A Secure and Semi-Blind Technique of Embedding Color Watermark in RGB Image Using Curvelet Domain

Full Text (PDF, 787KB), PP.62-70

Views: 0 Downloads: 0

Author(s)

Ranjeeta 1,* Sanjay Sharma 2 L. R. Raheja 3

1. CSE Department, Thapar University, Patiala-147001, Punjab, India

2. ECE Department, Thapar University, Patiala-147001, Punjab, India

3. Navel Department, IIT Kharagpur, Kharagpur, West Bengal 721302, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2017.03.07

Received: 11 Apr. 2016 / Revised: 3 Aug. 2016 / Accepted: 12 Oct. 2016 / Published: 8 Mar. 2017

Index Terms

Digital watermarking, Curvelet transform, Bit-plane, MSSIM

Abstract

A semi-blind and secure watermarking technique for the color image using curvelet domain has been proposed. To make the algorithm secure a Bijection mapping function has been used. The watermark also separated into color planes and each color plane into a bit planes. The most significant bit (MSB) planes of each color used as the embedding information and remaining bit planes are used as a key at the time of extraction. The MSB planes of each color of watermark image embedded into the curvelet coefficients of the blue color plane of the processed cover image. For embedding the MSB bit planes of watermark image in the cover image each curvelet coefficient of blue planes of the processed cover image has been compared with the value of its 8 connected coefficients (neighbors). The results of the watermarking scheme have been analyzed by different quality assessment metric such as PSNR, Correlation Coefficient (CC) and Mean Structure Similarity Index Measure (MSSIM). The experimental results show that the proposed technique gives the good invisibility of watermark, the quality of extracting watermark and robustness against different attacks.

Cite This Paper

Ranjeeta, Sanjay Sharma, L. R. Raheja, "A Secure and Semi-Blind Technique of Embedding Color Watermark in RGB Image Using Curvelet Domain", International Journal of Information Technology and Computer Science(IJITCS), Vol.9, No.3, pp.62-70, 2017. DOI:10.5815/ijitcs.2017.03.07

Reference

[1]Lee, Sin-Joo, and Sung-Hwan Jung. "A survey of watermarking techniques applied to multimedia." Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium on. Vol. 1. IEEE, 2001.

[2]Cox, Ingemar, et al. Digital watermarking and steganography. Morgan Kaufmann, 2007.

[3]Chang, Chin-Chen, Tung-Shou Chen, and Lou-Zo Chung. "A steganographic method based upon JPEG and quantization table modification." Information Sciences 141.1 (2002): 123-138.

[4]Chang, Chin-Chen, Tung-Shou Chen, and Lou-Zo Chung. "A steganographic method based upon JPEG and quantization table modification." Information Sciences 141.1 (2002): 123-138. 

[5]Huang, Jiwu, Yun Q. Shi, and Yi Shi. "Embedding image watermarks in DC components." IEEE Transactions on Circuits and Systems for Video Technology 10.6 (2000): 974-979. 

[6]C. S LU, S. K. Huang, C. J. Sze, H. Y. M. Liao.: Cocktail watermarking for digital image protection. IEEE Trans. Multimedia. 2000, 2, pp 209-224.

[7]S. H. Wang, Y. P. Lin.: Wavelet tree quantization for copyright protection watermarking, IEEE Trans. Image Process. 2004, 13, pp 154–165.

[8]Gunjal, Baisa L., and Suresh N. Mali. "Strongly robust and highly secured DWT-SVD based color image watermarking: embedding data in all Y, U, V color spaces." International Journal of Information Technology and Computer Science (IJITCS) 4.3 (2012): 1.

[9]P. Tao, A. M. Eskicioglu.: A Robust Multiple Watermarking Scheme in the Discrete Wavelet Transform Domain. Optics East Internet Multimedia Management Systems Conference, Philadelphia, PA, 2004

[10]Gunjal, Baisa L. "Robust, Secure and High Capacity Watermarking Technique based on Image Partitioning-Merging Scheme." International Journal of Information Technology and Computer Science (IJITCS) 8.4 (2016): 74.

[11]Do, Minh N., and Martin Vetterli. "The finite ridgelet transform for image representation." IEEE Transactions on image Processing 12.1 (2003): 16-28.

[12]Candes, Emmanuel J., and David L. Donoho. Curvelets: A surprisingly effective nonadaptive representation for objects with edges. Stanford Univ Ca Dept of Statistics, 2000.

[13]Donoho, David L., and Mark R. Duncan. "Digital curvelet transform: strategy, implementation, and experiments." AeroSense 2000. International Society for Optics and Photonics, 2000.

[14]Hien, Thai Duy, et al. "Curvelet-domain image watermarking based on edge-embedding." International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer Berlin Heidelberg, 2007.

[15]Shi, Jianping, and ZhengjunZhai. "Curvelet transform for image authentication." International Conference on Rough Sets and Knowledge Technology. Springer Berlin Heidelberg, 2006.

[16]Lin, C-Y., et al. "Rotation, scale, and translation resilient watermarking for images." IEEE transactions on image processing 10.5 (2001): 767-782.

[17]Solachidis, Vassilios, and Loannis Pitas. "Circularly symmetric watermark embedding in 2-D DFT domain." IEEE transactions on image processing 10.11 (2001): 1741-1753.

[18]Stankovic, Srdjan, Igor Djurovic, and Ioannis Pitas. "Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution." IEEE Transactions on Image Processing 10.4 (2001): 650-658.

[19]Candès, Emmanuel J., and David L. Donoho. "New tight frames of curvelets and optimal representations of objects with piecewise C2 singularities." Communications on pure and applied mathematics 57.2 (2004): 219-266.

[20]Donoho, D. L., and E. Candes. "Continuous curvelet transform. II. Discretization and frames." Appl. Comput. Harmon. Anal 19.2 (2005): 198-222.

[21]Hien, Thai Duy, et al. "Curvelet transform based logo watermarking." Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications. Springer Netherlands, 2007. 305-309.

[22]Hien, Thai Duy, et al. "Curvelet-domain image watermarking based on edge-embedding." International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer Berlin Heidelberg, 2007.

[23]Marini, Enrico, et al. "Evaluation of standard watermarking techniques." Electronic Imaging 2007. International Society for Optics and Photonics, 2007.

[24]Kaur, Rupinder. "A medical image watermarking technique for embedding EPR and Its quality assessment using no-reference metrics." International Journal of Information Technology and Computer Science (IJITCS) 5.2 (2013): 73.

[25]Wang, Zhou, and Alan C. Bovik. "Mean squared error: love it or leave it? A new look at signal fidelity measures." IEEE signal processing magazine 26.1 (2009): 98-117.

[26]Wang, Zhou, et al. "Image quality assessment: from error visibility to structural similarity." IEEE transactions on image processing 13.4 (2004): 600-612.