Skip to main content
Log in

Digital watermarking using Hall property image decomposition method

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

Most of the existing singular value decomposition-based digital watermarking methods are not robust to geometric rotation, which change the pixels’ locations without maintaining the corresponding changes to the pixel’s intensity values of entire image and yield high computational cost. To answer this, we propose a digital image watermarking algorithm using the Hall property. In the proposed method, a digital watermark image is factorized into lower-triangular, upper-triangular, and permutation matrices. The permutation matrix is used as the valid key matrix for authentication of the rightful ownership of the watermark image. The product of the lower and upper triangular matrices is processed with a few iterations of the Arnold transformation to obtain the scrambled data. The scrambled data are embedded into particular sub-bands of a cover image using Wavelet transform. Our experiments show that the proposed algorithm is highly reliable and computationally efficient compared with state-of-the-art methods that are based on singular value decomposition.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Qiao L, Nahrstedt K (1998) Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. J Vis Commun Image Represent 9(3):194–210

    Article  Google Scholar 

  2. Craver S (1996) Can invisible watermarks resolve rightful ownership. IBM T.J. Watson Research Center, New York

    Google Scholar 

  3. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  4. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128

    Article  Google Scholar 

  5. Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the 2004 workshop on multimedia and security. Magdeburg, Germany, 2004, pp 166–174

  6. Zhang T-X, Zheng W-M, Lu Z-M, Liu B-B (2008) Comments on a semi-blind digital watermarking scheme based on singular value decomposition. pp 123–126

  7. Xiao L, Wei Z, Ye J (2008) Comments on “Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition” and theoretical analysis”. J Electron Imaging 17(4):040501-040501-3

    Article  Google Scholar 

  8. Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 14(4):043004-043004-9

    Article  Google Scholar 

  9. Chandra D (2002) Digital image watermarking using singular value decomposition. Circuits Syst MWSCAS 263(3):264–267

    Google Scholar 

  10. Rezazadeh S, Yazdi M (2006) A nonoblivious image watermarking system based on singular value decomposition and texture segmentation. In: Proceedings of world academy of science, engineering and technology, 2006

  11. Mohammad AA, Alhaj A, Shaltaf S (2008) An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Process 88(9):2158–2180

    Article  Google Scholar 

  12. Yavuz E, Telatar Z (2006) SVD adapted DCT domain DC subband image watermarking against watermark ambiguity. Multimedia content representation, classification and security. Springer, Berlin, pp 66–73

    Chapter  Google Scholar 

  13. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann Publishers Inc., Burlington

    Google Scholar 

  14. Division IBMCR, Craver S, Memon N, Yeo BL, Yeung MM (1997) Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IBM T.J. Watson Research Center, New York

    Google Scholar 

  15. Muhammad N, Bibi N (2015) Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Proc 9(9):795–803

    Article  Google Scholar 

  16. Chang CC, Lin C-C, Hu Y-S (2007) An SVD oriented watermark embedding scheme with high qualities for the restored images. Int J Innov Comput Inf Control 3(3):609–620

    Google Scholar 

  17. Patra JC, Soh W, Ang EL, Meher PK (2006) An improved SVD-based watermarking technique for image and document authentication. In: APCCAS 2006–2006 IEEE Asia Pacific Conference on Circuits and Systems, Singapore, pp 1984–1987. doi:10.1109/APCCAS.2006.342276

  18. Mohan BC, Kumar SS (2008) A robust image watermarking scheme using singular value decomposition. J Multimed 3(1):7–15

    Article  Google Scholar 

  19. Chung KL, Shen C-H, Chang L-C (2001) A novel SVD-and VQ-based image hiding scheme. Pattern Recogn Lett 22(9):1051–1058

    Article  Google Scholar 

  20. Loukhaoukha K, Chouinard J-Y (2010) Security of ownership watermarking of digital images based on singular value decomposition. J Electron Imaging 19(1):013007-013007-9

    Article  Google Scholar 

  21. Fahmy G, Fahmy M, Mohammed U (2010) Nonblind and quasi blind natural preserve transform watermarking. EURASIP J Adv Signal Process 10(1):1–13

    MATH  Google Scholar 

  22. Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938–944

    Article  Google Scholar 

  23. Hu WC, Chen W-H, Yang C-Y (2012) Robust image watermarking based on discrete wavelet transform-discrete cosine transform-singular value decomposition. J Electron Imaging 21(3):33005

    Article  Google Scholar 

  24. Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal Process 94:545–556

    Article  Google Scholar 

  25. Agarwal R (2015) Block based digital watermarking using singular value decomposition on color images. In: International conference on computing, communication automation (ICCCA), pp 1176–1181

  26. Muhammad N, Bibi N, Mahmood Z, Kim D-G (2015) Blind data hiding technique using the Fresnelet transform. SpringerPlus 4(1):1–15

    Article  Google Scholar 

  27. Xing Y, Tan J (2010) Mistakes in the paper entitled “A singular-value decomposition-based image watermarking using genetic algorithm”. AEU-Int J Electron Commun 64(1):80–81

    Article  Google Scholar 

  28. Tao H, Chongmin L, Zain J, Abdallah N (2014) Robust image watermarking theories and techniques: a review. J Appl Res Technol 12(1):122–138

    Article  Google Scholar 

  29. Zhang XP, Li K (2005) Comments on “An SVD-based watermarking scheme for protecting rightful Ownership. IEEE Trans Multimed 7(3):593–594

    Article  Google Scholar 

  30. Gotsman C, Toledo S (2008) On the computation of null spaces of sparse rectangular matrices. SIAM J Matrix Anal Appl 30(2):445–463

    Article  MathSciNet  Google Scholar 

  31. Poole D (2006) Linear algebra: a modern introduction. Thomson Brooks/Cole, Stamford

    Google Scholar 

  32. Jie Y (2010) Algorithm of image information hiding based on new anti-Arnold transform and Blending in DCT domain. In: 2010 IEEE 12th International Conference on Communication Technology, Nanjing, pp 312–315. doi:10.1109/ICCT.2010.5689227

  33. Grigori L, Gilbert JR, Cosnard M (2008) Symbolic and exact structure prediction for sparse Gaussian elimination with partial pivoting. SIAM J Matrix Anal Appl 30(4):1520–1545

    Article  MathSciNet  Google Scholar 

  34. Guo J-M, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149–1163

    Article  Google Scholar 

  35. Watkins D (2004) Fundamentals of matrix computations. Wiley, New York

    MATH  Google Scholar 

  36. Kundur D, Hatzinakos D (2004) Toward robust logo watermarking using multiresolution image fusion principles. IEEE Trans Multimed 6(1):185–198

    Article  Google Scholar 

  37. Wu HC, Wu N-I, Tsai C-S, Hwang M-S (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEEE Proc Vis Image Signal Process 152(5):611–615

    Article  Google Scholar 

  38. Yassin NI, Salem NM, El Adawy MI (2012) Block based video watermarking scheme using wavelet transform and principle component analysis. Int J Comput Sci Iss 9(1):296–301

    Google Scholar 

  39. Junfeng L, Wenzhan D (2009) Image quality assessment based on the correlation coefficient and the 2-D discrete wavelet transform. pp 789–793

  40. Petitcolas FA, Steinebach M, Raynal F, Dittmann J, Fontaine C, Fatès N (2001) A public automated web-based evaluation service for watermarking schemes: StirMark benchmark. pp 575–584

  41. Aslantas V (2009) An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt Commun 282(5):769–777

    Article  Google Scholar 

  42. Li Z, Liu J, Tang J, Lu H (2015) Robust structured subspace learning for data representation. IEEE Trans Pattern Anal Mach Intell 37(10):2085–2098. doi:10.1109/TPAMI.2015.2400461

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zahid Mahmood.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muhammad, N., Bibi, N., Qasim, I. et al. Digital watermarking using Hall property image decomposition method. Pattern Anal Applic 21, 997–1012 (2018). https://doi.org/10.1007/s10044-017-0613-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-017-0613-z

Keywords

Navigation