Skip to main content
Log in

Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To enhance the invisibility and the robustness of the watermarking algorithm, a robust and imperceptible watermarking scheme is presented by combining Canny edge detection, contourlet transform with singular value decomposition. The host image is firstly decomposed by the contourlet transform. Then the low frequency sub-band obtained by contourlet transform is partitioned into 4×4 non-overlapping blocks and the singular value decomposition is carried out for the specific blocks selected by the Canny edge detection. Finally, the watermark is embedded into the coefficient of matrix U. The embedded watermark could be recovered blindly in the watermark extraction stage. And the robustness and the imperceptibility are efficiently guaranteed with an optimal threshold k selected by the least-square curve fitting. Experimental results demonstrate that the proposed watermarking scheme is superior in terms of imperceptibility and robustness against common attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Akhaee MA, Sahraeian SME, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment [J]. IEEE Trans Image Process 19(4):967–980

    Article  MathSciNet  MATH  Google Scholar 

  2. Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking [J]. Signal Process 66(3):357–372

    Article  MATH  Google Scholar 

  3. Bi HB, Li XM, Zhang YB et al (2010) A blind robust watermarking scheme based on CT and SVD [C]. IEEE 10th International Conference on Signal Processing Proceedings. IEEE:881–884

  4. Canny J (1986) A computational approach to edge detection [J]. IEEE Trans Pattern Anal Mach Intell 6:679–698

    Article  Google Scholar 

  5. Chen L, Zhao JY (2018) Contourlet-based image and video watermarking robust to geometric attacks and compressions [J]. Multimed Tools Appl 77(6):7187–7204

    Article  Google Scholar 

  6. Cho H, Sung M, Jun B (2016) Canny text detector: fast and robust scene text localization algorithm [C]. Proc IEEE Conf Comput Vis Pattern Recognit:3566–3573.

  7. Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation [J]. IEEE Trans Image Process 14(12):2091–2106

    Article  Google Scholar 

  8. Ernawan F, Kabir MN (2018) A robust image watermarking technique with an optimal DCT-psychovisual threshold [J]. IEEE Access 6:20464–20480

    Article  Google Scholar 

  9. Etemad S, Amirmazlaghani M (2018) A new multiplicative watermark detector in the contourlet domain using t location-scale distribution [J]. Pattern Recogn 77:99–112

    Article  Google Scholar 

  10. Hu HT, Hsu LY (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics [J]. Multimed Tools Appl 76(5):6575–6594

    Article  Google Scholar 

  11. Kang XG, Huang JW, Shi YQ et al (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression [J]. IEEE Trans Circuits Syst Video Technol 13(8):776–786

    Article  Google Scholar 

  12. Kang XB, Zhao F, Lin GF et al (2018) A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength [J]. Multimed Tools Appl 77(11):13197–13224.A

    Article  Google Scholar 

  13. Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance [J]. Multimed Tools Appl 77(3):3597–3622

    Article  Google Scholar 

  14. Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication [J]. Proc IEEE 87(7):1167–1180

    Article  Google Scholar 

  15. Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm [J]. Digital Signal Process 21(4):522–527

    Article  Google Scholar 

  16. Lang J, Zhang ZG (2014) Blind digital watermarking method in the fractional Fourier transform domain [J]. Opt Lasers Eng 53:112–121

    Article  Google Scholar 

  17. Liu RZ, Tan TN (2002) An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Trans Multimed 4(1):121–128

    Article  Google Scholar 

  18. Liu Y, Tang SY, Liu R et al (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption [J]. Expert Syst Appl 97:95–105

    Article  Google Scholar 

  19. Miyake S, Nakamae K (2016) A quantum watermarking scheme using simple and small-scale quantum circuits [J]. Quantum Inf Process 15(5):1849–1864

    Article  MathSciNet  MATH  Google Scholar 

  20. Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing [J]. Digital Signal Process 53:11–24

    Article  Google Scholar 

  21. Pereira S, Voloshynoskiy S, Pun T (2001) Optimal transform domain watermark embedding via linear programming [J]. Signal Process 81(6):1251–1260

    Article  MATH  Google Scholar 

  22. Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks [J]. AEU-Int J Electron Commun 72:149–161

    Article  Google Scholar 

  23. Sadreazami H, Ahmad MO, Swamy MNS (2015) Multiplicative watermark decoder in contourlet domain using the normal inverse Gaussian distribution [J]. IEEE Trans Multimed 18(2):196–207

    Article  Google Scholar 

  24. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images [J]. Multimed Tools Appl 76(6):8881–8900

    Article  Google Scholar 

  25. Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection [J]. Multimed Tools Appl 76(11):13001–13024

    Article  Google Scholar 

  26. Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images [J]. Multimed Tools Appl 75(14):8381–8401

    Article  Google Scholar 

  27. Solachidis V, Pitas L (2001) Circularly symmetric watermark embedding in 2-D DFT domain [J]. IEEE Trans Image Process 10(11):1741–1753

    Article  MATH  Google Scholar 

  28. Su QT, Chen BJ (2018) Robust color image watermarking technique in the spatial domain [J]. Soft Comput 22(1):91–106

    Article  Google Scholar 

  29. Su QT, Wang G, Lv GH et al (2017) A novel blind color image watermarking based on contourlet transform and Hessenberg decomposition [J]. Multimed Tools Appl 76(6):8781–8801

    Article  Google Scholar 

  30. Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain [J]. Expert Syst Appl 42(21):8184–8197

    Article  Google Scholar 

  31. Xu ZG, Yuan WJ (2017) Watermark BER and channel capacity analysis for QPSK-based RF watermarking by constellation dithering in AWGN channel [J]. IEEE Signal Process Lett 24(7):1068–1072

    Article  Google Scholar 

  32. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine [J]. Multimed Tools Appl 77(4):4863–4882

    Article  Google Scholar 

  33. Zhou NR, Xiahou WM, Wen RH et al (2018) Imperceptible digital watermarking scheme in multiple transform domains [J]. Multimed Tools Appl 77(23):30251–30267

    Article  Google Scholar 

  34. Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm [J]. Multimed Tools Appl 78(2):2507–2523

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61861029 and 61462061), the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant No. 20162BCB22011), the Natural Science Foundation of Jiangxi Province (Grant No. 2017BAB202002), and the Cultivation Plan of Applied Research of Jiangxi Province (Grant No. 20181BBE58022).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nan-Run Zhou.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gong, LH., Tian, C., Zou, WP. et al. Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain. Multimed Tools Appl 80, 439–461 (2021). https://doi.org/10.1007/s11042-020-09677-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09677-w

Keywords

Navigation