Robust Image Watermarking Based on ICA-DCT and Noise Augmentation Technique

被引:0
作者
Soleymani, Seyyed Hossein [1 ]
Taherinia, Amir Hossein [1 ]
机构
[1] Ferdowsi Univ Mashhad, Dept Comp Engn, Mashhad, Iran
来源
2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE) | 2015年
关键词
component; Blind Watermarking; ICA; DCT; compression attack; Spread Spectrum technique;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, We present a blind image watermarking method based on DCT domain and independent component analysis (ICA). First of all, an approximation of cover image is created using ICA. We divide approximation image to equal 8x8 blocks and then apply DCT transform to each block. We use spread spectrum (SS) method for embedding the watermark bits. In our method a group of random bits are generated and embedded into high frequency coefficients of each block using SS method. For finding the watermark bits, we denoise watermarked image in order to augment the noise that was embedded into cover image. Then similar to embedding process the approximation image is created from the augmented noise image using ICA, and two group of random bits are generated again, and correlation of high frequency coefficients of the watermarked approximation image with the groups of random bits is computed. We find that, higher robustness and better imperceptibility is obtained because of using approximation image and spread spectrum technique. We test our method against some attacks such as additive Gaussian noise, Salt and Pepper noise, Speckle noise, JPEG and JPEG2000 compression and Average filter. Results show that, our method have a high robustness against Gaussian noise and compression, and good imperceptibility measure like PSNR for the watermarked images. Sensitivity to geometric attacks and need to more times for calculating ICA are two limitations of this method.
引用
收藏
页码:18 / 23
页数:6
相关论文
共 18 条
  • [11] Simultaneous Blind Separation and Recognition of Speech Mixtures Using Two Microphones to Control a Robot Cleaner
    Lee, Heungkyu
    [J]. INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2013, 10
  • [12] A robust DCT-based watermarking for copyright protection
    Lin, SD
    Chen, CF
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (03) : 415 - 421
  • [13] WMicaD: A new digital watermarking technique using independent component analysis
    Nguyen, Thang Viet
    Patra, Jagdish Chandra
    Meher, Pramod Kumar
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, 2008 (1)
  • [14] PETICOLAS AP, 1998, 2 WORKSH INF HID POR
  • [15] Information hiding - A survey
    Petitcolas, FAP
    Anderson, RJ
    Kuhn, MG
    [J]. PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1062 - 1078
  • [16] Ramaraj M, 2011, COMP COMM EL TECHN I
  • [17] A two-step watermarking attack using long-range correlation image restoration
    Taherinia, Amir H.
    Jamzad, Mansour
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (06) : 625 - 635
  • [18] Wayner P, 2008, INT J IMAGE GRAPHICS