A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition

Multimedia security has been the focal point of considerable research activity in the last decade, mainly because of its wide application area. Watermarking, in particular, is identified as a major technology to achieve copyright protection and multimedia security. Therefore, recent studies in the literature include some evident approaches for embedding data into a multimedia element. Because of its useful frequency component separation, the discrete wavelet transform (DWT) is commonly used in watermarking schemes. Moreover, singular value decomposition (SVD) and lower-and-upper (LU) decomposition have little effect on the perception of the watermark. Therefore, in this study, a combination of DWT and SVD via LU decomposition is proposed as a new nonblind watermarking algorithm that requires cover work to detect the watermark. Experimental results show that the proposed algorithm is considerably robust and reliable against certain attacks without degrading the input image, by embedding a binary watermark on the low-low band. Moreover, the threshold values are data-dependent for watermarks after attacks; that is, the threshold value is always different from another for certain attacks so that similarity ratios in this algorithm, as a quality metric, are much more than those of the other algorithms consisting of DWT and/or SVD despite strong attacks causing lower peak signal-to-noise ratio values. Apart from robustness, reliability, and data-dependence, the other novel aspect of this study is to expand the application areas of watermarking with a new algorithm consisting of DWT, LU, and SVD, and this study will contribute to the literature for certain cases.

A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition

Multimedia security has been the focal point of considerable research activity in the last decade, mainly because of its wide application area. Watermarking, in particular, is identified as a major technology to achieve copyright protection and multimedia security. Therefore, recent studies in the literature include some evident approaches for embedding data into a multimedia element. Because of its useful frequency component separation, the discrete wavelet transform (DWT) is commonly used in watermarking schemes. Moreover, singular value decomposition (SVD) and lower-and-upper (LU) decomposition have little effect on the perception of the watermark. Therefore, in this study, a combination of DWT and SVD via LU decomposition is proposed as a new nonblind watermarking algorithm that requires cover work to detect the watermark. Experimental results show that the proposed algorithm is considerably robust and reliable against certain attacks without degrading the input image, by embedding a binary watermark on the low-low band. Moreover, the threshold values are data-dependent for watermarks after attacks; that is, the threshold value is always different from another for certain attacks so that similarity ratios in this algorithm, as a quality metric, are much more than those of the other algorithms consisting of DWT and/or SVD despite strong attacks causing lower peak signal-to-noise ratio values. Apart from robustness, reliability, and data-dependence, the other novel aspect of this study is to expand the application areas of watermarking with a new algorithm consisting of DWT, LU, and SVD, and this study will contribute to the literature for certain cases.

___

  • [1] S.P. Mohanty, N. Ranganathan, R.K. Namballa, “VLSI implementation of invisible digital watermarking algorithms towards the development of a secure JPEG encoder”, Proceedings of the IEEE Workshop on Signal Processing System, pp. 183–188, 2003.
  • [2] C. Cruz-Ramos, R. Reyes-Reyes, M. Nakano-Miyatake, H. Perez-Meana, “A blind video watermarking scheme robust to frame attacks combined with MPEG2 compression”, Journal of Applied Research and Technology, Vol. 8, pp. 323–369, 2010.
  • [3] F. Akar, Y. Yalman, H.S. Varol, “Data hiding in digital images using a partial optimization technique based on classical LSB method”, Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 21, pp. 2037–2047, 2012.
  • [4] Q. Zhang, Y. Li, X. Wei, “An improved robust and adaptive watermarking algorithm based on DCT”, Journal of Applied Research and Technology, Vol. 10, pp. 405–415, 2012.
  • [5] R. Dugad, K. Ratakonda, N. Ahuja, “A new wavelet-based scheme for watermarking images”, Proceedings of the 1998 International Conference on Image Processing, Vol. 2, pp. 419–423, 1998.
  • [6] I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing, Vol. 6, pp. 1673–1687, 1997.
  • [7] M.S. Hsieh, D.C. Tseng, “Hiding digital watermarks using multiresolution wavelet transform”, IEEE Transactions on Industrial Electronics, Vol. 48, pp. 875–882, 2001.
  • [8] E. Elbasi, A.M. Eskicioglu, “A DWT-based robust semi-blind image watermarking algorithm using two bands”, Proceedings of the SPIE 18th Annual Symposium on Electronic Image Security, Steganography, and Watermarking of Multimedia Contents VIII, Vol. 6072, pp. 1–11, 2006.
  • [9] E. Elba¸sı, “Robust multimedia watermarking: hidden Markov model approach for video sequences”, Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 18, pp. 159–170, 2010.
  • [10] S.P. Singh, P. Rawat, S. Agrawal, “A robust watermarking approach using DCT-DWT”, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, pp. 300–305, 2012.
  • [11] G. Strang, Linear Algebra and Its Applications, Stamford, CT, USA, The Thomson Corporation, 2005.
  • [12] E. Yavuz, Z. Telatar, “Improved SVD-DWT based digital image watermarking against watermark ambiguity”, Proceedings of the 2007 ACM Symposium on Applied Computing, pp. 1051–1055, 2007.
  • [13] V.I. Gorodetski, L.J. Popyack, V. Samoilov, V.A. Skormin, “SVD-based approach to transparent embedding data into digital images”, Proceedings of the International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, Vol. 2052, pp. 263–274, 2011.
  • [14] D.V.S. Chandra, “Digital image watermarking using singular value decomposition”, Proceedings of the 45th Midwest Symposium on Circuits and Systems, Vol. 3, pp. 264–267, 2002.
  • [15] R. Liu, T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership”, IEEE Transactions on Multimedia, Vol. 4, pp. 121–128, 2002.
  • [16] M. Calagna, H. Guo, L.V. Mancini, S. Jajodia, “A robust watermarking system based on SVD compression”, Proceedings of ACM Symposium on Applied Computing, pp. 1341–1347, 2006.
  • [17] P. Bao, X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15, pp. 96–102, 2005.
  • [18] R.A. Ghazy, N.A. El-Fishawy, M.M. Hadhoud, M.I. Dessouky, F.E.A. El-Samie, “An efficient block-by-block SVDbased image watermarking scheme”, Ubiquitous Computing and Communication Journal, Vol. 2, pp. 1–9, 2007.
  • [19] S.Z. Niu, X.X. Niu, Y.X. Yang, “Digital watermarking algorithm based on LU decomposition”, Journal of Electronics & Information Technology, Vol. 26, pp. 1620–1625, 2004.
  • [20] S. Wang, W. Zhao, Z. Wang, “A gray scale watermarking algorithm based on LU factorization”, International Symposiums on Information Processing, pp. 598–602, 2008.
  • [21] E. Elbasi, “A survey on digital image & video watermarking”, First Portion of Second Examination Report, Graduate Center, The City University of New York, 2006.
  • [22] E. Elbasi, “Multimedia security: digital image and video watermarking”, PhD, The City University of New York, 2007.
  • [23] Y. Yalman, ˙I. Ert¨urk, “A new color image quality measure based on YUV transformation and PSNR for human vision system”, Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 21, pp. 603–612, 2013.
  • [24] M. Jiang, “A new adaptive visible watermarking algorithm for document images”, Information Technology Journal, Vol. 11, pp. 1322–1326, 2012.