Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A robust watermarking scheme based on maximum wavelet coefficient modification and optimal threshold technique

Published: 01 January 2015 Publication History

Abstract

Digital watermarking has received extensive attention as a new method for copyright protection. This paper proposes a robust watermarking algorithm based on maximum wavelet coefficient modification and optimal threshold technique. The medium wavelet coefficients are randomly permutated according to a secret key and divided into subgroups. We modify the maximum wavelet in each subgroup according to the embedded watermark bits, which can effectively resist attacks. During the extraction process, an optimal threshold value calculated by iterative computation is used to extract the watermark from the watermarked image under different attacks, without using the original image or watermark. Numerous experiments are conducted to evaluate the watermarking performance. Experimental results demonstrate the superiority of our scheme on robustness against content-preserving operations and incidental distortions such as JPEG compression, Gaussian noise, median filter, resizing, cropping, and sharpening.

References

[1]
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.
[2]
W. Zeng and B. Liu, "Astatistical watermark detection technique without using original images for resolving rightful ownerships of digital images," IEEE Transactions on Image Processing, vol. 8, no. 11, pp. 1534-1548, 1999.
[3]
J.-L. Liu, D.-C. Lou, M.-C. Chang, and H.-K. Tso, "A robust watermarking scheme using self-reference image," Computer Standards & Interfaces, vol. 28, no. 3, pp. 356-367, 2006.
[4]
R. Liu and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121-128, 2002.
[5]
L.-T. Ko, J.-E. Chen, H.-C. Hsin, Y.-S. Shieh, and T.-Y. Sung, "Haar-wavelet-based just noticeable distortion model for transparent watermark," Mathematical Problems in Engineering, vol. 2012, Article ID635738, 14 pages, 2012.
[6]
B.-Z. Li and Y.-P. Shi, "Image watermarking in the linear canonical transform domain," Mathematical Problems in Engineering, vol. 2014, Article ID645059, 9 pages, 2014.
[7]
J. Lu, T. Qu, and H. R. Karimi, "Novel iris biometric watermarking based on singular value decomposition and discrete cosine transform," Mathematical Problems in Engineering, vol. 2014, Article ID926170, 6 pages, 2014.
[8]
M. Kutter, F. Jordan, and F. Bossen, "Digital watermarking of color images using amplitude modulation," Journal of Electronic Imaging, vol. 7, no. 2, pp. 326-332, 1998.
[9]
M. Kutter and S. Winkler, "A vision-based masking model for spread-spectrum image watermarking," IEEE Transactions on Image Processing, vol. 11, no. 1, pp. 16-25, 2002.
[10]
Y.-S. Juang, L.-T. Ko, J.-E. Chen, Y.-S. Shieh, T.-Y. Sung, and H. C. Hsin, "Histogram modification and wavelet transform for high performance watermarking," Mathematical Problems in Engineering, vol. 2012, Article ID 164869, 14 pages, 2012.
[11]
M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "A DCT-domain system for robust image watermarking," Signal Processing, vol. 66, no. 3, pp. 357-372, 1998.
[12]
D. Kundur and D. Hatzinakos, "A robust digital image watermarking method using wavelet-based fusion," in Proceedings of the International Conference on Image Processing, vol. 3, pp. 544- 547, 1997.
[13]
M. Rabbani and R. Joshi, "An overview of the JPEG 2000 still image compression standard," Signal Processing: Image Communication, vol. 17, no. 1, pp. 3-48, 2002.
[14]
S.-H. Wang and Y.-P. Lin, "Wavelet tree quantization for copyright protection watermarking," IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 154-165, 2004.
[15]
B. K. Lien and W. H. Lin, "A watermarking method based on maximum distance wavelet tree quantization," in Proceedings of the 19th Conference on Computer Vision, Graphics and Image Processing, 2006.
[16]
G.-D. Wu and P.-H. Huang, "Image watermarking using structure based wavelet tree quantization," in Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS '07), pp. 315-319, IEEE, July 2007.
[17]
M.-J. Tsai and C.-L. Lin, "Constrained wavelet tree quantization for image watermarking," in Proceedings of the IEEE International Conference on Communications (ICC'07), pp. 1350-1354, IEEE, June 2007.
[18]
M.-J. Tsai, C.-T. Lin, and J. Liu, "A wavelet-based watermarking scheme using double wavelet tree energy modulation," in Proceedings of the 15th IEEE International Conference on Image Processing (ICIP'08), pp. 417-420, IEEE, San Diego, Calif, USA, October 2008.
[19]
W.-H. Lin, Y.-R. Wang, and S.-J. Horng, "A wavelet-tree-based watermarking method using distance vector of binary cluster," Expert Systems with Applications, vol. 36, no. 6, pp. 9869-9878, 2009.
[20]
R. Shijie and S. Xin, "A wavelet-tree-based watermarking method using fast ICA," in Proceedings of the 2nd International Symposium on Computational Intelligence and Design (ISCID '09), vol. 2, pp. 162-164, IEEE, Changsha, China, December 2009.
[21]
M. J. Tsai, "Security enhancement by adopting the chaotic system for wavelet tree based digital image watermarking," in Proceedings of the 16th IEEE International Conference on Image Processing (ICIP'09), pp. 3661-3664, IEEE, November 2009.
[22]
R.-S. Run, S.-J. Horng, W.-H. Lin, T.-W. Kao, P. Fan, and M. K. Khan, "An efficient wavelet-tree-based watermarking method," Expert Systems with Applications, vol. 38, no. 12, pp. 14357- 14366, 2011.
[23]
F. Davoine, "Comparison of two wavelet based image watermarking schemes," in Proceedings of the International Conference on Image Processing (ICIP'00), vol. 3, pp. 682-685, IEEE, Vancouver, Canada, September 2000.
[24]
G. Zhang, S. Wang, and Q. Wen, "An adaptive block-based blind watermarking algorithm," in Proceedings of the 7th International Conference on Signal Processing (ICSP'04), pp. 2294-2297, IEEE, August 2004.
[25]
F. Khelifi, A. Bouridane, F. Kurugollu, and A. I. Thompson, "An improved wavelet-based image watermarking technique," in Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance (AVSS'05), pp. 588-592, IEEE, Como, Italy, 2005.
[26]
W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, and Y. Pan, "An efficient watermarking method based on significant difference of wavelet coefficient quantization," IEEE Transactions on Multimedia, vol. 10, no. 5, pp. 746-757, 2008.
[27]
W.-H. Lin, Y.-R. Wang, S.-J. Horng, T.-W. Kao, and Y. Pan, "A blind watermarking method using maximum wavelet coefficient quantization," Expert Systems with Applications, vol. 36, no. 9, pp. 11509-11516, 2009.
[28]
Y.-R. Wang, W.-H. Lin, and L. Yang, "An intelligent watermarking method based on particle swarm optimization," Expert Systems with Applications, vol. 38, no. 7, pp. 8024-8029, 2011.
[29]
V. S. Verma and R. K. Jha, "Improved watermarking technique based on significant difference of lifting wavelet coefficients," Signal, Image and Video Processing, 2014.
[30]
H.-H. Tsai, Y.-J. Jhuang, and Y.-S. Lai, "An SVD-based image watermarking in wavelet domain using SVR and PSO," Applied Soft Computing, vol. 12, no. 8, pp. 2442-2453, 2012.
[31]
M. J. Sahraee and S. Ghofrani, "A robust blind watermarking method using quantization of distance between wavelet coefficients," Signal, Image and Video Processing, vol. 7, no. 4, pp. 799- 807, 2013.
[32]
B. Ma, Y. Wang, C. Li, Z. Zhang, and D. Huang, "A robust watermarking scheme based on dual quantization of wavelet significant difference," in Proceedings of the Pacific-Rim Conference on Multimedia (PCM'12), 2012.
[33]
P. Meerwald, C. Koidl, and A. Uhl, "Attack on watermarking method based on significant difference of wavelet coefficient quantization," IEEE Transactions on Multimedia, vol. 11, no. 5, pp. 1037-1041, 2009.
[34]
J. Zhang, L. Tian, and H.-M. Tai, "A new watermarking method based on chaotic maps," in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME'04), vol. 2, pp. 939- 942, IEEE, Taipei, Taiwan, June 2004.
[35]
B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
[36]
The USI-SIPI image database, volume 3, http://sipi.usc.edu/database/.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Electrical and Computer Engineering
Journal of Electrical and Computer Engineering  Volume 2015, Issue
January 2015
658 pages
ISSN:2090-0147
EISSN:2090-0155
Issue’s Table of Contents

Publisher

Hindawi Limited

London, United Kingdom

Publication History

Accepted: 16 July 2015
Revised: 12 June 2015
Received: 15 April 2015
Published: 01 January 2015

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 52
    Total Downloads
  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)7
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media