Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 2, pp 2507–2523 | Cite as

Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm

  • Nan Run ZhouEmail author
  • An Wei Luo
  • Wei Ping Zou
Article
  • 61 Downloads

Abstract

To improve the security, robustness and imperceptibility of watermark schemes, a novel watermark scheme is devised by fusing multiple watermark techniques, including lifting wavelet transform, discrete cosine transform, discrete fractional angular transform and singular value decomposition. To solve the false positive problem in various SVD-based watermark schemes, transform domain encryption is utilized and the embedding component of watermark instead of the whole watermark is embedded into the host image. Furthermore, the particle swarm optimization algorithm is used to optimize the scaling factors and the parameter of the improved discrete fractional angular transform. The proposed watermark scheme is tested by several attacks, such as JPEG compression, low-pass filtering, Histogram equalization, contrast enhance, and etc. Simulation results demonstrate that the proposed watermark scheme is superior in the aspects of security, robustness and imperceptibility.

Keywords

Lifting wavelet transform Discrete cosine transform Discrete fractional angular transform Singular value decomposition False positive problem Particle swarm optimization algorithm 

Notes

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61462061 and 61561033), the China Scholarship Council (Grant No. 201606825042), the Department of Human Resources and Social Security of Jiangxi Province, the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant No. 20162BCB22011), and the Natural Science Foundation of Jiangxi Province (Grant No. 20171BAB202002).

References

  1. 1.
    Abdallah EE, Hamza AB, Bhattacharya P (2007) Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms [J]. J Electronic Imaging 16(3):033020CrossRefGoogle Scholar
  2. 2.
    Bhatnagar G, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme [J]. Comput Secur 31(1):40–58CrossRefGoogle Scholar
  3. 3.
    Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M et al (2015) Robust watermarking method in DFT domain for effective management of medical imaging [J]. Signal, Image and Video Process 9(5):1163–1178Google Scholar
  4. 4.
    Chen B, Yang Z, Huang S, et al. (2017) Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles [C]. IEEE International Performance Computing and Communications Conference, p 1–6Google Scholar
  5. 5.
    Ding M, Fan G (2015) Multilayer joint gait-pose manifolds for human gait motion modeling [J]. IEEE Trans Cybern 45(11):1–8CrossRefGoogle Scholar
  6. 6.
    Ding M, Fan G (2015) Articulated and generalized Gaussian kernel correlation for human pose estimation [J]. IEEE Trans Image Process 25(2):776–789MathSciNetCrossRefGoogle Scholar
  7. 7.
    Esgandari R, Khalili M (2015) A robust image watermarking scheme based on discrete wavelet transforms [C]. 2015 2nd IEEE International Conference on Knowledge-Based Engineering and Innovation, p 988–992Google Scholar
  8. 8.
    Guo J, Liu Z, Liu S (2007) Watermarking based on discrete fractional random transform [J]. Opt Commun 272(2):344–348CrossRefGoogle Scholar
  9. 9.
    Hu H-T, Hsu L (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics [J]. Multimed Tools Appl 76(5):6575–6594CrossRefGoogle Scholar
  10. 10.
    Jain C, Arora S, Panigrahi PK (2008) A reliable SVD based watermarking scheme [J]. arXiv preprint arXiv: 0808.0309Google Scholar
  11. 11.
    Kakarala R, Ogunbona PO (2001) Signal analysis using a multiresolution form of the singular value decomposition [J]. IEEE Trans Image Process 10(5):724–735MathSciNetCrossRefGoogle Scholar
  12. 12.
    Kazemivash B, Moghaddam ME (2017) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm [J]. Multimed Tools Appl 76(20):20499–20524CrossRefGoogle Scholar
  13. 13.
    Keshavarzian R, Aghagolzadeh A (2016) ROI based robust and secure image watermarking using DWT and Arnold map [J]. AEU Int J Electron Commun 70(3):278–288CrossRefGoogle Scholar
  14. 14.
    Lai C, Tsai C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition [J]. IEEE Trans Instrum Meas 59(11):3060–3063CrossRefGoogle Scholar
  15. 15.
    Li J, Huang M, Du W, Chen Y (2012) Multiple watermarks for medical image based on DWT-DFT [C]. 2012 7th International Conference on Computing and Convergence Technology, IEEE, p 257–260Google Scholar
  16. 16.
    Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform [J]. Multimed Tools Appl 76(20):20739–20753CrossRefGoogle Scholar
  17. 17.
    Liu Z (2008) Robustness analysis of image watermarking based on discrete fractional random transform [J]. Opt Eng 47(5):057003CrossRefGoogle Scholar
  18. 18.
    Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Trans Multimedia 4(1):121–128CrossRefGoogle Scholar
  19. 19.
    Liu Z, Ahmad MA, Liu S (2008) A discrete fractional angular transform [J]. Opt Commun 281(6):1424–1429CrossRefGoogle Scholar
  20. 20.
    Liu J, Wen X, Yuan L et al (2017) A robust approach of watermarking in contourlet domain based on probabilistic neural network [J]. Multimed Tools Appl 76(22):24009–24026CrossRefGoogle Scholar
  21. 21.
    Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding [J]. IET Image Process 11(10):815–821CrossRefGoogle Scholar
  22. 22.
    Loukhaoukha K, Chouinard J, Taieb MH (2011) Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization [J]. J Inform Hiding and Multimedia Signal Process 2(4):303–319Google Scholar
  23. 23.
    Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics [J]. IET Image Process 10(1):34–52CrossRefGoogle Scholar
  24. 24.
    Run R, Horng S, Lai J et al (2012) An improved SVD-based watermarking technique for copyright protection [J]. Expert Syst Appl 39(1):673–689CrossRefGoogle Scholar
  25. 25.
    Singh AK (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images [J]. Multimed Tools Appl 76(6):8881–8900CrossRefGoogle Scholar
  26. 26.
    Singh P, Agarwal S (2013) A hybrid DCT-SVD based robust watermarking scheme for copyright protection [C]. AFRICON, 2013. IEEE, p 1–5Google Scholar
  27. 27.
    Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection [J]. Multimed Tools Appl 76(11):13001–13024CrossRefGoogle Scholar
  28. 28.
    Singh AK, Dave M, Mohan A (2013) A hybrid algorithm for image watermarking against signal processing attacks [C]. International Workshop on Multi-disciplinary Trends in Artificial Intelligence. Springer, Berlin, Heidelberg, p 235–246Google Scholar
  29. 29.
    Su Q, Niu Y, Zhao Y et al (2013) A dual color images watermarking scheme based on the optimized compensation of singular value decomposition [J]. AEU Int J Electron Commun 67(8):652–664CrossRefGoogle Scholar
  30. 30.
    Su Q, Wang G, Jia S et al (2015) Embedding color image watermark in color image based on two-level DCT [J]. Signal, Image and Video Process 9(5):991–1007Google Scholar
  31. 31.
    Sweldens W (1998) The lifting scheme: a construction of second generation wavelets [J]. SIAM J Math Anal 29(2):511–546MathSciNetCrossRefGoogle Scholar
  32. 32.
    Tsai P, Hu Y, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting [J]. Signal Process 89(6):1129–1143CrossRefGoogle Scholar
  33. 33.
    Wang C, Yang H, Meinel C (2015) Deep semantic mapping for cross-modal retrieval [C]. 2015 IEEE 27th International Conference on Tools with Artificial Intelligence, IEEE, p 234–241Google Scholar
  34. 34.
    Wang C, Yang H, Meinel C (2016) A deep semantic framework for multimodal representation learning [J]. Multimed Tools Appl 75(15):9255–9276CrossRefGoogle Scholar
  35. 35.
    Wang C, Yang H, Bartz C (2016) Image captioning with deep bidirectional LSTMs [C]. Proceedings of the 2016 ACM on Multimedia Conference. ACM, p 988–997Google Scholar
  36. 36.
    Xie X, Liu S, Yang C, et al (2017) The application of smart materials in tactile actuators for tactile information delivery [J]. arXiv preprint arXiv:1708.07077Google Scholar
  37. 37.
    Ye X, Chen X, Deng M, et al (2014) A multiple-level DCT based robust DWT-SVD watermark method [C]. 2014 IEEE Tenth International Conference on Computational Intelligence and Security, p 479–483Google Scholar
  38. 38.
    Yu J, Li Y, Xie X, et al (2017) Image encryption algorithm by using the logistic map and discrete fractional angular transform [J]. Opt Appl 47(1):141–155Google Scholar
  39. 39.
    Zhang X, Li K (2005) Comments on" an SVD-based watermarking scheme for protecting rightful ownership" [J]. IEEE Trans Multimed 7(3):593–594CrossRefGoogle Scholar
  40. 40.
    Zhang Z, Wang C, Zhou X (2016) Image watermarking scheme based on Arnold transform and DWT-DCT-SVD [C]. 2016 13th IEEE International Conference on Signal Processing, p 805–810Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electronic Information EngineeringNanchang UniversityNanchangChina
  2. 2.XLIM (UMR CNRS 7252)University of PoitiersPoitiersFrance

Personalised recommendations