PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Color Image Watermarking Approach Based on Synchronization Correction

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Digital watermarking has been proposed as an effective technology of copyright protection and content authentication, yet up to now, research on the robust watermarking against geometric attacks is still a challenging task. This paper presents a novel robust watermarking algorithm in nonsubsampled shearlet transform (NSST) domain using quaternion polar harmonic transform (PHT) and least squares support vector regression (LS-SVR), which is a recently developed geometric correction algorithm for digital color image. The major innovative works of the proposed approach lie in that (1) the NSST is applied to embed the watermark, which can provide the image function with nearly optimal approximation and employ fully the properties of human visual system (HVS), (2) the robust 2D transform, namely quaternion PHT is introduced to represent the characteristics of color image, and (3) the novel synchronous correction method is proposed using the excellent LS-SVR and quaternion PHTs, which can accurately estimate the geometric distortions parameters. In our experiments, we applied the proposed method to the standard color image test dataset, and the experimental results demonstrate that the proposed algorithm is not only invisible, but also robustness against common signal processing operations and geometric attacks.
Wydawca
Rocznik
Strony
385--407
Opis fizyczny
Bibliogr. 35 poz., rys., tab., wykr.
Twórcy
autor
  • School of Computer and Information Technology, Liaoning Normal University, Dalian, China
autor
  • School of Computer and Information Technology, Liaoning Normal University, Dalian, China
autor
  • School of Computer and Information Technology, Liaoning Normal University, Dalian, China
autor
  • School of Computer and Information Technology, Liaoning Normal University, Dalian, China
autor
  • School of Computer and Information Technology, Liaoning Normal University, Dalian, China
autor
  • School of Computer and Information Technology, Liaoning Normal University, Dalian, China
Bibliografia
  • [1] Winkler T, Rinner B. Security and privacy protection in visual sensor networks: A survey. ACM Computing Surveys (CSUR), 2014;47(1):(2:1-2:42). doi:10.1145/2545883.
  • [2] Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 2016;11(11):2594-2608. doi:10.1109/TIFS.2016.2590944.
  • [3] Li J, Li X, Yang B, Sun X. Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 2015;10(3):507-518. doi:10.1109/TIFS.2014.2381872.
  • [4] Xia Z, Wang X, Sun X, Wang B. Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks, 2014;7(8):1283-1291. doi:10.1002/sec.864.
  • [5] Zhou Z, Wang Y, Wu QJ, Yang CN, Sun X. Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security, 2017;12(1):48-63. doi:10.1109/TIFS.2016.2601065.
  • [6] Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods. Signal processing, 2010;90(3):727-752. doi: 10.1016/j.sigpro.2009.08.010.
  • [7] Qiu-Yu Zhang WJHSBQ Shuang Yu, Zhang T. An improved bipolar quantization-based high-capacity watermarking algorithm for speech perceptual hashing authentication system. Journal of Information Hiding and Multimedia Signal Processing, 2016;7(5):1126-1135. ISSN: 2073-4212.
  • [8] Liu S, Hennelly BM, Guo C, Sheridan JT. Robustness of Double Random Phase Encoding spread-space spread-spectrum watermarking technique. Signal Processing, 2015;109:345-361. doi:10.1016/j.sigpro.2014.06.024.
  • [9] Zhang X, Wang ZJ, Wang X. Correlation-and-bit-aware additive spread spectrum data hiding for Laplacian distributed host image signals. Signal Processing: Image Communication, 2014;29(10):1171-1180. doi:10.1016/j.image.2014.09.003.
  • [10] Xu Z, Ao C, Huang B. Channel capacity analysis of the multiple orthogonal sequence spread spectrum watermarking in audio signals. IEEE Signal Processing Letters, 2016;23(1):20-24. doi:10.1109/LSP.2015.2497460.
  • [11] Mathon B, Cayre F, Bas P, Macq B. Optimal transport for secure spread-spectrum watermarking of still images. IEEE Transactions on Image Processing, 2014;23(4):1694-1705. doi:10.1109/TIP.2014.2305873.
  • [12] Zear A, Singh AK, Kumar P. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications, 2016. pp. 1-20. doi:10.1007/s11042-016-3862-8.
  • [13] Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G. Robust histogram shape-based method for image watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 2015;25(5):717-729. doi:10.1109/TCSVT.2014.2363743.
  • [14] Parah SA, Sheikh JA, Loan NA, Bhat GM. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Processing, 2016;53:11-24. doi:10.1016/j.dsp.2016.02.005.
  • [15] Niu PP, Wang XY, Yang YP, Lu MY. A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Systems with Applications, 2011;38(3):2081-2098. doi:10.1016/j.eswa.2010.07.147.
  • [16] Naderahmadian Y, Hosseini-Khayat S. Fast and robust watermarking in still images based on QR decomposition. Multimedia tools and applications, 2014;72(3):2597-2618. doi:10.1007/s11042-013-1559-9.
  • [17] Bollimpalli P, Sahu N, Sur A. SIFT based robust image watermarking resistant to resolution scaling. In: Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014 pp. 5507-5511. doi:10.1109/ICIP.2014.7026114.
  • [18] Su PC, Chang YC, Wu CY. Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Transactions on Information Forensics and Security, 2013;8(12):1897-1908. doi:10.1109/TIFS.2013.2282121.
  • [19] Yuan XC, Pun CM. Feature extraction and local Zernike moments based geometric invariant watermarking. Multimedia tools and applications, 2014;72(1):777-799. doi:10.1007/s11042-013-1405-0.
  • [20] Tian H, Zhao Y, Ni R, Qin L, Li X. LDFT-based watermarking resilient to local desynchronization attacks. IEEE transactions on cybernetics, 2013;43(6):2190-2201. doi:10.1109/TCYB.2013.2245415.
  • [21] Liu Y, Zheng D, Zhao J. An image rectification scheme and its applications in RST invariant digital image watermarking. Multimedia Tools and Applications, 2007;34(1):57-84. doi:10.1007/s11042-006-0072-9.
  • [22] Zhang H, Shu H, Coatrieux G, Zhu J, Wu QJ, Zhang Y, Zhu H, Luo L. Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE Transactions on Image Processing, 2011;20(8):2189-2199. doi:10.1109/TIP.2011.2118216.
  • [23] Kaur M, Kaur P. Robust watermarking into the color models based on the synchronization template. In: Information and Multimedia Technology, 2009. ICIMT’09. International Conference on. IEEE, 2009 pp. 296-300. doi:10.1109/ICIMT.2009.81.
  • [24] Wang Xy, Wang Cp, Yang Hy, Niu Pp. A robust blind color image watermarking in quaternion Fourier transform domain. Journal of Systems and Software, 2013;86(2):255-277. doi:10.1016/j.jss.2012.08.015.
  • [25] Urvoy M, Goudia D, Autrusseau F. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Transactions on Information Forensics and Security, 2014;9(7):1108-1119. doi:10.1109/TIFS.2014.2322497.
  • [26] Wang Xy, Liu Yn, Li S, Yang Hy, Niu Pp. Robust image watermarking approach using polar harmonic transforms based geometric correction. Neurocomputing, 2016;174(B):627-642. doi:10.1016/j.neucom.2015.09.082.
  • [27] Ahmed T, Roy R, Changder S. Cropping and rotation invariant watermarking scheme in the spatial domain. In: ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II. Springer, 2014 pp. 281-292. doi:10.1007/978-3-319-03095-1_31.
  • [28] Botta M, Cavagnino D, Pomponiu V. A modular framework for color image watermarking. Signal Processing, 2016;119:102-114. doi:10.1016/j.sigpro.2015.07.018.
  • [29] Xie Y, Li J, Wang Jj, Liu Cy. A geometric distortion correction method for lithographic watermarked authentication images. In: Fifth International Conference on Graphic and Image Processing. International Society for Optics and Photonics, volume 9069, 2014 pp. 906908. doi:10.1117/12.2050051.
  • [30] Lim WQ. The discrete shearlet transform: A new directional transform and compactly supported shearlet frames. IEEE Transactions on Image Processing, 2010;19(5):1166-1180. doi:10.1109/TIP.2010.2041410.
  • [31] Yang HY, Wang XY, Niu PP, Liu YC. Image denoising using nonsubsampled shearlet transform and twin support vector machines. Neural networks, 2014;57:152-165. doi: 10.1016/j.neunet.2014.06.007.
  • [32] Yap PT, Jiang X, Kot AC. Two-dimensional polar harmonic transforms for invariant image representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010;32(7):1259-1270. doi:10.1109/TPAMI.2009.119.
  • [33] Wang Xy, LiWy, Yang Hy, Wang P, Li Yw. Quaternion polar complex exponential transform for invariant color image description. Applied Mathematics and Computation, 2015;256:951-967. doi:10.1016/j.amc.2015.01.075.
  • [34] Torres L, Reutter JY, Lorente L. The importance of the color information in face recognition. In: Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on, volume 3. IEEE, 1999 pp. 627-631. doi:10.1109/ICIP.1999.817191.
  • [35] Vapnik V. The Nature of Statistical Learning Theory, Statistics for Engineering and Information Science, vol. 8, 1995. ISBN:0-387-94559-8.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-56f35e30-5ec0-4c9e-adb9-6969887f93a2
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.