Multimedia Tools and Applications

, Volume 60, Issue 1, pp 31–46 | Cite as

Novel robust image watermarking based on subsampling and DWT

Article

Abstract

This paper presents a robust digital image watermarking scheme based on subsampling and DWT. Subsampling is firstly used to construct a subimage sequence as a video segment. Then, a random watermark sequence satisfied with Gaussian distribution is block-wised embedded into the DWT domain of these subimages repeatedly using the video watermarking technique. And watermark is detected through computing correlation between watermark and watermarked frames. The experiment results demonstrate that the proposed scheme achieves good robustness against JPEG compression, common image processing operation and geometric distortions. Furthermore, the proposed watermarking scheme is also robust against linear collusion and other video watermarking attacks.

Keywords

Digital watermarking Subsampling DWT Collusion 

References

  1. 1.
    Cox IJ, Killian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673–1687CrossRefGoogle Scholar
  2. 2.
    Doërr G, Dugelay JL (2003) A guide tour of video watermarking. Signal Process: Image Commun 18(4):263–282CrossRefGoogle Scholar
  3. 3.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8:1259–1284MathSciNetMATHCrossRefGoogle Scholar
  4. 4.
    Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern C Appl Rev 40(3):278–286CrossRefGoogle Scholar
  5. 5.
    Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283–301MATHCrossRefGoogle Scholar
  6. 6.
    Inoue H, Miyazaki A, Yamamoto A, Katsura T (1998) Digital watermark based on the wavelet transform and its robustness on image compression. In: Proc. IEEE int. conf. image processing, vol 2, pp 391–395Google Scholar
  7. 7.
    Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063CrossRefGoogle Scholar
  8. 8.
    Lin WH, Horng SJ (2006) A watermarking method based on maximum distance wavelet tree quantization. In: 19th conf. computer vision, graphics and image processing, pp 269–276Google Scholar
  9. 9.
    Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746–757CrossRefGoogle Scholar
  10. 10.
    Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878CrossRefGoogle Scholar
  11. 11.
    Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516CrossRefGoogle Scholar
  12. 12.
    Liu W, Dong L, Zeng W (2007) Optimum detection for spread-spectrum watermarking that employs self-masking. IEEE Trans. Inf Forensics Secur 2(4):645–654CrossRefGoogle Scholar
  13. 13.
    Liu Q, Sung AH, Qiao M (2009) Improved detection and evaluation for JPEG steganalysis. In: Proc. 17 ACM int. conf. multimedia, pp 873–876Google Scholar
  14. 14.
    Liua Q, Sung AH, Qiao M, Chen Z, Ribeiro B (2010) An improved approach to steganalysis of jpeg images. Inf Sci 180(9):1643–1655CrossRefGoogle Scholar
  15. 15.
    Lu W, Lu H (2008) Robust watermarking based on subsampling and nonnegative matrix factorization. Informatica 19(4):555–566MATHGoogle Scholar
  16. 16.
    Lu W, Sun W, Lu H (2009) Robust watermarking based on dwt and nonnegative matrix factorization. Comput Electr Eng 35:183–188MathSciNetMATHCrossRefGoogle Scholar
  17. 17.
    Lu W, Lu H, Chung FL (2010) Feature based robust watermarking using image normalization. Comput Electr Eng 36(1):2–18MATHCrossRefGoogle Scholar
  18. 18.
    Mallat S (1999) A wavelet tour of signal processing (Wavelet analysis & its applications), 2nd edn. Academic, New YorkGoogle Scholar
  19. 19.
    Malvar HS, Florencio DAF (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans Signal Process 51(4):898–905MathSciNetCrossRefGoogle Scholar
  20. 20.
    O’Ruanaidh J, Pun T (1998) Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process 66(3):303–317MATHCrossRefGoogle Scholar
  21. 21.
    O’Ruanaidh JJK, Dowling WJ, Boland FM (1996) Phase watermarking of digital image. In: Proc. IEEE int. conf. image processing, vol 3, pp 239–242Google Scholar
  22. 22.
    Pereira S, Pun T (1999) Fast robust template matching for affine resistant image watermarking. In: Int. workshop on information hiding, LNCS, vol 1768. Springer, New York, pp 200–210Google Scholar
  23. 23.
    Schyndel RGV, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proc. of ICIP’94, vol 2, pp 86–90Google Scholar
  24. 24.
    Solachidis V, Pitas I (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741–1753MATHCrossRefGoogle Scholar
  25. 25.
    Su K, Kundur D, Hatzinakos D (2005) Statistical invisibility for collusion-resistant digital video watermarking. IEEE Trans Multimedia 7(1):43–51CrossRefGoogle Scholar
  26. 26.
    Swanson MD, Zhu B, Tewfik AH (1998) Multiresolution scene-based video watermarking using perceptual models. IEEE J Sel Areas Commun 16(4):540–550CrossRefGoogle Scholar
  27. 27.
    Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154–165CrossRefGoogle Scholar
  28. 28.
    Zheng D, Wang S, Zhao J (2009) Rst invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. IEEE Trans Image Process 18(5):1055–1068CrossRefGoogle Scholar
  29. 29.
    Zheng D, Zhao J, Saddik AE (2003) RST-invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Trans Circuits Syst Video Technol 13(8):753–765CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.School of Information Science and Technology, Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhouChina
  2. 2.School of SoftwareSun Yat-sen UniversityGuangzhouChina
  3. 3.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations