Robust image watermarking scheme using bit-plane of hadamard coefficients

被引:26
作者
Etemad, Elham [1 ]
Samavi, Shadrokh [2 ,4 ]
Soroushmehr, S. M. Reza [3 ]
Karimi, Nader [2 ]
Etemad, Mohammad [1 ]
Shirani, Shahram [4 ]
Najarian, Kayvan [3 ]
机构
[1] Dalhousie Univ, Dept Comp Sci, Halifax, NS, Canada
[2] Isfahan Univ Technol, Dept Elect & Comp Engn, Esfahan 8415683111, Iran
[3] Univ Michigan, Ctr Integrat Res Crit Care MCIRCC, Ann Arbor, MI 48109 USA
[4] McMaster Univ, ECE Dept, Hamilton, ON, Canada
关键词
Image watermarking; Hadamard transform; Copyright; Robustness; Transparency; TRANSFORM;
D O I
10.1007/s11042-016-4278-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, due to widespread usage of the Internet, digital contents are distributed quickly and inexpensively throughout the world. Watermarking techniques can help protect authenticity of digital contents by identifying their owners. In a watermarking procedure, owner information may be embedded in the spatial domain or transform domain of host images. Since watermarking algorithms must be tamper resistant and transparent, we present a watermarking method based on a transform domain. In this method, we employ Hadamard transform as it requires simpler operations compared to other transforms such as discrete cosine transform (DCT) and discrete wavelet transform (DWT) while it still attains robustness. We analyze each bit of the Hadamard's coefficients in terms of robustness and transparency for hiding the watermark information and find a bit-plane that maintains both robustness and transparency. After that, watermark information is hidden redundantly in the selected bit-plane. The proposed extraction algorithm is classified as a blind algorithm since it extracts all versions of the concealed watermark with no information from the host image. The output of the extraction algorithm is a logo obtained by an intelligent voting among all versions of the hidden logo. The experimental results show that the proposed method, while providing transparency, is robust against many image processing attacks such as compression, image cropping and Gaussian filtering.
引用
收藏
页码:2033 / 2055
页数:23
相关论文
共 28 条
[1]   Sequency-ordered complex Hadamard transform: Properties, computational complexity and applications [J].
Aung, Aye ;
Ng, Boon Poh ;
Rahardja, Susanto .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2008, 56 (08) :3562-3571
[2]   A Robust Watermarking Scheme Using Sequency-ordered Complex Hadamard Transform [J].
Aung, Aye ;
Ng, Boon Poh ;
Rahardja, Susanto .
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2011, 64 (03) :319-333
[3]  
Botta M, 2014, SOFT COMPUT, P1
[4]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[5]  
Cox I, 2007, Digital watermarking and steganography
[6]  
Fami Elham Shabanali, 2012, 2012 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP), P503, DOI 10.1109/AISP.2012.6313799
[7]  
Fazlali HamidReza, 2016, MULTIMED TOOLS APPL, P1
[8]   Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation [J].
Feng, Bingwen ;
Lu, Wei ;
Sun, Wei ;
Huang, Jiwu ;
Shi, Yun-Qing .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 41 :1-14
[9]   VLSI Architecture for Spread Spectrum Image Watermarking in Walsh-Hadamard Transform Domain using Binary Watermark [J].
Ghosh, Sudip ;
Talapatra, Somsubhra ;
Chakraborty, Sudipta ;
Chatterjee, Navonil ;
Rahaman, Hafizur ;
Maity, Santi P. .
2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT), 2012, :233-238
[10]   Geometric modelling of the wavelet coefficients for image watermarking using optimum detector [J].
Hamghalam, Mohammad ;
Mirzakuchaki, Sattar ;
Akhaee, Mohammad Ali .
IET IMAGE PROCESSING, 2014, 8 (03) :162-172