Adaptive digital image watermarking for color images in frequency domain

被引:47
作者
Kalra, G. S. [1 ]
Talwar, R. [2 ]
Sadawarti, H. [3 ]
机构
[1] Lovely Profess Univ, Sch Elect Engn, Jalandhar, Punjab, India
[2] Punjab Tech Univ, CGC Coll Engn, Kapurthala, Punjab, India
[3] Punjab Tech Univ, RIMTIET, Kapurthala, Punjab, India
关键词
Watermarking; Error correcting codes; DCT; DWT; Frequency domain; ROBUST;
D O I
10.1007/s11042-014-1932-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We have presented an algorithm of digital image watermarking for color images which we implemented in frequency domain. Before inserting the watermark, we added the Hamming codes row wise as well column wise in the intensity component of color image. Two encryption techniques were implemented on the ECC inserted watermark for its security. The pixel position for inserting the watermark was calculated using starting row and column number for that 8 x 8 block. Pixel embedding strength is calculated using criteria that low frequency is robust in general signal processing attacks, thus choosing less value to be embedded and vice-versa. Results show that the watermarking algorithm is robust against common signal processing attacks. The algorithm is tested against multiple attacks also.
引用
收藏
页码:6849 / 6869
页数:21
相关论文
共 22 条
  • [1] LIST DECODING OF REED SOLOMON CODES FOR WAVELET BASED COLOUR IMAGE WATERMARKING SCHEME
    Abdul, Wadood
    Carre, Philippe
    Gaborit, Philippe
    [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 3637 - +
  • [2] Blind Image Watermarking Using a Sample Projection Approach
    Akhaee, Mohammad Ali
    Sahraeian, Sayed Mohammad Ebrahim
    Jin, Craig
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 883 - 893
  • [3] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [4] Business Software Alliances, 2007, PIR STUD 4 ANN BSA I
  • [5] Cika P., 2009, 16 INT C SYST SIGN I, P1
  • [6] Short collusion-secure fingerprints based on dual binary Hamming codes
    Domingo-Ferrer, J
    Herrera-Joancomartí, J
    [J]. ELECTRONICS LETTERS, 2000, 36 (20) : 1697 - 1699
  • [7] Ge HT, 2002, 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, P1584, DOI 10.1109/ICOSP.2002.1180100
  • [8] Gu LM, 2003, PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, P798
  • [9] Guyeux Christophe, 2010, Proceedings of the Second International Conference on Evolving Internet (INTERNET 2010). First International Conferences on Access Networks, Services and Technologies (ACCESS 2010), P119, DOI 10.1109/INTERNET.2010.29
  • [10] Optimum retrieval of watermark from wavelet significant coefficients
    Jayalakshmi, M.
    Merchant, S. N.
    Desai, U. B.
    [J]. IET INFORMATION SECURITY, 2008, 2 (04) : 119 - 128