Signal, Image and Video Processing

, Volume 9, Issue 3, pp 735–745 | Cite as

A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition

  • Mary Agoyi
  • Erbuğ Çelebi
  • Gholamreza Anbarjafari
Original Paper

Abstract

Digital watermarking has attracted increasing attentions as it has been the current solution to copyright protection and content authentication which has become an issue to be addressed in multimedia technology. This study introduces a novel watermarking scheme based on the discrete wavelet transform (DWT) in combination with the chirp z-transform (CZT) and the singular value decomposition (SVD). Firstly, the image is decomposed into its frequency subbands by using 1-level DWT. Then, the high-frequency subband is transformed into z-domain by using CZT. Afterward by SVD, the watermark is added to the singular matrix of the transformed image. Finally, the watermarked image is obtained by using inverse of CZT and inverse of DWT. This algorithm combines the advantages of all three algorithms. The experimental result shows that the algorithm is imperceptible and robust to several attacks and signal processing operations.

Keywords

Watermarking Discrete wavelet transform Chirp z-transform Singular value decomposition 

References

  1. 1.
    Cedillo-Hernández, M., García-Ugalde, F., Nakano-Miyatake, M., Pérez-Meana, H.M.: Robust hybrid color image watermarking method based on DFT domain and 2D histogram modification. Signal Image Video Process. 8, 49–63 (2013)Google Scholar
  2. 2.
    Chrysochos, E., Fotopoulos, V., Xenos, M., Skodras, A.N.: Hybrid watermarking based on chaos and histogram modification. Signal Image Video Process., 1–15 (2012)Google Scholar
  3. 3.
    Kansal, M., Singh, G., Kranthi, B.V.: DWT, DCT and SVD based digital image watermarking. In: International Conference on Computing Sciences (ICCS), pp. 77–81 (2012)Google Scholar
  4. 4.
    Lai, C., Tsai, C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060–3063 (2010)CrossRefGoogle Scholar
  5. 5.
    Chandra Mohan, B., Srinivas Kumar, S.: A robust image watermarking scheme using singular value decomposition. J. Multimed. 3(1), 7–15 (2008)Google Scholar
  6. 6.
    Rahimi, F., Rabani, F.: A visually imperceptible and robust image watermarking scheme in contourlet domain. In: International Conference on Signal Processing (ICSP), pp. 1817–1820 (2010)Google Scholar
  7. 7.
    Riaz, S., Javed, M.Y., Anjum, M.A.: Invisible watermarking schemes in spatial and frequency domains. In: International Conference on Emerging Technologies (ICET), pp. 211–216 (2008)Google Scholar
  8. 8.
    Agoyi, M., Seral, D.: An imperceptible watermarking marking scheme based on double density dual tree DWT and SVD. In: 6th International Conference on Information Security and Cryptology (ISC) (2012)Google Scholar
  9. 9.
    Foo, S.W., Dong, Q.: A normalization-based robust image watermarking scheme using SVD and DCT. Acad. Sci. Eng. Technol. 6(1), 205–210 (2010)Google Scholar
  10. 10.
    Kintak, U., Shengdun, H., Dongxu, Q., Zesheng, T.: A robust image watermarking algorithm based on non-uniform rectangular partition and SVD. In: Pacific-Asia Conference on Knowledge Engineering And Software Engineering (KESE), pp. 163–166 (2009)Google Scholar
  11. 11.
    Takaya, K., Ma, T.-N.: Application of image reconstruction by means of chirp z-transform. In: IAPR Workshop on Machine Vision Application, pp. 77–80 (1990)Google Scholar
  12. 12.
    Tong, R., Cox, R.W.: Rotation of NMR images using the 2D chirp-z transform. Magn. Reson. Med. 41(2), 253–256 (1999)CrossRefGoogle Scholar
  13. 13.
    Bhavadas, K.N.: The Applications of Chirp Z-Transform Algorithm. Seminar Report at the Government Engineering College, Thrissur (2000)Google Scholar
  14. 14.
    Vaseghi, S.V.: Multimedia Signal Processing: Theory and Applications in Speech, Music and Communications, pp. 79–102. Wiley, New York (2007)CrossRefGoogle Scholar
  15. 15.
    Taylor, P.: Text-to-Speech Synthesis, pp. 297–308. Cambridge University Press, Cambridge, MA (2009)CrossRefGoogle Scholar
  16. 16.
    Rabiner, L.R., Schafer, R.W., Rader, C.M.: The chirp z-transform algorithm and its applications. Bell Syst. Tech. J., 1249–1292 (1969)Google Scholar
  17. 17.
    Stillings, S.A.: A Study of the Chirp Z-Transform Algorithm and its Applications, Technical Report. Kansas State University (1972)Google Scholar
  18. 18.
    Bradley, A.P.: Shift-invariance in the discrete wavelet transform. In: Proceedings of the VIIth Digital Image Computing: Techniques and Applications, pp. 29–38 (2003)Google Scholar
  19. 19.
    Anjum, S.R., Verm, P.: Performance evaluation of DWT based image watermarking using error correcting codes. Int. J. Adv. Comput. Res. 2, No. 4, Issue-7, 151–156 (2012)Google Scholar
  20. 20.
    Dejey, D., Rajesh, R.S.: Robust discrete wavelet-fan beam transforms-based colour image watermarking. IET Image Process 5(4), 315–322 (2011)CrossRefGoogle Scholar
  21. 21.
    Bedi, S.S., Kumar, A., Kapoor, P.: Robust secure SVD based DCT-DWT oriented watermarking technique for image authentication. Int. J. Comput. Internet Manag. 17(SP1), 46.1–46.7 (2009)Google Scholar
  22. 22.
    Abdulsattar, F.S.: Robust digital watermarking technique for satellite images. J. Eng. Dev. 16(2), 133–143 (2012)Google Scholar
  23. 23.
    Li, Q., Yuan C., Zhong, Y.: Adaptive DWT-SVD domain image watermarking using human visual model. In: The 9th International Conference on Advanced Communication Technology, pp. 1947–1951 (2007) Google Scholar
  24. 24.
    Liang, L., Qi, S.: A new SVD-DWT composite watermarking. In: 8th International Conference on Signal Processing (ICSP) (2006)Google Scholar
  25. 25.
    Chung, K., Yang, W., Huang, Y., Wu, S., Hsu, Y.: On SVD-based watermarking algorithm. Appl. Math. Comput. 188(1), 54–57 (2007)CrossRefMATHMathSciNetGoogle Scholar
  26. 26.
    Liu, G., Dong, Z., Yang, S., Zhao, X.: Power fundamental frequency detection based on orthometric average chirp-z transform. In: 18th International Conference on Automation and Computing (ICAC), pp. 1–6 (2012)Google Scholar
  27. 27.
    Ejima, M., Myazaki, A.: On the evaluation of performance of digital watermarking in the frequency domain. In: IEEE International Conference on Image Processing, pp. 546–549 (2001)Google Scholar
  28. 28.
    Al-Haj, A.: Combined DWT-DCT digital image watermarking. J. Comput. Sci. 3(9), 740–746 (2007)CrossRefGoogle Scholar
  29. 29.
    Kim, B., Choib, J., Parka, C., Wonc, J., Kwaka, D., Oha, S., Kohd, C., Parka, K.: Robust digital image watermarking method against geometrical attacks. Real-Time Imaging 9(2), 139–149 (2003)CrossRefGoogle Scholar
  30. 30.
    Song, C., Sudirman, S., Merabti, M., Llewellyn-Jones, D.T.: Analysis of digital image watermark attacks. In: 7th IEEE Consumer Communications and Network Conference (CCNC), pp. 1–5 (2010)Google Scholar
  31. 31.
    Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)Google Scholar
  32. 32.
    Rouse, D.M., Hemami, S.S.: Understanding and simplifying the structural similarity metric. In: IEEE International Conference on Image Processing (ICIP) (2008)Google Scholar
  33. 33.
    Abdallah, H.A., Hadhoud, M.M., Shaalan, A.A.: SVD-based watermarking scheme in complex wavelet domain for color video. In: International Conference on Computer Engineering & System (ICCES), pp. 455–460 (2009)Google Scholar

Copyright information

© Springer-Verlag London 2014

Authors and Affiliations

  • Mary Agoyi
    • 1
  • Erbuğ Çelebi
    • 1
  • Gholamreza Anbarjafari
    • 2
  1. 1.Faculty of Engineering, Department of Computer EngineeringCyprus International UniversityMersin 10Turkey
  2. 2.IMS Lab, Institute of TechnologyUniversity of TartuTartuEstonia

Personalised recommendations