Click here to Skip to main content
15,868,016 members
Articles / Desktop Programming / MFC

Porcupine

Rate me:
Please Sign up or sign in to vote.
4.78/5 (25 votes)
15 Sep 2009CPOL4 min read 569.5K   15.4K   118   80
A library for visible and invisible image watermarking

Porcupine ScreenShot

Introduction

Porcupine deals with digital image watermarking. You can embed any visible watermark like a text or another image in any position, or store information invisibly inside using a secret key (password).

Digital watermarking is a type of Steganography. In this field, except for the storage capacity of the host, the integrity of the information embedded to the host is very important. It is a technique which allows the dissimulation of information that verifies the owner, in digital sound, video, or image (in this case). The information can be encrypted. It constitutes a group of bits containing information about the creator, the owner, or the signal itself. Digital watermarking aims to validate the host and the undeniable identity of the legal owner. It provides a way for controlling host signals and represents the rightful holder. It also discourages illegal reproduction, and provides a way for safe distribution via the internet.

Some applications of digital watermarking:

  • The protection of intellectual rights, which is the most important application. When an illegal reproduction is detected, the offender should suffer the consequences of the law.
  • The proof of authenticity. The host must carry the digital signature of the creator.
  • The integrity of the host, if it continues to carry the digital signature.
  • The dissuasion of reproduction (copy control), caused by the fear of the probability that the offenders will be perceptible and suffer the consequences of the law.
  • The transmission of information without becoming perceptible from a third person, thanks to the invisible placement inside the host and its likely encrypted form.

Porcupine supports all of the known image formats (BMP, GIF, ICO, TGA, JPEG, PNG, TIFF, JPEG-2000, etc.).

Features

Visible Watermarking

  • Text Watermarking: Embeds a text on the image with the color and position of your choice. Each time, the text color selected and the pixel colors behind the text are checked. If they are the same, the text color changes automatically.
  • Image Watermarking: Embeds an image of your choice. Embedding options are via logical AND, OR, XOR, adding or subtracting, or drawing using the alpha channel.

Image 2

Invisible Watermarking

Spatial Domain

  • LSB manipulation: Hides any file in the Least Significant Bit of pixels chosen by a certain equation. This could be done randomly but that way, there should be a certain threshold on the file size to be watermarked (random numbers can not be given forever). The equation solution solves this issue, and exploits the image dimensions. Furthermore, there are two "LSB watermarking" options with different pixel positions for multiple watermarking. This type of watermark is considered a "fragile watermark". It can be destroyed with the slightest manipulation (so don't save the image as JPEG). The information is protected via XOR scrambling or Blowfish encryption.

Image 3

Example

Watermarked

Attack Results

Attacks

  • Patchwork: This is a statistical method that adds a Gaussian distribution. There is no information stored. The distribution is added randomly, and its existence proves the authenticity of the image.

Image 6

Example

Patchwork example

Attack Results

Attack Results

Frequency Domain

  • DCT Watermarking: Embeds information in the frequency domain. This is done using the 2-D Discrete Cosine Transform. The information is stored in the low-mid frequencies of the image. The storage capacity of this technique is very poor. In most cases, one or two words are enough. To prevent image destruction, the user is required to give the smallest DCT coefficient above which the watermark will be inserted. If a small coefficient, which doesn't contribute to the image creation, is changed, the image will be destroyed. This method is considered a robust watermarking method. Porcupine uses only grayscale images for this technique.

Image 9

Image 10

Example and attack results

DCT example

  • Batch Watermarking: This option allows you to simultaneously put a visible or invisible watermark in a number of images. The "LSB watermark" and "Patchwork" options save the final images in BMP format as it is a format with no compression.

Among others, there is also an FTP upload available for uploading your watermarked images, a text reader, and a PSNR calculator.

Image Library

Basic Image Processing Classes in:

Porcupine Index Theory

CxImage

eikonaDoc.h
eikonaView.h
mass.h

To run the program, you have to download the CxImage Library and do a batch build. Then download the Porcupine source and place the folder inside the CxImage folder, along with the others (bin, CxImage, Debug, demo, etc..). Download the required LIBs and place them inside the Porcupine source folder. Since you want to mess with the source code and have Visual Studio installed, you probably don't need the required DLLs. You're ready to go.

Image 12

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
Software Developer
Greece Greece
Physicist/SW Engineer

Comments and Discussions

 
QuestionRe: Source code runing Pin
Hani_ys13-May-08 7:19
Hani_ys13-May-08 7:19 
AnswerRe: Source code runing Pin
Lampros Giampouras13-May-08 8:24
Lampros Giampouras13-May-08 8:24 
AnswerRe: Source code runing Pin
Hani_ys13-May-08 8:48
Hani_ys13-May-08 8:48 
GeneralRe: Source code runing Pin
Lampros Giampouras14-May-08 0:40
Lampros Giampouras14-May-08 0:40 
QuestionRe: Source code runing Pin
Hani_ys14-May-08 2:34
Hani_ys14-May-08 2:34 
GeneralRun program [modified] Pin
Hani_ys6-May-08 4:15
Hani_ys6-May-08 4:15 
GeneralRe: Run program Pin
Lampros Giampouras8-May-08 0:32
Lampros Giampouras8-May-08 0:32 
QuestionRe: Run program [modified] Pin
Lahmam B.25-Nov-08 4:32
Lahmam B.25-Nov-08 4:32 
General10/10 Pin
sang jin lee27-Feb-08 23:34
sang jin lee27-Feb-08 23:34 
QuestionTransferring an array from C++ library to C# application Pin
Yooval26-Dec-07 5:02
Yooval26-Dec-07 5:02 
AnswerAsk for Guidance Pin
Monalisa Gosumolo26-Dec-07 4:29
sussMonalisa Gosumolo26-Dec-07 4:29 
GeneralRe: Ask for Guidance Pin
Lampros Giampouras4-Jan-08 9:09
Lampros Giampouras4-Jan-08 9:09 
QuestionAsk for guidance Pin
dew26-Dec-07 3:47
dew26-Dec-07 3:47 
GeneralFile Not found Pin
Usm@n15-Dec-07 0:38
Usm@n15-Dec-07 0:38 
GeneralRe: File Not found Pin
Lampros Giampouras23-Dec-07 6:33
Lampros Giampouras23-Dec-07 6:33 
GeneralRe: File Not found Pin
Usm@n23-Dec-07 18:30
Usm@n23-Dec-07 18:30 
QuestionHow ? Pin
dew18-Nov-07 23:12
dew18-Nov-07 23:12 
AnswerRe: How ? Pin
Lampros Giampouras19-Nov-07 4:13
Lampros Giampouras19-Nov-07 4:13 
GeneralRe: How ? Pin
dew19-Nov-07 4:30
dew19-Nov-07 4:30 
GeneralRe: How ? Pin
Lampros Giampouras19-Nov-07 6:03
Lampros Giampouras19-Nov-07 6:03 
GeneralRe: How ? Pin
dew19-Nov-07 6:08
dew19-Nov-07 6:08 
GeneralRe: How ? Pin
dew21-Nov-07 5:26
dew21-Nov-07 5:26 
GeneralRe: How ? Pin
Lampros Giampouras6-Dec-07 14:18
Lampros Giampouras6-Dec-07 14:18 
GeneralRe: How ? Pin
Sarbashish Bhattacharjee8-Dec-08 4:03
Sarbashish Bhattacharjee8-Dec-08 4:03 
GeneralRe: How ? Pin
Roberto_Rwk28-Nov-07 21:01
Roberto_Rwk28-Nov-07 21:01 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.