Abstract
Robustness is the important issue in watermarking, robustness at the same time with blind watermark recovering algorithm remains especially challenging. This paper presents a combined DWT and DCT still image blind watermarking algorithm. The two-level DWT are performed on the original image, the low-frequency sub-band is divided into blocks, the DCT is performed on the every block, the DCT coefficients of every block are sorted using Zig-Zag order, the DCT low-frequency coefficient is selected as embedding watermarking. The watermarking signals are embedded into the selected embedding points using the modular arithmetic. The watermark recovering is the inverse process of the watermark embedding, according to the answer of the modular arithmetic, we can estimate the value of embedded the watermark. The algorithm is compared with a pure DWT-based scheme Experiment results shown that the proposed algorithm is robust to many attacks such as JPEG compression, addition noise, cropping, JPEG compression, median filter, rotation, and resize etc. Proposed algorithm is shown to provide good results in term of image imperceptibility, too.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tao B. and Dickinson B, “Adaptive Watermarking in the DCT Domain,” Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing, Munich, German, vol..4 , pp.21-24, 1997.
Mayank Vatsa, Richa Singh, “Robust Biometric Image Watermarking for Fingerprint and Face Template Protection,” IEICE Electronics Express,. vol.3, pp. 23-28, 2006.
Grgic S., Grgic M., Zovko-Cihlar B, “Performance analysis of image compression using wavelets,” IEEE Transactions on Industrial Electronics, vol.48, pp.682-695, 2002
Wattson A. B,. “Image Compression using the Discrete Cosine Transform,” Mathematics Journal, vol 4, pp 81-88, 1994.
Nikolaidis N, Pitas I, “Robust Image Watermarking in the Spatial Domain,” Signal Processing, vol. 66, pp. 385-403, 1998.
Chaw-Seng Woo, Jiang Du, and Binh Pham, “Performance Factors Analysis of a Wavelet based Watermarking Method,” Third Australasian Information Security Workshop (AISW2005), 30 January- 3 February, Newcastle, Australia, vol. 44, pp. 89-97, 2005
Voloshynovskiy S., Pereira S., Iquise V., and Pun T, “Attack Modeling Towards a Second Generation Watermarking,” Benchmark. Signal Processing, vol. 81, pp. 1177-1214, 2001.
Watson A.B., Yang G.Y., Solomon J.A., Villasenor J, “Visibility of Wavelet Quantization Noise,” IEEE Transactions on Image Processing,, vol. 6, pp. 1164-1175, 1997.
Boukerrou, Kamel, Kurz, and Ludwik, “Suppression of ‘Salt and Pepper’ Noise Based on Youden Designs,” Information Sciences, vol. 110, pp. 217-235, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this paper
Cite this paper
Jin, C., Zhang, Z., Jiang, Y., Qu, Z., Ma, C. (2007). A Blind Watermarking Algorithm Based on Modular Arithmetic in the Frequency Domain. In: Elleithy, K. (eds) Advances and Innovations in Systems, Computing Sciences and Software Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6264-3_94
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6264-3_94
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6263-6
Online ISBN: 978-1-4020-6264-3
eBook Packages: EngineeringEngineering (R0)