Multimedia Tools and Applications

, Volume 76, Issue 3, pp 3577–3616 | Cite as

A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling

Article

Abstract

To compromise between imperceptibility and robustness property of robust image watermarking technique, a RDWT-DCT based blind image watermarking scheme using Arnold scrambling is presented in this paper. Firstly, RDWT (Redundant Discrete Wavelet Transform) is applied to each gray scale cover image block after the image is decomposed into fixed size non overlapping blocks. Secondly, the binary watermark logo is encrypted by Arnold chaotic map and reshaped to a sequence to improve the security of the logo. In the subsequent step, DCT (Discrete Cosine Transform) is employed on each LH subband of the non-overlapping host image block. Finally, after zigzag scanning of each DCT block a binary bit of watermark is embedded into each block by adjusting some middle significant AC coefficients using repetition code. Experimental results show that robustness is achieved by recovering satisfactory watermark data from the reconstructed cover image after applying common geometric transformation attacks (like rotation, cropping, scaling, shearing and deletion of lines or column operation etc.), common enhancement technique attacks (like lowpass filtering, histogram equalization, sharpening, gamma correction, noise addition etc.) and JPEG compression attacks. The proposed scheme is also tested to verify the robustness performance against standard benchmark software “Checkmark” and satisfactory results are achieved against the Checkmark attacks such as Hard and Soft Thresholding, Template Removal, Warping, Dithering, Remodulation and Downsampling/Upsampling etc.

Keywords

Robustness Blind watermarking Redundant discrete wavelet transform Discrete cosine transform Repetition code Arnold scrambling 

References

  1. 1.
    “Checkmark” Available at http://watermarking.unige.ch/checkmark/
  2. 2.
    Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-Int J Light Electron Opt 125(1):428–434CrossRefGoogle Scholar
  3. 3.
    Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking. Signal Processing 66(3):357–372CrossRefMATHGoogle Scholar
  4. 4.
    Bhandari K, Mitra SK, JadhavA (2005) A hybrid approach to digital image watermarking using singular value decomposition and spread spectrum. In: Pattern Recognition and Machine Intelligence: 447–452Google Scholar
  5. 5.
    Campisi P, Kundur D, Neri A (2004) Robust digital watermarking in the ridgelet domain. IEEE Signal Process Lett 11(10):826–830CrossRefGoogle Scholar
  6. 6.
    Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266CrossRefGoogle Scholar
  7. 7.
    Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586CrossRefGoogle Scholar
  8. 8.
    Chu WC (2003) DCT-based image watermarking using subsampling. IEEE Trans Multimedia 5(1):34–38CrossRefGoogle Scholar
  9. 9.
    Chung KL, Shen CH, Chang LC (2001) A novel SVD-and VQ-based image hiding scheme. Pattern Recogn Lett 22(9):1051–1058CrossRefMATHGoogle Scholar
  10. 10.
    Chung KL, Yang WN, Huang YH, Wu ST, Hsu YC (2007) On SVD-based watermarking algorithm. Appl Math Comput 188(1):54–57MathSciNetMATHGoogle Scholar
  11. 11.
    Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68(3):244–253CrossRefGoogle Scholar
  12. 12.
    Deng F, Wang B (2003) A novel technique for robust image watermarking in the DCT domain. In: Neural Networks and Signal Processing. IEEE Conference Proceedings 2:1525–1528Google Scholar
  13. 13.
    Fan MQ, Wang HX, Li SK (2008) Restudy on SVD-based watermarking scheme. Appl Math Comput 203(2):926–930MathSciNetMATHGoogle Scholar
  14. 14.
    Fu Y (2013) Robust oblivious image watermarking scheme based on coefficient relation. Optik-Int J Light Electron Opt 124(6):517–521CrossRefGoogle Scholar
  15. 15.
    Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the ACM Workshop on Multimedia and Security:166–174Google Scholar
  16. 16.
    Ghazy RA, El-fishawy NA, Hadhoud MM, Dessouky MI, El-Samie FE (2007) An efficient block-by-block SVD-based image watermarking scheme. In: IEEE Radio Science Conference, NRSC 2007:1–9Google Scholar
  17. 17.
    Gravano, S. (2001). Introduction to error control codes (Vol. 9). Oxford University Press on Demand.Google Scholar
  18. 18.
    Kundur D, Hatzinakos D (1998) Digital watermarking using multiresolution wavelet decomposition. In: Acoustics, Speech and Signal Processing. IEEE Conference Proceedings 5:2969–2972Google Scholar
  19. 19.
    Kutter M, Petitcolas FA (1999) Fair benchmark for image watermarking systems. In Electronic Imaging’99. International Society for Optics and Photonics:226–239Google Scholar
  20. 20.
    Lagzian S, Soryani M, Fathy M (2011) A new robust watermarking scheme based on RDWT-SVD. Int J Intell Inf Process 2(1):22–29Google Scholar
  21. 21.
    Langelaar GC, Van Der Lubbe JC, Biemond J (1996) Copy protection for multimedia data based on labeling techniques. In: Symposium on Information Theory in the Benelux 1996:33–40 TECHNISCHE UNIVERSITEIT DELFTGoogle Scholar
  22. 22.
    Liang J, Tran TD (2001) Fast multiplierless approximations of the DCT with the lifting scheme. IEEE Trans Signal Process 49(12):3032–3044CrossRefGoogle Scholar
  23. 23.
    Liang X, Zhihui W, Huizhong W (2006) Ridgelet-based robust and perceptual watermarking for images. IJCSNS Int J Comput Sci Netw Secur 6(2):194–201Google Scholar
  24. 24.
    Lien BK, Lin WH (2006) A watermarking method based on maximum distance wavelet tree quantization. In: Proceedings 19th Conference Computer Vision, Graphics and Image Processing: 269–276Google Scholar
  25. 25.
    Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516CrossRefGoogle Scholar
  26. 26.
    Lin CY, Wu M, Bloom JA, Cox IJ, Miller ML, Lui YM (2001) Rotation, scale, and translation resilient watermarking for images. IEEE Trans Image Process 10(5):767–782CrossRefMATHGoogle Scholar
  27. 27.
    Liu JC, Chen SY (2001) Fast two-layer image watermarking without referring to the original image and watermark. Image Vis Comput 19(14):1083–1097CrossRefGoogle Scholar
  28. 28.
    Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia 4(1):121–128CrossRefGoogle Scholar
  29. 29.
    Ma F, Zhang J, Zhang W (2012) A blind watermarking technology based on DCT domain. In: Computer Science & Service System (CSSS), IEEE International Conference on:397–400Google Scholar
  30. 30.
    Nikolaidis N, Pitas I (1996) Copyright protection of images using robust digital signatures. In: Acoustics, Speech, and Signal Processing, ICASSP-96. IEEE Conference Proceedings 4:2168–2171Google Scholar
  31. 31.
    Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385–403CrossRefMATHGoogle Scholar
  32. 32.
    O’Ruanaidh JJ, Dowling WJ, Boland FM (1996) Phase watermarking of digital images. In: IEEE International Conference on Image Processing:239–242Google Scholar
  33. 33.
    Ouhsain M, Hamza AB (2009) Image watermarking scheme using nonnegative matrix factorization and wavelet transform. Expert Syst Appl 36(2):2123–2129CrossRefGoogle Scholar
  34. 34.
    Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multimed Tools Appl:1–7Google Scholar
  35. 35.
    Pereira S, Voloshynovskiy S, Madueño M, Marchand-Maillet S, Pun T (2001) Second generation benchmarking and application oriented evaluation. In: Information hiding workshop III, Pittsburgh, PA, USA: 340–353Google Scholar
  36. 36.
    Phadikar A, Maity SP, Verma B (2011) Region based QIM digital watermarking scheme for image database in DCT domain. Comput Electr Eng 37(3):339–355CrossRefMATHGoogle Scholar
  37. 37.
    Premaratne P, Ko CC (1999) A novel watermark embedding and detection scheme for images in DFT domain. In: Image Processing and Its Applications. IET Seventh International Conference 2:780–783Google Scholar
  38. 38.
    Quan L, Qingsong A (2004) A combination of DCT-based and SVD-based watermarking scheme. In: Signal Processing, ICSP’04. IEEE Proceedings on 1:873–876Google Scholar
  39. 39.
    Rastegar S, Namazi F, Yaghmaie K, Aliabadian A (2011) Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU Int J Electron Commun 65(7):658–663CrossRefGoogle Scholar
  40. 40.
    Raval MS, Rege PP (2003) Discrete wavelet transform based multiple watermarking scheme. In: IEEE Conference on Convergent Technologies 3:935–938Google Scholar
  41. 41.
    Singh AK (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl:1–8Google Scholar
  42. 42.
    Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain. Natl Acad Sci Lett 37(4):351–358CrossRefGoogle Scholar
  43. 43.
    Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain. J Med Imaging Health Inform 5(2):406–414CrossRefGoogle Scholar
  44. 44.
    Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl:1–21Google Scholar
  45. 45.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Inform 5(3):607–614CrossRefGoogle Scholar
  46. 46.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433CrossRefGoogle Scholar
  47. 47.
    Solachidis V, Pitas I (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741–1753CrossRefMATHGoogle Scholar
  48. 48.
    Swanson MD, Zhu B, Tewfik AH (1996) Transparent robust image watermarking. In: IEEE Image Processing Proceedings 3:211–214Google Scholar
  49. 49.
    Tay P, Havlicek JP (2002) Image watermarking using wavelets. In: Circuits and Systems, MWSCAS-2002. IEEE Midwest Symposium 3:258–261Google Scholar
  50. 50.
    Veeraswamy K, Kumar SS (2008) Adaptive AC-coefficient prediction for image compression and blind watermarking. J Multimed 3(1):16–22CrossRefGoogle Scholar
  51. 51.
    Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun Mag 39(8):118–126CrossRefGoogle Scholar
  52. 52.
    Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154–165CrossRefGoogle Scholar
  53. 53.
    Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recogn Lett 25(15):1681–1689CrossRefGoogle Scholar
  54. 54.
    Ward DL (2003) Redundant discrete wavelet transform based super-resolution using sub-pixel image registration. Air Force Institute of TechnologyGoogle Scholar
  55. 55.
    Wu C, Zhu WP, Swamy MN (2004) A watermark embedding scheme in wavelet transform domain. In: TENCON, IEEE Region 10 Conference Proceedings A:279–282Google Scholar
  56. 56.
    Yantao Z, Yunfei M, Zhiquan L (2008) A robust chaos-based DCT-domain watermarking algorithm. In: Computer Science and Software Engineering. IEEE International Conference on 3:935–938Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringDr. B. C. Roy Engineering CollegeDurgapurIndia
  2. 2.Department of Computer Science and EngineeringIndian School of MinesDhanbadIndia

Personalised recommendations