Academia.eduAcademia.edu

Outline

Novel robust image watermarking based on subsampling and DWT

2012, Multimedia Tools and Applications

https://doi.org/10.1007/S11042-011-0794-1

Abstract

This paper presents a robust digital image watermarking scheme based on subsampling and DWT. Subsampling is firstly used to construct a subimage sequence as a video segment. Then, a random watermark sequence satisfied with Gaussian distribution is block-wised embedded into the DWT domain of these subimages repeatedly using the video watermarking technique. And watermark is detected through computing correlation between watermark and watermarked frames. The experiment results demonstrate that the proposed scheme achieves good robustness against JPEG compression, common image processing operation and geometric distortions. Furthermore, the proposed watermarking scheme is also robust against linear collusion and other video watermarking attacks.

References (31)

  1. Cox IJ, Killian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673-1687
  2. Doërr G, Dugelay JL (2003) A guide tour of video watermarking. Signal Process: Image Com- mun 18(4):263-282
  3. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259-1284
  4. Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern C Appl Rev 40(3):278-286
  5. Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283-301
  6. Inoue H, Miyazaki A, Yamamoto A, Katsura T (1998) Digital watermark based on the wavelet transform and its robustness on image compression. In: Proc. IEEE int. conf. image processing, vol 2, pp 391-395
  7. Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singu- lar value decomposition. IEEE Trans Instrum Meas 59(11):3060-3063
  8. Lin WH, Horng SJ (2006) A watermarking method based on maximum distance wavelet tree quantization. In: 19th conf. computer vision, graphics and image processing, pp 269-276
  9. Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746-757
  10. Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869-9878
  11. Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509-11516
  12. Liu W, Dong L, Zeng W (2007) Optimum detection for spread-spectrum watermarking that employs self-masking. IEEE Trans. Inf Forensics Secur 2(4):645-654
  13. Liu Q, Sung AH, Qiao M (2009) Improved detection and evaluation for JPEG steganalysis. In: Proc. 17 ACM int. conf. multimedia, pp 873-876
  14. Liua Q, Sung AH, Qiao M, Chen Z, Ribeiro B (2010) An improved approach to steganalysis of jpeg images. Inf Sci 180(9):1643-1655
  15. Lu W, Lu H (2008) Robust watermarking based on subsampling and nonnegative matrix factor- ization. Informatica 19(4):555-566
  16. Lu W, Sun W, Lu H (2009) Robust watermarking based on dwt and nonnegative matrix factor- ization. Comput Electr Eng 35:183-188
  17. Lu W, Lu H, Chung FL (2010) Feature based robust watermarking using image normalization. Comput Electr Eng 36(1):2-18
  18. Mallat S (1999) A wavelet tour of signal processing (Wavelet analysis & its applications), 2nd edn. Academic, New York
  19. Malvar HS, Florencio DAF (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans Signal Process 51(4):898-905
  20. O'Ruanaidh J, Pun T (1998) Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process 66(3):303-317
  21. O'Ruanaidh JJK, Dowling WJ, Boland FM (1996) Phase watermarking of digital image. In: Proc. IEEE int. conf. image processing, vol 3, pp 239-242
  22. Pereira S, Pun T (1999) Fast robust template matching for affine resistant image watermarking. In: Int. workshop on information hiding, LNCS, vol 1768. Springer, New York, pp 200-210
  23. Schyndel RGV, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proc. of ICIP'94, vol 2, pp 86-90
  24. Solachidis V, Pitas I (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741-1753
  25. Su K, Kundur D, Hatzinakos D (2005) Statistical invisibility for collusion-resistant digital video watermarking. IEEE Trans Multimedia 7(1):43-51
  26. Swanson MD, Zhu B, Tewfik AH (1998) Multiresolution scene-based video watermarking using perceptual models. IEEE J Sel Areas Commun 16(4):540-550
  27. Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154-165
  28. Zheng D, Wang S, Zhao J (2009) Rst invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. IEEE Trans Image Process 18(5):1055- 1068
  29. Zheng D, Zhao J, Saddik AE (2003) RST-invariant digital image watermarking based on log- polar mapping and phase correlation. IEEE Trans Circuits Syst Video Technol 13(8):753-765
  30. Wei Lu received his Ph.D. degree in computer science from Shanghai Jiao Tong University, China in 2007. He joined the School of Information Science and Technology, Sun Yat-sen University, China in 2007. His current research interests include information forensics and security, digital watermarking, multimedia signal processing.
  31. Wei Sun received his Ph.D. in Computer Science from Sun Yat-sen University in 2004. He is currently a professor with the School of Software, Sun Yat-sen University, China. His current research interests include information security, digital watermarking and computer graphics.