Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A region-adaptive semi-fragile dual watermarking scheme

Published: 01 January 2016 Publication History

Abstract

Since existing watermarking schemes usually have only a single function, a region-adaptive semi-fragile dual watermarking scheme is proposed, taking into account both watermark embedding capacity and security. The dual watermarks refer to the robust watermark and the fragile watermark. The original image is divided into three regions, i.e., a no watermark region, a fragile watermark region, and a robust watermark region, and, then, the interrelated robust and fragile watermarks are embedded into different regions. The robust and fragile watermarks do not relate to embedding order, and the extracted fragile watermark further strengthens the extracted robust watermark, which makes it more adaptable to the Human Visual System (HVS). Different techniques have been developed to embed different types of watermarks. To increase the embedding capacity and achieve blind extraction, a status code technology was used to embed the robust watermark. To resist the erase attack and achieve blind extraction, a new special bit substitution technology is proposed to embed the fragile watermark. The experimental results show that the proposed dual watermark scheme has higher PSNR, better security, and larger capacity and also achieves the dual functions of copyright protection and integrity verification.

References

[1]
Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85(4):883---894.
[2]
Aziz SM, Pham DM (2012) Efficient parallel architecture for multi-level forward discrete wavelet transform processors. Comput Electr Eng 38(5):1325---1335.
[3]
Calderbank AR, Daubechies I, Sweldens W et al (1998) Wavelet transforms that map integers to integers. Appl Comput Harmon Anal 5(3):332---369.
[4]
Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36(3):578---584. 2009.12.003
[5]
Chemak C, Bouhlel M S, Lapayre J C (2007) A new scheme of robust image watermarking: the double watermarking algorithm. In: Proceedings of the 2007 summer computer simulation conference, pp 1201---1208
[6]
Chen F, He HJ, Wang HX (2012) Variable-Payload self-recovery watermarking scheme for digital image authentication. Chin J Comput 35(1):154---162. 1016.2012.00154
[7]
Cox I, Miller M, Bloom J et al (2001) Digital watermarking. Morgan Kaufmann, Burlington
[8]
Habib M, Sarhan S, Rajab L (2005) A robust-fragile dual watermarking system in the DCT domain. In: Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, pp 548---553.
[9]
Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proceedings of the IEEE special issue on Protection of Multimedia Content, pp 1062---1087.
[10]
Hsia CH, Guo JM (2014) Efficient modified directional lifting-based discrete wavelet transform for moving object detection. Signal Process 96(3):138---152.
[11]
Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497---3506.
[12]
Li QH, Ren GQ, Wu QZ, Zhang XY (2013) Rate pre-allocated compression for mapping image based on wavelet and rate-distortion theory. Int J Light Electron Opt 124(14):1836---1840.
[13]
Li C, Wang Y, Ma B et al (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput Stand Interfaces 34(4):367---379.
[14]
Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385---403.
[15]
Niu SZ, Shu NF (2009) A digital image double watermarking algorithm based on DCT domain. J Comput Res Dev 46(4):6---10
[16]
Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17(5):58---64.
[17]
Phadikar A, Maity SP, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J Vis Commun Image Represent 23(3):454---466.
[18]
Piva A, Bartolini F, Caldelli R (2005) Self-recovery authentication of images in the DWT domain. Int J Image Graph 5(1):149---165.
[19]
Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18(4):33---46.
[20]
Pratumnopharat P, Leung PS, Court RS (2014) Wavelet transform-based stress-time history editing of horizontal axis wind turbine blades. Renew Energy 63(3):558---575.
[21]
Sharkas M, ElShafie D, Hamdy N (2005) A dual digital-image watermarking technique. In: Proceedings of International Conference on World Academy of Science, Engineering and Technology, pp 136---139
[22]
Shen H, Chen B (2012) From single watermark to dual watermark: a new approach for image watermarking. Comput Electr Eng 38:1310---1324. 2011.11.012
[23]
Singh C, Ranade SK (2013) Geometrically invariant and high capacity image watermarking scheme using accurate radial transform. Opt Laser Technol 54(12):176---184.
[24]
Song CL, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent 23(3):549---568. j.jvcir.2012.01.017
[25]
Su QT, Niu YG, Liu XX et al (2012) A blind dual color images watermarking based on IWT and state coding. Opt Commun 285(7):1717---1724.
[26]
Su Q, Niu Y, Zou H (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455---8466.
[27]
Tong X, Liu Y, Zhang M (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301---308.
[28]
Ullah R, Khan A, Malik AS (2013) Dual-purpose semi-fragile watermark: authentication and recovery of digital images. Comput Electr Eng 39(7):2019---2030. j.compeleceng.2013.04.024
[29]
Wang XK, Wang PJ, Zhang P, Xu SZ, Yang HZ (2013) A norm-space, adaptive, and blind audio watermarking algorithm by discrete wavelet transform. Signal Process 93(4):913---922.
[30]
Wang X, Wang C, Yang H (2013) A robust blind color image watermarking in quaternion Fourier transform domain. J Syst Softw 86(2):255---277.
[31]
Wu K, Yan W, Du J (2007) A robust dual digital-image watermarking technique. In: IEEE International Conference on Computational Intelligence and Security Workshops, pp 668---671
[32]
Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing. Opt Commun 285(10):2596---2606.
[33]
Xie G, Shen H (2005) Toward improved wavelet-based watermarking using the pixel-wise masking model. In: IEEE International Conference on Image Processing, pp 689---692.
[34]
Yang H, Wang X, Wang C (2013) A robust digital watermarking algorithm in undecimated discrete wavelet transform domain. Comput Electr Eng 39(3):893---906.

Cited By

View all
  1. A region-adaptive semi-fragile dual watermarking scheme

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Multimedia Tools and Applications
    Multimedia Tools and Applications  Volume 75, Issue 1
    January 2016
    667 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 01 January 2016

    Author Tags

    1. Bit substitution
    2. Dual watermark
    3. Region-adaptive
    4. Semi-fragile
    5. Status code

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Multipurpose Watermarking Algorithm for Medical ImagesScientific Programming10.1155/2020/88488852020Online publication date: 1-Jan-2020
    • (2020)A Novel Comprehensive Watermarking Scheme for Color ImagesSecurity and Communication Networks10.1155/2020/88407792020Online publication date: 1-Jan-2020
    • (2018)Dual image watermarking by exploiting the properties of selected DCT coefficients with JND modelingMultimedia Tools and Applications10.1007/s11042-018-5900-177:20(26965-26990)Online publication date: 1-Oct-2018
    • (2018)A Novel Hybrid Information Security Scheme for 2D Vector MapMobile Networks and Applications10.1007/s11036-018-0997-z23:4(734-742)Online publication date: 1-Aug-2018
    • (2017)High capacity image steganography on sparse message of scanned document image (SMSDI)Multimedia Tools and Applications10.1007/s11042-016-4009-776:20(20847-20867)Online publication date: 1-Oct-2017

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media