Computer Science ›› 2018, Vol. 45 ›› Issue (10): 178-182.doi: 10.11896/j.issn.1002-137X.2018.10.033

• Information Security • Previous Articles     Next Articles

Adaptive Blind Watermarking Algorithm Based on Sub-block Segmentation

LIU Wei1,2, CHENG Cong-cong2, PEI Meng-li2, SHE Wei1,2   

  1. School of Software and Applied Technology,Zhengzhou University,Zhengzhou 450000,China 1
    Collaborative Innovation Center for Internet Healthcare,Zhengzhou University,Zhengzhou 450000,China 2
  • Received:2018-07-15 Online:2018-11-05 Published:2018-11-05

Abstract: To improve the robustness of watermarking,this paper proposed an adaptive full-blind watermarking algorithm based on sub-block segmentation (ABWASS).In the embedding of watermark,it embeds the adaptive watermark according to the characteristic matrix of the host image and integrates the key information of the watermark into the LH2 sub-band by using the improved 2-phase DWT,so as to obtain the watermarked image with dual watermarks.In the process of watermark extraction,firstly it separates key information for blocking and then gets the characteristic matrix by DCT to extract the watermark.The embedding of key information for blocking makes this proposed algorithm be a full-blind watermarking.Experimental results show that the proposed algorithm performs well in most conventional attacks and geometric attacks and performs better in all mixed attacks with the maximum increment of 2.7%,and it also has good invisibility and practicability.

Key words: Digital watermarking, Sub-block region segmentation, Fully blind detection, Adaptation

CLC Number: 

  • TP309.7
[1]GAUR S,SRIVASTAVA V K.Robust embedding of improved Arnold transformed watermark in digital images using RDWT -SVD[C]∥Fourth International Conference on Parallel,Distri-buted and Grid Computing(IEEE).2017:563-568.
[2]DONG S,LI J,LIU S.Frequency domain digital watermark algorithm implemented in spatial domain based on correlation coefficient and quadratic DCT transform[C]∥International Conference on Progress in Informatics and Computing(IEEE).2017:596-600.
[3]REN K Q,ZANG D D,WU F.Adaptive Robust Image Watermarking Based on DCT and Hamming Code[J].Opto-Electronic Engineering,2016,43(11):54-61.(in Chinese)
任克强,张丹丹,吴帆.融合DCT和汉明码的自适应鲁棒图像水印[J].光电工程,2016,43(11):54-61.[4]SU Q,CHEN B.A novel blind color image watermarking using upper Hessenberg matrix[J].AEU-International Journal of Electronics and Communications,2017,78:64-71.
[5]YE T Y.Perfectly blind image watermarking scheme with multi-purpose based on region segment for sub-block and self-embedding technology[J].Journal on Communications,2013,34(3):148-156.(in Chinese)
[6]SINGH D,SINGH S K.DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection[J].Multimedia Tools & Applications,2017,76(1):13001-13024.
[7]HE H J,ZHANG J S.Chaos-based scramble self-embedding watermarking algorithm[J].Journal on Communications,2006,27(7):80-86.(in Chinese)
[8]ANDALIBI M,CHANDLER D M.Digital Image Watermarking via Adaptive Logo Texturization[J].IEEE Transactions onIma-ge Processing,2015,24(12):5060-5073.
[9]SHANG F,WANG H Q,ZHAO M.A Watermarking Algorithm against Rotation Based on DCT[C]∥Proceedings of CIHW.2010.(in Chinese)
[10]SHI H,LI M,FANG L.A robust digital image watermarking based on adaptive multifunctional scheme[J].Optik-Internatio-nal Journal for Light and Electron Optics,2015,126(7/8):804-812.
[11]UPADHYAY A,DAVE M.Robust and imperceptible color ima- ge watermarking for telemedicine applications[C]∥International Conference on Computing,Communication and Automation(IEEE).2017:1104-1109.
[12]HAMID M,WANG C.A simple image-adaptive watermarking algorithm with blind extraction[C]∥International Conference on Systems,Signals and Image Processing(IEEE).2016:1-4.
[13]LOGANATHAN A,KALIYAPERUMAL G.An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system[M].Oxford:Pergamon Press,2016.
[14]ZHU G,ZHANG J L.Adaptive robust watermarking algorithm based on SVD and wavelet packet transform[J].Application Research of Computers,2013,30(4):1230-1233.(in Chinese)
[15]LIU S,PAN Z,SONG H.Digital image watermarking method based on DCT and fractal encoding[J].Iet Image Processing,2017,11(10):815-821.
[16]PATIL H M,RINDHE B U.Study and overview of combined NSCT-DCT digital image watermarking[C]∥International Conference on Global Trends in Signal Processing.Information Computing and Communication(IEEE),2017:302-307.
[17]FATHIMA N K,CHITRA P.A robust encryption and digital watermarking scheme for dicom images using quaternions and DWT-SVD[C]∥Online International Conference on Green Engineering and Technologies(IEEE).2017:1-6.
[18]WANG X Y,LI L,LI H F,et al.A Blind Watermark Decoder in DT CWT Domain using Multivariate Bessel K Form Distribution[J].Chinese Journal of Computers,2017,40:1-15.(in Chinese)
[19]WANG D C,TIAN C C,CHEN B J.Dual watermarking for co- lor images based on 4D quaternion frequency domain[J].Journal of Jilin University (Engineering and Technology Edition),2015,45(4):1336-1346.(in Chinese)
[20]LIU X L,LIN C C,YUAN S M.Blind dual watermarking for color images’ authentication and copyright protection[J].IEEE Transactions on Circuits & Systems for Video Technology,2016,PP(99):1
[1] YUAN Chen-hui, CHENG Chun-ling. Deep Domain Adaptation Algorithm Based on PE Divergence Instance Filtering [J]. Computer Science, 2020, 47(8): 151-156.
[2] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[3] SHI Chao-wei, MENG Xiang-ru, MA Zhi-qiang, HAN Xiao-yang. Virtual Network Embedding Algorithm Based on Topology Comprehensive Evaluation and Weight Adaptation [J]. Computer Science, 2020, 47(7): 236-242.
[4] TAN Jian-hao, YIN Wang, LIU Li-ming, WANG Yao-nan. Robust Long-term Adaptive Object Tracking Based onMulti-correlation Filtering Strategy [J]. Computer Science, 2020, 47(12): 169-176.
[5] YANG Pei-jian, WU Xiao-fu, ZHANG Suo-fei, ZHOU Quan. Semantic Segmentation Transfer Algorithm Based on Atrous Convolution Discriminator [J]. Computer Science, 2020, 47(11): 174-178.
[6] LI Fang,LI Zhi-hui,XU Jin-xiu,FAN Hao,CHU Xue-sen,LI Xin-liang. Research on Adaptation of CFD Software Based on Many-core Architecture of 100P Domestic Supercomputing System [J]. Computer Science, 2020, 47(1): 24-30.
[7] CHEN Da-shuang, LI Ying-shan, WU Hong. Self-adaptive EM Phase Noise Suppression Algorithm in F-OFDM System [J]. Computer Science, 2019, 46(2): 68-75.
[8] XU Shu-yan, HAN Li-xin, XU Guo-xia. Domain Adaptation Algorithm Based on Tensor Decomposition [J]. Computer Science, 2019, 46(12): 89-94.
[9] ZHAO Yun-tao, CHEN Jing-cheng, LI Wei-gang. Multi-objective Grey Wolf Optimization Hybrid Adaptive Differential Evolution Mechanism [J]. Computer Science, 2019, 46(11A): 83-88.
[10] HU Meng-yuan, HUANG Hong-yun, DING Zuo-hua. Ensemble Model for Software Defect Prediction [J]. Computer Science, 2019, 46(11): 176-180.
[11] WANG Hai-long, TIAN You-liang and YIN Xin. Blockchain-based Big Data Right Confirmation Scheme [J]. Computer Science, 2018, 45(2): 15-19.
[12] ZHANG Ying-jie, ZHU Xue-feng. Review of Pattern Driven Software Architecture Design [J]. Computer Science, 2018, 45(11A): 48-52.
[13] LOU Hao-feng, ZHANG Duan. Gaussian Process Assisted CMA-ES Application in Medical Image Registration [J]. Computer Science, 2018, 45(11A): 234-237.
[14] YANG Meng. Evaluation Model of Vector Map Watermarking Algorithms Based on Set Pair Analysis [J]. Computer Science, 2017, 44(Z11): 357-361.
[15] ZHANG Chun-yun, QIN Peng-da and YIN Yi-long. Self-adaptation Multi-gram Weight Learning Strategy for Sentence Representation Based on Convolutional Neural Network [J]. Computer Science, 2017, 44(1): 60-64.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .