Skip to main content
Log in

Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To improve the security, robustness and imperceptibility of watermark schemes, a novel watermark scheme is devised by fusing multiple watermark techniques, including lifting wavelet transform, discrete cosine transform, discrete fractional angular transform and singular value decomposition. To solve the false positive problem in various SVD-based watermark schemes, transform domain encryption is utilized and the embedding component of watermark instead of the whole watermark is embedded into the host image. Furthermore, the particle swarm optimization algorithm is used to optimize the scaling factors and the parameter of the improved discrete fractional angular transform. The proposed watermark scheme is tested by several attacks, such as JPEG compression, low-pass filtering, Histogram equalization, contrast enhance, and etc. Simulation results demonstrate that the proposed watermark scheme is superior in the aspects of security, robustness and imperceptibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdallah EE, Hamza AB, Bhattacharya P (2007) Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms [J]. J Electronic Imaging 16(3):033020

    Article  Google Scholar 

  2. Bhatnagar G, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme [J]. Comput Secur 31(1):40–58

    Article  Google Scholar 

  3. Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M et al (2015) Robust watermarking method in DFT domain for effective management of medical imaging [J]. Signal, Image and Video Process 9(5):1163–1178

  4. Chen B, Yang Z, Huang S, et al. (2017) Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles [C]. IEEE International Performance Computing and Communications Conference, p 1–6

  5. Ding M, Fan G (2015) Multilayer joint gait-pose manifolds for human gait motion modeling [J]. IEEE Trans Cybern 45(11):1–8

    Article  Google Scholar 

  6. Ding M, Fan G (2015) Articulated and generalized Gaussian kernel correlation for human pose estimation [J]. IEEE Trans Image Process 25(2):776–789

    Article  MathSciNet  Google Scholar 

  7. Esgandari R, Khalili M (2015) A robust image watermarking scheme based on discrete wavelet transforms [C]. 2015 2nd IEEE International Conference on Knowledge-Based Engineering and Innovation, p 988–992

  8. Guo J, Liu Z, Liu S (2007) Watermarking based on discrete fractional random transform [J]. Opt Commun 272(2):344–348

    Article  Google Scholar 

  9. Hu H-T, Hsu L (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics [J]. Multimed Tools Appl 76(5):6575–6594

    Article  Google Scholar 

  10. Jain C, Arora S, Panigrahi PK (2008) A reliable SVD based watermarking scheme [J]. arXiv preprint arXiv: 0808.0309

  11. Kakarala R, Ogunbona PO (2001) Signal analysis using a multiresolution form of the singular value decomposition [J]. IEEE Trans Image Process 10(5):724–735

    Article  MathSciNet  Google Scholar 

  12. Kazemivash B, Moghaddam ME (2017) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm [J]. Multimed Tools Appl 76(20):20499–20524

    Article  Google Scholar 

  13. Keshavarzian R, Aghagolzadeh A (2016) ROI based robust and secure image watermarking using DWT and Arnold map [J]. AEU Int J Electron Commun 70(3):278–288

    Article  Google Scholar 

  14. Lai C, Tsai C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition [J]. IEEE Trans Instrum Meas 59(11):3060–3063

    Article  Google Scholar 

  15. Li J, Huang M, Du W, Chen Y (2012) Multiple watermarks for medical image based on DWT-DFT [C]. 2012 7th International Conference on Computing and Convergence Technology, IEEE, p 257–260

  16. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform [J]. Multimed Tools Appl 76(20):20739–20753

    Article  Google Scholar 

  17. Liu Z (2008) Robustness analysis of image watermarking based on discrete fractional random transform [J]. Opt Eng 47(5):057003

    Article  Google Scholar 

  18. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Trans Multimedia 4(1):121–128

    Article  Google Scholar 

  19. Liu Z, Ahmad MA, Liu S (2008) A discrete fractional angular transform [J]. Opt Commun 281(6):1424–1429

    Article  Google Scholar 

  20. Liu J, Wen X, Yuan L et al (2017) A robust approach of watermarking in contourlet domain based on probabilistic neural network [J]. Multimed Tools Appl 76(22):24009–24026

    Article  Google Scholar 

  21. Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding [J]. IET Image Process 11(10):815–821

    Article  Google Scholar 

  22. Loukhaoukha K, Chouinard J, Taieb MH (2011) Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization [J]. J Inform Hiding and Multimedia Signal Process 2(4):303–319

  23. Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics [J]. IET Image Process 10(1):34–52

    Article  Google Scholar 

  24. Run R, Horng S, Lai J et al (2012) An improved SVD-based watermarking technique for copyright protection [J]. Expert Syst Appl 39(1):673–689

    Article  Google Scholar 

  25. Singh AK (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images [J]. Multimed Tools Appl 76(6):8881–8900

    Article  Google Scholar 

  26. Singh P, Agarwal S (2013) A hybrid DCT-SVD based robust watermarking scheme for copyright protection [C]. AFRICON, 2013. IEEE, p 1–5

  27. Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection [J]. Multimed Tools Appl 76(11):13001–13024

    Article  Google Scholar 

  28. Singh AK, Dave M, Mohan A (2013) A hybrid algorithm for image watermarking against signal processing attacks [C]. International Workshop on Multi-disciplinary Trends in Artificial Intelligence. Springer, Berlin, Heidelberg, p 235–246

  29. Su Q, Niu Y, Zhao Y et al (2013) A dual color images watermarking scheme based on the optimized compensation of singular value decomposition [J]. AEU Int J Electron Commun 67(8):652–664

    Article  Google Scholar 

  30. Su Q, Wang G, Jia S et al (2015) Embedding color image watermark in color image based on two-level DCT [J]. Signal, Image and Video Process 9(5):991–1007

  31. Sweldens W (1998) The lifting scheme: a construction of second generation wavelets [J]. SIAM J Math Anal 29(2):511–546

    Article  MathSciNet  Google Scholar 

  32. Tsai P, Hu Y, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting [J]. Signal Process 89(6):1129–1143

    Article  Google Scholar 

  33. Wang C, Yang H, Meinel C (2015) Deep semantic mapping for cross-modal retrieval [C]. 2015 IEEE 27th International Conference on Tools with Artificial Intelligence, IEEE, p 234–241

  34. Wang C, Yang H, Meinel C (2016) A deep semantic framework for multimodal representation learning [J]. Multimed Tools Appl 75(15):9255–9276

    Article  Google Scholar 

  35. Wang C, Yang H, Bartz C (2016) Image captioning with deep bidirectional LSTMs [C]. Proceedings of the 2016 ACM on Multimedia Conference. ACM, p 988–997

  36. Xie X, Liu S, Yang C, et al (2017) The application of smart materials in tactile actuators for tactile information delivery [J]. arXiv preprint arXiv:1708.07077

  37. Ye X, Chen X, Deng M, et al (2014) A multiple-level DCT based robust DWT-SVD watermark method [C]. 2014 IEEE Tenth International Conference on Computational Intelligence and Security, p 479–483

  38. Yu J, Li Y, Xie X, et al (2017) Image encryption algorithm by using the logistic map and discrete fractional angular transform [J]. Opt Appl 47(1):141–155

  39. Zhang X, Li K (2005) Comments on" an SVD-based watermarking scheme for protecting rightful ownership" [J]. IEEE Trans Multimed 7(3):593–594

    Article  Google Scholar 

  40. Zhang Z, Wang C, Zhou X (2016) Image watermarking scheme based on Arnold transform and DWT-DCT-SVD [C]. 2016 13th IEEE International Conference on Signal Processing, p 805–810

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61462061 and 61561033), the China Scholarship Council (Grant No. 201606825042), the Department of Human Resources and Social Security of Jiangxi Province, the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant No. 20162BCB22011), and the Natural Science Foundation of Jiangxi Province (Grant No. 20171BAB202002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nan Run Zhou.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, N.R., Luo, A.W. & Zou, W.P. Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78, 2507–2523 (2019). https://doi.org/10.1007/s11042-018-6322-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6322-9

Keywords

Navigation