Advertisement

Multimedia Tools and Applications

, Volume 75, Issue 21, pp 13481–13502 | Cite as

Improved logarithmic spread transform dither modulation using a robust perceptual model

  • Wenbo Wan
  • Ju Liu
  • Jiande Sun
  • Di Gao
Article

Abstract

In the quantization-based watermarking framework, the perceptual just noticeable distortion (JND) model has been widely used to determine the quantization step size, as it can be used for the better tradeoff between imperceptibility and robustness. However, the calculated JND values will change as watermark embedding can affect the texture and luminance of the image. Consequently, the changes of JND values will lead to watermark-extraction errors. In this paper, the authors present an improved logarithmic spread transform dither modulation (STDM) watermarking approach using a best-matched DCT-based perceptual JND model, which can be insensitive to the changes caused by watermark embedding and attacks. Experimental results confirm the improved robustness performance of the JND model in the watermarking framework. Simulation results show that the proposed scheme is more robust than the existing JND model-based watermarking algorithms with the uniform fidelity, and our proposed scheme has a superior performance compared with the former proposed perceptual STDM schemes.

Keywords

Logarithmic STDM Perceptual JND model Watermarking robustness Edge strength 

Notes

Acknowledgments

This work was supported by the Special Development Fund of Shandong Information Industry (2011R0116), the Natural Science Foundation of Shandong Province (2014ZRE27336) and the National Natural Science Foundation of China (61001180).

References

  1. 1.
    Ahumada AJ, Peterson HA, Rogowitz BE (1992) Luminance-model-based DCT quantization for color image compression. Proc SPIE 1666:365–374CrossRefGoogle Scholar
  2. 2.
    Bae SH, Kim M (2013a) A new DCT-based JND model monochrome images for contrast masking effects with texture complexity and frequency. In: International conference on image processing (ICIP), pp 431–434Google Scholar
  3. 3.
    Bae SH, Kim M (2013b) A novel DCT-based JND model for luminance adaptation effect in DCT frequency. IEEE Signal Process Lett 20(9):893–896CrossRefGoogle Scholar
  4. 4.
    Barni M, Podilchuk CI, Bartolini F, Delp EJ (2001) Watermark embedding: Hiding a signal within a cover image. IEEE CommunMag 39(8):102–108CrossRefGoogle Scholar
  5. 5.
    Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell PAMI 8(6):679–698CrossRefGoogle Scholar
  6. 6.
    Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443MathSciNetCrossRefMATHGoogle Scholar
  7. 7.
    Chou J, Ramchandran K, Ortega A (2001) Next generation techniques for robust and imperceptible audio data hiding. Int Conf Acoust, Speech Signal Process (ICASSP) 3(12):1349–1352Google Scholar
  8. 8.
    Comesana P, Perez-Gonzalez F (2007) On a watermarking scheme in the logarithmic domain and its perceptual advantages. In: International conference on image processing (ICIP), pp 694–708Google Scholar
  9. 9.
    Comesana P, Perez-Gonzalez F (2011) Weber’s law-based side-informed data hiding. In: International conference on acoustics, speech and signal processing (ICASSP), pp 1840–1843Google Scholar
  10. 10.
    Gonzalez P, Mosquera C, Barni M (2005) Rational dither modulation: A high-rate data-hiding method invariant to gain attacks. IEEE Trans Signal Process 53(10):3960–3975MathSciNetCrossRefGoogle Scholar
  11. 11.
    Kalantari NK, Ahadi SM (2010) A logarithmic quantization index modulation for perceptually better data hiding. IEEE Trans Image Process 19(6):1504–1517MathSciNetCrossRefGoogle Scholar
  12. 12.
    Li Q, Cox IJ (2007) Improved spread transform dither modulation by using a perceptual model: Robustness to amplitude scaling and JPEG compression. In: International conference on acoustics, speech and signal processing (ICASSP), pp 185–188Google Scholar
  13. 13.
    Li X, Liu J, Sun J, Yang X (2011) Step-projection-based spread transform dither modulation. IET Inf Secur 5(3):170–180CrossRefGoogle Scholar
  14. 14.
    Ma L (2010) Adaptive spread-transform modulation using a new perceptual model for color image. IEICE Trans Inf Sys 93-D(4):843–857CrossRefGoogle Scholar
  15. 15.
    Moulin P, Koetter R (2005) Data hiding codes. Proc IEEE 93(12):2083–2127CrossRefGoogle Scholar
  16. 16.
    Muthuswamy K, Rajan D (2013) Salient motion detection in compressed domain. IEEE Signal Process Lett 20(10):996–999CrossRefGoogle Scholar
  17. 17.
    Wan W, Liu J, Sun J (2013) Logarithmic spread-transform dither modulation watermarking based on perceptual model. In: International conference on image processing (ICIP), pp 4522–4526Google Scholar
  18. 18.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  19. 19.
    Watson AB (1993) DCT quantization matrices visually optimized for individual images, vol 1913, pp 202–216Google Scholar
  20. 20.
    Zhang X, Lin WS, Xue P (2005) Improved estimation for just-noticeable visual distortion. Signal Process 85:795–808CrossRefMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.School of information science and engineeringShandong UniversityJinanChina
  2. 2.Hisense state key laboratory of digital multi-media technologyQingdaoChina

Personalised recommendations