Skip to main content
Log in

A novel zero-watermark copyright authentication scheme based on lifting wavelet and Harris corner detection

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In this paper, a novel zero-watermark copyright authentication scheme based on Internet public certification system is proposed. This approach utilizes Haar integer wavelet transform based on a lifting scheme and adaptive Harris corner detection to extract image features, which will be used to produce a binary feature map, and the map is very crucial to the generation of watermark registered later. By properly choosing the parameters of aforementioned techniques such as the threshold T and the radius of local feature region R, the feature map is so much more stable and distinguishing that it can be used to construct robust watermark. Simulations demonstrate that the proposed scheme is resistant to many kinds of signal processing and malicious attacks such as Gaussian blurring, additive noising, JPEG lossy compression, cropping, scaling and slight rotation operation. Compared with a relative scheme such as that of Chang’s, the scheme in this paper is more practicable and reliable and can be applied to the area of copyright protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. O’Ruanaidh J J K, Pereira S. A secure robust digital image watermark [C]// Proceedings of Electronic Imaging: Processing, Printing, and Publishing in Color, Zurich: International Society for Optical Engineering Press, 1998: 150–163.

  2. Cox I J, Kilian J, Leighton T, et al. A secure, robust watermark for multimedia [J]. Lecture Notes in Computer Science, Heidelberg: Springer Berlin, 1996, 1174: 185–206.

    Google Scholar 

  3. Lin C Y, Wu M, Bloom J A, et al. Rotation, scale, and translation resilient watermarking for images [J], IEEE Transactions on image processing, 2001, 10(5): 767–782.

    Article  MATH  Google Scholar 

  4. Tang Y L, Wang C P. A Robust Watermarking algorithm based on salient image features [C]//Proceedings of Int Conf on Intelligent Information Hiding and Multimedia Signal Processing, Harbin: IEEE Computer Society Press, 2008: 1137–1140.

    Chapter  Google Scholar 

  5. Liu J L, Lou D C, Chang M C, et al. A Robust watermarking scheme using self-reference image [J]. Computer Standards & Interfaces, 2006, 28(3): 356–367.

    Article  Google Scholar 

  6. Fan Li, Gao Tiegang. A novel blind robust watermarking scheme based on statistic characteristic of wavelet domain coefficients[C]//Proceedings of IEEE International Conference on Signal Processing Systems, Singapore: IEEE Computer Society Press, 2009: 121–125.

    Google Scholar 

  7. Gao Tiegang, Gu Qiaolun, Emmanuel S. A novel image authentication scheme based on hyper-chaotic cell neural network [J]. Chaos, Solitons & Fractals. 2009, 42(1): 548–553.

    Article  Google Scholar 

  8. Gao Tiegang, Gu Qiaolun. Reversible watermarking algorithm based on wavelet lifting scheme [C]// Proceedings of Int Conf on Wavelet Analysis and Pattern Recognition, Beijing: IEEE Computer Society Press, 2007: 1771–1775.

    Google Scholar 

  9. Gu Qiaolun, Gao Tiegang. Public Watermarking for reversible image authentication [C]// Proceedings of Congress on Image and Signal Processing, Sanya: IEEE Computer Society Press, 2008: 95–99.

    Chapter  Google Scholar 

  10. Gao Xinbo, An Lingling, Li Xuelong, et al. Reversibility improved lossless data hiding [J]. Signal Processing, 2009, 89(10): 2053–2065.

    Article  MATH  Google Scholar 

  11. Ma Jianhu, Guan Yujing, Hua Zhaoyu. A method of zero-watermark based on lifting wavelet [C]// Proceedings of Int Conf on Wavelet Analysis and Pattern Recognition, Beijing: IEEE Computer Society Press, 2007: 239–243.

    Google Scholar 

  12. Jing Li, Li Shuhong. Robust Zero-watermarking scheme using local invariant keypoints [C]// Proceedings of Int Conf on Multimedia Systems & Signal Processing, Hangzhou: IEEE Computer Society Press, 2007: 39–44.

    Google Scholar 

  13. Jing Li, Zhang Yadong, Chen Guangyu. Zero-watermarking for copyright protection of remote sensing image [C]// Proceedings of the 9th International Conference on Signal Processing. Beijing: IEEE Computer Society Press, 2008: 1083–1086.

    Chapter  Google Scholar 

  14. Jing Li, Liu Fenlin. Double zero-watermarks scheme utilizing scale invariant feature transform and log-polar mapping [C]// Proceedings of the IEEE International Conference on Multimedia and Expo. Beijing: IEEE Computer Society, 2007: 2118–2121.

    Chapter  Google Scholar 

  15. Sang J, Alam M S. A neural network based lossless digital image watermarking in the spatial domain [J]. Advances in Neural Networks. 2005, 3497: 772–776.

    Google Scholar 

  16. Du Qiaozhuo, Peng Fei. A zero-watermark algorithm with real-mean for 2D engineering graphic [C]// Proceedings of International Symposium on Electronic Commerce and Security. Guangzhou: IEEE Computer Society Press, 2008: 890–893.

    Chapter  Google Scholar 

  17. Qun Xiongyi, Ding Wangrang. An audio zero-watermark algorithm combined DCT with zernike moments [C]// Proceedings of Int Conf on Cyberworlds, Hangzhou: IEEE Computer Society Press, 2008: 11–15.

    Google Scholar 

  18. Lee W B, Chen T H. A public verifiable copy protection technique for still images [J]. The Journal of Systems and Software, 2002, 62: 195–204.

    Article  Google Scholar 

  19. Chen T H, Horng G B, Lee W B. A publicly verifiable copyright-proving scheme resistant to malicious attacks [J]. IEEE Transactions on Industrial Electronics, 2005, 52(1): 327–334.

    Article  Google Scholar 

  20. Hsieh S L, Huang B Y. A copyright protection scheme for gray-level images based on Image secret sharing and wavelet transformation [C]// Proceedings of International Computer Symposium. Taipei: World Academy of Science, Engineering and Technology Press, 2004: 661–666.

    Google Scholar 

  21. Hsieh S L, Hsu L Y, Tsai I J. A copyright protection scheme for color images using secret sharing and wavelet transform [C]// Proceedings of World Academy of Science, Engineering and Technology. Taipei: World Academy of Science, Engineering and Technology Press, 2005: 17–23.

    Google Scholar 

  22. Lou D C, Tso H K, Liu J L. A copyright protection scheme for digital images using visual cryptography technique [J]. Computer Standards & Interfaces, 2007, 29: 125–131.

    Article  Google Scholar 

  23. Chen T H, Chang C C, Wu C S, et al. On the security of a copyright protection scheme based on visual cryptography [J]. Computer Standards & Interfaces, 2009, 31: 1–5.

    Article  Google Scholar 

  24. Chang C C, Hsiao J Y, Chiang C L. An image copyright protection scheme based on torus automorphism [C]// Proceedings of the First International Symposium on Cyber Worlds. Tokyo: IEEE Computer Society Press, 2002: 217–224.

    Chapter  Google Scholar 

  25. Chang C C, Lin P Y. Adaptive watermark mechanism for rightful ownership protection [J]. Journal of Systems and Software, 2008, 81(7): 1118–1129

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tiegang Gao.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60873117) and the Key Program of Natural Science Foundation of Tianjin (07JCZDJC06600)

Biography: FAN Li, male, Master, research direction: digital watermarking and encryption algorithm.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fan, L., Gao, T. & Yang, Q. A novel zero-watermark copyright authentication scheme based on lifting wavelet and Harris corner detection. Wuhan Univ. J. Nat. Sci. 15, 408–414 (2010). https://doi.org/10.1007/s11859-010-0675-x

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-010-0675-x

Key words

CLC number

Navigation