Abstract
An image watermarking scheme in the 2D DCT domain is proposed by exploring the advantages of using Zernike moments. Zernike transform has been used in image processing applications such as image recognition, authentication, protection, etc. Here, we propose to use the Zernike moments of the DCT transform to provide an efficient watermarking method. Particularly, the novelty of the proposed approach relies on the method for selection of features that will enable both preserving the image quality and robustness to attacks. Also, a criterion for selection of image blocks suitable for watermarking is given. It is based on the ℓ 1-norm of Zernike moments. The efficiency of the proposed watermarking algorithm is proved on several examples considering different types of attacks (compression, noise, filtering, geometrical attacks).












Similar content being viewed by others
References
Barni M, Bartolini F (2004) Watermarking systems engineering. Marcel Dekker, Inc., New York
Chen Q, Yang X, Zhao J (2005) Robust image watermarking with Zernike moments. In: Canadian conference on electrical and computer engineering. Saskatoon, SASK, pp 1340—1343
Flusser J, Suk T, Zitová B (2009) Moments and moment invariants in pattern recognition. Wiley
Foo SW, Dong Q (2009) A normalization-based robust watermarking scheme using Zernike moments. World Acad Sci Eng Technol 3(11):1968–1973
Hernandez JR, Amado M, Perez Gonzalez F (2000) DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans Image Process 9(1):55–68
Hwang S-K, Kim W-Y (2006) A novel approach to the fast computation of Zernike moments. Pattern Recogn 39(11):2065–2076
Kim HS, Lee H-K (2003) Invariant image watermark using Zernike moments. IEEE Trans Circuits Syst Video Technol 13(8):766–775
Kotoulas L, Andreadis I (2007) Accurate calculation of image moments. IEEE Trans Image Process 16(8):2028–2037
Liu J, She K, Wu H (2010) Blind Image Watermarking using Dual Embedding Scheme in the Wavelet Transform Domain. J Comput Inf Syst 6(6):1887–1896
Muharemagić E, Furht B (2006) Survey of watermarking techniques and applications. In: Furht B, Kirovski D (eds) Multimedia watermarking techniques and applications. Auerbach Publication, pp 91–130
Nikolaidis A, Pitas I (2003) Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans Image Process 12(5):563–571
Orovic I, Orlandic M, Stankovic S (2014) An image watermarking based on the PDF modeling and quantization effects in the wavelet domain. Multimedia Tools Appl 70(3):1503–1519
Papakostas GA, Boutalis YS, Papaodysseus CN, Fragoulis DK (2006) Numerical error analysis in Zernike moments computation. Image Vis Comput 24(9):960–969
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164
Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978
Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools Appl 74(15):5861–5872
Singhal N, Lee YY, Kim CS, Lee SU (2009) Robust image watermarking using local Zernike moments. J Vis Commun Image Represent 20(6):408–419
Stankovic S, Orovic I, Zaric N, Ioana C (2010) Two dimensional time-frequency analysis based eigenvalue decomposition applied to image watermarking. Multimedia Tools Appl 49(3):529–543
Stankovic S, Orovic I, Chabert M, Mobasseri B (2013) Image watermarking based on the space/spatial-frequency analysis and hermite functions expansion. J Electron Imaging 22(1):013014
Stanković S, Orović I, Sejdić E (2015) Multimedia signals and systems: basic and advance algorithms for signal processing. Springer-Verlag, New York
Tahmasbi A, Fatemeh S, Shahriar SB (2011) Classification of benign and malignant masses based on Zernike moments. Comput Biol Med 41(8):726–735
Tsolis DK, Sioutas S, Papatheodorou TS (2010) A multimedia application for watermarking digital images based on a content based image retrieval technique. Multimed Tools Appl 47(3):581–597
Vincent M, Chabert M, Lacaze B (2005) A spread spectrum watermarking scheme based on periodic clock changes for digital images. In: Proceedings of information hiding, vol 3727, pp 91–105
Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensics Secur 6(4):1223–1232
Acknowledgments
This work is supported by the Montenegrin Ministry of Science, project grant funded by the World Bank loan: CS-ICT “New ICT Compressive sensing based trends applied to: multimedia, biomedicine and communications”.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lutovac, B., Daković, M., Stanković, S. et al. An algorithm for robust image watermarking based on the DCT and Zernike moments. Multimed Tools Appl 76, 23333–23352 (2017). https://doi.org/10.1007/s11042-016-4127-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4127-2