Skip to main content
Log in

A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel secured robust blind watermarking scheme has been proposed in this paper. It exploits the human visual system (HVS) insensitivity to detect color changes as compared to brightness changes for embedding of watermark. The color space is converted from RGB to YCbCr and one of its components is chosen arbitrarily for hiding copyright information. The scheme is made very secured by Arnold chaotic maps and usage of multiple secret keys. Three diagonal pairs of discrete cosine transform coefficients are chosen in each sampled block of the color channel and a threshold criteria based embedding is done in each pair corresponding to a single bit of the encoded copyright information. To handle various image processing attacks and enhance robustness of the scheme, extraction of the watermark bits is done based on majority voting concept using two separate counters for representing watermark bits. The efficacy of the proposed scheme has been tested against variety of image processing and geometrical attacks and evaluated using peak signal to noise ratio (PSNR), structural similarity index matrix (SSIM) and normalized cross correlation (NCC) metrics. Comparative results based on different aspects of robust watermarking scheme is also presented to build the appropriateness of the proposed scheme over existing state of art approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Abuturab MR (2012) Color image security system using double random-structured phase encoding in gyrator transform domain. Appl Opt 51:30063016

    Google Scholar 

  2. Abuturab MR (2012) Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform. Appl Opt 51:79948002

    Google Scholar 

  3. Abuturab MR (2013) Authentication system of color information using interference of two beams in gyrator transform domain. Appl Opt 52:513342

    Google Scholar 

  4. Amirgholipour S, Aboosaleh S (2014) A Pre-Filtering method to improve watermark detection rate in DCT based watermarking. The International Arab Journal of Information Technology 11(2):178–185

    Google Scholar 

  5. Barni M, Bartolini F, Cappellini V, Piva A (1998) A dct domain system for robust image watermarking. Signal Process 66(3):357372

    Article  MATH  Google Scholar 

  6. Barni M, Bartolini F, Cappellini V, Piva A, Rigacci F (1998) A m.a.p. identication criterion for dct based watermarking. In: Proceedings European Signal Processing Conference, pp 1720

  7. Bohra A, Farooq O, Izharuddin M (2009) Blind self-authentication of images for robust watermarking using integer wavelet transform. Int J Electron Commun 63 (8):703–707

    Article  Google Scholar 

  8. Chang C, Tsai P, Lin C (2005) Svd based digital image watermarking scheme. Pattern Recogn Lett 26 10:15771586

    Google Scholar 

  9. Chen LF, Zhao DM, Ge F (2010) Opt Commun 283:2043

    Article  Google Scholar 

  10. Chen B, Coatrieux G, Chen G, Sun X, Coatrieux J, Shu H (2014) Full 4-D quaternion discrete Fourier transform based watermarking for color images. Digital Signal Process 28(1):106–119

    Article  Google Scholar 

  11. Consultants T (2010) Building a digital economy. The importance of saving jobs in Europes Creative Economy Paris: International Chamber of commerce/BASCAP. Available on line: http://www.ec.europa.eu/dgs/jrc/downloads/events/.../20110405 budapest turlea. pdf (access 15/05/2011)

  12. Cox I, Kilian J, Leighton F, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):16731687

    Article  Google Scholar 

  13. Chu W (2003) Dct based image watermarking using subsampling. IEEE Trans Multimedia 5(1):3438

    Article  Google Scholar 

  14. Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coeficient correlation. Int J Electron Commun 68(3):244–53

    Article  Google Scholar 

  15. Feng L, Zheng L, Cao P (2010) A DWT-DCT based blind watermarking algorithm for copyright protection. In: Proceedings IEEE ICCIST, pp 455–458

  16. Gangyi J, Mei Y, Shi S, Liu X, Kim Y (2002) New blind image watermarking in dct domain. In: 6th international conference in signal processing, vol 2, p 15801583

  17. Hennelly B, Sheridan JT (2003) Opt Lett 28:269

    Article  Google Scholar 

  18. Hernandez J, Amado M, Perezgonzalez F (2000) Dct domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans Image Process 9(1):5568

    Article  Google Scholar 

  19. Hsu C, Wu J (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):5868

    Google Scholar 

  20. Hsu C, Hou Y (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44:077003

    Article  Google Scholar 

  21. Hwang HE, Han P (2006) Fast algorithm of phase masks for image encryption in the Fresnel domain. J Opt Soc Am A 23:18704

    Google Scholar 

  22. Kalantari N, Ahadi S, Vafadust M (2010) A robust image watermarking in the ridgelet domain using universally optimum decoder. IEEE Trans Circuits Syst Video Technol 20(3):396406

    Article  Google Scholar 

  23. Li Z, Yap K, Lei B (2011) A New blind robust image watermarking scheme in svd dct composite domain. In: 18th IEEE international conference in image processing (ICIP), p 27572760

  24. Liu JL, Lou DC, Chang MC, Tso HK (2006) Arobust watermarking scheme using self-reference image. Comput Stand Interface 28:356367

    Article  Google Scholar 

  25. Liu ZJ, Li QM, Dai JM (2009) Opt Commun 282:1536

    Article  Google Scholar 

  26. Liu Z, Xu L, Liu T, Chen H, Li P, Lin C, Liu S (2011) Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Opt Commun 284:1238

    Article  Google Scholar 

  27. Lu Z, Zheng H, Huang J (2007) A digital watermarking scheme based on dct and svd. In: Third international conference in intelligent information hiding and multimedia signal processing, IIHMSP 2007, vol 1, p 241244

  28. Maity S, Kundu M (2010) Dht domain digital watermarking with low loss in image informations. International Journal Of Electronics and Communications 64 (3):243–257

    Article  Google Scholar 

  29. Mohan B, Kumar S (2008) A robust digital image watermarking scheme using singular value decomposition. J Multimed 3(1):7–15

    Article  Google Scholar 

  30. Mohanty S, Ranganathan N, Namballa R (2003) Vlsi implementation of invisible digital watermarking algorithms towards the development of a secure jpeg encoder. In: Proceedings of the IEEE workshop on signal processing systems based implementation of an invisible robust image watermarking encoder, pp 183–188

  31. Morita Y, Ayeh E, Adamo O, Guturu P (2009) Hardware/software co-design approach for a dct- based watermarking algorithm. In: 52nd IEEE international midwest symposium circuits and systems, 2009. MWSCAS09. IEEE, pp 683–686

  32. Patra J, Phua J, Bornand D (2010) A Novel dct domain crt-based watermarking scheme for image authentication surviving jpeg compression. Digital Signal Process 20 (6):1597–1611

    Article  Google Scholar 

  33. Qi H, Zheng D, Zhao J (2008) Human visual system based adaptive digital image watermarking. Signal Process 88(1):174–188

    Article  MATH  Google Scholar 

  34. Rawat S, Raman B (2011) A chaos-based robust watermarking algorithm for rightful ownership protection. International Journal of Image and Graphics 11(4):471–493

    Article  MathSciNet  Google Scholar 

  35. Rawat S, Raman B (2012) A publicly veriable lossless watermarking scheme for copyright protection and ownership assertion. Int J Electron Commun 66(11):955962

    Google Scholar 

  36. Rawat S, Raman B (2013) Visual-cryptography-based blind watermarking scheme for copyright protection. Int. J. of Signal and Imaging Systems Engineering 6(3):158–163

    Article  Google Scholar 

  37. Rani A, Raman B, Kumar S (2014) A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimed Tools Appl 72:22252248. doi:10.1007/s11042-013-1528-3

    Article  Google Scholar 

  38. Sadreazami H, Amini M (2012) A Robust spread spectrum based image watermarking in ridgelet domain. Int J Electron Commun 66(5):364371

    Article  Google Scholar 

  39. Singh P, Agarwal S (2015) An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimedia Tools Appl. doi:10.1007/s11042-015-2736-9

    Google Scholar 

  40. Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:15846

    Article  Google Scholar 

  41. Suhail M, Obaidat M (2003) Digital watermarking based dct and jpeg model. IEEE Trans Instrum Meas 52(5):16401647

    Article  Google Scholar 

  42. Tao R, Xin Y, Wang Y (2007) Opt Express 15:16067

    Article  Google Scholar 

  43. Tseng HW, Hsieh CP (2008) A robust watermarking scheme for digital images using self reference. Adv Commun Syst Electr Eng (Springer) 479495:4

    Google Scholar 

  44. Unnikrishnan G, Joseph J, Singh K (2000) Opt Lett 25:887

    Article  Google Scholar 

  45. Wang M, Chen W (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards Interfaces 31:757–762

    Article  Google Scholar 

  46. Yang C, Hu W, Lai J (2008) Dct based watermarking by quotient-embedding algorithm. In: 3rd international conference in innovative computing information and control ICICIC08. IEEE, p 2020

  47. Zhao D, Chen G, Liu W (2004) A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22:4754

    Google Scholar 

Download references

Acknowledgments

This work was supported by Information Security Education and Awareness (ISEA) Project (phase II), DeitY, New Delhi, INDIA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, P., Raman, B. A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion. Multimed Tools Appl 76, 21497–21517 (2017). https://doi.org/10.1007/s11042-016-4006-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4006-x

Keywords

Navigation