Abstract
Most of the existing watermarking schemes utilized SVD decomposition to embed watermark, which lead to a high computational complexity and incidental the false positive detection problem. Therefore, this paper provides a robust copyright protection scheme based on a simple decomposition scheme (schur decomposition) and Quantization Index Modulation (QIM) in Contourlet domain. In addition, some stable features are acquired by using schur decomposition in the Contourlet domain. Consequently, the watermark is embedded into those stable features with QIM method. Experimental results show that the proposed scheme has some superiorities in terms of robustness and imperceptibility, which could against most common attacks such as JPEG compression, filtering, cropping, noise adding and so on.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)
Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079–1107 (1999)
Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973–1984 (2011)
Su, Q., Niu, Y.G., Wang, G., Jia, S.L., Yue, J.: Color image blind watermarking scheme based on QR decomposition. Sig. Process. 94, 219–235 (2014)
Ali, M., Ahn, C.W.: An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain. Sig. Process. 94, 545–556 (2014)
Nematollahi, M.A., Al-Haddad, S.A.R., Zarafshan, F.: Blind digital speech watermarking based on eigen-value quantization in DWT. Comput. Inf. Sci. 27, 58–67 (2015)
Agoyi, M., Çelebi, E., Anbarjafari, G.: A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. SIViP 9(3), 735–745 (2015)
Song, W., Hou, J.J., Li, Z.H., Huang, L.: Chaotic system and QR factorization based robust digital image watermarking algorithm. J. Cent. South Univ. Technol. 9(1), 116–124 (2011)
Naderahmadian, Y., Hosseini-Khayat, S.: Fast watermarking based on QR decomposition in wavelet domain. In: 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), vol. 39, pp. 127–130, October 2010
Liu, F., Han, K., Wang, C.Z.: A novel blind watermark algorithm based on SVD and DCT. In: IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 12, pp. 283–286, November 2009
Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060–3063 (2010)
Joel, N.: Franklin: Matrix theory. Dover Publications, New York (2000)
Xia, Z.H., Wang, X.H., Sun, X.M., Wang, B.W.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)
Xia, Z.H., Wang, X.H., Sun, X.M., Liu, Q.S., Xiong, N.X.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947–1962 (2016)
Acknowledgement
This work is supported by the National Science Foundation of China (61402209, 61563022), Invention Patent Industrialization Demonstration Project of Jiangxi Province (20143BBM26113), Youth Science Fund Major Projects of Jiangxi Province (20161ACB21009), Guild of technological innovation of science and technology projects in Jiangxi Province (20161BBE53004). A Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Wang, J., Liu, Y. (2016). Schur Decomposition Based Robust Watermarking Algorithm in Contourlet Domain. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-48671-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48670-3
Online ISBN: 978-3-319-48671-0
eBook Packages: Computer ScienceComputer Science (R0)