scispace - formally typeset
Search or ask a question
Journal Article

A DWT-based Watermarking Algorithm Robust to Geometric Attacks

TL;DR: The algorithm uses the characteristic vector with a HASH function to embed or extract the watermarking and is robust to rotation, scaling,transla- tion, and bending of images.
Abstract: Most watermarking algorithms are not robust to geometric attacks.This paper presents an algorithm based on the discrete wavelet transform(DWT)to embed and extract watermarks.A watermarking is embedded in four stages.First,the original image is decomposed using DWT.Secondly,the watermarking is embedded into the approaching sub-band image in DWT domain.Thirdly,a characteristic vector of the image is acquired using a dis- crete cosine transform(DCT).Finally,a binary logic sequence,or secret key,is produced using the characteristic vector and the watermarking.The watermarking can then be extracted in three stages.First,the test image is decom- posed using DWT.Secondly,a characteristic vector is obtained in the DCT domain.Finally,the watermarking is ex- tracted using the secret key and the characteristic vector.The algorithm uses the characteristic vector with a HASH function to embed or extract the watermarking.Results show that the algorithm is robust to rotation,scaling,transla- tion,and bending of images.Robustness against rotation is demonstrated up to 40°and against scaling down to 20% of the image's original size.Furthermore,robustness against whirly bend is demonstrated for angles up to 100°.
Citations
More filters
Proceedings ArticleDOI
01 Mar 2017
TL;DR: Simulation results show that the proposed watermarking algorithm is robust to common Gaussian noise, salt and pepper noise and mean filtering, and resistant to rotation, aspect ratio variation and shear geometric transformation, which are difficult to be resisted for most watermarks.
Abstract: A new watermarking algorithm based on NSCT_DCT is proposed to improve the robustness of digital watermarking. This algorithm performs L-level NSCT transformation on the image which requires to be embedded watermark, and DCT transforms the low frequency band. The DCT coefficients are chosen as the feature of the image, which are unchanged or changed after the geometric transformation. XOR and scrambling the watermark using image features, get a key. Complete the extraction process by the secret key. Simulation results show that the proposed algorithm is robust to common Gaussian noise, salt and pepper noise and mean filtering. It is also resistant to rotation, aspect ratio variation and shear geometric transformation, which are difficult to be resisted for most watermarks.

3 citations


Cites background from "A DWT-based Watermarking Algorithm ..."

  • ...It is pointed out in [7,8] that after the DCT transform of an image, the geometric attack will cause most of the low-IF coefficients to change, but the sign of the coefficient remains unchanged....

    [...]

References
More filters
Proceedings ArticleDOI
01 Mar 2017
TL;DR: Simulation results show that the proposed watermarking algorithm is robust to common Gaussian noise, salt and pepper noise and mean filtering, and resistant to rotation, aspect ratio variation and shear geometric transformation, which are difficult to be resisted for most watermarks.
Abstract: A new watermarking algorithm based on NSCT_DCT is proposed to improve the robustness of digital watermarking. This algorithm performs L-level NSCT transformation on the image which requires to be embedded watermark, and DCT transforms the low frequency band. The DCT coefficients are chosen as the feature of the image, which are unchanged or changed after the geometric transformation. XOR and scrambling the watermark using image features, get a key. Complete the extraction process by the secret key. Simulation results show that the proposed algorithm is robust to common Gaussian noise, salt and pepper noise and mean filtering. It is also resistant to rotation, aspect ratio variation and shear geometric transformation, which are difficult to be resisted for most watermarks.

3 citations