Skip to main content
Log in

Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Watermarking is a tool to embed information in the image to provide authentication, copyrights protection, copy control, etc. Some watermarking techniques are robust to intentional /unintentional attacks on the watermarked image. In this study, we propose a robust watermarking approach that can resist geometrical attacks. The proposed technique exploits both the robust image feature points and local Zernike moments for embedding the information. Delaunay tessellation is employed to divide image into distinct triangular segments based on robust features. These features are identified using Harris detector. Zernike moments are calculated for each selected triangular segment, and then the watermark is embedded in the magnitude of Zernike moments using dither modulation. It can be observed from the experimental results that by using proposed approach, the watermark can be detected even in the presence of geometrical distortion, i.e. rotation, cropping, and scaling, and JPEG compression attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Bas P, Chassery J-M, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Trans Image Process 11:1014–28. doi:10.1109/TIP.2002.801587

    Article  Google Scholar 

  2. Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36:578–584

    Article  MATH  Google Scholar 

  3. Cox IJ, Miller ML, Bloom JA et al (2008) Digital watermarking and steganography, 2nd ed. Morgan Kaufmann

  4. Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain usinginter-block coefficient correlation. Int J Electron Commun 68:244–253

    Article  Google Scholar 

  5. Kodak Lossless True Color Image Suite. http://r0k.us/graphics/kodak/

  6. Lee H-Y, Lee C, Lee H-K (2007) Geometrically invariant watermarking: synchronization through circular Hough transform. Multimed Tools Appl 34:337–353. doi:10.1007/s11042-007-0112-0

    Article  Google Scholar 

  7. Lee DT, Schachter BJ (1980) Two algorithms for constructing a Delaunay triangulation. Int J Comput Inf Sci 9:219–242

    Article  MathSciNet  MATH  Google Scholar 

  8. Lian S, Chen X, Wang J (2010) Content distribution and copyright authentication based on combined indexing and watermarking. Multimed Tools Appl 57:49–66. doi:10.1007/s11042-010-0521-3

    Article  Google Scholar 

  9. Lin S, Costello D (2004) Error control coding. Prentice Hall

  10. Lu W, Sun W, Lu H (2011) Novel robust image watermarking based on subsampling and DWT. Multimed Tools Appl 60:31–46. doi:10.1007/s11042-011-0794-1

    Article  Google Scholar 

  11. Luo H, Sun X, Yang H, Xia Z (2011) A robust image watermarking based on image restoration using SIFT. Radio Eng 20:525–532

    Google Scholar 

  12. Mair E, Hager GD, Burschka D et al (2010) Adaptive and generic corner detection based on the accelerated segment test. Comput Vis – ECCV 6312:183–196

    Google Scholar 

  13. Schmidt A, Kraft M, Kasinski A (2010) An evaluation of image feature detectors and descriptors for robot navigation. In: Comput. Vis. Graph. Springer, Berlin

    Book  Google Scholar 

  14. Seo JS, Yoo CD (2006) Image watermarking based on invariant regions of scale-space representation. IEEE Trans Signal Process 54:218–238

    Google Scholar 

  15. Singhal N, Lee Y, Kim C, Lee S (2009) Robust image watermarking using local Zernike moments. J Vis Commun Image Represent 20:408–419. doi:10.1016/j.jvcir.2009.04.002

    Article  Google Scholar 

  16. Tang C-W, Hang H-M (2003) A feature-based robust digital image watermarking scheme. IEEE Trans Signal Process 51:950–959

    Article  MathSciNet  Google Scholar 

  17. Tao H, Chongmin L, Zain JM, Abdalla AN (2014) Robust image watermarking theories and techniques: a review. J Appl Res Technol 12:122–138

    Article  Google Scholar 

  18. Usman I, Khan A (2010) BCH coding and intelligent watermark embedding: employing both frequency and strength selection. Appl Soft Comput 10:332–343

    Article  Google Scholar 

  19. Wang X-Y, Yang Y-P, Yang H-Y (2010) Invariant image watermarking using multi-scale Harris detector and wavelet moments. Comput Electr Eng 36:31–44

    Article  MATH  Google Scholar 

  20. Xin Y, Liao S, Pawlak M (2004) A multibit geometrically robust image watermark based on Zernike moments. In: IEEE Int. Conf. Pattern Recognit. pp 218–238

  21. Zhou J, Pang M (2010) Digital watermark for printed materials. In: IEEE Int. Conf. Netw. Infrastruct. Digit. Content. pp 758–762

Download references

Acknowledgments

This work is supported by Higher Education Commission, Pakistan under NRPU Research Grant No. 20-1624/R&D/10/4603.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asifullah Khan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Munib, S., Khan, A. Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding. Multimed Tools Appl 76, 8695–8710 (2017). https://doi.org/10.1007/s11042-016-3485-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3485-0

Keywords

Navigation