scispace - formally typeset
Journal ArticleDOI

A robust zero-watermarking algorithm for color image based on tensor mode expansion

Reads0
Chats0
TLDR
A new zero-watermarking algorithm for color image based on tensor mode expansion that is robust to noise attacks and common image processing attacks, and better performances compared with some existing algorithms are also achieved.
Abstract
Digital zero-watermarking technology is an effective measure to protect image copyright, and many algorithms have been proposed based on zero-watermark. However, most of the existing zero-watermarking algorithms are designed for grayscale images. In this paper, a new zero-watermarking algorithm for color image based on tensor mode expansion is proposed. In the proposed scheme, four images of R, G, B, and gray are firstly generated from the original image. Then, the four images are appropriately combined to construct two three-dimensional tensors, and tensor expansion is performed on the obtained tensors. By performing singular value decomposition (SVD) and discrete cosine transform (DCT) on the expanded data, a feature image containing the main information of the host image can be generated. Finally, the feature image is fused with the specified logo image to obtain a zero-watermark image. Experimental results show that the proposed algorithm is robust to noise attacks and common image processing attacks, and better performances compared with some existing algorithms are also achieved. In addition, since the proposed algorithm is based on color images, it can make full use of all aspects of color images.

read more

Citations
More filters
Journal ArticleDOI

Robust Image Encryption and Zero-watermarking Scheme Using SCA and Modified Logistic Map

Abstract: In this work, we first present a modified version of the traditional logistic chaotic map. The proposed version contains an additional parameter that is used to increase the security level of the proposed digital image copyright protection scheme. The latter merges two methods of image copyright protection, namely the image zero-watermarking and image encryption, which provides a high level of security when communicating images via the Internet. Next, we discuss the influence of geometric attacks on the efficiency of the proposed scheme, and then we introduce an efficient solution that can resist such attacks. The proposed solution involves the use of Sine Cosine Algorithm (SCA) with an appropriate algorithm suitable for the correction of geometric attacks (image translation, orientation and its combination) applied to the encrypted image. On the one hand, the simulation results show that the proposed scheme provides a high level of security and can resist various attacks (differential, common image processing, geometric, etc.). On the other hand, the conducted comparison in terms of robustness against geometric attacks clearly demonstrates the superiority of our scheme over recent image encryption ones.
Journal ArticleDOI

Robust image encryption and zero-watermarking scheme using SCA and modified logistic map

TL;DR: In this article , a modified version of the traditional logistic chaotic map is presented, which merges two methods of image copyright protection, namely the image zero-watermarking and image encryption, which provides a high level of security when communicating images via the Internet.
Journal ArticleDOI

New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption

TL;DR: In this article, an algorithm based on quaternion Fourier transform (QFT) with chaotic encryption and Arnold scrambling was proposed to improve the security of the watermark information and the ability to embed the location.
References
More filters
Proceedings ArticleDOI

A survey of digital image watermarking techniques

TL;DR: This paper presents a detailed survey of existing and newly proposed steganographic and watermarking techniques and classify the techniques based on different domains in which data is embedded.
Journal ArticleDOI

Singular value decompositions and digital image processing

TL;DR: In this article, singular value decomposition (SVD) and pseudoinverse techniques are used for image restoration in space-variant point spread functions (SVPSF).
Journal ArticleDOI

A new robust reference watermarking scheme based on DWT-SVD

TL;DR: A new semi-blind reference watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) for copyright protection and authenticity and it is shown that the proposed scheme also stands with the ambiguity attack also.
Journal ArticleDOI

A robust image watermarking technique using SVD and differential evolution in DCT domain

TL;DR: In this paper, the authors applied differential evolution (DE) algorithm to balance the tradeoff between robustness and imperceptibility by exploring multiple scaling factors in image watermarking.
Journal ArticleDOI

Robust Image Watermarking Theories and Techniques: A Review

TL;DR: The theoretical analysis and performance investigation of representative watermarking systems in transform domains and geometric invariant regions is reviewed and it is concluded that various attacks operators are used for the assessment of watermarked systems, which supplies an automated and fair analysis of substantial water marking methods for chosen application areas.
Related Papers (5)