ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

Similar documents
Chaotic-Correlation Based Watermarking Scheme for Still Images

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Robust Image Watermarking based on DCT-DWT- SVD Method

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A new robust watermarking scheme based on PDE decomposition *

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Robust Image Watermarking using DCT & Wavelet Packet Denoising

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

A New DCT based Color Video Watermarking using Luminance Component

An Improved Performance of Watermarking In DWT Domain Using SVD

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

Digital Watermarking with Copyright Authentication for Image Communication

Robust biometric image watermarking for fingerprint and face template protection

The Secure Watermarking Of Digital Color Images By Using A Combination Of Chaotic Mapping

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Robust copyright protection scheme for digital images using the low-band characteristic

Data hiding technique in JPEG compressed domain

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

A new wavelet based logo-watermarking scheme

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

QR Code Watermarking Algorithm based on Wavelet Transform

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A New Spatial q-log Domain for Image Watermarking

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

CHAPTER-5 WATERMARKING OF COLOR IMAGES

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

A Robust Image Watermarking Scheme using Image Moment Normalization

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Combined Hashing/Watermarking Method for Image Authentication

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Image Error Concealment Based on Watermarking

Patch-Based Color Image Denoising using efficient Pixel-Wise Weighting Techniques

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Design and Development of BFO Based Robust Watermarking Algorithm for Digital Image. Priyanka*, Charu Jain** and Geet Sandhu***

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

Multilayer Data Embedding Using Reduced Difference Expansion

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families

Image Authentication and Recovery Scheme Based on Watermarking Technique

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

International Journal of Advance Research in Computer Science and Management Studies

Block-based Watermarking Using Random Position Key

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

Digital watermarking techniques for JPEG2000 scalable image coding

An Oblivious Image Watermarking Scheme Using Multiple Description Coding and Genetic Algorithm

Speech Modulation for Image Watermarking

VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP

Image denoising in the wavelet domain using Improved Neigh-shrink

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

CHAPTER-6 WATERMARKING OF JPEG IMAGES

Robust Digital Image Watermarking based on complex wavelet transform

Digital Image Watermarking Scheme Based on LWT and DCT

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

FRAGILE WATERMARKING USING SUBBAND CODING

Improved Content Based Image Watermarking

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

On domain selection for additive, blind image watermarking

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Comparison of wavelet based watermarking techniques Using SVD

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Attack Detection in Watermarked Images with PSNR and RGB Intensity

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A New Approach to Compressed Image Steganography Using Wavelet Transform

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Rohit Chhabra 1, Dr. R R Sinha 2

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

A reversible data hiding based on adaptive prediction technique and histogram shifting

Implementation and Comparison of Watermarking Algorithms using DWT

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Compression of Stereo Images using a Huffman-Zip Scheme

Robust Lossless Data Hiding. Outline

Watermarking Moble Phone Color Images With Error Correction Codes

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

Transcription:

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT E. Chrysochos, V. Fotopoulos, and A. N. Skodras Digital Systems & Media Computing Laboratory, School of Science and Technology, Hellenic Open University, 13-15 Tsamadou st., GR-26222, Patras, Greece phone: + (30) 2610367535, fax: + (30) 2610367520, email: {e.chrysochos, vfotop1, skodras}@eap.gr web: dsmc.eap.gr ABSTRACT In this paper, a new robust watermarking scheme is presented. The algorithm is based on a chaotic function and a correlation method for detection, operating in the frequency domain. The proposed scheme is blind and comparing to other chaos related watermarking methods, experimental results exhibit satisfactory robustness against a wide variety of attacks such as filtering, noise addition, geometric manipulations and JPEG compression with very low quality factors. The scheme also outperforms traditional frequency domain embedding both in terms of robustness and quality. 1. INTRODUCTION In recent years digital media have spread worldwide. As the media industry grows, the need for media distribution grows along. The digital distribution through Internet is a common practice among media community, but certain problems have risen along with it [1]. The main problem media industry faces today is copyright control, since it suffers from huge economic losses due to illegal copy and distribution of digital copyrighted material. Thus authentication and copyright protection have become necessary practices [2] and there is an increasing interest in the area of digital watermarking [3]. Digital watermarking stands for embedding a signature signal, called watermark, into a digital cover, in order to prove ownership, check authenticity or integrity of the cover, and it may relate to audio, images, video or even text. Image watermarking schemes are usually categorized according to three factors [4]: a) The domain in which the information (watermark) is embedded (e.g. spatial, DCT, DWT, other), b) the type of the watermark embedded (e.g. random sequence, binary logo), and c) the target application for which the watermarking scheme is intended for (e.g. copyright protection, broadcast monitoring, tamper detection). We refer to robust watermarking when the watermark is still detectable after various removal procedures (accidental or malicious) called attacks, whereas we refer to fragile watermarking, when the slightest alteration of the image, is detectable or noticeable in the content of the watermark. Robust watermarking is usually used for copyright control, whereas fragile watermarking is usually used for integrity check and authentication. One rather intriguing category of digital watermarking is based on chaos theory and chaotic functions. In image processing the chaotic functions used are two-dimensional, and are known as chaotic maps. There are many such functions but the most famous for images is the Arnold s cat map. Voyatzis and Pitas [5] first presented a chaotic watermarking scheme in spatial domain, which used toral automorphism. A two-dimensional chaotic function was applied on a watermark logo in order to mix and spread its content spatially. Afterwards the chaotic logo was embedded in the host image, achieving less detectability and more robustness against attacks. Zhao et al [6] presented a watermarking algorithm in wavelet domain which uses a chaotic map, called logistic map. The image is divided in non overlapping 8x8 blocks and some of them are selected to create a sub image. The selection of the blocks is based on the chaotic logistic map. The sub image is then transformed in the DWT domain where a watermark sequence, created also by the logistic map, is embedded. Yeh and Lee in [7] proposed a block-based, fragile watermarking technique in spatial domain. An authentication signature, along with a relation signature, intended for recovery purposes, is embedded in the two least significant bits of each pixel, for every block. In this case, toral automorphism is applied in order to create block relations. Therefore recovery and authentication data (recovery and authentication signature respectively), of each block is spread to other blocks by using a chaotic map as a spreading function. Wu and Shih [8] proposed an algorithm based on a chaotic map and a reference register, for improving watermarking capacity, by breaking local spatial similarity and generating more significant coefficients in the transformed domain. In the present communication we apply chaotic mapping to images in order to create a noise-like version, before applying the DCT transform to it as a whole. A random sequence is afterwards embedded in the DCT transform coefficients. For detection, the improved correlation-based method of [11] is used in order to decide if a test image is watermarked or not. The rest of this paper is organized as follows. In section 2 the chaotic function and its properties are described, and the proposed watermarking scheme is demonstrated. In section 3 experimental results are presented, while conclusions are drawn in section 4.

2. PROPOSED IMAGE WATERMARKING SCHEME 2.1 Chaotic function Chaotic systems are deterministic (predictable, if enough information is provided) systems that are governed by nonlinear dynamics. These systems show deterministic behaviour which is very sensitive to its initial conditions, in a way that the results are uncorrelated and seem random. One category of chaotic systems is chaotic maps. A chaotic map, which can be considered as a two dimension chaotic function, is a tool that relocates the pixels of an image and breaks spatial continuity. If we transform the resulting chaotic image in the frequency domain, the number of coefficients of significant value is highly increased in comparison with the respective transformed image as has been shown in [8]. In figure 1 the power spectrum of DCT coefficients for Lena, with and without the use of chaos is presented. The coefficients are in logarithmic scale and have been normalized with regard to the DC coefficient. (a) Figure 1 Power spectrum of DCT coefficients for normal (a) and chaotic (b) Lena image In figure 2 the histograms of the respective DCT coefficients are presented. As can be seen in figures 1 and 2, the transformed chaotic image is richer in frequency content, a desirable property in watermarking, as there are more suitable candidate coefficients for manipulation and information embedding. (a) (b) Figure 2 Histogram of DCT coefficients for normal (a) and chaotic (b) Lena image Voyatzis and Pitas in [5] presented a watermarking scheme based on a two dimensional chaotic function, called toral automorphism. This cyclic chaotic function, each time applied on a square image, rearranges its pixels. After it is applied T times, where T is the period of the function, the pixels return to their initial location. If (x, y) are the initial coordinates of a pixel, the outcome coordinates of the chaotic function (x, y ) are given by (1) x' 1 1 x mod N (1) y' = 1 y l l + Where N denotes the width of the image and l is an integer parameter, which affects the period T of the chaotic function. 2.2 Features of the proposed scheme The proposed watermarking scheme has the following features: Blind; in order to detect the watermark no original is needed. Robust against filtering attacks like low pass filtering, Gaussian noise and median. Robust against noise attacks like dust, salt and pepper, speckles and scratches. Robust against some mild geometrical attacks like cropping, aspect ratio changes, resizing and rotation, provided synchronization is achieved. Multicast; a certain watermark can be embedded several times to increase robustness. Applicability to color images. No visual degradation of the image. The basic principle of this scheme is based on the correlation method, applied not in spatial domain, but in frequency domain jointly with a chaotic function. A chaotic map (1) is applied on the host image and the derived chaotic image is transformed in frequency domain with DCT. The energy of the transformed image is scattered throughout all of the DCT coefficients and the resulting DCT matrix has more significant (therefore appropriate for embedding) coefficients. A random sequence is generated according to a seed, which is used as a key for the embedding and extraction rocedure. 2.3 Embedding procedure In order to embed the information in the host image certain parameters must be specified [9]: an integer from which the random sequence derives (key), the starting coefficient (start), the total number of DCT coefficients to be affected (N), and the strength of the embedding procedure (a). The steps of the embedding algorithm for a grayscale image are depicted in figure 3 and are the following: a. A random sequence (w) is generated according to key. The sequence consists of N random numbers which are normally distributed with zero mean and unit variance. b. The period T of the chaotic function (1) for the particular image is calculated.

Host image, key, start, N, a Random sequence (w) Period (T) of chaotic function Chaotic image generation DCT matrix DCT vector C =C+a w C Watermarked DCT vector Watermarked DCT matrix Watermarked chaotic image Watermarked Image Figure 3 Embedding procedure c. The chaotic function (1) is applied T /3 times to the host image creating the chaotic image. The chaotic im- 4. age seems more like noise, as shown in figure d. The DCT coefficients of the chaotic image, as a whole, are calculated formulating the respective DCT matrix. e. A vector is produced by zigzag scanning the DCT maf. Each DCT coefficient from start to start+n-1 is altered trix. according to the following rule: C = C+ a w C where α denotes the strength of the embedding proce- C denotes the dure, C denotes the altered coefficient, initial coefficient, and w denotes the respective element of the random sequence. g. The altered coefficients form the watermarked DCT matrix by inverse zigzag scanning. h. The watermarked chaotic image is generated by applying inverse DCT function on the watermarked DCT matrix. i. The chaotic function (1) is applied T T /3 times to the watermarked chaotic image, producing the final watermarked image. The watermarking algorithm described, could also be applied to color pictures. The only difference is that instead of gray scale intensity values, some or all of the other color components are used [10]. Therefore the watermark could be embedded more than once, achieving higher robustness. 2.4 Watermark extraction In order to detect whether an image is watermarked or not, the parameters start, Ν and key, as well as the improved correlation-based detection method, presented in [11], are used. In [11], except for the right key, in order to increase robustness against attacks, a symmetrical precinct (keyspace), around the key value is used. A typical size for this precinct is ±10. The steps, of the detecting algorithm in a grayscale image are the following: a. The period (T) of the chaotic function (1) for the specified image is calculated. b. The chaotic image is generated by applying the chaotic function (1) T /3 times to the initial image. c. The DCT coefficients of the chaotic image are calculated formulating the respective DCT matrix d. A vector is produced by zigzag scanning the DCT matrix. e. According to key a random sequence (w) is generated. f. The correlation between the random sequence and the respective coefficients of the DCT vector is calculated. g. After calculating the correlation for all the keys in keyspace, the detector s output is defined as the ratio of the first maximum to the second maximum of the correlation values in the precinct. h. If the output is higher than a predefined threshold (k), the image is considered to be watermarked; otherwise the image is considered not watermarked. The extraction procedure is depicted in figure 5. NO Image, key, start, N Period (T) of chaotic function Chaotic image generation DCT matrix DCT vector Random Sequence (w) Cor=Σ(DCT w)/n Chaotic function Examined whole keyspace? YES Cor Factor=max(cor)/max2(cor) NO No watermarked image Cor Factor>k YES Watermarked Image Figure 4 - Host Image (Lena 512x512) and its chaotic representation after applying equation (1) T /3 times Figure 5 Extraction Procedure

Correlation F a c tor 3. EXPERIMENTAL RESULTS AND COMPARISONS The robustness of the watermark depends on the strength parameter (a), used during embedding (section 2.3). As a value increases the robustness of the scheme raises accordingly. Nevertheless this comes with a cost in quality of the watermarked image. As expected, image quality is inversely proportional to robustness. This results from PSNR measurements and objective evaluation of watermarked images. The correlation method is based on the fact that the sequence (w) generated according to key, is normally distributed with zero mean and unit variance. Furthermore DCT coefficients of natural images tend to approximate a Laplacian distribution. Due to this assumption, there is a variation in correlation factor and PSNR results depending on the selected DCT coefficients for the embedding procedure. This is shown in figure 6, where the correlation factor varies depending on the starting coefficient and the number of coefficients affected. A high correlation factor is more robust and therefore, parameters start and N producing a high correlation factor, are more suitable for achieving robustness against attacks (with the restriction that the resulting quality is acceptable). The chaotic implementation produced a watermarked image of PSNR= 45.17dB and correlation factor of 6, while the standard implementation produced a watermarked image of PSNR= 36.61dB and correlation factor of 5.87. The chaotic implementation always outperforms standard correlation method by allowing the selection of parameters that produce similar or higher correlation factors, while the resulting image quality is far superior. In order to achieve higher robustness (at the expense of image quality) we selected the parameters a=0.3, start=2 and N=40000. The watermarked image, of fair PSNR=36.15dB, shows no obvious degradation, providing a high and robust correlation factor (8.34). In figure 8 we can see some attacks on Lena Image and the respective correlation factors. The threshold for the correlation factor was set to 1.5 which is a perfectly safe value for both Type I and Type II errors. The proposed chaotic-correlation based scheme shows robustness against filtering attacks like low pass filtering, median filtering and Gaussian blur. The watermark was detectable after JPEG attack, as low as 10% quality, which in Lena s case gives a compression ratio of 64:1. The watermark was also not compromised by noise attacks like salt and pepper, dust and speckles, Gaussian and uniform noise. The scheme is also robust to some geometrical attacks like cropping, aspect ratio changes, resizing and rotation, given image synchronization. Results for images Lena, peppers, baboon and airplane, are presented in table 1. Start Number of coefficients (N) Figure 6 Correlation factor depending on starting coefficient (start) and number of coefficients affected (N) The proposed method, based on chaotic map and improved correlation-based detection method [11], gives better results than the standard method of correlation. In figure 7 we can see two watermarked images, with a=0.3, start=500 and N=10000, watermarked with the chaotic function and the standard method respectively. a) Chaotic marked Lena image b) Gaussian noise attack Correlation factor= 5.34 c) JPEG attack with quality factor=10 Correlation factor= 1.53 d) Selective cropping attack Correlation factor= 4.05 Figure 7 Chaotic based and standard watermarked Lena image for strength=0.3, start=500 and N=10000 Figure 8 Attacks against watermarked Lena image

Table 1 PSNR and correlation factor results for different images image start N a PSNR (db) Correlation factor Correlation factor after JPEG attack with quality=15% Lena 2 40.000 0.3 36,15 8.34 1.58 peppers 2 40.000 0.3 36,50 10.82 2.29 airplane 2 40.000 0.3 34,25 10.79 1.86 baboon 2 40.000 0.3 33,14 8.76 2.78 The proposed scheme is more robust compared to [7] and [5], as [7] is a fragile implementation and [5] is based on subjective visual observation, which stands up to 6:1 JPEG compression. The method of [6] seems to be more robust against geometrical attacks (due to wavelets features) but no explicit measurements for compression or filtering attacks are mentioned. The method of [8] is outperformed, as it merely withstands JPEG compression down to quality 20 (with PSNR=35.24dB), opposed to JPEG compression with quality factor 10 and PSNR=36.15dB, presented in this work. 4. CONCLUSIONS A robust watermarking scheme for images is presented, based on correlation method and a chaotic function. The proposed scheme shows robustness against filtering attacks like low pass filtering, median filtering and Gaussian blur, while retaining high visual quality. The watermark is also detectable after JPEG compression, for quality factors as low as 10, and is not compromised by noise attacks like salt and pepper, dust and speckles, Gaussian and uniform noise. The scheme is also robust to some geometrical attacks like cropping, aspect ratio changes, resizing and rotation, given image synchronization. A crucial factor is the proper selection of the embedding parameters (strength, start and N) which affect the correlation factor and the robustness of the watermark. Our future work is to combine the proposed algorithm with an image quality metric, suitable for our purpose, in order to produce a scheme which will automatically select the optimum parameters to achieve higher robustness. ACKNOWLEDGEMENTS This work was funded by the European Union - European Social Fund (75%), the Greek Government - Ministry of Development - General Secretariat of Research and Technology (25%) and the Private Sector in the frames of the European Competitiveness Programme (Third Community Support Framework - Measure 8.3 - programme ΠΕΝΕΔ - contract no.03εδ832). REFERENCES [1] Berghel H. and O Gorman L., Protecting ownership rights through digital watermarking, IEEE Computer Mag, pp.101-103, July 1996. [2] Fotopoulos V. and Skodras A., Digital image watermarking: An overview, in EURASIP Newsletter, ISSN 1687-1421, Vol. 14, No. 4, Dec. 2003, pp. 10-19, 2003. [3] Cox J. and Miller L., The first 50 Years of electronic watermarking, EURASIP Journal on Apllied Signal Processing, pp. 126-132, Feb 2002. [4] Potdar V.M., Han S. and Chang. E., A survey of digital image watermarking techniques, in 3rd IEEE International Conference on Industrial Informatics (INDIN), Perth, Australia, 10-12 Aug 2005. [5] Voyatzis G. and Pitas I., Applications of toral automorphisms in image watermarking, in Proc IEEE International Conf. on Image Processing, Lausanne, Switzerland, Sep 1996, vol2, pp.237-240. [6] Zhao D., Guanrong C. and Wenbo L., A chaos-based robust wavelet-domain watermarking algorithm, Chaos, Solitons and Fractals, vol. 22, pp. 47-54, 2004. [7] Yeh G.H. and Lee G.C., Toral fragile watermarking for localizing and recovering tampered image, in IEEE Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong, Dec 2005, pp. 321-324. [8] Wu, Y.T. and Shih, F.Y. Digital watermarking based on chaotic map and reference register, Pattern Recognition, vol.40, no. 12, pp. 3753-3763, Dec 2007. [9] Fotopoulos V. and Skodras A., Transform domain watermarking: adaptive selection of the watermark s position and length,in Proc. Visual Communications and Image Processing (VCIP2003), Lugano, Switzerland, 8-11 July 2003. [10] Gilani S.A.M., Kostopoulos I. and Skodras A., Color image-adaptive watermarking, in Proc. 14th Int. Conf. on Digital Signal Processing (DSP2002), Vol. 2, pp. 721-724, Santorini, Greece, 1-3 July 2002. [11] Fotopoulos V. and Skodras A., Improved watermark detection based on similarity diagrams, in Signal Processing: Image Communication, Vol. 17, pp. 337-345, 2002.