Skip to main content
Log in

Contourlet-based image and video watermarking robust to geometric attacks and compressions

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we first propose a new blind image watermarking scheme robust to geometric attacks and compressions. The scheme is based on contourlet transform (CT) and principal component analysis (PCA). The scheme uses the principal components of the largest contourlet coefficients of the last directional subband of the cover image to embed the watermark. Meanwhile, with the noise visibility function (NVF), the watermarking strength is adjusted adaptively to preserve the perceptual quality of the image. The watermark can be detected with high accuracy after various possible distortions. The normalized correlation (NC) between the original watermark and the watermark extracted from the distorted watermarked image is used as the robustness evaluation criterion. The simulation results demonstrate that the proposed scheme has good performance in terms of both quality and robustness against a variety of image-processing attacks, such as rotation, scaling and image compressions. Then we extend the scheme to blind video watermarking. The performance of the video watermarking scheme is evaluated against video attacks like rotation, frame averaging, noise additions and video compressions. The introduction of the CT produces robustness against image and video compressions, and the PCA yields resistance to geometric attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Akhaee MA, Sahraeian SME, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment. IEEE Trans Image Process 19(4):967–980

    Article  MathSciNet  MATH  Google Scholar 

  2. Alavianmehr MA, Rezaei M, Helfroush MS, Tashk A (2012) A lossless data hiding scheme on video raw data robust against H.264/AVC compression. In: Proceedings of international econference on computer and knowledge engineering. Mashhad, pp 194–198

  3. Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Trans Inf Forensics Secur 9(9):1502–1517

    Article  Google Scholar 

  4. Chen L, Zhao J (2015) Adaptive digtial watermarking using RDWT and SVD. In: Proceedings of IEEE international symposium on haptic, audio and visual environments and games. Ottawa, pp 1–5

  5. Chen L, Zhao J (2016) Adaptive contourlet-based image watemarking robust to geometric transformations and image compression. In: Proceedings of IEEE international instrumentation and measurement technology conference. Taipei, pp 996–1001

  6. Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106

    Article  Google Scholar 

  7. Dutta T, Gupta HP (2016) A robust watermarking framework for high efficiency video coding (HEVC) - encoded video with blind extraction process. J Vis Commun Image Represent 38:29–44

    Article  Google Scholar 

  8. Hajizadeh M, Helfroush MS, Dehghani MJ, Tashk A (2010) A robust blind image watermarking method using local maximum amplitude wavelet coefficient quantization. Adv Elect Comput Eng 10(3):96– 101

    Article  Google Scholar 

  9. Hien TD, Chen YW, Nakao Z (2003) PCA Based digital watermarking. Knowl-Based Intell Inf Eng Syst 2773:1427–1434

    Google Scholar 

  10. Kalantari NK, Ahadi SM, Vafadust M (2010) A robust image watermarking in the ridegelet domain using universially optimum decoder. IEEE Trans Image Process 20(3):396–406

    Google Scholar 

  11. Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol 13(8):776–786

    Article  Google Scholar 

  12. Khalilian H, Bajic IV (2013) Video watermarking with empirical PCA-based decoding. IEEE Trans Image Process 22(12):4825–4840

    Article  MathSciNet  MATH  Google Scholar 

  13. Khalighi S, Tirdad P, Rabiee HR (2010) A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks. EURASIP J Adv Signal Process 2010:Article No. 21

    Article  MATH  Google Scholar 

  14. Liu Y, Zhao J (2010) A new video watermarking algorithm based on 1D DFT and Radon transform. Signal Process 90(2):626–639

    Article  MATH  Google Scholar 

  15. Liu Y, Zheng D, Zhao J (2007) An image rectification scheme and its applications in RST invariant digital image watermarking. Multimed Tools Appl 34 (1):57–84

    Article  Google Scholar 

  16. Mansouri A, Aznaveh AM, Azar FT, Kurugollu F (2010) A low complexity video watermarking in h.264 compressed domain. IEEE Trans Inf Forensics Secur 5 (4):649–657

    Article  MATH  Google Scholar 

  17. Ni R, Ruan Q, Cheng HD (2005) Secure semi-blind watermarking based on iteration mapping and image features. Pattern Recog 38(3):357–368

    Article  MATH  Google Scholar 

  18. Nguyen SC, Ha KH, Nguyen HM (2015) An improved image watermarking scheme using selective curvelet scales. In: Proceedings of international conference on advanced technologies for communications. Ho Chi Minh City, pp 445–450

  19. Ogawa K, Ohtake G (2015) Watermarking for HEVC/H.265 stream. In: Proceedings of international conference on consumer electronics. Las Vegas, pp 102–103

  20. Ranjbar S, Zargari F, Ghanbari M (2013) A highly robust two-stage contourlet-based digital image watermarking method. Signal Process: Image Commun 28(10):1526–1536

    Google Scholar 

  21. Rasti P, Samiei S, Agoyi M, Escalera S, Anbarjafari G (2016) Robust non-blind color video watermarking using QR decomposition and entropy analysis. J Vis Commun Image Represent 38:838–847

    Article  Google Scholar 

  22. Sadreazami H, Amini M (2012) Highly robust image watermarking in contourlet domain using sigular value decomposition. In: Proceedings of IEEE International conference on signal processing, vol 1. Beijing, pp 628–631

  23. Solachidis V, Pitas I (2001) Circularly symmetric watermarking embedding in 2D DFT domain. IEEE Trans Image Process 10(11):1741–1753

    Article  MATH  Google Scholar 

  24. Song H, Yu S, Yang X, Song L, Wang C (2008) Contourlet-based image adaptive watermarking. Signal Process: Image Commun 23(3):162–178

    Google Scholar 

  25. Tashk A, Danyali H, Alavianmehr MA (2012) A modified dual watermarking scheme for digital images with tamper localization/detection and recovery capabilities. In: Proceedings of international ISC conference on information security and cryptology. Tabriz, pp 60–65

  26. Tew Y, Wong K (2014) An overview of information hiding in h.264/AVC compressed video. IEEE Trans Circuits Syst Video Technol 24(2):305–319

    Article  Google Scholar 

  27. University of South California: The USC-SIPI Image Database. [Online]. Available: http://sipi.usc.edu/database/

  28. Wang Y, Pearmain A (2006) Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. IEEE Trans Image Process 15 (6):1536–1543

    Article  Google Scholar 

  29. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–612

    Article  Google Scholar 

  30. Wang L, Ling H, Zou F, Lu Z (2012) Real-time compressed-domain video watermarking resistance to geometric distortions. IEEE Multimed 19(1):70–79

    Article  Google Scholar 

  31. Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2014) Adaptive watermarking and tree structure based image quality estimation. IEEE Trans Multimed 16(2):311–325

    Article  Google Scholar 

  32. Zhao Q, Liu H (2007) PCA-Based Web page watermarking. Pattern Recog 40(4):1334–1341

    Article  MATH  Google Scholar 

  33. Zheng D, Liu Y, Zhao J (2007) A survey of RST invariant image watermarking algorithms. ACM Comput Surv 39(2):1–91

    Article  Google Scholar 

  34. Zheng D, Wang S, Zhao J (2009) RST Invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. IEEE Trans Image Process 18(5):1055–1068

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiying Zhao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, L., Zhao, J. Contourlet-based image and video watermarking robust to geometric attacks and compressions. Multimed Tools Appl 77, 7187–7204 (2018). https://doi.org/10.1007/s11042-017-4628-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4628-7

Keywords

Navigation