Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection

被引:32
作者
Devi, Hidangmayum Saxena [1 ]
Singh, Khumanthem Manglem [1 ]
机构
[1] Natl Inst Technol Manipur, Imphal, Manipur, India
关键词
Discrete wavelet transform; Hadamard transform; Singular value decomposition; WAVELET TRANSFORM; SECURITY ANALYSES; SCHEME; ROBUST;
D O I
10.1016/j.jisa.2019.102424
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a unique Red-Cyan Anaglyph image watermarking using DWT, Fast Walsh Hadamard transform and SVD. Watermarking of this particular image is not done extensively so far. Thus, this study focuses on the watermarking of red-cyan anaglyph image for copyright protection. With the help of DWT, Hadamard transform and SVD, the system tries to extract a robust feature to embed the watermark. The watermarking is carried out as. The cover image is transformed using Discrete Wavelet Transform and the watermark image of size 32 x 32 is scrambled using Arnold transform and it is hidden into the hadamard transformed blocks of the Anaglyph image exploiting singular values obtained by applying Singular Value Decomposition. The performance of this proposed system is checked for its robust nature and its imperceptibility on Middlebury Stereo database against usual image processing attacks such as Gaussian noise, filtering, etc. From the simulation results, it is clearly known that it has achieved better outcomes in terms of robustness and imperceptibility than the former existing papers. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:7
相关论文
共 42 条
[1]   Colour Image Blind Watermarking Scheme Based on Fast Walsh Hadamard Transform and Hessenberg Decomposition [J].
Abodena, Omar ;
Agoyi, Mary .
STUDIES IN INFORMATICS AND CONTROL, 2018, 27 (03) :339-348
[2]   A new digital watermarking scheme for 3D triangular mesh models [J].
Ai, Q. S. ;
Liu, Q. ;
Zhou, Z. D. ;
Yang, L. ;
Xie, S. Q. .
SIGNAL PROCESSING, 2009, 89 (11) :2159-2170
[3]  
[Anonymous], INT J DIGITAL CONTEN
[4]  
[Anonymous], 2009, ASIAN J HLTH INFORM
[5]  
Arnold M., 2003, Techniques and Applications of Digital Watermarking and Content Protection
[6]   A database and evaluation methodology for optical flow [J].
Baker, Simon ;
Scharstein, Daniel ;
Lewis, J. P. ;
Roth, Stefan ;
Black, Michael J. ;
Szeliski, Richard .
2007 IEEE 11TH INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS 1-6, 2007, :588-595
[7]   A robust security framework for 3D images [J].
Bhatnagar, Gaurav ;
Wu, Jonathan ;
Raman, Balasubramanian .
JOURNAL OF VISUALIZATION, 2011, 14 (01) :85-93
[8]  
Chang H.J., 2001, Journal of Human Development and Capabilities, V2, P287, DOI 10.1080/14649880120067293
[9]   An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms [J].
Cho, Jae-Won ;
Prost, Remy ;
Jung, Ho-Youl .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (01) :142-155
[10]  
Chun-Lin L., 2010, NTUEE, Taiwan