Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 2, pp 2199–2225 | Cite as

Wavelet packets-based watermarking with preserved high color image quality and enhanced robustness for copyright protection applications

  • Hazem Munawer Al-OtumEmail author
Article
  • 36 Downloads

Abstract

This paper proposes an effective technique to be implemented for wavelet-packets-based color image watermarking applications. The proposed technique exhibits high imperceptibility and enhanced robustness for copyright protection applications that exploits the significant features between color image components. The RGB layers of the input color host image are extracted and separately applied to the wavelet-packet transform. The obtained transformed components are used to build the so called difference conjoint core trees with coefficients corresponding to various frequency bands of the same spatial location. Next, an updating step is applied by adaptively modifying selected elements in such a manner to provide the selected coefficients with proper energy (amplitude) to preserve the watermark while not highly deteriorating the output image quality. Simulation results have shown high imperceptibility as well as superior robustness against a wide variety of mild-to-severe unintentional and intentional attacks.

Keywords

Color image processing Wavelet-packets Robust watermarking Copyright protection and watermarking attacks 

Notes

References

  1. 1.
    Ahmad AI, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228–236CrossRefGoogle Scholar
  2. 2.
    Al-Otum HA (2014) Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J Vis Commun Image Represent 25:1064–1081CrossRefGoogle Scholar
  3. 3.
    Bhatnagar G, Raman B, Wu QMJ (2012) Robust watermarking using fractional wavelet packet transform. IET Image Process 6(4):386–397MathSciNetCrossRefGoogle Scholar
  4. 4.
    Coifman RR, Wickerhauser MV (1992) Entropy-based algorithms for best basis selection. IEEE Trans Inf Theory 38(2):713–718CrossRefGoogle Scholar
  5. 5.
    Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco. ISBN: 978-0-12-372585-1Google Scholar
  6. 6.
    Dewangan RP, Kamargaonkar C s (2015) Image encryption using random permutation by different key size. International Journal of Science, Engineering and Technology Research (IJSETR) 4(10):3531–3535Google Scholar
  7. 7.
    Dietl WM, Uhl A (2004) Robustness against unauthorized watermark removal attacks via key-dependent wavelet packet subband structures. Int. Conf. on multimedia and expo, 2004. ICME '04. Taipei, TAIWAN, vol 3, pp 2043–2046Google Scholar
  8. 8.
    Dietl W, Meerwald P, Uhl A (2003) Protection of wavelet-based watermarking systems using filter parameterization. Signal processing (special issue on security of data hiding technologies), vol 83, pp 2095–2116Google Scholar
  9. 9.
    Frery AC, Perciano T (2013) Introduction to image processing using R: learning by examples. Springer Science & Business MediaGoogle Scholar
  10. 10.
    Ghannam S, Abou-Chadi FEZ (2008) Enhancing performance of image watermarks using wavelet packet. 2008 international conference on computer engineering & systems, CCES2008, Cairo, Egypt, pp 83–87Google Scholar
  11. 11.
    Lévy Véhel J, Manoury A (2000) Wavelet packet based digital watermarking. International conference on pattern recognition (ICPR), Barcelona, Spain. IEEE, 3, pp 413–416Google Scholar
  12. 12.
    Montefusco L, Puccio L (eds) (2014) Wavelets: theory, algorithms, and applications, vol 5. Academic, New YorkGoogle Scholar
  13. 13.
    Paqueta AH, Ward RK, Pitasc I (2003) Wavelet packets-based digital watermarking for image verification and authentication. Signal Processing - Special section: Security of data hiding technologies 83(10):2117–2132CrossRefGoogle Scholar
  14. 14.
    Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Processing 53:11–24CrossRefGoogle Scholar
  15. 15.
    Rawat S, Raman B (2012) Best tree wavelet packet transform based copyright protection scheme for digital images. Opt Commun 285(10):2563–2574CrossRefGoogle Scholar
  16. 16.
    Roy S, Pal AK (2017) A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimedia Tools and Applications 76(3):3577–3616CrossRefGoogle Scholar
  17. 17.
    Saliani S (2003) Measures associated to wavelet packets. J Fourier Anal Appl 9(2):117–126MathSciNetCrossRefGoogle Scholar
  18. 18.
    Shao Z, Shang Y, Zeng R, Shu H, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12–21CrossRefGoogle Scholar
  19. 19.
    Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68(3):244–253CrossRefGoogle Scholar
  20. 20.
    Song W, Sun X, Cheng L, Tang L (2015) A new watermarking frame based on the genetic algorithms and wavelet packet decomposition. Ubiquitous International Journal of Information Hiding and Multimedia Signal Processing 6(3):613–620Google Scholar
  21. 21.
    Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235CrossRefGoogle Scholar
  22. 22.
    Tao P, Eskicioglu AM (2006) An adaptive method for image recovery in the DFT domain. J Multimed 1(6):36–45CrossRefGoogle Scholar
  23. 23.
    Thirugnanam G, Arulselvi S (2010) Wavelet packet based robust digital image watermarking and extraction using independent component analysis. Int J of Signal and Image Processing 1(2):80–87Google Scholar
  24. 24.
    Tsui TK, Zhang X-P, Androutsos D (2008) Color image watermarking using multidimensional Fourier transforms. IEEE Trans Info Forensics Security 3(1):16–28CrossRefGoogle Scholar
  25. 25.
    Wang X, Liu Y, Han M, Yang H (2016) Local quaternion PHT based robust color image watermarking algorithm. J Vis Commun Image Represent 38:678–694CrossRefGoogle Scholar
  26. 26.
    Xie X, Zaitsev Y, Velásquez-García LF, Teller SJ, Livermore C (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24(12):125014CrossRefGoogle Scholar
  27. 27.
    Xie X, Zaitsev Y, Velasquez-Garcia L, Teller S, Livermore C (2014) Compact, scalable, high-resolution, MEMS-enabled tactile displays. In: Proc. of solid-state sensors, actuators, and microsystems workshop (pp 127–130)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.EE DepartmentJordan University of Science & TechnologyIrbidJordan

Personalised recommendations