DOI QR코드

DOI QR Code

Block Based Blind & Secure Gray Image Watermarking Technique Based on Discrete Wavelet Transform and Singular Value Decomposition

  • Imran, Muhammad (Department of Electrical & Computer Engineering College of Engineering, Florida State University) ;
  • Harvey, Bruce A. (Department of Electrical & Computer Engineering College of Engineering, Florida State University)
  • Received : 2016.06.01
  • Accepted : 2016.12.08
  • Published : 2017.02.28

Abstract

In this paper block based blind secure gray image watermarking scheme based on discrete wavelet transform and singular value decomposition is proposed. In devising the proposed scheme, security is given high importance along with other two requirements: robustness and imperceptibility. The use of discrete wavelet transform not only improves robustness but the selection of bands with high tolerance towards noise caused an improvement in terms of imperceptibility. The robustness further improved due to the involvement of singular vectors along with singular values in watermark embedding and extraction process. Finally, to achieve security, the selected DWT band is decomposed into smaller blocks and random blocks are chosen for modification. Furthermore, the elements of left and right singular vectors of selected blocks are chosen based on their dependence upon each other for watermark embedding. Various experiments using different images as host and watermark were conducted to examine and validate the proposed technique. Additionally, the proposed technique is tested against various attacks like compression, affine transformation, cropping, translation, X shearing, scaling, Y shearing, filtering, blurring, different kinds of noises, histogram equalization, rotation, etc. Lastly, the proposed technique is compared with state-of-the-art watermarking techniques and their comparison shows significant improvement of proposed scheme over existing techniques.

Keywords

References

  1. Huawei Tian, Yao Zhao, Rongrong Ni, Lunming Qin, Xuelong Li, "LDFT-based watermarking resilient to local de-synchronization attacks," IEEE Transactions on Cybernetics, vol. 43, no. 6, pp. 2190-2201, December, 2013. https://doi.org/10.1109/TCYB.2013.2245415
  2. Xinshan Zhu, Jie Ding, Honghui Dong, Kongfa Hu, "Normalized correlation-based quantization modulation for robust watermarking," IEEE Transactions on Multimedia, vol. 16, no. 7, pp. 1888-1904, November, 2014. https://doi.org/10.1109/TMM.2014.2340695
  3. Nazeer Muhammad, Nargis Bibi, "Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain," IET Image Processing, vol. 9, no. 9, pp. 795-803, September, 2015. https://doi.org/10.1049/iet-ipr.2014.0395
  4. Mehran Andalibi, Damon M. Chandler, "Digital image watermarking via adaptive logo texturization," IEEE Transactions on Image Processing, vol. 24, no. 12, pp. 5060-5073, December 2015. https://doi.org/10.1109/TIP.2015.2476961
  5. Yasunori Ishikawa, Kazutake Uehira, Kazuhisa Yanaka, "Optimization of size of pixel blocks for orthogonal transform in optical watermarking technique," IEEE Journal of Display Technology, vol. 8, no. 9, pp. 505-510, September, 2012. https://doi.org/10.1109/JDT.2012.2201133
  6. Sangita Zope-Chaudhari, Parvatham Venkatachalam, Krishna Mohan Buddhiraju, "Secure dissemination and protection of multi-spectral images using crypto-watermarking," IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 8, no. 11, pp. 5388-5394, November, 2015. https://doi.org/10.1109/JSTARS.2015.2475169
  7. Beijing Chen, Gouenou Coatrieux, Gang Chen, Xingming Sun, Jean Louis Coatrieux, Huazhong Shu, "Full 4-d quaternion discrete Fourier transform based watermarking for color images," Journal of Digital Signal Processing, vol. 28, pp. 106-119, June, 2014. https://doi.org/10.1016/j.dsp.2014.02.010
  8. Shabir Parah, Javaid Sheikh, Nazir Loan, Ghulam Bhat, "Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing," Journal of Digital Signal Processing, vol. 53, pp. 11-24, June 2016. https://doi.org/10.1016/j.dsp.2016.02.005
  9. Patrick Bas, Teddy Furon, "A New Measure of Watermarking Security: The Effective Key Length," IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp.1306-1317, June 2013. https://doi.org/10.1109/TIFS.2013.2267960
  10. Nasrin M. Makbol, Bee Ee Khoo, Taha H. Rassem, "Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics," IET Image Processing, vol. 10, no. 1, pp. 34-52, January, 2016. https://doi.org/10.1049/iet-ipr.2014.0965
  11. Chuntao Wang, Jiangqun Ni, Jiwu Huang, "An informed watermarking scheme using hidden markov model in the wavelet domain," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 853-867, June, 2012. https://doi.org/10.1109/TIFS.2012.2188797
  12. Matthieu Urvoy, Dalila Goudia, Florent Autrusseau, "Perceptual DFT watermarking with improved detection and robustness to geometrical distortions," IEEE Transactions on Information Forensics and Security, vol. 9, no. 7, pp. 1108-1119, May, 2014. https://doi.org/10.1109/TIFS.2014.2322497
  13. Jian Cao, Jiwu Huang, "Controllable secure watermarking technique for trade-o_ between robustness and security," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 821-826, April, 2012. https://doi.org/10.1109/TIFS.2012.2184093
  14. Yu-Hsun Lin, Ja-Ling Wu, "A digital blind watermarking for depth-image-based rendering 3d images," IEEE Trans. on Broadcasting, vol. 57, no. 2, pp. 602-611, June, 2011. https://doi.org/10.1109/TBC.2011.2131470
  15. Shankar Parimi, A. SaiKrishna, N. Rajesh Kumar, N. R. Raajan, "An imperceptible watermarking technique for copyright content using discrete cosine transformation," in Proc. of IEEE Int. Conf. on Circuit, Power and Computing Technologies (ICCPCT), pp. 1-5, March 19-20, 2015.
  16. Veysel Aslantas, Saban Ozer, Serkan Ozturk, "A novel image watermarking method based on discrete cosine transform using genetic algorithm," in Proc. of 17th IEEE Int. Conf. on Signal Processing and Communications Applications, pp. 285-288, April 9-11, 2009.
  17. Chih-Chin Lai, Cheng-Chih Tsai, "Digital image watermarking using discrete wavelet transform and singular value decomposition," IEEE Trans. on Instrumentation and Measurement, vol. 59, no. 11, pp. 3060-3063, November, 2010. https://doi.org/10.1109/TIM.2010.2066770
  18. Nasrin M. Makbol, Bee Ee Khoo, "A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition," Journal of Digital Signal Processing, vol. 33, pp. 134-147, October, 2014. https://doi.org/10.1016/j.dsp.2014.06.012
  19. Yuan-Gen Wang, Guopu Zhu, Jiwu Huang, "An improved sample projection approach for image watermarking," Journal of Digital Signal Processing, vol. 24, pp. 135-143, January, 2014. https://doi.org/10.1016/j.dsp.2013.09.009
  20. Tsz Kin Tsui, Xiao-Ping Zhang, Dimitrios Androutsos, "Color image watermarking using multidimensional Fourier transforms," IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 16-28, March 2008. https://doi.org/10.1109/TIFS.2007.916275
  21. Ruizhen Liu, Tieniu Tan, "An SVD based watermarking scheme for protecting rightful ownership," IEEE Trans. on Multimedia, vol. 4, no. 1, pp. 121-128, March, 2002. https://doi.org/10.1109/6046.985560
  22. Xiao-Ping Zhang, Kan Li, "Comments on 'An SVD based watermarking scheme for protecting rightful ownership'," IEEE Trans. on Multimedia, vol. 5, no. 2, pp. 593-594, June, 2005.
  23. Roman Rykaczewski, "Comments on 'An SVD-based watermarking scheme for protecting rightful ownership'," IEEE Trans. Multimedia, vol. 9, no. 2, pp. 421-423, February, 2007. https://doi.org/10.1109/TMM.2006.886297
  24. Khaled Loukhaoukha, "Comments on 'A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm'," Journal of Digital Signal Processing, vol. 23, no. 4, pp. 1334, July, 2013. https://doi.org/10.1016/j.dsp.2013.02.006
  25. Erkan Yavuz, Ziya Telatarb, "Comments on 'A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm'," Journal of Digital Signal Processing, vol. 23, no. 4, pp. 1335-1336, July, 2013. https://doi.org/10.1016/j.dsp.2013.02.009
  26. Chih-Chin Lai, "A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm," Journal of Digital Signal Processing, vol. 21, no. 4, pp. 522-527, January, 2011. https://doi.org/10.1016/j.dsp.2011.01.017
  27. Mohamed Neji Maatouk, Najoua Essoukri Ben Amara, "Intelligent hybrid watermarking ancient-document wavelet packet decomposition-singular value decomposition-based schema," IET Image Processing, vol. 8, no. 12, pp. 708-717, December 2014. https://doi.org/10.1049/iet-ipr.2013.0546
  28. Qingtang Su, Yugang Niu, Hailin Zou, Xianxi Liu, "A blind dual color image watermarking based on singular value decomposition," Journal of Applied Mathematics and Computation, vol. 219, no. 16, pp. 8455-8466, April, 2013. https://doi.org/10.1016/j.amc.2013.03.013
  29. Kamran Hameed, Adeel Mumtaz, S.A.M. Gilani, "Digital image watermarking in the wavelet transform domain," World Academy of Science, Engineering and Technology, vol. 13, pp. 86-89, 2006.
  30. Santa Agreste, Guido Andaloro, Daniela Prestipino, Luigia Puccio, "An image adaptive, wavelet-based watermarking of digital images," Journal of Computational and Applied Mathematics, vol. 210, no. 1-2, pp. 13-21, December, 2007. https://doi.org/10.1016/j.cam.2006.10.087
  31. Herve Jegou, Matthijs Douze, Cordelia Schmid, "Hamming embedding and weak geometric consistency for large scale image search," A. Z. David Forsyth, Philip Torr (Ed.), in Proc. of European Conference on Computer Vision, vol. I of LNCS, Springer, pp. 304-317, 2008.
  32. Saman Iftikhar, M. Kamran, Zahid Anwar, "Rrw - a robust and reversible watermarking technique for relational data," IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 4, pp. 1132-1145, April, 2015. https://doi.org/10.1109/TKDE.2014.2349911