吉林大学学报(工学版) ›› 2017, Vol. 47 ›› Issue (1): 249-254.doi: 10.13229/j.cnki.jdxbgxb201701036

• Orginal Article • Previous Articles     Next Articles

High robustness image watermarking algorithm

ZHAO Bo, QIN Gui-he   

  1. College of Computer Science and Technology, Jilin University, Changchun 130012,China
  • Received:2015-10-15 Online:2017-01-20 Published:2017-01-20

Abstract: First, the saliency is extracted from the original image based on visual attention model. Then, the image is decomposed by Non-negative Matrix Factorization (NMF) to reduce the dimension and scrambled by chaotic encryption. The decomposed saliency map is embedded into the frequency component of the original image by DCT-SVD transform. At the receiving terminal, the watermarking is extracted from the received image, and the saliency map of the received image is also extracted. Finally, comparison of the difference between the received image's saliency map and watermarking, the Lorenz curve and the reasonable threshold are used to determine whether the received image is changed by noise or artificial tampering. Compared with other similar algorithms, the proposed algorithm has good discrimination against noise interference and artificial tampering.

Key words: computer application, visual attention model, image watermarking, Lorenz curve, image authentication

CLC Number: 

  • TP751.1
[1] Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Transactions on Image Processing, 2001, 10(10): 1579-1592.
[2] Maeno K,Sun Q,Chang S F,et al.New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization[J].IEEE Transactions on Multimedia,2006,8(1):32-45.
[3] Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2): 153-168.
[4] Ho C K, Li C T. Semi-fragile watermarking scheme for authentication of JPEG images[J].International Conference on Information Technology: Coding and Computing,2004,1(6): 7-11.
[5] Ko C. A novel semi-fragile watermarking technique for image authentication[C]∥Proceedings of the Sixth IASTED International Conferenceon on (Signal and Image Processing),Marina Del Rey,2004.
[6] Loukhaoukha K, Nabti M, Zebbiche K. A robust SVD-based image watermarking using a multi-objective particle swarm optimization[J]. Opto Electronics Review, 2014, 22(1):45-54.
[7] Piva A, Bartolini F, Caldelli R. Self recovery authentication of images in the DWT domain[J]. International Journal of Image and Graphics, 2005, 5(01): 149-165.
[8] 朱光, 师文, 朱学芳,等. 结合SURF特征的多功能彩色图像水印算法[J]. 中国图象图形学报, 2013, 18(12): 1694-1702.
Zhu Guang,Shi Wen,Zhu Xue-fang,et al. Multi-purpose watermark algorithm of color images based on SURF[J]. Journal of Image and Graphics,2013,18(12):1694-1702.
[9] 王友卫, 刘元宁, 朱晓冬. 用于图像内容认证的半脆弱水印新算法[J]. 浙江大学学报:工学版, 2013, 6(6):969-976.
Wang You-wei,Liu Yuan-ning,Zhu Xiao-dong. Novel semi-fragile watermarking algorithm for image content authentication[J]. Journal of Zhejiang University(Engineering Science), 2013, 6(6):969-976.
[10] Preda R O. Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain[J]. Measurement, 2013, 46(1): 367-373.
[11] Michison G. The organization of sequential memory: sparse representation and the targeting problem[R]. In:Seelen W V,Shaw G.1einbos U M.Organization of Neural Networks. VCH Verlagsgesellsehaft, Weinheim,1988:347-367.
[12] 赵宏伟, 陈霄, 刘萍萍,等. 视觉显著目标的自适应分割[J]. 光学精密工程, 2013,21(2):531-538.
Zhao Hong-wei,Chen Xiao,Liu Ping-ping et al.Adaptive segmentation for visual salient object[J].Optics and Precision Engineering,2013,21(2):531-538.
[13] Monga V, Mihcak K M. Robust and secure image hashing via non-negative matrix Factorizations[J]. IEEE Trans on Information Forensics and Security,2007,2(3):376-390.
[14] 易开祥, 孙鑫, 石教英. 一种基于混沌序列的图像加密算法[J]. 计算机辅助设计与图形学学报,2000,12:672-676.
Yi Kai-xiang, Sun Xin,Shi Jiao-ying. An image encryption arithmetic based on chaotic sequences[J]. Journal of Computer Aided Design and Computer Graphics,2000,12:672-676.
[15] 刘瑞祯, 谭铁牛. 基于奇异值分解的数字图像水印方法[J]. 电子学报, 2001, 29(2):168-171.
Liu Rui-zhen, Tan Tie-niu. SVD based digital watermarking method[J]. Acta Electronica Sinica, 2001, 29(2): 168-171.
[16] Amit K S, Mayank D, Anand M. Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain[J]. National Academy Science Letters 2014, 37(4): 351-358.
[17] Singh A, Tayal A, Choice of wavelet from wavelet families for DWT-DCT-SVD image watermarking[J]. International Journal of Computer Applications,2012, 48(17):9-14.
[18] Qi X, Xin X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization[J]. Journal of Visual Communication & Image Representation, 2015, 30: 312-327.
[19] Qi X, Xin X. A quantization-based semi-fragile watermarking scheme for image content authentication[J]. Journal of Visual Communication & Image Representation, 2011, 22(2):187-200.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!