IJIGSP Vol. 8, No. 8, 8 Aug. 2016
Cover page and Table of Contents: PDF (size: 681KB)
Full Text (PDF, 681KB), PP.58-67
Views: 0 Downloads: 0
Image watermarking, singular value decomposition, redundant wavelet transform, robustness, chaos
In recent years chaos has received a great deal of attention from the researches specialized in communications, signal and image processing. The complexity property of the chaotic signal raised the idea of using such signals in secure communications. Digital image watermarking is a technique mainly developed for copyright protection and image authentication and it can be considered as one application area of the secure communication. In this study, a chaos based digital image watermarking algorithm based on redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) is proposed. To the best of our knowledge, there do not exist any digital watermarking scheme combining RDWT, SVD and chaos. Robustness and invisibility of the proposed method are improved by using the logistic mapping function to generate a chaotic image matrix serving as the watermark that is used to modify the singular values of the low frequency sub-band of the cover image obtained by applying RDWT. The method is shown to be robust against both the geometrical and image processing attacks and to provide better watermark concealment via computer simulations. Using a chaotic signal as the watermark allows the proposed scheme to meet the security requirements as well.
Gökçen Çetinel, LLukman Çerkezi,"Robust Chaotic Digital Image Watermarking Scheme based on RDWT and SVD", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.8, No.8, pp.58-67, 2016. DOI: 10.5815/ijigsp.2016.08.08
[1]Dong P. "Robust Digital Image Watermarking". PhD thesis, Electrical Engineering in the Graduate College of the Illinois Institute of Technology, Chicago, USA, 2004.
[2]Terzija N. "Robust Digital Image Watermarking Algorithms for Copyright Protection". PhD thesis, Faculty of Engineering, Duisburg Essen University, Duisburg, Germany, 2006.
[3]Kazan S. "Digital Image Watermarking Methods Using Moment Based Normalization". PhD thesis, Faculty of Engineering, Sakarya University, Sakarya, Turkey, 2009.
[4]Potdar VM., Han S. Cahng E. "A survey of digital image watermarking techniques", IEEE International Conference on Industrial Informatics, Perth, Australia,10-12 August, 2005, pp. 709-716.
[5]Shing P., Chadha R. "A survey of digital image watermarking techniques application and attacks", International Journal of Engineering and Innovative Technology (IJEIT), 2013, vol. 2 19, pp.70-73.
[6]Haykin S. Adaptive Filter Theory. 4.th ed. New Jersey, Prentice Hall, 2002.
[7]Bao P., Ma X. "Image adaptive watermarking using wavelet domain singular value decomposition", IEEE Trans. on Circuits and Systems for Video Tech., 2005,vol.15 1, pp.96-102.
[8]Lai CC., Tsai CC. "Digital Image watermarking using discrete wavelet transform and singular value decomposition", IEEE Trans. on Instrumentation and Measurement, 2011, vol.59 11, pp. 3060-3063.
[9]Kekre HB., Sarade T., Natu S." Performance Comparison of Watermarking Using SVD with Orthogonal Transforms and Their Wavelet Transforms", I. J. Image, Graphics and Signal Processing, 2015, vol.4, pp. 1-18.
[10]Giri KJ., Peer MA., Nagabhushan P."A Robust Color Image Watermarking Scheme Using Discrete Wavelet Transformation", I. J. Image, Graphics and Signal Processing, 2015, vol.1, pp. 47-52
[11]Mohananthini N., Yamuna G." A Robust Image Watermarking Scheme Based Multiresolution Analysis", I. J. Image, Graphics and Signal Processing, 2012, vol.11, pp. 9-15.
[12]Aslantas V., Dogan LA., Ozturk S. "DWT-SVD based image watermarking using particle swarm optimizer", Proc. IEEE Int. Conf. Multimedia Expo, 2008, Hannover, Germany, pp.241–244.
[13]Bhatnagar G., Raman B. "A new robust reference watermarking scheme based on DWT-SVD", Comput. Standards Interfaces, 2009, vol. 31 5, pp.1002–1013.
[14]Ganic E., Eskicioglu AM. "Robust DWT-SVD domain image watermarking: Embedding data in all frequencies", Proc. Workshop Multimedia Security, Magdeburg, Germany, 2004, pp.166–174.
[15]Li Q., Yuan C., Zhong, Y. Z. "Adaptive DWT-SVD domain image watermarking using human visual model." Proc. 9thInt. Conf. Adv. Commun. Technol., Gangwon-Do, South Korea, 2007, pp. 1947–1951.
[16]Ganic E., Eskicioglu AM. "Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition", Journal on Electron. Imaging, 2005, vol.14 4, pp.043004-9.
[17]Nyguyan T H. et al. "Robust and high capacity watermarking for image based on DWT-SVD", The 2015 IEEE RIVF Int. Conf. on Computing & Communication Tech., 2005, pp.83-88.
[18]Makbol NM., Khoo BE. "Robust blind image watermarking scheme based on redundant wavelet transform and singular value decomposition",Int. J. Electron. Commun.(AEÜ), 2013, vol.67, pp.102-112.
[19]Lagzian S., Soryani M., "Fathy M. A new robust watermarking scheme based on RDWT-SVD", International Journal of Intelligent Information Processing, 2011, vol. 2(1), pp.1-8.
[20]Lagzian S., Soryani M., Fathy M. "Robust watermarking scheme based on RDWT-SVD: embedding data in all sub-bands", International Symp. on Artificial Intelligence and Signal Processing (AISP), Tehran,15-16 June, 2011, pp. 48-52.
[21]Khare P., Verma AK., Srivasta VK. "Digital image watermarking scheme in wavelet domain using chaotic encryption", Students Conference on Engineering and Systems (SCES), Allahabad, 28-30 May, 2014, pp.1-4.
[22]Liu NS., Guo DH. "Robust digital watermarking based on chaotic maps", Int. Conf. on Anti-Counterfeiting, Security and Identification (ASID), 2012, pp.1-5.
[23]Yi Z. "Design of watermarking algorithm based on chaos and discrete transform", Fifth International Conf. on Intelligent Systems Design and Engineering App., Hunan,15-16 June, 2014, pp. 404-407.
[24]Tiwari A., Gupta KK. "An effective approach of digital image watermarking for copyright protection", International Journal of Big Data Security Intelligence, 2015, vol.2 1, pp.7-18.
[25]Ma N., Zhang Q., Li Y. "Digital image watermarking robust to geometric attacks based on wavelet domain", IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2010, pp. 787-792.
[26]Liu F., Wu C-K. "Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners", IET Information Security, 2011, vol. 5 2, pp. 121-128.
[27]Prodhan C., Saxena V., Bisoi A K. "Non-blind digital watermarking technique using DCT and cross chaos map", International Conference on Communications, Devices and Intelligent Systems (CODIS), Kolkata, 28-29 December, 2012, pp. 274-277
[28]Anees A., Siddgui AM. "A technique for digital watermarking in combined spatial and transform domains using chaotic maps", 2nd. National Conference on Information Assurance (NCIA), 11-12 December, 2013, Rawalpindi, pp. 119-124.
[29]Zhou S., Wang B., Zhang X., Zhou C. "Digital watermarking based on chaos game representation and discrete cosine transform", 7th. International Congress on Image and Signal Processing, 14-16 October, 2014, Dalian, pp.335-339.
[30]Singh S., Bansel S., Singh S. "Robust and secure image watermarking using DWT-SVD and chaotic map", International Journal of Advanced Research in Computer and Communication Engineering, 2015, vol. 4 9:, pp.111-116.
[31]Cui S., Wang Y. "Redundant wavelet transform in video signal processing", Int. Conf. on Image Processing, Computer Vision, Matrix Recognition, Las Vegas, 2006, pp. 191-196.
[32]Haque SR. "Singular Value Decomposition and Discrete Cosine Transform Based Image Watermarking", Department of Interaction and System Design School of Engineering Blekinge Institute of Technology, MSc., Blekinge, Sweden, 2008.
[33]Stavroulakis P. Chaos Applications in Telecommunications,1st ed., Boca Raton, FL, USA, Taylor &Francis, CRC Press,2006.
[34]Al-Haj A..Combined "DWT-DCT Digital Image Watermarking", Journal of Computer Science, 2007, vol. 3 9, pp.740-746.
[35]Rawat S., Raman B. "A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion", Int. J. Electron Commun. (AEÜ), 2012, vol.66, pp.955-962.
[36]Rastegar S., Namazi F. "A hybrid watermarking algorithm based on singular values decomposition and radon transform", Int. J. on Electron. Commun. (AEÜ), 2012; vol.66 4, pp.275-28.