Skip to main content

Advertisement

Log in

Bat optimized 3D anaglyph image watermarking based on maximum noise fraction in the digital Shearlet domain

  • 1205: Emerging Technologies for Information Hiding and Forensics in Multimedia Systems
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The unparalleled growth of multimedia data sharing through the internet has made copyright protection and authentication a topical affair. In this paper, we propose a robust watermarking scheme for 3D red-cyan anaglyph stereo image authentication and copyright protection with Maximum Noise Fraction in the digital Shearlet domain. A precise Human Visual System-based approach has been integrated via Digital Shearlet Transform, to make full utilization of perceptual watermarking. The highest energy Maximum Noise Fraction Eigen image has been selected via entropy calculation followed by impregnation of the watermark inside the highest energy first Eigen image returned by Maximum Noise Fraction, using a total insertion based approach. An efficient watermarking approach is always a trade-off between imperceptibility and robustness. A reliable metaheuristic optimization approach, namely the Bat algorithm has been incorporated to find the optimum embedding factor, which provides high robustness while maintaining sublime imperceptibility. Moreover, the watermark’s security has further been improved by encrypting it with a novel Hénon chaotic system-based cryptic algorithm. Qualitative and quantitative comparison with other state-of-the-art methods is a proof of the primacy of the proposed framework under most intentional and unintentional malicious impairments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

References

  1. Ahmaderaghi B, Kurugollu F, Rincon JMD, Bouridane A (2018) Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Trans Comput Imaging 4(1):46–59. https://doi.org/10.1109/tci.2018.2794065

    Article  MathSciNet  Google Scholar 

  2. Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75 (14):8695–8718

    Article  Google Scholar 

  3. Bhatnagar G, Wu J, Raman B (2011) A robust security framework for 3D images. J Vis 14(1):85–93. https://doi.org/10.1007/s12650-010-0067-5

    Article  Google Scholar 

  4. Devi HS, Singh KM (2016) A robust and optimized 3D red-cyan anaglyph blind image watermarking in the DWT domain. Contemp Eng Sci 9 (29-32):1575–1589. https://doi.org/10.12988/ces.2016.69156

    Article  Google Scholar 

  5. Devi HS, Singh KM (2017) A novel, efficient, robust, and blind imperceptible 3D anaglyph image watermarking. Arab J Sci Eng 42(8):3521–3533. https://doi.org/10.1007/s13369-017-2531-1

    Article  Google Scholar 

  6. Devi HS, Singh KM (2020) Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection. J Inf Secur Appl 50:102424. https://doi.org/10.1016/j.jisa.2019.102424

    Google Scholar 

  7. Dhaou D, Ben Jabra S, Zagrouba E (2019) A review on anaglyph 3D image and video watermarking. 3D res 10(2). https://doi.org/10.1007/s13319-019-0223-1

  8. Golub GH, Loan CV (1996) Matrix Computations, 3edn. Johns Hopkins University Press, Baltimore

    MATH  Google Scholar 

  9. Green AA, Berman M, Switzer P, Craig MD (1988) A transformation for ordering multispectral data in terms of image quality with implications for noise removal. IEEE Trans Geosci Remote Sens 26(1):65–74. https://doi.org/10.1109/36.3001

    Article  Google Scholar 

  10. Guo K, Kutyniok G, Labate D (2006) Sparse multidimensional representations using anisotropic dilation and shear operators. In: Wavelets und splines, pp 189–201

  11. Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1):69–77. https://doi.org/10.1007/BF01608556

    Article  MathSciNet  Google Scholar 

  12. Hirschmüller H, Scharstein D (2007) Evaluation of cost functions for stereo matching. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp 1–8, Minneapolis, Minnesota, USA. https://doi.org/10.1109/CVPR.2007.383248

  13. Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun. 65:46–66. https://doi.org/10.1016/j.image.2018.03.012

    Article  Google Scholar 

  14. Kaur G, Singh S, Rani R (2020) A high capacity reversible data hiding technique based on pixel value ordering using interlock partitioning. In: Proceedings of the 7th International Conference Signal Processing Integrated Networks, pp. 727–732, Noida, India. https://doi.org/10.1109/SPIN48934.2020.9071330

  15. Koley S (2019) A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography. J. King Saud Univ. - Comput. Inf Sci. https://doi.org/10.1016/j.jksuci.2019.03.002

  16. Koley S. (2020) Hardware implementation of a fast 3D anaglyph image watermarking framework for integration in consumer electronics devices. In: Proceedings of the 5th Zooming Innovated Consumer Electronic International Conference, pp 1–6, Novi Sad, Serbia

  17. Kumar R, Chand S, Singh S (2018) An improved histogram-shifting-imitated reversible data hiding based on HVS characteristics. Multimed Tools Appl 77(11):13445–13457. https://doi.org/10.1007/s11042-017-4960-y

    Article  Google Scholar 

  18. Kumar R, Chand S, Singh S (2019) An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes. Multimed Tools Appl 78(16):22977–23001. https://doi.org/10.1007/s11042-019-7640-2

    Article  Google Scholar 

  19. Kumar R, Jung KH (2019) A systematic survey on block truncation coding based data hiding techniques. Multimed Tools Appl 78(22):32239–32259. https://doi.org/10.1007/s11042-019-07997-0

    Article  Google Scholar 

  20. Kutyniok G, Lim WQ, Zhuang X (2012) Digital shearlet transforms. In: Kutyniok G, Labate D (eds) Shearlets: Multiscale analysis for multivariate data, pp 239–282. Birkhäuser Boston, Boston. https://doi.org/10.1007/978-0-8176-8316-0_7

  21. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128. https://doi.org/10.1109/6046.985560

    Article  Google Scholar 

  22. Luo G, Chen G, Tian L, Qin K, Qian SE (2016) Minimum noise fraction versus principal component analysis as a preprocessing step for hyperspectral imagery denoising. Can J Remote Sens 42(2):106–116. https://doi.org/10.1080/07038992.2016.1160772

    Article  Google Scholar 

  23. Malik S, Reddlapalli RK (2019) Histogram and entropy based digital image watermarking scheme. Int J Inf Technol 11(2):373–379. https://doi.org/10.1007/s41870-018-0259-0

    Google Scholar 

  24. Muñoz-Ramírez DO, Reyes-Reyes R, Ponomaryov V, Cruz-Ramos C (2015) Invisible digital color watermarking technique in anaglyph 3D images. In: Proceedings of the 12th International Conference on Electronic Engineering and Computer Science Automated Control, pp 1–6, Mexico City, Mexico. https://doi.org/10.1109/ICEEE.2015.7357955

  25. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137. https://doi.org/10.1016/j.sigpro.2017.03.011

    Article  Google Scholar 

  26. Prathap I, Anitha R (2014) Robust and blind watermarking scheme for three dimensional anaglyph images. Comput Electr Eng 40(1):51–58. https://doi.org/10.1016/j.compeleceng.2013.11.005

    Article  Google Scholar 

  27. Scharstein D, Pal C (2007) Learning conditional random fields for stereo. In: Proc. IEEE comput. soc. conf. comput. vis. pattern recognit., pp 1–8. Minneapolis, Minnesota, USA. https://doi.org/10.1109/CVPR.2007.383191

  28. Tibaduiza DA, Mujica LE, Anaya M, Rodellar J, Güemes A (2013) Principal component analysis vs. independent component analysis for damage detection. In: Proceedings sixth european workshop on structural health monitoring, pp 1–8. Germany

  29. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612. https://doi.org/10.1109/TIP.2003.819861

    Article  Google Scholar 

  30. Wang C, Han F, Zhuang X (2015) Robust digital watermarking scheme of anaglyphic 3D for RGB color images. Int J Image Process 9(3):156–165

    Google Scholar 

  31. Weber A (1981) The USC-SIPI Image Database. http://sipi.usc.edu/database

  32. Wu Y, Noonan J, Agaian S (2011) NPCR And UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1 (2):31–38

    Google Scholar 

  33. Yan X, Wang S, Abd El-Latif AA, Niu X (2015) Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimed Tools Appl 74(9):3231–3252

    Article  Google Scholar 

  34. Yang X.S (2010) A New Metaheuristic Bat-Inspired Algorithm. Springer Berlin Heidelberg, Berlin, pp 65–74. https://doi.org/10.1007/978-3-642-12538-6_6

    MATH  Google Scholar 

  35. Zebbiche K, Khelifi F, Loukhaoukha K (2018) Robust additive watermarking in the DTCWT domain based on perceptual masking. Multimed. Tools Appl. 77(16):21281–21304. https://doi.org/10.1007/s11042-017-5451-x

    Article  Google Scholar 

Download references

Acknowledgements

This work presented in this article, was done at the RCC Institution of Information Technology, Kolkata, India during 2018-2019.

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or non-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Subhadeep Koley: Conceptualization, Methodology, Software, Investigation, Validation, Writing – Original draft preparation, Reviewing, and editing.

Corresponding author

Correspondence to Subhadeep Koley.

Ethics declarations

Conflict of Interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Koley, S. Bat optimized 3D anaglyph image watermarking based on maximum noise fraction in the digital Shearlet domain. Multimed Tools Appl 81, 19491–19523 (2022). https://doi.org/10.1007/s11042-021-11861-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11861-5

Keywords

Navigation