Semi-fragile Image Watermarking Algorithm Based on Region-Segmentation

Full Text (PDF, 429KB), PP.59-66

Views: 0 Downloads: 0

Author(s)

Shengbing Che 1,* Bin Ma 1 Jinkai Luo 1 Shaojun Yu 1

1. College of computer science Central South University of Forestry & Technology Hunan Changsha 410004, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2009.01.08

Received: 9 Jul. 2009 / Revised: 5 Aug. 2009 / Accepted: 8 Sep. 2009 / Published: 8 Oct. 2009

Index Terms

Semi-fragile watermarking, human visual features model, region-segmentation, quantized central limit theorem, coefficient redressal, restore probability

Abstract

In order to improve the invisibility and the robustness of semi-fragile watermarking, the paper first brings up the idea which embedding watermark based on the attacks’ characteristic, brings forward the region segmentation operator and the image-segmentation embedding method, puts forward the characteristic and its representation in DWT transform domain based on visual features model, and brings forward the quantized central limit theorem which applies to adjusting the coefficients in general transform domain. These all make semi-fragile watermarking embedded through dynamic quantization achieve the greatest robustness. It gives wavelet transform domain coefficient redressal operator and the best restoration probability of the pixel value adjusting in experiments when the images were under attack. It leads up to a better invisibility of carrier image, a better robustness to the image processing, such as JPEG compression, noise adding, filtering, and the larger amount of embedded information. What’s more, it can ascertain the position of vicious attack exactly.

Cite This Paper

Shengbing Che,Bin Ma,Jinkai Luo,Shaojun Yu, "Semi-fragile Image Watermarking Algorithm Based on Region-Segmentation", IJIGSP, vol.1, no.1, pp.59-66, 2009. DOI: 10.5815/ijigsp.2009.01.08

Reference

[1]Lu C s, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Transactions on Image Processing, 2001, 10(10): 1579-1592.

[2]FAN Jian-kun,CAI Xiang-yun,HUANG Wei-hua.A Semi-fragile Watermarking for Image Authentication Based on JPEG[J].Journal of kunming Metallurgy College, 2006,03.

[3]Fridrich J. Security of fragile authentication watermarks with localization[A]. In: Proceedings of SPIE Photonic West Electronic Imaging, 2002, security and watermarking of Multimedia Contents[C], San Jose, California, 2002, 4675:691-700.

[4]Queluz M P. Spatial watermark for image content authentication[J]. Journal of Electronic imaging, 2002, 11(2):275-285.

[5]Cox I J, Miller M I. The first 50 years of electronics watermarking[J]. Journal of Applied Signal Processing, 2002, 56(2):126-132.

[6]GUO Yue,CHENG Jingyun. Semi-frangile watermark system based on content authentication and blind reconstruction [J].Journal of Shanghai Maritime University, 2005,04.

[7]Wang Xiang-yang, Yang Hong-ying, Wu Jun. New Semi-Fragile Watermarking Based on Adaptive Quantization [J]. Mini-micro Systems, 2006,05.

[8]Zhang J, Zhang C T. Digital watermarking techniques for image authentication[J]. Journal of Image and Graphics, 2003, 8(4):367-373.

[9]Guo J Y, Lu C S, Liao H Y M. Mean quantization based fragile watermarking for image authentication[J]. Optical Engineering, 2001, 40(7):1396-1408.

[10]Ekici O, Sankur B, Akcay M. Comparative assessment of semi fragile watermarking methods[J]. Journal of Electronic Imaging, 2004, 13(1):209-216.

[11]Wang X Y, Yang H Y, Chen K L, Zhao H. A new semi-fragile image watermarking based on visual masking[J]. Journal of Image andGraphics,2005, 10(12):1548-1553.

[12]Lewis A S, Knowles G. Image compression using the 2-D wavelet transformation[J]. IEEE Transactions on Image Processing, 1992, 1(4):244-250.

[13]Wang Jiangqing; Research on the Wavelet Transform in Image Compression [J]. Journal of Wuhan University of Technology, 2002,06.

[14]Zhang Zhuancheng, Zhang Dianfu, Yan Xiaoping. A Robust Image Blind Watermarking Algorithm Based on Adaptive Quantization Step in DWT [J]. Journal of Image and Graphics, 2006, 11(6):840-847.

[15]Li Xine, Wang Ke, Cui Yanqiu. A WPT and DCT Based Bi-watermarking Algorithm[J]. Journal of Image and Graphics, 2007, 12(1):61-67.

[16]Li, J. Photo graphy image database[EB/OL]. http:// www.stat.psu.edu/~jiali/index.download.html