Dual domain robust watermarking scheme using random DFRFT and least significant bit technique

被引:4
作者
Sharma, Deepak [1 ]
Saxena, Rajiv [2 ]
Singh, Narendra [1 ]
机构
[1] Jaypee Univ Engn & Technol, Raghogarh 473226, India
[2] Jaypee Univ, Anupshahr 203390, India
关键词
Least significant bit; Multiple parameter discrete fractional Fourier transform; Random discrete fractional Fourier transform; Watermark; FRACTIONAL FOURIER-TRANSFORM; DISCRETE WAVELET TRANSFORM; SINGULAR-VALUE DECOMPOSITION; IMAGE WATERMARKING; MULTIPLE WATERMARKING; DIGITAL WATERMARKING; ALGORITHM;
D O I
10.1007/s11042-016-4095-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel image watermarking scheme that uses multipleparameter discrete fractional Fourier transform (MPDFRFT) with random DFRFT and least significant bit (LSB) technique. The proposed scheme uses the LSB technique to embed watermark image in an original image, while RDFRFT and MPDFRFT are used to enhance the security of the watermarked image. The presented method aims to make the system more robust and secure at two different levels along with faster embedding and extraction process. The MPDFRFT is input data points of order DFRFT parameters. The MPDFRFT can be converted to the DFRFT when all of its order parameters have same values. On the other hand, RDFRFT is kernel matrix with random values of their DFT eigenvectors and Eigenvalues. Random magnitude and phase of its transformed output are unique features of RDFRFT that utilised to enhance security. LSB technique is preferred for watermark embedding because of its lesser effect on the image perceptibility. In proposed scheme, the cover image is converted into sub-images and MPDFRFT is applied to each sub-image. Then RDFRFT is applied in tandem to transformed sub-images in order to enhance robustness followed by watermark embedding using LSB technique. In watermark extraction process the inverse of MPDFRFT and RDFRFT is applied for reconstruction of original images along with LSB extraction mechanism. The performance of the proposed system is evaluated by using MATLAB software under various attacks and distortions. The simulation results validate that the embedding scheme presented in this work has better performance in terms of robustness along with perceptibility and security over contemporary existing schemes.
引用
收藏
页码:3921 / 3942
页数:22
相关论文
共 43 条
[1]   A robust blind color image watermarking based on wavelet-tree bit host difference selection [J].
Al-Otum, Hazem Munawer ;
Samara, Nedal Abdul .
SIGNAL PROCESSING, 2010, 90 (08) :2498-2512
[2]   THE FRACTIONAL FOURIER-TRANSFORM AND TIME-FREQUENCY REPRESENTATIONS [J].
ALMEIDA, LB .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1994, 42 (11) :3084-3091
[3]   Robust digital watermarking in the ridgelet domain [J].
Campisi, P ;
Kundur, D ;
Neri, A .
IEEE SIGNAL PROCESSING LETTERS, 2004, 11 (10) :826-830
[4]   The discrete fractional Fourier transform [J].
Candan, Ç ;
Kutay, MA ;
Ozaktas, HM .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (05) :1329-1337
[5]   Dual Digital Watermarking Algorithm for Image Based on Fractional Fourier Transform [J].
Cui, Delong .
PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, :51-54
[6]   Local histogram based geometric invariant image watermarking [J].
Deng, Cheng ;
Gao, Xinbo ;
Li, Xuelong ;
Tao, Dacheng .
SIGNAL PROCESSING, 2010, 90 (12) :3256-3264
[7]   EIGENVECTORS AND FUNCTIONS OF THE DISCRETE FOURIER-TRANSFORM [J].
DICKINSON, BW ;
STEIGLITZ, K .
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1982, 30 (01) :25-31
[8]   A color image watermarking scheme based on hybrid classification method Particle swarm optimization and k-nearest neighbor algorithm [J].
Findik, Oguz ;
Babaoglu, Ismail ;
Ulker, Erkan .
OPTICS COMMUNICATIONS, 2010, 283 (24) :4916-4922
[9]   Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition [J].
Ganic, E ;
Eskicioglu, AM .
JOURNAL OF ELECTRONIC IMAGING, 2005, 14 (04)
[10]   A hybrid SVD-DCT watermarking method based on LPSNR [J].
Huang, FJ ;
Guan, ZH .
PATTERN RECOGNITION LETTERS, 2004, 25 (15) :1769-1775