is reshaped to be a
matrix w1 (of size r x N, r  mn ). Then, the last r rows of S are replaced by the reshaped logo w1, as in Fig. 1(d). This would
N
S 
S wm   1  , S1  S (1 : N  r ,:) . Then the NPT of Swm is obtained as:
yield a watermarked image Swm,
 w1 
 A0 w   ( N  r )
Aw  ( ) S wm  ( )  
 z   r (6)
N
This step in eq. 6, would register the watermark (distribute its energy) over the entire host image. In order to make the
watermarking logo invisible, we replace the last r rows z of A w with the last r of the original image S, Fig 1(e).
 A0w 
Awm    (7)
 S ( N  r  1 : N , :)

3.2 Watermark Extraction


The watermarking extraction process is divided into a non-blind case, and a blind case. In the non blind case the original host
image is known at the receiver side and we only try to extract the logo from the watermarked image. In the blind case the
host image is not known at the receiver side, and we try to extract both the host and logo images from the watermark image,
Awm.

3.2.1 The Non Blind Case


Assuming that the original image S, the parameter  of eq. 1 and the type of the orthogonal transformation HN, are known at
the receiver, the extraction of the watermark from the received Awm proceeds as follows:
www.ijmer.com 2343 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645
1. Since the size of the watermark m x n is known at the receiver side, as well as the number of rows of w. Form
Y  S 
Y  Awm    1   S wm   1  . (8)
Y2   w1 
  12   ( N  r )
   11
2. Partition  21  22   r . (9)
 N  r 
Then, as long as N-r ≥ r, the watermark w is the least squares solution of the system
Y1  11S1  12 w1 (10)
The quality of extraction is judged by computing the normalized correlation NCORR between the original and extracted
m n
  wij wexij
i 1 j 1
logo, i.e. NCORR  (11)
w . wex
wex is the extracted watermark. The non-blind extracted logo, in our experiments achieved a NCORR = 1 performance factor.

3.2.2 The Quasi Blind Case


When the prior knowledge of the host image S is not available, the following quasi blind technique is proposed for
watermarking extraction of an NPT-based watermarked image. The proposed technique can be described as follows:
  12   ( N  r )
   11
1. Partition
 21  22   r (12)
 N  r 
As A w    S wm from eq. (6, 7, and 8), we can show that
 A 0w   11  12   S1  A0 w    11 S1   12 w1
 S ( N  r  1 : N , :)      22   w1 
i.e. (13)
   21
2. To cancel the effect of S1 in eq. 13, construct an (N-r) square matrix V such that V t 12  0 . This matrix can be easily
constructed by expressing its kth vector Vk as follows :
r
Vk  I N  r , k    jk 12 (:, j ) , and I N  r , k  I N  r (:, k ) , 1  k  N  r (14)
j 1
The  jk are obtained by solving a set of r linear equations satisfying the following condition:

Since  12 is an (N-r) x r matrix, k V t (:, j )  0 1  j  r


12

then its maximum rank is r. Consequently, the rank of the matrix V is (N-2r), [19].
V t A 0w   V t  11 S1
t
3. Pre-multiply Equation (13) by V to yield (15)

As the rank of  11 is (N-r), the rank of V  11 is (N-2r). So, to have a unique solution of eq.15, r arbitrary parameters of
t
every column of S1 have to be known at the receiver/extractor. This can be achieved if in the watermarked image Aw, we
choose the matrix z (eq. 6), to be S(N-2r+1:N-r,:) instead of S(N-r+1:N,:).(it basically means replicating the r last rows of
the image as in Fig. 2 (a)).

www.ijmer.com 2344 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645

Watermarked Image A w m

LLLL

HL

Last r rows
replicated LH HH

(a) (b)
Fig.2. (a) Example of host images with last r rows replicated, N=256, r=8
(b) LLLL is the lowest band in a 2 layer wavelet decomposition

Having obtained S1 as the unique solution of eq.15, w1 (the logo) is extracted as in the non-blind case, and subsequently
reshaped to regain the original watermark w. We used the terminology quasi blind, as a minor amount of information has to
be known (r parameters of every column) at the receiver side. We note here that having r rows of the host image known at
the receiver side as a mandatory condition for our blind technique is a slight draw back. However if we replicate the r rows
of our host image, S(N-2r+1:N-r,:), as the last r rows, our host image would be like fig.4(a) with negligible effect for this
replication process, especially if the host image has a large size compared to r, as N>>>r.

4. Robustness against attacks (compression, noise and cropping)


The proposed watermarking techniques has been reported to be robust against compression (which is mainly shown in the
next section), cropping and noise attacks [14-15]. Although this paper is primarily aimed at introducing a joint compression
and watermarking system, we report here the performance against different attacks and compare it with other literature
performances.
Regarding the cropping attack [14], if we crop the host watermarked image up to 50% of its original size, full extraction of
the watermarked logo is shown to be possible, as in the non blind case, provided that the remaining watermarked size is at
least the logo size. This ratio outperforms most of the other watermarking techniques against this kind of attack.
Regarding the noise attack, as reported in [15], we mixed the watermarked image with different amounts of noise such as the
salt and pepper noise and the AWGN noise, so that the PSNR value of the original image went as low as 22-25 dB. The
watermarking logo was correctly extracted with a correlation rate higher than 90%, which is very competitive with the recent
literature [8].
We note here that studying the compression attack’s impact on the proposed watermarking scheme is thoroughly examined
in the next section, as it is part of the proposed joint compression and watermarking system, but we briefly state that the
proposed watermarking approach can fully extract the hidden logo (more than 90% NCORR value) with up 1.0 bpp
compression using the SPIHT compression approach.

5. NPT based joint watermarking and Compression


In our proposed system, we watermark our host image with a logo image to obtain a watermarked image. Then we compress
the watermarked image through any transform based image compression standard. In our case we selected the SPIHT
wavelet based image codec [20], to compress and then decompress (at the receiver side) the watermarked image, and then
the extraction process takes place for the host and logo images. In our system we measure the compression performance by
the PSNR quality of the reconstructed image (with respect to the original image) for a specific bit rate, while we measure the
watermarking performance by the PSNR quality of the extracted image (host and logo) for a specific bit rate with a specific
logo size. It can also be easily proven that the target compression bit rate would significantly affect the watermarking
extraction quality, as shown next.
We also watermark compressed domain data, by watermarking the LL band image in the wavelet transform of any
compression process, Fig. 2(b). It can also be shown that the amount of watermarked data (with its target extraction quality)
would significantly affect the compression reconstruction performance; it is also dependent on which wavelet level (number
of layers) its LL band is being watermarked as also shown in the next section. We note here that the higher the LL band
(more layers) that is being watermarked, the less the quality of the reconstructed image from wavelet based compression
theories. This is due to the fact that more data would be concentrated in LL band of the highest layer; therefore any
manipulation to the band coefficients, as what happens by NPT, would more deteriorate the reconstructed image, also as a
larger number of high band frequencies are dependent on it as in SPIHT or EBCOT [20-21]. We note here that if the there is
no watermark, zero number of embedded bottom lines, then increasing the number of wavelet layers would definitely
enhance the PSNR of reconstructed image from enhanced resolution, but if there is a watermark, even if it is small (5 rows),
it will affect (negatively) the reconstructed host image, and hence increasing the number of wavelet decomposition layers
would further deteriorate the PSNR of the reconstructed host image. Increasing the number of wavelet layers would also

www.ijmer.com 2345 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645
double the number of r rows in the bottom embedding process, as the logo (watermark) has a fixed size and the last LL band
would be half the number of rows and columns of the previous case for every decomposition level. This would provide us
with one more justification for the deteriorated PSNR reconstruction quality of the host image for increasing the number of
wavelet layers from this joint watermarking and compression process.
For a watermarking system that is based on section 3, Fig.3 shows the PSNR values of the watermarked image for
different values of alpha (  ), along with the corresponding NCORR values of the extracted image, when the watermarked
image is compressed using SPIHT with bpp (bits per pixel) =2.5, and no wavelet decomposition layers. It can be seen in the
figure, that the smaller the value of alpha, the less contribution of the original image in eq.2, and the lower the PSNR, but the
more contribution of the Hartley basis, which means more energy distribution, which will yield better extraction, better
NCORR, and vice versa. A value of alpha in the range 0.985-0.99, is the optimal trade-off point between the 2 curves for
this watermarking case, as in Fig. 3.
Fig. 4, shows a block diagram for our proposed joint watermarking and compression system. There are primarily
three parameters that can significantly affect the performance of both watermarking and compression. The alpha parameter
(  ) as in eq.2, the number of wavelet layers and the target bit-rate in compression in the adopted SPIHT.
While it can be easily proven that the higher the bit-rate, the better is the PSNR of the extracted image (both host
and logo) and the lower is the compression performance from basic rate-distortion theories [20-22]. The higher the value of
 the more weight of the original image would be in eq.2, which would imply less contribution of the Hartley basis, which
means lower amount of energy distribution, which means less watermarking performance.
On the other hand, more wavelet decomposition layers, which would imply more resolutions levels, and would lead to better
compression performance as well known from successful wavelet based coders [20, 21]. Since in our system we watermark
the LL band in the last wavelet layer, increasing the number of layers would deteriorate the compression reconstruction
quality of watermarking extracted images, as higher band frequencies are added to it in reconstruction, as in Fig. 6. Therefore
increasing the number of wavelet layers in our system would imply less PSNR for the reconstructed image (that has been
watermarked and extracted). Hence, while increasing the bit rate would enhance the reconstruction quality of watermarking
an extracted image, increasing the number of wavelet decomposition layers would deteriorate it in our joint watermarking
and compression system, and the lower the value of alpha, the better the watermarking extraction as the NCORR curve in
Fig. 3. Since the number of wavelet decomposition layers and the bit rate are two compression parameters and they have an
inverse impact on the watermarking performance, they could be jointly combined in a single variable C, according to this
relation, C=K1* bpp +( 1/K2* No. of wavelet layers )

www.ijmer.com 2346 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645

Fig. 3 PSNR and NCORR values for differential alpha values for different

From all above, we can identify the two variables of alpha and C as the parameters that affect the performance of our
proposed joint watermarking and compression system. As shown above, each of them can significantly affect the
performance of both watermarking and compression (JWC) on an inverse manner. Hence these two parameters can be
combined into a single equation with a Lagrange multiplier as in eq. 16. The Lagrange multiplier can be adjusted to control
both alpha (  ) and C on a trade-off manner. JWC stand for performance of our joint system.
JWC     *C (16)
Fig.4 shows a block diagram of the proposed joint watermarking and compression system with a Lagrange multiplier as an
adjustor that controls the trade-off between both. Fig. 5 shows the PSNR and the NCORR values for different alpha values
on the same curve, it can be shown that an alpha value of 0.985 is optimal on that curve’s trade-off.
Fig.6 shows the reconstructed PSNR quality of host images from watermarking the LL band for different number of layers,
with an alpha (  ) value of 0.985 and 2.5 target bpp. Fig. 7 shows the reconstructed PSNR quality of host images for
different bit rates from one wavelet decomposition layer with an alpha value of 0.985.
Input Data

Wavelet No. of C
Decomposition layers NPT based
Watermarking
bpp
Extraction Output Data

NPT based SPIHT SPIHT de-coding


Watermarking compression and de-compression
in LL band

 

Fig. 4 Block diagram of a joint watermarking and compression system

www.ijmer.com 2347 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645
We note here the variables of K1, K2 and  are image dependent, and can be adjusted according to the needed point on the
compression and watermarking trade-off.
Fig. 8 shows the PSNR of the reconstructed and extracted host image with a bpp 2.5 with
different numbers of bottom embedding rows, which imply different logo sizes. It is obvious that the increased number of
bottom rows of the logo image, would deteriorate the PSNR of the reconstructed host image.
Fig. 9 shows the compression performance (PSNR reconstruction quality of watermarked host image) and the watermarking
performance (NCORR correlation of the extracted logo), both against different alpha (  ) values as well as different C
values, a higher C value would imply high bit rate and less number of wavelet decomposition layers. It can be shown that the
compression and watermarking performances are inversely affected by changing the value of either alpha or C; hence they
have to be treated on a trade-off manner.

5. Discussion
In this paper we presented a joint watermarking and compression system that can both compress and watermark a host image
on a trade-off manner. We note here that our primary objective was to present the idea of joint compression and
watermarking, rather than a regular single watermarking or compression technique like the recent literature, or our work in
[14-15].

Fig. 5 Joint graph for PSNR and NCORR values for different alpha values

www.ijmer.com 2348 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645

Fig. 6 PSNR reconstructed quality of host for different number of wavelet layers

Fig. 7 PSNR reconstructed quality for different bpp for one wavelet decomposition layer

www.ijmer.com 2349 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645

Fig. 8 PSNR reconstructed quality for host for different logo sizes

Fig. 9 Joint watermarking and Compression for different alpha values for Lena and
Cameraman images

www.ijmer.com 2350 | Page


International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645
When treating compression and watermarking jointly, compression parameters can be treated as security keys, while
watermarking data or keys can be considered as compression indices. Our proposed simulation results showed that there
were three variables that could significantly affect the performance of both watermarking and compression. Bit rate, number
of wavelet decomposition layers and the alpha value, which controls the balance between energy concentration
(compression) and energy distribution (watermarking). The number of wavelet decomposition layers and the bit rate are two
compression parameters that are typically defined in any wavelet-based compression process and they were combined in a
single compression parameter C. Since both the alpha value and the C compression parameter had inverse impact on the
performance of both compression and watermarking, a Lagrange multiplier equation was introduced that controls the balance
between alpha and C on a trade-off manner. We note here the Lagrange multiplier value would depend on both the image
class/type/content in addition to the desired point between compression and watermarking performances.

7. Conclusions
Our proposed system can be utilized in joint watermarking and compression applications that exploits compression
parameters as watermarking variables, while compression indices could be used as watermarking actuators/adjustors. Our
illustrated simulation results support our hypotheses and analogies in joint watermarking and compression, that they are
inversely related and there is a trade-off relation between them, hence they should be treated jointly to achieve the optimal
point of them. This work is funded by the ministry of Communication and Information Technology, Egypt, ITIDA. It has
also been funded partly by the Alexander von Humboldt foundation, Germany.

References
1. C. Y. Lin and S. F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious
manipulation,” IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153–168, Feb. 2001.
2. N. Nikolaidis and I. Pitas, Robust image watermarking in the spatial domain, Signal Processing, Elsevier, vol. 66, no.
3, pp. 385-403, 1998.
3. P. V. K. Borges and J. Mayer, “Text luminance modulation for hardcopy watermarking” Signal Processing, Elsevier,
Vol. 87, Issue 7, July 2007.
4. Y. Hsien-Chu Wu and Chin-Chen Chang," A novel digital image watermarking scheme based on the vector
quantization technique", Computers & Security, Elsevier, Vol. 24, pp.460-471, 2005.
5. Y. Wang, A. Pearmain, Blind image data hiding based on self reference, Pattern Recognition Letters 25 (2004) 1681–
1689.
6. P. H.W. Wong, Oscar C. Au, Y.M. Yeung, A novel blind multiple watermarking technique for images, IEEE
Transactions on Circuits and Systems for Video Technology 13 (8) (2003) 813– 830.
7. J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, DCT-domain watermarking techniques for still image: Detector
performance analysis and a new structure, IEEE Trans. Image Processing, (9) (2000) 55–68.
8. H. Munawer Al-Otum, N. Abdul Samara A robust blind color image watermarking based on wavelet tree bit host
difference selection, pp. 2498-2512 Signal Processing (Elsevier) Volume 90, Issue 8, Aug. 2010).
9. I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE
Transactions on Image Processing 6 (12) (1997) 1673–1687.
10. J. Fridrich, “A hybrid watermark for tamper detection in digital images,” in Proc. Int. Symp. Signal Processing and
Applications, Aug. 1999, pp. 301–304.
11. C. Deng, X.-B. Gao, and et al. A Local Tchebichef Moments-Based Robust Image Watermarking. Signal Processing
(Elsevier), Vol.89, No.8, pp.1531-1539, August, 2009.
12. E. First, X. Qi, A Composite Approach for Blind Grayscale Logo Watermarking, ICIP, 2007, 265-268.
13. T. Duy Hien, I. Kei, H. Harak, Yen-Wei Chen, Y. Nagata, Z. Nakao, “Curvelet-Domain Image Watermarking Based
on Edge-Embedding”, proc. of the 11th International Conference on Knowledge-Based Intelligent Information and
Engineering Systems (KES 2007). (2007) 311-317.
14. M. F. Fahmy, O. M. Fahmy and G. Fahmy, " A Quasi Blind Watermark Extraction of Watermarked Natural Preserve
Transform Images ", IEEE International Conference on Image Processing, ICIP November 2009.
15. G. Fahmy, M. F. Fahmy and U. S. Mohamed, “Non Blind and Quasi-Blind Natural Preserve Transform Watermarking
and Data Hiding Technique”, EURASIP Journal of advances on Signal Processing, volume 2010, ID. 452548.
16. R. Yarlagda, J. Hersshey, Natural Preserving Transform for Image Coding and Reconstruction, IEEE Trans. Acoustic,
Speech and Signal Processing, 4 (33) (1985)1005-1012
17. M. Ahmed, Digital Image Watermarking using Fuzzy Logic and Naturalness Preserving Transform, A Ph.D. Thesis,
Kansas State University (2004).
18. D. D. Day and A.M. Ahmed, A Modified Natural Preserving Transform for data hiding and Image Watermarking,
Proc. JCIS 7th Joint Conf. of IASTED Int. Conf. on Signal and Image Processing, 2003, 44-48.
19. J. W. Daniels," Applied Linear Algebra " Prentice Hall International Inc., Engle wood Cliff, New Jersey, U.S.A.,
1988.
20. A. Said and W. Pearlman, A new, fast and efficient image codec based on set partitioning in hierarchical trees," in
IEEE Trans. Circuits and Systems for Video Technology. 6(3) (1996) 243-250.
21. D. Taubman, “High Performance Scalable Image Compression with EBCOT”, IEEE Transactions on Image
Processing, vol. 9, No. 7, July 2000

www.ijmer.com 2351 | Page

You might also like