Soft Computing

, Volume 22, Issue 7, pp 2369–2379 | Cite as

A new image watermarking technique based on periodic plus smooth decomposition (PPSD)

Methodologies and Application
  • 186 Downloads

Abstract

Robustness against geometric distortion is one of the crucial important issues in watermarking. The discrete Fourier transform (DFT)-based watermarking methods have been proposed to address this issue. However, the effect of the well-known “periodization artifact” caused by the DFT transform limits their application. In this paper, a novel watermarking scheme is proposed. This scheme is based on the periodic plus smooth image decomposition (PPSD). The PPSD is a simple and efficient way to deal with periodization artifacts arising from the use of the DFT transform on 2-D images. It consists in the decomposition of the discrete image into a periodic component that gathers most of the image information but avoids periodization artifacts, and a smooth (harmonic) component that presents very slow variations inside the image. The algorithm is evaluated in terms of imperceptibility and robustness. The experiments indicate that our developed PPSD technique can achieve high imperceptibility while showing good robustness to various kinds of attacks, including geometrical distortions.

Keywords

Watermarking PPSD DFT Periodization artifact Smooth component Periodic component 

Notes

Compliance with ethical standards

Conflict of interest

The authors declare that they have no competing interests.

References

  1. Agreste S, Puccio L (2011) Wavelet-based watermarking algorithms: theory, applications and critical aspects. Int J Comput Math 88(9):1885–1895MathSciNetCrossRefMATHGoogle Scholar
  2. Agreste S, Andaloro G (2008) A new approach to pre-processing digital image for wavelet-based watermark. J Comput Appl Math 221(2):274–283MathSciNetCrossRefMATHGoogle Scholar
  3. Aherrahrou N, Tairi H (2015a) PDE based scheme for multi-modal medical image watermarking. Biomed Eng Online 14(1):108CrossRefGoogle Scholar
  4. Aherrahrou N, Tairi H (2015b) The efficiency of PDE decomposition in images watermarking. Multimed Tools Appl 75(8):4593–4614. doi: 10.1007/s11042-015-2494-8 CrossRefGoogle Scholar
  5. Al-Haj A (2007) Combined DWT–DCT digital image watermarking. J Comput Sci 3(9):740–746CrossRefGoogle Scholar
  6. Amirgholipour (2009) Robust digital image watermarking based on joint DWT-DCT. Int J Digit Content Technol Appl (IEEE): 408–411Google Scholar
  7. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791CrossRefMATHGoogle Scholar
  8. Bas P, Furon T (2007) BOWS-2. http://bows2.ec-lille.fr/
  9. Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT–SVD. Comput Stand Interf 31(5):1002–1013CrossRefGoogle Scholar
  10. Bhatnagar G, Raman B (2011) A new robust reference logo watermarking scheme. Multimed Tools Appl 52(2–3):621–640CrossRefGoogle Scholar
  11. Bi N et al (2007) Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Trans Image Process 16(8):1956–1966MathSciNetCrossRefGoogle Scholar
  12. Chang C-C, Tsai P, Lin C-C (2005) SVD-based digital image watermarking scheme. Pattern Recognit Lett 26(10):1577–1586CrossRefGoogle Scholar
  13. Cox IJ, Kilian J, Leighton T, Shamoon T (1996) A secure, robust watermark for multimedia. In: International workshop on information hiding. Springer, Berlin, pp 185–206Google Scholar
  14. Dejey D, Rajesh RS (2011) Robust discrete wavelet-fan beam transforms-based colour image watermarking. IET Image Process 5(4):315–322CrossRefGoogle Scholar
  15. He D, Sun Q (2005) A practical print-scan resilient watermarking scheme. In: Proceedings—international conference on image processing, ICIP, pp 257–60Google Scholar
  16. Huang J, Shi YQ, Shi Y (2000) Embedding image watermarks in DC components. IEEE Trans Circ Syst Video Technol 10(6):974–979CrossRefGoogle Scholar
  17. Kim B-S et al (2003) Robust digital image watermarking method against geometrical attacks. Real Time Imag 9(2):139–149CrossRefGoogle Scholar
  18. Kim H-S, Baek Y, Lee H-K (2003) Rotation-, scale-, and translation-invariant image watermark using higher order spectra. Opt Eng 42(2):340–349CrossRefGoogle Scholar
  19. Lee Z-J, Lin S-W, Shun-Feng S, Lin C-Y (2008) A hybrid watermarking technique applied to digital images. Appl Soft Comput 8(1):798–808CrossRefGoogle Scholar
  20. Lin CY et al (2001) Rotation, scale, and translation resilient watermaking for images. IEEE Trans Image Process 10(5):767–782CrossRefMATHGoogle Scholar
  21. Lin W-H et al (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757CrossRefGoogle Scholar
  22. Liu F, Liu Y (2008) A watermarking algorithm for digital image based on DCT and SVD. In: Image and signal processing CISP’08. Congress on IEEE, pp 380–83Google Scholar
  23. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128CrossRefGoogle Scholar
  24. Liu Y, Zheng D, Zhao J (2007) An image rectification scheme and its applications in RST invariant digital image watermarking. Multimed Tools Appl 34(1):57–84CrossRefGoogle Scholar
  25. Lu W, Sun W, Hongtao L (2009) Robust watermarking based on DWT and nonnegative matrix factorization. Comput Elect Eng 35(1):183–188CrossRefMATHGoogle Scholar
  26. Miller ML, Bloom JA (1999) Computing the probability of false watermark detection. In: International workshop on information hiding. Springer, Berlin, pp 146–58Google Scholar
  27. Moisan L (2011) Periodic plus smooth image decomposition. J Math Imag Vis 39(2):161–179MathSciNetCrossRefMATHGoogle Scholar
  28. Nikolaidis A, Pitas I (2003) Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans Image Process 12(5):563–571CrossRefGoogle Scholar
  29. Parthasarathy AK, Kak S (2007) An improved method of content based image watermarking. IEEE Trans Broadcast 53(2):468–479CrossRefGoogle Scholar
  30. Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. In: Image processing. Proceedings of international conference on IEEE, pp 520–23Google Scholar
  31. Podilchuk CI, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Select Areas Commun 16(4):525–539CrossRefGoogle Scholar
  32. Poljicak A, Mandic L, Agic D (2011a) Discrete Fourier transform-based watermarking method with an optimal implementation radius. J Electron Imag 20(3):33008CrossRefGoogle Scholar
  33. Poljicak A, Mandic L, Agic D (2011b) Robustness of a DFT based image watermarking method against AM Halftoning. Tehnicki vjesnik 18(2):66–161Google Scholar
  34. Poor HV (2013) An introduction to signal detection and estimation. Springer Science & Business Media, BerlinMATHGoogle Scholar
  35. Raja KB, Chowdary CR, Venugopal KR, Patnaik LM (2005) A secure image steganography using LSB, DCT and compression techniques on raw images. 2005 3rd international conference on intelligent sensing and information processingGoogle Scholar
  36. Sadreazami H, Omair Ahmad M, Shanmukha Swamy MN (2014) A study of multiplicative watermark detection in the contourlet domain using alpha-stable distributions. IEEE Trans Image Process 23(10):4348–4360MathSciNetCrossRefMATHGoogle Scholar
  37. Solachidis V, Pitas L (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741–1753CrossRefMATHGoogle Scholar
  38. Sun G, Yu Y (2007) DWT based watermarking algorithm of color images. In: 2007 2nd IEEE conference on industrial electronics and applications, IEEE, pp 1823–26Google Scholar
  39. Tsui TK, Zhang X-P, Androutsos D (2008) Color image watermarking using multidimensional Fourier transforms. IEEE Trans Inf Forensics Secur 3(1):16–28CrossRefGoogle Scholar
  40. Urvoy M, Goudia D, Autrusseau F (2014) Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Trans Inform Forensics Secur 9(7):1108–1119CrossRefGoogle Scholar
  41. Wang J et al (2008) Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Sig Process 88(1):117–130CrossRefMATHGoogle Scholar
  42. Wang Y, Doherty JF, Van Dyck RE (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11(2):77–88CrossRefGoogle Scholar
  43. Zebbiche K, Khelifi F (2008) Region-based watermarking of biometric images: case study in fingerprint images. Int J Dig Multimed BroadcastGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2017

Authors and Affiliations

  1. 1.Department of InformaticsUniversity Sidi Mohamed Ben AbdellahFezMorocco

Personalised recommendations