Skip to main content
Log in

Hybrid watermarking based on chaos and histogram modification

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

A hybrid watermarking scheme for authentication is presented, which demonstrates robustness against various attacks. Due to the different nature of filtering and geometrical attacks, two different watermarks are used in this scheme. The first one is embedded in frequency domain combined with a chaotic function and is based on the correlation method. The second watermark is embedded in luminosity histogram of the image. In this way, this hybrid watermarking scheme combines the robustness of chaotic domain against filtering, noise and compression attacks with the robustness of histogram domain against geometrical attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Berghel H., O’Gorman L.: Protecting ownership rights through digital watermarking. In: IEEE Comput. Mag. 29(7), 101–103 (1996)

    Google Scholar 

  2. Fotopoulos, V., Skodras, A.N.: Digital image watermarking: an overview. EURASIP Newsl. ISSN 1687–1421, 14(4), 10–19 (2003)

  3. Hembrooke, E.F.: Identification of sound and like signals. United States Patent, 3, 004,104 (1961)

  4. Fotopoulos, V.: Digital Image Watermarking. PhD thesis, University of Patras, Greece (2003)

  5. Cox J., Miller L.: The first 50 Years of electronic watermarking. EURASIP J. Appl. Signal Process. 2002(2), 126–132 (2002)

    Article  MATH  Google Scholar 

  6. Bukhari, K.Z.: Visual Data Transforms Comparison. Master’s Thesis, Delft University of Technology, The Netherlands (2002)

  7. Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics (INDIN), Perth, Australia, 10–12 August (2005)

  8. Serdean, C.V., Tomlinsin, M., Wade, G.J., Ambroze, A.M.: Protecting intellectual rights: digital watermarking in the wavelet domain. In: Proceedings of the IEEE International Workshop “Trends and Recent Achievements in Information Technology”, Cluj-Napoca, Romania, 16–18 May (2002)

  9. Liu, J., Zhang, X., Sun, J., Lagunas, M.A.: A digital watermarking scheme based on ICA detection. In: 4th International Symposium on ICA and BSS (ICA2003), Nara, Japan (2003)

  10. Yu D., Sattar F., Binkat B.: Multiresolution fragile watermarking using complex chirp signals for content authentication. Pattern Recognit. 39, 935–952 (2006)

    Article  MATH  Google Scholar 

  11. Lee, S., Suh, Y., Ho, Y.: Lossless Data Hiding Based on Histogram Modification of Difference Images, PCM 2004, LNCS 3333, pp. 340–347 (2004)

  12. Coatrieux, C.G., Lecornu, L., Roux, Ch., Sankur, B.: A review of image watermarking applications in healthcare. In: IEEE International Conference on Engineering in Medicine and Biology (EMBC 2006), New York, USA, September (2006)

  13. Chrysochos, E., Fotopoulos, V., Skodras, A., Xenos M.: Reversible image watermarking based on histogram modification. In: 11th Panhellenic Conference on Informatics with international participation, Patras, Greece, 18–20, vol. B, pp. 93–104 (May 2007)

  14. Pereira S., Pun T.: Fast robust template matching for affine resistant image watermarks. In: IEEE Trans. Image Process. 9, 1123–1129 (1999)

    Google Scholar 

  15. Csurka, G., Deguillaume, F., O’Rauanaidh, K., Pun, T.: A Bayesian approach to affine transformation resistant image and video watermarking. In: Third International Workshop, IH’99, Dresden, Germany, pp. 270–285, 29 September–1 October (1999)

  16. Lin C., Wu M., Bloom J., Cox I., Miller M., Lui Y.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10(5), 767–782 (2001)

    Article  MATH  Google Scholar 

  17. Lee C., Lee H.: Geometric attack resistant watermarking in wavelet transform domain. Opt. Soc. Am. 13(4), 1307–1321 (2005)

    Google Scholar 

  18. Arnold, V.I., Avez, A.: Problèmes Ergodiques de la Mécanique Classique, Paris, Gauthier-Villars (1967); English translation: (Ergodic Problems in Classical Mechanics) New York, Benjamin (1968)

  19. Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proceedings of IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 2, pp. 237–240 (1996)

  20. Zhao D., Guanrong C., Wenbo L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22, 47–54 (2004)

    Article  MATH  Google Scholar 

  21. Yeh, G.H., Lee, G.C.: Toral fragile watermarking for localizing and recovering tampered image. In: IEEE Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong, pp. 321–324 (2005)

  22. Wu Y.T., Shih F.Y.: Digital watermarking based on chaotic map and reference register. Pattern Recognit. 40(12), 3753–3763 (2007)

    Article  MATH  Google Scholar 

  23. Li B., Xu J.W.: Period of arnold transformation and its application in image scrambling. J. Central S. Univ. Technol. 12(1), 278–282 (2005)

    Article  Google Scholar 

  24. Fotopoulos, V., Skodras, A.: Transform domain watermarking: adaptive selection of the watermark’s position and length. In: Proceedings of the Visual Communications and Image Processing (VCIP2003), Lugano, Switzerland, 8–11 July (2003)

  25. Gilani, S.A.M., Kostopoulos, I., Skodras, A.: Color image-adaptive watermarking. In: Proceedings of the 14th International Conference on Digital Signal Processing (DSP2002), Santorini, Greece, 1–3, vol. 2, pp. 721–724 (July 2002)

  26. Fotopoulos, V., Skodras, A.: Improved watermark detection based on similarity diagrams. In: Signal Processing: Image Communication, vol. 17, pp. 337–345 (2002)

  27. Dhanalakshmi R., Thaiyalnayaki K.: Dual watermarking scheme with encryption. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 7(1), 248–253 (2010)

    Google Scholar 

  28. Shikha T., Nishanth R., Bernito A., Neeraj K.J.: ADWT based dual image watermarking technique for authenticity and watermark protection. Signal Image Process. Int. J. (SIPIJ) 1(2), 33–45 (2010)

    Article  Google Scholar 

  29. Ahmed F., Moskowitz I.S.: Phase signature-based image authentication watermark robust to compression and coding. Proc. SPIE 5561, 133–144 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Chrysochos.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chrysochos, E., Fotopoulos, V., Xenos, M. et al. Hybrid watermarking based on chaos and histogram modification. SIViP 8, 843–857 (2014). https://doi.org/10.1007/s11760-012-0307-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-012-0307-3

Keywords

Navigation