Skip to main content
Log in

Watermarking technique based on three-coefficient comparison in DCT domain

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In order to hide information, Yu et al. (Appl Res Comput 26(3):1082–1083, 1103, 2009) presented a method by using the numerical value relation of three pixel values in spatial domain. Their algorithm is very easy to realize and has a big hiding capacity. But its visual performance is not very good, because it is based on spatial domain and cannot control the modification value effectively in edge region or texture region of image. Our work embedded watermark by comparing the numerical value relation of three neighboring DCT coefficients with Zig-Zag order of block image to enhance the visual performance. First, each block of the host image was transformed by DCT. Then the DCT coefficient matrix was scanned by Zig-Zag scanning order to ensure the continuity of the neighboring coefficients. And then through modifying the numerical value relation of three Zig-Zag neighboring DCT coefficients, the three corresponding watermark bits were embedded in. To further improve its performance, the algorithm also employed redundant encoding, watermark scrambling encryption techniques, etc. The experiments show that the algorithm can guarantee a better quality of watermarked image, and has stronger robust to general image processing operations than the method proposed by Yu et al. (Appl Res Comput 26(3):1082–1083, 1103, 2009).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Alurki F, Mersereau R (2015) A robust digital watermark procedure for still images using DCT phase modulation. In: European signal processing conference

  2. Bagade AM, Talbar SN (2014) A high quality steganographic method using morphing. J Inf Process Syst 10(2):256–270

    Article  Google Scholar 

  3. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  MATH  Google Scholar 

  4. Benoraira A, Benmahammed K, Boucenna N (2015) Blind image watermarking technique based on differential embedding in DWT and DCT domains. Eurasip J. Adv. Signal Process 2015(1)

  5. Cho M, Lee IH (2014) Optical image encryption and decryption considering wireless communication channels. J Inf Process Syst 10(2):215–222

    Article  Google Scholar 

  6. Ding W, Yan WQ, Qi DX (2001) Digital image scrambling technology based on Arnold transformation. J Comput Aided Des Comput Graph 13(4):338–341

    Google Scholar 

  7. Du GF, Wang MHQ, Bai M (2007) A blind watermarking algorithm based on the relationship of coeficients in DCT domain. J Image Graph 12(11):2026–2030

    Google Scholar 

  8. Fang HX, Hua ZP (2014) A study on the performance of watermarking algorithm based on DCT. Adv Mater Res 846–847:1040–1043

    Google Scholar 

  9. Feng MY, Feng B, Shen CL (2008) Adaptive image watermarking algorithm based on block DCT transform and Arnold shuffling. Comput Appl 28(1):171–173

    MathSciNet  MATH  Google Scholar 

  10. Fotopoulos V, Skodras AN (2015) A subband DCT approach to image watermarking. In: European signal processing conference

  11. Huang MR, Gao BJ, Han YJ (2008) CDMA adaptive watermarking algorithm based on wavelet basis. Comput Eng 34(23):184–186

    Google Scholar 

  12. Jung HS, Cho NI, Lee SU (2002) Image-adaptive watermarking based on warped discrete cosine transform. In: IEEE international symposium on circuits and systems, Scottsdale, vol 3, pp 209–212

  13. Ogiela MR (2014) New directions in cognitive cryptography. J Converg 5(3):1–3

    Google Scholar 

  14. Qi YL, Cheng ZY (2014) DCT-domain blind detection watermarking algorithm. Appl Mech Mater 608–609:468–472

    Article  Google Scholar 

  15. Sun QD, Guan P, Qiu YP, Xue YF (2012) A novel digital image encryption method based on one-dimensional random scrambling. In: Proceedings of 2012 9th international conference on fuzzy systems and knowledge discovery, FSKD, Chongqing, China, vol 4, pp 1669-1672

  16. Tomar R, Patni JC, Dumka A, Anand A (2015) Blind watermarking technique for grey scale image using block level Discrete Cosine Transform (DCT). Adv Intell Syst Comput 338:81–89

    Article  Google Scholar 

  17. Yang HF, Chen XW (2003) A robust image-adaptive public watermarking technique in wavelet domain. J Softw 14(9):1652–1660

    MATH  Google Scholar 

  18. Ye XY, Chen XT, Deng M, Hui SY, Wang YL (2014) A multiple-level DCT based robust DWT-SVD watermark method. In: Proceedings of 2014 10th international conference on computational intelligence and security, CIS, pp 479–483

  19. Yu XY, Huang HX, Zhang J, Ning ZY, Dong YB (2009) Information hiding algorithm based on three-pixel block. Appl Res Comput 26(3):1082–1083, 1103

  20. Zhang HX, Chou PL (2001) Application of shuffling techniques within watermarking. J Circuits Syst 6(3):32

    Google Scholar 

  21. Zhang HX, Lv H, Weng XJ (2007) Image scrambling degree evaluation method based on information entropy. J Circuits Syst 12(6):95–98

    Google Scholar 

  22. Zhou JC, Tie XY (2001) Two dimension Arnold transformation of digital image and its periodicity. J North China Univ Technol 12(1):10–13

    Google Scholar 

Download references

Acknowledgments

Foundation item: The Technological Innovation Foundation of Shanghai Municipal Education Commission (No. 09YZ456) and the Leading Academic Discipline Project of Communication and Information System of Shanghai Second Polytechnic University Grant (No. XXKZD1302).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiudong Sun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, Q., Wang, L., Shao, Y. et al. Watermarking technique based on three-coefficient comparison in DCT domain. J Supercomput 72, 2594–2608 (2016). https://doi.org/10.1007/s11227-015-1531-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1531-8

Keywords

Navigation