Skip to main content

A Robust Blind Watermarking Scheme for Color Images Using Quaternion Fourier Transform

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12240))

Included in the following conference series:

Abstract

With the advancement of image devices, massive image data are being generated exponentially, which indirectly leads to more copyright issues over the images. Image watermarking is an important method for copyright protection. Considering that color images dominate the real-world image data, designing copyright protection techniques specially for color images are very meaningful. In this paper, we propose a robust blind watermarking scheme for color images based on quaternion Fourier transform (QFT). After converting the color image data into QFT coefficients, we embed the watermark message into the four channels in QFT domain, to improve the embedding capacity and robustness. We also conduct experiment to investigate the performance of visual quality and robustness, by comparing with some other common signal transforms. The experimental results show that our scheme achieves a satisfactory performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Parah, S.A., Sheikh, J.A., Hafiz, A.M., Bhat, G.M.: Data hiding in scrambled images: a new double layer security data hiding technique. Comput. Electr. Eng. 40(15), 70–82 (2014)

    Article  Google Scholar 

  2. Bhatnagar, G., Wu, Q.M.J., Atrey, P.K.: Robust logo watermarking using biometrics inspired key generation. Expert Syst. Appl. 41(17), 4563–4578 (2014)

    Article  Google Scholar 

  3. Guo, J., Zheng, P., Huang, J.: Secure watermarking scheme against watermark attacks in the encrypted domain. J. Vis. Commun. Image Represent. 30, 125–135 (2015)

    Article  Google Scholar 

  4. Zheng, P., Zhang, Y.: A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks. Multimedia Tools Appl. 79(25), 18343–18365 (2020). https://doi.org/10.1007/s11042-019-08490-4

    Article  Google Scholar 

  5. Parah, S.A., Sheikh, J.A., Loan, N.A., Bhat, G.M.: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Sig. Process. 53(21), 11–24 (2016)

    Article  Google Scholar 

  6. Zheng, P., Huang, J.: Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 240–254. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36373-3_16

    Chapter  Google Scholar 

  7. Jayashree, N., Bhuvaneswaran, R.: A robust image watermarking scheme using z-transform, discrete wavelet transform and bidiagonal singular value decomposition. Comput. Mater. Continua 58(1), 263–285 (2019)

    Article  Google Scholar 

  8. Liu, J., et al.: A robust zero-watermarking based on SIFT-DCT for medical images in the encrypted domain (2019)

    Google Scholar 

  9. Liu, J., et al.: A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map (2019)

    Google Scholar 

  10. Grigoryan, A.M., Jenkinson, J., Agaian, S.S.: Quaternion Fourier transform based alpha-rooting method for color image measurement and enhancement. Sig. Process. 109, 269–289 (2015)

    Article  Google Scholar 

  11. Wang, X., Wang, C., Yang, H., Niu, P.: A robust blind color image watermarking in quaternion Fourier transform domain. J. Syst. Softw. 86(2), 255–277 (2013)

    Article  Google Scholar 

  12. Chen, B., Coatrieux, G., Gang, C., Sun, X., Coatrieux, J.L., Shu, H.: Full 4-D quaternion discrete Fourier transform based watermarking for color images. Digit. Sig. Process. 28(25), 106–119 (2014)

    Article  Google Scholar 

  13. Bas, P., Bihan, N.L., Chassery, J.: Color image watermarking using quaternion Fourier transform, vol. 3, pp. 521–524 (2003)

    Google Scholar 

  14. Ell, T.A., Sangwine, S.J.: Decomposition of 2D hypercomplex Fourier transforms into pairs of complex Fourier transforms. In: 2000 European Signal Processing Conference, pp. 1–4 (2000)

    Google Scholar 

  15. Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740–755. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10602-1_48

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Guangdong Natural Science Foundation under Grant 2019A1515010746, in part by the Fundamental Research Funds for the Central Universities under Grant 19LGPY218, in part by the NSFC under Grant 61502547 and Grant 61672551, in part by Guangdong Science and Technology Plan Project under Grant 2013B090800009. in part by the Guangzhou Science and Technology Plan Project under Grant 2014Y2-00019 and Grant 201707010167.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peijia Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liang, R., Zheng, P., Fang, Y., Song, T. (2020). A Robust Blind Watermarking Scheme for Color Images Using Quaternion Fourier Transform. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics