Chaotic system and QR factorization based robust digital image watermarking algorithm

Wei Song , Jian-jun Hou , Zhao-hong Li , Liang Huang

Journal of Central South University ›› 2011, Vol. 18 ›› Issue (1) : 116 -124.

PDF
Journal of Central South University ›› 2011, Vol. 18 ›› Issue (1) : 116 -124. DOI: 10.1007/s11771-011-0668-8
Article

Chaotic system and QR factorization based robust digital image watermarking algorithm

Author information +
History +
PDF

Abstract

In order to protect copyright of digital images, a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed. The host images were firstly divided into blocks with same size, then QR factorization was performed on each block. Pseudorandom circular chain (PCC) generated by logistic mapping (LM) was applied to select the embedding blocks for enhancing the security of the scheme. The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts. Watermark extraction procedure was performed without the original cover image. The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques, especially when the image is attacked by cropping, noise pollution and so on. Analysis and discussion on robustness and security issues were also presented.

Keywords

digital watermarking / QR factorization / pseudorandom circular chain / logistic mapping

Cite this article

Download citation ▾
Wei Song, Jian-jun Hou, Zhao-hong Li, Liang Huang. Chaotic system and QR factorization based robust digital image watermarking algorithm. Journal of Central South University, 2011, 18(1): 116-124 DOI:10.1007/s11771-011-0668-8

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

HoA. T. S., ZhuX. Z., ShenJ., MarzilianoP.. Fragile watermarking based on encoding of the zeroes of the z-transform [J]. IEEE Trans on Information Forensics and Security, 2008, 3(3): 567-569

[2]

PhanR. C. W.. Tampering with a watermarking-based image authentication scheme [J]. Pattern Recognition, 2008, 41(11): 3493-3496

[3]

NiR.-r., RuanQ.-q., ZhaoYao.. Pinpoint authentication watermarking based on a chaotic system [J]. Forensic Science International, 2008, 179(1): 5 4-62

[4]

SongW., HouJ.-j., LiZ.-hong.. SVD and pseudorandom circular chain based watermarking for image authentication [J]. Journal of Beijing Jiaotong University, 2008, 32(2): 71-75

[5]

AltunO., SharmaG., CelikM. U., BockoF. M.. A set theoretic framework for watermarking and its application to semi-fragile tamper detection[J]. IEEE Trans on Information Forensics & Security, 2006, 1(4): 479-492

[6]

MahdianB., SaicS.. Blind authentication using periodic properties of interpolation [J]. IEEE Trans on Information Forensics & Security, 2008, 3(3): 529-538

[7]

SangJ., MohammadS. A.. Fragility and robustness of binary-phase-only-filter-based fragile/semi-fragile digital image watermarking [J]. IEEE Trans on Instrument & Measurement, 2008, 57(3): 595-606

[8]

ZhangH.-b., YangChen.. Image authentication scheme based on JPEG invariant and semi-fragile watermarking [J]. Journal of Beijing University of Technology, 2004, 30(2): 214-218

[9]

SunR., SunH., YaoT.-ren.. A SVD and quantization based semi-fragile watermarking technique for image authentication [C]. Proc IEEE ICSP2002, 6th Internal Conference on Signal Processing, 2002, Beijing, IEEE: 1952-1955

[10]

ZhuC.-x., ChenZ.-gang.. A novel spatial domain digital watermarking algorithm based on chaotic map [J]. Journal of Central South University of Technology: Science and Technology, 2005, 36(2): 272-276

[11]

ChangC.-c., TsaiP., LinC.-chen.. SVD-based digital image watermarking scheme [J]. Pattern Recognition Letters, 2005, 26(6): 1577-1586

[12]

TsuiT. K., ZhangX.-p., AndroutsosD.. Color image watermarking using multidimensional Fourier transforms [J]. IEEE Trans on Information Forensics & Security, 2008, 3(1): 16-26

[13]

BriassouliA., StrintzisM. G.. Locally optimum nonlinearities for DCT watermark detection [J]. IEEE Trans on Image Processing, 2004, 13(12): 1604-1617

[14]

ByunK., LeeS., KimH. A.. A watermarking method using quantization and statistical characteristics of wavelet transform [C]. Proc IEEE PDCAT2005, Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006, Dalian, IEEE: 689-693

[15]

LiE.-p., LiangH.-qing.. Blind image watermarking scheme based on wavelet tree quantization robust to geometric attacks [C]. Proc IEEE WCICA2006, Sixth World Congress on Intelligent Control and Automation, 2006, Dalian, IEEE: 10256-10260

[16]

LinW.-h., HorongS.-j.. KAO Tzong-wann, FAN Ping-zhi, LEE Cheng-ling, PAN Yi. An efficient watermarking method based on significant difference of wavelet coefficient quantization [J]. IEEE Trans on Multimedia, 2008, 10(5): 746-757

[17]

KangX.-gui., HuangJ.-wu., ZengW.-jun.. Improving robustness of quantization-based image watermarking via adaptive recover [J]. IEEE Trans on Multimedia, 2008, 10(6): 953-959

[18]

ZhuC.-x., ChenZ.-gang.. A security multipurpose image watermarking system model and algorithm [J]. Journal of Image and Graphics, 2008, 13(5): 894-899

[19]

AhnC. J.. Parallel detection algorithm using multiple QR decompositions with permuted channel matrix for SDM/OFDM [J]. IEEE Trans on Vehicular Technology, 2008, 57(4): 2578-2582

AI Summary AI Mindmap
PDF

124

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/