Citations
More filters
[...]
TL;DR: A novel multiplicative watermarking scheme in the contourlet domain using the univariate and bivariate alpha-stable distributions is proposed and the robustness of the proposed bivariate Cauchy detector against various kinds of attacks is studied and shown to be superior to that of the generalized Gaussian detector.
Abstract: In the past decade, several schemes for digital image watermarking have been proposed to protect the copyright of an image document or to provide proof of ownership in some identifiable fashion. This paper proposes a novel multiplicative watermarking scheme in the contourlet domain. The effectiveness of a watermark detector depends highly on the modeling of the transform-domain coefficients. In view of this, we first investigate the modeling of the contourlet coefficients by the alpha-stable distributions. It is shown that the univariate alpha-stable distribution fits the empirical data more accurately than the formerly used distributions, such as the generalized Gaussian and Laplacian, do. We also show that the bivariate alpha-stable distribution can capture the across scale dependencies of the contourlet coefficients. Motivated by the modeling results, a blind watermark detector in the contourlet domain is designed by using the univariate and bivariate alpha-stable distributions. It is shown that the detectors based on both of these distributions provide higher detection rates than that based on the generalized Gaussian distribution does. However, a watermark detector designed based on the alpha-stable distribution with a value of its parameter α other than 1 or 2 is computationally expensive because of the lack of a closed-form expression for the distribution in this case. Therefore, a watermark detector is designed based on the bivariate Cauchy member of the alpha-stable family for which α = 1 . The resulting design yields a significantly reduced-complexity detector and provides a performance that is much superior to that of the GG detector and very close to that of the detector corresponding to the best-fit alpha-stable distribution. The robustness of the proposed bivariate Cauchy detector against various kinds of attacks, such as noise, filtering, and compression, is studied and shown to be superior to that of the generalized Gaussian detector.
70 citations
[...]
TL;DR: Since watermark is embedded in the local as well as global CT coefficients of two different frequency bands, the proposed method is robust against a wide range of attacks.
Abstract: In this paper we propose a blind and highly robust watermarking method consisting of two embedding stages. In the first stage, the odd description of image is divided into non-overlapped fixed size blocks and the signature (watermark) is embedded in the high frequency component of the Contourlet transform (CT) of the blocks. In the second stage, the signature is embedded in the low frequency component of the global CT of the image. The main issue associated with two-stage blind watermarking is the selection of the less affected signature among the two embedded signatures. In this paper a measure is introduced to decide between the two extracted signatures. Simulation results indicate that the proposed method achieves higher robustness compared to other known watermarking methods. Moreover, since watermark is embedded in the local as well as global CT coefficients of two different frequency bands, the proposed method is robust against a wide range of attacks. This is due to the fact that most of the attacks affect either a specific frequency band or a specific location in the watermarked image.
36 citations
Cites methods or result from "Robust Digital Watermarking Scheme ..."
[...]
[...]
[...]
[...]
[...]
[...]
TL;DR: This study uses the likelihood ratio decision rule and t-location scale distribution to design an optimal multiplicative watermark detector that showed higher efficiency and robustness against different attacks, and derives the receiver operating characteristics (ROC) analytically.
Abstract: Digital watermarking is used to protect copyright information by embedding hidden data in digital media. In this study, a multiplicative watermarking scheme is proposed in the contourlet domain. Overall, selection of proper models is of great importance, as watermark detection processes can be replicated as decision rules. Accordingly, in this study, contourlet coefficients were modeled based on t-location scale distribution. Based on the Kolmogorov–Smirnov test, t Location-Scale distribution showed high efficiency in modeling the coefficients. We used the likelihood ratio decision rule and t-location scale distribution to design an optimal multiplicative watermark detector. Then, we derive the receiver operating characteristics (ROC) analytically. The detector showed higher efficiency than other watermarking schemes in the literature, based on the experimental results, and its robustness against different attacks was verified.
32 citations
[...]
TL;DR: A novel watermarking scheme that exploits the features of micro images of watermarks to build association rules and embeds the rules into a host image instead of the bit stream of the watermark, which is commonly used in digital water marking.
Abstract: A novel watermarking scheme is proposed that could substantially improve current watermarking techniques This scheme exploits the features of micro images of watermarks to build association rules and embeds the rules into a host image instead of the bit stream of the watermark, which is commonly used in digital watermarking Next, similar micro images with the same rules are collected or even created from the host image to simulate an extracted watermark This method, called the features classification forest, can achieve blind extraction and is adaptable to any watermarking scheme using a quantization-based mechanism Furthermore, a larger size watermark can be accepted without an adverse effect on the imperceptibility of the host image The experiments demonstrate the successful simulation of watermarks and the application to five different watermarking schemes One of them is slightly adjusted from a reference to especially resist JPEG compression, and the others show native advantages to resist different image processing attacks
28 citations
Cites background from "Robust Digital Watermarking Scheme ..."
[...]
[...]
TL;DR: Experimental results demonstrate that the proposed image watermarking is not only secure and invisible, but also robust against a variety of attacks.
Abstract: In this paper, a novel secure optimal image watermarking scheme using an encrypted gyrator transform computer generated hologram (CGH) in the contourlet domain is presented. A new encrypted CGH technique, which is based on the gyrator transform, the random phase mask, the three-step phase-shifting interferometry and the Fibonacci transform, has been proposed to produce a hologram of a watermark first. With the huge key space of the encrypted CGH, the security strength of the watermarking system is enhanced. To achieve better imperceptibility, an improved quantization embedding algorithm is proposed to embed the encrypted CGH into the low frequency sub-band of the contourlet-transformed host image. In order to obtain the highest possible robustness without losing the imperceptibility, particle swarm optimization algorithm is employed to search the optimal embedding parameter of the watermarking system. In comparison with other method, the proposed watermarking scheme offers better performances for both imperceptibility and robustness. Experimental results demonstrate that the proposed image watermarking is not only secure and invisible, but also robust against a variety of attacks.
26 citations
References
More filters
[...]
TL;DR: A "true" two-dimensional transform that can capture the intrinsic geometrical structure that is key in visual information is pursued and it is shown that with parabolic scaling and sufficient directional vanishing moments, contourlets achieve the optimal approximation rate for piecewise smooth functions with discontinuities along twice continuously differentiable curves.
Abstract: The limitations of commonly used separable extensions of one-dimensional transforms, such as the Fourier and wavelet transforms, in capturing the geometry of image edges are well known. In this paper, we pursue a "true" two-dimensional transform that can capture the intrinsic geometrical structure that is key in visual information. The main challenge in exploring geometry in images comes from the discrete nature of the data. Thus, unlike other approaches, such as curvelets, that first develop a transform in the continuous domain and then discretize for sampled data, our approach starts with a discrete-domain construction and then studies its convergence to an expansion in the continuous domain. Specifically, we construct a discrete-domain multiresolution and multidirection expansion using nonseparable filter banks, in much the same way that wavelets were derived from filter banks. This construction results in a flexible multiresolution, local, and directional image expansion using contour segments, and, thus, it is named the contourlet transform. The discrete contourlet transform has a fast iterated filter bank algorithm that requires an order N operations for N-pixel images. Furthermore, we establish a precise link between the developed filter bank and the associated continuous-domain contourlet expansion via a directional multiresolution analysis framework. We show that with parabolic scaling and sufficient directional vanishing moments, contourlets achieve the optimal approximation rate for piecewise smooth functions with discontinuities along twice continuously differentiable curves. Finally, we show some numerical experiments demonstrating the potential of contourlets in several image processing applications.
3,728 citations
[...]
TL;DR: A new approach to mask the watermark according to the characteristics of the human visual system (HVS) is presented, which is accomplished pixel by pixel by taking into account the texture and the luminance content of all the image subbands.
Abstract: A watermarking algorithm operating in the wavelet domain is presented. Performance improvement with respect to existing algorithms is obtained by means of a new approach to mask the watermark according to the characteristics of the human visual system (HVS). In contrast to conventional methods operating in the wavelet domain, masking is accomplished pixel by pixel by taking into account the texture and the luminance content of all the image subbands. The watermark consists of a pseudorandom sequence which is adaptively added to the largest detail bands. As usual, the watermark is detected by computing the correlation between the watermarked coefficients and the watermarking code, and the detection threshold is chosen in such a way that the knowledge of the watermark energy used in the embedding phase is not needed, thus permitting one to adapt it to the image at hand. Experimental results and comparisons with other techniques operating in the wavelet domain prove the effectiveness of the new algorithm.
912 citations
"Robust Digital Watermarking Scheme ..." refers methods in this paper
[...]
[...]
[...]
[...]
[...]
TL;DR: The authors provide a novel mapping of the proposed 1-D framework into 2-D that preserves the following: i) perfect reconstruction; ii) stability in the IIR case; iii) linear phase in the FIR case; iv) zeros at aliasing frequency; v) frequency characteristic of the filters.
Abstract: Proposes a novel framework for a new class of two-channel biorthogonal filter banks. The framework covers two useful subclasses: i) causal stable IIR filter banks. ii) linear phase FIR filter banks. There exists a very efficient structurally perfect reconstruction implementation for such a class. Filter banks of high frequency selectivity can be achieved by using the proposed framework with low complexity. The properties of such a class are discussed in detail. The design of the analysis/synthesis systems reduces to the design of a single transfer function. Very simple design methods are given both for FIR and IIR cases. Zeros of arbitrary multiplicity at aliasing frequency can be easily imposed, for the purpose of generating wavelets with regularity property. In the IIR case, two new classes of IIR maximally flat filters different from Butterworth filters are introduced. The filter coefficients are given in closed form. The wavelet bases corresponding to the biorthogonal systems are generated. the authors also provide a novel mapping of the proposed 1-D framework into 2-D. The mapping preserves the following: i) perfect reconstruction; ii) stability in the IIR case; iii) linear phase in the FIR case; iv) zeros at aliasing frequency; v) frequency characteristic of the filters. >
411 citations
Additional excerpts
[...]
DOI•
[...]
01 Jan 2002
TL;DR: This thesis focuses on the development of new "true" two-dimensional representations for images using a discrete framework that can lead to algorithmic implementations and a new family of block directional and orthonormal transforms based on the ridgelet idea.
Abstract: Efficient representation of visual information lies at the foundation of many image processing tasks, including compression, filtering, and feature extraction. Efficiency of a representation refers to the ability to capture significant information of an object of interest in a small description. For practical applications, this representation has to be realized by structured transforms and fast algorithms. Recently, it has become evident that commonly used separable transforms (such as wavelets) are not necessarily best suited for images. Thus, there is a strong motivation to search for more powerful schemes that can capture the intrinsic geometrical structure of pictorial information. This thesis focuses on the development of new "true" two-dimensional representations for images. The emphasis is on the discrete framework that can lead to algorithmic implementations. The first method constructs multiresolution, local and directional image expansions by using non-separable filter banks. This discrete transform is developed in connection with the continuous-space curvelet construction in harmonic analysis. As a result, the proposed transform provides an efficient representation for two-dimensional piecewise smooth signals that resemble images. The link between the developed filter banks and the continuous-space constructions is set up in a newly defined directional multiresolution analysis. The second method constructs a new family of block directional and orthonormal transforms based on the ridgelet idea, and thus offers an efficient representation for images that are smooth away from straight edges. Finally, directional multiresolution image representations are employed together with statistical modeling, leading to powerful texture models and successful image retrieval systems.
350 citations
"Robust Digital Watermarking Scheme ..." refers methods in this paper
[...]
[...]
TL;DR: In this paper, a singular value decomposition (SVD)-based watermarking scheme is proposed, which preserves both one-way and non-symmetric properties, usually not obtainable in DCT and DFT transformations.
Abstract: In the past couple of years, several digital watermarking schemes have been proposed and based on DCT, DFT, and DWT transformations. In this paper, a singular value decomposition (SVD)-based watermarking scheme is proposed. SVD transformation preserves both one-way and non-symmetric properties, usually not obtainable in DCT and DFT transformations. In the proposed scheme, both of the D and U components are explored for embedding the watermark. Experimental results show that the quality of the watermarked image is good and that there is strong resistance against general image processing. Furthermore, the extracted watermark can still be easily identified after tampering.
338 citations
"Robust Digital Watermarking Scheme ..." refers methods in this paper
[...]
Related Papers (5)
[...]