An image watermarking technique based on cascaded iterative Fourier transform

被引:5
作者
Sang, Jun [1 ]
Zhang, Bing [1 ]
Hong, Daxiang [1 ]
Xiang, Hong [1 ]
Xu, Hongsheng [2 ]
Sang, Nong [2 ]
机构
[1] Chongqing Univ, Sch Software Engn, Chongqing 401331, Peoples R China
[2] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Hubei, Peoples R China
来源
OPTIK | 2013年 / 124卷 / 20期
基金
中国国家自然科学基金;
关键词
Image watermarking; Double random phase encoding; Cascaded iterative Fourier transform; Watermark generation; Security; OPTICAL ENCRYPTION; INFORMATION; ATTACK; PLANE;
D O I
10.1016/j.ijleo.2013.01.055
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
As an optical image encryption technique, the double random phase encoding (DRPE) technique can be used to encrypt the watermark image. However, since the DRPE system may be attacked with cryptanlysis, the security of the DRPE technique is somewhat weak. To improve the security, an image watermark generation algorithm based on cascaded iterative Fourier transform algorithm (CIFT) was proposed. In the proposed algorithm, two phase masks were obtained by applying the CIFT algorithm on the original reference watermark image and the final embedded watermark image was obtained with them. One of the phase masks was kept as the secret key. When detecting the watermark, the embedded watermark was extracted from the watermarked host image. Then, the recovered watermarked was obtained with the extracted watermark and the secret key. By comparing the recovered watermark and the original reference watermark, whether the tested image containing the watermark or not can be judged. With the CIFT algorithm, it is more secure to generate the embedded watermark. In addition, it is practical because only one of the phase masks is needed for watermark recovery. The simulation results show that the proposed method has good imperceptibility and robustness. (C) 2013 Elsevier GmbH. All rights reserved.
引用
收藏
页码:4522 / 4525
页数:4
相关论文
共 17 条
[1]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[2]   Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain [J].
Chen, Wen ;
Chen, Xudong .
OPTICS COMMUNICATIONS, 2011, 284 (16-17) :3913-3917
[3]   An improved watermarking method based on double random phase encoding technique [J].
Chen Yao-yao ;
Zhou Xin ;
Xiao Yong-liang ;
Yuan Sheng ;
Wu Xiu-ling .
OPTICS AND LASER TECHNOLOGY, 2010, 42 (04) :617-623
[4]  
Cox I. J., 2002, Digital watermarking, V53
[5]   A known-plaintext heuristic attack on the Fourier plane encryption algorithm [J].
Gopinathan, U ;
Monaghan, DS ;
Naughton, TJ ;
Sheridan, JT .
OPTICS EXPRESS, 2006, 14 (08) :3181-3186
[6]   Information hiding technique with double phase encoding [J].
Kishk, S ;
Javidi, B .
APPLIED OPTICS, 2002, 41 (26) :5462-5470
[7]   Hybrid encoding method for hiding information by assembling double-random phase-encoding technique and binary encoding method [J].
Lin, Kuang Tsan .
APPLIED OPTICS, 2010, 49 (19) :3814-3820
[8]   Known-plaintext attack on double phase encoding encryption technique [J].
Peng, X ;
Zhang, P ;
Wei, HZ ;
Yu, B .
ACTA PHYSICA SINICA, 2006, 55 (03) :1130-1136
[9]   OPTICAL-IMAGE ENCRYPTION BASED ON INPUT PLANE AND FOURIER PLANE RANDOM ENCODING [J].
REFREGIER, P ;
JAVIDI, B .
OPTICS LETTERS, 1995, 20 (07) :767-769
[10]  
Salomon D., 2003, Data privacy and security: encryption and information hiding