Homomorphic image watermarking with a singular value decomposition algorithm

被引:33
作者
Abdallah, Hanaa A. [1 ]
Ghazy, Rania A. [2 ]
Kasban, Hany [3 ]
Faragallah, Osama S. [4 ]
Shaalan, Abdalhameed A. [1 ]
Hadhoud, Mohiy M. [5 ]
Dessouky, Moawad I. [2 ]
El-Fishawy, Nawal A. [4 ]
Alshebeili, Saleh A. [6 ]
Abd El-samie, Fathi E. [2 ,7 ]
机构
[1] Zagazig Univ, Fac Engn, Zagazig, Egypt
[2] Menoufia Univ, Dept Elect & Elect Commun, Fac Elect Engn, Menoufia 32952, Egypt
[3] Atom Energy Author, Nucl Res Ctr, Dept Engn, Cairo, Egypt
[4] Menoufia Univ, Dept Comp Sci & Engn, Fac Elect Engn, Menoufia 32952, Egypt
[5] Menoufia Univ, Fac Comp & Informat, Dept Informat Technol, Shibin Al Kawm, Egypt
[6] King Saud Univ, KACST TIC Radio Frequency & Photon eSoc RFTON, Dept Elect Engn, Riyadh 11451, Saudi Arabia
[7] King Saud Univ, KACST TIC Radio Frequency & Photon eSoc RFTON, Riyadh 11451, Saudi Arabia
关键词
Image watermarking; Homomorphic transform; SVD; Wavelet transform; SCHEME;
D O I
10.1016/j.ipm.2014.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new homomorphic image watermarking method implementing the Singular Value Decomposition (SVD) algorithm is presented. The idea of the proposed method is based on embedding the watermark with the SVD algorithm in the reflectance component after applying the homomorphic transform. The reflectance component contains most of the image features but with low energy, and hence watermarks embedded in this component will be invisible. A block-by-block implementation of the proposed method is also introduced. The watermark embedding on a block-by-block basis makes the watermark more robust to attacks. A comparison study between the proposed method and the traditional SVD watermarking method is presented in the presence of attacks. The proposed method is more robust to various attacks. The embedding of chaotic encrypted watermarks is also investigated in this paper to increase the level of security. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:909 / 923
页数:15
相关论文
共 14 条
[1]  
[Anonymous], 2006, Digital Image Processing
[2]   A Novel Block-based Watermarking Scheme Using the SVD Transform [J].
Basso, Alessandro ;
Bergadano, Francesco ;
Cavagnino, Davide ;
Pomponiu, Victor ;
Vernone, Annamaria .
ALGORITHMS, 2009, 2 (01) :46-75
[3]  
Chandra DVS, 2002, 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, P264
[4]   SVD-based digital image watermarking scheme [J].
Chang, CC ;
Tsai, P ;
Lin, CC .
PATTERN RECOGNITION LETTERS, 2005, 26 (10) :1577-1586
[5]  
Cox I. J., 2002, Digital watermarking, V53
[6]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[7]  
Ghazy Rania A., 2007, 24th Radio National Science Conference (NRSC 2007), P1, DOI 10.1109/NRSC.2007.371376
[8]  
Gilani SAM, 2002, DSP 2002: 14TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING PROCEEDINGS, VOLS 1 AND 2, P721, DOI 10.1109/ICDSP.2002.1028192
[9]   Chaotic encryption scheme for real-time digital video [J].
Li, SJ ;
Zheng, X ;
Mou, XQ ;
Cai, YL .
REAL-TIME IMAGING VI, 2002, 4666 :149-160
[10]   An SVD-based watermarking scheme for protecting rightful ownership [J].
Liu, RZ ;
Tan, TN .
IEEE TRANSACTIONS ON MULTIMEDIA, 2002, 4 (01) :121-128