Skip to main content
Log in

A geometrical attack resistant image watermarking algorithm based on histogram modification

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

In order to avoid geometric distortions in watermark embedding, a geometrical attack resistant image watermarking algorithm is proposed based on histogram modification. The watermark information is embedded into the host image by modifying the number of the gray samples of the image histogram. In a fixed gray range, every three consecutive bins are divided into a group for embedding one-bit watermark, through modifying the sample value of a bin to another of the adjacent bin to realize the watermark insertion. Moreover, to avoid duplicate modification and improve the transparency, only one bin is modified every two neighbor bins, the modified histogram is mapped into the watermarked image. For watermark detection, it is in fact an inverse process of watermark embedding. Watermark is extracted through calculating and judging the relationship of the number of samples of the three successive bins. The experimental results show that the algorithm is robust to both geometrical attacks and those conventional signal processing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Ali, H. A., & Khamis, S. A. K. (2012). Robust digital image watermarking technique based on histogram analysis. World of Computer Science and Information Technology Journal, 2(5), 163–168.

    Google Scholar 

  • Cao, J., & Huang, J. (2012). Controllable secure watermarking technique for tradeoff between robustness and security. IEEE Transactions on Information Forensics and Security, 7(2), 821–826.

    Article  Google Scholar 

  • Chen, M., Chen, Z., Zeng, X., & Xiong, Z. (2010). Model order selection in reversible image watermarking. IEEE Journal of Selected Topics in Signal Processing, 4(3), 592–604.

    Article  Google Scholar 

  • Coltuc, D. (2012). Low distortion transform for reversible watermarking. IEEE Transactions on Image Processing, 21(1), 412–417.

    Article  MathSciNet  Google Scholar 

  • Gao, X., Deng, C., Li, X., & Tao, D. (2010). Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Transactions on Systems, Man, and Cybernetica—Part C: Applications and Reviews, 40(3), 278–286.

    Article  Google Scholar 

  • Kang, X., Huang, J., Shi, Y. Q., & Lin, Y. (2003). A DWT–DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 776–786.

    Article  Google Scholar 

  • Lee, Y., & Kim, J. (2012). Histogram rotation-based image watermarking with reversibility. International Journal of Security and Its Applications, 6(2), 197–201.

    Google Scholar 

  • Lin, C.-Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., & Lui, Y. M. (2001). Rotation, scale, and translation resilient public watermarking for images. IEEE Transactions on Image Processing, 10(5), 767–782.

    Article  MATH  Google Scholar 

  • Lu, C.-S., Sun, S.-W., & Chang, P.-C. (2005). Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. In Proceedings of SPIE-IS &T electronic image SPIE5681, pp. 147–163.

  • Martinez-Noriega, R., & Nakano, M. (2011). High payload audio watermarking: toward channel characterization of MP3 compression. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 91–107.

    Google Scholar 

  • Pal, K., Ghosh, G., & Bhattacharya, M. (2012). Reversible digital image watermarking scheme using bit replacement and majority algorithm technique. Journal of Intelligent Learning Systems and Applications, 2012(4), 199–206.

    Article  Google Scholar 

  • Pun, C.-M., & Yuan, X.-C. (2010a). Geometric invariant digital image watermarking scheme based on histogram in DWT domain. Journal of Multimedia, 5(5), 434–442.

    Article  Google Scholar 

  • Pun, C.-M., & Yuan, X.-C. (2010b). Robust and geometric invariant watermarking scheme using block and gray-level histograms. International Journal of Digital Content Technology and its Applications, 4(3), 171–183.

    Article  Google Scholar 

  • Ramanjaneyulu, K., & Rajarajeswari, K. (2012). Wavelet-based oblivious image watermarking scheme using genetic algorithm. IET Image Processing, 6(2), 364–373.

    Article  MathSciNet  Google Scholar 

  • Surekha, B., & Swamy, G. N. (2013). Sensitive digital image watermarking for copyright protection. International Journal of Network Security, 15(1), 95–103.

    Google Scholar 

  • Xiang, S., Kim, H. J., & Huang, J. (2008a). Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Transactions on Circuits and Systems for Video Technology, 18(6), 777–790.

    Article  Google Scholar 

  • Xiang, S., Kim, H. J., & Huang, J. (2008b). Audio watermarking robust against time-scale modification and MP3 compression. Signal Processing, 88(10), 2372–2387.

    Article  MATH  Google Scholar 

  • Zaghloul, R. I., & Al-Rawashdeh, E. F. (2008). HSV image watermarking scheme based on visual cryptography. World Academy of Science, Engineering and Technology, 44, 482–485.

    Google Scholar 

  • Zhang, X., Wang, S., Qian, Z., & Feng, G. (2011). Reference sharing mechanism for watermark self-embedding. IEEE Transactions on Image Processing, 20(2), 485–495.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuansen He.

Rights and permissions

Reprints and permissions

About this article

Cite this article

He, X., Zhu, T. & Yang, G. A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidim Syst Sign Process 26, 291–306 (2015). https://doi.org/10.1007/s11045-013-0257-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-013-0257-0

Keywords

Navigation