Skip to main content
Log in

Hybrid multiplicative multi-watermarking in DWT domain

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

Multiwatermarking embeds multiple watermarks into the media content imperceptibly. It is regarded as the potential means to protect the media contents’ copyright and/or trace illegal redistributors in multi-user environments, e.g., collaborative media content production or layered media content distribution. However, there are still some open issues in designing a good multiwatermarking scheme, including the combination between multiple embedding steps, the combination between multiple watermarks and the security of embedding schemes. In this paper, novel multiwatermarking schemes are proposed, which are based on hybrid multi-bit multiplicative rules controlled by secret keys. Two hybrid multiplicative multiwatermarking decoders, i.e., optimum and locally optimum, are proposed, which are based on the minimum Bayesian risk criterion and the DWT coefficients are modeled as the generalized Gaussian distribution. The BER (average bit error rate) as the evaluation index of the performance of optimum hybrid decoders is exactly analyzed. Finally, experimental results are shown to confirm the validity of the theoretical and empirical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Akhaee, M., Sahraeian, S., Sankur, B., & Marvasti, F. (2009). Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Transactions on Multimedia, 11(5), 822–833.

    Article  Google Scholar 

  • Barni, M., Bartolini, F., Rosa, A., & Piva, A. (2000). Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing, 9(8), 1450–1455.

    Article  Google Scholar 

  • Barni, M., Bartolini, F., Rosa, A., & Piva, A. (2002). Optimum decoding and detection of a multiplicative amplitude encoded watermark. In Proceedings of SPIE 4675 on security and watermarking of multimedia contents IV, San Jose, CA, USA, Vol. 4657, pp. 409–420.

  • Chamlawi, R., Khan, A., & Usman, I. (2010). Authentication and recovery of images using multiple watermarks. Computers and Electrical Engineering, 36(1), 578–584.

    Article  MATH  Google Scholar 

  • Cheng, Q. (2009). Generalized embedding of multiplicative watermarks. IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 978–988.

    Article  Google Scholar 

  • He, X., Zhu, T., & Yang, G. (2015). A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimension Systems and Signal Processing, 26, 291–306.

    Article  MathSciNet  Google Scholar 

  • Lewis, A., & Knowles, G. (1992). Image compression using the 2-D wavelet transform. IEEE Transactions on Image Processing, 1(2), 244–250.

    Article  Google Scholar 

  • Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in compressed video data. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774–778.

    Article  Google Scholar 

  • Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.

    Article  Google Scholar 

  • Lu, C., & Hsu, C. (2007). Near-optimal watermark estimation and its countermeasure: Antidisclosure watermark for multiple watermark embedding. IEEE Transactions on Circuits and Systems for Video Technology, 17(4), 454–467.

    Article  Google Scholar 

  • Mairgiotis, A., Galatsanos, N., & Yang, Y. (2008). New additive watermark detectors based on a hierarchical spatially adaptive image model. IEEE Transactions on Information Forensics and Security, 3(1), 29–37.

    Article  Google Scholar 

  • Petitcolas, F. (2002). Stirmark benchmark. www.petitcolas.net/fabien/watermarking/stirmark/.

  • Sadreazami, H., Ahmad, M., & Swamy, M. (2014). A study of multiplicative watermark detection in the contourlet domain using alpha-stable distributions. IEEE Transactions on Image Processing, 23(10), 4348–4360.

    Article  MathSciNet  Google Scholar 

  • Takahashi, A., Nishimura, R., & Suzuki, Y. (2005). Multiple watermarks for stereo audio signals using phase-modulation techniques. IEEE Transactions on Signal Processing, 53(2), 806–815.

    Article  MathSciNet  Google Scholar 

  • Wang, J., & Lian, S. (2012a). On multiwatermarking in cloud environment. Concurrency and Computation: Practice and Experience, 24(17), 2151–2164.

    Article  Google Scholar 

  • Wang, J., & Lian, S. (2012b). On the hybrid multi-watermarking. Signal Processing, 92(4), 893–904.

    Article  Google Scholar 

  • Wang, J., Lian, S., & Yan, L. (2013). Hybrid multiplicative watermarking and its decoders. Telecommunication Systems, 54(3), 305–313.

    Article  Google Scholar 

  • Wang, J., Liu, G., Dai, Y., Sun, J., Wang, Z., & Lian, S. (2008). Locally optimum detection for Barni’s multiplicative watermarking in DWT domain. Signal Processing, 88(1), 117–130.

    Article  MATH  Google Scholar 

  • Xiao, J., & Wang, Y. (2009). Multiple watermarking with side information. In H. J. Kim, S. Katzenbeisser, & A. T. S. Ho (Eds.) International workshop on digital watermarking 2008 (pp. 379–387). Busan, Korea, Springer, LNCS 5450.

  • Zhang, F., & Zhang, X. (2007). Performance evaluation of multiple watermarks system. In 2nd workshop on digital media and its application in Museum & Heritage (pp. 15–18). Chongqing China.

Download references

Acknowledgments

This work was jointly supported by the National Natural Science Foundation of China (Grant Nos. 61272421, 61103141, 61232016, 61173141, 61103201,61402235), the Natural Science Foundation of Jiangsu Higher Education Institutions of China (Grant No. 12KJB520006), the Priority Academic Program Development of Jiangsu Higher Education Institutions, Jiangsu Government Scholarship for Overseas Studies and CICAEET.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinwei Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, J., Lian, S. & Shi, YQ. Hybrid multiplicative multi-watermarking in DWT domain. Multidim Syst Sign Process 28, 617–636 (2017). https://doi.org/10.1007/s11045-015-0363-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-015-0363-2

Keywords

Navigation