Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 19, pp 24593–24614 | Cite as

Design of high performance copyright protection watermarking based on lifting wavelet transform and bi empirical mode decomposition

  • Nidaa Hasan Abbas
  • Sharifah Mumtazah Syed Ahmad
  • Sajida Parveen
  • Wan Azizun Wan
  • Abd. Rahman Bin Ramli
Article
  • 82 Downloads

Abstract

This paper developed new and efficient image watermarking scheme for copyright protection based on Lifting wavelet transform (LWT) and Bi- dimensional Empirical Mode Decomposition (BEMD). A LWT has been selected because it is fast, less computational cost and maintains the integrity of the recovered watermark. The BEMD transform can separate the image from the most robust to the least sensitive or fragile frequency bands. This advantage is utilised in this study for the purpose of embedding the watermark in the robust part of BEMD, i.e. the residue (r). In addition, the embedding process has been performed in the low sub-band of LWT decomposed image as the low sub-band is more robust to image processing such as JPEG compression. The robust watermark which is grey scale image is decomposed using DWT to enhance the security and select only high sub-band as it has less impact on the quality of the watermarked image. As a result, the original image’s visual quality can be preserved and the concealed watermark could be successfully retrieved even if the watermarked images have undergone severe attacks like JPEG, rotation, Gamma correction, filtering, additive noise, translation, shearing, and scaling. Furthermore, the improved scheme offers greater robustness against many image processing operations, in comparison to the current schemes about copyright protection.

Keywords

Digital watermarking Robust watermarking Lifting wavelet transform (LWT) Bi- dimensional Empirical Mode Decomposition (BEMD) 

References

  1. 1.
    Abbas NH (2016) A Multi-purpose Watermarking Scheme Based on Hybrid of Lifting Wavelet Transform and Arnold Transform. In: Proceeding of Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), pp 1–6Google Scholar
  2. 2.
    Abbas NH, Mumtazah S, Ahmad S, Azizun W, Adnan W, Rahman A, Ramli B, Parveen S (2015) DWT and Lifting Wavelet Transform Based Robust Watermarking for Color Image. Int Rev Comput Softw 10:1127–1133Google Scholar
  3. 3.
    Agreste S, Andaloro G, Prestipino D, Puccio L (2007) An image adaptive, wavelet-based watermarking of digital images. J Comput Appl Math 210(1):13–21MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Al-Haj A (2007) Combined DWT-DCT digital image watermarking. J Comput Sci 3(9):740–746CrossRefGoogle Scholar
  5. 5.
    Bhuiyan SMA, Adhami RR, Khan JF (2008) Fast and Adaptive Bidimensional Empirical Mode Decomposition Using Order-Statistics Filter Based Envelope Estimation. EURASIP J Adv Signal Process 2008(1):1–19CrossRefGoogle Scholar
  6. 6.
    Bi N, Sun Q, Huang D, Yang Z, Huang J (2007) Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Trans Image Process 16(8):1956–1966MathSciNetCrossRefGoogle Scholar
  7. 7.
    Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  8. 8.
    Cox I, Miller M, Bloom J, Honsinger C (2002) Digital watermarking. Academic Press, USAGoogle Scholar
  9. 9.
    Himaja G, Reddy BMK, Raju KVP (2012) Blind and Robust Watermarking for Self-Authentication of Images Using Integer Wavelet Transform. Int J Comput Technol Electron Eng 2(3):61–64Google Scholar
  10. 10.
    Huang WHW, Sun YSY (2007) A New Image Watermarking Algorithm Using BEMD Method. In: Proceeding of IEEE International Conference on Communications, Circuits and Systems, pp 588–592Google Scholar
  11. 11.
    Huang NE, Shen Z, Long SR, Wu MC, Shih HH, Zheng Q, Yen N-C, Tung CC, Liu HH (1998) The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proc R Soc London Ser A Math Phys Eng Sci 454(1971):903–995MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Kovesi P (2003) Phase congruency detects corners and edges. In: Proceeding of australian conference on pattern recognition societyGoogle Scholar
  13. 13.
    Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Secur 2(3):321–330CrossRefGoogle Scholar
  14. 14.
    Lee Y, Nah J, Kim J (2009) Digital image watermarking using bidimensional empirical mode decomposition in wavelet domain. In: Multimedia, 2009. ISM’09. 11th IEEE International Symposium on, pp 583–588Google Scholar
  15. 15.
    Lee Y-P, Lee J-C, Chen W-K, Chang K-C, Su J, Chang C-P (2012) High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf Sci (Ny) 191:214–225CrossRefGoogle Scholar
  16. 16.
    Liang L, Ping Z (2008) Information Hiding Based on Empirical Mode Decomposition. In: Proceeding of IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol 1, pp 561–565Google Scholar
  17. 17.
    Loukhaoukha K, Chouinard J-Y (2009) Hybrid watermarking algorithm based on SVD and lifting wavelet transform for ownership verification. In: Proceeding of 11th IEEE Canadian Workshop on Information Theory, no. 1, pp 177–182Google Scholar
  18. 18.
    Makbol NM, Khoo BE (2013) Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU Int J Electron Commun 67(2):102–112CrossRefGoogle Scholar
  19. 19.
    Makbol NM, Khoo BE (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit Signal Process 33:134–147CrossRefGoogle Scholar
  20. 20.
    Minghui D, Jingbo Z (2009) Robust Image Watermarking Algorithm against Geometric Attack Based on BEMD. In: Proceeding of IEEE International Conference on Computer and Communications Security, no. 11541016, pp 36–39Google Scholar
  21. 21.
    Noida G, Software PB (2014) Conception & Implementation of a Novel Digital Image Watermarking Algorithm using Cascading of DCTandLW T. In: 2014 International Conference on Reliability, Optimization and Information Technology, pp 501–505Google Scholar
  22. 22.
    Nunes JC, Bouaoune Y, Delechelle E, Niang O, Bunel P (2003) Image analysis by bidimensional empirical mode decomposition. Image Vis Comput 21(12):1019–1026CrossRefzbMATHGoogle Scholar
  23. 23.
    Parthasarathy AK (2006) Improved content based watermarking for images. LSU Master’s Theses. 3555. http://digitalcommons.lsu.edu/gradschool_theses/3555
  24. 24.
    Parveen S, Ahmad SMS, Abbas NH, Adnan WAW, Hanafi M, Naeem N (2016) Face Liveness Detection Using Dynamic Local Ternary Pattern (DLTP). Computers 5(2):10CrossRefGoogle Scholar
  25. 25.
    Sabri A, Karoud M, Tairi H, Aarab A (2009) Image watermarking using the empirical mode decomposition. SETIT 2009. 5th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 22–26, 2009 – TUNISIAGoogle Scholar
  26. 26.
    Sinsha PP, Ranjith Ram A (2015) Review on image watermarking using bidimensional empirical mode decomposition. Int J Eng Innov Technol 4(11):209–213Google Scholar
  27. 27.
    Su Q, Liu X, Yang W (2009) A watermarking algorithm for color image based on YIQ color space and Integer Wavelet Transform. In: 2009 Int. Conf. Image Anal. Signal Process., pp 70–73Google Scholar
  28. 28.
    Taghia J, Doostari MA, Taghia J (2008) An image watermarking method based on bidimensional empirical mode decomposition. In: CISP Congress on Image and Signal Processing, vol 5, pp 674–678Google Scholar
  29. 29.
    Van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Proceedings of IEEE International Conference Image Processing, vol 2, pp 86–90Google Scholar
  30. 30.
    You X (2009) An image watermarking scheme using new wavelet filter banks. In: Proceeding of 3rd IEEE International Conference on Anti-counterfeiting, Security, and Identification in Communication, pp 148–151Google Scholar
  31. 31.
    Yousefi S, Rabiee HR, Yousefi E, Ghanbari M (2007) Reversible date hiding using histogram sorting and integer wavelet transform. In: Proceeding of IEEE conference in Digital EcoSystems and Technologies, pp 487–490Google Scholar
  32. 32.
    Yuan H, Zhang X-P (2006) Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans Image Process 15(10):3189–3200CrossRefGoogle Scholar
  33. 33.
    Yuan Y, Huang D, Liu D (2006) An integer wavelet based multiple logo-watermarking scheme. In: Computer and Computational Sciences, 2006. IMSCCS’06. First International Multi-Symposiums on, vol 2, pp 175–179Google Scholar
  34. 34.
    Zheng Q, Shi G, Lv X (2009) A robust digital watermarking scheme based on integer wavelet using compound encryption. In: Proceeding of 4th IEEE International Conference on Computer Science & Education, pp 716–719Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Nidaa Hasan Abbas
    • 1
    • 2
  • Sharifah Mumtazah Syed Ahmad
    • 2
    • 3
  • Sajida Parveen
    • 4
  • Wan Azizun Wan
    • 2
  • Abd. Rahman Bin Ramli
    • 2
  1. 1.Electrical Department, Faculty of EngineeringAl-Mustansiriyah UniversityBaghdadIraq
  2. 2.Department of Computer and Communication System EngineeringUniversiti Putra MalaysiaSerdangMalaysia
  3. 3.Research Center of Excellence for Wireless and Photonic NetworkSerdangMalaysia
  4. 4.Faculty of Electrical, Electronics and Computer Systems EngineeringQuaid-e-Awam University of Engineering Science and TechnologyNawabshahPakistan

Personalised recommendations