Level-direction decomposition analysis with a focus on image watermarking framework
M. F. KAZEMI, M. A. POURMINA, A. H. MAZINAN
Level-direction decomposition analysis with a focus on image watermarking framework
This research addresses the new level-direction decomposition in the area of image watermarking as the further development of investigations. The main process of realizing a watermarking framework is to generate a watermarked image with a focus on contourlet embedding representation. The approach performance is evaluated through several indices including the peak signal-to-noise ratio and structural similarity, whereby a set of attacks are carried out using a module of simulated attacks. The obtained information is analyzed through a set of images, using different color models, to enable the calculation of normal correlation. The module of the inverse of contourlet embedding representation is correspondingly employed to obtain the present watermarked image, as long as a number of original images are applied to a scrambling module, to represent the information in disorder. This allows us to evaluate the performance of the proposed approach by analyzing a complicated system, where a decision making system is designed to find the best level and the corresponding direction regarding contourlet embedding representation. The results are illustrated in appropriate level-direction decomposition. The key contribution lies in using a new integration of a set of subsystems, employed based upon the novel mechanism in contourlet embedding representation, in association with the decision making system. The presented approach is efficient compared with state-of-the-art approaches, under a number of serious attacks. A number of benchmarks are obtained and considered along with the proposed framework outcomes. The results support our ideas.
Level-direction decomposition analysis / Watermarking framework / Contourlet embedding representation / Scrambling module / Simulated attacks
[1] |
Abdallah, H.A., Ghazy, R.A., Kasban, H.,
|
[2] |
Agarwal, C., Mishra, A., Sharma, A., 2013. Gray-scale image watermarking using GA-BPN hybrid network. J. Vis. Commun. Image Represent., 24(7):1135–1146. http://dx.doi.org/10.1016/j.jvcir.2013.07.007
|
[3] |
Agarwal, C., Mishra, A., Sharma, A., 2015. A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture. Egypt. Inform. J., 16(1):83–102. http://dx.doi.org/10.1016/j.eij.2015.01.002
|
[4] |
Ali, M., Ahn, C.W., 2015. Comments on “Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm”. Exp. Syst. Appl., 42(5):2392–2394. http://dx.doi.org/10.1016/j.eswa.2014.10.045
|
[5] |
Ali, M., Ahn, C.W., Pant, M.,
|
[6] |
Al-Otum, H.M., 2014. Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J. Vis. Commun. Image Represent., 25(5): 1064–1081. http://dx.doi.org/10.1016/j.jvcir.2013.12.017
|
[7] |
Cai, N., Zhu, N.N., Weng, S.W.,
|
[8] |
Chen, B.J., Coatrieux, G., Chen, G.,
|
[9] |
Chen, H.Y., Zhu, Y.S., 2012. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique. J. Zhejiang Univ.-Sci. C (Comput. & Electron.), 13(8):573–584. http://dx.doi.org/10.1631/jzus.C1100338
|
[10] |
Dadkhah, S., Manaf, A.A., Hori, Y.,
|
[11] |
Dinh, D.L., Lim, M.J., Thang, N.D.,
|
[12] |
Do, M.N., Vetterli, M., 2001. Pyramidal directional filter banks and curvelets. Proc. Int. Conf. on Image Processing. http://dx.doi.org/10.1109/ICIP.2001.958075
|
[13] |
Guo, J.M., Prasetyo, H., 2014. False-positive-free SVD-based image watermarking. J. Vis. Commun. Image Represent., 25(5):1149–1163. http://dx.doi.org/10.1016/j.jvcir.2014.03.012
|
[14] |
Lei, B.Y., Tan, E.L., Chen, S.P.,
|
[15] |
Makbol, N.M., Khoo, B.E., 2014. A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Dig. Signal Process., 33:134–147. http://dx.doi.org/10.1016/j.dsp.2014.06.012
|
[16] |
Mishra, A., Agarwal, C., Sharma, A.,
|
[17] |
Niu, P.P., Wang, X.Y., Yang, Y.P.,
|
[18] |
Ouyang, J., Coatrieux, G., Chen, B.,
|
[19] |
Qi, M., Li, B.Z., Sun, H.F., 2015. Image watermarking using polar harmonic transform with parameters in SL (2, R). Signal Process. Image Commun., 31:161–173. http://dx.doi.org/10.1016/j.image.2014.12.009
|
[20] |
Shao, Z.H., Duan, Y.P., Coatrieux, G.,
|
[21] |
Su, Q.T., Niu, Y.G., Wang, G.,
|
[22] |
Tao, H., Li, C.M., Zain, J.M.,
|
[23] |
Tsougenis, E.D., Papakostas, G.A., Koulouriotis, D.E.,
|
[24] |
Tsougenis, E.D., Papakostas, G.A., Koulouriotis, D.E.,
|
[25] |
Wang, H., Ho, A.T.S., Li, S.J., 2014. A novel image restoration scheme based on structured side information and its application to image watermarking. Signal Process. Image Commun., 29(7):773–787. http://dx.doi.org/10.1016/j.image.2014.05.001
|
[26] |
Wang, X.Y., Niu, P.P., Yang, H.Y.,
|
[27] |
Yadav, A.K., Vashisth, S., Singh, H.,
|
[28] |
Yang, H.Y., Zhang, Y., Wang, P.,
|
[29] |
Yu, M., Wang, J., Jiang, G.Y.,
|
[30] |
Zhan, Y.Z., Li, Y.T., Wang, X.Y.,
|
/
〈 | 〉 |