Skip to main content
Log in

Secure and robust watermarking algorithm for remote sensing images based on compressive sensing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The aim of this paper is to improve the reconstruction accuracy and security when adopting Compressive Sensing (CS) in watermarking algorithm. Unlike classical CS-based watermark generation method, lifting wavelet transformation, partial Hadamard matrix, and ternary watermark sequence have been combined together to carry sufficient watermark information to ensure reconstruction accuracy and robustness. In the procedure of watermark embedding and extraction, watermark is embedded and extracted in CS measurement of remote sensing image. Hence the whole algorithm security is guaranteed by CS measurement matrix either in watermark generation or watermark embedding and extraction. Then, the CS-based watermarking algorithm for remote sensing images is proposed and demonstrated. Compared with other CS-based approaches, the improvements on reconstruction accuracy, security and robustness of the proposed algorithm have been verified by experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Al-Mansoori S (2012) An efficient watermarking technique for satellite images using discrete cosine transform. In: Huang B, Plaza AJ (eds) High-performance computing in remote sensing II, vol 8539. Proceedings of SPIE. Spie-Int Soc Optical Engineering, Bellingham. https://doi.org/10.1117/12.979185

  2. Beck A, Teboulle M (2009) A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIAM J Imaging Sci 2(1):183–202. https://doi.org/10.1137/080716542

    Article  MathSciNet  MATH  Google Scholar 

  3. Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans Inf Theory 52(12):5406–5425. https://doi.org/10.1109/TIT.2006.885507

    Article  MathSciNet  MATH  Google Scholar 

  4. Candes EJ, Wakin MB (2008) An introduction to compressive sampling. IEEE Signal Process Mag 25(2):21–30. https://doi.org/10.1109/Msp.2007.914731

    Article  Google Scholar 

  5. Candes EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509. https://doi.org/10.1109/tit.2005.862083

    Article  MathSciNet  MATH  Google Scholar 

  6. Chang CP, Lee YC, Chang AC, Huang PS, Tu TM (2006) StarMarker—a fast and robust RGB-based saturation watermarking system for pan-sharpened IKONOS and QuickBird imagery. Opt Eng 45(5):056202. https://doi.org/10.1117/1.2202932

    Article  Google Scholar 

  7. Chen Q, Xie PP, Ma WJ, Wei WY, Ai LH (2010) A digital watermarking algorithm based on characters of the remote-sensing imagery. In: 2010 International Conference on Management and Service Science, 24-26 Aug. 2010. p 1–4. https://doi.org/10.1109/ICMSS.2010.5576603

  8. Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289–1306. https://doi.org/10.1109/tit.2006.871582

    Article  MathSciNet  MATH  Google Scholar 

  9. Ender JHG (2010) On compressive sensing applied to radar. Signal Process 90(5):1402–1414. https://doi.org/10.1016/j.sigpro.2009.11.009

    Article  MATH  Google Scholar 

  10. Fang LY, Li ST, Nie Q, Izatt JA, Toth CA, Farsiu S (2012) Sparsity based denoising of spectral domain optical coherence tomography images. Biomed Opt Express 3(5):927–942. https://doi.org/10.1364/Boe.3.000927

    Article  Google Scholar 

  11. Fang H, Zhou Q, Li K (2013) Robust watermarking scheme for multispectral images using discrete wavelet transform and tucker decomposition. J Comput 11(8):7. https://doi.org/10.4304/jcp.8.11.2844-2850

    Google Scholar 

  12. Figueiredo MAT, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: application to compressed sensing and other inverse problems. IEEE J Sel Top Signal Process 1(4):586–597. https://doi.org/10.1109/jstsp.2007.910281

    Article  Google Scholar 

  13. Fu JJ, Wang K, Xu JJ (2016) A copyright protection scheme for multiband digital remote sensing imagery. Acta Electron Sin 3(44):8. https://doi.org/10.3969/j.issn.0372-2112.2016.03.035

    Google Scholar 

  14. Ghaffari A, Babaie-Zadeh M, Jutten C (2009) Sparse decomposition of two dimensional signals. In: 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, 19-24 April 2009. p 3157-3160. https://doi.org/10.1109/ICASSP.2009.4960294

  15. Hsu PH, Chen CC (2016) A robust digital watermarking algorithm for copyright protection of aerial photogrammetric images. Photogramm Rec 31(153):51–70. https://doi.org/10.1111/phor.12134

    Article  Google Scholar 

  16. Huang HC, Chang FC, Wu CH, Lai WH (2012) Watermarking for compressive sampling applications. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 18-20 July 2012. p 223-226. https://doi.org/10.1109/IIH-MSP.2012.60

  17. Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data - a state-of-the-art overview. IEEE Signal Process Mag 17(5):20–46. https://doi.org/10.1109/79.879337

    Article  Google Scholar 

  18. Li LL, Sun JG (2012) A watermarking algorithm for remote sensing image based on DFT and watermarking segmentation. In: Zhang CS (ed) Materials Science and Information Technology, Pts 1-8, vol 433-440. Advanced Materials Research. Trans Tech Publications Ltd, Durnten-Zurich, pp 2504. https://doi.org/10.4028/www.scientific.net/AMR.433-440.2504

  19. Liu Y, Nie LQ, Han L, Zhang LM, Rosenblum DS (2015) Action2Activity: recognizing complex activities from sensor data. Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence. Ijcai-Int Joint Conf Artif Intell, Freiburg

  20. Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. Paper presented at the Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, Phoenix, Arizona

  21. Liu Y, Nie LQ, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115. https://doi.org/10.1016/j.neucom.2015.08.096

    Article  Google Scholar 

  22. Liu CZ, Chen QC, Liang HB, Li HC (2016) Digital watermarking processing technique based on overcomplete dictionary. Int J Pattern Recogn 30(10). https://doi.org/10.1142/S0218001416580027

  23. Liu H, Xiao D, Zhang R, Zhang YS, Bai S (2016) Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Process Image Commun 45:41–51. https://doi.org/10.1016/j.image.2016.04.002

    Article  Google Scholar 

  24. Lu P, Xu ZY, Lu X, Liu XY (2013) Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik 124(16):2514–2518. https://doi.org/10.1016/j.ijleo.2012.08.017

    Article  Google Scholar 

  25. Lustig M, Donoho D, Pauly JM (2007) Sparse MRI: the application of compressed sensing for rapid MR imaging. Magn Reson Med 58(6):1182–1195. https://doi.org/10.1002/mrm.21391

    Article  Google Scholar 

  26. Melgani F, Benzid R, De Natale FGB (2007) Near-lossless spread spectrum watermarking for multispectral remote sensing images. J Appl Remote Sens 1:17. https://doi.org/10.1117/1.2535355

    Google Scholar 

  27. Mohimani H, Babaie-Zadeh M, Jutten C (2009) A fast approach for overcomplete sparse decomposition based on smoothed l0 norm. IEEE Trans Signal Process 57(1):289–301. https://doi.org/10.1109/TSP.2008.2007606

    Article  MathSciNet  MATH  Google Scholar 

  28. Rachlin Y, Baron D (2008) The secrecy of compressed sensing measurements. Ann Allerton Conf:813. https://doi.org/10.1109/Allerton.2008.4797641

  29. Ren N, Zhu C, Wang Z (2011) Blind watermarking algorithm based on mapping mechanism for remote sensing image. Acta Geodaetica et Cartographica Sinica 40(5):623–627

    Google Scholar 

  30. Serra-Ruiz J, Megias D (2012) Reversible data hiding for tampering detection in remote sensing images using histogram shifting. In: Huang B, Plaza AJ, Thiebaut C (eds) Satellite Data Compression, Communications, and Processing Viii, vol 8514. Proceedings of SPIE. Spie-Int Soc Optical Engineering, Bellingham. https://doi.org/10.1117/12.934248

  31. Shinoda K, Watanabe A, Hasegawa M, Kato S (2015) Multispectral information hiding in RGB image using bit-plane-based watermarking and its application. Opt Rev 22(3):469–476. https://doi.org/10.1007/s10043-015-0082-9

    Article  Google Scholar 

  32. Somani SM, Mohan BK, Choksi DV, Venkatachalam P, Habib T (2016) Robust Watermarking of Satellite Images using Texture-based LSB-DWT Method. Proc Spie 9880. https://doi.org/10.1117/12.2223590

  33. Sui LS, Zhou B, Wang ZM, Tian AL (2017) An optical color image watermarking scheme by using compressive sensing with human visual characteristics in gyrator domain. Opt Lasers Eng 92:85–93. https://doi.org/10.1016/j.optlaseng.2017.01.003

    Google Scholar 

  34. Sweldens W (1998) The lifting scheme: a construction of second generation wavelets. SIAM J Math Anal 29(2):511–546. https://doi.org/10.1137/S0036141095289051

    Article  MathSciNet  MATH  Google Scholar 

  35. Szekely GJ, Rizzo ML, Bakirov NK (2007) Measuring and testing dependence by correlation of distances. Ann Stat 35(6):2769–2794. https://doi.org/10.1214/009053607000000505

    Article  MathSciNet  MATH  Google Scholar 

  36. Thakkar FN, Srivastava VK (2017) A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimed Tools Appl 76(14):15191–15219. https://doi.org/10.1007/s11042-016-3744-0

    Article  Google Scholar 

  37. Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53(12):4655–4666. https://doi.org/10.1109/Tit.2007.909108

    Article  MathSciNet  MATH  Google Scholar 

  38. Zhang YS, Zhang LY, Zhou JT, Liu LC, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507–2519. https://doi.org/10.1109/Access.2016.2569421

    Article  Google Scholar 

  39. Zhao H, Cai J, Zhu L (2015) A robust information hiding scheme for protecting digital content in DWT-CS domain. International Journal of Security and Its Applications 9(12):245–254. https://doi.org/10.14257/ijsia.2015.9.12.24

    Article  Google Scholar 

  40. Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160. https://doi.org/10.1016/j.optlastec.2014.02.015

    Article  Google Scholar 

  41. Zhu XX, Bamler R (2013) A sparse image fusion algorithm with application to pan-sharpening. IEEE Trans Geosci Remote Sens 51(5):2827–2836. https://doi.org/10.1109/Tgrs.2012.2213604

    Article  Google Scholar 

  42. Zhu P, Jia F, Zhang JL (2013) A copyright protection watermarking algorithm for remote sensing image based on binary image watermark. Optik 124(20):4177–4181. https://doi.org/10.1016/j.ijleo.2012.12.049

    Article  Google Scholar 

  43. Zope-Chaudhari S, Venkatachalam P, Buddhiraju KM (2015) Secure dissemination and protection of multispectral images using crypto-watermarking. IEEE J Sel Top Appl Earth Observ Remote Sens 8(11):5388–5394. https://doi.org/10.1109/jstars.2015.2475169

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Na Ren.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tong, D., Ren, N. & Zhu, C. Secure and robust watermarking algorithm for remote sensing images based on compressive sensing. Multimed Tools Appl 78, 16053–16076 (2019). https://doi.org/10.1007/s11042-018-7014-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-7014-1

Keywords

Navigation