Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 6, pp 7187–7204 | Cite as

Contourlet-based image and video watermarking robust to geometric attacks and compressions

  • Lei Chen
  • Jiying ZhaoEmail author
Article

Abstract

In this paper, we first propose a new blind image watermarking scheme robust to geometric attacks and compressions. The scheme is based on contourlet transform (CT) and principal component analysis (PCA). The scheme uses the principal components of the largest contourlet coefficients of the last directional subband of the cover image to embed the watermark. Meanwhile, with the noise visibility function (NVF), the watermarking strength is adjusted adaptively to preserve the perceptual quality of the image. The watermark can be detected with high accuracy after various possible distortions. The normalized correlation (NC) between the original watermark and the watermark extracted from the distorted watermarked image is used as the robustness evaluation criterion. The simulation results demonstrate that the proposed scheme has good performance in terms of both quality and robustness against a variety of image-processing attacks, such as rotation, scaling and image compressions. Then we extend the scheme to blind video watermarking. The performance of the video watermarking scheme is evaluated against video attacks like rotation, frame averaging, noise additions and video compressions. The introduction of the CT produces robustness against image and video compressions, and the PCA yields resistance to geometric attacks.

Keywords

Image and video watermarking Contourlet transform (CT) Principal component analysis (PCA) Noise visibility function (NVF) Normalized correlation (NC) 

References

  1. 1.
    Akhaee MA, Sahraeian SME, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment. IEEE Trans Image Process 19(4):967–980MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Alavianmehr MA, Rezaei M, Helfroush MS, Tashk A (2012) A lossless data hiding scheme on video raw data robust against H.264/AVC compression. In: Proceedings of international econference on computer and knowledge engineering. Mashhad, pp 194–198Google Scholar
  3. 3.
    Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Trans Inf Forensics Secur 9(9):1502–1517CrossRefGoogle Scholar
  4. 4.
    Chen L, Zhao J (2015) Adaptive digtial watermarking using RDWT and SVD. In: Proceedings of IEEE international symposium on haptic, audio and visual environments and games. Ottawa, pp 1–5Google Scholar
  5. 5.
    Chen L, Zhao J (2016) Adaptive contourlet-based image watemarking robust to geometric transformations and image compression. In: Proceedings of IEEE international instrumentation and measurement technology conference. Taipei, pp 996–1001Google Scholar
  6. 6.
    Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106CrossRefGoogle Scholar
  7. 7.
    Dutta T, Gupta HP (2016) A robust watermarking framework for high efficiency video coding (HEVC) - encoded video with blind extraction process. J Vis Commun Image Represent 38:29–44CrossRefGoogle Scholar
  8. 8.
    Hajizadeh M, Helfroush MS, Dehghani MJ, Tashk A (2010) A robust blind image watermarking method using local maximum amplitude wavelet coefficient quantization. Adv Elect Comput Eng 10(3):96– 101CrossRefGoogle Scholar
  9. 9.
    Hien TD, Chen YW, Nakao Z (2003) PCA Based digital watermarking. Knowl-Based Intell Inf Eng Syst 2773:1427–1434Google Scholar
  10. 10.
    Kalantari NK, Ahadi SM, Vafadust M (2010) A robust image watermarking in the ridegelet domain using universially optimum decoder. IEEE Trans Image Process 20(3):396–406Google Scholar
  11. 11.
    Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol 13(8):776–786CrossRefGoogle Scholar
  12. 12.
    Khalilian H, Bajic IV (2013) Video watermarking with empirical PCA-based decoding. IEEE Trans Image Process 22(12):4825–4840MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Khalighi S, Tirdad P, Rabiee HR (2010) A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks. EURASIP J Adv Signal Process 2010:Article No. 21CrossRefzbMATHGoogle Scholar
  14. 14.
    Liu Y, Zhao J (2010) A new video watermarking algorithm based on 1D DFT and Radon transform. Signal Process 90(2):626–639CrossRefzbMATHGoogle Scholar
  15. 15.
    Liu Y, Zheng D, Zhao J (2007) An image rectification scheme and its applications in RST invariant digital image watermarking. Multimed Tools Appl 34 (1):57–84CrossRefGoogle Scholar
  16. 16.
    Mansouri A, Aznaveh AM, Azar FT, Kurugollu F (2010) A low complexity video watermarking in h.264 compressed domain. IEEE Trans Inf Forensics Secur 5 (4):649–657CrossRefzbMATHGoogle Scholar
  17. 17.
    Ni R, Ruan Q, Cheng HD (2005) Secure semi-blind watermarking based on iteration mapping and image features. Pattern Recog 38(3):357–368CrossRefzbMATHGoogle Scholar
  18. 18.
    Nguyen SC, Ha KH, Nguyen HM (2015) An improved image watermarking scheme using selective curvelet scales. In: Proceedings of international conference on advanced technologies for communications. Ho Chi Minh City, pp 445–450Google Scholar
  19. 19.
    Ogawa K, Ohtake G (2015) Watermarking for HEVC/H.265 stream. In: Proceedings of international conference on consumer electronics. Las Vegas, pp 102–103Google Scholar
  20. 20.
    Ranjbar S, Zargari F, Ghanbari M (2013) A highly robust two-stage contourlet-based digital image watermarking method. Signal Process: Image Commun 28(10):1526–1536Google Scholar
  21. 21.
    Rasti P, Samiei S, Agoyi M, Escalera S, Anbarjafari G (2016) Robust non-blind color video watermarking using QR decomposition and entropy analysis. J Vis Commun Image Represent 38:838–847CrossRefGoogle Scholar
  22. 22.
    Sadreazami H, Amini M (2012) Highly robust image watermarking in contourlet domain using sigular value decomposition. In: Proceedings of IEEE International conference on signal processing, vol 1. Beijing, pp 628–631Google Scholar
  23. 23.
    Solachidis V, Pitas I (2001) Circularly symmetric watermarking embedding in 2D DFT domain. IEEE Trans Image Process 10(11):1741–1753CrossRefzbMATHGoogle Scholar
  24. 24.
    Song H, Yu S, Yang X, Song L, Wang C (2008) Contourlet-based image adaptive watermarking. Signal Process: Image Commun 23(3):162–178Google Scholar
  25. 25.
    Tashk A, Danyali H, Alavianmehr MA (2012) A modified dual watermarking scheme for digital images with tamper localization/detection and recovery capabilities. In: Proceedings of international ISC conference on information security and cryptology. Tabriz, pp 60–65Google Scholar
  26. 26.
    Tew Y, Wong K (2014) An overview of information hiding in h.264/AVC compressed video. IEEE Trans Circuits Syst Video Technol 24(2):305–319CrossRefGoogle Scholar
  27. 27.
    University of South California: The USC-SIPI Image Database. [Online]. Available: http://sipi.usc.edu/database/
  28. 28.
    Wang Y, Pearmain A (2006) Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. IEEE Trans Image Process 15 (6):1536–1543CrossRefGoogle Scholar
  29. 29.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–612CrossRefGoogle Scholar
  30. 30.
    Wang L, Ling H, Zou F, Lu Z (2012) Real-time compressed-domain video watermarking resistance to geometric distortions. IEEE Multimed 19(1):70–79CrossRefGoogle Scholar
  31. 31.
    Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2014) Adaptive watermarking and tree structure based image quality estimation. IEEE Trans Multimed 16(2):311–325CrossRefGoogle Scholar
  32. 32.
    Zhao Q, Liu H (2007) PCA-Based Web page watermarking. Pattern Recog 40(4):1334–1341CrossRefzbMATHGoogle Scholar
  33. 33.
    Zheng D, Liu Y, Zhao J (2007) A survey of RST invariant image watermarking algorithms. ACM Comput Surv 39(2):1–91CrossRefGoogle Scholar
  34. 34.
    Zheng D, Wang S, Zhao J (2009) RST Invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. IEEE Trans Image Process 18(5):1055–1068MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.School of Electrical Engineering and Computer ScienceUniversity of OttawaOttawaCanada

Personalised recommendations