Abstract
In order to hide information, Yu et al. (Appl Res Comput 26(3):1082–1083, 1103, 2009) presented a method by using the numerical value relation of three pixel values in spatial domain. Their algorithm is very easy to realize and has a big hiding capacity. But its visual performance is not very good, because it is based on spatial domain and cannot control the modification value effectively in edge region or texture region of image. Our work embedded watermark by comparing the numerical value relation of three neighboring DCT coefficients with Zig-Zag order of block image to enhance the visual performance. First, each block of the host image was transformed by DCT. Then the DCT coefficient matrix was scanned by Zig-Zag scanning order to ensure the continuity of the neighboring coefficients. And then through modifying the numerical value relation of three Zig-Zag neighboring DCT coefficients, the three corresponding watermark bits were embedded in. To further improve its performance, the algorithm also employed redundant encoding, watermark scrambling encryption techniques, etc. The experiments show that the algorithm can guarantee a better quality of watermarked image, and has stronger robust to general image processing operations than the method proposed by Yu et al. (Appl Res Comput 26(3):1082–1083, 1103, 2009).
Similar content being viewed by others
References
Alurki F, Mersereau R (2015) A robust digital watermark procedure for still images using DCT phase modulation. In: European signal processing conference
Bagade AM, Talbar SN (2014) A high quality steganographic method using morphing. J Inf Process Syst 10(2):256–270
Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791
Benoraira A, Benmahammed K, Boucenna N (2015) Blind image watermarking technique based on differential embedding in DWT and DCT domains. Eurasip J. Adv. Signal Process 2015(1)
Cho M, Lee IH (2014) Optical image encryption and decryption considering wireless communication channels. J Inf Process Syst 10(2):215–222
Ding W, Yan WQ, Qi DX (2001) Digital image scrambling technology based on Arnold transformation. J Comput Aided Des Comput Graph 13(4):338–341
Du GF, Wang MHQ, Bai M (2007) A blind watermarking algorithm based on the relationship of coeficients in DCT domain. J Image Graph 12(11):2026–2030
Fang HX, Hua ZP (2014) A study on the performance of watermarking algorithm based on DCT. Adv Mater Res 846–847:1040–1043
Feng MY, Feng B, Shen CL (2008) Adaptive image watermarking algorithm based on block DCT transform and Arnold shuffling. Comput Appl 28(1):171–173
Fotopoulos V, Skodras AN (2015) A subband DCT approach to image watermarking. In: European signal processing conference
Huang MR, Gao BJ, Han YJ (2008) CDMA adaptive watermarking algorithm based on wavelet basis. Comput Eng 34(23):184–186
Jung HS, Cho NI, Lee SU (2002) Image-adaptive watermarking based on warped discrete cosine transform. In: IEEE international symposium on circuits and systems, Scottsdale, vol 3, pp 209–212
Ogiela MR (2014) New directions in cognitive cryptography. J Converg 5(3):1–3
Qi YL, Cheng ZY (2014) DCT-domain blind detection watermarking algorithm. Appl Mech Mater 608–609:468–472
Sun QD, Guan P, Qiu YP, Xue YF (2012) A novel digital image encryption method based on one-dimensional random scrambling. In: Proceedings of 2012 9th international conference on fuzzy systems and knowledge discovery, FSKD, Chongqing, China, vol 4, pp 1669-1672
Tomar R, Patni JC, Dumka A, Anand A (2015) Blind watermarking technique for grey scale image using block level Discrete Cosine Transform (DCT). Adv Intell Syst Comput 338:81–89
Yang HF, Chen XW (2003) A robust image-adaptive public watermarking technique in wavelet domain. J Softw 14(9):1652–1660
Ye XY, Chen XT, Deng M, Hui SY, Wang YL (2014) A multiple-level DCT based robust DWT-SVD watermark method. In: Proceedings of 2014 10th international conference on computational intelligence and security, CIS, pp 479–483
Yu XY, Huang HX, Zhang J, Ning ZY, Dong YB (2009) Information hiding algorithm based on three-pixel block. Appl Res Comput 26(3):1082–1083, 1103
Zhang HX, Chou PL (2001) Application of shuffling techniques within watermarking. J Circuits Syst 6(3):32
Zhang HX, Lv H, Weng XJ (2007) Image scrambling degree evaluation method based on information entropy. J Circuits Syst 12(6):95–98
Zhou JC, Tie XY (2001) Two dimension Arnold transformation of digital image and its periodicity. J North China Univ Technol 12(1):10–13
Acknowledgments
Foundation item: The Technological Innovation Foundation of Shanghai Municipal Education Commission (No. 09YZ456) and the Leading Academic Discipline Project of Communication and Information System of Shanghai Second Polytechnic University Grant (No. XXKZD1302).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sun, Q., Wang, L., Shao, Y. et al. Watermarking technique based on three-coefficient comparison in DCT domain. J Supercomput 72, 2594–2608 (2016). https://doi.org/10.1007/s11227-015-1531-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-015-1531-8