Abstract
This paper proposes a new blind color images watermarking scheme based on SVD and DNA sequences, in which a color watermark is embedded into a color host image for copyright protection. Firstly, the color watermark is encrypted by using DNA encoding and CML. Secondly, the color host image is partitioned into 4 × 4 non-overlapping pixel blocks and then the SVD transform is performed on each selected pixel block. Finally, the DNA sequence watermark (encrypted watermark) is embedded into the host image by modifying the matrix V. The watermark can be extracted from the watermarked image without resorting to the original host image and the original watermark. The experimental results show that the proposed watermarking scheme has not only good transparency, but strong robustness against the common image processing attacks and geometric attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia data embedding and watermarking technologies. Proc. IEEE 86(6), 1064–1087 (1998)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079–1107 (1999)
Bianchi, T.: Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Proc. Mag. 30(2), 87–96 (2013)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)
Barni, M., Bartolini, F., De Rosa, A., Piva, A.: Optimal decoding and detection of multiplicative watermarks. IEEE Trans. Signal Process. 51(4), 1118–1123 (2003)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)
Lee, I.-S., Tsai, W.-H.: Data hiding in grayscale images by dynamic programming based on a human visual model. Pattern Recogn. 42(7), 1604–1611 (2009)
Nikolaidis, A., Pitas, I.: Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. Image Process. 12(5), 563–571 (2003)
Hu, H.T., Hsu, L.Y.: Robust, transparent and high-capacity audio watermarking in DCT domain. Signal Process. 109, 226–235 (2015)
Keyvanpour, M., Bayat, F.M.: Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain. Math. Comput. Model. 58(1–2), 56–67 (2013)
Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 40(1), 121–128 (2002)
Verma, V.S., Jha, R.K., Ojha, A.: Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst. Appl. 42(21), 8184–8197 (2015)
Solachidis, V., Pitas, I.: Circularly symmetric watermark embedding in 2D DFT domain. IEEE Trans. Image Process. 10(11), 1741–1753 (2001)
Fan, M.Q., Wang, H.X., Li, S.K.: Restudy on SVD-based watermarking scheme. Appl. Math. Comput. 203(2), 926–930 (2008)
Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Inst. Measure. 59(11), 3060–3063 (2010)
Bhatnagar, G., Wu, Q.M.J., Raman, B.: A new robust adjustable logo watermarking scheme. Comput. Secur. 31(1), 40–58 (2012)
Song, C., Sudirman, S., Merabti, M.: A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 23(3), 549–568 (2012)
Bhatnagar, G., Wu, Q.M.J.: A new logo watermarking based on redundant fractional wavelet transform. Math. Comput. Model. 58(1–2), 204–218 (2013)
Zhang, X.P., Li, K.: Comments on SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 7(3), 593–594 (2005)
Asikuzzaman, Md., Alam, Md.J., Pickering, M.R.: A blind and robust video watermarking scheme in the DT CWT and SVD domain. In: 31st Picture Coding Symposium (PCS 2015), pp. 1–5 (2015)
Guo, J.M., Prasetyo, H.: False-positive-free SVD-based image watermarking. J. Vis. Commun. Image Represent. 25(5), 1149–1163 (2014)
Goléa, N.E.H., Seghir, R., Benzid, R.: A bind RGB color image watermarking based on singular value decomposition. In: IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2010), pp. 1–5 (2010)
Su, Q., Niu, Y., Zhao, Y., Pang, S., Liu, X.: A dual color images watermarking scheme based on the optimized compensation of singular value decomposition. Int. J. Electron. Commun. (AEU) 67(8), 652–664 (2013)
Su, Q., Niu, Y., Wang, G., Jia, S., Yue, J.: Color image blind watermarking scheme based on QR decomposition. Signal Process. 94, 219–235 (2014)
Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52(11–12), 2028–2035 (2010)
Liu, H., Wang, X., Kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457–1466 (2012)
Watson, J.D., Crick, F.H.C.: A structure for deoxyribose nucleic acid. Nature 171, 737–738 (1953)
Kaneko, K.: Overview of coupled map lattices. Chaos 2(3), 279 (1992)
Acknowledgements
This research was jointly supported by the National Natural Science Foundation of China (Grant Nos. 61004006 and 61203094), China Postdoctoral Science Foundation (Grant Nos. 2013M530181 and 2015T80396), the Natural Science Foundation of Henan Province, China (Grant No. 13230010254), Program for Science & Technology Innovation Talents in Universities of Henan Province, China (Grant No. 14HASTIT042), the Foundation for University Young Key Teacher Program of Henan Province, China (Grant No. 2011GGJS-025), Shanghai Postdoctoral Scientific Program (Grant No. 13R21410600), the Science & Technology Project Plan of Archives Bureau of Henan Province (Grant No. 2012-X-62) and the Natural Science Foundation of Educational Committee of Henan Province, China (Grant No. 13A520082).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Wu, X., Kan, H. (2016). A Blind Dual Color Images Watermarking Method via SVD and DNA Sequences. In: Lin, D., Wang, X., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2015. Lecture Notes in Computer Science(), vol 9589. Springer, Cham. https://doi.org/10.1007/978-3-319-38898-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-38898-4_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38897-7
Online ISBN: 978-3-319-38898-4
eBook Packages: Computer ScienceComputer Science (R0)