Abstract
To improve the security, robustness and imperceptibility of watermark schemes, a novel watermark scheme is devised by fusing multiple watermark techniques, including lifting wavelet transform, discrete cosine transform, discrete fractional angular transform and singular value decomposition. To solve the false positive problem in various SVD-based watermark schemes, transform domain encryption is utilized and the embedding component of watermark instead of the whole watermark is embedded into the host image. Furthermore, the particle swarm optimization algorithm is used to optimize the scaling factors and the parameter of the improved discrete fractional angular transform. The proposed watermark scheme is tested by several attacks, such as JPEG compression, low-pass filtering, Histogram equalization, contrast enhance, and etc. Simulation results demonstrate that the proposed watermark scheme is superior in the aspects of security, robustness and imperceptibility.
Similar content being viewed by others
References
Abdallah EE, Hamza AB, Bhattacharya P (2007) Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms [J]. J Electronic Imaging 16(3):033020
Bhatnagar G, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme [J]. Comput Secur 31(1):40–58
Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M et al (2015) Robust watermarking method in DFT domain for effective management of medical imaging [J]. Signal, Image and Video Process 9(5):1163–1178
Chen B, Yang Z, Huang S, et al. (2017) Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles [C]. IEEE International Performance Computing and Communications Conference, p 1–6
Ding M, Fan G (2015) Multilayer joint gait-pose manifolds for human gait motion modeling [J]. IEEE Trans Cybern 45(11):1–8
Ding M, Fan G (2015) Articulated and generalized Gaussian kernel correlation for human pose estimation [J]. IEEE Trans Image Process 25(2):776–789
Esgandari R, Khalili M (2015) A robust image watermarking scheme based on discrete wavelet transforms [C]. 2015 2nd IEEE International Conference on Knowledge-Based Engineering and Innovation, p 988–992
Guo J, Liu Z, Liu S (2007) Watermarking based on discrete fractional random transform [J]. Opt Commun 272(2):344–348
Hu H-T, Hsu L (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics [J]. Multimed Tools Appl 76(5):6575–6594
Jain C, Arora S, Panigrahi PK (2008) A reliable SVD based watermarking scheme [J]. arXiv preprint arXiv: 0808.0309
Kakarala R, Ogunbona PO (2001) Signal analysis using a multiresolution form of the singular value decomposition [J]. IEEE Trans Image Process 10(5):724–735
Kazemivash B, Moghaddam ME (2017) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm [J]. Multimed Tools Appl 76(20):20499–20524
Keshavarzian R, Aghagolzadeh A (2016) ROI based robust and secure image watermarking using DWT and Arnold map [J]. AEU Int J Electron Commun 70(3):278–288
Lai C, Tsai C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition [J]. IEEE Trans Instrum Meas 59(11):3060–3063
Li J, Huang M, Du W, Chen Y (2012) Multiple watermarks for medical image based on DWT-DFT [C]. 2012 7th International Conference on Computing and Convergence Technology, IEEE, p 257–260
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform [J]. Multimed Tools Appl 76(20):20739–20753
Liu Z (2008) Robustness analysis of image watermarking based on discrete fractional random transform [J]. Opt Eng 47(5):057003
Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Trans Multimedia 4(1):121–128
Liu Z, Ahmad MA, Liu S (2008) A discrete fractional angular transform [J]. Opt Commun 281(6):1424–1429
Liu J, Wen X, Yuan L et al (2017) A robust approach of watermarking in contourlet domain based on probabilistic neural network [J]. Multimed Tools Appl 76(22):24009–24026
Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding [J]. IET Image Process 11(10):815–821
Loukhaoukha K, Chouinard J, Taieb MH (2011) Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization [J]. J Inform Hiding and Multimedia Signal Process 2(4):303–319
Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics [J]. IET Image Process 10(1):34–52
Run R, Horng S, Lai J et al (2012) An improved SVD-based watermarking technique for copyright protection [J]. Expert Syst Appl 39(1):673–689
Singh AK (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images [J]. Multimed Tools Appl 76(6):8881–8900
Singh P, Agarwal S (2013) A hybrid DCT-SVD based robust watermarking scheme for copyright protection [C]. AFRICON, 2013. IEEE, p 1–5
Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection [J]. Multimed Tools Appl 76(11):13001–13024
Singh AK, Dave M, Mohan A (2013) A hybrid algorithm for image watermarking against signal processing attacks [C]. International Workshop on Multi-disciplinary Trends in Artificial Intelligence. Springer, Berlin, Heidelberg, p 235–246
Su Q, Niu Y, Zhao Y et al (2013) A dual color images watermarking scheme based on the optimized compensation of singular value decomposition [J]. AEU Int J Electron Commun 67(8):652–664
Su Q, Wang G, Jia S et al (2015) Embedding color image watermark in color image based on two-level DCT [J]. Signal, Image and Video Process 9(5):991–1007
Sweldens W (1998) The lifting scheme: a construction of second generation wavelets [J]. SIAM J Math Anal 29(2):511–546
Tsai P, Hu Y, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting [J]. Signal Process 89(6):1129–1143
Wang C, Yang H, Meinel C (2015) Deep semantic mapping for cross-modal retrieval [C]. 2015 IEEE 27th International Conference on Tools with Artificial Intelligence, IEEE, p 234–241
Wang C, Yang H, Meinel C (2016) A deep semantic framework for multimodal representation learning [J]. Multimed Tools Appl 75(15):9255–9276
Wang C, Yang H, Bartz C (2016) Image captioning with deep bidirectional LSTMs [C]. Proceedings of the 2016 ACM on Multimedia Conference. ACM, p 988–997
Xie X, Liu S, Yang C, et al (2017) The application of smart materials in tactile actuators for tactile information delivery [J]. arXiv preprint arXiv:1708.07077
Ye X, Chen X, Deng M, et al (2014) A multiple-level DCT based robust DWT-SVD watermark method [C]. 2014 IEEE Tenth International Conference on Computational Intelligence and Security, p 479–483
Yu J, Li Y, Xie X, et al (2017) Image encryption algorithm by using the logistic map and discrete fractional angular transform [J]. Opt Appl 47(1):141–155
Zhang X, Li K (2005) Comments on" an SVD-based watermarking scheme for protecting rightful ownership" [J]. IEEE Trans Multimed 7(3):593–594
Zhang Z, Wang C, Zhou X (2016) Image watermarking scheme based on Arnold transform and DWT-DCT-SVD [C]. 2016 13th IEEE International Conference on Signal Processing, p 805–810
Acknowledgements
This work is supported by the National Natural Science Foundation of China (Grant Nos. 61462061 and 61561033), the China Scholarship Council (Grant No. 201606825042), the Department of Human Resources and Social Security of Jiangxi Province, the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant No. 20162BCB22011), and the Natural Science Foundation of Jiangxi Province (Grant No. 20171BAB202002).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhou, N.R., Luo, A.W. & Zou, W.P. Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78, 2507–2523 (2019). https://doi.org/10.1007/s11042-018-6322-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6322-9