Skip to main content
Log in

Chaotic system and QR factorization based robust digital image watermarking algorithm

  • Published:
Journal of Central South University of Technology Aims and scope Submit manuscript

Abstract

In order to protect copyright of digital images, a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed. The host images were firstly divided into blocks with same size, then QR factorization was performed on each block. Pseudorandom circular chain (PCC) generated by logistic mapping (LM) was applied to select the embedding blocks for enhancing the security of the scheme. The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts. Watermark extraction procedure was performed without the original cover image. The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques, especially when the image is attacked by cropping, noise pollution and so on. Analysis and discussion on robustness and security issues were also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. HO A T S, ZHU X Z, SHEN J, MARZILIANO P. Fragile watermarking based on encoding of the zeroes of the z-transform [J]. IEEE Trans on Information Forensics and Security, 2008, 3(3): 567–569.

    Article  Google Scholar 

  2. PHAN R C W. Tampering with a watermarking-based image authentication scheme [J]. Pattern Recognition, 2008, 41(11): 3493–3496.

    Article  MATH  Google Scholar 

  3. NI Rong-rong, RUAN Qiu-qi, ZHAO Yao. Pinpoint authentication watermarking based on a chaotic system [J]. Forensic Science International, 2008, 179(1): 5 4–62.

    Article  Google Scholar 

  4. SONG Wei, HOU Jian-jun, LI Zhao-hong. SVD and pseudorandom circular chain based watermarking for image authentication [J]. Journal of Beijing Jiaotong University, 2008, 32(2): 71–75. (in Chinese)

    Google Scholar 

  5. ALTUN O, SHARMA G, CELIK M U, BOCKO F M. A set theoretic framework for watermarking and its application to semi-fragile tamper detection[J]. IEEE Trans on Information Forensics & Security, 2006, 1(4): 479–492.

    Article  Google Scholar 

  6. MAHDIAN B, SAIC S. Blind authentication using periodic properties of interpolation [J]. IEEE Trans on Information Forensics & Security, 2008, 3(3): 529–538.

    Article  Google Scholar 

  7. SANG Jun, MOHAMMAD S A. Fragility and robustness of binary-phase-only-filter-based fragile/semi-fragile digital image watermarking [J]. IEEE Trans on Instrument & Measurement, 2008, 57(3): 595–606.

    Article  Google Scholar 

  8. ZHANG Hong-bin, YANG Chen. Image authentication scheme based on JPEG invariant and semi-fragile watermarking [J]. Journal of Beijing University of Technology, 2004, 30(2): 214–218. (in Chinese)

    Google Scholar 

  9. SUN Rui, SUN Hong, YAO Tian-ren. A SVD and quantization based semi-fragile watermarking technique for image authentication [C]// Proc IEEE ICSP2002, 6th Internal Conference on Signal Processing. Beijing: IEEE, 2002: 1952–1955.

    Google Scholar 

  10. ZHU Cong-xu, CHEN Zhi-gang. A novel spatial domain digital watermarking algorithm based on chaotic map [J]. Journal of Central South University of Technology: Science and Technology, 2005, 36(2): 272–276. (in Chinese)

    Article  Google Scholar 

  11. CHANG Chin-chen, TSAI Piyu, LIN Chia-chen. SVD-based digital image watermarking scheme [J]. Pattern Recognition Letters, 2005, 26(6): 1577–1586.

    Article  Google Scholar 

  12. TSUI T K, ZHANG Xiao-ping, ANDROUTSOS D. Color image watermarking using multidimensional Fourier transforms [J]. IEEE Trans on Information Forensics & Security, 2008, 3(1): 16–26.

    Article  Google Scholar 

  13. BRIASSOULI A, STRINTZIS M G. Locally optimum nonlinearities for DCT watermark detection [J]. IEEE Trans on Image Processing, 2004, 13(12): 1604–1617.

    Article  Google Scholar 

  14. BYUN K, LEE S, KIM H A. A watermarking method using quantization and statistical characteristics of wavelet transform [C]// Proc IEEE PDCAT2005, Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies. Dalian: IEEE, 2006: 689–693.

    Google Scholar 

  15. LI En-ping, LIANG Hua-qing. Blind image watermarking scheme based on wavelet tree quantization robust to geometric attacks [C]// Proc IEEE WCICA2006, Sixth World Congress on Intelligent Control and Automation. Dalian: IEEE, 2006: 10256–10260.

    Google Scholar 

  16. LIN Wei-hung, HORONG Shi-jinn, KAO Tzong-wann, FAN Ping-zhi, LEE Cheng-ling, PAN Yi. An efficient watermarking method based on significant difference of wavelet coefficient quantization [J]. IEEE Trans on Multimedia, 2008, 10(5): 746–757.

    Article  Google Scholar 

  17. KANG Xian-gui. HUANG Ji-wu. ZENG Wen-jun. Improving robustness of quantization-based image watermarking via adaptive recover [J]. IEEE Trans on Multimedia, 2008, 10(6): 953–959.

    Article  Google Scholar 

  18. ZHU Cong-xu, CHEN Zhi-gang. A security multipurpose image watermarking system model and algorithm [J]. Journal of Image and Graphics, 2008, 13(5): 894–899. (in Chinese)

    Google Scholar 

  19. AHN C J. Parallel detection algorithm using multiple QR decompositions with permuted channel matrix for SDM/OFDM [J]. IEEE Trans on Vehicular Technology, 2008, 57(4): 2578–2582.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Song  (宋伟).

Additional information

Foundation item: Project(2007AA01Z241-2) supported by the National High-tech Research and Development Program of China; Project(2006XM002) supported by Beijing Jiaotong University Science Foundation, China; Project(0910KYZY55) supported by the Fundamental Research Funds for the Central University in China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Song, W., Hou, Jj., Li, Zh. et al. Chaotic system and QR factorization based robust digital image watermarking algorithm. J. Cent. South Univ. Technol. 18, 116–124 (2011). https://doi.org/10.1007/s11771-011-0668-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-011-0668-8

Key words

Navigation