An image watermarking technique based on cascaded iterative Fourier transform

被引:5
作者
Sang, Jun [1 ]
Zhang, Bing [1 ]
Hong, Daxiang [1 ]
Xiang, Hong [1 ]
Xu, Hongsheng [2 ]
Sang, Nong [2 ]
机构
[1] Chongqing Univ, Sch Software Engn, Chongqing 401331, Peoples R China
[2] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Hubei, Peoples R China
来源
OPTIK | 2013年 / 124卷 / 20期
基金
中国国家自然科学基金;
关键词
Image watermarking; Double random phase encoding; Cascaded iterative Fourier transform; Watermark generation; Security; OPTICAL ENCRYPTION; INFORMATION; ATTACK; PLANE;
D O I
10.1016/j.ijleo.2013.01.055
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
As an optical image encryption technique, the double random phase encoding (DRPE) technique can be used to encrypt the watermark image. However, since the DRPE system may be attacked with cryptanlysis, the security of the DRPE technique is somewhat weak. To improve the security, an image watermark generation algorithm based on cascaded iterative Fourier transform algorithm (CIFT) was proposed. In the proposed algorithm, two phase masks were obtained by applying the CIFT algorithm on the original reference watermark image and the final embedded watermark image was obtained with them. One of the phase masks was kept as the secret key. When detecting the watermark, the embedded watermark was extracted from the watermarked host image. Then, the recovered watermarked was obtained with the extracted watermark and the secret key. By comparing the recovered watermark and the original reference watermark, whether the tested image containing the watermark or not can be judged. With the CIFT algorithm, it is more secure to generate the embedded watermark. In addition, it is practical because only one of the phase masks is needed for watermark recovery. The simulation results show that the proposed method has good imperceptibility and robustness. (C) 2013 Elsevier GmbH. All rights reserved.
引用
收藏
页码:4522 / 4525
页数:4
相关论文
共 17 条
[11]   A cascaded iterative Fourier transform algorithm for optical security applications [J].
Situ, GH ;
Zhang, JJ .
OPTIK, 2003, 114 (10) :473-477
[12]   Digital watermarking by a holographic technique [J].
Takai, N ;
Mifune, Y .
APPLIED OPTICS, 2002, 41 (05) :865-873
[13]   Optical encryption by double-random phase encoding in the fractional Fourier domain [J].
Unnikrishnan, G ;
Joseph, J ;
Singh, K .
OPTICS LETTERS, 2000, 25 (12) :887-889
[14]   Double random-phase encryption based on discrete quaternion fourier-transforms [J].
Wang, Xiaolei ;
Zhai, Hongchen ;
Li, Zhilei ;
Ge, Qi .
OPTIK, 2011, 122 (20) :1856-1859
[15]  
Wei Hengzheng, 2007, Acta Optica Sinica, V27, P824
[16]   A method for hiding information utilizing double-random phase-encoding technique [J].
Xin, Zhou ;
Dong, Lai ;
Sheng, Yuan ;
Da-hai, Li ;
Jian-Ping, Hu .
OPTICS AND LASER TECHNOLOGY, 2007, 39 (07) :1360-1363
[17]   Optical image encryption based on interference [J].
Zhang, Yan ;
Wang, Bo .
OPTICS LETTERS, 2008, 33 (21) :2443-2445