scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Discrete Fourier transform-based watermarking method with an optimal implementation radius

01 Jul 2011-Journal of Electronic Imaging (International Society for Optics and Photonics)-Vol. 20, Iss: 3, pp 033008
TL;DR: A watermarking method, which minimizes the impact of the watermark implementation on the overall quality of an image, is developed using a peak signal-to-noise ratio to evaluate quality degradation.
Abstract: In this paper, we evaluate the degradation of an image due to the implementation of a watermark in the frequency domain of the image. As a result, a watermarking method, which minimizes the impact of the watermark implementation on the overall quality of an image, is developed. The watermark is embedded in magnitudes of the Fourier transform. A peak signal-to-noise ratio is used to evaluate quality degradation. The obtained results were used to develop a watermarking strategy that chooses the optimal radius of the implementation to minimize quality degradation. The robustness of the proposed method was evaluated on the dataset of 1000 images. Detection rates and receiver operating characteristic performance showed considerable robustness against the print-scan process, print-cam process, amplitude modulated, halftoning, and attacks from the StirMark benchmark software.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: A novel DFT watermarking scheme featuring perceptually optimal visibility versus robustness is proposed and the robustness of the proposed method is globally slightly better than state-of-the-art.
Abstract: More than ever, the growing amount of exchanged digital content calls for efficient and practical techniques to protect intellectual property rights. During the past two decades, watermarking techniques have been proposed to embed and detect information within these contents, with four key requirements at hand: robustness, security, capacity, and invisibility. So far, researchers mostly focused on the first three, but seldom addressed the invisibility from a perceptual perspective and instead mostly relied on objective quality metrics. In this paper, a novel DFT watermarking scheme featuring perceptually optimal visibility versus robustness is proposed. The watermark, a noise-like square patch of coefficients, is embedded by substitution within the Fourier domain; the amplitude component adjusts the watermark strength, and the phase component holds the information. A perceptual model of the human visual system (HVS) based on the contrast sensitivity function (CSF) and a local contrast pooling is used to determine the optimal strength at which the mark reaches the visibility threshold. A novel blind detection method is proposed to assess the presence of the watermark. The proposed approach exhibits high robustness to various kinds of attacks, including geometrical distortions. Experimental results show that the robustness of the proposed method is globally slightly better than state-of-the-art. A comparative study was conducted at the visibility threshold (from subjective data) and showed that the obtained performances are more stable across various kinds of content.

113 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed color image watermarking is not only invisible but also robust against a wide variety of attacks, especially for color attacks and geometric distortions.
Abstract: Based on quaternion Hadamard transform (QHT) and Schur decomposition, a novel color image watermarking scheme is presented. To consider the correlation between different color channels and the significant color information, a new color image processing tool termed as the quaternion Hadamard transform is proposed. Then an efficient method is designed to calculate the QHT of a color image which is represented by quaternion algebra, and the QHT is analyzed for color image watermarking subsequently. With QHT, the host color image is processed in a holistic manner. By use of Schur decomposition, the watermark is embedded into the host color image by modifying the Q matrix. To make the watermarking scheme resistant to geometric attacks, a geometric distortion detection method based upon quaternion Zernike moment is introduced. Thus, all the watermark embedding, the watermark extraction and the geometric distortion parameter estimation employ the color image holistically in the proposed watermarking scheme. By using the detection method, the watermark can be extracted from the geometric distorted color images. Experimental results show that the proposed color image watermarking is not only invisible but also robust against a wide variety of attacks, especially for color attacks and geometric distortions.

110 citations


Cites background or methods from "Discrete Fourier transform-based wa..."

  • ...Sun et al. proposed that the watermark is embedded into the amplitude of QDFTAC coefficients of the host color image [24]....

    [...]

  • ...On the other hand, the techniques of the second group take advantage of transformation domains, such as discrete Fourier transform (DFT) [16], discrete cosine transform (DCT) [15], discrete wavelet transform (DWT) [6] and singular value decomposition (SVD) [12], for watermarking purpose....

    [...]

  • ...Tsui et al. developed a non-blind technique that watermark signal is inserted into the quaternion discrete Fourier transform (QDFT) domain of the original color image [26]....

    [...]

  • ...In recent years, a large number of imagewatermarking schemes have been introduced [6, 10, 12, 15, 16, 22]....

    [...]

Journal ArticleDOI
TL;DR: The experimental results show, that the algorithm achieves high image quality and high tampering detection resolution at a low watermark payload, compared to block-based authentication schemes.

85 citations

Journal ArticleDOI
TL;DR: Details of standard water marking system frameworks are given and some standard requirements that are used in designing watermarking techniques for several distinct applications are listed.
Abstract: Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed in order to find the state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.

72 citations

Journal ArticleDOI
TL;DR: Experimental results show that better watermark robustness and imperceptibility are achieved by adjusting the fractional orders in the FrKT.
Abstract: This paper proposes a novel fractional transform, denoted as the fractional Krawtchouk transform (FrKT), a generalization of the Krawtchouk transform. The derivation of the FrKT uses the eigenvalue decomposition method. We determine the eigenvalues and the corresponding multiplicity of the Krawtchouk transform matrix. Moreover, the orthonormal eigenvectors of the transform matrix are derived. For validation purpose only and as a first illustration of the interest of FrKT, a watermarking example was chosen. Experimental results show that better watermark robustness and imperceptibility are achieved by adjusting the fractional orders in the FrKT.

66 citations

References
More filters
Book
01 Jan 1988
TL;DR: Signal Detection in Discrete Time and Signal Estimation in Continuous Time: Elements of Hypothesis Testing and Elements of Parameter Estimation.
Abstract: Preface I. Introduction II. Elements of Hypothesis Testing III. Signal Detection in Discrete Time IV. Elements of Parameter Estimation V. Elements of Signal Estimation VI. Signal Detection in Continuous Time VII. Signal Estimation in Continuous Time References Index

4,096 citations

Journal ArticleDOI
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.

1,572 citations

Journal ArticleDOI
TL;DR: A new approach to mask the watermark according to the characteristics of the human visual system (HVS) is presented, which is accomplished pixel by pixel by taking into account the texture and the luminance content of all the image subbands.
Abstract: A watermarking algorithm operating in the wavelet domain is presented. Performance improvement with respect to existing algorithms is obtained by means of a new approach to mask the watermark according to the characteristics of the human visual system (HVS). In contrast to conventional methods operating in the wavelet domain, masking is accomplished pixel by pixel by taking into account the texture and the luminance content of all the image subbands. The watermark consists of a pseudorandom sequence which is adaptively added to the largest detail bands. As usual, the watermark is detected by computing the correlation between the watermarked coefficients and the watermarking code, and the detection threshold is chosen in such a way that the knowledge of the watermark energy used in the embedding phase is not needed, thus permitting one to adapt it to the image at hand. Experimental results and comparisons with other techniques operating in the wavelet domain prove the effectiveness of the new algorithm.

949 citations

Journal ArticleDOI
TL;DR: The experimental results show that the proposed image authentication technique by embedding digital "watermarks" into images successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group lossy compression.
Abstract: An image authentication technique by embedding digital "watermarks" into images is proposed. Watermarking is a technique for labeling digital pictures by hiding secret information into the images. Sophisticated watermark embedding is a potential method to discourage unauthorized copying or attest the origin of the images. In our approach, we embed the watermarks with visually recognizable patterns into the images by selectively modifying the middle-frequency parts of the image. Several variations of the proposed method are addressed. The experimental results show that the proposed technique successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group (JPEG) lossy compression.

892 citations

Journal ArticleDOI
Ching-Yung Lin1, Min Wu2, Jeffrey Adam Bloom2, Ingemar J. Cox, Matthew L. Miller, Yui Man Lui 
IBM1, NEC2
TL;DR: It is shown that the watermark is robust to rotation, scale, and translation, and tests examining the watermarks resistance to cropping and JPEG compression.
Abstract: Many electronic watermarks for still images and video content are sensitive to geometric distortions. For example, simple rotation, scaling, and/or translation (RST) of an image can prevent blind detection of a public watermark. In this paper, we propose a watermarking algorithm that is robust to RST distortions. The watermark is embedded into a one-dimensional (1-D) signal obtained by taking the Fourier transform of the image, resampling the Fourier magnitudes into log-polar coordinates, and then summing a function of those magnitudes along the log-radius axis. Rotation of the image results in a cyclical shift of the extracted signal. Scaling of the image results in amplification of the extracted signal, and translation of the image has no effect on the extracted signal. We can therefore compensate for rotation with a simple search, and compensate for scaling by using the correlation coefficient as the detection measure. False positive results on a database of 10 000 images are reported. Robustness results on a database of 2000 images are described. It is shown that the watermark is robust to rotation, scale, and translation. In addition, we describe tests examining the watermarks resistance to cropping and JPEG compression.

714 citations