Novel robust image watermarking based on subsampling and DWT
2012, Multimedia Tools and Applications
https://doi.org/10.1007/S11042-011-0794-1Abstract
This paper presents a robust digital image watermarking scheme based on subsampling and DWT. Subsampling is firstly used to construct a subimage sequence as a video segment. Then, a random watermark sequence satisfied with Gaussian distribution is block-wised embedded into the DWT domain of these subimages repeatedly using the video watermarking technique. And watermark is detected through computing correlation between watermark and watermarked frames. The experiment results demonstrate that the proposed scheme achieves good robustness against JPEG compression, common image processing operation and geometric distortions. Furthermore, the proposed watermarking scheme is also robust against linear collusion and other video watermarking attacks.
References (31)
- Cox IJ, Killian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673-1687
- Doërr G, Dugelay JL (2003) A guide tour of video watermarking. Signal Process: Image Com- mun 18(4):263-282
- Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259-1284
- Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern C Appl Rev 40(3):278-286
- Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283-301
- Inoue H, Miyazaki A, Yamamoto A, Katsura T (1998) Digital watermark based on the wavelet transform and its robustness on image compression. In: Proc. IEEE int. conf. image processing, vol 2, pp 391-395
- Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singu- lar value decomposition. IEEE Trans Instrum Meas 59(11):3060-3063
- Lin WH, Horng SJ (2006) A watermarking method based on maximum distance wavelet tree quantization. In: 19th conf. computer vision, graphics and image processing, pp 269-276
- Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746-757
- Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869-9878
- Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509-11516
- Liu W, Dong L, Zeng W (2007) Optimum detection for spread-spectrum watermarking that employs self-masking. IEEE Trans. Inf Forensics Secur 2(4):645-654
- Liu Q, Sung AH, Qiao M (2009) Improved detection and evaluation for JPEG steganalysis. In: Proc. 17 ACM int. conf. multimedia, pp 873-876
- Liua Q, Sung AH, Qiao M, Chen Z, Ribeiro B (2010) An improved approach to steganalysis of jpeg images. Inf Sci 180(9):1643-1655
- Lu W, Lu H (2008) Robust watermarking based on subsampling and nonnegative matrix factor- ization. Informatica 19(4):555-566
- Lu W, Sun W, Lu H (2009) Robust watermarking based on dwt and nonnegative matrix factor- ization. Comput Electr Eng 35:183-188
- Lu W, Lu H, Chung FL (2010) Feature based robust watermarking using image normalization. Comput Electr Eng 36(1):2-18
- Mallat S (1999) A wavelet tour of signal processing (Wavelet analysis & its applications), 2nd edn. Academic, New York
- Malvar HS, Florencio DAF (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans Signal Process 51(4):898-905
- O'Ruanaidh J, Pun T (1998) Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process 66(3):303-317
- O'Ruanaidh JJK, Dowling WJ, Boland FM (1996) Phase watermarking of digital image. In: Proc. IEEE int. conf. image processing, vol 3, pp 239-242
- Pereira S, Pun T (1999) Fast robust template matching for affine resistant image watermarking. In: Int. workshop on information hiding, LNCS, vol 1768. Springer, New York, pp 200-210
- Schyndel RGV, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proc. of ICIP'94, vol 2, pp 86-90
- Solachidis V, Pitas I (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741-1753
- Su K, Kundur D, Hatzinakos D (2005) Statistical invisibility for collusion-resistant digital video watermarking. IEEE Trans Multimedia 7(1):43-51
- Swanson MD, Zhu B, Tewfik AH (1998) Multiresolution scene-based video watermarking using perceptual models. IEEE J Sel Areas Commun 16(4):540-550
- Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154-165
- Zheng D, Wang S, Zhao J (2009) Rst invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. IEEE Trans Image Process 18(5):1055- 1068
- Zheng D, Zhao J, Saddik AE (2003) RST-invariant digital image watermarking based on log- polar mapping and phase correlation. IEEE Trans Circuits Syst Video Technol 13(8):753-765
- Wei Lu received his Ph.D. degree in computer science from Shanghai Jiao Tong University, China in 2007. He joined the School of Information Science and Technology, Sun Yat-sen University, China in 2007. His current research interests include information forensics and security, digital watermarking, multimedia signal processing.
- Wei Sun received his Ph.D. in Computer Science from Sun Yat-sen University in 2004. He is currently a professor with the School of Software, Sun Yat-sen University, China. His current research interests include information security, digital watermarking and computer graphics.