Hostname: page-component-78c5997874-ndw9j Total loading time: 0 Render date: 2024-11-10T20:16:45.368Z Has data issue: false hasContentIssue false

Wavelet and discrete cosine transforms for inserting information into BMP images

Published online by Cambridge University Press:  17 February 2009

I. Orea-Flores
Affiliation:
Unidad Profesional Interdisciplinaria en Ingeniería y Tecnologas Avanzadas, Instituto Politécnico Nacional, Av. IPN 2580, La Laguna Ticomán, 07340 México D.F.; e-mail: iorea@ipn.mx.
M. A. Acevedo
Affiliation:
Sexyón de Estudios de Posgrado e Investigatión Escuela Superior de Ingeniería Mecánica y Eléctrica Instituto Politécnico Nacional Edif. Z-4, 3er piso. Col Lindavista, 07738 México D.F.; e-mail: macevedo@ipn.mx, jlopezb@tpn.mx.
J. López-Bonilla
Affiliation:
Sexyón de Estudios de Posgrado e Investigatión Escuela Superior de Ingeniería Mecánica y Eléctrica Instituto Politécnico Nacional Edif. Z-4, 3er piso. Col Lindavista, 07738 México D.F.; e-mail: macevedo@ipn.mx, jlopezb@tpn.mx.
Rights & Permissions [Opens in a new window]

Abstract

Core share and HTML view are not available for this content. However, as you have access to this content, a full PDF is available via the ‘Save PDF’ action button.

In this work we use the Discrete Wavelet Transform in watermarking applications for digital BMP images with the objective is to guarantee some level of security for the copyright. We also compare the results with the Discrete Cosine Transform for the same application. Results are obtained from a number of tests, primarily in order to validate the security level and the robustness of the watermark, but also to prove that the original image suffers only very small variations after the watermark is embedded. We also show how to embed the watermark, where to insert it and the capacity supported for inserting an image.

Type
Research Article
Copyright
Copyright © Australian Mathematical Society 2006

References

[1]Acevedo, M. A., Orea-Flores, I. and López-Bonilla, J., “Wavelets and discrete cosine transform for hidden information into images”, Sampling Theory in Signal and Image Processing (STSIP Journal) 4 (2005) 141150.CrossRefGoogle Scholar
[2]Benedetto, J. J. and Zayed, A. I., Sampling, Wavelets, and Tomography (Birkhäuser, Boston, 2003) 1117.Google Scholar
[3]Kaarna, A. and Toivanen, P., “Digital watermarking of spectral images in PCA/wavelet-transform domain”, IEEE Trans. Image Process. 6 (2003) 220224.Google Scholar
[4]Katzenbeisser, S. and Petitcolas, F. A. P., Information Hiding, Principles of Steganography (Artech House, London, 2000).Google Scholar
[5]Knuth, D., The art of computer programming, Vol. 2, Seminumerical Algorithms, 2nd ed. (Addison–Wesley, Reading, Mass., 1981).Google Scholar
[6]Mitra, S. K. (ed.), Digital signal processing: a computer based approach, 2nd ed. (McGraw-Hill, New York, 2003) 8894.Google Scholar
[7]Orea, I., “Intercambio de información utilizando protocolos de canal subliminal”, Tesis UPIITAIPN, (Mexico DF, 2002).Google Scholar
[8]Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M., Attacks on copyright marking systems (Artech House, London, 1998).Google Scholar
[9]Ruanaidh, J. J. K., Dowling, W. J. and Boland, F. M., “Watermarking digital images for copyright protection”, IEE Proc.-Vis. Image Signal Process. 153 (1996) 250256.CrossRefGoogle Scholar
[10]Schneirer, B., Applied cryptography (John Wiley and Sons, New York, 1994).Google Scholar
[11]Su, J. K., Eggers, J. J. and Girod, B., “Capacity of digital watermarks subjected to an optimal collusion attack”, in X European Signal Processing Conference (EUSIPCO 2000), Tampere, Finlandia, Sept. 2000, http://www.Int.de/~eggers/publications.htmlGoogle Scholar
[12]Vetterli, M. and Kovacevic, J., Wavelets and subband coding (Prentice Hall, Englewood Cliffs, NJ, 1995).Google Scholar
[13]Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J. J. and Su, J. K., “Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks”, IEEE Comm. Mag. 39 (2001) 118127.Google Scholar
[14]Walter, J. S., A primer on wavelets and their scientific applications (Chapman & Hall/CRC, London 1999).Google Scholar