A Robust Image Watermarking in Contourlet Transform Domain

被引:1
作者
Sharma, Rajat [1 ]
Gupta, Abhishek Kumar [1 ]
Singh, Deepak [1 ]
Verma, Vivek Singh [1 ]
Bhardwaj, Anuj [2 ]
机构
[1] Ajay Kumar Garg Engn Coll, Ghaziabad 201009, India
[2] Jaypee Inst Informat Technol, Noida 201307, India
来源
ADVANCEMENT IN MATHEMATICAL SCIENCES | 2017年 / 1897卷
关键词
Contourlet Transform; Lifting Wavelet Transform; Discrete Cosine Transform; Watermarking; DIGITAL IMAGE; SCHEME;
D O I
10.1063/1.5008693
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A lot of work has been done in the field of image watermarking to overcome the problems of rightful ownership, copyright protection etc. In order to provide a robust solution of such issues, the authors propose a hybrid approach that involves contourlet, lifting wavelet, and discrete cosine transform. The first level coefficients of the original image which are obtained using contourlet transform are further decomposed using one level lifting wavelet transform. After that, these coefficients are modified using discrete cosine transform. Whereas, second level subband of contourlet transform coefficients are used to obtain block wise modification parameter based on edge detection and entropy calculations. Watermark bits are embedded by quantizing the discrete cosine transform coefficient blocks obtained using HL sub-band of first level lifting wavelet transform coefficients. The experimental results reveal that the proposed scheme has high robustness and imperceptibility.
引用
收藏
页数:6
相关论文
共 22 条
[1]   Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment [J].
Akhaee, Mohammad Ali ;
Sahraeian, S. Mohammad Ebrahim ;
Marvasti, Farokh .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (04) :967-980
[2]  
[Anonymous], 2003, Techniques and Applications of Digital Watermarking and Content Protection
[3]  
Bas P., 2008, BREAK OUR WATERMARKI
[4]   A Robust Watermarking Scheme using Lifting Wavelet Transform and Singular Value Decomposition [J].
Bhardwaj, Anuj ;
Verma, Deval ;
Verma, Vivek Singh .
MATHEMATICAL SCIENCES AND ITS APPLICATIONS, 2017, 1802
[5]   Watermarking security: Theory and practice [J].
Cayre, F ;
Fontaine, C ;
Furon, T .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3976-3987
[6]   Adaptive blind image watermarking using edge pixel concentration [J].
Fazlali, H. R. ;
Samavi, S. ;
Karimi, N. ;
Shirani, S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) :3105-3120
[7]  
Furht B., 2005, MULTIMEDIA SECURITY
[8]  
Ghannam S., 2009, 16 IEEE INT C IM PRO, P3645
[9]   An adaptive watermarking scheme for e-government document images [J].
Horng, Shi-Jinn ;
Rosiyadi, Didi ;
Fan, Pingzhi ;
Wang, Xian ;
Khan, Muhammad Khurram .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) :3085-3103
[10]  
Islam S.M. M., 2007, INT C INF COMM TECHN, P246