Computer Science ›› 2018, Vol. 45 ›› Issue (10): 178-182, 216.doi: 10.11896/j.issn.1002-137X.2018.10.033

• Information Security • Previous Articles     Next Articles

Adaptive Blind Watermarking Algorithm Based on Sub-block Segmentation

LIU Wei1,2, CHENG Cong-cong2, PEI Meng-li2, SHE Wei1,2   

  1. School of Software and Applied Technology,Zhengzhou University,Zhengzhou 450000,China 1
    Collaborative Innovation Center for Internet Healthcare,Zhengzhou University,Zhengzhou 450000,China 2
  • Received:2018-07-15 Online:2018-11-05 Published:2018-11-05

Abstract: To improve the robustness of watermarking,this paper proposed an adaptive full-blind watermarking algorithm based on sub-block segmentation (ABWASS).In the embedding of watermark,it embeds the adaptive watermark according to the characteristic matrix of the host image and integrates the key information of the watermark into the LH2 sub-band by using the improved 2-phase DWT,so as to obtain the watermarked image with dual watermarks.In the process of watermark extraction,firstly it separates key information for blocking and then gets the characteristic matrix by DCT to extract the watermark.The embedding of key information for blocking makes this proposed algorithm be a full-blind watermarking.Experimental results show that the proposed algorithm performs well in most conventional attacks and geometric attacks and performs better in all mixed attacks with the maximum increment of 2.7%,and it also has good invisibility and practicability.

Key words: Digital watermarking, Sub-block region segmentation, Fully blind detection, Adaptation

CLC Number: 

  • TP309.7
[1]GAUR S,SRIVASTAVA V K.Robust embedding of improved Arnold transformed watermark in digital images using RDWT -SVD[C]∥Fourth International Conference on Parallel,Distri-buted and Grid Computing(IEEE).2017:563-568.
[2]DONG S,LI J,LIU S.Frequency domain digital watermark algorithm implemented in spatial domain based on correlation coefficient and quadratic DCT transform[C]∥International Conference on Progress in Informatics and Computing(IEEE).2017:596-600.
[3]REN K Q,ZANG D D,WU F.Adaptive Robust Image Watermarking Based on DCT and Hamming Code[J].Opto-Electronic Engineering,2016,43(11):54-61.(in Chinese)
任克强,张丹丹,吴帆.融合DCT和汉明码的自适应鲁棒图像水印[J].光电工程,2016,43(11):54-61.[4]SU Q,CHEN B.A novel blind color image watermarking using upper Hessenberg matrix[J].AEU-International Journal of Electronics and Communications,2017,78:64-71.
[5]YE T Y.Perfectly blind image watermarking scheme with multi-purpose based on region segment for sub-block and self-embedding technology[J].Journal on Communications,2013,34(3):148-156.(in Chinese)
[6]SINGH D,SINGH S K.DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection[J].Multimedia Tools & Applications,2017,76(1):13001-13024.
[7]HE H J,ZHANG J S.Chaos-based scramble self-embedding watermarking algorithm[J].Journal on Communications,2006,27(7):80-86.(in Chinese)
[8]ANDALIBI M,CHANDLER D M.Digital Image Watermarking via Adaptive Logo Texturization[J].IEEE Transactions onIma-ge Processing,2015,24(12):5060-5073.
[9]SHANG F,WANG H Q,ZHAO M.A Watermarking Algorithm against Rotation Based on DCT[C]∥Proceedings of CIHW.2010.(in Chinese)
[10]SHI H,LI M,FANG L.A robust digital image watermarking based on adaptive multifunctional scheme[J].Optik-Internatio-nal Journal for Light and Electron Optics,2015,126(7/8):804-812.
[11]UPADHYAY A,DAVE M.Robust and imperceptible color ima- ge watermarking for telemedicine applications[C]∥International Conference on Computing,Communication and Automation(IEEE).2017:1104-1109.
[12]HAMID M,WANG C.A simple image-adaptive watermarking algorithm with blind extraction[C]∥International Conference on Systems,Signals and Image Processing(IEEE).2016:1-4.
[13]LOGANATHAN A,KALIYAPERUMAL G.An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system[M].Oxford:Pergamon Press,2016.
[14]ZHU G,ZHANG J L.Adaptive robust watermarking algorithm based on SVD and wavelet packet transform[J].Application Research of Computers,2013,30(4):1230-1233.(in Chinese)
[15]LIU S,PAN Z,SONG H.Digital image watermarking method based on DCT and fractal encoding[J].Iet Image Processing,2017,11(10):815-821.
[16]PATIL H M,RINDHE B U.Study and overview of combined NSCT-DCT digital image watermarking[C]∥International Conference on Global Trends in Signal Processing.Information Computing and Communication(IEEE),2017:302-307.
[17]FATHIMA N K,CHITRA P.A robust encryption and digital watermarking scheme for dicom images using quaternions and DWT-SVD[C]∥Online International Conference on Green Engineering and Technologies(IEEE).2017:1-6.
[18]WANG X Y,LI L,LI H F,et al.A Blind Watermark Decoder in DT CWT Domain using Multivariate Bessel K Form Distribution[J].Chinese Journal of Computers,2017,40:1-15.(in Chinese)
[19]WANG D C,TIAN C C,CHEN B J.Dual watermarking for co- lor images based on 4D quaternion frequency domain[J].Journal of Jilin University (Engineering and Technology Edition),2015,45(4):1336-1346.(in Chinese)
[20]LIU X L,LIN C C,YUAN S M.Blind dual watermarking for color images’ authentication and copyright protection[J].IEEE Transactions on Circuits & Systems for Video Technology,2016,PP(99):1
[1] CHEN Da-shuang, LI Ying-shan, WU Hong. Self-adaptive EM Phase Noise Suppression Algorithm in F-OFDM System [J]. Computer Science, 2019, 46(2): 68-75.
[2] WANG Hai-long, TIAN You-liang and YIN Xin. Blockchain-based Big Data Right Confirmation Scheme [J]. Computer Science, 2018, 45(2): 15-19, 24.
[3] ZHANG Ying-jie, ZHU Xue-feng. Review of Pattern Driven Software Architecture Design [J]. Computer Science, 2018, 45(11A): 48-52.
[4] LOU Hao-feng, ZHANG Duan. Gaussian Process Assisted CMA-ES Application in Medical Image Registration [J]. Computer Science, 2018, 45(11A): 234-237,262.
[5] YANG Meng. Evaluation Model of Vector Map Watermarking Algorithms Based on Set Pair Analysis [J]. Computer Science, 2017, 44(Z11): 357-361.
[6] ZHANG Chun-yun, QIN Peng-da and YIN Yi-long. Self-adaptation Multi-gram Weight Learning Strategy for Sentence Representation Based on Convolutional Neural Network [J]. Computer Science, 2017, 44(1): 60-64.
[7] ZHANG Ai-ying and NI Chong-jia. Research on Background Model Adaptation for Acoustic Event Detection and Classification Based on Acoustic Surveillance System [J]. Computer Science, 2016, 43(9): 310-314.
[8] ZHANG Yu-hong, CHEN Wei and HU Xue-gang. Self-adaptation Classification for Incomplete Labeled Text Data Stream [J]. Computer Science, 2016, 43(12): 179-182, 194.
[9] ZHANG Yan-hua and MA Xiao-hu. Robust Watermarking Algorithm Based on Fractional Fourier Transform and Spread Transform Dither Modulation [J]. Computer Science, 2016, 43(11): 200-204.
[10] LI Gui-sen, CHEN Jian-ping, MA Hai-ying and YANG Fang-xing. Method for Text Watermarking Based on Subject-verb Encoding [J]. Computer Science, 2015, 42(Z11): 374-377.
[11] PENG Le JIN Cong. Digital Watermarking Algorithm for Android Smart Phones [J]. Computer Science, 2015, 42(7): 85-90.
[12] ZHOU Ya-lan and XU Zhi. Self-adaptive Differential Evolution with Multi-mutation Strategies [J]. Computer Science, 2015, 42(6): 247-250, 255.
[13] WANG Shen-wen, ZHANG Wen-sheng, DING Li-xin, XIE Cheng-wang and GUO Zhao-lu. Research on Parameter Self-selection Strategy of Differential Evolution [J]. Computer Science, 2015, 42(11): 256-259.
[14] MENG Juan, HU Gu-yu, PAN Zhi-song and ZHOU Yu-huan. Research and Perspective on Domain Adaptation Learning Algorithms [J]. Computer Science, 2015, 42(10): 7-12, 34.
[15] LI Hao and LI Hong-chang. Geometric Attack Resisting Double-watermarking Algorithm Based on CS-SIFT [J]. Computer Science, 2014, 41(Z11): 263-267.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .