PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Hybrid watermarking scheme based on singular value decomposition ghost imaging

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A hybrid watermarking algorithm with an optical watermark image based on singular value decomposition (SVD) ghost imaging is designed. Simultaneously, the blended watermarking algorithm is designed based on 4-level discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD). The 4-level diagonal sub-band image is obtained by performing 4-level two-dimensional wavelet transform on the original image, and the coefficient matrix is produced by applying the discrete cosine transform on the 4-level diagonal sub-band image. Then, three matrices are obtained by performing the singular value decomposition on the coefficient matrix. In addition, the optical watermark image is encrypted by an SVD ghost imaging system. The system could generate a secret key, and unauthorized users could not decrypt and reconstruct the original watermark image without this key. Later the encrypted watermark image is generated into the other three matrices by singular value decomposition. Afterwards, the encrypted watermark is embedded in the host image by mutual operation of different matrices in the algorithm. Simulation results validate the feasibility of the proposed hybrid watermarking scheme.
Czasopismo
Rocznik
Strony
633--647
Opis fizyczny
Bibliogr. 26 poz., rys., tab.
Twórcy
autor
  • Department of Computer Science and Technology, Nanchang University, Nanchang 330031, China
  • Department of Computer Science and Technology, Nanchang University, Nanchang 330031, China
autor
  • College of Physical Science and Technology, Yichun University, Yichun 336000, China
autor
  • Department of Electronic Information Engineering, Nanchang University, Nanchang 330031, China
Bibliografia
  • [1] KHAN A., SIDDIQA A., MUNIB S., MUNIB S., A recent survey of reversible watermarking techniques, Information Sciences 279, 2014, pp. 251–272, DOI:10.1016/j.ins.2014.03.118.
  • [2] LANG J., ZHANG Z.G., Blind digital watermarking method in the fractional Fourier transform domain, Optics and Lasers in Engineering 53, 2014, pp. 112–121, DOI:10.1016/j.optlaseng.2013.08.021.
  • [3] SINGH H., Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain, Optica Applicata 47(4), 2017, pp. 557–578, DOI:10.5277/oa170406.
  • [4] LEENHARDT R., VASSEUR P., LI C., SAURIN J.C., RAHMI G., CHOLET F., BECQ A., MARTEAU P., HISTACE A., DRAY X., A neural network algorithm for detection of GI angiectasia during small-bowel capsule endoscopy, Gastrointestinal Endoscopy 89(1), 2019, pp. 189–194, DOI:10.1016/j.gie.2018.06.036.
  • [5] CHEN W., Optical cryptosystem based on single-pixel encoding using the modified Gerchberg–Saxton algorithm with a cascaded structure, Journal of the Optical Society of America A 33(12), 2016, pp. 2305–2311, DOI:10.1364/JOSAA.33.002305.
  • [6] WEN J.Y., GONG N.S., CHEN Y., Blind image watermarking algorithm based on compressed sensing, Journal of Scientific Computing 43, 2016, pp. 377–382 (in Chinese).
  • [7] PITTMAN T.B., SHIH Y.H., STREKALOV D.V., SERGIENKO A.V., Optical imaging by means of two-photon quantum entanglement, Physical Review A 52(5), 1995, pp. R3429–R3432, DOI:10.1103/PhysRevA.52.R3429.
  • [8] FAN D.S., MENG X.F., WANG Y.R., YANG X.L., PENG X., HE W.Q., DONG G.Y., CHEN H.Y., Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm, Applied Optics 52(23), 2013, pp. 5645–5652, DOI:10.1364/AO.52.005645.
  • [9] HSU L.Y., HU H.T., Robust blind image watermarking using crisscross inter-block prediction in the DCT domain, Journal of Visual Communication and Image Representation 46, 2017, pp. 33–47, DOI:10.1016/j.jvcir.2017.03.009.
  • [10] GATTI A., BRAMBILLA E., BACHE M., LUGIATO L.A., Ghost imaging with thermal light: comparing entanglement and classical correlation, Physical Review Letters 93(9), 2004, article 093602, DOI:10.1103/PhysRevLett.93.093602.
  • [11] ZHANG C., GUO S.X., CAO J.S., GUAN J., GAO F.L., Object reconstitution using pseudo-inverse for ghost imaging, Optics Express 22(24), 2014, pp. 30063–30073, DOI:10.1364/OE.22.030063.
  • [12] WANG S.Q., MENG X.F., YIN Y.K., WANG Y.R., YANG X.L., ZHANG X., PENG X., HE W.Q., DONG G.Y.,CHEN H.Y., Optical image watermarking based on singular value decomposition ghost imaging and lifting wavelet transform, Optics and Lasers in Engineering 114, 2019, pp. 76–82, DOI:10.1016/j.optlaseng.2018.10.014.
  • [13] ZHANG X., MENG X.F., YANG X.L., WANG Y.R., YIN Y.K., LI X.Y., PENG X., HE W.Q., DONG G.Y.,CHEN H.Y., Singular value decomposition ghost imaging, Optics Express 26(10), 2018, pp. 12948–12958, DOI:10.1364/OE.26.012948.
  • [14] ZHOU N.R., LUO A.W., ZOU W.P., Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm, Multimedia Tools and Applications 78(2), 2019, pp. 2507–2523, DOI:10.1007/s11042-018-6322-9.
  • [15] LU W.H., CHEN Z.L., LI L., CAO X.C., WEI J.G., XIONG N.X., LI J., DANG J.W., Watermarking based on compressive sensing for digital speech detection and recovery, Sensors 18(7), 2018, article 2390, DOI:10.3390/s18072390.
  • [16] LOGANATHAN A., KALIYAPERUMAL G., An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system, Expert Systems With Applications 63, 2016, pp. 412–434, DOI:10.1016/j.eswa.2016.05.019.
  • [17] AL-OTUM H.M., SAMARA N.A., A robust blind color image watermarking based on wavelet-tree bit host difference selection, Signal Processing 90(8), 2010, pp. 2498–2512, DOI:10.1016/j.sigpro.2010.02.017.
  • [18] BASSEL A., NORDIN M.J., Digital image watermark authentication using DWT-DCT, Journal of Engineering and Applied Sciences 11(14), 2016, pp. 3227–3232, DOI:10.36478/jeasci.2016.3227.3232.
  • [19] SINGH R.K., SHAW D.K., SAHOO J., A secure and robust block based DWT-SVD image watermarking approach, Journal of Information and Optimization Sciences 38(6), 2017, pp. 911–925, DOI:10.1080/02522667.2017.1372137.
  • [20] ALVES D.K., RIBEIRO R.L.A., COSTA F.B., ROCHA T.O.A., Real-time wavelet-based grid impedance estimation method, IEEE Transactions on Industrial Electronics 66(10), 2019, pp. 8263–8265, DOI:10.1109/TIE.2018.2870407.
  • [21] ZHOU X., ZHANG H., WANG C.Y., A robust image watermarking technique based on DWT, APDCBT and SVD, Symmetry 10(3), 2018, article 77, DOI:10.3390/sym10030077.
  • [22] ZHOU N.R., HOU W.M.X., WEN R.H., ZOU W.P., Imperceptible digital watermarking scheme in multiple transform domains, Multimedia Tools and Applications 77(23), 2018, pp. 30251–30267, DOI:10.1007/s11042-018-6128-9.
  • [23] YE X., CHEN X., DENG M., WANG Y.L., A SIFT-based DWT-SVD blind watermark method against geometrical attacks, [In] 2014 7th International Congress on Image and Signal Processing, 2015, pp. 323–329, DOI:10.1109/CISP.2014.7003800.
  • [24] GUPTA A.K., RAVAL M.S., A robust and secure watermarking scheme based on singular values replacement, Sadhana 37(4), 2012, pp. 425–440, DOI:10.1007/s12046-012-0089-x.
  • [25] SINGH A.K., Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images, Multimedia Tools and Applications 76(6), 2017, pp. 8881–8900, DOI:10.1007/s11042-016-3514-z.
  • [26] SINGH D., SINGH S.K., DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection, Multimedia Tools and Applications 76(11), 2017, pp. 13001–13024, DOI:10.1007/s11042-016-3706-6.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-22c92d54-88ac-42b6-ae54-dd73be7be43d
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.