Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Encrypted digital watermarking algorithm for quick response code using discrete cosine transform and singular value decomposition

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

There is a trade-off relationship between the imperceptibility of a watermark and the robustness of a digital watermarking algorithm; to overcome this, we propose a robust digital watermarking encryption algorithm for quick response (QR) code images based on discrete cosine transform (DCT) and singular value decomposition (SVD) through dual scrambling using Josephus ring and cellular automata. Experimental results show that watermark can still be identified from a seriously distorted QR code. The proposed scheme maintains satisfactory image quality, with great robustness to noise, filters, JPEG compression, rotation, cropping, contrast variation attacks, print/scan attacks, and so on. This algorithm can achieve further reform for QR code, which can be widely used to protect the copyright of digital works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Abbreviations

QR:

quick response

2D:

The two-dimensional

DCT:

discrete cosine transform

DWT:

discrete wavelet transform

SVD:

singular value decomposition

RST:

rotation, scaling, translation

IF:

intermediate frequency

LF:

low frequency

PSNR:

peak signal-to-noise ratio

CA:

cellular automata

NC:

correlation coefficient

References

  1. Akter A, Nur-E-Tajnina, Ullah MA (2014) Digital image watermarking based on DWT-DCT: Evaluate for a new embedding algorithm. In: International Conference on Informatics, Electronics & Vision (ICIEV). IEEE, Dhaka, pp 1–6. https://doi.org/10.1109/ICIEV.2014.6850699

  2. Chai ZQ, Liang SL, Hu GR, Zhang L, Wu Y, Cao C (2018) Periodic characteristics of the Josephus ring and its application in image scrambling. EURASIP J Wirel Commun Netw. https://doi.org/10.1186/s13638-018-1167-5

  3. Chouhan R, Jha RK, Chaturvedi A et al (2011) Robust watermark extraction using SVD-based dynamic stochastic resonance.  In: 2011 18th IEEE International Conference on Image Processing. IEEE, Brussels, pp 2745–2748. https://doi.org/10.1109/ICIP.2011.6116238

  4. Hua ZY, Xu BX, Jin F, Huang H (2019) Image encryption using Josephus problem and filtering diffusion. IEEE Access 7:8660–8674. https://doi.org/10.1109/ACCESS.2018.2890116

    Article  Google Scholar 

  5. Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans Consum Electron 57(2):779–787

    Article  Google Scholar 

  6. Jin J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50(12):1836–1843

    Article  Google Scholar 

  7. Jindal H, Saxena S, Singh S (2014) Challenges and Issues in Underwater Acoustics Sensor Networks: a review. In: 2014 International Conference on Parallel, Distributed and Grid Computing. IEEE, Solan, pp 251–255. https://doi.org/10.1109/PDGC.2014.7030751

  8. Kabra RG, Agrawal SS (2016) Robust embedding of image watermark using LWT and SVD. In: 2016 International Conference on Communication and Signal Processing (ICCSP). IEEE, Melmaruvathur, pp 1968–1972. https://doi.org/10.1109/ICCSP.2016.7754516

  9. Kang Q, Li K, Yang J (2014) A digital watermarking approach based on DCT domain combining QR code and chaotic theory. In: 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, Cluj Napoca, pp 331–337. https://doi.org/10.1109/ICCP.2014.6937017

  10. Kaur S, Jindal H (2017) Enhanced image watermarking technique using wavelets and interpolation. Int J Image Graph Signal Process 9(7):23–35

    Article  Google Scholar 

  11. Kim C, Shin D, Leng L et al (2016) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101–104

    Article  Google Scholar 

  12. Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79

    Article  Google Scholar 

  13. Leng L, Zhang J, Xu J et al (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. In: 2010 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, Jeju, pp 467–471. https://doi.org/10.1109/ICTC.2010.5674791

  14. Leng L, Zhang JS, Khan MK et al (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  15. Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76:333–354. https://doi.org/10.1007/s11042-015-3058-7

    Article  Google Scholar 

  16. Li L, Wang RL (2011) A digital watermarking algorithm for QR code. J Hangzhou Dianzi Univ 31(2):46–49 (in Chinese)

    Google Scholar 

  17. Liu ZM, Lin JJ (2018) A watermarking algorithm for print-scan process on QR code. J East China Univ Sci Technol (Nat Sci Ed) 41(1):97–103 (in Chinese)

    Google Scholar 

  18. Liu L, Zhou YJ, Zhang B et al (2013) Digital watermarking method for QR code images based on DCT and SVD. Infrared Laser Eng 42(S2):304–311 (in Chinese)

    Google Scholar 

  19. Liu J, Huang J, Luo Y, Cao L, Yang S, Wei D, Zhou R (2019) An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7:80849–80860. https://doi.org/10.1109/ACCESS.2019.2915596

    Article  Google Scholar 

  20. Mittal A, Jindal H (2017) Novelty in image reconstruction using DWT and CLAHE. Int J Image Graph Signal Process 9(5):28–34

    Article  Google Scholar 

  21. Pandya KH, Galiyawala HJ (2008) A survey on QR codes: in context of research and application. Int J Emerg Technol Adv Eng 4(3):258–262

    Google Scholar 

  22. Thompson N, Lee K (2013) Information security challenge of QR codes. J Digit Forensic Secur Law 8(2):43–49

    Google Scholar 

  23. Tralic D, Grgic S (2016) Robust image encryption based on balanced cellular automaton and pixel separation. Radio Eng 25(3):548–555

    Google Scholar 

  24. Vongpradhip S, Rungraungsilp S (2012) QR code using invisible watermarking in frequency domain.  In: 2011 Ninth International Conference on ICT and Knowledge Engineering. IEEE, Bangkok, pp 47–52. https://doi.org/10.1109/ICTKE.2012.6152412

  25. Wang XY, Luan DP (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18(11):3075–3085

    Article  MathSciNet  Google Scholar 

  26. Xie RS, Wu KS, Xu GP, Ouyang M (2013) Research on anti-counterfeiting quick response 2D barcode techniques based on digital watermark. J Shanghai Jiaotong Univ 18(4):443–447

    Article  Google Scholar 

  27. Xie RS, Hong CQ, Zhu SZ, Tao D (2015) Anti-counterfeiting digital watermarking algorithm for printed QR barcode. Neurocomputing 167:625–635

    Article  Google Scholar 

  28. Xu J, Jin GQ, Yuan QS (2015) Design and implementation of monitoring system for internet QR code pictures. Netinfo Secur 6:13–18

    Google Scholar 

  29. Xue QC, Wu D, Chen DQ et al (2016) Geometrical attack resistant digital watermarking technology based on DWT-SVD and QR code. Packag Eng 37(11):158–163 (in Chinese)

    Google Scholar 

  30. Ye X, Chen X, Deng M et al (2014) A multiple-level DCT based robust DWT-SVD watermark method.  In: 2014 Tenth International Conference on Computational Intelligence and Security. IEEE, Kunming, pp 479–483. https://doi.org/10.1109/CIS.2014.28

  31. Zhang L, Wei D (2019) Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed Tools Appl 78:28003–28023. https://doi.org/10.1007/s11042-019-07902-9

    Article  Google Scholar 

  32. Zhou PY, Shen L, Tian XL et al (2015) Digital watermarking algorithm based on DWT and SVD. Applic Res Comput 27(15):1896–1897. https://doi.org/10.3969/j.issn.1001-3695.2010.05.083

    Article  Google Scholar 

Download references

Acknowledgments

LMS conceived and designed the experiments, and wrote this paper. SLL helped perform the analysis with constructive discussions. PPC and YXC contributed to the structuring and reviewing of the manuscript. All authors read and approved the final manuscript.

This work is supported by the Jilin Provincial Science and Technology Department Social Development Project (Key) (20190303016SF) and the Changchun City Science and Technology Bureau Local Academy (School, Institute) Cooperation Project (18DY010).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shili Liang.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, L., Liang, S., Chen, P. et al. Encrypted digital watermarking algorithm for quick response code using discrete cosine transform and singular value decomposition. Multimed Tools Appl 80, 10285–10300 (2021). https://doi.org/10.1007/s11042-020-10075-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10075-5

Keywords

Navigation