Abstract
A hybrid watermarking scheme for authentication is presented, which demonstrates robustness against various attacks. Due to the different nature of filtering and geometrical attacks, two different watermarks are used in this scheme. The first one is embedded in frequency domain combined with a chaotic function and is based on the correlation method. The second watermark is embedded in luminosity histogram of the image. In this way, this hybrid watermarking scheme combines the robustness of chaotic domain against filtering, noise and compression attacks with the robustness of histogram domain against geometrical attacks.
Similar content being viewed by others
References
Berghel H., O’Gorman L.: Protecting ownership rights through digital watermarking. In: IEEE Comput. Mag. 29(7), 101–103 (1996)
Fotopoulos, V., Skodras, A.N.: Digital image watermarking: an overview. EURASIP Newsl. ISSN 1687–1421, 14(4), 10–19 (2003)
Hembrooke, E.F.: Identification of sound and like signals. United States Patent, 3, 004,104 (1961)
Fotopoulos, V.: Digital Image Watermarking. PhD thesis, University of Patras, Greece (2003)
Cox J., Miller L.: The first 50 Years of electronic watermarking. EURASIP J. Appl. Signal Process. 2002(2), 126–132 (2002)
Bukhari, K.Z.: Visual Data Transforms Comparison. Master’s Thesis, Delft University of Technology, The Netherlands (2002)
Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics (INDIN), Perth, Australia, 10–12 August (2005)
Serdean, C.V., Tomlinsin, M., Wade, G.J., Ambroze, A.M.: Protecting intellectual rights: digital watermarking in the wavelet domain. In: Proceedings of the IEEE International Workshop “Trends and Recent Achievements in Information Technology”, Cluj-Napoca, Romania, 16–18 May (2002)
Liu, J., Zhang, X., Sun, J., Lagunas, M.A.: A digital watermarking scheme based on ICA detection. In: 4th International Symposium on ICA and BSS (ICA2003), Nara, Japan (2003)
Yu D., Sattar F., Binkat B.: Multiresolution fragile watermarking using complex chirp signals for content authentication. Pattern Recognit. 39, 935–952 (2006)
Lee, S., Suh, Y., Ho, Y.: Lossless Data Hiding Based on Histogram Modification of Difference Images, PCM 2004, LNCS 3333, pp. 340–347 (2004)
Coatrieux, C.G., Lecornu, L., Roux, Ch., Sankur, B.: A review of image watermarking applications in healthcare. In: IEEE International Conference on Engineering in Medicine and Biology (EMBC 2006), New York, USA, September (2006)
Chrysochos, E., Fotopoulos, V., Skodras, A., Xenos M.: Reversible image watermarking based on histogram modification. In: 11th Panhellenic Conference on Informatics with international participation, Patras, Greece, 18–20, vol. B, pp. 93–104 (May 2007)
Pereira S., Pun T.: Fast robust template matching for affine resistant image watermarks. In: IEEE Trans. Image Process. 9, 1123–1129 (1999)
Csurka, G., Deguillaume, F., O’Rauanaidh, K., Pun, T.: A Bayesian approach to affine transformation resistant image and video watermarking. In: Third International Workshop, IH’99, Dresden, Germany, pp. 270–285, 29 September–1 October (1999)
Lin C., Wu M., Bloom J., Cox I., Miller M., Lui Y.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10(5), 767–782 (2001)
Lee C., Lee H.: Geometric attack resistant watermarking in wavelet transform domain. Opt. Soc. Am. 13(4), 1307–1321 (2005)
Arnold, V.I., Avez, A.: Problèmes Ergodiques de la Mécanique Classique, Paris, Gauthier-Villars (1967); English translation: (Ergodic Problems in Classical Mechanics) New York, Benjamin (1968)
Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proceedings of IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 2, pp. 237–240 (1996)
Zhao D., Guanrong C., Wenbo L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22, 47–54 (2004)
Yeh, G.H., Lee, G.C.: Toral fragile watermarking for localizing and recovering tampered image. In: IEEE Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong, pp. 321–324 (2005)
Wu Y.T., Shih F.Y.: Digital watermarking based on chaotic map and reference register. Pattern Recognit. 40(12), 3753–3763 (2007)
Li B., Xu J.W.: Period of arnold transformation and its application in image scrambling. J. Central S. Univ. Technol. 12(1), 278–282 (2005)
Fotopoulos, V., Skodras, A.: Transform domain watermarking: adaptive selection of the watermark’s position and length. In: Proceedings of the Visual Communications and Image Processing (VCIP2003), Lugano, Switzerland, 8–11 July (2003)
Gilani, S.A.M., Kostopoulos, I., Skodras, A.: Color image-adaptive watermarking. In: Proceedings of the 14th International Conference on Digital Signal Processing (DSP2002), Santorini, Greece, 1–3, vol. 2, pp. 721–724 (July 2002)
Fotopoulos, V., Skodras, A.: Improved watermark detection based on similarity diagrams. In: Signal Processing: Image Communication, vol. 17, pp. 337–345 (2002)
Dhanalakshmi R., Thaiyalnayaki K.: Dual watermarking scheme with encryption. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 7(1), 248–253 (2010)
Shikha T., Nishanth R., Bernito A., Neeraj K.J.: ADWT based dual image watermarking technique for authenticity and watermark protection. Signal Image Process. Int. J. (SIPIJ) 1(2), 33–45 (2010)
Ahmed F., Moskowitz I.S.: Phase signature-based image authentication watermark robust to compression and coding. Proc. SPIE 5561, 133–144 (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chrysochos, E., Fotopoulos, V., Xenos, M. et al. Hybrid watermarking based on chaos and histogram modification. SIViP 8, 843–857 (2014). https://doi.org/10.1007/s11760-012-0307-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11760-012-0307-3