Advertisement

Multimedia Tools and Applications

, Volume 75, Issue 18, pp 11097–11125 | Cite as

The novel and robust watermarking method based on q-logarithm frequency domain

  • Ta Minh Thanh
  • Keisuke Tanaka
Article

Abstract

In general, watermarking techniques on transform domain are always mainly researched in literature since it is robust against several attacks. In this paper, we continue to focus on the transform domain and extend it to the novel frequency domain, called q-logarithm frequency domain (q-LFD), for robust watermarking. In order to achieve the robustness of embedding method, we embed the scrambled watermark information into the low-band frequency of q-LFD by using the quantization index modulation (QIM) technique. According to the simulation results, our method can improve the quality of embedded image and also the robustness of watermark based on the optimized parameters: q of q-LFD and Q of QIM. Experimental results show that our proposed method is also robust against geometric attacks, processing attacks, filtering attacks, and so on.

Keywords

q-logarithm frequency domain (q-LFD) q-logarithm function q-exponential function Quantization index modulation (QIM) technique Image watermarking 

Notes

Acknowledgments

We thank the anonymous reviewers for their helpful comments.

This work is supported by the Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research (A) No.24240001, a grant of I-System Co. Ltd., NTT Secure Platform Laboratories and CREST, JST.

References

  1. 1.
    Abe S, Okamoto Y (2001) Nonextensive Statistical Mechanics and Its Applications, Series Lectures Notes in Physics. SpringerGoogle Scholar
  2. 2.
    Bei Y, Yang D, Liu M, Zhu L (2011) A multi-channel watermarking scheme based on HVS and DCT-DWT. In: Proceedings of CSAE ’11, vol 4, pp 305–308Google Scholar
  3. 3.
    Byun K, Lee S, Kim H (2005) A watermarking method using quantization and statistical characteristics of wavelet transform. In: Proceedings of IEEE PDCAT, pp 689–693Google Scholar
  4. 4.
    Cao W, Yan Y, Li S (2009) Robust image watermarking based on singular value decomposition in DT-CWT domain. In: Proceedings of IST ’09, pp 381–384Google Scholar
  5. 5.
    Chen B, Wornell GW (2001) Quantization index modulation methods for digital watermarking and information embedding of multimedia. J VLSI Signal Process Syst 27:7–33CrossRefMATHGoogle Scholar
  6. 6.
    Deb K, Al-Seraj M, Hoque M, Sarkar M (2012) Combined DWT-DCT based digital image watermarking technique for copyright protection. In: Proceedings of ICECE ’12, pp 458–461Google Scholar
  7. 7.
    Feng LP, Zheng LB, Cao P (2010) A DWT-DCT based blind watermarking algorithm for copyright protection. In: Proceedings of ICCSIT, vol 7, pp 455–458Google Scholar
  8. 8.
    Fu Y (2013) Robust oblivious image watermarking scheme based on coefficient relation. J Optik 124(6):517–521CrossRefGoogle Scholar
  9. 9.
    Hajizadeh M, Helfroush MS, Dehghani MJ, Tashk A (2010) A Robust Blind Image Watermarking Method Using Local Maximum Amplitude Wavelet Coefficient Quantization. Advances in Electrical and Computer Engineering 10(3):96–101CrossRefGoogle Scholar
  10. 10.
    Huang PS, Chiang CS, Chang CP, Tu TM (2005) Robust spatial watermarking technique for colour images via direct saturation adjustment. In: Proceedings of Vision, Image and Signal Processing, vol 152, no 5, pp 561–574Google Scholar
  11. 11.
    Huang X, Zhao S (2012) An Adaptive Digital Image Watermarking Algorithm Based on Morphological Haar Wavelet Transform. Phys Procedia 25:568–575MathSciNetCrossRefGoogle Scholar
  12. 12.
    Iwakiri M, Thanh TM (2012) Fundamental Incomplete Cryptography Method to Digital Rights Management Based on JPEG Lossy Compression. In: IEEE 26th International Conference on Advanced Information Networking and Applications, pp 755–762Google Scholar
  13. 13.
    Jia S (2014) A novel blind color images watermarking based on SVD. Optik - International Journal for Light and Electron Optics 125(12):2868–2874CrossRefGoogle Scholar
  14. 14.
    Keyvanpour M, Merrikh-Bayat F (2011) Robust dynamic block-based image watermarking in DWT domain. Procedia Computer Science 3:238–242CrossRefMATHGoogle Scholar
  15. 15.
    Kimpan S, Lasakul A, Chitwong S (2004) Variable block size based adaptive watermarking in spatial domain. ISCIT 1:374–377Google Scholar
  16. 16.
    Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Process 4(21):522–527CrossRefGoogle Scholar
  17. 17.
    Lee YK, Chen LH (2000) High capacity image steganographic model. In: Proceedings of Vision, Image and Signal Processing, vol 147, pp 288–294Google Scholar
  18. 18.
    Lee H-K, Song G-S, Kim M-A, Yoo K-S, Lee W-H (2004) A Digital Watermarking Scheme in JPEG-2000 Using the Properties of Wavelet Coefficient Sign. In: Proceedings of Computational Science and Its Applications (ICCSA), LNCS, pp 159–166Google Scholar
  19. 19.
    Lin WH, Wang YR, Horng S, Kao T, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11509–11516CrossRefGoogle Scholar
  20. 20.
    Liu F, Liu Y (2008) A watermarking algorithm for digital image based on DCT and SVD. In: Proceedings of CISP ’08, vol 1, pp 380–383Google Scholar
  21. 21.
    Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia 1(4):121–128MathSciNetGoogle Scholar
  22. 22.
    Loukhaoukha K (2013) Comments on “A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm”. Digital Signal Process 23 (4):1334CrossRefGoogle Scholar
  23. 23.
    Lu Z, Zheng H, Huang J (2007) A digital watermarking scheme based on DCT and SVD. In: Proceedings of IIHMSP ’07, vol 1, pp 241–244Google Scholar
  24. 24.
    Pradhan C, Rath S, Bisoi AK (2012) Non Blind Digital Watermarking Technique Using DWT and Cross Chaos. Procedia Technology 6:897–904CrossRefGoogle Scholar
  25. 25.
    Ren-Junn H, Chuan-Ho K, Rong-Chi C (2002) Watermark in color image. In: Proceedings of the first International Symposium on Cyber Worlds, pp 225–229Google Scholar
  26. 26.
    Ruimei Z, Hua L, Huawei P, Boning H (2008) A blind watermarking algorithm based on DCT. In: Proceedings of IITA ’08, vol 3, pp 821–824Google Scholar
  27. 27.
    Shih FY (ed) (2008) Digital Watermarking and Steganography: Fundamentals and Techniques. Taylor & Francis Group, CRC Press., Inc., Boca RatonGoogle Scholar
  28. 28.
    Stanescu D, Borca D, Groza V, Stratulat M (2008) A hybrid watermarking technique using singular value decomposition. In: Proceedings of IEEE HAVE ’08, pp 166–170Google Scholar
  29. 29.
    Sun X, Liu J, Sun J, Zhang Q, Ji W (2008) A robust image watermarking scheme based on the relationship of SVD. In: Proceedings of IIHMSP ’08, pp 731–734Google Scholar
  30. 30.
    Tsai M, Yu K, Chen Y (2000) Joint wavelet and spatial transformation for digital watermarking. IEEE Trans Consum Electron 1(46):241–245Google Scholar
  31. 31.
    Tsallis C (1998) Possible generalization of Boltzmann Gibbs statistics. J Stat Phys 52:479–487MathSciNetCrossRefMATHGoogle Scholar
  32. 32.
    Thanh TM, Hiep PT, Tam TM, Tanaka K (2014) Robust semi-blind video watermarking based on frame-patch matching. AEU - International Journal of Electronics and Communications, ISSN:1434–8411Google Scholar
  33. 33.
    Voyatzis G, Pitas I (1996) Chaotic mixing of digital images and applications to watermarking. In: European Conference on Multimedia Applications, Services and Techniques (ECMAST ’96), vol 2, pp 687–695Google Scholar
  34. 34.
    Won C (2010) Boosting robustness against composite attacks for quantization index-modulation algorithms. J Electron Imaging 19(2)Google Scholar
  35. 35.
    Xiao J, Wang Y (2008) Toward a better understanding of DCT coefficients in watermarking. Pacific-Asia workshop on computational intelligence and industrial application (PACIIA ’08) 2:206–209CrossRefGoogle Scholar
  36. 36.
    Yavuz E, Telatar Z (2007) Improved SVD-DWT based digital image watermarking against watermark ambiguity. In: Proceedings of SAC ’07, pp 1051–1055Google Scholar
  37. 37.
    Yavuz E, Telatar Z (2006) SVD adapted DCT domain DC subband image watermarking against watermark ambiguity. In: Proceedings of IW-MRCS2006, LNCS, vol 4105, pp 66–73Google Scholar
  38. 38.
    Yeung MM (1998) Digital watermarking. Commun ACM 41(7)Google Scholar
  39. 39.
    Zhang L, Li A (2009) Robust watermarking scheme based on singular value of decomposition in DWT domain. In: Proceedings of APCIP ’09, vol 2, pp 19–22Google Scholar
  40. 40.
    Zhu X, Zhao J, Xu H (2006) Digital watermarking algorithm and implementation based on improved SVD. In: Proceedings of ICPR ’06, vol 3, pp 651–656Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Tokyo Institute of Technology and JST CRESTTokyoJapan
  2. 2.Le Quy Don Technical UniversityHa Noi CityVietnam

Personalised recommendations