吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (4): 1151-1158.doi: 10.13229/j.cnki.jdxbgxb201404038

Previous Articles     Next Articles

Novel robust watermarking algorithm for regional attacks of digital images

WANG You-wei, LIU Yuan-ning, ZHU Xiao-dong   

  1. College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Received:2013-05-03 Online:2014-07-01 Published:2014-07-01

Abstract: To enhance the algorithm's ability of anti-regional attacks of digital images, a secure and highly robust digital watermarking algorithm is proposed. The concept of Random Quaternary Group (RQG) is introduced, and the RQGs of the host image are used to hide the original redundant watermark bits and the mean value of the 8×8 blocks of the RQGs. Before the watermark embedding process, the original watermark is encrypted by chaotic sequence; the performance evaluation function of the proposed algorithm is applied to search the high and low limits of the quantization step of watermark embedding. In watermark embedding process, the algorithm is used to select the optimal quantization step adaptively according to the content of each block. Experiment results show that the RQG strategy is secure; the proposed method has good watermark transparency and high robustness resisting conventional regional attack and other attacks of digital images.

Key words: computer application, regional attacks, random quaternary group, quantization step, watermark transparency, robustness

CLC Number: 

  • TP391
[1] Lian S, Kanellopoulos D, Ruffo G. Recent advances in multimedia information system security[J]. Slovenian Society Information, 2009, 33(1): 3-24.
[2] Run R S, Horng S J, Lai J L, et al. An improved SVD-based watermarking technique for copyright protection[J]. Expert Systems with Applications, 2012, 39 (2): 673-689.
[3] 姜楠, 郝利刚, 朱小陆. 基于二重循环的数字水印算法[J]. 北京工业大学学报, 2012, 38(11): 1694-1697, 1715. Jiang Nan, Hao Li-gang, Zhu Xiao-lu. Digital watermarking algorithm based on dual circulation[J]. Journal of Beijing University of Technology, 2012, 38(11): 1694-1697, 1715.
[4] Zhu S M, Liu J M. A novel adaptive watermarking scheme based on human visual system and particle swarm optimization[J]. Information Security Practice and Experience, Lecture Notes in Computer Science, 2009, 5451: 136-146.
[5] Nasir I, Weng Y, Jiang J M, et al. Multiple spatial watermarking technique in color images signal[J]. Image and Video Processing, 2010, 4(2): 145-154.
[6] Ahmed N, Al-Gindy H, Ahmad H A. A new blind image watermarking of handwritten signatures using low-frequency band DCT coefficients[C]∥IEEE International Conference on Signal Processing and Communications, 2007.
[7] Ammerle-Uhl J H, Koidl C, Uhl A. Multiple blind re-watermarking with quantization-based embedding[C]∥The 18th IEEE International Conference on Image Processing, 2011: 265-268.
[8] 胡玉平, 王志坚, 张玲华, 等. 基于小波变换和混沌映射的自适应水印算法[J]. 吉林大学学报:工学版, 2012, 42(1): 401-404. Hu Yu-ping, Wang Zhi-jian, Zhang Ling-hua, et al. Image-adaptive watermarking algorithm based on chaos map and DWT[J]. Journal of Jilin University (Engineering and Technology Edition), 2012, 42(1): 401-404.
[9] Brian C, Gregory W W. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding[J]. IEEE Transaction on Information Theory, 2001, 47(4): 1423-1443.
[10] 罗小刚, 刘静静, 汪德暖, 等. 基于Radon变换与功率谱结合的心脏MR图像配准算法[J]. 计算机科学, 2012, 39(4): 254-257. Luo Xiao-gang, Liu Jing-jing, Wang De-nuan, et al. Cardiac MRI registration algorithm based on radon transform and power spectrum[J]. Computer Science, 2012, 39(4): 254-257.
[11] Lai C C. A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm[J]. Digital Signal Processing, 2011, 21: 522-527.
[12] Wang Z, Bovik A C, Sheikh H R, et al. Image quality assessment: from error visibility to structural similarity[J]. IEEE Transaction on Image Processing, 2004, 13(4):600-612.
[13] 王春桃, 倪江群, 卓华硕, 等. 基于可变形多尺度变换的几何不变鲁棒图像水印算法[J]. 自动化学报, 2011, 37(11): 1368-1380. Wang Chun-tao, Ni Jiang-qun, Zhuo Hua-shuo, et al. A geometrically invariant robust image watermarking based on deformable multi-scale transform[J]. Acta Automatica Sinica, 2011, 37(11): 1368-1380.
[14] 黄继武, Shi Y Q, 程卫东. DCT域图像水印:嵌入对策和算法[J]. 电子学报, 2000, 28(4): 57-60. Huang Ji-wu, Shi Y Q, Cheng Wei-dong. Image watermarking in DCT: an embedding strategy and algorithm[J].Acta Electronica Sinica, 2000, 28(4): 57-60.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!