Abstract
To enhance the invisibility and the robustness of the watermarking algorithm, a robust and imperceptible watermarking scheme is presented by combining Canny edge detection, contourlet transform with singular value decomposition. The host image is firstly decomposed by the contourlet transform. Then the low frequency sub-band obtained by contourlet transform is partitioned into 4×4 non-overlapping blocks and the singular value decomposition is carried out for the specific blocks selected by the Canny edge detection. Finally, the watermark is embedded into the coefficient of matrix U. The embedded watermark could be recovered blindly in the watermark extraction stage. And the robustness and the imperceptibility are efficiently guaranteed with an optimal threshold k selected by the least-square curve fitting. Experimental results demonstrate that the proposed watermarking scheme is superior in terms of imperceptibility and robustness against common attacks.
Similar content being viewed by others
References
Akhaee MA, Sahraeian SME, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment [J]. IEEE Trans Image Process 19(4):967–980
Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking [J]. Signal Process 66(3):357–372
Bi HB, Li XM, Zhang YB et al (2010) A blind robust watermarking scheme based on CT and SVD [C]. IEEE 10th International Conference on Signal Processing Proceedings. IEEE:881–884
Canny J (1986) A computational approach to edge detection [J]. IEEE Trans Pattern Anal Mach Intell 6:679–698
Chen L, Zhao JY (2018) Contourlet-based image and video watermarking robust to geometric attacks and compressions [J]. Multimed Tools Appl 77(6):7187–7204
Cho H, Sung M, Jun B (2016) Canny text detector: fast and robust scene text localization algorithm [C]. Proc IEEE Conf Comput Vis Pattern Recognit:3566–3573.
Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation [J]. IEEE Trans Image Process 14(12):2091–2106
Ernawan F, Kabir MN (2018) A robust image watermarking technique with an optimal DCT-psychovisual threshold [J]. IEEE Access 6:20464–20480
Etemad S, Amirmazlaghani M (2018) A new multiplicative watermark detector in the contourlet domain using t location-scale distribution [J]. Pattern Recogn 77:99–112
Hu HT, Hsu LY (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics [J]. Multimed Tools Appl 76(5):6575–6594
Kang XG, Huang JW, Shi YQ et al (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression [J]. IEEE Trans Circuits Syst Video Technol 13(8):776–786
Kang XB, Zhao F, Lin GF et al (2018) A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength [J]. Multimed Tools Appl 77(11):13197–13224.A
Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance [J]. Multimed Tools Appl 77(3):3597–3622
Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication [J]. Proc IEEE 87(7):1167–1180
Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm [J]. Digital Signal Process 21(4):522–527
Lang J, Zhang ZG (2014) Blind digital watermarking method in the fractional Fourier transform domain [J]. Opt Lasers Eng 53:112–121
Liu RZ, Tan TN (2002) An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Trans Multimed 4(1):121–128
Liu Y, Tang SY, Liu R et al (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption [J]. Expert Syst Appl 97:95–105
Miyake S, Nakamae K (2016) A quantum watermarking scheme using simple and small-scale quantum circuits [J]. Quantum Inf Process 15(5):1849–1864
Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing [J]. Digital Signal Process 53:11–24
Pereira S, Voloshynoskiy S, Pun T (2001) Optimal transform domain watermark embedding via linear programming [J]. Signal Process 81(6):1251–1260
Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks [J]. AEU-Int J Electron Commun 72:149–161
Sadreazami H, Ahmad MO, Swamy MNS (2015) Multiplicative watermark decoder in contourlet domain using the normal inverse Gaussian distribution [J]. IEEE Trans Multimed 18(2):196–207
Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images [J]. Multimed Tools Appl 76(6):8881–8900
Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection [J]. Multimed Tools Appl 76(11):13001–13024
Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images [J]. Multimed Tools Appl 75(14):8381–8401
Solachidis V, Pitas L (2001) Circularly symmetric watermark embedding in 2-D DFT domain [J]. IEEE Trans Image Process 10(11):1741–1753
Su QT, Chen BJ (2018) Robust color image watermarking technique in the spatial domain [J]. Soft Comput 22(1):91–106
Su QT, Wang G, Lv GH et al (2017) A novel blind color image watermarking based on contourlet transform and Hessenberg decomposition [J]. Multimed Tools Appl 76(6):8781–8801
Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain [J]. Expert Syst Appl 42(21):8184–8197
Xu ZG, Yuan WJ (2017) Watermark BER and channel capacity analysis for QPSK-based RF watermarking by constellation dithering in AWGN channel [J]. IEEE Signal Process Lett 24(7):1068–1072
Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine [J]. Multimed Tools Appl 77(4):4863–4882
Zhou NR, Xiahou WM, Wen RH et al (2018) Imperceptible digital watermarking scheme in multiple transform domains [J]. Multimed Tools Appl 77(23):30251–30267
Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm [J]. Multimed Tools Appl 78(2):2507–2523
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant Nos. 61861029 and 61462061), the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant No. 20162BCB22011), the Natural Science Foundation of Jiangxi Province (Grant No. 2017BAB202002), and the Cultivation Plan of Applied Research of Jiangxi Province (Grant No. 20181BBE58022).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gong, LH., Tian, C., Zou, WP. et al. Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain. Multimed Tools Appl 80, 439–461 (2021). https://doi.org/10.1007/s11042-020-09677-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09677-w