A Novel Technique for Copyright Protection of Images Using Hybrid Encryption Model

Full Text (PDF, 615KB), PP.10-17

Views: 0 Downloads: 0


Swarnendu Mukherjee 1,* Debashis Ganguly 2 Partha Mukherjee 3 Prasenjit Mitra 3

1. Cognizant Technology Solution, India

2. Infosys Technology Limited, India

3. Penn State University, USA

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2012.05.02

Received: 14 Dec. 2011 / Revised: 15 Jan. 2012 / Accepted: 25 Mar. 2012 / Published: 8 May 2012

Index Terms

Authentication, content protection, cryptography, ownership identification. watermarking


In this paper, we present a robust and novel strategic invisible watermarking scheme which can be used in the field of copyright protection. The novelty of our algorithm lies in the creation of a compound watermark image using the target image and the key image, where both of them are self encrypted. The self encryption concept adds an extra level of data security along with the security supported by the watermarking technique. Again, our method results a single invisible watermarked image which will be sent to the recipient and from that image, both the key and the target image can be extracted with no distortion using only the proposed extraction algorithm. Results of exhaustive experimentation using standard input color images demonstrate the robustness and efficiency of our approach.

Cite This Paper

Swarnendu Mukherjee, Debashis Ganguly, Partha Mukherjee, Prasenjit Mitra, "A Novel Technique for Copyright Protection of Images Using Hybrid Encryption Model", International Journal of Modern Education and Computer Science (IJMECS), vol.4, no.5, pp.10-17, 2012. DOI:10.5815/ijmecs.2012.05.02


[1]M.M. Yeung, et al., "Digital Watermarking for High- Quality Imaging", In Proc. of IEEE First Workshop on Multimedia Signal Processing, Jun. 1997, Princeton, Page(s): 357-362.
[2]A. M. Eskicioglu and E. J. Delp. "An Overview of Multimedia Content Protection in Consumer Electronics Devices", Elsevier Signal Processing: Image Communication, Vol. 16, Jan. 2001, Page(s): 681– 699.
[3]Z. Q. Huang and Z. Jiang, "Image Ownership Verification via Private Pattern and Watermarking Wavelet Filters", In Proc. of VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot H., Ourselin S. and Adriaansen T. (Eds.), 10-12 Dec. 2003, Sydney, Page(s): 801 - 810.
[4]Anthony T.S. Ho, J. Shen, S.H. Tan and A.C. Kot, "Digital Image-in-Image Watermarking For Copyright Protection Of Satellite Images Using the Fast Hadamard Transform", In Proc. of IEEE International Geoscience and Remote Sensing Symposium, Vol. 6, 2002, Page(s): 3311– 3313.
[5]Shih-Hao Wang and Yuan-Pei Lin, "Wavelet Tree Quantization for Copyright Protection Watermarking", IEEE Transactions On Image Processing, Vol. 13, No. 2, February 2004, Page(s): 154– 165.
[6]R.J. Hwang, "A Digital Image Copyright Protection Scheme Based on Visual Cryptography", Tamkang Journal of Science and Engineering, Vol. 3, No. 2, 2000, Page(s): 97– 106.
[7]I.J.Cox, J. Kilian, T. Shamoon, and T. Leighton, "Secure Spread Spectrum Watermarking of Images, Audio and Video", In Proc. of IEEE International Conf on Image Processing, Vol. 3, Sep. 1996, Switzerland, Page(s): 243–246.
[8]C.-S. Lu, H.-Y. M. Liao, S.-K. Huang, and C.-J. Sze, "Cocktail watermarking on images", In Proc. of 3rd International Workshop on Information Hiding, Sep. 1999, Germany, Page(s): 333– 347.
[9]Z.-M. Lu, D.-G. Xu, and S.-H. Sun, "Multipurpose image watermarking algorithm based on multistage vector quantization", IEEE Transactions on Image Processing, Vol. 14, Issue 6, Jun. 2005, Page(s): 822– 831.
[10]C.-S. Lu, H.-Y. M. Liao, "Multipurpose Watermarking for Image Authentication and Protection", IEEE Transactions on Image Processing, Vol. 10, No. 10, Oct. 2001, Page(s): 1579– 1592.
[11]Yongjian Hu and Byeungwoo Jeon, "Reversible Visible Watermarking and Lossless Recovery of Original Images", IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, Issue 11, 2006, Page(s): 1423– 1429.
[12]Jengnan Tzeng, Wen-Liang Hwang, and I-Liang Chern, "An Asymmetric Subspace Watermarking Method for Copyright Protection", IEEE Transactions on Signal Processing, Vol. 53, No. 2, Feb. 2005, Page(s): 784– 792.
[13]Ming-Chiang Hu, Der-Chyuan Lou and Ming-Chang Chang, "Dual-wrapped digital watermarking scheme for image copyright protection," Computers & Security, Vol. 26, No. 4, 2007, Page(s): 319– 330.
[14]Shang-Lin Hsieh, I-Ju Tsai, Bin-Yuan Huang and Jh-Jie Jian, "Protecting Copyrights of Color Images using a Watermarking Scheme Based on Secret Sharing and Wavelet Transform", Journal Of Multimedia, Vol. 3, No. 4, Oct. 2008, Page(s): 42– 49.
[15]Kutter, M. and Petitcolas, F. A. P. , "A fair benchmark for image watermarking systems", In Proceedings of SPIE security and Watermarking of Multimedia Contents, Vol. 3657. Page(s): 226–239.