Robust and secure fractional wavelet image watermarking

被引:19
作者
Elshazly, Ehab H. [1 ]
Faragallah, Osama S. [2 ]
Abbas, Alaa M. [3 ]
Ashour, Mahmoud A. [1 ]
El-Rabaie, El-Sayed M. [3 ]
Kazemian, Hassan [4 ]
Alshebeili, Saleh A. [5 ]
Abd El-Samie, Fathi E. [3 ,6 ]
El-sayed, Hala S. [7 ]
机构
[1] NCRRT, EAEA, Dept Engn, Cairo, Egypt
[2] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[3] Menoufia Univ, Fac Elect Engn, Dept Elect & Elect Commun, Menoufia 32952, Egypt
[4] London Metropolitan Univ, Fac Comp, Intelligent Syst Res Ctr, London, England
[5] King Saud Univ, Dept Elect Engn, KACST TIC Radio Frequency & Photon E Soc RFTONICS, Riyadh, Saudi Arabia
[6] King Saud Univ, KACST TIC Radio Frequency & Photon E Soc RFTONICS, Riyadh, Saudi Arabia
[7] Menoufia Univ, Fac Engn, Dept Elect Engn, Shibin Al Kawm, Egypt
关键词
Watermarking; DWT; FRFT; Security and robustness;
D O I
10.1007/s11760-014-0684-x
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents an efficient fractional wavelet transform (FWT) image watermarking technique based on combining the discrete wavelet transform (DWT) and the fractional Fourier transform (FRFT). In the proposed technique, the host image is wavelet transformed with two resolution levels, and then, the middle frequency sub-bands are FRFT transformed. The watermark is hidden by altering the selected FRFT coefficients of the middle frequency sub-bands of the 2-level DWT-transformed host image. Two pseudo-random noise (PN) sequences are used to modulate the selected FRFT coefficients with the watermark pixels, and inverse transforms are finally applied to get the watermarked image. In watermark extraction, we just need the same two PN sequences used in the embedding process and the watermark size. The correlation factor is used to determine whether the extracted pixel is one or zero. The proposed fractional wavelet transform (FWT) image watermarking method is tested with different image processing attacks and under composite attacks to verify its robustness. Experimental results demonstrated improved robustness and security.
引用
收藏
页码:89 / 98
页数:10
相关论文
共 18 条
  • [1] Aboshosha A., 2009, ICCES09
  • [2] A New SVD Based Watermarking Framework in Fractional Fourier Domain
    Bhatnagar, Gaurav
    Raman, Balasubramanian
    [J]. CONTEMPORARY COMPUTING, PT 1, 2010, 94 : 107 - +
  • [3] Brannock E, 2008, PROCEEDINGS IEEE SOUTHEASTCON 2008, VOLS 1 AND 2, P587
  • [4] Filters ranking for DWT-domain robust digital watermarking
    Dietze, M
    Jassim, S
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2004, 2004 (14) : 2093 - 2101
  • [5] Digital watermarking in the fractional Fourier transformation domain
    Djurovic, I
    Stankovic, S
    Pitas, I
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2001, 24 (02) : 167 - 173
  • [6] Ejima M, 2001, 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P546, DOI 10.1109/ICIP.2001.958549
  • [7] Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation
    Elhoseny, Heba M.
    Ahmed, Hossam E. H.
    Abbas, Alaa M.
    Kazemian, Hassan B.
    Faragallah, Osama S.
    El-Rabaie, Sayed M.
    Abd El-Samie, Fathi E.
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2015, 9 (03) : 611 - 622
  • [8] Elshazly Ehab H., 2012, P NAT RAD SCI C NRSC
  • [9] HUSSAIN F, 2009, INT C MULT SIGN PROC, P280
  • [10] Miyazaki A, 2007, 2007 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1-3, P184