Robust multi-logo watermarking by RDWT and ICA

被引:46
作者
Hien, Thai Duy [1 ]
Nakao, Zensho
Chen, Yen-Wei
机构
[1] Univ Ryukyus, Fac Engn, Okinawa 9030213, Japan
[2] Ritsumeikan Univ, Coll Informat Sci & Engn, Shiga 5258577, Japan
关键词
digital watermarking; redundant discrete wavelet transform; independent component analysis;
D O I
10.1016/j.sigpro.2005.12.003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a new approach to watermarking multimedia products by redundant discrete wavelet transform (RDWT) and independent component analysis (ICA). For watermark security, embedded logo watermarks are encrypted to random noise signal. To embed logo watermarks, the original image is decomposed by RDWT, and watermarks are embedded into middle frequency at LH and HL sub-bands. The perceptual model is applied with a stochastic multiresolution model for adaptive watermark embedding. This is based on computation of a noise visibility function (NVF) which has local image properties. We also propose an intelligent ICA-based detector which directly extracts watermarks in spatial domain. A novel characteristic of this detection is that it does not require the transformation process to extract the watermark. The experimental results show that logo watermarks are extracted perfectly, and also demonstrate the robustness of the method. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:2981 / 2993
页数:13
相关论文
共 24 条
  • [11] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [12] Robust blind source separation algorithms using cumulants
    Cruces, S
    Castedo, L
    Cichocki, A
    [J]. NEUROCOMPUTING, 2002, 49 : 87 - 118
  • [13] DUGAD R, 1998, P IEEE ICIP98 CHIC I
  • [14] Quantized overcomplete expansions in RN:: Analysis, synthesis, and algorithms
    Goyal, VK
    Vetterli, M
    Thao, NT
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (01) : 16 - 31
  • [15] Hien T. D., 2004, International Journal of Computational Intelligence and Applications, V4, P183, DOI 10.1142/S1469026804001240
  • [16] HIEN TD, 2004, P SPIE SECURITY STEG, V5306
  • [17] Independent component analysis:: algorithms and applications
    Hyvärinen, A
    Oja, E
    [J]. NEURAL NETWORKS, 2000, 13 (4-5) : 411 - 430
  • [18] KIM JR, 1999, P IEEE ICIP99 KOB JA
  • [19] Kundur D, 1998, INT CONF ACOUST SPEE, P2969, DOI 10.1109/ICASSP.1998.678149
  • [20] Liu J, 2003, PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS & SIGNAL PROCESSING, PROCEEDINGS, VOLS 1 AND 2, P1489