A Robust Image Watermarking Method based on Contourlet Transform for Correcting Geometric Attacks

  • Authors

    • Abhinaya M
    • A Umamakeswari
    2018-04-25
    https://doi.org/10.14419/ijet.v7i2.24.11992
  • Discrete Wavelet Transform (DWT), Geometric attacks, Contourlet Transform, Image Watermarking, Singular Value Decomposition (SVD).
  • A watermarking technique is proposed using Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Singular Value Decomposition (SVD) techniques to implement information hiding. Embedding can be done by dividing the host image into four rectangular segments which are non-overlapping called sub-images using hybrid scheme. Redundancy reduces cropping attack. The main aim is to reduce the effect of geometric bouts, such as rotation, translation, and affine translation using synchronization technique. Watermarks can be a binary random sequence of different lengths. Data replication and hamming code are two error modification methods utilized in the proposed scheme. Achieved results show comparable robustness against geometric attacks and signal processing. Contourlet transform can be used to improve the visual feature of the image. After embedding the image or data, contourlet transform is applied in the frequency domain to improve robustness. The optimal mapping function is obtained using contourlet transform which increases Peak Signal to Noise Ratio (PSNR) and hiding capacity with low distortion.

     

     

  • References

    1. [1] D. Kundur and D. Hatzinakos, “Digital watermarking using multiresolution wavelet decomposition,†Acoust. Speech Signal Process. 1998. Proc. 1998 IEEE Int. Conf., vol. 5, pp. 2969–2972, vol.5, 1998.

      [2] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Content adaptive watermarking based on a stochastic multiresolution image modeling,†Eur. Signal Process. Conf., vol. 2015–March, March, 2000.

      [3] P. Tao, A. M. Eskicioglu, and I. Science, “A robust multiple watermarking scheme in the Discrete Wavelet Transform domain,†Opt. East 2004 Symp. Internet Multimed. Manag. Syst. V Conf. Philadelphia, PA, pp. 133–144, 2004.

      [4] S. Pereira and T. Pun, “Fast Robust Template Matching for A ne Resistant Image Watermarks,†pp. 1–12.

      [5] V. Solachidis and I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,†IEEE Trans. Image Process., vol. 10, no. 11, pp. 1741–1753, 2001.

      [6] S. Pereira, J. J. K. O. Ruanaidh, F. Deguillaume, G. Csurka, and T. Pun, “Template based recovery of Fourier-based watermarks using log-polarnand log-log maps,†Proc. IEEE Int. Conf. Multimed. Comput. Syst., vol. 1, pp. 870–874, 1999.

      [7] B. J. Falkowski and L.-S. Lim, “Image watermarking using the complex Hadamard transform,†Proc. Int. Symp. Circuits Syst., vol. 4, p. IV--573-IV-576, 2000.

      [8] S. Craver, N. Memon, B.-L. Yeo, and M. Yeung, “On the invertibility of invisible watermarking techniques,†IEEE Int. Conf. Image Process., pp. 234–250, 1997.

      [9] V. M. Potdar, H. Song, and C. Elizabeth, “A survey of digital image watermarking techniques,†2005 3rd IEEE Int. Conf. Ind. Informatics, INDIN, vol. 2005, pp. 709–716, 2005.

      [10] T.Padmapriya and V.Saminadan, “Utility based Vertical Handoff Decision Model for LTE-A networksâ€, International Journal of Computer Science and Information Security, ISSN 1947-5500, vol.14, no.11, November 2016.

      [11] A. Najih, S. A. R. Al-Haddad, A. R. Ramli, S. J. Hashim, and M. A. Nematollahi, “Digital image watermarking based on angle quantization in discrete contourlet transform,†J. King Saud Univ. - Comput. Inf. Sci., vol. 29, no. 3, pp. 288–294, 2017.

      [12] L. Chen and J. Zhao, “Robust contourlet-based blind watermarking for depth-image-based rendering 3D images,†Signal Process. Image Commun., vol. 54, August 2016, pp. 56–65, 2017.

      [13] H. Sadreazami, M. O. Ahmad, and M. N. S. Swamy, “A study on image denoising in contourlet domain using the alpha-stable family of distributions,†Signal Processing, vol. 128, pp. 459–473, 2016.

      [14] Q. Zhang, W. Lu, and J. Weng, “Joint image splicing detection in DCT and Contourlet transform domain,†J. Vis. Commun. Image Represent., vol. 40, Part B, pp. 449–458, 2016.

      [15] H. Y. Patil, A. G. Kothari, and K. M. Bhurchandi, “Expression invariant face recognition using local binary patterns and contourlet transform,†Optik (Stuttg)., vol. 127, no. 5, pp. 2670–2678, 2016.

      [16] D. Li, L. Zhang, J. Yang, and W. Su, “Optik Research on wavelet-based contourlet transform algorithm for adaptive optics image denoising,†Opt. - Int. J. Light Electron Opt., vol. 127, no. 12, pp. 5029–5034, 2016.

      [17] S. Biswas and J. Sil, “An efficient face recognition method using contourlet and curvelet transform,†J. King Saud Univ. - Comput. Inf. Sci., 2017.

      [18] D. Anandhi and S. Valli, “An algorithm for multi-sensor image fusion using maximum a posteriori and nonsubsampled contourlet transform R,†Comput. Electr. Eng., vol. 65, pp. 139–152, 2018.

      [19] X. Zhang, X. Zhang, M. Xu, H. Zhang, and X. Jiang, “Phase unwrapping in digital holograp0hy based on non-subsampled contourlet transform,†Opt. Commun., vol. 407, September 2017, pp. 367–374, 2018.

      [20] S. Fazli and M. Moeini, “Optik A robust image watermarking method based on DWT , DCT and SVD using a new technique for correction of main geometric attacks,†Opt. - Int. J. Light Electron Opt., vol. 127, no. 2, pp. 964–972, 2016.

      [21] T. Padmapriya and V. Saminadan, “Improving Throughput for Downlink Multi user MIMO-LTE Advanced Networks using SINR approximation and Hierarchical CSI feedbackâ€, International Journal of Mobile Design Network and Innovation- Inderscience Publisher, ISSN : 1744-2850 vol. 6, no.1, pp. 14-23, May 20 15.

      [22] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

  • Downloads

  • How to Cite

    M, A., & Umamakeswari, A. (2018). A Robust Image Watermarking Method based on Contourlet Transform for Correcting Geometric Attacks. International Journal of Engineering & Technology, 7(2.24), 24-28. https://doi.org/10.14419/ijet.v7i2.24.11992