Abstract
Based on quaternion discrete cosine transform (QDCT) and singular value decomposition (SVD), a novel color image watermarking scheme using an optimized encrypted binary computer-generated hologram (CGH) as the watermark is presented. A Fibonacci transform-based binary CGH technique that uses particle swarm optimization (PSO) algorithm to improve the reconstructed image quality has been proposed to generate a hologram of a watermark. By use of QDCT, the host color image is treated holistically as a vector field. The component of the host color image after QDCT, which is suitable for embedding watermark, is analyzed. With SVD, the mark CGH is inserted into the host color image by modifying the U matrix. To embed the binary CGH, multiple embedding strength factors are used in this study. To withstand the geometric attacks, based on Zernike moment algorithm and invariant centroid, an improved geometric distortion detection algorithm is proposed. Considering the significant color information, this algorithm is performed on the color invariance model. To obtain better imperceptibility and robustness, PSO is used for finding the proper multiple embedding strength factors. Compared with traditional geometric estimation method, the improved algorithm can estimate the transform parameters of the geometric distorted color image more accurately. Experimental results show that the proposed color image watermarking is not only secure and invisible, but also robust against common image processing operations and geometrical distortions.
Similar content being viewed by others
References
Benhocine A, Laouamer L, Nana L et al (2008) A new approach against color attacks of watermarked images. In: Proceedings of international conference on intelligent information hiding and multimedia signal processing, pp 969–972
Botta M, Cavagnino D, Pomponiu V (2015) Fragile watermarking using Karhunen–Loève transform: the KLT-F approach. Soft Comput 19:1905–1919
Chang HT, Tsan CL (2005) Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain. Appl Opt 44:6211–6219
Chen DQ, Gu JH, Zhou H (2011) Digital audio watermarking based on holographic nonlinear limiter. In: Proceedings of international conference on electronics and optoelectronics, pp 91–94
Chen BJ, Shu HZ, Coatrieux G et al (2015) color image analysis by quaternion-type moments. J Math Imaging Vis 51:124–144
Chung KL, Yang WN, Huang YH et al (2007) On SVD- based watermarking algorithm. Appl Math Comput 188:54–57
Gai Q, Sun YF, Wang XL et al (2009) Color image digital watermarking using discrete quaternion cosine-transform. J Optoelectron Laser 20:1193–1197
Geusebroek JM, Boomgaard RVD, Smeulders AWM et al (2001) Color invariance. IEEE Trans Pattern Anal Mach Intell 23:1338–1350
Gonzalez RC, Woods RE (2007) Digital image processing, 3rd edn. Prentice Hall, Upper Saddle River
Guo P, Wang J, Li B, Lee SY (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15:929–936
Han JL, Zhao XH, Qio CY (2016) A digital image watermarking method based on host image analysis and genetic algorithm. J Ambient Intell Humaniz Comput 7:37–45
He MZ, Tan QF, Cao LC et al (2009) Security enhanced optical encryption system by random phase key and permutation key. Opt Express 17:22462–22473
Jagadeesh B, Rajesh Kumar P, Chenna Reddy P (2016) Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft Comput 20:3679–3686
Karibali IG, Berberidis K (2006) Efficient spatial image watermarking via new perceptual masking and blind detection scheme. IEEE Trans Inform Forensics Secur 1:256–274
Khotanzad A, Hong YH (1990) Invariant image recognition by Zernike moments. IEEE Trans Pattern Anal Mach Intell 12:489–497
Kim BS, Choi JG, Park CH et al (2003) Robust digital image watermarking method against geometrical attacks. J Real Time Imaging 9:139–149
Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284:938–944
Li JZ (2010) Robust image watermarking scheme against geometric attacks using a computer-generated hologram. Appl Opt 49:6302–6312
Li JZ, Zhu YH (2010) A geometric robust image watermarking scheme based on DWT-SVD and Zernike moments. In: Proceedings of The 3rd IEEE international conference on computer science and information technology, pp 367–371
Li JZ (2014) An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization. Opt Express 22:10002–10016
Li J, Chen XF, Li MQ et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parall Distrib syst 25:1615–1625
Li J, Li XL, Yang B, Sun XM (2015a) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10:507–518
Li J, Chen XF, Huang XY et al (2015b) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64:1–1
Ma TH, Zhou JJ, Tang ML et al (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst E98–D:902–910
Okman OE, Akar GB (2007) Quantization index modulation-based image watermarking using digital holography. J Opt Soc Am A 24:243–253
Pizzolante R, Carpentieri B, Castiglione A et al (2011) The AVQ algorithm: watermarking and compression performances. In: Proceedings of intelligent networking and collaborative systems, pp 698–702
Pizzolante R, Castiglione A, Carpentieri B et al (2014) Protection of microscopy images through digital watermarking techniques. In: Proceedings of intelligent networking and collaborative systems, pp 65–72
Sathik MM, Sujatha SS (2012) A novel DWT based invisible watermarking technique for digital images. Int Arab J e-Technol 2:167–172
Shen J, Tan HW, Wang J et al (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16:171–178
Spagnolo GS, Santis MD (2011) Holographic watermarking for authentication of cut images. Opt Lasers Eng 49:1447–1455
Sun J, Yang JY (2010) Quaternion frequency watermarking algorithm for color images. In: Proceedings of international conference on multimedia technology, pp 1–4
Takai N, Mifune Y (2002) Digital watermarking by a holographic technique. Appl Opt 41:865–873
Vahedi E, Zoroofi RA, Shiva M (2012) Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digital Signal Proc 22:153–162
Valle YD, Venayagamoorthy GK, Mohagheghi S et al (2008) Particle swarm optimization: basic concepts, variants and applications in power systems. IEEE Trans Evolut Comput 12:171–195
Wang FH, Pan JS, Jain LC, Huang HC (2004) A VQ-based image-in-image data hiding scheme. In: Proceedings of IEEE international conference on multimedia and expo, pp 2191–2194
Wen XZ, Shao L, Xue Y et al (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395–406
Xia ZH, Wang Wang XH, Xun XM et al (2014) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl. doi:10.1007/s11042-014-2381-8
Yan W, Hu YH, Shou GH et al (2010) The algorithm of color image watermarking based on SIFT. In: Proceedings of The 2nd international conference on E-business and information system security, pp 1–4
Yu ZL, Jin GF (1984) Computer-generated hologram. Press of Tsinghua University, Beijing
Zheng YH, Jeon B, Xu DH et al (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28:961–973
Acknowledgments
This work is partly supported by the Natural Science Foundation of Guangdong Province (No. 2014A030310038), the Educational Commission of Guangdong Province (No. 2013KJCX0127, No. 2015KTSCX089) and the Fundamental Research Funds for the Central Universities (No. 20720160016).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Author Jianzhong Li declares that he has no conflict of interest. Author Qun Lin declares that he has no conflict of interest. Author Chuying Yu declares that she has no conflict of interest. Author Xuechang Ren declares that she has no conflict of interest. Author Ping Li declares that he has no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Li, J., Lin, Q., Yu, C. et al. A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22, 47–65 (2018). https://doi.org/10.1007/s00500-016-2320-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-016-2320-x