Robust and blind image watermarking via circular embedding and bidimensional empirical mode decomposition

被引:20
作者
Wang, Xiaochao [1 ]
Hu, Kun [2 ]
Hu, Jianping [3 ]
Du, Ling [1 ]
Ho, Anthony T. S. [4 ]
Qin, Hong [5 ]
机构
[1] Tiangong Univ, Sch Math Sci, Tianjin 300387, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[3] Northeast Elect Power Univ, Sch Sci, Jilin 132012, Jilin, Peoples R China
[4] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[5] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
关键词
Image watermarking; Circular embedding; BEMD; Arnold transform; Hilbert curve; SINGULAR-VALUE DECOMPOSITION; TRANSFORM; DOMAIN; COMPUTATION; ALGORITHM; RECOVERY; SCHEME; SYSTEM; EMD;
D O I
10.1007/s00371-020-01909-2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, a robust and blind image watermarking algorithm via circular embedding and bidimensional empirical mode decomposition (BEMD) is developed. First, the watermark image is scrambled by Arnold transform to increase the security of the algorithm. Second, the Hilbert curve is adopted to reduce the scrambled 2D watermark image to one-dimensional watermark signal. Third, the host image is decomposed by BEMD to obtain the multi-scale representation in the forms of intrinsic mode functions (IMFs) and a residue. Then, the extreme points of the IMFs are extracted as the embedding locations. Finally, the one-dimensional watermark signal is repeatedly and cyclically embedded in the extreme locations of the first IMF according to the texture masking characteristics of the human visual system, which greatly improves the ability of our algorithm against various attacks. The final watermarked image is reconstructed by combining the modified first IMF and the residual. The watermark can be successfully extracted without resorting to the original host image. Furthermore, image correction can be applied before image watermarking extraction if there are geometric attacks in watermarked image. A large number of experimental results and thorough evaluations confirm that our method can obtain higher imperceptibility and robustness under different types of attacks, and achieve better performance than the current state-of-the-art watermarking algorithms, especially in large-scale cropping attack, JPEG compression, Gaussian noise, sharpening, Gamma correction, scaling, histogram equalization, and rotation attacks.
引用
收藏
页码:2201 / 2214
页数:14
相关论文
共 39 条
[21]   A Survey Study on Singular Value Decomposition and Genetic Algorithm Based on Digital Watermarking Techniques [J].
Hussein, Mokhtar ;
Bairam, Manjula .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 :7-16
[22]   A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm [J].
Lai, Chih-Chin .
DIGITAL SIGNAL PROCESSING, 2011, 21 (04) :522-527
[23]   Dither modulation of significant amplitude difference for wavelet based robust watermarking [J].
Li, Chunlei ;
Zhang, Zhaoxiang ;
Wang, Yunhong ;
Ma, Bin ;
Huang, Di .
NEUROCOMPUTING, 2015, 166 :404-415
[24]   A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling [J].
Roy, Soumitra ;
Pal, Arup Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) :3577-3616
[25]  
Sagan H., 1993, INT J MATH EDUC SCI, V24, P541, DOI [DOI 10.1080/0020739930240405, 10.1080/0020739930240405]
[26]   Digital image dual watermarking using self-fractional fourier functions, bivariate empirical mode decomposition and error correcting code [J].
Sharma J.B. ;
Sharma K.K. ;
Sahula V. .
Journal of Optics, 2013, 42 (3) :214-227
[27]   A new robust watermarking system in integer DCT domain [J].
Singh, Satendra Pal ;
Bhatnagar, Gaurav .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 53 :86-101
[28]   Fourier Depth of Field [J].
Soler, Cyril ;
Subr, Kartic ;
Durand, Fredo ;
Holzschuch, Nicolas ;
Sillion, Francois .
ACM TRANSACTIONS ON GRAPHICS, 2009, 28 (02)
[29]   WACA: a new blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation [J].
Soleymani, Seyyed Hossein ;
Taherinia, Amir Hossein ;
Mohajerzadeh, Amir Hossein .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (14) :19163-19179
[30]  
Tao PN, 2006, CONSUM COMM NETWORK, P1134