Skip to main content
Log in

A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Based on quaternion discrete cosine transform (QDCT) and singular value decomposition (SVD), a novel color image watermarking scheme using an optimized encrypted binary computer-generated hologram (CGH) as the watermark is presented. A Fibonacci transform-based binary CGH technique that uses particle swarm optimization (PSO) algorithm to improve the reconstructed image quality has been proposed to generate a hologram of a watermark. By use of QDCT, the host color image is treated holistically as a vector field. The component of the host color image after QDCT, which is suitable for embedding watermark, is analyzed. With SVD, the mark CGH is inserted into the host color image by modifying the U matrix. To embed the binary CGH, multiple embedding strength factors are used in this study. To withstand the geometric attacks, based on Zernike moment algorithm and invariant centroid, an improved geometric distortion detection algorithm is proposed. Considering the significant color information, this algorithm is performed on the color invariance model. To obtain better imperceptibility and robustness, PSO is used for finding the proper multiple embedding strength factors. Compared with traditional geometric estimation method, the improved algorithm can estimate the transform parameters of the geometric distorted color image more accurately. Experimental results show that the proposed color image watermarking is not only secure and invisible, but also robust against common image processing operations and geometrical distortions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  • Benhocine A, Laouamer L, Nana L et al (2008) A new approach against color attacks of watermarked images. In: Proceedings of international conference on intelligent information hiding and multimedia signal processing, pp 969–972

  • Botta M, Cavagnino D, Pomponiu V (2015) Fragile watermarking using Karhunen–Loève transform: the KLT-F approach. Soft Comput 19:1905–1919

    Article  Google Scholar 

  • Chang HT, Tsan CL (2005) Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain. Appl Opt 44:6211–6219

  • Chen DQ, Gu JH, Zhou H (2011) Digital audio watermarking based on holographic nonlinear limiter. In: Proceedings of international conference on electronics and optoelectronics, pp 91–94

  • Chen BJ, Shu HZ, Coatrieux G et al (2015) color image analysis by quaternion-type moments. J Math Imaging Vis 51:124–144

    Article  MathSciNet  MATH  Google Scholar 

  • Chung KL, Yang WN, Huang YH et al (2007) On SVD- based watermarking algorithm. Appl Math Comput 188:54–57

    MathSciNet  MATH  Google Scholar 

  • Gai Q, Sun YF, Wang XL et al (2009) Color image digital watermarking using discrete quaternion cosine-transform. J Optoelectron Laser 20:1193–1197

    Google Scholar 

  • Geusebroek JM, Boomgaard RVD, Smeulders AWM et al (2001) Color invariance. IEEE Trans Pattern Anal Mach Intell 23:1338–1350

    Article  Google Scholar 

  • Gonzalez RC, Woods RE (2007) Digital image processing, 3rd edn. Prentice Hall, Upper Saddle River

    Google Scholar 

  • Guo P, Wang J, Li B, Lee SY (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15:929–936

    Google Scholar 

  • Han JL, Zhao XH, Qio CY (2016) A digital image watermarking method based on host image analysis and genetic algorithm. J Ambient Intell Humaniz Comput 7:37–45

    Article  Google Scholar 

  • He MZ, Tan QF, Cao LC et al (2009) Security enhanced optical encryption system by random phase key and permutation key. Opt Express 17:22462–22473

    Article  Google Scholar 

  • Jagadeesh B, Rajesh Kumar P, Chenna Reddy P (2016) Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft Comput 20:3679–3686

  • Karibali IG, Berberidis K (2006) Efficient spatial image watermarking via new perceptual masking and blind detection scheme. IEEE Trans Inform Forensics Secur 1:256–274

    Article  Google Scholar 

  • Khotanzad A, Hong YH (1990) Invariant image recognition by Zernike moments. IEEE Trans Pattern Anal Mach Intell 12:489–497

    Article  Google Scholar 

  • Kim BS, Choi JG, Park CH et al (2003) Robust digital image watermarking method against geometrical attacks. J Real Time Imaging 9:139–149

    Article  Google Scholar 

  • Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284:938–944

    Article  Google Scholar 

  • Li JZ (2010) Robust image watermarking scheme against geometric attacks using a computer-generated hologram. Appl Opt 49:6302–6312

    Article  Google Scholar 

  • Li JZ, Zhu YH (2010) A geometric robust image watermarking scheme based on DWT-SVD and Zernike moments. In: Proceedings of The 3rd IEEE international conference on computer science and information technology, pp 367–371

  • Li JZ (2014) An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization. Opt Express 22:10002–10016

    Article  Google Scholar 

  • Li J, Chen XF, Li MQ et al (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parall Distrib syst 25:1615–1625

    Article  Google Scholar 

  • Li J, Li XL, Yang B, Sun XM (2015a) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10:507–518

  • Li J, Chen XF, Huang XY et al (2015b) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64:1–1

    MathSciNet  MATH  Google Scholar 

  • Ma TH, Zhou JJ, Tang ML et al (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst E98–D:902–910

    Article  Google Scholar 

  • Okman OE, Akar GB (2007) Quantization index modulation-based image watermarking using digital holography. J Opt Soc Am A 24:243–253

  • Pizzolante R, Carpentieri B, Castiglione A et al (2011) The AVQ algorithm: watermarking and compression performances. In: Proceedings of intelligent networking and collaborative systems, pp 698–702

  • Pizzolante R, Castiglione A, Carpentieri B et al (2014) Protection of microscopy images through digital watermarking techniques. In: Proceedings of intelligent networking and collaborative systems, pp 65–72

  • Sathik MM, Sujatha SS (2012) A novel DWT based invisible watermarking technique for digital images. Int Arab J e-Technol 2:167–172

    Google Scholar 

  • Shen J, Tan HW, Wang J et al (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16:171–178

    Google Scholar 

  • Spagnolo GS, Santis MD (2011) Holographic watermarking for authentication of cut images. Opt Lasers Eng 49:1447–1455

    Article  Google Scholar 

  • Sun J, Yang JY (2010) Quaternion frequency watermarking algorithm for color images. In: Proceedings of international conference on multimedia technology, pp 1–4

  • Takai N, Mifune Y (2002) Digital watermarking by a holographic technique. Appl Opt 41:865–873

    Article  Google Scholar 

  • Vahedi E, Zoroofi RA, Shiva M (2012) Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digital Signal Proc 22:153–162

    Article  Google Scholar 

  • Valle YD, Venayagamoorthy GK, Mohagheghi S et al (2008) Particle swarm optimization: basic concepts, variants and applications in power systems. IEEE Trans Evolut Comput 12:171–195

    Article  Google Scholar 

  • Wang FH, Pan JS, Jain LC, Huang HC (2004) A VQ-based image-in-image data hiding scheme. In: Proceedings of IEEE international conference on multimedia and expo, pp 2191–2194

  • Wen XZ, Shao L, Xue Y et al (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395–406

    Article  Google Scholar 

  • Xia ZH, Wang Wang XH, Xun XM et al (2014) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl. doi:10.1007/s11042-014-2381-8

    Google Scholar 

  • Yan W, Hu YH, Shou GH et al (2010) The algorithm of color image watermarking based on SIFT. In: Proceedings of The 2nd international conference on E-business and information system security, pp 1–4

  • Yu ZL, Jin GF (1984) Computer-generated hologram. Press of Tsinghua University, Beijing

    Google Scholar 

  • Zheng YH, Jeon B, Xu DH et al (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28:961–973

    Google Scholar 

Download references

Acknowledgments

This work is partly supported by the Natural Science Foundation of Guangdong Province (No. 2014A030310038), the Educational Commission of Guangdong Province (No. 2013KJCX0127, No. 2015KTSCX089) and the Fundamental Research Funds for the Central Universities (No. 20720160016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianzhong Li.

Ethics declarations

Conflict of interest

Author Jianzhong Li declares that he has no conflict of interest. Author Qun Lin declares that he has no conflict of interest. Author Chuying Yu declares that she has no conflict of interest. Author Xuechang Ren declares that she has no conflict of interest. Author Ping Li declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, J., Lin, Q., Yu, C. et al. A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22, 47–65 (2018). https://doi.org/10.1007/s00500-016-2320-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-016-2320-x

Keywords

Navigation