els may slightly change, and we want our watermark
to be robust. We also believe that this technique de-
spite being simple, it is efficient because the bright-
ness of each of the n
∗
marked central pixels does
not have a great difference from the brightness of the
12 neighborhood pixels and thus the modified central
pixel, along with the cross pixels, does not change
something significantly in the image.
Rotation. The watermarked images produced by our
embedding method have a property worth to be ref-
erenced. And this is certain characteristics noticed
at the 2DM representation of the image’s watermarks
which in our system are self-inverting permutations.
Sometimes an image might show an indeterminate de-
piction, such as a night sky or an aerial view. These
types of images might be rotated changing the coor-
dinates of the watermark’s marks making invalid the
watermark that we are about to extract. Also it is
about an indeterminate depiction which does not al-
low someone to tell which is the right angle of the
image.
Thanks to our embedding method’s properties this
problem can be overcome. It has to do with the co-
ordinates of the marks of a 2DM representation of a
self-inverting permutation found on image I
w
. Those
coordinates allow us to turn the image into the initial
angle and then extract the watermark successfully.
The 2DM representation of a self-inverting per-
mutation has the following properties:
(i) The main diagonal of the n
∗
× n
∗
symmetric ma-
trix A
∗
have always one and only one marked cell,
and
(ii) this marked cell are always in the entries (i,i) of
A
∗
, where i = ⌈
n
∗
2
⌉ + 1,⌈
n
∗
2
⌉ + 2,...,n
∗
.
If the main diagonal of matrix A
∗
has no marked
cell then we rotate the image by 90 degrees. Addition-
ally, if the marked cell of the main diagonal is in entry
(i,i) with i ≤ ⌈
n
∗
2
⌉, then we turn the image by 180 de-
grees and thus we end up at the initial image from
which we are able to extract the right watermark.
Time and Space Complexity. The total time perfor-
mance of our codec system, neglecting the conver-
sion of the input image I into raw raster format, is
N × n
∗
for embedding the watermark w into I and
N + M + (n
∗
× n
∗
) × log(n
∗
× n
∗
) for extracting w
from the watermarked image I
w
. Moreover, the extra
space needed by our codec system is linear in the size
of the input image, i.e., it uses only some extra aux-
iliary variables and an auxiliary matrix for the 2DM
representation of the self-inverting permutation.
5 CONCLUDING REMARKS
In this paper, we proposed a codec system, which we
named WaterIMAGE, for watermarking images that
are intended for online publication.
The proposed WaterIMAGE system has the fol-
lowing design and functional advantages:
• it is an efficient image watermarking system; the
experimental results showed that the watermark w
is “well hidden” in the image I
w
,
• its embeddingmethod incorporates properties that
allow us to successfully extract the watermark w
for the image I
w
even if the image I
w
has been
compressed with a lossy method and/or rotated,
• it is a simple and easily implemented system, and
• finally, as far as the time and space needed for the
encoding/decodingprocess, it performs very well.
We should point out that the main feature of our Wa-
terIMAGE system is the fact that it uses a combina-
torial object to watermark an image; we show that
an integer can be efficiently represented by a self-
inverting permutation which, in turn, can be repre-
sented in the 2-dimensional space and, thus, this rep-
resentation forms a suitable watermarking object for
images. In our system we propose a marking method
but apart from that the investigation of alternative and
more efficient methods for marking an image using a
2D representation of a permutation are an open prob-
lem for further research.
REFERENCES
Chroni, M. and Nikolopoulos, S. (2010). Encoding water-
mark integers as self-inverting permutations. In Proc.
Int'l Conference on Computer Systems and Tech-
nologies (CompSysTech'10), volume ACM ICPS 471,
pages 125 – 130.
Collberg, C. and Nagra, J. (2010). Surreptitious Software.
Addison-Wesley.
Cormen, T., Leiserson, C., Rivest, R., and Stein, C. (2001).
Introduction to Algorithms. MIT Press, 2nd edition.
Garfinkel, S. (2001). Web Security, Privacy and Commerce.
O’Reilly, 2nd edition.
Golumbic, M. (1980). Algorithmic Graph Theory and Per-
fect Graphs. Academic Press, Inc., New York.
Gonzalez, R. C., Woods, R. E., and Eddins, S. L. (2003).
Digital Image Processing using Matlab. Prentice-
Hall.
Sedgewick, R. and Flajolet, P. (1996). An Introduction to
the Analysis of Algorithms. Addison-Wesley.
WATERMARKINGIMAGESUSING2DREPRESENTATIONSOFSELF-INVERTINGPERMUTATIONS
385