An improved digital image watermarking scheme using the discrete Fourier transform and singular value decomposition

An improved digital image watermarking scheme using the discrete Fourier transform and singular value decomposition

The paper presents an improved digital image watermarking algorithm by incorporating the discrete Fourier transform (DFT) and singular value decomposition (SVD). The Fourier transformed carrier image is decomposed into four different frequency subbands by the proposed onion peel decomposition (OPD) algorithm and the SVD-based watermarking scheme is applied to attach the transformed watermark in all four carrier subbands. The proposed inverse OPD algorithm together with inverse DFT is utilized to reconstruct the watermarked image from the frequency blocks. The watermark extraction algorithm is simple and it performs the inverse of watermarking process. The experimental analysis on different images shows that the proposed algorithm produces good quality watermarked images. The watermarks extracted from watermarked images inflicted with potential attacks are also of better perception quality than those produced by other prominent algorithms in terms of subjective and objective metrics.

___

  • [1] Ingemar JC, Miller ML, Bloom JA, Honsinger C, Kalker K. Digital Watermarking and Steganography. 2nd ed. Burlington, MA, USA: Morgan Kaufmann, 2008.
  • [2] Juergen S. Digital Watermarking for Digital Media. Hershey, PA, USA: Information Science Publishing, 2005.
  • [3] Ganic E, Eskicioglu AM. Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 2005; 14: 043004-043007.
  • [4] Sverdlov A, Dexter S, Eskicioglu AM. Secure DCT-SVD domain image watermarking: embedding data in all frequencies. In: Image Processing Seminar; 23– 26 October 2006; New York, NY, USA. New York, NY, USA: Particle Revelation. pp. 121-124.
  • [5] Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ. An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 2012; 39: 673-689.
  • [6] Bhatnagar G, Wu JQM, Raman B. Robust gray-scale logo watermarking in wavelet domain. Comput Electr Eng 2012; 38: 1164-1176.
  • [7] Lai CC, Cheng CT. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE T Instrum Meas 2010; 59: 3060-3063.
  • [8] Lai CC. An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 2011; 284: 938-944.
  • [9] Makbol NM, Bee EK. Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition. AEU-Int J Electron C 2013; 2: 102-112.
  • [10] Rawat S, Balasubramanian R. Best tree wavelet packet transform based copyright protection scheme for digital images. Opt Commun 2012; 285: 2563-2574.
  • [11] Naskar R, Chakraborty RS. Reversible watermarking utilising weighted median-based prediction. IET Image Process 2012; 6: 507-520.
  • [12] Wu X, Wei S. Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl Soft Comput 2013; 2: 1170-1182.
  • [13] Das C, Swetalina P, Vijay KS, Mahapatra KK. A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int J Electron C 2014; 3: 244-253.
  • [14] Ali M, Chang WA. An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal Process 2013; 94: 545-556.
  • [15] Elba¸sı E. Robust multimedia watermarking: hidden Markov model approach for video sequences. Turk J Electr Eng & Comp Sci 2010; 18: 159-170.
  • [16] Laouamer L, Tayan O. A semi-blind robust DCT watermarking approach for sensitive text images. Arab J Sci Eng 2015; 40: 1-13.
  • [17] Walia E, Anu S. A robust watermark authentication technique based on Weber’s descriptor. Signal Image Video P 2014; 8: 859-872.
  • [18] Lee MS. Image compression and watermarking by wavelet localization. Int J Comput Math 2013; 80: 401-412.
  • [19] Vargas L, Vera E. An implementation of reversible watermarking for still images. IEEE Lat Am T 2013; 11: 54-59.
  • [20] Wang C, Ni J, Huang J. An informed watermarking scheme using hidden Markov model in the wavelet domain. IEEE T Inf Foren Sec 2012; 7: 853-867.
  • [21] Wu Y. On the security of an SVD-based ownership watermarking. IEEE T Multimedia 2005; 7: 624-627.
  • [22] Leung HY, Lee MC, Fang L. Robust digital image watermarking scheme using wave atoms with multiple description coding. EURASIP J Adv Sig Pr 2012; 2012: 1-14.
  • [23] Craver S, Memon N, Yeo BL, Yeung MM. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE J Sel Area Comm 1998; 16: 573-586.
  • [24] Ting GCW, Bok MG, Swee HH. Attacks on a robust watermarking scheme based on self-reference image. Comput Stand Inter 2008; 30: 32-35.
  • [25] Poljicak A, Lidija M, Darko A. Discrete Fourier transform-based watermarking method with an optimal implementation radius. J Electron Imaging 2001; 20: 33008-33016.
  • [26] Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimed Tools Appl 2008; 39: 1-46.
  • [27] Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE T Image Process 2004; 13: 600-612.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Novel dynamic partial reconfiguration implementations of the support vector machine classifier on FPGA

Hanaa HUSSAIN, Khaled BENKRID2, Hüseyin ŞEKER

Energy-efficient mobile cluster-head data collection model for wireless sensor networks

Sanjeev SOFAT, Renu VIG, Nidhi GAUTAM

A new CMOS logarithmic current generator

Munir ABSI AL, Karama TAMIMI AL

A novel voltage control strategy in collaboration with information technology domains through the holonic architecture

Ahad KAZEMI, Javad ANSARI, Mehdi DOZEIN GHAZAVI

Steady state analysis of a three phase indirect matrix converter fed 10 HP, 220 V, 50 Hz induction machine for efficient energy generation

Damian NNADI, Crescent OMEJE

Determination of the striking distance of a lightning rod using finite element analysis

Hazlee Azil ILLIAS, Hazlie MOKHLIS, Ab Halim BAKAR ABU, Syahirah HALIM ABD, Nor Hidayah HASSAN NOR, Chia Kwang TAN, Alyaa ABIDIN ZAINAL

An IPR protection scheme based on wavelet transformation and visual cryptography

Young-Chang HOU, A-Yu TSENG, Zen-Yu QUAN, Hsin-Ju LIU

A multiobjective tuning approach of power system stabilizers using particle swarm optimization

Djamel BOUKHETALA, Hilal LABDELAOUI, Far`es BOUDJEMA

Process time and MPPT performance analysis of CF, LUT, and ANN control methods for a PMSG-based wind energy generation system

Ercüment KARAKAS, Abdulhakim KARAKAYA

Vector control of a three-phase parallel connected two motor single inverter speed sensorless drive

Gunabalan RAMACHANDRAN, Subbiah VEERANA, Sanjeevikumar PADMANABAN