Advertisement

A Reference Based Secure and Robust Zero Watermarking System

  • Satendra Pal SinghEmail author
  • Gaurav Bhatnagar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1022)

Abstract

In this paper, a new approach for zero-watermarking has been proposed based on log-polar mapping, all phase biorthogonal sine transform and singular value decomposition. The core idea is to produce a zero watermark to protect the copyright of the image. For this purpose, the host image is transformed into the log-polar domain followed by the all phase biorthogonal sine transform (APBST). The transformed coefficients are then divided into nonoverlapping blocks and some blocks are selected based on secret key. These blocks are finally used to formulate a reference matrix which is utilized to generate a zero watermark for the host image. A detailed experimental analysis is conducted to demonstrate the feasibility of the proposed algorithm against various image/signal processing distortions.

Keywords

Zero watermarking Log-polar mapping Singular value decomposition (SVD) 

Notes

Acknowledgements

The authors gratefully acknowledges the support of Science and Engineering Research Board, DST, India for this research work.

References

  1. 1.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques For Steganography and Digital Watermarking. Artech House, Boston (2002)Google Scholar
  2. 2.
    Singh, S.P., Bhatnagar, G.: A new robust watermarking system in integer DCT domain. J. Vis. Commun. Image Represent. 53, 86–101 (2018)CrossRefGoogle Scholar
  3. 3.
    Singh S.P., Bhatnagar G.: A novel chaos based robust watermarking framework. In: International Conference on Computer Vision and Image Processing, CVIP, vol. 2, pp. 439–447 (2017)Google Scholar
  4. 4.
    Wjtowicz, W., Ogiela, M.R.: Digital images authentication scheme based on bimodal biometric watermarking in an independent domain. J. Vis. Commun. Image Represent. 38, 1–10 (2016)CrossRefGoogle Scholar
  5. 5.
    Wen, Q., Sun, T.F., Wang, S.X.: Concept and application of zero-watermark. Acta Electron. Sin. 31(2), 214–216 (2003)Google Scholar
  6. 6.
    Kou, J.K., Wei, L.X.: Zero-watermarking algorithm based on piecewise logistic chaotic map. Comput. Eng. Des. 34(2), 464–468 (2013)Google Scholar
  7. 7.
    Li, F., Gao, T., Yang, Q.: A novel zero-watermark copyright authentication scheme based on lifting wavelet and Harris corner detection. Wuhan Univ. J. Nat. Sci. 5, 408–414 (2010)MathSciNetGoogle Scholar
  8. 8.
    Leng X., Xiao J., Wang Y.: A robust image zero-watermarking algorithm based on DWT and PCA. In: Communications and Information Processing, pp. 484–492 (2012)Google Scholar
  9. 9.
    Wang, C.P., Wang, X.Y., Xia, Z.Q., Zhang, C., Chen, X.J.: Geometrically resilient color image zero-watermarking algorithm based on quaternion exponent moments. J. Vis. Commun. Image Represent. 41, 247–259 (2016)CrossRefGoogle Scholar
  10. 10.
    Young, D.: Straight lines and circles in the log-polar image. In: British Machine Vision Conference, pp. 426–435 (2000)Google Scholar
  11. 11.
    Saxena, A., Fernandes, F.C.: DCT/DST based transform coding for intra-prediction in image/video coding. IEEE Trans. Image Process. 22(10), 3974–3981 (2013)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Sui, L., Gao, B.: Color image encryption based on gyrator transform and Arnold transform. Opt. Laser Technol. 48, 530–538 (2016)CrossRefGoogle Scholar
  13. 13.
    Chen, T.H., Horng, G., Lee, W.B.: A publicly verifiable copyright-proving scheme resistant to malicious attacks. IEEE Trans. Ind. Electron. 52(1), 327–334 (2005)CrossRefGoogle Scholar
  14. 14.
    Chang, C.C., Lin, P.Y.: Adaptive watermark mechanism for rightful ownership protection. J. Syst. Softw. 81(7), 1118–1129 (2008)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of MathematicsIndian Institute of Technology JodhpurJodhpurIndia

Personalised recommendations