A Gradient Invariant DCT-Based Image Watermarking Scheme for Object Detection

  • Xiaocheng HuEmail author
  • Bo Zhang
  • Huibo Li
  • Jing Guo
  • Yunxiang Yang
  • Yinan Jiang
  • Ke Guo
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 516)


In this paper, we proposed a novel DCT-based watermarking scheme for grayscale images, which utilizes the connection between discrete cosine transform (DCT) and the Histogram of Oriented Gradient (HOG) feature extraction operation. We embed messages into the low-frequency band, and correspondingly, an effective coefficients pair selection scheme is constructed. The proposed scheme not only maintains the superiority of compression robustness but also keeps good visual quality for the watermarked image. Moreover, the proposed method is insensitive to HOG feature extraction, which makes the watermarked image more suitable for further objection detection and recognition scenarios.


Watermarking Robustness HOG feature extraction 



This work is supported by Beijing NOVA Program (Z181100006218041) and National key R&D program of China (2017YFC0820106).


  1. 1.
    Patra JC, Phua JE, Bornand C. A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Process. 2010;20(6):1597–611.CrossRefGoogle Scholar
  2. 2.
    Lin SD, Shie SC, Guo JY. Improving the robustness of DCT-based image watermarking against JPEG compression. Comput Stand Interfaces. 2010;32(1):54–60.CrossRefGoogle Scholar
  3. 3.
    Hsu LY, Hu HT. Blind image watermarking via exploitation of inter-block prediction and visibility threshold in dct domain. J Vis Commun Image Represent. 2015;32(C):130–43.CrossRefGoogle Scholar
  4. 4.
    Tao P, Eskicioglu AM. An adaptive method for image recovery in the DFT domain. J Multimedia. 2006;1(6):36–45.CrossRefGoogle Scholar
  5. 5.
    Tsui TK, Zhang XP, Androutsos D. Color image watermarking using multidimensional fourier transforms. IEEE Trans Inf Forensics Secur. 2008;3(1):16–28.CrossRefGoogle Scholar
  6. 6.
    Lang J, Zhang ZG. Blind digital watermarking method in the fractional fourier transform domain. Opt Lasers Eng. 2014;53(2):112–21.CrossRefGoogle Scholar
  7. 7.
    Wang Y, Doherty JF, Dyck REV. A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process Publ IEEE Signal Process Soc. 2002;11(2):77–88.CrossRefGoogle Scholar
  8. 8.
    Zhang G, Wang S, Wen Q. An adaptive block-based blind watermarking algorithm. In: International conference on signal processing, 2004. Proceedings. ICSP, Vol 3. New York: IEEE; 2004. p. 2294–7.Google Scholar
  9. 9.
    Liu N, Li H, Dai H, Guo D, Chen D. Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn. 2015;80(3):1329–55.CrossRefGoogle Scholar
  10. 10.
    Chung K, Yang W, Huang Y, Wu S, Hsu Y. On SVD-based watermarking algorithm. Appl Math Comput. 2007;188(1):54–7.MathSciNetzbMATHGoogle Scholar
  11. 11.
    Guo J, Zheng P, Huang J. Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent. 2015;30:125–35.CrossRefGoogle Scholar
  12. 12.
    Hernandez JR, Amado M, Perez-Gonzalez F. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans Image Process Publ IEEE Signal Process Soc. 2000;9(1):55–68.CrossRefGoogle Scholar
  13. 13.
    Agarwal C, Mishra A, Sharma A. Gray-scale image watermarking using GA-BPN hybrid network. J Vis Commun Image Represent. 2013;24(7):1135–46.CrossRefGoogle Scholar
  14. 14.
    Roy S, Pal AK. A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU - Int J Electron Commun. 2017;72:149–61.CrossRefGoogle Scholar
  15. 15.
    Hou D, Zhang W, Chen K, Lin SJ, Yu N. Reversible data hiding in color image with grayscale invariance. IEEE Trans Circuits Syst Video Technol. 2018;99:1.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Xiaocheng Hu
    • 1
    Email author
  • Bo Zhang
    • 1
  • Huibo Li
    • 1
  • Jing Guo
    • 1
  • Yunxiang Yang
    • 1
  • Yinan Jiang
    • 1
  • Ke Guo
    • 1
  1. 1.China Academy of Electronic Information TechnologyBeijingChina

Personalised recommendations