Volume 37, Issue 10 pp. 7281-7299
RESEARCH ARTICLE

Digital watermarking method for image feature point extraction and analysis

Chun Shan

Chun Shan

School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China

Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai), Zhuhai, China

Search for more papers by this author
Siyi Zhou

Siyi Zhou

School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China

Search for more papers by this author
Ziyi Zhang

Ziyi Zhang

School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China

Search for more papers by this author
Mianjie Li

Corresponding Author

Mianjie Li

School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China

Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China

Correspondence Mianjie Li, School of Electronics and Information, Guangdong Polytechnic Normal University, 510665 Guangzhou, China.

Email: [email protected]

Search for more papers by this author
First published: 18 April 2022
Citations: 11

Abstract

Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information-hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.

CONFLICTS OF INTEREST

The authors declare no conflicts of interest.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.