A Hybrid Domain Color Image Watermarking Based on DWT-SVD

被引:38
作者
Roy, Soumitra [1 ]
Pal, Arup Kumar [2 ]
机构
[1] Dr BC Roy Engn Coll, Dept Comp Sci & Engn, Durgapur 713206, W Bengal, India
[2] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Color image watermarking; DWT; SVD; YCbCr color space; SCHEME; ROBUST; ALGORITHM;
D O I
10.1007/s40998-018-0109-x
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, digital image watermarking has been emerged as a promising solution for copyright protection and authentication problem of digital images. Among several existing watermarking schemes, very few have been designed for the authenticity and copyright protection problem of color images. To protect the copyright and validate the authenticity of color images, in this paper a hybrid robust image watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition is proposed and simulated. Initially, RGB color image is switched to YCbCr color space from which only Y achromatic component is considered for watermark data insertion. In the next step, Y component of the YCbCr color model is decomposed into non-overlapping blocks and subsequently DWT are applied to each block. In this work, non-overlapping decomposed gray watermark image blocks are embedded into singular values of DWT-transformed cover image blocks. Proposed technique's simulation result established the robustness by extracting adequate watermark data from the restructured cover image after applying common geometric transformation attacks (like rotation, flip operation, cropping, scaling, shearing and deletion of lines or column operation), common enhancement technique attacks (like lowpass filtering, histogram equalization, sharpening, gamma correction, noise addition), JPEG compression attacks and combinational attacks (like combination of geometric transformation attacks and common enhancement technique attacks, combination of geometric transformation attacks and JPEG compression attacks, combination of common enhancement technique attacks and JPEG compression attacks, and combination of geometric transformation attacks and geometric transformation attacks).
引用
收藏
页码:201 / 217
页数:17
相关论文
共 44 条
[1]  
Agarwal R., 2011, IJCA COMPUTATIONAL S, V4, P144
[2]  
Al-Haj Ali, 2007, Journal of Computer Sciences, V3, P740, DOI 10.3844/jcssp.2007.740.746
[3]   A robust image watermarking technique using SVD and differential evolution in DCT domain [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Pant, Millie .
OPTIK, 2014, 125 (01) :428-434
[4]  
Amini M, 2010, MACHINE VISION IMAGE, P1
[5]   Digital watermark extraction in wavelet domain using hidden Markov model [J].
Amini, Marzieh ;
Ahmad, M. Omair ;
Swamy, M. N. S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) :3731-3749
[6]  
Amini M, 2012, INT CONF SIGN PROCES, P632, DOI 10.1109/ICoSP.2012.6491567
[7]  
Amini M, 2010, IMAGAPP & IVAPP 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGING THEORY AND APPLICATIONS AND INTERNATIONAL CONFERENCE ON INFORMATION VISUALIZATION THEORY AND APPLICATIONS, P43
[8]  
Amini M, 2010, INT CONF SIGN PROCES, P1813, DOI 10.1109/ICOSP.2010.5656657
[9]  
[Anonymous], 2011, DIGITAL IMAGE PROCES
[10]  
[Anonymous], 2011, INT J COMPUT ELECT E, DOI DOI 10.7763/IJCEE.2011.V3.285