Robust color image watermarking algorithm based on synchronization correction with multi-layer perceptron and Cauchy distribution model

被引:14
作者
Jiang, Mei-ru [1 ]
Feng, Xiu-fang [1 ]
Wang, Chun-peng [2 ]
Fan, Xiao-le [1 ]
Zhang, Hao [3 ]
机构
[1] Taiyuan Univ Technol, Coll Software, Taiyuan 030024, Peoples R China
[2] Qilu Univ Technol, Shandong Acad Sci, Sch Cyber Secur, Jinan 250300, Peoples R China
[3] Taiyuan Univ Technol, Coll Informat & Comp, Taiyuan 030024, Peoples R China
基金
中国国家自然科学基金;
关键词
Color image watermarking; Quaternion discrete cosine transform; (QDCT); Multi-layer perceptron (MLP); Cauchy distribution model; Dual-tree complex wavelet transform; Hyperchaotic mapping; (DTCWT);
D O I
10.1016/j.asoc.2023.110271
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A robust color image watermarking algorithm based on the multi-layer Perceptron (MLP) and Cauchy distribution model is proposed. The algorithm has great performance against geometric attacks. Firstly, the central region of the Y-color channel is extracted, and the watermark is embedded into the low-frequency component by dual-tree complex wavelet transform (DTCWT). A synchronization correction technique based on the MLP model is used prior to the watermark extraction. When the MLP model is trained, the position and scale parameters of the Cauchy distribution are employed to generate the image feature vector after first calculating the quaternion discrete cosine transform (QDCT) of the original color host image. The new 3D hyperchaotic mapping is used during the algorithmic process to increase security, which is employed for scrambling, encryption, and embedding of watermarks, respectively. The experimental results demonstrate that the proposed algorithm has good imperceptibility, accurate model prediction, and excellent robustness against common image processing attacks and geometric attacks.
引用
收藏
页数:15
相关论文
共 26 条
  • [1] Self-adaptive step firefly algorithm based robust watermarking method in DWT-SVD domain
    Altay, Seyma Yucel
    Ulutas, Guzin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (15) : 23457 - 23484
  • [2] [Anonymous], 2018, STAND COL IM COMP VI
  • [3] Locally Optimal Detection of Image Watermarks in the Wavelet Domain Using Bessel K Form Distribution
    Bian, Yong
    Liang, Steve
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (06) : 2372 - 2384
  • [4] Designing a 2D infinite collapse map for image encryption
    Cao, Weijia
    Mao, Yujun
    Zhou, Yicong
    [J]. SIGNAL PROCESSING, 2020, 171
  • [5] Quaternion discrete cosine transform and its application in color template matching
    Feng, Wei
    Hu, Bo
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 252 - 256
  • [6] Robust Image Watermarking Theories and Techniques: A Review
    Hai Tao
    Li Chongmin
    Zainl, Jasni Mohamad
    Abdalla, Ahmed N.
    [J]. JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2014, 12 : 122 - 138
  • [7] Chaotic characteristics of a one-dimensional iterative map with infinite collapses
    He, D
    He, C
    Jiang, LG
    Zhu, HW
    Hu, GR
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (07) : 900 - 906
  • [8] Khadangi E, 2013, PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), P466, DOI 10.1109/ICCKE.2013.6682864
  • [9] Image steganography based on style transfer and quaternion exponent moments
    Li, Qi
    Wang, Xingyuan
    Ma, Bin
    Wang, Xiaoyu
    Wang, Chunpeng
    Xia, Zhiqiu
    Shi, Yunqing
    [J]. APPLIED SOFT COMPUTING, 2021, 110
  • [10] Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT
    Li, Zhenyu
    Zhang, Hao
    Liu, Xilin
    Wang, Chulnpeng
    Wang, Xingyuan
    [J]. DIGITAL SIGNAL PROCESSING, 2021, 115