Embedding Image Watermarks into Local Linear Singularity Coefficients in Ridgelet Domain

  • Xiao Liang
  • Wei Zhihui
  • Wu Huizhong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4270)


An adaptive watermarking algorithm operating in the ridgelet domain is proposed. Since the most significant coefficients of the ridgelet transform (RT) can represent the most energetic direction of an image with straight edge, the image is first partitioned into small blocks and RT is applied for each block. Followed by the multiplicative rule, the watermark sequence is casting into local linear singularity coefficients within the highest energy direction of each block. Through analyzing the distribution of the texture in ridgelet coefficients of each block, the feature of luminance masking and texture masking is incorporated to adjust the watermark’s embedding strength. Then the embedded watermark can be blindly detected by correlation detector. Experiments show that the proposed algorithm can achieve a better tradeoff between the robustness and transparency.


Image Watermark JPEG Compression Watermark Embedding Watermark Algorithm Fragile Watermark 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Briassouli, A., Tsakalides, P., Stouraitis, A.: Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models. IEEE Transactions on Multimedia 7, 700–714 (2005)CrossRefGoogle Scholar
  2. 2.
    Mauro, B., Alessandro, P.: Improved wavelet-based watermarking through pixel-wisemasking. IEEE Transactions on image processing 10, 783–791 (2001)MATHCrossRefGoogle Scholar
  3. 3.
    Mobasseri, B.G., Berger II, R.J.: A foundation for watermarking in compressed domain. IEEE Signal Processing Letters 12, 399–402 (2005)CrossRefGoogle Scholar
  4. 4.
    Victor, H., Mariko, N.-M., Hector, P.-M.: A robust DWT-based image watermarking algorithm. WSEAS Transactions and Communications 4, 1048–1057 (2005)Google Scholar
  5. 5.
    Do, M.N., Vetterli, M.: The finite ridgelet transform for image representation. IEEE Trans. Image Processing 12, 16–28 (2003)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Mohammad, E., Shantaram, V.: Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model. Pattern Recognition Letters 26, 1405–1411 (2005)CrossRefGoogle Scholar
  7. 7.
    Voloshynovskiy, S., Pereira, S., Iquise, V., et al.: Attack modeling: Towards a second generation watermarking benchmark. Signal processing 8, 1177–1214 (2001)CrossRefGoogle Scholar
  8. 8.
    Campisi, P., Kundur, D., Neri, A.: Robust digital watermarking in ridgelet domain. IEEE signal processing letters 11, 826–830 (2004)CrossRefGoogle Scholar
  9. 9.
    Fabien, R.J.A., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 15–17. Springer, Heidelberg (1998)Google Scholar
  10. 10.
    Bogumil, D.: An asymmetric image watermarking scheme resistant against geometrical distortions. Signal Processing Image Communication 21, 59–66 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Xiao Liang
    • 1
  • Wei Zhihui
    • 1
  • Wu Huizhong
    • 1
  1. 1.School of Computer Science and TechnologyNanjing University of Science and TechnologyNanjingChina

Personalised recommendations