# Watermarking Images in the Frequency Domain by Exploiting Self-inverting Permutations

### Maria Chroni, Angelos Fylakis, Stavros D. Nikolopoulos

#### Abstract

In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image's Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms.

#### References

- Chroni, M. and Nikolopoulos, S. (2010). Encoding watermark integers as self-inverting permutations. In Proc. Int'l Conference on Computer Systems and Technologies (CompSysTech'10), volume ACM ICPS 471, pages 125 - 130.
- Chroni, M. and Nikolopoulos, S. (2011). An efficient graph codec system for software watermarking. In IEEE Proc. 36th Int'l Conference on Computers, Software, and Applications (STPSA'12), pages 595 - 600.
- Chun-Shien, L., Shih-Kun, H., Chwen-Jye, S., and HongYuan, M. L. (2000). Cocktail watermarking for digital image protection. IEEE Transactions on Multimedia, 2(4):209 - 224.
- Collberg, C. and Nagra, J. (2010). Surreptitious Software. Addison-Wesley.
- Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1996). A secure, robust watermark for multimedia. In Proc. 1st Int'l Workshop on Information Hiding, volume LNCS 1174, pages 317 - 333.
- Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography. Morgan Kaufmann, 2nd edition.
- Davis, J. C. (1997). Intellectual property in cyberspace - what technological / legislative tools are necessary for building a sturdy global information infrastructure? In IEEE Proc. Int'l Symposium on Technology and Society, pages 66 - 74.
- Garfinkel, S. (2001). Web Security, Privacy and Commerce. O'Reilly, 2nd edition.
- Golumbic, M. (1980). Algorithmic Graph Theory and Perfect Graphs. Academic Press, Inc., New York.
- Gonzalez, R. C. and Woods, R. E. (2007). Digital Image Processing. Prentice-Hall, 3rd edition.
- Gonzalez, R. C., Woods, R. E., and Eddins, S. L. (2003). Digital Image Processing using Matlab. PrenticeHall.
- Grover, D. (1997). The Protection of Computer Software - Its Technology and Applications. Cambridge University Press, New York.
- Hore, A. and Ziou, D. (2010). Image quality metrics: Psnr vs. ssim. Proc. 20th International conference on pattern recognition, pages 2366 - 2369.
- Kaur, M., Jindal, S., and Behal, S. (2012). A study of digital image watermarking. Journal of Research in Engineering and Applied Sciences, 2:126 - 136.
- Licks, V. and Hordan, R. (2000). On digital image watermarking robust to geometric transformations. In IEEE Proc. Int'l Conference on Image Processing, volume 3, pages 690 - 693.
- O'Ruanaidh, J. J. K., Dowling, W. J., and Boland, F. M. (1996). Watermarking digital images for copyright protection. Vision, Image and Signal Processing, IEE Proceedings, 143(4):250 - 256.
- Petitcolas, F. (2012). Image Database for Watermarking. Retrieved September, 2012, from http://www.petitcolas.net/fabien/watermarking/.
- Russell, S. and Norvig, P. (2010). Artificial Intelligence: A Modern Approach. Prentice-Hall, 3rd edition.
- Sedgewick, R. and Flajolet, P. (1996). An Introduction to the Analysis of Algorithms. Addison-Wesley.
- Solachidis, V. and Pitas, I. (2001). Circularly symmetric watermark embedding in 2-d dft domain. IEEE Transactions on Image Processing, 10(11):1741 - 1753.
- Wang, Z., Bovic, A., Sheikh, H., and Simoncelli, E. (2004). Image quaity assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4):600 - 612.
- Zain, J. M. (2011). Strict authentication watermarking with jpeg compression (saw-jpeg) for medical images. European Journal of Scientific Research, abs/1101.5188:250 - 256.

#### Paper Citation

#### in Harvard Style

Chroni M., Fylakis A. and Nikolopoulos S. (2013). **Watermarking Images in the Frequency Domain by Exploiting Self-inverting Permutations** . In *Proceedings of the 9th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,* ISBN 978-989-8565-54-9, pages 45-54. DOI: 10.5220/0004371100450054

#### in Bibtex Style

@conference{webist13,

author={Maria Chroni and Angelos Fylakis and Stavros D. Nikolopoulos},

title={Watermarking Images in the Frequency Domain by Exploiting Self-inverting Permutations},

booktitle={Proceedings of the 9th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},

year={2013},

pages={45-54},

publisher={SciTePress},

organization={INSTICC},

doi={10.5220/0004371100450054},

isbn={978-989-8565-54-9},

}

#### in EndNote Style

TY - CONF

JO - Proceedings of the 9th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,

TI - Watermarking Images in the Frequency Domain by Exploiting Self-inverting Permutations

SN - 978-989-8565-54-9

AU - Chroni M.

AU - Fylakis A.

AU - Nikolopoulos S.

PY - 2013

SP - 45

EP - 54

DO - 10.5220/0004371100450054