Highly Robust Digital Image Watermarking Using Steerable Pyramid and Dual Encryption Technique
(*) Corresponding author
DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
Abstract
A highly robust digital Image watermarking using steerable pyramid transform and dual encryption technique is proposed and simulated. In this paper, steerable pyramid transform is chosen as a suitably transform domain due to its impressive properties for image processing applications. These properties are rotation invariance and translation invariance which are very desirable in applications that involve representation of position or orientation of image structure like digital watermarking. The embedding process performs steerable pyramid transform on the host image using three scales and one orientation. A pretreatment is used to encrypt the binary watermark of size 32x32 using a dual encryption function. After the pretreatment process the encrypted watermark is embedded into low-subband steerable pyramid. Experimental evaluation demonstrates that the proposed scheme is highly robust against several attacks such as Salt \& pepper, Speckle noise, Gaussian noise, Average filter, Median filter, Weiner filter, Sharpening, JPEG compression, Resizing, Rotation, and Cropping
Copyright © 2014 Praise Worthy Prize - All rights reserved.
Keywords
Full Text:
PDFReferences
R. van Schyndel, A. Tirkel, C. Osborne, A digital watermark, in: Image Processing, 1994. Proceedings. ICIP-94., IEEE International Conference, Vol. 2, 1994, pp. 86-90 vol.2. doi:10.1109/ICIP.1994.413536.
W.-H. Lin, S.-J. Horng, T.-W. Kao, R.-J. Chen, Y.-H. Chen, C.-L. Lee, T. Terano, Image copyright protection with forward error correction, Expert Systems with Applications 36 (9) (2009) 11888-11894. doi:http://dx.doi.org/10.1016/j.eswa.2009.04.026.
N. Bi, Q. Sun, D. Huang, Z. Yang, J. Huang, Robust image watermarking based on multiband wavelets and empirical mode decomposition, Image Processing, IEEE Transactions on 16 (8) (2007) 1956-1966.
I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, Image Processing, IEEE Transactions on 6 (12) (1997) 1673-1687.
Senhaji, S., Aarab, A., A new and robust image watermarking technique using contourlet-DCT domain and decomposition model, (2013) International Review on Computers and Software (IRECOS), 8 (3), pp. 747-752.
Yizhuo Liu, Kexin Yin, An Image Watermarking Algorithm Based on Linear Congruence and HVS, International Review on Computers and Software, 2012, Vol. 7 n. 7, pp. 3805-3810
C.-T. Hsu, J.-L. Wu, Hidden signatures in images, in: Image Processing, 1996. Proceedings., International Conference on, Vol. 3, IEEE, 1996, pp. 223-226.
C.-W. Tang, H.-M. Hang, A feature-based robust digital image watermarking scheme, Signal Processing, IEEE Transactions on 51 (4) (2003) 950-959.
D. Kundur, D. Hatzinakos, Toward robust logo watermarking using multiresolution image fusion principles, Multimedia, IEEE Transactions on 6 (1) (2004) 185-198. doi:10.1109/TMM.2003.819747.
W. Jianzhen, A rst invariant watermarking scheme utilizing support vector machine and image moments for synchronization, in: Information Assurance and Security, 2009. IAS '09. Fifth International Conference on, Vol. 1, 2009, pp. 572-574. doi:10.1109/IAS.2009.176.
L. Chun-Hua, L. He-fei, L. Zheng-ding, Semi-fragile watermarking based on svm for image authentication, in: Multimedia and Expo, 2007 IEEE International Conference on, 2007, pp. 1255-1258. doi:10.1109/ICME.2007.4284885.
C.-T. Hsu, J.-L. Wu, Hidden digital watermarks in images, Image Processing, IEEE Transactions on 8 (1) (1999) 58-68. doi:10.1109/83.736686.
A. J. Ahumada Jr, H. A. Peterson, Luminance-model-based dct quantization for color image compression, in: SPIE/IS&T 1992 Symposium on Electronic Imaging: Science and Technology, International Society for Optics and Photonics, 1992, pp. 365-374.
G. E. Legge, A power law for contrast discrimination, Vision research 21 (4) (1981) 457-467.
A. B. Watson, Dctune: A technique for visual optimization of dct quantization matrices for individual images, in: Sid International Symposium Digest of Technical Papers, Vol. 24, SOCIETY FOR INFORMATION DISPLAY, 1993, pp. 946-946.
Y.-T. Wu, F. Y. Shih, Digital watermarking based on chaotic map and reference register, Pattern Recognition 40 (12) (2007) 3753-3763. doi:http://dx.doi.org/10.1016/j.patcog.2007.04.013.
E. Simoncelli, W. Freeman, E. Adelson, D. Heeger, Shiftable multiscale transforms, Information Theory, IEEE Transactions on 38 (2) (1992) 587-607. doi:10.1109/18.119725.
A. Phadikar, S. P. Maity, B. Verma, Region based qim digital watermarking scheme for image database in dct domain, Computers & Electrical Engineering 37 (3) (2011) 339-355.
H. Y. Leung, L. M. Cheng, F. Liu, Robust digital image watermarking scheme using wave atoms with multiple description coding, EURASIP Journal on Advances in Signal Processing 2012 (1) (2012) 1-14.
C. Agarwal, A. Mishra, A. Sharma, Gray-scale image watermarking using ga-bpn hybrid network, Journal of Visual Communication and Image Representation 24 (7) (2013) 1135-1146. doi:http://dx.doi.org/10.1016/j.jvcir.2013.07.007.
S. Ranjbar, F. Zargari, M. Ghanbari, A highly robust two-stage contourlet-based digital image watermarking method, Signal Processing: Image Communication - doi:http://dx.doi.org/ 10.1016/ j.image.2013.07.002.
Umaamaheshvari, A., Prabhakaran, K., Thanushkodi, K., Watermarking of medical images with optimized biogeography, (2013) International Review on Computers and Software (IRECOS), 8 (12), pp. 2974-2984.
Chen, D., Zeng, X., Buyer-seller watermarking protocol: Problems and solutions, (2012) International Review on Computers and Software (IRECOS), 7 (3), pp. 1204-1208.
Hu, D., Luo, J., Feng, Y., Copyright protection in P2P networks using digital fingerprinting, (2011) International Review on Computers and Software (IRECOS), 6 (3), pp. 366-370.
Qu, X., Bai, L., Ming, X., Hu, D., Anti-collusion digital fingerprinting based on IPP code, (2011) International Review on Computers and Software (IRECOS), 6 (5), pp. 706-709.
Refbacks
- There are currently no refbacks.
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize