Skip to main content
Log in

Stable watermarking technique based on XNOR operation and scale relationship

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital watermark technique is often used to solve these problems and protect the copyright of multimedia transferred over the Internet. Most watermark methods use pixel values or coefficients as the judgment condition to embed or extract a watermark image. The variation of these values may lead to the inaccurate condition such that an incorrect judgment has been laid out. To avoid this problem, we design a stable judgment mechanism, in which the outcome will not be seriously influenced by the variation. The principle of judgment depends on the scale relationship of two pixels. From the observation of common signal processing operations, we can find that the pixel value of processed image usually keeps stable unless an image has been manipulated by cropping attack or halftone transformation. In the watermark embedding process, we use the XNOR operation to record the outcome to form a secret key instead of modifying pixel values. This can greatly help reduce the modification strength from image processing operations. Experiment results show that the proposed method can resist various attacks and keep the image quality friendly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806–2817

    Article  Google Scholar 

  2. Athanasios N (2012) “Local distortion resistant image watermarking relying on salient feature extraction”. EURASIP J Adv Sig Proc:1–17

  3. Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circuits Syst Video Technol 15(1):96–102

    Article  Google Scholar 

  4. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  MATH  Google Scholar 

  5. Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768–2786

    Article  Google Scholar 

  6. Deng C, Gao X, Li X, Tao D (2009) A local Techebichef moments-based robust image watermarking. Signal Process 89(8):1531–1539

    Article  Google Scholar 

  7. Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Syst Man Cybern Soc 40(3):278–286

    Article  Google Scholar 

  8. Hernandez JR, Amado M, Perez-Gonzalez F (2000) DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans Image Process 9:55–68

    Article  Google Scholar 

  9. Kim JR, Moon YS (1999) A robust wavelet-based digital watermarking using level-adaptive thresholding. Int Conf Image Process 2:226–230

    Google Scholar 

  10. Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284:938–944

    Article  Google Scholar 

  11. Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. IEEE Signal Process Mag 17(5):20–46

    Article  Google Scholar 

  12. Leng X, Xiao J, Wang Y (2012) A robust image zero-watermarking algorithm based on DWT and PCA. In: Proceedings of International Conference on Communications and Information Processing (ICCIP). Springer, Berlin Heidelberg, pp 484–492

  13. Lin SD, Shie SC, Guo JY (2010) Improving the robustness of DCT-based image watermarking against JPEG compression. Comp Stand Inter 32:54–60

    Article  Google Scholar 

  14. Lu W, Sun W, Lu H (2008) Robust watermarking based on DWT and nonnegative matrix factorization. Comput Electr Eng 35(1):183–188

    Article  Google Scholar 

  15. Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 20:1597–1611

    Article  Google Scholar 

  16. Run RS, Horng SJ, Lin WH, Kao TW, Fan P, Khan MK (2011) An efficient wavelet-tree-based watermarking method. Expert Syst Appl 38(12):14357–14366

    Article  MATH  Google Scholar 

  17. Swanson MD, Kobayashi M, Tewfik AH (1998) Multimedia data-embedding and watermarking technologies. Proc IEEE 86(6):1064–1087

    Article  Google Scholar 

  18. Xinkai W, Wang P, Zhang P, Xu S, Yang H (2013) A norm-space, adaptive, and blind audio watermarking algorithm by discrete wavelet transform. Signal Process 93(4):913–922

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-San Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, JS., Wong, HS., Chen, YR. et al. Stable watermarking technique based on XNOR operation and scale relationship. Multimed Tools Appl 74, 6797–6826 (2015). https://doi.org/10.1007/s11042-014-1930-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-1930-5

Keywords

Navigation