Skip to main content
Log in

A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An algorithm for watermarking of digital images is proposed in this paper which utilizes Compressive Sensing (CS) with Principle Components (PCs) to achieve robustness, speed and security. CS is applied on PCs of watermark image to get the CS measurements. The singular values of these CS measurements are embedded with a scale factor into the HL subband of the cover image. The generated watermarked image contains three-layer security: one from PCs and other two from CS measurements. To recover PCs from CS measurements, a convex optimization tool, namely, the Orthogonal Matching Pursuit (OMP) is employed. Experiments are performed on both types of cover images; one with more low frequency components and another with more high frequency components. The algorithm offers state-of-the art values of robustness and security in presence of different checkmark attacks like geometrical, non-geometrical and JPEG compression. A comparison of robustness of proposed algorithm with existing algorithms reveals that the proposed algorithm outperforms for most of the noise attacks. The performance of proposed algorithm with different wavelet families (e.g., orthogonal, biorthogonal, symmetric and asymmetric) are compared in terms of robustness and execution time. Such comparison may be helpful in selecting a suitable wavelet for a class of cover images in presence of checkmark attacks. The Haar wavelet performs better for geometric noise attack whereas Bior6.8 and Sym8 for non-geometric and JPEG compression type of noise attacks. The execution time of proposed algorithm with Haar wavelet is found to be minimum for all checkmark attacks. Moreover, it is quite less as compared to Optimization based methods and close to the other watermarking technique used for H.264 video standard.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig 8
Fig. 9
Fig. 10
Fig 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Agarwal H, Atrey PK, Raman B (2015) Image watermarking in real oriented wavelet transform domain. Multimed Tools Appl 74:10883–10921

    Article  Google Scholar 

  2. Ali M, Ahn C (2014) An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal Process. doi:10.1016/j.sigpro.2013.07.024

    Google Scholar 

  3. Baraniuk R (2007) Compressive sensing. In: IEEE Signal Processing Magazine Lecture Notes, vol. 24

  4. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  MATH  Google Scholar 

  5. Brannock E, Weeks M, Harrison R (2009) The effect of wavelet families on watermarking. J Comput 4(6):554–566

    Article  Google Scholar 

  6. Fan T, Lu G, Dou C, Wang D (2013) A digital image watermarking method based on the theory of compressed sensing. Int J Autom Control Eng 2(2):56–61

    Google Scholar 

  7. Ganic E, Eskicioglu A (2004) Robust DWT-SVD based watermarking: embedding data in all frequencies. In: ACM 1-58113-854-7/04/0009, pp 166–174

  8. Goyal S, Gupta R, Bansal A (2009) Application of genetic algorithm to optimize robustness and fidelity of watermarked images (a conceptual approach). Int J Comput Sci Eng 1(3):239–242

    Google Scholar 

  9. Guo J, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent. doi:10.1016/j.jvcir.2014.03.012

    Google Scholar 

  10. Hammouri AI, Alrifai B, Al-Hiary H (2013) An intelligent watermarking approach based particle swarm optimization in discrete wavelet domain. Int J Comput Sci Issues 10(2):330–338

    Google Scholar 

  11. Jain C, Arora S, Panigrahi P (2008) A reliable SVD based watermarking scheme. arXiv:0808.0309v1 [cs.MM]

  12. fLai C, Chan C, Ouyang C, Chiang H (2013) A robust feature-based image watermarking scheme. In: IEEE Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp 581–585

  13. Lai C, Tsai C, Lai C, Tsai C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Article  Google Scholar 

  14. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128

    Article  Google Scholar 

  15. Liu X, Yu J, Yue Y, Wei Y (2014) Double encrypted digital image watermarking algorithm based on compressed sensing. J Comput Inf Syst 10(12):5113–5120

    Google Scholar 

  16. Lui CS, Sun SW, Chang PC (2005) Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. In: Proceedings of SPIE-IS &T Electronic Image SPIE 5681, pp 147–163

  17. Nguyen C, Tay D, Deng G (2006) A fast watermarking system for H.264/AVC video. In: Asia Specific IEEE Conference on Circuits and Systems, pp 81 ̶ 84

  18. Orovik I, Stankovic S (2013) Combined compressive sampling and image watermarking. In: IEEE Symposium, ELMAR, pp 41 ̶ 44

  19. Pandey P, Kumar S, Singh S (2014) Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking. Multimed Tools Appl. doi:10.1007/s11042-013-1375-2

    Google Scholar 

  20. Pereira S, Voloshynovskiy S, Madueno M, Maillet S, Pun T (2001) Second generation benchmarking and application oriented evaluation. In: Information Hiding Workshop, Lecture Notes in Computer Science, 2137, pp 340–353

  21. Run R, Horng S, Lai J, Kao T, Chen R (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl. doi:10.1016/j.eswa.2011.07.059

    Google Scholar 

  22. Rykaczewski R (2007) Comments on “an SVD-based watermarking scheme for protecting rightful ownership”. IEEE Trans Multimed 9(2):421–423

    Article  Google Scholar 

  23. Song C, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent. doi:10.1016/j.jvcir.2012.01.017

    Google Scholar 

  24. Surekha P, Sumathi S (2012) Performance comparison of optimization techniques on robust digital-image watermarking, against attacks. Appl Artif Intell 26:615–644

    Article  Google Scholar 

  25. Thanki R, Borisagar K (2013) A novel robust digital watermarking technique using compressive sensing for biometric data protection. Int J Electron Commun Comput Eng 4(4):1133–1139

    Google Scholar 

  26. Tropp J, Gilbert A (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53(12):4655–4666

    Article  MathSciNet  MATH  Google Scholar 

  27. Valenzise G, Tagliasacchi M, Tubaro S (2009) A compressive-sensing based watermarking scheme for sparse image tampering identification. In: IEEE Conference on Image Processing, pp 1265 ̶ 1268

  28. Veena V, Jyothish Lal G, Vishnu S, Sachin S, Soman K (2012) A robust watermarking method based on compressed sensing and Arnold scrambling. In: IEEE Conference on Machine Vision and Image processing, pp 105–108

  29. Venkateswara Rao VS, Shekhavat R, Srivastava VK (2012) A reliable digital image watermarking scheme based on SVD and particle swarm optimization. In: IEEE Student Conference on Engineering and Systems, pp 1–6

  30. Wang Y, Lin W, Yang L (2011) An intelligent watermarking method based on particle swarm optimization. Expert Syst Appl. doi:10.1016/j.eswa.2010.12.129

    Google Scholar 

  31. Wang Z, Sun X, Zhang D (2007) Novel watermarking scheme based on PSO algorithm. In: Li K (ed) LSMS 2007, LNCS 4688. Springer-Verlag Berlin, Heidelberg, pp 307–314

    Google Scholar 

  32. Wright J, Yang AY, Ganesh A, Sastry SS, Ma Y (2009) Robust face recognition via sparse representation. IEEE Trans Pattern Anal 31(2):210–227

    Article  Google Scholar 

  33. Wu J, Wang W, Liang Q, Wu X, Zhang B (2013) Compressive sensing-based data encryption system with application to sense-through-wall UWB noise radar. Secur Commun Netw 9:371–379

    Article  Google Scholar 

  34. Xiong C, Ward R, Xu J (2008) On the security of singular value based watermarking. In: Proceeding of IEEE Conference on Image Processing, pp 437–440

  35. Yamac M, Dikici C, Sankur B (2013) Robust watermarking of compressive sensed measurements under impulsive and Gaussian attacks. In: IEEE Proceeding of 21st European Conference on Signal processing, pp 1–5

  36. Yang Z, Yan W, Xiang Y (2015) On the security of compressed sensing-based signal cryptosystem. IEEE Trans Emerg Topics Comput 3(3):363–371

    Article  Google Scholar 

  37. Zang X, Li K (2005) Comments on “an SVD-based watermarking scheme for protecting rightful ownership”. IEEE Trans Multimed 7(2):593–594

    Google Scholar 

  38. Zang Q, Sun Y, Yan Y, Liu H, Shang Q (2013) Research on algorithm of image reversible watermarking based on compressed sensing. J Inf Comput Sci 10(3):701–709

    Google Scholar 

  39. Zhang M, Zhang Q, Zhou C et al (2011) Robust digital image watermarking in DWT-SVD domain. In: Deng H (ed) AICI 2011, part II, LNAI 7003. Springer-Verlag Berlin, Heidelberg, pp 75–84

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Falgun N. Thakkar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thakkar, F.N., Srivastava, V.K. A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimed Tools Appl 76, 15191–15219 (2017). https://doi.org/10.1007/s11042-016-3744-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3744-0

Keywords

Navigation