Moment-Based Image Watermarking Principles, Perspectives, and Challenges

Moment-Based Image Watermarking Principles, Perspectives, and Challenges

E.D. Tsougenis (Democritus University of Thrace, Greece), G.A. Papakostas (Eastern Macedonia and Thrace Institute of Technology (EMaTTech), Greece) and D.E. Koulouriotis (Democritus University of Thrace, Greece)
Copyright: © 2015 |Pages: 10
DOI: 10.4018/978-1-4666-5888-2.ch709
OnDemand PDF Download:
$30.00
List Price: $37.50

Chapter Preview

Top

Introduction

The unprecedented raise of the digital media distribution caused by the wide use of mobile devices and cyber space generates numerous concerns strongly connected with media security and copyright protection. The authenticity of all kinds of media such as image, video, sound or text remains a hot topic of rising interest. Researchers are highly motivated especially by the daily untrusted exchange/sharing of huge number of images lacking of protection and try to bring forth solutions that partially cover specific needs. During the last decade, the progress in image security area is increasing by the significant discovery of the watermarking process. Watermarking aims to ensure the integrity, authority and authenticity of images by incorporating information for further identification. According to Hartung & Kutter (1999) a watermark is a non-removable digital code, robustly and imperceptibly embedded in the original (host) data, which contains information about the origin, status, and/or destination of the data.

The present article focuses on image watermarking that tries to adopt and takes advantage of the transform domain coefficients’ properties, regarding to a successful image protection and authentication. The major question that rises through this area is why a watermarking method should use the transform domain coefficients to “seal” their significant information within the media. The basic reason is that the specific domain manages to better capture the characteristics of the Human Visual System (HVS) (Moon et al., 2007) leading to high visual quality watermarked images. Specifically, the low order coefficients describe the coarse part of the content in contrast with the higher order that describe the image details. As a matter of fact, middle order coefficients constitute a safe solution (Ahmidi & Safabakhsh, 2004) for information embedding reducing the risk of original content’s manipulation.

The selection of the proper coefficients is strongly connected with the basic requirements of a successful image watermarking. An advanced ideal image watermarking method should satisfy all four basic requirements of robustness, imperceptibility, capacity and complexity. As a matter of fact, a simple implemented/fast (low complexity) watermarking method should incorporate the maximum allowed amount of information (high capacity) to the host image according to the perceptual redundancy (high imperceptibility) surviving also any geometric or signal processing attacking condition (high robustness). As illustrated in Figure 1, an interrelationship within the pre-mentioned requirements exist in watermarking algorithms i.e. a simple raise of the embedded information (capacity) may lead to degradation of the image quality (imperceptibility) or method’s defense against malicious tasks (robustness). The specific representative example partially describes the traditional tradeoff existing in image watermarking community where uncontrollable manipulations regarding to one requirement’s enhancement possibly leads to an alongside degradation of another one. Therefore, a fair solution to this conflict lies between the alongside satisfaction of the basic requirements (Figure 1) and since now is considered as a quite challenging task. Nevertheless, a high qualified domain proved during the last decades (Tsougenis et al., 2012), named as “image moments” may alongside satisfy all requirements and constitute the future trend in image security.

Figure 1.

A tradeoff between basic watermarking requirements

The present article manages to strictly examine the moment-based watermarking prospects by different perspectives including performance, open issues and latest trends/applications. The article is organized as follows: Section 2 presents the background of the most traditional and recently introduced moment families. In Section 3, a number of significant moment-based image watermarking methods are briefly discussed. During Section 4, a typical moment-based method is analyzed through its basic steps. In Section 5 the open issues in moment-based watermarking topic are presented. Finally, conclusions and proposals for future work are discussed in Section 6.

Key Terms in this Chapter

Dither Modulation: A special form of quantization index modulation applied in image watermarking to assign one bit to one transform coefficient.

Imperceptibility: The ability of the watermarking process to hide the watermark information without alter optically the host image.

Robustness: The ability of the watermarking process to secure its carrying information under attacking conditions.

Image Watermarking: A method that hides a maximum allowed amount of useful information (high capacity) into an image in a simple implemented/fast (low complexity) way, without affecting the quality of the resulted image (high imperceptibility) and surviving also any geometric or signal processing attacking condition (high robustness).

Image Moments: Region-based descriptors that correspond to the projection of an image onto a specific orthogonal polynomial base.

Adaptivity: The adoption of the functional watermarking parameters that control the performance of the technique with respect to the basic requirements.

Capacity: The amount of information a host image can carry without being suspected.

Complexity: The ability of the watermarking process to embed fast / simply the watermark information.

Complete Chapter List

Search this Book:
Reset