Robust Semi-Blind Digital Image Watermarking Technique in DT-CWT Domain
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Robust Semi-Blind Digital Image Watermarking Technique in DT-CWT Domain

Authors: Samira Mabtoul, Elhassan Ibn Elhaj, Driss Aboutajdine

Abstract:

In this paper a new robust digital image watermarking algorithm based on the Complex Wavelet Transform is proposed. This technique embeds different parts of a watermark into different blocks of an image under the complex wavelet domain. To increase security of the method, two chaotic maps are employed, one map is used to determine the blocks of the host image for watermark embedding, and another map is used to encrypt the watermark image. Simulation results are presented to demonstrate the effectiveness of the proposed algorithm.

Keywords: Image watermarking, Chaotic map, DT-CWT.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1085946

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1647

References:


[1] Juergen Seitz. "Digital Watermarking For Digital Media",Information Resources Press Arlington, VA, USA, ISBN 159140519X, 2005.
[2] Chun-Shien Lu. "Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property",Idea Group Publishing, London, ISBN 1591401925, 2004.
[3] J.L. Dugelay,S. Roche,C. Rey, G. Dorr, "Still image watermarking robust to local geometric distortions". IEEE transactions on image processing, 2006, 15 N9, 2831-2842.
[4] L. O-Gorman, H. Berghel. "Protecting Ownership Rights through Digital Watermarking". IEEE Computer 1996, 29, 101-103.
[5] J. R. Hernndez, M. Amado, F. Prez-Gonzlez. "DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure". IEEE Trans. on Image Processing 2000, Special Issue on Image and Video Processing for Digital Libraries, 9(1), 55-68.
[6] J. Kusyk, A. M. Eskicioglu. "A Semi-blind Logo Watermarking Scheme for Color Images by Comparison and Modification by Comparison and Modification of DFT Coefficients". Optics East 2005, Multimedia Systems and Applications VIII Conference 2004, 23-26.
[7] M. Barni, F. Bartolini, A. Piva. "Improved Wavelet based Watermarking Through Pixel-Wise Masking". IEEE Transactions on Image Processing 2001, 10, 783-791.
[8] N.G. Kingsbury, "Complex wavelets for shift invariant analysis and filtering of signals". Journal of Applied and Computational Harmonic Analysis, vol. 10, no. 3, pp. 234253, May 2001.
[9] I.W. Selesnick, R.G. Baraniuk and N.G. Kingsbury, "The Dual- Tree Complex Wavelet Transform". IEEE Signal Processing Magazine, vol. 22, no. 6, pp. 123151, Nov. 2005.
[10] P. Loo, N. G. Kingsbury. "Watermarking using complex wavelets with resistance to geometric distortion", Proceedings Proceeding of the European Signal Processing Conference, EUSIPCO 2000, 5-8, 2000.
[11] H. Yongjian, J. Huang, S. Kwong, Y. Chan. "Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform", Computer Science, Digital Watermarking: Second International Workshop, IWDW 2003, 2939/2004, 86-100.
[12] S. Mabtoul, E. Ibn-Elhaj, D. Aboutajdine, "A Robust Digital Image Watermarking Method Using Dual Tree Complex Wavelet Transform". The Thirteenth IEEE Symposium on Computers and Communications (ISCC-08) July 6-9, 2008, Marrakech, Morocco.
[13] S. Mabtoul, E. Ibn-Elhaj, D. Aboutajdine, "A BLIND CHAOS-BASED COMPLEX WAVELET-DOMAIN IMAGE WATERMARKING TECHNIQUE", Journal IJCSNS, VOL.6 No.3, pp. 134-139, March 2006.
[14] L. Joong-Jae , W. Kim, L. Na-Young , G. Kim. "A New Incremental Watermarking Based on Dual-Tree Complex Wavelet Transform", Journal of the Supercomputing 2005, 33(1-2), 133-140.
[15] N. Terzija and W. Geisselhardt, "Digital image watermarking using Complex Wavelet Transform," in Proc. of ACM Workshop on Multimedia and Security, 2004, pp. 193198.
[16] L. E. Coria, M. R. Pickering, P. Nasiopoulos, and R. K. Ward, "A video watermarking scheme based on the Dual-Tree Complex Wavelet Transform," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 466-474, 2008.
[17] Z. Dawei, C. Guanrong and L. Wenbo, "A chaos-based robust waveletdomain watermarking algorithm", Chaos, Solitons and Fractals, Vol. 22, pp. 47-54, Oct. 2004.
[18] C. Jin, Z. Zhang, Y. Jiang, Z. Qu, C. Ma, "A Blind Watermarking Algorithm Based on Modular Arithmetic in the Frequency Domain ", K. Elleithy (ed.), Advances and Innovations in Systems, Computing Sciences and Software Engineering, ISBN 978-1-4020-6263-6 (Print) 978-1-4020- 6264-3 (Online), 543547. 2007.
[19] F. A. P. Petitcolas, M. Steinebach, F. Raynal, J. Dittmann, C. Fontaine, N. Fats. A public automated web-based evaluation service for watermarking schemes: StirMark Benchmark. In Ping Wah Wong and Edward J. Delp,