•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content blocks. The adjacent blocks of same type are merged together into a single block. Each block is watermarked in Phase-3. The type and amount of watermarking applied is decided intelligently and adaptively based on the classification of the blocks which results in improving embedding capacity and reducing time complexity incurred during watermarking. Experiments are conducted exhaustively on all the images in the corpus. The experimental evaluations exhibit better classification of segments based on information content in the block. The proposed technique also outperforms the existing watermarking schemes on document images in terms of robustness, accuracy of tamper detection and recovery.

References

[1] M. Wu And B. Liu, (1998), Watermarking For Image Authentication, Proc. Of The IEEE Int. Conf. On Image Processing, pp. 437-441.

[2] Ingemar Cox , Matthew Miller, Jeffrey Bloom, Jessica Fridrich and Ton Kalker, (2007), Digital Watermarking And Steganography, Morgan Kaufmann Publishers Inc. San Francisco

[3] F Hartung and M Kutter, (2002), Mutimedia Watermarking Techniques, Proceedings of IEEE, Vol. 87. No 7, pp. 1079-1107

[4] Potdar, V.M.; Song Han; Chang, E., (2005), A Survey of Digital Image Watermarking Techniques, 3rd IEEE International Conference On Industrial Informatics, pp.709, 716, doi: 10.1109/Indin.2005.1560462.

[5] H. Mirza, H. Thai, And Z. Nakao, (2008), Color Image Watermarking and Self-Recovery Based On Independent Component Analysis, Lecture Notes In Computer Science, Vol. 5097, pp. 839-849.

[6] M. S. Wang and W. C. Chen, (2007), A Majority-Voting Based Watermarking Scheme For Color Image Tamper Detection And Recovery, Computer Standards & Interfaces, Vol. 29, pp. 561-571.

[7] Bas P, Chassery and Jm, Macq B, (2002), Geometrically Invariant Watermarking Using Feature Points, IEEE Trans On Image Processing, Vol. 11, No. 9, pp. 1014–28.

[8] W. Qi, X. Li, B. Yang and Daofang Cheng, (2008), Document Watermarking Scheme For Information Tracking, Journal On Communications, Vol. 29, No. 10, pp. 183–190

[9] Dawei Z, Guanrong C and Wenbo L, (2004), A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm, Chaos Solitons and Fractals, Vol. 22, No. 1. pp. 47–54.

[10] G. Schirripa, C. Simonetti and L. Cozzella, (2004), Fragile Digital Watermarking by Synthetic Holograms, Proc. Of European Symposium On Optics/Fotonics In Security & Defence, London, pp. 173-182.

[11] Amir Houmansadr Et Al., (2006), Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect, In Proceedings of The International Conference On Signal Processing and Multimedia Applications, pp. 252-259,

[12] Kankanhalli Ms, Rajmohan, Ramakrishnan Kr, (1999), Adaptive Visible Watermarking of Images. In: IEEE International Conference On Multimedia Computing and Systems, Vol 1, pp 568–573

[13] S Radharani et. al., (2010), A Study On Watermarking Schemes For Image Authentication, International Journal Of Computer Applications (0975 – 8887), Vol. 2, No.4, pp. 24-32

[14] Kay, S. and Izquierdo, E, (2001), Robust Content Based Image Watermarking, Proc. Workshop On Image Analysis For Multimedia Interactive Services.

[15] Kim, M. And Lee, W., (2004), A Content-Based Fragile Watermarking Scheme For Image Authentication, Lecture Notes In Computer Science, Content Computing, Springer Berlin / Heidelberg, Vol. 0302/2004, pp. 258-265.

[16] Habib, M., Sarhan, S. And Rajab, L., (2005), A Robust Fragile Dual Watermarking System In The DCT Domain, Lecture Notes In Computer Science, Knowledge-Based Intelligent Information And Engineering Systems, Springer Berlin / Heidelberg, Vol. 3682/2005, pp. 548-553

[17] Chin-Shiuh Shieh et al.., (2004), Genetic Watermarking Based On Transform-Domain Techniques, Journal Of Pattern Recognition, Vol. 37, pp. 555 – 565

[18] D.E. Goldberg, (1992), Genetic Algorithms In Search, Optimization And Machine Learning, Addison-Wesley, Reading Ma.

[19] Sameh Oueslati, Adnane Cherif, and Bassel Solaiman, (2013), Multiple Binary Images Watermarking in Spatial and Frequency Domains, International Journal of Computer Theory and Engineering, Vol. 5, No. 4. pp. 598-602

[20] Zhe-Ming Lu, Dian-Guo Xu and Sheng-He Sun, (2005), Multipurpose Image Watermarking Algorithm Based On Multistage Vector Quantization, In IEEE Transactions On Image Processing, Vol. 14, No. 6, pp. 822-831. Doi: 10.1109/Tip.2005.847324

[21] Nicholas Paul Sheppard et.al., (2001), On multiple watermarking, MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp. 3-6

[22] W. S. Zhang X., (2007), Watermarking Scheme Capable Of Resisting Sensitivity attack, IEEE Signal Processing Letters, Vol. 14, No. 2, pp. 125 -128.

[23] S Radharani et.al., (2011), Multiple Watermarking Scheme for Image Authentication,and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography, International Journal of Computer Applications (0975 – 8887), Volume 23, No.3, pp. 29-36

[24] Houmansadr, A., Ghaemmaghami, S.: (2005), A digital image watermarking scheme based on visual cryptography, International Symposium On Telecommunications, pp. 1-5

[25 ] Chetan K R and S Nirmala, (2016), A novel intelligent multiple watermarking schemes for the protection of the information content of a document image, 2nd Workshop on Computer Vision Applications, Indian Institute of Technology, Guwahati

[26] Chetan K. R and S. Nirmala, (2015), An Efficient And Secure Robust Watermarking Scheme For Document Images Using Integer Wavelets And Block Coding Of Binary Watermarks. J. Inf. Sec. Appl. 24-25: pp. 13-24

[27] Chetan K R and S Nirmala, (2016), A new curvelet based blind semi-fragile watermarking scheme for authentication and tamper detection of digital images, Third International Conference on Information System Design and Intelligent Applications (INDIA 2016), Vishakapatnam.

[28] Chetan K R, S. Nirmala, A Novel Fragile Watermarking Scheme Based On Contourlets For Effective Tamper Detection, Localization And Recovery Of Handwritten Document Images, International Journal of Multidimensional Systems and Signal Processing (Communicated)

[29] Basilio et.al., (2011), Explicit Image Detection Using YCbCr Space Color Model As Skin Detection, Proceedings of the 2011 American Conference on Applied Mathematics and the 5th WSEAS International Conference on Computer Engineering and Applications, pp. 123-128 [30] Raman Maini & Dr. Himanshu Aggarwal, (2009), Study and Comparison of Various Image Edge Detection Techniques, International Journal of Image Processing (IJIP), Vol. 3, No. 1, pp. 1-12. [31] Gadkari D., (2000), “Image Quality Analysis Using GLCM”, A thesis submitted in partial fulfillment of the requirements for degree of Master of Science in Modeling and Simulation in the College Arts and Sciences at the University of Central Florida.B.SE.E University of Pune. [32] Ming-Wei Lin, Jules-Raymond Tapamo, Baird Ndovie. (2007), A Texture-based Method for Document Segmentation and Classification. Revue Africaine de la Recherche en Informatique et Mathématiques Appliquées, INRIA, Vol. 6, pp.49-56

[33] Er.Deepak Aggarwal, (2010), An Efficient Watermarking Algorithm to improve payload and robustness without affecting Image Perceptual Quality, Journal Of Computing, Volume 2, Issue 4, ISSN 2151-9617

[34] Xinshan Zhu et al., (2014), Normalized Correlation-Based Quantization Modulation for Robust Watermarking, IEEE Transactions on Multimedia, Vol. 16, No. 7, pp. 1888-1904

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.