A Robust Image Watermarking Scheme Based on the Laplacian Pyramid Transform
DOI:
https://doi.org/10.31449/inf.v44i1.2042Abstract
This paper is concerned with the digital image watermarking techniques to protect intellectual property and to authenticate digital images. Different from the most conventional methods using the discrete cosine transforms (DCT) and discrete-wavelet transforms (DWTs), this paper exploits the improved Laplacian pyramid transform to develop a new image watermarking scheme in which the improved Laplacian pyramid transform is used to decompose and reconstruct the host image. Then, to select an appropriate watermarking solution, we investigate the various frequency sub-band regions with different the levels and strength factors to perform the watermark embedding. Finally, we conduct experiments to investigate the invisibility and robustness of the proposed algorithm in terms the peak signal-to-noise ratio (PSNR), normalized correlation (NC), and structural similarity index (SSIM). Experimental results showed that our proposed scheme offers good robustness and invisibility. As compared to the watermarking schemes using the curvelets, our watermarking scheme is more robust for the lossy JPEG compression and Gaussian low pass filtering attacks. In addition, our method is also efficient in terms of computational time.References
X. L. Liu, C. C. Lin, and S. M. Yuan, "Blind dual watermarking for color images' authentication and copyright protection," IEEE Transactions on Circuits and Systems for Video Technology, vol. PP, no. 99, pp. 1-9,2016.
S. Khalighi, P. Tirdad, and H. Rabiee, "A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks," EURASIP Journal on Advances in Signal Processing, vol. 2010, no.21, pp. 1-13, 2010.
B. L. Gunjal and R. R. Manthalkar, "An overview of transform domain robust digital image watermarking algorithms," in Journal
of Emerging trends in Computing and Information Science, 2010, pp. 37-42.
J. Liu, Y. Xu, S. Wang, and C. Zhu, "Complex wavelet-domain image watermarking algorithm using l1-norm function-based quantization," Circuits, Systems, and Signal Processing, pp. 1-19, Jul 2017.
L.-Y. Hsu and H.-T. Hu, "Robust blind image watermarking using crisscross inter-block prediction in the dct domain," Journal of Visual Communication and Image Representation, vol. 46, no. Supplement C, pp. 33-47, 2017.
V. M. Potdar, S. Han, and E. Chang, "A survey of digital image watermarking techniques," in INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005., Aug 2005, pp. 709-716.
P. Tao and A. M. Eskicioglu, "A robust multiple watermarking scheme in the discrete wavelet transform domain," 2004.
S. P. Singh, P. Rawat, and S. Agrawal, "A robust watermarking approach using dct-dwt," August 2012, vol. 2, pp. 300-305.
N. S. Narawade and R. D.KanphadeTaiyue, "Dct based robust reversible watermarking for geometric attack," International Journal
of Emerging Trends and Technology in Computer Science (IJETTCS), vol. 1, pp. 27-32, August 2012.
M. El-Gayyar and J. v. z. Gathen, "Watermarking techniques spatial domain," Tech. Rep., University of Bonn Germany, 2006.
Z. y. Zhang, W. Huang, J. l. Zhang, H. y. Yu, and Y. j. Lu, "Digital image watermark algorithm in the curvelet domain," in 2006 International Conference on Intelligent Information Hiding and Multimedia, Dec 2006, pp. 105-108.
H. Pang J. Xu and J. Zhao, "Digital image watermarking algorithm based on fast curvelet transform," Journal of Software Engineering and Applications, vol. 3, no. 10, pp. 939-943, 2010.
S. C. Nguyen, K. H. Ha, and H. M. Nguyen, "An improved image watermarking scheme using selective curvelet scales," in 2015 International Conference on Advanced Technologies for Communications (ATC), Oct 2015, pp. 445-450.
P. Burt and E. Adelson, "The laplacian pyramid as a compact image code," IEEE Transactions on Communications, vol. 31, no. 4,
pp. 532{540, Apr 1983.
M. N. Do and M. Vetterli, "Framing pyramids," IEEE Transactions on Signal Processing, vol. 51, no. 9, pp. 2329{2342, Sept 2003.
S. C. Nguyen, H. H. Kha, and H. M. Nguyen, "A new image watermarking scheme using contourlet transforms," in The 3nd International Conference on Information Technology, Computer, And Electrical Engineering ( ICITACEE 2016 ), 2016, pp. 283-288.
S. C. Nguyen, H. H. Kha, and H. M.Nguyen, "An ecient image watermarking scheme using the laplacian pyramid based on projection," in 2017 International Conference on Recent Advances in Signal Processing, Telecommunications Computing
(SigTelCom), Jan 2017, pp. 103-108.
Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity,"
IEEE Transactions on Image Processing, vol.13, no. 4, pp. 600-612, April 2004.
D. D. Y. Po and M. N. Do, "Directional multiscale modeling of images using the contourlet transform," IEEE Transactions on Image Processing, vol. 15, no. 6, pp. 1610-1620, June 2006.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika