Skip to main content
Log in

Novel robust multiple watermarking against regional attacks of digital images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a novel robust multiple watermarking method for regional attacks of digital images. The core idea of the proposed method is to divide the host image into 4 × 4 non-overlapping regions and embed the watermark image into these regions repeatedly. First, the binary watermark image is scrambled by Arnold transform and divided into four equal parts. Then, the variance and mean value information of each 8 × 8 size block in the host image is used as side information, and each part of the scrambled watermark is embedded in the particular four regions of the host image. In the watermark extraction process, each part of the scrambled watermark image is divided into four equal sub-parts further. The similarity between the sub-part of the scrambled watermark and each extracted watermark segment corresponding to this sub-part is used as side information to search the final extracted watermark segment. For ensuring the visual quality of the watermarked image, the watermark embedding quantization steps are selected by combining Human Visual System (HVS) and Particle Swarm Optimization (PSO). Moreover, a novel watermark quality evaluating measurement, called Weighted Normalized Correlation (WNC), is proposed. Experimental results demonstrate good visual imperceptibility and robustness of the proposed method against traditional regional attacks, accidental attacks and joint attacks, which are performed by Stirmark or Adobe Photoshop CS5.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Ahmed N, Al-Gindy, Ahmad HA (2007). A new blind image watermarking of handwritten signatures using low-frequency band DCT coefficients. IEEE International Conference on Signal Processing and Communications.

  2. Amirgholipour SDK, Nilchi AR (2009) Robust digital image watermarking based on joint DWT-DCT. International Journal of Digital Content Technology and its Applications; 3(2):42–54

    Google Scholar 

  3. An LL, Gao XB, Yuan Y, Tao DC, Deng C, Ji F (2012) Content-adaptive reliable robust lossless data embedding. Neurocomputing 79(3):1–11

    Google Scholar 

  4. Aslantas V (2008) A singular-value decomposition-based image watermarking using genetic algorithm. AEU - International Journal of Electronics and Communications 62(5):386–394

    Article  Google Scholar 

  5. Banitalebi A, Banitalebi M (2012). An optimization technique based on structural similarity thresholding for digital watermarking, Submitted to International Arab Journal of Information Technology, IAJIT

  6. Bei YL, Yang DY, Liu MX, Zhu LL (2011) A multi-channel watermarking scheme based on HVS and DCT-DWT. IEEE International Conference on Computer Science and Automation Engineering (CSAE), 2011; 4(16):305–308

    Google Scholar 

  7. Benhocine A, Laouamer L, Nana L, Pascu AC (2013) New images watermarking scheme based on singular value decomposition. Journal of Information Hiding and Multimedia Signal Processing 4(1):9–18

    Google Scholar 

  8. Chang CC, Tsai PY, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577–1586

    Article  Google Scholar 

  9. Chen XQ, Zhang JH (2012) Clustering algorithm based on improved particle swarm optimization. Journal of Computer Research and Development 49(Suppl):287–291

    Google Scholar 

  10. Chua KK (2011) Development and analysis of spatial domain and transform domain watermarking technique. Final Year Project, UTAR

    Google Scholar 

  11. Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan-Kaufmann, San Francisco

    Google Scholar 

  12. Dehkordi, Banitalebi A (2011). Robust LSB watermarking optimized for local structural similarity. 19th Iranian Conference on Electrical Engineering (ICEE); Pages: 1-6

  13. Fabien AP, Petitcolas (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17(5):58–64

    Article  Google Scholar 

  14. Gonzalez RC, Woods RE (1998). Bluetooth – The universal radio interface for ad hoc wireless connectivity. The Telecommunications Technology Journal No. 3

  15. Huang HC, Chu CM, Pan JS (2009) The optimized copyright protection system with genetic watermarking. Soft Comput 13(4):333–343

    Article  Google Scholar 

  16. Jin C, Jin SW (2010) Image watermark algorithm for copyright protection based on human visual system. International Conference of Information Science and Management Engineering (ISME) 01:64–67

    Google Scholar 

  17. Jutta H, ammerle-Uhl, Christian K, and Andreas U (2011). Multiple blind re-watermarking with quantization-based embedding. 18th IEEE International Conference on Image Processing 2011; Pages: 265-268

  18. Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Processing 21(4):522–527

    Article  Google Scholar 

  19. Latif A (2013) An adaptive digital image watermarking scheme using fuzzy logic and Tabu Search. Journal of Information Hiding and Multimedia Signal Processing 4(4):250–271

    Google Scholar 

  20. Lian S, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Informatica, Slovenian Society Information 33(1):3–24

    MathSciNet  Google Scholar 

  21. Ling HC, W. Phan RC, Heng SH (2012) On the security of digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing 3(2):135–141

    Google Scholar 

  22. Liu YN, Wang G, Chen HL, Dong H, Zhu XD, Wang SJ (2011) An improved particle swarm optimization for feature selection. Journal of Bionic Engineering 8(2):191–200

    Article  Google Scholar 

  23. Lu W, Sun W, Lu HT (2009) Robust watermarking based on DWT and nonnegative matrix factorization. Journal Computers and Electrical Engineering 35(1):183–188

    Article  MATH  MathSciNet  Google Scholar 

  24. Lubin J, Bloom JA, Cheng H (2003) Robust, content-dependent, high-fidelity watermark for tracking in. digital cinema. Proc SPIE 5020:536–545

    Article  Google Scholar 

  25. Mintzer F, Braudaway GW (1999) If one watermark is good, are more better? In Proceedings of the 1999. International Conference on Acoustics, Speech and Signal Processing (ICASSP’99), Phoenix, AZ, USA 4:2067–2070

    Google Scholar 

  26. Namazi F, Karami MR, Ramazannia SB (2012) Block-based Adaptive Image Watermarking Scheme using Visual Perception Model in DCT Domain. International Journal of Computer Applications 41(4):41–45

    Article  Google Scholar 

  27. Nasir I, Weng Y, Jiang JM, Ipson S (2010) Multiple spatial watermarking technique in color images. SIViP 4(2):145–154

    Article  MATH  Google Scholar 

  28. Nicholas PS, Reihaneh SN, and Philip O (2001). On multiple watermarking. In proceedings of the 9th ACM Multimedia 2001 Conference, Ottawa, Ontario, Canada, Sept, pp. 3–6

  29. Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689

    Article  Google Scholar 

  30. Run RS, Horng SJ, Lin WH, Kao TW, Fan PZ, Khan MK (2011) An efficient wavelet-tree-based watermarking method. Expert Syst Appl 38(12):14357–14366

    Article  Google Scholar 

  31. Sheikh HR, Bovic AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–44

    Article  Google Scholar 

  32. Shena JJ, Ren JM (2010) A robust associative watermarking technique based on vector quantization. Digital Signal Processing 20(5):1408–1423

    Article  Google Scholar 

  33. Shi YH (1998) A modified particle swarm optimizer. Evolutionary Computation Proceedings. IEEE World Congress on, Computational Intelligence, pp 69–73

    Google Scholar 

  34. Shieh CS, Huang HC, Wang FH, Pan JS (2003) An embedding algorithm for multiple watermarks. J Inf Sci Eng 19(2):381–395

    Google Scholar 

  35. Shieh CS, Huang HC, Wang FH, Pan JS (2004) Genetic watermarking based on transform-domain techniques. Pattern Recogn 37(3):555–565

    Article  Google Scholar 

  36. Unler A, Murat A (2010) A discrete particle swarm optimization method for feature selection in binary classification problems. Eur J Oper Res 206(3):528–539

    Article  MATH  Google Scholar 

  37. Wang Z (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  38. Wang YL (2011) Emerald Article: Robust watermarking in wavelet domain based on chaotic. Sens Rev 31(4):349–357

    Article  Google Scholar 

  39. Wang Z and Bovik AC (2009). Mean squared error: love it or leave it? IEEE Signal Processing Magazine

  40. Wang XY, Niu PP, Meng L, Yang HY (2011) A robust content based image watermarking using local invariant histogram. Multimedia Tools and Applications; 54(2):341–363

    Article  MATH  Google Scholar 

  41. Weng S, Chu SC, Cai N, Zhan R (2013) Invariability of mean value based reversible watermarking. Journal of Information Hiding and Multimedia Signal Processing 4(2):90–98

    Google Scholar 

  42. Wu WC, Ren GR (2011). A DCT-based robust image watermarking using local moment. 2011 3rd International Conference on Data Mining and Intelligent Information Technology Applications (ICMiA); Page(s): 122 – 126

  43. Xi ML, Sun J, Xu WB (2008) An improved quantum-behaved particle swarm optimization algorithm with weighted mean best position. Appl Math Comput 205(12):751–759

    Article  MATH  Google Scholar 

  44. Xu N (2011) A multi-bit digital watermarking algorithm with side information. International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT) 6:3058–3061, Harbin, Heilongjiang, China

    Article  Google Scholar 

  45. Zhan ZH, Zhang J, Li Y (2009) Adaptive particle swarm optimization. IEEE Transactions on Systems Man and Cybernetics 39(6):1362–1381

    Article  MathSciNet  Google Scholar 

  46. Zhu SM, Liu JM (2009) A novel adaptive watermarking scheme based on human visual system and particle swarm optimization. Information Security Practice and Experience. Lecture Notes in Computer Science Volume 5451(2009):136–146

    Article  Google Scholar 

Download references

Acknowledgments

This research is supported by National Natural Science Foundation of China under Grant No. 60971089 and National Electronic Development Foundation of China under Grant No. 2009537.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaodong Zhu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, Y., Wang, Y. & Zhu, X. Novel robust multiple watermarking against regional attacks of digital images. Multimed Tools Appl 74, 4765–4787 (2015). https://doi.org/10.1007/s11042-013-1838-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1838-5

Keywords

Navigation