We obtained positive results as the watermarks
were invisible, they didn’t affect the images’ qual-
ity and they were extractable despite the JPEG com-
pression. In addition, the experimental results show
an improvement in comparison to the previously ob-
tained results and they also depict the validity of our
proposed codec algorithms.
It is worth noting that the proposed algorithms are
robust against cropping or rotation attacks since the
watermarks are in SiP form, meaning that they deter-
mine the embedding positions in specific image ar-
eas, and thus if a part is being cropped or the image
is rotated, SiP’s symmetry property may allow us to
reconstruct the watermark. Furthermore, our codec
algorithms can also be modified in the future to get ro-
bust against scaling attacks. That can be achieved by
selecting multiple widths concerning the ellipsoidal
annuli depending on the size of the input image.
Finally, we should point out that the study of our
quality function f remains an open problem; indeed,
f could incorporate learning algorithms (Russell and
Norvig, 2010) so that to be able to return the c
opt
ac-
curately and in a very short computational time.
REFERENCES
Chroni, M. and Nikolopoulos, S. (2010). Encoding water-
mark integers as self-inverting permutations. In Proc.
Int’l Conference on Computer Systems and Tech-
nologies (CompSysTech’10), volume ACM ICPS 471,
pages 125 – 130.
Chroni, M. and Nikolopoulos, S. (2011). An efficient graph
codec system for software watermarking. In IEEE
Proc. 36th Int’l Conference on Computers, Software,
and Applications (STPSA’12), pages 595 – 600.
Chun-Shien, L., Shih-Kun, H., Chwen-Jye, S., and Hong-
Yuan, M. L. (2000). Cocktail watermarking for digital
image protection. IEEE Transactions on Multimedia,
2(4):209 – 224.
Collberg, C. and Nagra, J. (2010). Surreptitious Software.
Addison-Wesley.
Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1996). A
secure, robust watermark for multimedia. In Proc. 1st
Int’l Workshop on Information Hiding, volume LNCS
1174, pages 317 – 333.
Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J.,
and Kalker, T. (2008). Digital Watermarking and
Steganography. Morgan Kaufmann, 2nd edition.
Davis, J. C. (1997). Intellectual property in cyberspace -
what technological / legislative tools are necessary for
building a sturdy global information infrastructure? In
IEEE Proc. Int’l Symposium on Technology and Soci-
ety, pages 66 – 74.
Garfinkel, S. (2001). Web Security, Privacy and Commerce.
O’Reilly, 2nd edition.
Golumbic, M. (1980). Algorithmic Graph Theory and Per-
fect Graphs. Academic Press, Inc., New York.
Gonzalez, R. C. and Woods, R. E. (2007). Digital Image
Processing. Prentice-Hall, 3rd edition.
Gonzalez, R. C., Woods, R. E., and Eddins, S. L. (2003).
Digital Image Processing using Matlab. Prentice-
Hall.
Grover, D. (1997). The Protection of Computer Software -
Its Technology and Applications. Cambridge Univer-
sity Press, New York.
Hore, A. and Ziou, D. (2010). Image quality metrics: Psnr
vs. ssim. Proc. 20th International conference on pat-
tern recognition, pages 2366 – 2369.
Kaur, M., Jindal, S., and Behal, S. (2012). A study of digi-
tal image watermarking. Journal of Research in Engi-
neering and Applied Sciences, 2:126 – 136.
Licks, V. and Hordan, R. (2000). On digital image wa-
termarking robust to geometric transformations. In
IEEE Proc. Int’l Conference on Image Processing,
volume 3, pages 690 – 693.
O’Ruanaidh, J. J. K., Dowling, W. J., and Boland, F. M.
(1996). Watermarking digital images for copyright
protection. Vision, Image and Signal Processing, IEE
Proceedings, 143(4):250 – 256.
Petitcolas, F. (2012). Image Database for Wa-
termarking. Retrieved September, 2012, from
http://www.petitcolas.net/fabien/watermarking/.
Russell, S. and Norvig, P. (2010). Artificial Intelligence: A
Modern Approach. Prentice-Hall, 3rd edition.
Sedgewick, R. and Flajolet, P. (1996). An Introduction to
the Analysis of Algorithms. Addison-Wesley.
Solachidis, V. and Pitas, I. (2001). Circularly symmetric
watermark embedding in 2-d dft domain. IEEE Trans-
actions on Image Processing, 10(11):1741 – 1753.
Wang, Z., Bovic, A., Sheikh, H., and Simoncelli, E. (2004).
Image quaity assessment: from error visibility to
structural similarity. IEEE Transactions on Image
Processing, 13(4):600 – 612.
Zain, J. M. (2011). Strict authentication watermark-
ing with jpeg compression (saw-jpeg) for medical
images. European Journal of Scientific Research,
abs/1101.5188:250 – 256.
WEBIST2013-9thInternationalConferenceonWebInformationSystemsandTechnologies
54