A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Similar documents
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on DCT-DWT- SVD Method

Data Hiding in Video

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Digital Image Watermarking Using DWT and Shift Invariant Edge Detection

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

A Robust Image Hiding Method Using Wavelet Technique *

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Digital Watermarking with Copyright Authentication for Image Communication

Feature Based Watermarking Algorithm by Adopting Arnold Transform

On domain selection for additive, blind image watermarking

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

QR Code Watermarking Algorithm based on Wavelet Transform

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

CHAPTER-6 WATERMARKING OF JPEG IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Improved Content Based Image Watermarking

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Comparison of wavelet based watermarking techniques Using SVD

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

Digital Watermarking of Still Images using the Discrete Wavelet Transform

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

World Academy of Science, Engineering and Technology International Journal of Electronics and Communication Engineering Vol:4, No:8, 2010

Adaptive Quantization for Video Compression in Frequency Domain

A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

A New Approach to Compressed Image Steganography Using Wavelet Transform

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Primal Sketch Based Adaptive Perceptual JND Model for Digital Watermarking

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Copy Protection for Multimedia Data based on Labeling Techniques

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Improved Qualitative Color Image Steganography Based on DWT

A Wavelet-Based Watermarking for Still Images

Design and Development of BFO Based Robust Watermarking Algorithm for Digital Image. Priyanka*, Charu Jain** and Geet Sandhu***

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

A Wavelet Watermarking Algorithm Based on a Tree Structure

A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation

CHAPTER-5 WATERMARKING OF COLOR IMAGES

Implementation and Comparison of Watermarking Algorithms using DWT

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

A Statistical Comparison of Digital Image Watermarking Techniques

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

An Improved Performance of Watermarking In DWT Domain Using SVD

An Improved Blind Watermarking Scheme in Wavelet Domain

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Block Mean Value Based Image Perceptual Hashing for Content Identification

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families

Reversible Data Hiding

A Video Watermarking Algorithm Based on the Human Visual System Properties

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

Digital watermarking techniques for JPEG2000 scalable image coding

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

A new wavelet based logo-watermarking scheme

Comparison of Digital Water Marking methods

Invisible Watermarking Using Eludician Distance and DWT Technique

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Speech Modulation for Image Watermarking

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

Image and Video Watermarking

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Cover Page. 1) Title of the paper: A robust image watermarking technique based on quantization noise visibility thresholds

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Digital Watermarking: Combining DCT and DWT Techniques

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

A wavelet-based watermarking for digital images of different size

A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS

Digital Image Watermarking Using DWT Based DCT Technique

Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

International Journal of Advance Research in Computer Science and Management Studies

CSEP 521 Applied Algorithms Spring Lossy Image Compression

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P

Transcription:

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION John N. Ellinas Department of Electronic Computer Systems,Technological Education Institute of Piraeus, 12244 Egaleo, Greece jellin@teipir.gr Dimitrios E. Manolakis Department of Automation, Alexander Technological Education Institute of Thessaloniki, 574 Thessaloniki, Greece dmanol@teithe.gr Keywords: Abstract: Image watermarking, wavelet transform, Human Visual System, Contrast Sensitivity Function. The efficiency of an image watermarking technique depends on the preservation of visually significant information. This is attained by embedding the watermark transparently with the maximum possible strength. The current paper presents an approach for still image digital watermarking in which the watermark embedding process employs the wavelet transform and incorporates Human Visual System (HVS) characteristics. The sensitivity of a human observer to contrast with respect to spatial frequency is described by the Contrast Sensitivity Function (CSF). The strength of the watermark within the decomposition subbands, which occupy an interval on the spatial frequencies, is adjusted according to this sensitivity. Moreover, the watermark embedding process is carried over the subband coefficients that lie on edges where distortions are less noticeable. The experimental evaluation of the proposed method shows very good results in terms of robustness and transparency. 1 INTRODUCTION The rapid evolution of multimedia systems and the wide distribution of digital data over the World Wide Web addresses the copyright protection of digital information. The aim is to embed copyright information, which is called watermark, on digital data (audio or visual) in order to protect ownership. In general, a digital watermarking technique must satisfy two requirements. First, the watermark should be transparent or perceptually invisible for image data. The second requirement is that the watermark should be resistant to attacks that may remove it or replace it with another watermark. This implies that the watermark should be robust to common signal processing operations, such as compression, filtering, enhancements, rotation, cropping and translation. The digital image watermarking techniques in the literature are typically grouped in two classes: the spatial domain techniques (Schyndel et al., 1994; Bender et al., 1996; Wolfgang and Delp, 1996) which embed the watermark by modifying the pixel values of the original image and the transform domain techniques which embed the watermark in the domain of an invertible transform. The discrete cosine transform (DCT) and the discrete wavelet transform (DWT) are commonly used for watermarking purposes (Swanson et al., 1996; Cox et al., 1997; Xia et al., 1997; Kim and Moon, 1997; Dugad et al., 1998; Hsu and Wu, 1999; Wolfgang et al., 1999; Barni et al., 21). The transform domain algorithms modify a subset of the transform coefficients with the watermarking data and generally achieve better robustness than spatial domain methods. Optionally, they may employ a human visual perception model to weight the strength of the embedded data. Several research works employ the wavelet transform because it presents a number of advantages over the DCT. The wavelet transform is closer to the human visual system since it splits the input image into several frequency bands that can be processed independently. It is a multi-resolution transform that permits to locate image features such as smooth areas, edges or textured areas. Some watermarking schemes embed watermarking data in textured areas

or edges where human visual system (HVS) is less sensitive. Many HVS models have been developed for quality assessment or image compression (De Vleeschouwer et al., 22). Similar visual models are employed for digital watermarking with a great success. One model for perceptual watermarking exploits the contrast sensitivity of the human eye over the spatial frequency, which is described by the contrast sensitivity function (CSF), in order to weight the coefficients of a transform domain. In this paper, an additive watermarking algorithm embeds the signature data to selected groups of wavelet transform coefficients, weighting the watermark strength according to the CSF sensitivity of the subband where the corresponding coefficients reside. The input image is decomposed into four levels by a DWT, an approximation subband including the low frequency components and 12 detail subbands including the high frequency components. Every subband occupies a specific spatial frequency interval that corresponds to an average contrast sensitivity factor which is the weight of the watermark strength. Moreover, the proposed algorithm detects edges in each subband and distributes the watermark energy in these regions, where HVS is less sensitive to. Finally, the receiver detects the signature data by correlating the watermarked image with the watermark sequence and comparing the correlation factor to a threshold value. The motivation of the present work is to adapt a watermark sequence to the local image properties by employing a visual model, providing a transparent and robust watermark. 2 CSF CHARACTERISTICS The characteristics of the contrast sensitivity function in HVS model may be applied on the coefficients of the detail subbands in the wavelet decomposition of an image. 2.1 The Contrast Sensitivity Function Based on the research of the human visual system, several mathematical models have been devised to characterize humans sensitivity to brightness and color (Wandell, 1995). The contrast sensitivity function describes humans sensitivity to spatial frequencies. A model of the CSF for luminance (or grayscale) images, originally proposed by Mannos and Sakrison (Mannos and Sakrison, 1994), is given by: (.114 f ) 1.1 CSF ( f ) = 2.6(.192 +.114 f ) e (1) Fig. 1 illustrates the CSF curve which characterizes the luminance sensitivity of HVS with respect to spatial frequency. According to this curve, HVS is less sensitive at very low and very high frequencies. The properties of CSF may be used to weight the watermark embedded data so that to be transparent for a human observer. Relative sensitivity 1.4 1.2 1.8.6.4.2 5 1 15 2 25 3 35 4 45 5 Spatial frequency (cycles/degree) Figure 1: Luminance contrast sensitivity function. 2.2 CSF weighting in DWT domain The DWT decomposes a two dimensional image into subbands using low and high pass filters for the rows and columns successively. The edge components of the image are confined within the high frequency part (detail subbands) whereas the low frequency part (approximation subband) splits again until reaching the desired resolution. Fig.2 shows a four level wavelet decomposition where each subband is covered by a specific spatial frequency range. For example, subband HL3 of level l=3 and orientation θ=1, which describes the vertical details by indicating the luminance variations along the horizontal direction, is covered by horizontal frequencies from.125f max to.25f fmax and vertical frequencies from to.125f max. The area of the CSF along the horizontal and vertical directions that corresponds to the spatial frequency range covered by this subband is shaded. Therefore, the weighting for the coefficients of the specific subband must be estimated by the shaded portions of the CSF function.

LL è= f max /4 f max /2 f max /4 f max /2 HL3 HL2 LH3 HH3 LH2 HH2 Horizontal detail HL1 - è=3 Vertical detail LH1 - è=1 Diagonal detail HH1 - è=2 horizontal The perceptually important wavelet coefficients of each subband are detected by Sobel edge detector. To the selected coefficients, the watermark is inserted in an additive way using (2). The detail subbands, where the watermark is inserted, contain edge information or high frequency coefficients. Consequently, adding the watermark to these coefficients makes the insertion invisible to the human visual system. Moreover, the insertion is weighted according to the sensitivity of the human visual system to the contrast, which depends on the spatial frequency. Y ' u v X ' u v l w X ', =, +α θ l u, v Nu, v (2) vertical Figure 2: Luminance CSF along horizontal and vertical directions of four level wavelet decomposition. 3 CSF BASED WATERMARKING The CSF exploitation in the watermarking process is accomplished by weighting the coefficients of the wavelet transform according to the subband they belong to. The additive embedding algorithm and its detection at the receiver s end are analyzed as follows: 3.1 The watermark embedding process where Y ' u,v are the modified wavelet coefficients, X ' u,v are the edge selected wavelet coefficients, α l is a level dependent parameter controlling the θ watermark strength, w l is the subband visual weight at level l and orientation θ, and N u, v is the watermark sequence which is represented by Gaussian noise with zero mean and unit variance. Fig. 4 illustrates the perceptually significant wavelet coefficients of the vertical detail subband at level 2 for Lena. The visual weighting factors for each subband are estimated by averaging the portion of the CSF curve that corresponds to the high spatial frequency part. The magnitude of the watermark strength scale factor is selected for each level of the wavelet decomposition such that not severely degrading the watermarked image quality and considering the fact that the average magnitude of the coefficients is approximately doubled in each level from the finest to the coarsest resolution. Fig. 3 shows the overall process of watermark insertion. The input image is subjected to a four level DWT decomposition using the Daubechies 8- tap filter. N u,v X u,v X ' u,v x i,j edge DWT detector watermark insertion Y ' u,v IDWT y i,j CSF weighting w l è Figure 3: Block diagram of the watermark insertion process. Figure 4: Edge coefficients of the vertical orientation subband at level 2.

3.2 The watermark detection process The possibly distorted watermark sequence is detected by combining the original image x with the possibly distorted watermarked image y * reversing the steps of the insertion process, as Fig. 5 shows. X x u,v i,j X edge ' u,v DWT detector y* i,j Figure 5: Block diagram of the watermark detection process. The extraction process is performed by subtracting the original perceptual significant coefficients from the corresponding received watermarked coefficients (which may have been attacked and distorted) and scaling the difference by the weighting and watermark strength factors. The watermark detection is accomplished without referring to the original image, considering the correlation between the watermarked coefficients and the watermarking sequence (Barni et al., 21): 1 1 1 M N ρ = Y ' u, v Nu, v (3) MN u= v= where Y ' u,v represents the watermarked perceptually significant coefficients and N u, v is the watermark sequence. The correlation factor is compared to a threshold value, as in (4) where DWT Y ' * u,v ρ Tw true watermark ρ Tw false watermark (4) T = 3.97 2σ 2 (5) w Standard deviation σ is defined as - CSF weighting similarity measure N u,v w l è decision threshold ( ) 2 M 1 N 1 1 ' σ = 2 Y u, v (6) ( ΜΝ) u= v= 3.3 Image quality assessment The objective evaluation of image quality is performed by the PSNR, which is defined as 255 255 PSNR = 1log1 (7) mse where mse is the mean square error: M 1 1 2 1 N mse = [ x( i, j) y( i, j) ] (8) MN i= j= where M, N are the dimensions of the input image and x, y are the original and the watermarked images. However, PSNR declines from the perceived subjective quality because the HVS does not correlate well with the square of the error. For this reason, the weighted PSNR that takes into account the local variance is also used as follows: where 255 255 wpsnr = 1log1 (9) wmse M 1 N 1 2 1 x( i, j) y( i, j) wmse = (1) MN 1 var(, ) = = + i j i j 4 EXPERIMENTAL RESULTS The proposed method is evaluated in four images: Lena, which is an image with large smooth regions, Barbara, Baboon and Boat, which have textured regions. The size of all images is 512 512 pixels. The performance measures are the invisibility of the inserted watermark and the robustness of the method against various types of attacks. The attacks employed for testing are JPEG

compression, median filtering, Gaussian noise and cropping. medium level. Fig. 8 shows the response of the watermark detector to 1 randomly generated watermarks, with the original watermark placed in the middle. In this case, the watermark strength is such that the watermark sequence is robust enough and the objective quality of the watermarked image is just above 35 db, which is a typical value just before image is degrading. Table 1: PSNR and wpsnr values of watermarked test images. (a) (b) Figure 6: (a) Original image; (b) Watermarked image. Fig. 6 shows the original image of Lena and its watermarked copy whereas Fig. 7 shows their difference. It is obvious that the watermarked copy is undistinguishable from the original image. In the difference, which is suitably scaled for display, it is evident that most of the watermark data are added to the edges where they are perceptually invisible. 6 5 4 3 2 Images PSNR wpsnr (db) (db) Lena 45.18 65.66 Barbara 44 64.21 Baboon 42.65 61.95 Boat 44.45 63.67 1 1 1 2 3 4 5 6 7 8 9 1 Watermarks Figure 8: Response of watermark detector for Lena. Figure 7: Scaled difference between original and watermarked images. Table 1 depicts the objective quality values of the proposed method for the tested images. These values are obtained setting the watermark strength factor to a low value so that the detector response is just over the threshold value. It is well known that the two desirable features of watermarking, invisibility and robustness, are contradictory. Thus, the values of the watermark strength factor α l are properly tuned so that the watermarking sequence is completely invisible although robustness is at a Table 2 shows the effectiveness of the proposed scheme against two other typical algorithms on wavelet-based watermarking (Dugad et al., 1998; Kim and Moon, 1999). The first method employs a unique threshold value over all the detail subbands for embedding the signature data, whereas the second method uses level adaptive thresholding for more accurate estimation of edge coefficients. Table 2: PSNR and detector response values of three watermarking schemes for the test image Lena. Algorithms PSNR (db) Proposed 35.11 53.76 Dugad et al. 35.73 28.2 Kim and Moon 35.18 43.6 The proposed scheme outperforms significantly over the other two methods for about the same

objective quality of the watermarked image. This robust performance lies on the fact that watermark data are placed exactly on the detected edges where HVS is less sensitive to distortions. The threshold values employed by the other algorithms can not exactly locate the edges on the wavelet domain and for that reason some watermark data are placed on coefficients that affect the quality of the image. Moreover, in the proposed method there are no threshold values that are image dependent and their tuning to optimum values is a serious drawback. To appreciate the robustness of the proposed method against several common attacks, the following experiments were performed in Lena image. Firstly, JPEG coding with variable quality factor was applied to the watermarked image and 1 watermarks were inserted for examining the detector s response about their presence. In Fig. 9, the response of the detector to the embedded watermark is plotted against the JPEG quality factor. Also, the detection threshold and the second highest response are shown. The detector response remains above threshold up to a quality factor of 5 whereas the second highest response remains always under the threshold value. This proves the robustness of the proposed method against JPEG compression. nearly all of the watermarking data have been embedded. The proposed method is quite immune to Gaussian noise, as Fig. 11 shows. Fig. 11(a) presents the watermarked copy which has been contaminated with Gaussian noise of zero mean and variance of 2 whereas Fig. 11(b) shows the detector response. The output of the detector is slightly lower than that of Fig. 8, where no attack is involved. Finally, the robustness of the proposed watermarking method against cropping is examined. When the watermarked image is cropped, part of the embedded information is discarded making the detection more elaborate. 4 35 3 inserted watermark second highest peak threshold level 2 (a) 25 2 15 1 15 1 5 5 1 15 2 25 3 35 4 45 5 Quality factor Figure 9: versus JPEG quality factor. 5 5 Fig. 1(a) illustrates the watermarked image after median filtering with a window size of 3 3 whereas Fig. 1(b) shows the detector response to this kind of attack. Comparing this figure with Fig. 8, we observe that correlation factor decreases to about one third of its initial value because of median filtering. This may be explained since median filtering smoothes the edges of an image where 1 1 2 3 4 5 6 7 8 9 1 Watermarks (b) Figure 1: (a) Watermarked copy after median filtering; (b) of the attacked watermarked image. Thus, it is important the watermark method to spread the information all over the image so that, if possible, any remaining part to include enough

information for the watermark recovery. Our experiment on cropping is to examine the resilience of the watermark after the removal of a substantial part of the original image. Fig. 12(a) shows the cropped watermarked image which is half of the original image. The ability of the decoder to trace the watermark of the sub-image is shown in Fig. 12(b). It is quite impressive that the detector response is well above threshold, revealing the robustness of the proposed method. The watermark sequence is hidden on the wavelet coefficients that reside on the detail subbands or on the edges which exist all over the input image. The proposed method may be less effective when the remaining part contains mainly smooth areas where the embedded information is less, but this is difficult to be accomplished. (a) 3 25 2 15 1 5 5 (a) 1 1 2 3 4 5 6 7 8 9 1 Watermarks (b) Figure 12: (a) Cropped watermarked copy; (b) Detector response of the cropped watermarked image. 5 CONCLUSIONS (b) Figure 11: (a) Watermarked copy after Gaussian noise; (b) of the attacked watermarked image. In this paper, a novel method for image watermarking has been presented. The method embeds the watermarking data on selected wavelet coefficients of the input image considering the CSF characteristics of the HVS. The selected coefficients reside on the detail subbands and describe the edges of the image. Thus, exploiting the HVS which is less sensitive to alterations on high frequencies, the embedded information becomes invisible. The evaluation of the proposed method shows very good performance as far as invisibility and robustness is

concerned. The proposed scheme behaves very well in various common signal processing methods as compression, filtering, noise and cropping. ACKNOWLEDGEMENTS Wandell, B. A., 1995. Foundations of Vision, Sinauer Associates Inc., Sunderland MA. Mannos, J. and Sakrison, D., 1974. The effects of a visual fidelity criterionon the encoding of images. In IEEE Transactions on Information Theory, 2. The project is co-funded by the European Social Fund and National Resources-EPEAEK II- ARCHIMEDES granted to Technological Education Institute of Thessaloniki under program number 1. REFERENCES Schyndel, R., Tirkel, A. and Osborne, C., 1994. A digital watermark. In IEEE Proc. of International Conference on Image Processing 1994. Bender, W., Gruhl, D., Morimoto, N. and Lu, A., 1996. Techniques for data hiding. In IBM Systems Journal, 35(3-4). Wolfgang, R. B. and Delp, E. J., 1996. A watermark for digital images, In IEEE Proc. of International Conference on Image Processing 1996. Swanson, M. D., Zhu, B. and Tewfik, A. H., 1996. Transparent robust image watermarking. In IEEE Proc. of International Conference on Image Processing 1996. Cox, I. J., Kilian, J., Leighton, T. and Shamoon, T., 1997. Secure spread spectrum watermarking for multimedia. In IEEE Transactions on Image Processing, 6(12). Barni, M., Bartolini, F. and Piva, A., 21. Improved wavelet-based watermarking through pixel-wise masking. In IEEE Transactions on Image Processing, 1(5). Xia, X., Boncelet, C. G. and Arce, G. R., 1997. A multiresolution watermark for digital images. In IEEE Proc. of International Conference on Image Processing 1997. Kim, J. R. and Moon, Y. S., 1999. A robust wavelet-based digital watermarking using level-adaptive thresholding. In IEEE Proc. of International Conference on Image Processing 1999. Hsu, C. T. and Wu, J. L., 1999. Hidden digital watermarks in images. In IEEE Transactions on Image Processing, 8(1). Dugad, R., Ratakonda, K. and Ahuja, N., 1998. A new wavelet-based scheme for watermarking images. In IEEE Proc. of International Conference on Image Processing 1998. Wolfgang, R. B., Podilchuk, C. I. and Delp, E. J., 1999. Perceptual watermarks for digital images and video. In SPIE Proc. of International Conference on Security and watermarking of multimedia contents 1999. De Vleeschouwer, C., Delaigle, J. F. and Macq, B., 22. Invisibility and application functionalities in perceptual watermarking an overview. In IEEE Proc., 9(1).