Skip to main content

Embedding Binary Watermarks in Dual-Tree Complex Wavelets Domain for Access Control of Digital Images

  • Conference paper
Transactions on Data Hiding and Multimedia Security VI

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 6730))

Abstract

This paper investigates embedding binary watermarks in digital images in dual-tree complex wavelet transform domain due to its rich direction selection, shift invariance and higher robustness. However, embedding binary watermarks directly into the wavelet coefficients does not work well. Two watermarking schemes are proposed, coefficients swapping is to embed the watermark in the low-frequency coefficients by selecting those 2×2 blocks with high-energy and swapping the two coefficients in the median range. Whereas a group of high-pass complex frequency coefficients are quantized so that the quantized coefficients lie in the middle of the quantization range and the changes are distributed among the coefficients. Experimental results conducted on 100 images achieve about 96% and 92% detection rate for the low-pass and high-pass frequency coefficients-based schemes. Robustness tests against several common signal processing attacks such as additive noise, median filtering and lossy JPEG compression confirm the superior performance of the proposed schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kundur, D., Hatzinakos, D.: Digital Watermarking for Telltale Tamper Proofing and Authentication. Proc. IEEE 87(7), 1167–1180 (1999)

    Article  Google Scholar 

  2. Hsieh, M.-S., Tseng, D.-C., Huang, Y.-H.: Hiding Digital Watermarks Using Multiresolution Wavelet Transform. IEEE Trans. on Industrial Electronics 48(5), 875–882 (2001)

    Article  Google Scholar 

  3. Chan, P.W., Lyu, M.R., Chin, R.T.: A Novel Scheme for Hybrid Digital Video Watermarking: Approach, Evaluation and Experimentation. IEEE Trans. Circuits Syst. Video Technol. 15(12), 1638–1649

    Google Scholar 

  4. Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)

    Article  MATH  Google Scholar 

  5. Doerr, G., Dugelay, J.-L.: A Guide tour of video watermarking. Signal Processing: Image Communicatin 18, 263–282 (2003)

    Google Scholar 

  6. Kingsbury, N.: A Dual-Tree Complex Transform With Improved Orthogonality and Symmetry Properties. In: Proc. of Int. Conf. Imag. Proc., vol. 2, pp. 375–378 (September 2000)

    Google Scholar 

  7. Kingbury, N.: Complex Wavelets For Shift Invariant Analysis and Filtering of Signals. Journal of Applied And Computational Harmonic Analysis 10(3), 234–253 (2001)

    Article  MathSciNet  Google Scholar 

  8. Selesnick, I.W., Baraniuk, R.G., Kingsbury, N.G.: The Dual-Tree Complex Wavelet Transform. IEEE Signal Process. Magazine, 123–151 (2005)

    Google Scholar 

  9. Loo, P., Kingbury, N.: Digital Watermarking Using Complex Wavlets. In: IEEE Int. Conf. on Image Processing, vol. 3, pp. 29–32 (September 2000)

    Google Scholar 

  10. Terzija, N., Geisselhardt, W.: Digital Image Watermarking Using Complex Wavelet Transform. In: Proc. Workshop Multimedia Security, pp. 193–198 (2004)

    Google Scholar 

  11. Thomson, A.I., Bouridane, A., Kurugollu, F.: Spread Transform Watermarking for Digital Multimedia Using the Complex Wavelet Transform. In: ECSIS Symp. on Bio-inspired, Learning, and Intelligent Systems for Security, pp. 123–132 (2007)

    Google Scholar 

  12. Lino, E.C., Pickering, M.R., Nasiopoulos, P., Rabab, K.W.: A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform. IEEE Trans. on Information Forensics and Security 3(3), 466–474 (2008)

    Article  Google Scholar 

  13. Yu, G.-J., Lu, C.-S., Mark Liao, H.-Y.: Mean-quantization-based fragile warermarking for image authentication. Optical Eng. 40(7), 1396–1408 (2001)

    Article  Google Scholar 

  14. Coria, L., Nasiopoulos, P., Ward, R., Pickering, M.: An Access Control Video Watermarking Method that is Robust to Geometric Distortions. Journal of Information Assurance and Security 2, 266–274 (2007)

    Google Scholar 

  15. Yang, H., Jiang, X., Kot, A.C.: Image watermarking using dual-tree complex wavelet by coefficients swapping and group of coefficients quantization. In: Prof. of the IEEE Int. Conf. on Multimedia and Expo. (ICME 2010), Singapore, July 19-23, pp. 1673–1678 (2010)

    Google Scholar 

  16. The USC-SIPI Image Database, http://www.petitcolas.net/fabien/watermarking/image_database/index.html

  17. Photo Database, http://sipi.usc.edu/database/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, H., Jiang, X., Kot, A.C. (2011). Embedding Binary Watermarks in Dual-Tree Complex Wavelets Domain for Access Control of Digital Images. In: Shi, Y.Q., et al. Transactions on Data Hiding and Multimedia Security VI. Lecture Notes in Computer Science, vol 6730. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24556-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24556-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24555-8

  • Online ISBN: 978-3-642-24556-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics