Advertisement

Multimedia Tools and Applications

, Volume 66, Issue 2, pp 179–200 | Cite as

A new aspect in robust digital watermarking

  • Gaurav BhatnagarEmail author
  • Q. M. Jonathan Wu
  • Balasubramanian Raman
Article

Abstract

Generally, in watermarking scheme the size of the watermark is very small when compare to host image. On the contrary, this is an attempt in which a new watermarking scheme is presented where the size of host image is very small when compare with watermark image. The core idea of the proposed scheme is to scale up the size of host image equal to the size of watermark via over-sampling and then decompose it using stationary wavelet transform. A gray scale watermark is embedded in the low frequency sub-band at the finest level using singular value decomposition. To prevent ambiguity and enhance the security, a binary watermark is also embedded in loss-less manner. Finally, a reliable watermark extraction scheme is developed for extracting both the watermarks. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.

Keywords

Digital watermarking Stationary wavelet transform Oversampling Normalized mass matrix Singular value decomposition 

References

  1. 1.
    Barni M, Bartonlini F, Cappellini V, Piva A (1998) A DCT domain system for robust image watermarking. Signal Process 66(3):357–372zbMATHCrossRefGoogle Scholar
  2. 2.
    Barni M, Bartonlini F, Piva A (2001) Improved wavelet based watermarking through pixel wise masking. IEEE Trans Image Process 10(5):783–791zbMATHCrossRefGoogle Scholar
  3. 3.
    Bhatnagar G, Raman B (2008) Robust watermarking scheme based on multiresolution fractional Fourier transform. In: Proc. of Indian conference on computer vision, graphics and image processing, Bhubaneshwar, India, pp 1–8Google Scholar
  4. 4.
    Bors AG, Pitas I (1998) Image watermarking using block site selection and DCT domain constraints. Optics Exp 3(12):512–523CrossRefGoogle Scholar
  5. 5.
    Carroll JM, Verhagen J, Wong PT (1992) Chaos in cryptography: the escape from the strange attractor. Cryptologia 16(1):52–72MathSciNetzbMATHCrossRefGoogle Scholar
  6. 6.
    Chandra DVS (2002) Digital image watermarking using singular value decomposition. In: Proc. of IEEE midwest sym. on circuits and systems, Phoenix, AZ, pp 264–267Google Scholar
  7. 7.
    Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):577–1586CrossRefGoogle Scholar
  8. 8.
    Cox IJ, Killian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  9. 9.
    Dawei Z, Guanrong C, Wenbo L (2004) A chaos-based robust wavelet-domain watermarking algorithm. Journal of Chaos Solitons Fractals 22(1):47–54zbMATHCrossRefGoogle Scholar
  10. 10.
    Devaney RL (2003) An introduction to chaotic dynamical systems. Westview Press, ColoradozbMATHGoogle Scholar
  11. 11.
    Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using DWT-SVD. J Electron Imag 14:043004CrossRefGoogle Scholar
  12. 12.
    Ganic E, Zubair N, Eskicioglu AM (2003) An optimal watermarking scheme based on singular value decomposition. In: Proc. of the IASTED international conference on communication, network, and information security, Uniondale, NY, pp 85–90Google Scholar
  13. 13.
    Gorodetski VI, Popyack LJ, Samoilov V, Skormin VA (2001) SVD-based approach to transparent embedding data into digital images. In: Proc. of international workshop on mathematical methods, models and architectures for computer network security. St. Petersburg, RussiaGoogle Scholar
  14. 14.
    Han H, Yao H, Liu S, Liu Y (2005) A fragile image watermarking based on mass and centroid. Lect Notes Comput Sci 3333:441–448CrossRefGoogle Scholar
  15. 15.
    Hsu CT, Wu JL (1996) Hidden signatures in images. In: Proc. of international conference of image processing, Lausanne, vol 3, pp 223–226Google Scholar
  16. 16.
    Hsu CT, Wu JL (1998) Multiresolution watermarking for digital images. IEEE Trans Circuits Syst 45(8):1097–1101CrossRefGoogle Scholar
  17. 17.
    Hwang MS, Chang CC, Hwang KF (1999) A watermarking technique based on one-way hash functions. IEEE Trans Consum Electron 45(2):286–294CrossRefGoogle Scholar
  18. 18.
    Kundur D, Hatizinakos D (2004) Towards robust logo watermarking using multi-resolution image fusion. IEEE Trans Multimedia 6(1):185–197CrossRefGoogle Scholar
  19. 19.
    Lasota A, Mackey MC (1997) Chaos, fractals, and noise-stochastic aspects of dynamics. Springer, New YorkGoogle Scholar
  20. 20.
    Lee YK, Chen LH (2000) High capacity image steganographic model. IEE Proc Vis Image Signal Proces 147(3):288–294MathSciNetCrossRefGoogle Scholar
  21. 21.
    Li Q, Yuan C, Zong YZ (2007) Adaptive DWT-SVD domain image watermarking using human visual model. In: Proc. of international conference on advanced communication technology, Phoenix Park, Gangwon-Do, Republic of Korea, pp 1947–1951Google Scholar
  22. 22.
    Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia 4(1):121–128CrossRefGoogle Scholar
  23. 23.
    Meerwald P, Uhl A (2001) A survey of wavelet-domain watermarking algorithms. In: Proc. of SPIE, electronic imaging, security and watermarking of multimedia contents III, San Jose, CA, USA, pp 4314Google Scholar
  24. 24.
    Nason GP, Silverman BW (1995) The stationary wavelet transform and some statistical applications. Notes Stat 108:281–289CrossRefGoogle Scholar
  25. 25.
    Piva A, Barni M, Bartonlini F, Cappellini V (1997) DCT-based watermarking recovering without restoring to the uncompressed original image. In: Proc. of IEEE international conference on image processing, Washington, DC, USA, vol 1, pp 520–523Google Scholar
  26. 26.
    Pun CM (2006) A novel DFT-based digital watermarking system for images. In: Proc. of international conference of signal processing, Vienna, Austria, vol 2, pp 1–4Google Scholar
  27. 27.
    Schyndle RGV, Trikel AZ, Osbrone CF (1994) A digital watermark. In: Proc. of IEEE international conference on image processing, Austin, Texas, vol 2, pp 86–90Google Scholar
  28. 28.
    Shirani S, Gallant M, Kossentini F (2001) Multiple description image coding using pre- and post-processing. In: Proceedings of international conference on information technology: coding and computing, Las Vegas, Nevada, pp 35–39Google Scholar
  29. 29.
    Solachidis V, Pitas I (2004) Optimal detector for multiplicative watermarks embedded in the DFT domain of non-white signals. EURASIP J Appl Signal Process 2004:2522–2532MathSciNetzbMATHCrossRefGoogle Scholar
  30. 30.
    Strang G (1993) Introduction to linear algebra. Wellesley-Cambridge PressGoogle Scholar
  31. 31.
    Sverldov A, Dexter S, Eskicioglu AM (2005) Robust DCT-SVD domain image watermarking for copyright protection: embedding data in all frequencies. In: Proc. of European signal processing conference, Antalya, Turkey. http://www.eurasip.org/Proceedings/Eusipco/Eusipco2005/defevent/abstract/a1023.pdf
  32. 32.
    Wang Y, Doherty JF, Van-dyck RE (2002) A wavelet based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11(2):77–88CrossRefGoogle Scholar
  33. 33.
    Xia X, Boncelet CG, ARCE GR (1997) A multiresolution watermark for digital images. In: Proc. of IEEE international conference on image processing, Washington, DC, USA, vol 3, pp 548–551Google Scholar
  34. 34.
    Yavuz E, Telatar Z (2007) Improved SVD-DWT based digital image watermarking against watermark ambiguity. In: Proc. of ACM symposium on applied computing, Seoul, Korea, pp 1051–1055.Google Scholar
  35. 35.
    Zeng BLW, Lei S (1999) Extraction of multiresolution watermark images for resolving rightful ownership. In: Proc. of SPIE, security and watermarking of multimedia contents, San Jose, CA, vol 3657, pp 404–414Google Scholar
  36. 36.
    Zhang XP, Li K (2005) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia 7(2):593–594CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Gaurav Bhatnagar
    • 1
    Email author
  • Q. M. Jonathan Wu
    • 1
  • Balasubramanian Raman
    • 2
  1. 1.Department of Electrical and Computer EngineeringUniversity of WindsorWindsorCanada
  2. 2.Department of MathematicsIndian Institute of Technology RoorkeeRoorkeeIndia

Personalised recommendations