Applications of the naturalness preserving transform to image watermarking and data hiding

被引:11
作者
Ahmed, AM [1 ]
Day, DD [1 ]
机构
[1] Kansas State Univ, Dept Elect & Comp Engn, Manhattan, KS 66506 USA
关键词
image watermarking; naturalness preserving transform; security;
D O I
10.1016/j.dsp.2004.08.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper presents an image watermarking technique using the naturalness preserving transform (NPT). The goal is to produce an invisible and robust watermark that resists signal processing and geometric distortion attacks. Unlike traditional techniques, the proposed algorithm inserts and extracts the watermark via a special orthogonal transform class in between the spatial and frequency representations of the host image data. Two modified forms of the NPT employing the Hartley and discrete cosine transforms, respectively, are presented in order to improve the quality of the transformed image. Enhancements for the quality of the transformed images are achieved via reduction to the artifacts that occur to images transformed via the classical Hadamard-based NPT. The proposed watermark has demonstrated robustness against a variety of image attacks including, JPEG compression, low pass filtering, image cropping, and noise. The marked image must be severely degraded in order to prevent the reconstruction of the watermark. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:531 / 549
页数:19
相关论文
共 17 条
[1]  
Ahmed A. M., 2003, Proceedings of the Fifth IASTED International Conference on Signal and Image Processing, P1
[2]  
Ahmed AM, 2003, PROCEEDINGS OF THE 7TH JOINT CONFERENCE ON INFORMATION SCIENCES, P1499
[3]  
Bracewell RN., 1986, HARTLEY TRANSFORM
[4]  
Hall E., 1979, Computer image processing and recognition
[5]  
HUANG J, 1999, P 5 AS PAC C COMM, V2, P981
[6]  
Kankanhalli MS, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 1, P568, DOI 10.1109/MMCS.1999.779263
[7]  
Liu HM, 2002, 2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, PROCEEDINGS, P631
[8]   Fragile watermarking scheme for image authentication [J].
Lu, HT ;
Shen, RM ;
Chung, FL .
ELECTRONICS LETTERS, 2003, 39 (12) :898-900
[9]   Semi-fragile image watermarking method based on index constrained vector quantisation [J].
Lu, ZM ;
Liu, CH ;
Xu, DG ;
Sun, SH .
ELECTRONICS LETTERS, 2003, 39 (01) :35-36
[10]  
Lumini A., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P122, DOI 10.1109/ITCC.2000.844194