DOI QR코드

DOI QR Code

Robust Watermarking Scheme Based on Radius Weight Mean and Feature-Embedding Technique

  • Yang, Ching-Yu (Department of Computer Science and Information Engineering, National Penghu University of Science and Technology)
  • Received : 2012.07.15
  • Accepted : 2012.11.19
  • Published : 2013.06.01

Abstract

In this paper, the radius weight mean (RWM) and the feature-embedding technique are used to present a novel watermarking scheme for color images. Simulations validate that the stego-images generated by the proposed scheme are robust against most common image-processing operations, such as compression, color quantization, bit truncation, noise addition, cropping, blurring, mosaicking, zigzagging, inversion, (edge) sharpening, and so on. The proposed method possesses outstanding performance in resisting high compression ratio attacks: JPEG2000 and JPEG. Further, to provide extra hiding storage, a steganographic method using the RWM with the least significant bit substitution technique is suggested. Experiment results indicate that the resulting perceived quality is desirable, whereas the peak signal-to-noise ratio is high. The payload generated using the proposed method is also superior to that generated by existing approaches.

Keywords

References

  1. I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Burlington, MA: Morgan Kaufmann Publishers, 2008.
  2. F.Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, Boca Raton, FL: CRC Press, 2008.
  3. S. Wang, B. Yang, and X. Niu, "A Secure Steganography Method Based on Genetic Algorithm," J. Inf. Hiding Multimedia Signal Process., vo1. 1, no. 1, 2010, pp. 28-35.
  4. C.Y. Yang and C.H. Lin, "High-Quality and Robust Reversible Data Hiding by Coefficients Shifting Algorithm," ETRI J., vol. 34, no. 3, June 2012, pp. 429-438. https://doi.org/10.4218/etrij.12.0111.0312
  5. C.Y. Yang et al., "A Simple Digital Watermarking by the Adaptive Bit-Labeling Scheme," Int. J. Innovative Comput., Info. Control, vol. 6, no. 3(B), 2010, pp. 1401-1410.
  6. R.M. Noriega et al., "High Payload Audio Watermarking: Toward Channel Characterization of MP3 Compression," J. Inf. Hiding Multimedia Signal Process., vol. 2, no. 2, 2011, pp. 91- 107.
  7. C.Y. Yang, "Color Image Steganography Based on Module Substitutions," Third Int. Conf. Int. Inf. Hiding Multimedia Signal Process., Kaohsiung, Taiwan, Nov. 26-28, 2007, pp. 118-121.
  8. Y.G. Fu and R.M. Shen, "Color Image Watermarking Scheme Based on Linear Discriminant Analysis," Comput Std. Interface, vol. 30, 2009, pp. 115-120.
  9. O. Findik, I. Babaoglu, and E. Ülker, "A Color Image Watermarking Scheme Based on Artificial Immune Recognition System," Expert Syst. Appl., vol. 38, 2011, pp. 1942-1946. https://doi.org/10.1016/j.eswa.2010.07.126
  10. A. Phadikar and S.P. Maity, "Quality Access Control of Compressed Color Images Using Data Hiding," Int. J. Electron. Comnun, vol. 64, 2010, pp. 833-843. https://doi.org/10.1016/j.aeue.2009.09.004
  11. Q. Su et al., "A Blind Dual Color Images Watermarking Based on IWT and State Coding," Optics Commun., vol. 285, 2012, pp. 1717-1724. https://doi.org/10.1016/j.optcom.2011.11.117
  12. A. Mitiche and J.K. Aggarwal, "Contour Registration by Shape- Specific Point for Shape Matching," Comp. Vision, Graph. Image Process., vol. 22, 1983, pp. 396-408. https://doi.org/10.1016/0734-189X(83)90084-1
  13. J.C. Lin, S.L Chou, and W.H. Tsai, "Detection of Rotationally Symmetric Shape Orientations by Fold-Invariant Shape-Specific Points," Pattern Recog., vol. 25, 1992, pp. 473-482. https://doi.org/10.1016/0031-3203(92)90046-L
  14. C.Y. Yang and J.C. Lin, "EBTC: An Economical Method for Searching the Threshold of BTC Compression," Electron. Lett., vol. 32, 1996, pp. 1870-1871. https://doi.org/10.1049/el:19961267
  15. C.Y. Yang and J.C. Lin, "RWM-Cut for Color Image Quantization," Comput. Graph., vol. 20, 1996, pp. 577-588. https://doi.org/10.1016/0097-8493(96)00028-3

Cited by

  1. An improved robust watermarking scheme based on a shape-specific point and feature-embedding technique vol.63, pp.4, 2013, https://doi.org/10.1179/1743131x14y.0000000096
  2. Effective Electrocardiogram Steganography Based on Coefficient Alignment vol.40, pp.3, 2013, https://doi.org/10.1007/s10916-015-0426-9
  3. Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment vol.76, pp.1, 2017, https://doi.org/10.1007/s11042-015-3065-8
  4. Robust watermarking technique for textured images vol.125, pp.None, 2013, https://doi.org/10.1016/j.procs.2017.12.025
  5. Simple and robust watermarking scheme based on square-root-modulus technique vol.77, pp.23, 2013, https://doi.org/10.1007/s11042-018-6121-3