Robust, Secure and High Capacity Watermarking Technique based on Image Partitioning-Merging Scheme

Full Text (PDF, 792KB), PP.74-85

Views: 0 Downloads: 0

Author(s)

Baisa L. Gunjal 1,*

1. Amrutvahini College of Engineering, Sangamner, Ahmednagar, MS, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2016.04.09

Received: 10 Jun. 2015 / Revised: 3 Oct. 2015 / Accepted: 11 Dec. 2015 / Published: 8 Apr. 2016

Index Terms

IPMS, Fibonacci-Lucas transform, Singular Value Decomposition, Hadamard transform

Abstract

This paper presents secure and high capacity watermarking technique using novel approach of Image Partitioning-Merging Scheme (IPMS). The IPMS is used as reduction method to reduce the size of watermark logically and increases security levels of proposed watermarking technique. The technique effectively uses special properties of Discrete Wavelet Transform (DWT), Fast Walse Hadamrd Transform (FWHT), Singular Value Decomposition (SVD) and proved strongly robust to 14 noise addition and filtering attacks. Fibonacci Lucas Transform (FLT) is used as effective scrambling technique to scramble the watermark to provide additional security in embedding process. Many researchers failed to achieve imperceptibility and robustness under high watermark embedding scenario with strong security provision as these quality parameters conflict each other. The novel technique presented here archives imperceptibility, high capacity watermark embedding, security and robustness against 14 noise addition and filtering attacks. The technique is non-blind and tested with grey scale cover images of size 512x512 and watermark images of size 512x512. The experimental results demonstrate that Lena image gives 75.8446dBs imperceptibility which is measured in terms of Peak signal to noise ratio. The robustness is measured in terms of normalized correlation (NC) equals to 1 showing exact recovery of watermark. The method is found strongly robust against noise addition and filtering attacks with compared to existing watermarking methods under consideration.

Cite This Paper

Baisa L. Gunjal, "Robust, Secure and High Capacity Watermarking Technique based on Image Partitioning-Merging Scheme", International Journal of Information Technology and Computer Science(IJITCS), Vol.8, No.4, pp.74-85, 2016. DOI:10.5815/ijitcs.2016.04.09

 

Reference

[1]Lihong Cui and Wenguo Li,” Adaptive Multiwavelet-Based Watermarking Through JPW Masking”, IEEE Transactions on Image Processing, Vol.20, No.4, pp. 1047-1060, Apr. 2011.

[2]M. Kamran, and Muddassar Farooq, “An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems”, IEEE Transactions on Knowledge` and Data Engineering, Vol. 24, No. 11, pp. 1950-1962, Nov. 2012.

[3]S. Nadarajah, “A generalized normal distribution,” J. Appl. Statist., vol.32, pp. 685–694, Sep. 2005.

[4]K. Krishnamoorthy, “Handbook of Statistical Distributions With Applications”, London, U.K.: Chapman & Hall, 2006.

[5]Yu-Hsun Lin and Ja-Ling Wu, “A Digital Blind Watermarking for Depth-Image-Based Rendering 3D Images”, IEEE Transactions on Broadcasting, Vol.57, No.2, pp. 602-611, Jun.2011.

[6]R. Agrawal, P. Haas, and J. Kiernan, “Watermarking Relational Data: Framework, Algorithms and Analysis,” The VLDB J., vol. 12,no. 2, pp. 157-169, 2003.

[7]Chih-Chin Lai, and Cheng-Chih Tsai, ”Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition”, IEEE Trans.on Instru. and Measurement, Vol. 59, No. 11, pp. 3060-3063, Nov. 2010.

[8]Ehsan Nezhadarya,, Z. Jane Wang, and Rabab Kreidieh Ward,” Robust Image Watermarking Based on Multiscale Gradient Direction Quantization”, IEEE Transactions on Information Forensics and Security, Vol. 6, No. 4, pp.1200-1213, Dec. 2011.

[9]Fan Zhang, WenyuLiu, WeisiLin, and King NgiNgan,” Spread Spectrum Image Watermarking Based on Perceptual Quality Metric”, IEEE Trans. on Image Processing, Vol. 20, No. 11, pp. 3207-3218, Nov. 2011.

[10]Xiaolong Li, Bin Yang, Tieyong Zeng, “ Efficient Reversible Watermarking Based on adaptive Prediction error Expansion and pixel selection”, IEEE Transactions on Image Processing, Vol.20,No.12, PP:3524-3533, Dec. 2011.

[11]Gouenou Coatrieux,Wei Pan, Nora Cuppens-Boulahia, Frederic Cuppens and Christian Roux, "Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting",IEEE Trans. on Info. Forensics and Security, VOL. 8, NO. 1, pp:11-120, Jan. 2013

[12]Tsung-Yuan Liu, and Wen-Hsiang Tsai,” Generic Lossless Visible Watermarking-A New Approach”, IEEE Transactions on Image Processing,Vol.19,No.5, pp. 1224-1235, May 2010.

[13]Y.Q.Shi, Z.Ni,D.Zou,C. Liang, G.Xuan, “Lossless data hiding :Fundamentals, algorithms and applications”, Proc. IEEE ISCAS, vol.2, pp: 33-36,2004.

[14]M.U.Celik, G. Sharma, A.M. Tekalp, “Lossless watermarking for image authentication: A new framework and an implementation”, IEEE Tans. Image Process.,Vol 15,no.4, pp:1042-1049, Apr. 2006.

[15]Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic, and Christian Roux, “A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images”, IEEE Trans. on Information Technology in Biomedicine, Vol.16, No. 5,pp.891-899, Sep. 2012.

[16]Gouenou Coatrieux, Hui Huang, Huazhong Shu,Limin Luo and Christian Roux,"A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization", IEEE Journal Of Biomedical and Health Informatics, vol. 17, No. 6, pp:157-1067, November 2013.

[17]Tsz Kin Tsui, Xiao-Ping  Zhang, and Dimitrios  Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms”, IEEE Transactions on Information Forensics and Security, Vol. 3, No. 1, pp.16-28 Mar. 2008.

[18]Chuntao Wang, Jiangqun Ni and Jiwu Huang,"An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 3, pp.853-867,Jun. 2012.

[19]Baisa L. Gunjal, Suresh N. Mali, "Strongly Robust and Highly Secured DWT-SVD Based Color Image Watermarking: Embedding Data in All Y, U, V Color Spaces", International Journal of Information Technology and Computer Science, Vol. 4, No.3, pp.1-7, Apr. 2012. 

[20]D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, pp.1167–1180, Jul. 1999.

[21]Mohsen Zareian, Hamid Reza Tohidypour,"Robust quantization index modulation-based approach for image watermarking", IET Image Processing , Vol. 7, Iss. 5, pp. 432–441,2013.

[22]V. Senthil and R. Bhaskaran, “Digital image watermarking using edge detection and wavelets with robustness analysis against jpeg compression attacks,” in Int. Conf. Innovations in Inf. Tech., pp. 583–587,16–18 Dec. 2008.

[23]T. Tsui, X. Zhang, and D. Androutsos, “Color image watermarking using the spatio-chromatic fourier transform,” in Proc. ICASSP,Toulouse, France, pp. 305–308, May 2006.

[24]T. Tsui, X. Zhang, and D. Androutsos, “Quaternion image watermarking using the spatio-chromatic fourier coefficients analysis,” presented at the ACM, Santa Barbara, CA,Oct 2006.

[25]Chih-Chin Lai, and Cheng-Chih Tsai, “Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition”, IEEE Transactions on Instrumentation and Measurement, Vol. 59, No. 11, pp. 3060-3063, Nov. 2010. 

[26]Zhenyu Wei, and King N. Ngan, “Spatio-Temporal Just Noticeable Distortion Profile for Grey Scale Image/Video in DCT Domain”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 3, pp.337-346,Mar. 2009.

[27]A. Ahumada and H. Peterson, “Luminance-model-based DCT quantization for color image compression,” in Proc. SPIE Human Vision,Visual Process., Digit. Display III, vol. 1666, pp. 365–374, 1992.

[28]J. Zou, R.K.Ward, and D. Qi, “A new digital image scrambling method based on fibonacci numbers,” in Proc. Int. Symp. Circuits and Syst.,.3, pp. 965–968,2004.

[29]Zou, J.C., R.K.Ward and Q.D. Qi, “The generalized Fibonacci transforms and application to image scrambling”, Proceedings of IEEE international conference on Acoustic , Speech and Signal Processing, Canada,2004, pp. 385-388,2004.

[30]Na Li; Xiaoshi Zheng; Yanling Zhao; Huimin Wu; Shifeng Li ,”Robust Algorithm  of Digital Image Watermarking Based on Discrete Wavelet Transform”, Electronic Commerce and Security, International Symposium , pp.942 – 945,2008

[31]Cheng-qun Yin, Li Li, An-qiang Lv, Li Qu, “Color Image Watermarking Algorithm Based on DWT-SVD”, Proceedings of IEEE International Conf. on Automation and Logistics, Jinan, China,pp.2607-2611,2007.

[32]J. Zou, X. Tie, R. K. Ward, and D. Qi, “Some novel image scrambling methods based on affine modular matrix transformation,” J.Inf.Comput. Sci.,Vol.2, No.1, pp. 223–227,2005.

[33]J. Zou and R. K. Ward, “Introducing two new image scrambling methods,” in IEEE Pacific Rim Conf. Comm., Comp. and Signal Proces., vol. 2, pp. 708–711 Aug. 2003.

[34]A. Nikolaidis and I. Pitas, “Asymptotically optimal detection for additive watermarking in DCT and DWT domains,”IEEE Trans.Image Process., vol.12, no.5, pp.563–571, May 2003.

[35]Cheng-qun Yin, Li Li, An-qiang Lv, Li Qu, “Color Image Watermarking Algorithm Based on DWT-SVD”, Proceedings of IEEE International Conference on Automation and Logistics, Jinan, China, pp:2607-2611, 18-21 Aug. 2007.

[36]Priyanka Singh, Suneeta Agarwal, Akanksha Pandey, “A Hybrid DWT-SVD Based Robust Watermarking Scheme for Color Images and its Comparative Performance in YIQ and YIV color Spaces”, 3rd IEEE International Advance Computing Conference (IACC), pp:1213-1218, 22-23 Feb. 2013.

[37]Na Wang, Chung-Hwa Kim , “Tamper Detection and Self Recovery Algorithm of Color Image Based on Robust Embedding of Dual Visual Watermarks using DWT-SVD”, IEEE Int.Sympo. on Communication and Information Technology, pp: 157-162, 28-30 Sep.2009.

[38]Liu Liang and Sun Qi, “A new SVD-DWT composite watermarking", Proceedings of 8thIEEE International conference on signal processing (ICSP), pp: 645-650,2006.

[39]Nasrin M. Makbol, Bee EeKhoo, “Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition”, Elsevier International Journal of Electronics and Communications, AEU-67,pp.102-112,2013.

[40]Samira Lagzian, Mohsen Soryani, Mahmood Fathy, “Robust watermarking scheme based on RDWT-SVD: Embedding Data in All sub bands”, IEEE, pp. 48-52,2011.

[41]K.Ramanjaneyulu, K. Rajarajeswari, “Wavelet-based oblivious image watermarking scheme using genetic algorithm”, IET Image Processing,vol. 6, no.4, pp. 364–373,2012.

[42]Sridhar B., Arun C., “A wavelet based image watermarking technique using image sharing method", IEEE international conference on Information Communication and Embedded Systems (ICICES), pp.629 - 633, 21-22 Feb. 2013. 

[43]K.P. Soman, K.I. Ramchandran, “Insight into Wavelets: From Theory to Practice”, 2nd Edition, Prentice Hall of India, ”,pp.48-71, 2008.

[44]Md. Iqbal H. Sarker, M. I. Khan, “An Improved Blind Watermarking Method in Frequency Domain for Image Authentication”, IEEE International Conference on Informatics, Electronics & Vision (ICIEV), pp.1-5, 17-18 May 2013.

[45]Minati Mishra, Priyadarsini Mishra, M.C. Adhikary and Sunit Kumar, “Image Encryption Using Fibonacci-Lucas Transformation”, International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.3, pp. 131 -141, Sep. 2012.

[46]CVG-UGR Image Database [Online]. Available: http://decsai.ugr.es/cvg/dbimagenes/index.php

[47]OsiriX [Online]. Available: http://www.osirix-viewer.com/Downloads.html