Abstract
In order to avoid geometric distortions in watermark embedding, a geometrical attack resistant image watermarking algorithm is proposed based on histogram modification. The watermark information is embedded into the host image by modifying the number of the gray samples of the image histogram. In a fixed gray range, every three consecutive bins are divided into a group for embedding one-bit watermark, through modifying the sample value of a bin to another of the adjacent bin to realize the watermark insertion. Moreover, to avoid duplicate modification and improve the transparency, only one bin is modified every two neighbor bins, the modified histogram is mapped into the watermarked image. For watermark detection, it is in fact an inverse process of watermark embedding. Watermark is extracted through calculating and judging the relationship of the number of samples of the three successive bins. The experimental results show that the algorithm is robust to both geometrical attacks and those conventional signal processing attacks.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ali, H. A., & Khamis, S. A. K. (2012). Robust digital image watermarking technique based on histogram analysis. World of Computer Science and Information Technology Journal, 2(5), 163–168.
Cao, J., & Huang, J. (2012). Controllable secure watermarking technique for tradeoff between robustness and security. IEEE Transactions on Information Forensics and Security, 7(2), 821–826.
Chen, M., Chen, Z., Zeng, X., & Xiong, Z. (2010). Model order selection in reversible image watermarking. IEEE Journal of Selected Topics in Signal Processing, 4(3), 592–604.
Coltuc, D. (2012). Low distortion transform for reversible watermarking. IEEE Transactions on Image Processing, 21(1), 412–417.
Gao, X., Deng, C., Li, X., & Tao, D. (2010). Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Transactions on Systems, Man, and Cybernetica—Part C: Applications and Reviews, 40(3), 278–286.
Kang, X., Huang, J., Shi, Y. Q., & Lin, Y. (2003). A DWT–DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 776–786.
Lee, Y., & Kim, J. (2012). Histogram rotation-based image watermarking with reversibility. International Journal of Security and Its Applications, 6(2), 197–201.
Lin, C.-Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., & Lui, Y. M. (2001). Rotation, scale, and translation resilient public watermarking for images. IEEE Transactions on Image Processing, 10(5), 767–782.
Lu, C.-S., Sun, S.-W., & Chang, P.-C. (2005). Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. In Proceedings of SPIE-IS &T electronic image SPIE5681, pp. 147–163.
Martinez-Noriega, R., & Nakano, M. (2011). High payload audio watermarking: toward channel characterization of MP3 compression. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 91–107.
Pal, K., Ghosh, G., & Bhattacharya, M. (2012). Reversible digital image watermarking scheme using bit replacement and majority algorithm technique. Journal of Intelligent Learning Systems and Applications, 2012(4), 199–206.
Pun, C.-M., & Yuan, X.-C. (2010a). Geometric invariant digital image watermarking scheme based on histogram in DWT domain. Journal of Multimedia, 5(5), 434–442.
Pun, C.-M., & Yuan, X.-C. (2010b). Robust and geometric invariant watermarking scheme using block and gray-level histograms. International Journal of Digital Content Technology and its Applications, 4(3), 171–183.
Ramanjaneyulu, K., & Rajarajeswari, K. (2012). Wavelet-based oblivious image watermarking scheme using genetic algorithm. IET Image Processing, 6(2), 364–373.
Surekha, B., & Swamy, G. N. (2013). Sensitive digital image watermarking for copyright protection. International Journal of Network Security, 15(1), 95–103.
Xiang, S., Kim, H. J., & Huang, J. (2008a). Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Transactions on Circuits and Systems for Video Technology, 18(6), 777–790.
Xiang, S., Kim, H. J., & Huang, J. (2008b). Audio watermarking robust against time-scale modification and MP3 compression. Signal Processing, 88(10), 2372–2387.
Zaghloul, R. I., & Al-Rawashdeh, E. F. (2008). HSV image watermarking scheme based on visual cryptography. World Academy of Science, Engineering and Technology, 44, 482–485.
Zhang, X., Wang, S., Qian, Z., & Feng, G. (2011). Reference sharing mechanism for watermark self-embedding. IEEE Transactions on Image Processing, 20(2), 485–495.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
He, X., Zhu, T. & Yang, G. A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidim Syst Sign Process 26, 291–306 (2015). https://doi.org/10.1007/s11045-013-0257-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11045-013-0257-0