Open Access Open Access  Restricted Access Subscription or Fee Access

A Robust Image Watermarking Scheme Using Steerable Pyramid Transform


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i10.2238

Abstract


In recent years, digital image watermarking techniques are represented as a solution to protect intellectual property rights of digital media. In this work, we propose a new watermarking scheme based on steerable pyramid decomposition transform. Trade-off between invisibility and robustness properties is considered in the proposed scheme. In which, the distortion caused by the embedding process of the watermark should be as low as possible and at the same time should be robust as high as possible against attacks. The proposed scheme embeds several copies of the watermark image in all steerable pyramid transform bands of the original image, in order to facilitate the watermark detection and to be more robust against several attacks like cropping in case we lost some parts of the watermarked image. In the experimental results, the good similarity between the watermarked and the original images demonstrates the good invisibility of the proposed scheme, and the survival of the watermark against geometric and no-geometric attacks demonstrates the robustness of the same scheme.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Robust Digital Watermarking; Steerable Pyramid Transform; Geometric Attacks

Full Text:

PDF


References


Umaamaheshvari, A., Prabhakaran, K., Thanushkodi, K., Watermarking of medical images with optimized biogeography, (2013) International Review on Computers and Software (IRECOS), 8 (12), pp. 2974-2984.

Chen, D., Zeng, X., Buyer-seller watermarking protocol: Problems and solutions, (2012) International Review on Computers and Software (IRECOS), 7 (3), pp. 1204-1208.

Hu, D., Luo, J., Feng, Y., Copyright protection in P2P networks using digital fingerprinting, (2011) International Review on Computers and Software (IRECOS), 6 (3), pp. 366-370.

Qu, X., Bai, L., Ming, X., Hu, D., Anti-collusion digital fingerprinting based on IPP code, (2011) International Review on Computers and Software (IRECOS), 6 (5), pp. 706-709.

Stefan Katzenbeisser and Fabien A. P. Petitcolas, "Information Hiding Techniques for Steganography and Digital Watermarking," Artech house, Computer security series, pp.15-23, 97-109, 2000.

Wong, P. H. W.; Au, O. C.; Yeung, Y. M. (2003): A Novel Blind Multiple Watermarking Technique for Images, IEEE Transactions on Circuits and Systems for Video Technology, 13 (8), pp. 813-830.
http://dx.doi.org/10.1109/tcsvt.2003.815948

Burt, P. J.; Adelson, E.H. (1983): The Laplacian pyramid as a compact image code, IEEE Transactions on Comm., 31(4), pp. 532-540.
http://dx.doi.org/10.1109/tcom.1983.1095851

Potdar, V., S. Han and E. Chang, 2005. A Survey of Digital Image Watermarking Techniques, in Proc. of the IEEE International Conference on Industrial Informatics, pp: 709-716, Perth,Australia
http://dx.doi.org/10.1109/indin.2005.1560462

E.P. Simoncelli, A rotation-invariant pattern signature, in: Third IEEE International Conference on Image Processing, Laussanne Switzerland, vol. 3, September 1996, pp. 185–188.
http://dx.doi.org/10.1109/icip.1996.560415

Vol 9, No 2 (2014) El Hossaini, A. E. A., El Aroussi, M., Jamali, K., Mbarki, S., & Wahbi, M. Highly Robust Digital Image Watermarking Using Steerable Pyramid and Dual Encryption Technique
http://dx.doi.org/10.4304/jcp.9.10.2315-2327

El Hossaini, A. E. A., El Aroussi, M., Jamali, K., Mbarki, S., & Wahbi, M. A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid International Journal of Network Security. Vol. 17, No. 1, 2015.
http://dx.doi.org/10.4304/jcp.9.10.2315-2327

El Hossaini, E.A., El Aroussi, M., Jamali, K., Mbarki, S., Wahbi, M., Highly robust digital image watermarking using steerable pyramid and dual encryption technique, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 255-265.

El Hossaini, A. E. A., El Aroussi, M., Jamali, K., Mbarki, S., & Wahbi, M. A robust watermarking scheme based on steerable pyramid and singular value decomposition, Applied Mathematical Sciences, Vol. 8, 2014, no. 60, 2997-3008
http://dx.doi.org/10.1109/icmcs.2014.6911191

Voloshynovskiy, S., S. Pereira and T. Pun, 2001. "Attacks on Digital Watermarks: Classification,Estimation-Based Attacks, and Benchmarks," Comm. Magazine, 39(8): 118-126.
http://dx.doi.org/10.1109/35.940053

Charu Agarwal, Anurag Mishra, Arpita Sharma, Gray-scale image watermarking using GA-BPN hybrid network, Journal of Visual Communication and Image Representation, Volume 24, Issue 7, October 2013, Pages 1135-1146.
http://dx.doi.org/10.1016/j.jvcir.2013.07.007

S. Ranjbar, et al., A highly robust two-stage Contourlet-based digital image watermarking method, Signal Processing-Image Communication (2013).
http://dx.doi.org/10.1016/j.image.2013.07.002

W.H. Lin, Y.R. Wang, S.J. Horng, T.W. Kao,Y. Pan, A blind watermarking method using maximum wavelet coefficient quantization, International Journal of Expert Systems and Applications 36(2009) 11509–11516.
http://dx.doi.org/10.1016/j.eswa.2009.03.060


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2022 Praise Worthy Prize