Advertisement

Signal, Image and Video Processing

, Volume 8, Issue 5, pp 843–857 | Cite as

Hybrid watermarking based on chaos and histogram modification

  • E. Chrysochos
  • V. Fotopoulos
  • M. Xenos
  • A. N. Skodras
Original Paper

Abstract

A hybrid watermarking scheme for authentication is presented, which demonstrates robustness against various attacks. Due to the different nature of filtering and geometrical attacks, two different watermarks are used in this scheme. The first one is embedded in frequency domain combined with a chaotic function and is based on the correlation method. The second watermark is embedded in luminosity histogram of the image. In this way, this hybrid watermarking scheme combines the robustness of chaotic domain against filtering, noise and compression attacks with the robustness of histogram domain against geometrical attacks.

Keywords

Chaos Chaotic maps DCT Robust watermarking Histogram modification Geometrical attacks Dual watermarking Authentication 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Berghel H., O’Gorman L.: Protecting ownership rights through digital watermarking. In: IEEE Comput. Mag. 29(7), 101–103 (1996)Google Scholar
  2. 2.
    Fotopoulos, V., Skodras, A.N.: Digital image watermarking: an overview. EURASIP Newsl. ISSN 1687–1421, 14(4), 10–19 (2003)Google Scholar
  3. 3.
    Hembrooke, E.F.: Identification of sound and like signals. United States Patent, 3, 004,104 (1961)Google Scholar
  4. 4.
    Fotopoulos, V.: Digital Image Watermarking. PhD thesis, University of Patras, Greece (2003)Google Scholar
  5. 5.
    Cox J., Miller L.: The first 50 Years of electronic watermarking. EURASIP J. Appl. Signal Process. 2002(2), 126–132 (2002)CrossRefMATHGoogle Scholar
  6. 6.
    Bukhari, K.Z.: Visual Data Transforms Comparison. Master’s Thesis, Delft University of Technology, The Netherlands (2002)Google Scholar
  7. 7.
    Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics (INDIN), Perth, Australia, 10–12 August (2005)Google Scholar
  8. 8.
    Serdean, C.V., Tomlinsin, M., Wade, G.J., Ambroze, A.M.: Protecting intellectual rights: digital watermarking in the wavelet domain. In: Proceedings of the IEEE International Workshop “Trends and Recent Achievements in Information Technology”, Cluj-Napoca, Romania, 16–18 May (2002)Google Scholar
  9. 9.
    Liu, J., Zhang, X., Sun, J., Lagunas, M.A.: A digital watermarking scheme based on ICA detection. In: 4th International Symposium on ICA and BSS (ICA2003), Nara, Japan (2003)Google Scholar
  10. 10.
    Yu D., Sattar F., Binkat B.: Multiresolution fragile watermarking using complex chirp signals for content authentication. Pattern Recognit. 39, 935–952 (2006)CrossRefMATHGoogle Scholar
  11. 11.
    Lee, S., Suh, Y., Ho, Y.: Lossless Data Hiding Based on Histogram Modification of Difference Images, PCM 2004, LNCS 3333, pp. 340–347 (2004)Google Scholar
  12. 12.
    Coatrieux, C.G., Lecornu, L., Roux, Ch., Sankur, B.: A review of image watermarking applications in healthcare. In: IEEE International Conference on Engineering in Medicine and Biology (EMBC 2006), New York, USA, September (2006)Google Scholar
  13. 13.
    Chrysochos, E., Fotopoulos, V., Skodras, A., Xenos M.: Reversible image watermarking based on histogram modification. In: 11th Panhellenic Conference on Informatics with international participation, Patras, Greece, 18–20, vol. B, pp. 93–104 (May 2007)Google Scholar
  14. 14.
    Pereira S., Pun T.: Fast robust template matching for affine resistant image watermarks. In: IEEE Trans. Image Process. 9, 1123–1129 (1999)Google Scholar
  15. 15.
    Csurka, G., Deguillaume, F., O’Rauanaidh, K., Pun, T.: A Bayesian approach to affine transformation resistant image and video watermarking. In: Third International Workshop, IH’99, Dresden, Germany, pp. 270–285, 29 September–1 October (1999)Google Scholar
  16. 16.
    Lin C., Wu M., Bloom J., Cox I., Miller M., Lui Y.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10(5), 767–782 (2001)CrossRefMATHGoogle Scholar
  17. 17.
    Lee C., Lee H.: Geometric attack resistant watermarking in wavelet transform domain. Opt. Soc. Am. 13(4), 1307–1321 (2005)Google Scholar
  18. 18.
    Arnold, V.I., Avez, A.: Problèmes Ergodiques de la Mécanique Classique, Paris, Gauthier-Villars (1967); English translation: (Ergodic Problems in Classical Mechanics) New York, Benjamin (1968)Google Scholar
  19. 19.
    Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proceedings of IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 2, pp. 237–240 (1996)Google Scholar
  20. 20.
    Zhao D., Guanrong C., Wenbo L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22, 47–54 (2004)CrossRefMATHGoogle Scholar
  21. 21.
    Yeh, G.H., Lee, G.C.: Toral fragile watermarking for localizing and recovering tampered image. In: IEEE Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong, pp. 321–324 (2005)Google Scholar
  22. 22.
    Wu Y.T., Shih F.Y.: Digital watermarking based on chaotic map and reference register. Pattern Recognit. 40(12), 3753–3763 (2007)CrossRefMATHGoogle Scholar
  23. 23.
    Li B., Xu J.W.: Period of arnold transformation and its application in image scrambling. J. Central S. Univ. Technol. 12(1), 278–282 (2005)CrossRefGoogle Scholar
  24. 24.
    Fotopoulos, V., Skodras, A.: Transform domain watermarking: adaptive selection of the watermark’s position and length. In: Proceedings of the Visual Communications and Image Processing (VCIP2003), Lugano, Switzerland, 8–11 July (2003)Google Scholar
  25. 25.
    Gilani, S.A.M., Kostopoulos, I., Skodras, A.: Color image-adaptive watermarking. In: Proceedings of the 14th International Conference on Digital Signal Processing (DSP2002), Santorini, Greece, 1–3, vol. 2, pp. 721–724 (July 2002)Google Scholar
  26. 26.
    Fotopoulos, V., Skodras, A.: Improved watermark detection based on similarity diagrams. In: Signal Processing: Image Communication, vol. 17, pp. 337–345 (2002)Google Scholar
  27. 27.
    Dhanalakshmi R., Thaiyalnayaki K.: Dual watermarking scheme with encryption. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 7(1), 248–253 (2010)Google Scholar
  28. 28.
    Shikha T., Nishanth R., Bernito A., Neeraj K.J.: ADWT based dual image watermarking technique for authenticity and watermark protection. Signal Image Process. Int. J. (SIPIJ) 1(2), 33–45 (2010)CrossRefGoogle Scholar
  29. 29.
    Ahmed F., Moskowitz I.S.: Phase signature-based image authentication watermark robust to compression and coding. Proc. SPIE 5561, 133–144 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London Limited 2012

Authors and Affiliations

  • E. Chrysochos
    • 1
  • V. Fotopoulos
    • 1
  • M. Xenos
    • 2
  • A. N. Skodras
    • 1
  1. 1.Digital Systems and Media Computing LaboratorySchool of Science and Technology, Hellenic Open UniversityPatrasGreece
  2. 2.Software Quality Research GroupSchool of Science and Technology, Hellenic Open UniversityPatrasGreece

Personalised recommendations