Robust Image Watermarking Based on ICA-DCT and Noise Augmentation Technique

被引:0
作者
Soleymani, Seyyed Hossein [1 ]
Taherinia, Amir Hossein [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp Engn, Mashhad, Iran
来源
2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE) | 2015年
关键词
component; Blind Watermarking; ICA; DCT; compression attack; Spread Spectrum technique;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, We present a blind image watermarking method based on DCT domain and independent component analysis (ICA). First of all, an approximation of cover image is created using ICA. We divide approximation image to equal 8x8 blocks and then apply DCT transform to each block. We use spread spectrum (SS) method for embedding the watermark bits. In our method a group of random bits are generated and embedded into high frequency coefficients of each block using SS method. For finding the watermark bits, we denoise watermarked image in order to augment the noise that was embedded into cover image. Then similar to embedding process the approximation image is created from the augmented noise image using ICA, and two group of random bits are generated again, and correlation of high frequency coefficients of the watermarked approximation image with the groups of random bits is computed. We find that, higher robustness and better imperceptibility is obtained because of using approximation image and spread spectrum technique. We test our method against some attacks such as additive Gaussian noise, Salt and Pepper noise, Speckle noise, JPEG and JPEG2000 compression and Average filter. Results show that, our method have a high robustness against Gaussian noise and compression, and good imperceptibility measure like PSNR for the watermarked images. Sensitivity to geometric attacks and need to more times for calculating ICA are two limitations of this method.
引用
收藏
页码:18 / 23
页数:6
相关论文
共 18 条
  • [1] Comon P, 2010, HANDBOOK OF BLIND SOURCE SEPARATION: INDEPENDENT COMPONENT ANALYSIS AND APPLICATIONS, P1
  • [2] Cox I, 2008, DIGITAL WATERMARKING
  • [3] A novel blind robust image watermarking in DCT domain using. inter-block coefficient correlation
    Das, Chinmayee
    Panigrahi, Swetalina
    Sharma, Vijay K.
    Mahapatra, K. K.
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (03) : 244 - 253
  • [4] GOLIKERI A, 2005, J P IEEE
  • [5] Robust Image Watermarking Theories and Techniques: A Review
    Hai Tao
    Li Chongmin
    Zainl, Jasni Mohamad
    Abdalla, Ahmed N.
    [J]. JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2014, 12 : 122 - 138
  • [6] Robust multi-logo watermarking by RDWT and ICA
    Hien, Thai Duy
    Nakao, Zensho
    Chen, Yen-Wei
    [J]. SIGNAL PROCESSING, 2006, 86 (10) : 2981 - 2993
  • [7] KASMANI SA, 2009, COMP SCI INF TECHN S
  • [8] A recent survey of reversible watermarking techniques
    Khan, Asifullah
    Siddiqa, Ayesha
    Munib, Summuyya
    Malik, Sana Ambreen
    [J]. INFORMATION SCIENCES, 2014, 279 : 251 - 272
  • [9] Lagzian, 2011, OPTICAL ENG, V2, P22
  • [10] Lagzian S, 2011, Int J Intell Inf Process, V2, P22, DOI DOI 10.4156/IJIIP