Skip to main content
Log in

Image watermarking in real oriented wavelet transform domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose blind and non-blind watermarking schemes in the real oriented wavelet transform (ROWT) domain. The ROWT, which is a member of the dual tree complex wavelet transform (DTCWT) family, is chosen as a watermarking domain since the DTCWT has recently emerged as an important new image processing tool. Existing watermarking schemes based on the DTCWT usually lack high embedding capacity. This is mainly due to the fact that the left inverse and the right inverse of the DTCWT (including the ROWT) are not equal. We have observed a relation when the ROWT follows its left inverse, and have used this relation to develop two watermarking schemes in the ROWT domain. Experimental results show that the proposed ROWT based watermarking schemes not only have a much higher capacity than the existing DTCWT based watermarking schemes, but are also robust to various image modification operations such as cropping, Gaussian filter, Gaussian noise, and salt and pepper noise.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29

Similar content being viewed by others

References

  1. Agarwal H, Raman B, Venkat I (2014) Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimedia Tools and Applications. doi:10.1007/s11042-014-1934-1

  2. Bhatnagar G, Raman B (2011) A new robust reference logo watermarking scheme. Multimedia Tools and Applications 52(2–3):621–640

    Article  Google Scholar 

  3. Bhatnagar G, Wu QJ (2013) Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Futur Gener Comput Syst 29(1):182–195

    Article  MathSciNet  Google Scholar 

  4. Coria LE, Pickering MR, Nasiopoulos P, Ward RK (2008) A video watermarking scheme based on the dual-tree complex wavelet transform. IEEE Transactions on Information Forensics and Security 3(3):466–474

    Article  Google Scholar 

  5. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco

    Google Scholar 

  6. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  7. Fallahpour M (2011) High capacity audio watermarking using the high frequency band of the wavelet domain. Multimedia tools and Applications 52(2–3):485–498

    Article  Google Scholar 

  8. Gonde AB, Maheshwari RP Balasubramanian R (2010) Complex wavelet transform with vocabulary tree for content based image retrieval. In: Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing, ACM, Chennai

  9. Gonzalez RC, Woods RE (2008) Digital Image Processing. Prentice Hall

  10. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441

    Article  Google Scholar 

  11. Jain AK, Uludag U (2003) Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11):1494–1498

    Article  Google Scholar 

  12. Khana A, Malika SA, Alib A, Chamlawia R, Hussaina M, Mahmoodc MT, Usmand I (2012) Intelligent reversible watermarking and authentication: Hiding depth map information for 3d cameras. Elsevier, Inf Sci 216:155–175

    Article  Google Scholar 

  13. Kim WG, Lee HK (2009) Multimodal biometric image watermarking using two-stage integrity verification. Sig Process 89(12):2385–2399

    Article  MATH  Google Scholar 

  14. Kokare M, Biswas PK, Chatterji BN (2005) Texture image retrieval using new rotated complex wavelet filters. IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics 35(6):1168–1178

    Article  Google Scholar 

  15. Kokare M, Biswas PK, Chatterji BN (2006) Rotation-invariant texture image retrieval using rotated complex wavelet filters. IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics 36(6):1273–1282

    Article  Google Scholar 

  16. Korus P, Białas J, Dziech A (2012) A new approach to high-capacity annotation watermarking based on digital fountain codes. Multimedia Tools and Applications: 1–19

  17. Kumar S, Kumar S, Raman B, Sukavanam N (2013) Image disparity estimation based on fractional dual-tree complex wavelet transform: A multi-scale approach. International Journal of Wavelets. Multiresolution and Information Processing 11(1):1350,004,1–1350,004,21

    MathSciNet  Google Scholar 

  18. Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proceedings of IEEE 87(7):1167–1179

    Article  Google Scholar 

  19. Kundur D, Hatzinakos D (2004) Toward robust logo watermarking using multiresolution image fusion principles. IEEE Trans Multimed 6(1):185–198

    Article  Google Scholar 

  20. Li CT, Yang FM, Lee CS (2002) Oblivious fragile watermarking scheme for image authentication. IEEE International Conference on Acoustics, Speech, and Signal Processing 4:IV–3445 – IV–3448

    Google Scholar 

  21. Lina TC, Linb CM (2009) Wavelet-based copyright-protection scheme for digital images based on local features. Elsevier, Inf Sci 179(19):3349–3358

    Article  Google Scholar 

  22. Loo P, Kingsbury NG (2000) Digital watermarking using complex wavelets. In: International Conference Image Processing, IEEE, Vancouver, vol 3

  23. Ma B, Wang Y, Li C, Zhang Z, Huang D (2013) Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking. Multimedia Tools and Applications. doi: 10.1007/s11042-013-1372-5

  24. Magarey J, Kingsbury NG (1998) Motion estimation using a complex-valued wavelet transform. IEEE Transactions on Signal Processing 46(4):1069–1084

    Article  MathSciNet  Google Scholar 

  25. Mallat SG (1989) A theory for multiresolution signal decomposition: The wavelet representation. IEEE Transactions on Pattern Analysis and Machine Intelligence 2(7):674–693

    Article  Google Scholar 

  26. Miller M, Kingsbury N, Hobbs R (2005) Seismic imaging using complex wavelets. In: Proceeding of International Conference on Acoustic, Speech, Signal Processing (ICASSP), IEEE, Philadelphia, vol 2

  27. Mohanty SP (2009) A secure digital camera architecture for integrated real-time digital rights management. J Syst Archit 55(10):468–480

    Article  Google Scholar 

  28. Mohanty SP, Ramakrishnan KR, Kankanhalli MS (2000) A dct domain visible watermarking technique for images. IEEE International Conference on Multimedia and Expo 2:1029–1032

    Article  Google Scholar 

  29. Ramkumar M, Akansu AN (1998) Information theortic bounds for data hiding in compressed images. In: IEEE Second Workshop on Multimedia Signal Processing

  30. Rani A, Raman B, Kumar S (2013) A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimedia Tools and Applications: 1–24

  31. Romberg J, Choi H, Baraniuk R, Kingsbury N (2000) Multiscale classification using complex wavelets and hidden markov tree models. In: Proceeding International Conference Image Processing, Vancouver, vol 2

  32. Selesnick I (2014) 2-d dual-tree wavelet transform. http://eeweb.poly.edu/iselesni/WaveletSoftware/dt2D.html, last accessed on April, 2014

  33. Selesnick IW, Baraniuk RG, Kingsbury NG (2005) The dual-tree complex wavelet transform. IEEE Signal Procesing Magazine: 123–151

  34. Shaffrey CW, Kingsbury NG, Jermyn IH (2002) Unsupervised image segmentation via markov trees and complex wavelets. In: Proceedings of Internationl Conference on ImageProcessing, IEEE, Rochester, vol 3

  35. Shia X, Xiaoa D (2013) A reversible watermarking authentication scheme for wireless sensor networks. Elsevier, Inform Sci 240:173–183

    Article  Google Scholar 

  36. Skodras A, Christopoulos C, Ebrahimi T (2001) The jpeg 2000 still image compression standard. IEEE Signal Procesing Magazine: 36–58

  37. Suhail M, Obaidat M, Ipson S, Sadoun B (2003) A comparative study of digital watermarking in jpeg and jpeg 2000 environments. Elsevier, Inform Sci 15:93–105

    Article  Google Scholar 

  38. Tang CW, Hang HM (2003) A feature-based robust digital image watermarking scheme. IEEE Transactions on Signal Processing 51(4):950–959

    Article  MathSciNet  Google Scholar 

  39. Terzija N, Geisselhardt W (2004) Digital image watermarking using complex wavelet transform. In: Proceeding Workshop Multimedia Security, ACM, Magdeburg

  40. Wallace GK (1992) The jpeg still picture compression standard. IEEE Trans Consum Electron 38(1):18–34

    Article  Google Scholar 

  41. Wang N, Men C (2013) Reversible fragile watermarking for locating tampered blocks in 2d vector maps. Multimedia Tools and Applications 67(3):709–739

    Article  MathSciNet  Google Scholar 

  42. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

  43. Yang H, Jiang X, Kot AC (2011) Embedding binary watermarks in dual-tree complex wavelets domain for access control of digital images. Springer, Transactions on DHMS 6:18–36

    Google Scholar 

  44. Ye Z, Lu CC (2003) A complex wavelet domain markov model for image denoising. In: Proceedings of International Conference on Image Processing, IEEE, Barcelona, vol 3

Download references

Acknowledgment

One of the authors, Himanshu Agarwal, acknowledges the University Grants Commission (UGC) of New Delhi, India for granting him a scholarship under the JRF scheme for his research. He also acknowledges the grant from the Canadian Bureau for International Education under the Canadian Commonwealth Scholarship Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himanshu Agarwal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Agarwal, H., Atrey, P.K. & Raman, B. Image watermarking in real oriented wavelet transform domain. Multimed Tools Appl 74, 10883–10921 (2015). https://doi.org/10.1007/s11042-014-2212-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2212-y

Keywords

Navigation