Abstract

In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem) (511,31,109) code to error correct the watermark bits and the BCH (63,16,11) code as the sync signal to withstand JPEG (Joint Photographic Experts Group) compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.

Highlights

  • Digital watermarking is a method that is used widely to protect the copyright of digital contents, and it is one of the underlying techniques required to realize the vision of ubiquitous computing [1,2,3]

  • We focused on the problem of obtaining the solution with the highest image quality according to the IHC evaluation criteria

  • We developed a novel and simple digital image watermarking method that satisfies the requirements of the IHC evaluation criteria

Read more

Summary

Introduction

Digital watermarking is a method that is used widely to protect the copyright of digital contents, and it is one of the underlying techniques required to realize the vision of ubiquitous computing [1,2,3]. Kutter and Petitcolas considered the methods used to evaluate and compare the performance of robust invisible watermarking systems [9] They applied a duality approach to the watermarking evaluation problem where the evaluation criteria were divided into two groups: functionality and assurance [10]. (http://www.ieice.org/iss/emm/ihc/en/iwihc2014/), which included a watermarking competition, was held in Japan in conjunction with a major security conference, called ASIACCS2014 (ACM Symposium on Information, Computer and Communications Security). This workshop aimed at ascertaining the current state-of-the-art in digital watermarking algorithms.

Summaries of the IHC Criteria
Image Quality Assessment
Tolerance Assessment
Overall Approach of Our System
Encoding the Watermark
Approach to One-Bit Embedding
Embedding Process
Extraction Process
Decoding the Extracted Bits
Data Hiding Capacity
Experimental Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call