Computer Science ›› 2018, Vol. 45 ›› Issue (10): 178-182, 216.doi: 10.11896/j.issn.1002-137X.2018.10.033

• Information Security • Previous Articles     Next Articles

Adaptive Blind Watermarking Algorithm Based on Sub-block Segmentation

LIU Wei1,2, CHENG Cong-cong2, PEI Meng-li2, SHE Wei1,2   

  1. School of Software and Applied Technology,Zhengzhou University,Zhengzhou 450000,China 1
    Collaborative Innovation Center for Internet Healthcare,Zhengzhou University,Zhengzhou 450000,China 2
  • Received:2018-07-15 Online:2018-11-05 Published:2018-11-05

Abstract: To improve the robustness of watermarking,this paper proposed an adaptive full-blind watermarking algorithm based on sub-block segmentation (ABWASS).In the embedding of watermark,it embeds the adaptive watermark according to the characteristic matrix of the host image and integrates the key information of the watermark into the LH2 sub-band by using the improved 2-phase DWT,so as to obtain the watermarked image with dual watermarks.In the process of watermark extraction,firstly it separates key information for blocking and then gets the characteristic matrix by DCT to extract the watermark.The embedding of key information for blocking makes this proposed algorithm be a full-blind watermarking.Experimental results show that the proposed algorithm performs well in most conventional attacks and geometric attacks and performs better in all mixed attacks with the maximum increment of 2.7%,and it also has good invisibility and practicability.

Key words: Digital watermarking, Sub-block region segmentation, Fully blind detection, Adaptation

CLC Number: 

  • TP309.7
[1]GAUR S,SRIVASTAVA V K.Robust embedding of improved Arnold transformed watermark in digital images using RDWT -SVD[C]∥Fourth International Conference on Parallel,Distri-buted and Grid Computing(IEEE).2017:563-568.
[2]DONG S,LI J,LIU S.Frequency domain digital watermark algorithm implemented in spatial domain based on correlation coefficient and quadratic DCT transform[C]∥International Conference on Progress in Informatics and Computing(IEEE).2017:596-600.
[3]REN K Q,ZANG D D,WU F.Adaptive Robust Image Watermarking Based on DCT and Hamming Code[J].Opto-Electronic Engineering,2016,43(11):54-61.(in Chinese)
任克强,张丹丹,吴帆.融合DCT和汉明码的自适应鲁棒图像水印[J].光电工程,2016,43(11):54-61.[4]SU Q,CHEN B.A novel blind color image watermarking using upper Hessenberg matrix[J].AEU-International Journal of Electronics and Communications,2017,78:64-71.
[5]YE T Y.Perfectly blind image watermarking scheme with multi-purpose based on region segment for sub-block and self-embedding technology[J].Journal on Communications,2013,34(3):148-156.(in Chinese)
叶天语.基于子块区域分割和自嵌入技术的全盲多功能图像水印算法[J].通信学报,2013,34(3):148-156.
[6]SINGH D,SINGH S K.DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection[J].Multimedia Tools & Applications,2017,76(1):13001-13024.
[7]HE H J,ZHANG J S.Chaos-based scramble self-embedding watermarking algorithm[J].Journal on Communications,2006,27(7):80-86.(in Chinese)
和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86.
[8]ANDALIBI M,CHANDLER D M.Digital Image Watermarking via Adaptive Logo Texturization[J].IEEE Transactions onIma-ge Processing,2015,24(12):5060-5073.
[9]SHANG F,WANG H Q,ZHAO M.A Watermarking Algorithm against Rotation Based on DCT[C]∥Proceedings of CIHW.2010.(in Chinese)
尚飞,王慧琴,赵敏.DCT域抗旋转攻击水印算法[C]∥全国信息隐藏暨多媒体信息安全学术大会.2010.
[10]SHI H,LI M,FANG L.A robust digital image watermarking based on adaptive multifunctional scheme[J].Optik-Internatio-nal Journal for Light and Electron Optics,2015,126(7/8):804-812.
[11]UPADHYAY A,DAVE M.Robust and imperceptible color ima- ge watermarking for telemedicine applications[C]∥International Conference on Computing,Communication and Automation(IEEE).2017:1104-1109.
[12]HAMID M,WANG C.A simple image-adaptive watermarking algorithm with blind extraction[C]∥International Conference on Systems,Signals and Image Processing(IEEE).2016:1-4.
[13]LOGANATHAN A,KALIYAPERUMAL G.An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system[M].Oxford:Pergamon Press,2016.
[14]ZHU G,ZHANG J L.Adaptive robust watermarking algorithm based on SVD and wavelet packet transform[J].Application Research of Computers,2013,30(4):1230-1233.(in Chinese)
朱光,张军亮.基于SVD和小波包分解的自适应鲁棒水印算法[J].计算机应用研究,2013,30(4):1230-1233.
[15]LIU S,PAN Z,SONG H.Digital image watermarking method based on DCT and fractal encoding[J].Iet Image Processing,2017,11(10):815-821.
[16]PATIL H M,RINDHE B U.Study and overview of combined NSCT-DCT digital image watermarking[C]∥International Conference on Global Trends in Signal Processing.Information Computing and Communication(IEEE),2017:302-307.
[17]FATHIMA N K,CHITRA P.A robust encryption and digital watermarking scheme for dicom images using quaternions and DWT-SVD[C]∥Online International Conference on Green Engineering and Technologies(IEEE).2017:1-6.
[18]WANG X Y,LI L,LI H F,et al.A Blind Watermark Decoder in DT CWT Domain using Multivariate Bessel K Form Distribution[J].Chinese Journal of Computers,2017,40:1-15.(in Chinese)
王向阳,李丽,李海芳,等.基于二元BKF统计建模的双树复数小波域数字水印检测算法[J].计算机学报,2017,40:1-15.
[19]WANG D C,TIAN C C,CHEN B J.Dual watermarking for co- lor images based on 4D quaternion frequency domain[J].Journal of Jilin University (Engineering and Technology Edition),2015,45(4):1336-1346.(in Chinese)
王定成,田翠翠,陈北京.基于四维四元数频域的彩色图像双重水印算法[J].吉林大学学报(工学版),2015,45(4):1336-1346.
[20]LIU X L,LIN C C,YUAN S M.Blind dual watermarking for color images’ authentication and copyright protection[J].IEEE Transactions on Circuits & Systems for Video Technology,2016,PP(99):1
[1] CHEN Da-shuang, LI Ying-shan, WU Hong. Self-adaptive EM Phase Noise Suppression Algorithm in F-OFDM System [J]. Computer Science, 2019, 46(2): 68-75.
[2] WANG Hai-long, TIAN You-liang and YIN Xin. Blockchain-based Big Data Right Confirmation Scheme [J]. Computer Science, 2018, 45(2): 15-19, 24.
[3] ZHANG Ying-jie, ZHU Xue-feng. Review of Pattern Driven Software Architecture Design [J]. Computer Science, 2018, 45(11A): 48-52.
[4] LOU Hao-feng, ZHANG Duan. Gaussian Process Assisted CMA-ES Application in Medical Image Registration [J]. Computer Science, 2018, 45(11A): 234-237,262.
[5] YANG Meng. Evaluation Model of Vector Map Watermarking Algorithms Based on Set Pair Analysis [J]. Computer Science, 2017, 44(Z11): 357-361.
[6] ZHANG Chun-yun, QIN Peng-da and YIN Yi-long. Self-adaptation Multi-gram Weight Learning Strategy for Sentence Representation Based on Convolutional Neural Network [J]. Computer Science, 2017, 44(1): 60-64.
[7] ZHANG Ai-ying and NI Chong-jia. Research on Background Model Adaptation for Acoustic Event Detection and Classification Based on Acoustic Surveillance System [J]. Computer Science, 2016, 43(9): 310-314.
[8] ZHANG Yu-hong, CHEN Wei and HU Xue-gang. Self-adaptation Classification for Incomplete Labeled Text Data Stream [J]. Computer Science, 2016, 43(12): 179-182, 194.
[9] ZHANG Yan-hua and MA Xiao-hu. Robust Watermarking Algorithm Based on Fractional Fourier Transform and Spread Transform Dither Modulation [J]. Computer Science, 2016, 43(11): 200-204.
[10] LI Gui-sen, CHEN Jian-ping, MA Hai-ying and YANG Fang-xing. Method for Text Watermarking Based on Subject-verb Encoding [J]. Computer Science, 2015, 42(Z11): 374-377.
[11] PENG Le JIN Cong. Digital Watermarking Algorithm for Android Smart Phones [J]. Computer Science, 2015, 42(7): 85-90.
[12] ZHOU Ya-lan and XU Zhi. Self-adaptive Differential Evolution with Multi-mutation Strategies [J]. Computer Science, 2015, 42(6): 247-250, 255.
[13] WANG Shen-wen, ZHANG Wen-sheng, DING Li-xin, XIE Cheng-wang and GUO Zhao-lu. Research on Parameter Self-selection Strategy of Differential Evolution [J]. Computer Science, 2015, 42(11): 256-259.
[14] MENG Juan, HU Gu-yu, PAN Zhi-song and ZHOU Yu-huan. Research and Perspective on Domain Adaptation Learning Algorithms [J]. Computer Science, 2015, 42(10): 7-12, 34.
[15] LI Hao and LI Hong-chang. Geometric Attack Resisting Double-watermarking Algorithm Based on CS-SIFT [J]. Computer Science, 2014, 41(Z11): 263-267.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .