Skip to main content

A Blind Dual Color Images Watermarking Method via SVD and DNA Sequences

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9589))

Included in the following conference series:

Abstract

This paper proposes a new blind color images watermarking scheme based on SVD and DNA sequences, in which a color watermark is embedded into a color host image for copyright protection. Firstly, the color watermark is encrypted by using DNA encoding and CML. Secondly, the color host image is partitioned into 4 × 4 non-overlapping pixel blocks and then the SVD transform is performed on each selected pixel block. Finally, the DNA sequence watermark (encrypted watermark) is embedded into the host image by modifying the matrix V. The watermark can be extracted from the watermarked image without resorting to the original host image and the original watermark. The experimental results show that the proposed watermarking scheme has not only good transparency, but strong robustness against the common image processing attacks and geometric attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia data embedding and watermarking technologies. Proc. IEEE 86(6), 1064–1087 (1998)

    Article  Google Scholar 

  2. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079–1107 (1999)

    Article  Google Scholar 

  3. Bianchi, T.: Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Proc. Mag. 30(2), 87–96 (2013)

    Article  Google Scholar 

  4. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)

    Google Scholar 

  5. Barni, M., Bartolini, F., De Rosa, A., Piva, A.: Optimal decoding and detection of multiplicative watermarks. IEEE Trans. Signal Process. 51(4), 1118–1123 (2003)

    Article  Google Scholar 

  6. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  MATH  Google Scholar 

  7. Lee, I.-S., Tsai, W.-H.: Data hiding in grayscale images by dynamic programming based on a human visual model. Pattern Recogn. 42(7), 1604–1611 (2009)

    Article  MATH  Google Scholar 

  8. Nikolaidis, A., Pitas, I.: Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. Image Process. 12(5), 563–571 (2003)

    Article  Google Scholar 

  9. Hu, H.T., Hsu, L.Y.: Robust, transparent and high-capacity audio watermarking in DCT domain. Signal Process. 109, 226–235 (2015)

    Article  Google Scholar 

  10. Keyvanpour, M., Bayat, F.M.: Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain. Math. Comput. Model. 58(1–2), 56–67 (2013)

    Article  MATH  Google Scholar 

  11. Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 40(1), 121–128 (2002)

    MathSciNet  Google Scholar 

  12. Verma, V.S., Jha, R.K., Ojha, A.: Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst. Appl. 42(21), 8184–8197 (2015)

    Article  Google Scholar 

  13. Solachidis, V., Pitas, I.: Circularly symmetric watermark embedding in 2D DFT domain. IEEE Trans. Image Process. 10(11), 1741–1753 (2001)

    Article  MATH  Google Scholar 

  14. Fan, M.Q., Wang, H.X., Li, S.K.: Restudy on SVD-based watermarking scheme. Appl. Math. Comput. 203(2), 926–930 (2008)

    MathSciNet  MATH  Google Scholar 

  15. Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Inst. Measure. 59(11), 3060–3063 (2010)

    Article  Google Scholar 

  16. Bhatnagar, G., Wu, Q.M.J., Raman, B.: A new robust adjustable logo watermarking scheme. Comput. Secur. 31(1), 40–58 (2012)

    Article  Google Scholar 

  17. Song, C., Sudirman, S., Merabti, M.: A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 23(3), 549–568 (2012)

    Article  Google Scholar 

  18. Bhatnagar, G., Wu, Q.M.J.: A new logo watermarking based on redundant fractional wavelet transform. Math. Comput. Model. 58(1–2), 204–218 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  19. Zhang, X.P., Li, K.: Comments on SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 7(3), 593–594 (2005)

    Article  Google Scholar 

  20. Asikuzzaman, Md., Alam, Md.J., Pickering, M.R.: A blind and robust video watermarking scheme in the DT CWT and SVD domain. In: 31st Picture Coding Symposium (PCS 2015), pp. 1–5 (2015)

    Google Scholar 

  21. Guo, J.M., Prasetyo, H.: False-positive-free SVD-based image watermarking. J. Vis. Commun. Image Represent. 25(5), 1149–1163 (2014)

    Article  Google Scholar 

  22. Goléa, N.E.H., Seghir, R., Benzid, R.: A bind RGB color image watermarking based on singular value decomposition. In: IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2010), pp. 1–5 (2010)

    Google Scholar 

  23. Su, Q., Niu, Y., Zhao, Y., Pang, S., Liu, X.: A dual color images watermarking scheme based on the optimized compensation of singular value decomposition. Int. J. Electron. Commun. (AEU) 67(8), 652–664 (2013)

    Article  Google Scholar 

  24. Su, Q., Niu, Y., Wang, G., Jia, S., Yue, J.: Color image blind watermarking scheme based on QR decomposition. Signal Process. 94, 219–235 (2014)

    Article  Google Scholar 

  25. Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52(11–12), 2028–2035 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  26. Liu, H., Wang, X., Kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457–1466 (2012)

    Article  Google Scholar 

  27. Watson, J.D., Crick, F.H.C.: A structure for deoxyribose nucleic acid. Nature 171, 737–738 (1953)

    Article  Google Scholar 

  28. Kaneko, K.: Overview of coupled map lattices. Chaos 2(3), 279 (1992)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This research was jointly supported by the National Natural Science Foundation of China (Grant Nos. 61004006 and 61203094), China Postdoctoral Science Foundation (Grant Nos. 2013M530181 and 2015T80396), the Natural Science Foundation of Henan Province, China (Grant No. 13230010254), Program for Science & Technology Innovation Talents in Universities of Henan Province, China (Grant No. 14HASTIT042), the Foundation for University Young Key Teacher Program of Henan Province, China (Grant No. 2011GGJS-025), Shanghai Postdoctoral Scientific Program (Grant No. 13R21410600), the Science & Technology Project Plan of Archives Bureau of Henan Province (Grant No. 2012-X-62) and the Natural Science Foundation of Educational Committee of Henan Province, China (Grant No. 13A520082).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangjun Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Wu, X., Kan, H. (2016). A Blind Dual Color Images Watermarking Method via SVD and DNA Sequences. In: Lin, D., Wang, X., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2015. Lecture Notes in Computer Science(), vol 9589. Springer, Cham. https://doi.org/10.1007/978-3-319-38898-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38898-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38897-7

  • Online ISBN: 978-3-319-38898-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics