Skip to main content

Advertisement

Log in

A Robust Watermarking Scheme Using Sequency-ordered Complex Hadamard Transform

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

This paper presents a robust phase watermarking scheme for still digital images based on the sequency-ordered complex Hadamard transform (SCHT). The transform matrix of the SCHT exhibits sequency ordering which is analogous to frequency in the discrete Fourier transform (DFT). Hence, sequency-based image analysis can be performed for image watermarking while providing simple implementation and with less computational complexity for computation of the transform. As the SCHT coefficients are complex numbers which consist of both magnitudes and phases, they are suited to adopt phase modulation techniques to embed the watermark. In this proposed scheme, the phases of the SCHT coefficients in the sequency domain are altered to convey the watermark information using the phase shift keying (PSK) modulation. Low amplitude block selection (LABS) is used to enhance the imperceptibility of digital watermark, and amplitude boost (AB) method is employed to improve the robustness of the watermarking scheme. Spread spectrum (SS) technique is adopted to increase the security of watermark against various unintentional or intentional attacks. In order to demonstrate the effectiveness of the proposed watermarking scheme, simulations are conducted under various kinds of attacking operations. The results show that the proposed scheme is able to sustain a series of attacks including common geometric transformations such as scaling, rotating, cropping, painting, and common image-processing operations such as JPEG compression, low-pass filtering, sharpening, noising and phase perturbation, etc. Comparisons of the simulation results with the other schemes are also mentioned and the results reveal that the proposed scheme shows better robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Guo, J., Liu, Z., & Liu, S. (2007). Watermarking based on discrete fractional random transform. Optics Communications, 272(2), 344–348.

    Article  Google Scholar 

  2. Hsu, C. T., & Wu, J. L. (1999). Hidden digital watermarks in images. IEEE Transactions on Image Processing, 8(1), 58–68.

    Article  Google Scholar 

  3. Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.

    Article  Google Scholar 

  4. Ó Ruanaidh, J. J. K., Dowling, W. J., & Boland, F. M. (1996). Watermarking digital images for copyright protection. IEE Proceedings-Vision, Image and Signal Processing, 143(4), 250–256.

    Article  Google Scholar 

  5. Chen, W. Y., & Chen, C. H. (2005). A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognition, 38(4), 587–598.

    Article  Google Scholar 

  6. Ó Ruanaidh, J. J. K., Dowling, W. J., & Boland, F. M. (1996). Phase watermarking of digital images. In Proc. IEEE International Conference on Image Processing (Vol. 3, pp. 239–242).

  7. Qi, X., & Qi, J. (2007). A robust content-based digital image watermarking scheme. Signal Processing, 87(6), 1264–1280.

    Article  MATH  Google Scholar 

  8. Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing (International ed.). Pearson Prentice Hall.

  9. Tsai, M. J., Yu, K. Y., & Chen, Y. Z. (2000). Joint wavelet and spatial transformation for digital watermarking. IEEE Transactions on Consumer Electronics, 46(1), 241–245.

    Google Scholar 

  10. Bao, P., & Xiaohu, M. (2005). Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Transactions on Circuits and Systems for Video Technology, 15(1), 96–102.

    Article  Google Scholar 

  11. Fonda, F., & Pastore, S. (2005). Innovative image watermarking technique for image authentication in surveillance applications. In Ser. proc. IEEE international workshop on imaging systems and techniques, Niagara Falls, Ontario, Canada (pp. 32–35).

  12. Falkowski, B. J. (2008). Phase watermarking algorithm using hybrid multi-polarity Hadamard transform. Journal of Mathematical Imaging and Vision, 30(1), 13–21.

    Article  Google Scholar 

  13. Falkowski, B. J., & Lim, L. S. (2000). Image watermarking using the complex Hadamard transform. In Proc. IEEE international symposium on circuits and systems (Vol. 4, pp. 573–576).

  14. Pan, J. S., & Lin, C. (2007). Attacking phase shift keying based watermarking. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90A(1), 305–306.

    Article  Google Scholar 

  15. Aung, A., Ng, B. P., & Rahardja, S. (2008). Sequency-ordered complex Hadamard transform: Properties, computational complexity and applications. IEEE Transactions on Signal Processing, 56(8), 3562–3571.

    Article  MathSciNet  Google Scholar 

  16. Bi, G., Aung, A., & Ng, B. P. (2008). Pipelined hardware structure for sequency-ordered complex Hadamard transform. IEEE Signal Processing Letters, 15, 401–404.

    Article  Google Scholar 

  17. Aung, A., Ng, B. P., & Rahardja, S. (2007). Performance of SCHT sequences in asynchronous CDMA system. IEEE Communications Letters, 11(8), 641–643.

    Article  Google Scholar 

  18. Beauchamp, K. G. (1984). Applications of Walsh and related functions, with an introduction to sequency theory. New York: Academic.

    Google Scholar 

  19. Kuo, S., & Gan, W. S. (2005). Digital signal processors: Architectures, implementations, and applications (International ed.). Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aye Aung.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Aung, A., Ng, B.P. & Rahardja, S. A Robust Watermarking Scheme Using Sequency-ordered Complex Hadamard Transform. J Sign Process Syst 64, 319–333 (2011). https://doi.org/10.1007/s11265-010-0492-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-010-0492-7

Keywords