Skip to main content
Erschienen in: Soft Computing 1/2018

26.08.2016 | Methodologies and Application

A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram

verfasst von: Jianzhong Li, Qun Lin, Chuying Yu, Xuechang Ren, Ping Li

Erschienen in: Soft Computing | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Based on quaternion discrete cosine transform (QDCT) and singular value decomposition (SVD), a novel color image watermarking scheme using an optimized encrypted binary computer-generated hologram (CGH) as the watermark is presented. A Fibonacci transform-based binary CGH technique that uses particle swarm optimization (PSO) algorithm to improve the reconstructed image quality has been proposed to generate a hologram of a watermark. By use of QDCT, the host color image is treated holistically as a vector field. The component of the host color image after QDCT, which is suitable for embedding watermark, is analyzed. With SVD, the mark CGH is inserted into the host color image by modifying the U matrix. To embed the binary CGH, multiple embedding strength factors are used in this study. To withstand the geometric attacks, based on Zernike moment algorithm and invariant centroid, an improved geometric distortion detection algorithm is proposed. Considering the significant color information, this algorithm is performed on the color invariance model. To obtain better imperceptibility and robustness, PSO is used for finding the proper multiple embedding strength factors. Compared with traditional geometric estimation method, the improved algorithm can estimate the transform parameters of the geometric distorted color image more accurately. Experimental results show that the proposed color image watermarking is not only secure and invisible, but also robust against common image processing operations and geometrical distortions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Benhocine A, Laouamer L, Nana L et al (2008) A new approach against color attacks of watermarked images. In: Proceedings of international conference on intelligent information hiding and multimedia signal processing, pp 969–972 Benhocine A, Laouamer L, Nana L et al (2008) A new approach against color attacks of watermarked images. In: Proceedings of international conference on intelligent information hiding and multimedia signal processing, pp 969–972
Zurück zum Zitat Botta M, Cavagnino D, Pomponiu V (2015) Fragile watermarking using Karhunen–Loève transform: the KLT-F approach. Soft Comput 19:1905–1919CrossRef Botta M, Cavagnino D, Pomponiu V (2015) Fragile watermarking using Karhunen–Loève transform: the KLT-F approach. Soft Comput 19:1905–1919CrossRef
Zurück zum Zitat Chang HT, Tsan CL (2005) Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain. Appl Opt 44:6211–6219 Chang HT, Tsan CL (2005) Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain. Appl Opt 44:6211–6219
Zurück zum Zitat Chen DQ, Gu JH, Zhou H (2011) Digital audio watermarking based on holographic nonlinear limiter. In: Proceedings of international conference on electronics and optoelectronics, pp 91–94 Chen DQ, Gu JH, Zhou H (2011) Digital audio watermarking based on holographic nonlinear limiter. In: Proceedings of international conference on electronics and optoelectronics, pp 91–94
Zurück zum Zitat Chung KL, Yang WN, Huang YH et al (2007) On SVD- based watermarking algorithm. Appl Math Comput 188:54–57MathSciNetMATH Chung KL, Yang WN, Huang YH et al (2007) On SVD- based watermarking algorithm. Appl Math Comput 188:54–57MathSciNetMATH
Zurück zum Zitat Gai Q, Sun YF, Wang XL et al (2009) Color image digital watermarking using discrete quaternion cosine-transform. J Optoelectron Laser 20:1193–1197 Gai Q, Sun YF, Wang XL et al (2009) Color image digital watermarking using discrete quaternion cosine-transform. J Optoelectron Laser 20:1193–1197
Zurück zum Zitat Geusebroek JM, Boomgaard RVD, Smeulders AWM et al (2001) Color invariance. IEEE Trans Pattern Anal Mach Intell 23:1338–1350CrossRef Geusebroek JM, Boomgaard RVD, Smeulders AWM et al (2001) Color invariance. IEEE Trans Pattern Anal Mach Intell 23:1338–1350CrossRef
Zurück zum Zitat Gonzalez RC, Woods RE (2007) Digital image processing, 3rd edn. Prentice Hall, Upper Saddle River Gonzalez RC, Woods RE (2007) Digital image processing, 3rd edn. Prentice Hall, Upper Saddle River
Zurück zum Zitat Guo P, Wang J, Li B, Lee SY (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15:929–936 Guo P, Wang J, Li B, Lee SY (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15:929–936
Zurück zum Zitat Han JL, Zhao XH, Qio CY (2016) A digital image watermarking method based on host image analysis and genetic algorithm. J Ambient Intell Humaniz Comput 7:37–45CrossRef Han JL, Zhao XH, Qio CY (2016) A digital image watermarking method based on host image analysis and genetic algorithm. J Ambient Intell Humaniz Comput 7:37–45CrossRef
Zurück zum Zitat He MZ, Tan QF, Cao LC et al (2009) Security enhanced optical encryption system by random phase key and permutation key. Opt Express 17:22462–22473CrossRef He MZ, Tan QF, Cao LC et al (2009) Security enhanced optical encryption system by random phase key and permutation key. Opt Express 17:22462–22473CrossRef
Zurück zum Zitat Jagadeesh B, Rajesh Kumar P, Chenna Reddy P (2016) Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft Comput 20:3679–3686 Jagadeesh B, Rajesh Kumar P, Chenna Reddy P (2016) Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft Comput 20:3679–3686
Zurück zum Zitat Karibali IG, Berberidis K (2006) Efficient spatial image watermarking via new perceptual masking and blind detection scheme. IEEE Trans Inform Forensics Secur 1:256–274CrossRef Karibali IG, Berberidis K (2006) Efficient spatial image watermarking via new perceptual masking and blind detection scheme. IEEE Trans Inform Forensics Secur 1:256–274CrossRef
Zurück zum Zitat Khotanzad A, Hong YH (1990) Invariant image recognition by Zernike moments. IEEE Trans Pattern Anal Mach Intell 12:489–497CrossRef Khotanzad A, Hong YH (1990) Invariant image recognition by Zernike moments. IEEE Trans Pattern Anal Mach Intell 12:489–497CrossRef
Zurück zum Zitat Kim BS, Choi JG, Park CH et al (2003) Robust digital image watermarking method against geometrical attacks. J Real Time Imaging 9:139–149CrossRef Kim BS, Choi JG, Park CH et al (2003) Robust digital image watermarking method against geometrical attacks. J Real Time Imaging 9:139–149CrossRef
Zurück zum Zitat Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284:938–944CrossRef Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284:938–944CrossRef
Zurück zum Zitat Li JZ (2010) Robust image watermarking scheme against geometric attacks using a computer-generated hologram. Appl Opt 49:6302–6312CrossRef Li JZ (2010) Robust image watermarking scheme against geometric attacks using a computer-generated hologram. Appl Opt 49:6302–6312CrossRef
Zurück zum Zitat Li JZ, Zhu YH (2010) A geometric robust image watermarking scheme based on DWT-SVD and Zernike moments. In: Proceedings of The 3rd IEEE international conference on computer science and information technology, pp 367–371 Li JZ, Zhu YH (2010) A geometric robust image watermarking scheme based on DWT-SVD and Zernike moments. In: Proceedings of The 3rd IEEE international conference on computer science and information technology, pp 367–371
Zurück zum Zitat Li JZ (2014) An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization. Opt Express 22:10002–10016CrossRef Li JZ (2014) An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization. Opt Express 22:10002–10016CrossRef
Zurück zum Zitat Li J, Chen XF, Li MQ et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parall Distrib syst 25:1615–1625CrossRef Li J, Chen XF, Li MQ et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parall Distrib syst 25:1615–1625CrossRef
Zurück zum Zitat Li J, Li XL, Yang B, Sun XM (2015a) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10:507–518 Li J, Li XL, Yang B, Sun XM (2015a) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10:507–518
Zurück zum Zitat Li J, Chen XF, Huang XY et al (2015b) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64:1–1MathSciNetMATH Li J, Chen XF, Huang XY et al (2015b) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64:1–1MathSciNetMATH
Zurück zum Zitat Ma TH, Zhou JJ, Tang ML et al (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst E98–D:902–910CrossRef Ma TH, Zhou JJ, Tang ML et al (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst E98–D:902–910CrossRef
Zurück zum Zitat Okman OE, Akar GB (2007) Quantization index modulation-based image watermarking using digital holography. J Opt Soc Am A 24:243–253 Okman OE, Akar GB (2007) Quantization index modulation-based image watermarking using digital holography. J Opt Soc Am A 24:243–253
Zurück zum Zitat Pizzolante R, Carpentieri B, Castiglione A et al (2011) The AVQ algorithm: watermarking and compression performances. In: Proceedings of intelligent networking and collaborative systems, pp 698–702 Pizzolante R, Carpentieri B, Castiglione A et al (2011) The AVQ algorithm: watermarking and compression performances. In: Proceedings of intelligent networking and collaborative systems, pp 698–702
Zurück zum Zitat Pizzolante R, Castiglione A, Carpentieri B et al (2014) Protection of microscopy images through digital watermarking techniques. In: Proceedings of intelligent networking and collaborative systems, pp 65–72 Pizzolante R, Castiglione A, Carpentieri B et al (2014) Protection of microscopy images through digital watermarking techniques. In: Proceedings of intelligent networking and collaborative systems, pp 65–72
Zurück zum Zitat Sathik MM, Sujatha SS (2012) A novel DWT based invisible watermarking technique for digital images. Int Arab J e-Technol 2:167–172 Sathik MM, Sujatha SS (2012) A novel DWT based invisible watermarking technique for digital images. Int Arab J e-Technol 2:167–172
Zurück zum Zitat Shen J, Tan HW, Wang J et al (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16:171–178 Shen J, Tan HW, Wang J et al (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16:171–178
Zurück zum Zitat Spagnolo GS, Santis MD (2011) Holographic watermarking for authentication of cut images. Opt Lasers Eng 49:1447–1455CrossRef Spagnolo GS, Santis MD (2011) Holographic watermarking for authentication of cut images. Opt Lasers Eng 49:1447–1455CrossRef
Zurück zum Zitat Sun J, Yang JY (2010) Quaternion frequency watermarking algorithm for color images. In: Proceedings of international conference on multimedia technology, pp 1–4 Sun J, Yang JY (2010) Quaternion frequency watermarking algorithm for color images. In: Proceedings of international conference on multimedia technology, pp 1–4
Zurück zum Zitat Takai N, Mifune Y (2002) Digital watermarking by a holographic technique. Appl Opt 41:865–873CrossRef Takai N, Mifune Y (2002) Digital watermarking by a holographic technique. Appl Opt 41:865–873CrossRef
Zurück zum Zitat Vahedi E, Zoroofi RA, Shiva M (2012) Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digital Signal Proc 22:153–162CrossRef Vahedi E, Zoroofi RA, Shiva M (2012) Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digital Signal Proc 22:153–162CrossRef
Zurück zum Zitat Valle YD, Venayagamoorthy GK, Mohagheghi S et al (2008) Particle swarm optimization: basic concepts, variants and applications in power systems. IEEE Trans Evolut Comput 12:171–195CrossRef Valle YD, Venayagamoorthy GK, Mohagheghi S et al (2008) Particle swarm optimization: basic concepts, variants and applications in power systems. IEEE Trans Evolut Comput 12:171–195CrossRef
Zurück zum Zitat Wang FH, Pan JS, Jain LC, Huang HC (2004) A VQ-based image-in-image data hiding scheme. In: Proceedings of IEEE international conference on multimedia and expo, pp 2191–2194 Wang FH, Pan JS, Jain LC, Huang HC (2004) A VQ-based image-in-image data hiding scheme. In: Proceedings of IEEE international conference on multimedia and expo, pp 2191–2194
Zurück zum Zitat Wen XZ, Shao L, Xue Y et al (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395–406CrossRef Wen XZ, Shao L, Xue Y et al (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395–406CrossRef
Zurück zum Zitat Yan W, Hu YH, Shou GH et al (2010) The algorithm of color image watermarking based on SIFT. In: Proceedings of The 2nd international conference on E-business and information system security, pp 1–4 Yan W, Hu YH, Shou GH et al (2010) The algorithm of color image watermarking based on SIFT. In: Proceedings of The 2nd international conference on E-business and information system security, pp 1–4
Zurück zum Zitat Yu ZL, Jin GF (1984) Computer-generated hologram. Press of Tsinghua University, Beijing Yu ZL, Jin GF (1984) Computer-generated hologram. Press of Tsinghua University, Beijing
Zurück zum Zitat Zheng YH, Jeon B, Xu DH et al (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28:961–973 Zheng YH, Jeon B, Xu DH et al (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28:961–973
Metadaten
Titel
A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram
verfasst von
Jianzhong Li
Qun Lin
Chuying Yu
Xuechang Ren
Ping Li
Publikationsdatum
26.08.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 1/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-016-2320-x

Weitere Artikel der Ausgabe 1/2018

Soft Computing 1/2018 Zur Ausgabe

Methodologies and Application

Automatic support vector data description

Premium Partner