A Robust Image-Adaptive Public Watermarking Technique in Wavelet Domain
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [25]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    Most previous DWT-based watermarking algorithms belong to either private watermarking algorithms or fragile watermarking algorithms, but there are few DWT-based robust public watermarking techniques for copyright protection. By taking full advantage of the masking characteristics of the human visual system, first a JND (just noticed difference) threshold matrix based on block is given in this paper, and then a robust image-adaptive public watermarking technique operating in DWT domain is presented. Firstly, the 8? blocks of the original image are rearranged into a 1-D Hilbert sequence in Hilbert scanning order. Then two neighboring blocks are selected from the Hilbert sequence of the host image blocks in turn, and 1-level DWT is applied to the two chosen blocks. Finally, a corresponding detail subband is chose from three detail subbands of the two neighboring blocks at a time, respectively. A binary watermark with visually recognizable patterns is embedded into the host image by modifying the polarity of the average value of the two corresponding subbands. The embedded watermark is invisible to human eyes and adapted to the original image by exploiting the HVS masking characteristics. The experimental results show that the proposed algorithm is effective and robust to common image processing operations and some geometric distortions such as cropping, pinching, pixel-shift, and so on, especially, it receives better robustness under signal enhancement operations. So a conclusion can be made that the proposed technique is practical.

    Reference
    [1]Liu RZ, Tan TN. Survey of watermarking for digital images. Journal of China Institute of Communications, 2000,21(8):39~49 (in Chinese with English abstract).
    [2]Huang DR, Liu JF, Huang JW. An embedding strategy and algorithm for image watermarking in DWT domain. Journal of Software, 2002,13(7):1290~1297 (in Chinese with English abstract).
    [3]Podichuk CI, Zeng W. Image-Adaptive watermarking using visual models. IEEE Journal on Special Areas in Communications, 1998,16(4):525~539.
    [4]Pan R, Gao YX. Image watermarking method based on wavelet transform. Journal of Image and Graphics, 2002,7(7):667~671.
    [5]Hsu CT, Wu JL. Multiresolution watermarking for digital images. IEEE Transactions on Circuits and Systems-II: Analog and Digital Signal Processing, 1998,45(8):1097~1101.
    [6]Wang QS, Sun SH, Zheng WM. The fragile watermark embedding algorithm for digital audio signal. Chinese Journal of Computers, 2002,25(5):520~525 (in Chinese with English abstract).
    [7]Xie L, Arce GR. A blind wavelet based digital signature for image authentication. In: Theodoridis S, Pitas I, Stouraitis A, Kalouptsidis N, eds. Proceedings of the EUSIPCO-98, Signal Processing IX: Theories and Applications. Patras: Typorama Editions, 1998. 21~24.
    [8]Cao JG, Fowler JE, Younan NH. An image-adaptive watermark based on a redundant wavelet transform. In: Pitas I, ed. Proceedings of the IEEE International Conference on Image Processing. Thessaloniki, 2001. 277~280.
    [9]Barni M, Bartolini F, Piva A. Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 2001,10(5):783~791.
    [10]Niu XM, Lu ZM, Sun SH. Digital watermarking technique based on multiresolution decomposition. ACTA Electronica Sinica, 2000,28(8):1~4 (in Chinese with English abstract).
    [11]Zhang J, Wang NC, Cao K. A multiwavelet-based blind watermarking for digital image. Mini-Micro System, 2002,23(2):148~152 (in Chinese with English abstract).
    [12]Griffiths JG. Table-Driven algorithms for generating space-filling curves. Computer Aided Design, 1985,17(1):37~41.
    [13]Gostman C, Lindenbaum M. On the metric properties of discrete space-filling curves. IEEE Transactions on Image Processing, 1996,5(4):794~797.
    [14]Kankanhalli MS, Ramakrishnan KR. Content based watermarking of images. In: Effelsberg W, ed. Proceedings of the ACM Multimedia 98-Electronic, the 6th ACM International Multimedia Conference. New York: ACM Press, 1998. 61~70.
    [15]Shen LS, Zhuo L, Tian D, Wang KQ. Video Coding and Low Bit Rate Communications. Beijing: Publishing House of Electronics Industry, 2001. 85~87 (in Chinese).
    [16]Xiang H, Wang LD, Lin H, Shi JY. Digital watermarking systems with chaotic sequences. In: Wong PW, Delp EJ, eds. Security and Watermarking of Multimedia Contents. SPIE-the International Society for Optical Engineering Proceedings Series, Vol. 3657. Bellingham, Wash, 1999. 449~457.
    [17]Yang HF, Chen XW, Gao XW. A public watermarking based on DCT compression domain. In: Beijing Electronic Technology Institute, ed. Proceedings of the 4th China Information Hiding Workshop. Beijing: China Machine Press, 2002. 136~144 (in Chinese with English abstract).
    [18]刘瑞祯,谭铁牛.数字水印研究综述.通信学报,2000,21(8):39~49.
    [19]黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法.软件学报,2002,13(7):1290~1297.
    [20]潘蓉,高有行.基于小波变换的图像水印嵌入方法.中国图像图形学报,2002,7(3):667~671.
    [21]牛夏牧,陆哲明,孙圣和.基于多分辨率的数字水印技术.电子学报,2000,28(8):1~4.
    [22]王秋生,孙圣和,郑为民.数字音频信号的脆弱水印嵌入算法.计算机学报,2002,25(5):520~525.
    [23]张军,王能超,曹奎.一种基于多小波的盲的数字图像水印技术.小型微型计算机系统,2002,23(2):148~152.
    [24]沈兰荪,卓力,田栋,汪孔桥.视频编码与低码率传输.北京:电子工业出版社,2001.85~87.
    [25]杨恒伏,陈孝威,高新闻.基于DCT压缩域的公开水印算法.见:北京电子技术研究所编.全国第4届信息隐藏会议论文集.北京:机械工业出版社,2002.136~144.
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

杨恒伏,陈孝威.小波域鲁棒自适应公开水印技术.软件学报,2003,14(9):1652-1660

Copy
Share
Article Metrics
  • Abstract:4913
  • PDF: 5327
  • HTML: 0
  • Cited by: 0
History
  • Received:November 26,2002
  • Revised:March 20,2003
You are the first2044991Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063