Digital watermarking method for image feature point extraction and analysis
Chun Shan
School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China
Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai), Zhuhai, China
Search for more papers by this authorSiyi Zhou
School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China
Search for more papers by this authorZiyi Zhang
School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China
Search for more papers by this authorCorresponding Author
Mianjie Li
School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
Correspondence Mianjie Li, School of Electronics and Information, Guangdong Polytechnic Normal University, 510665 Guangzhou, China.
Email: [email protected]
Search for more papers by this authorChun Shan
School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China
Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai), Zhuhai, China
Search for more papers by this authorSiyi Zhou
School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China
Search for more papers by this authorZiyi Zhang
School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China
Search for more papers by this authorCorresponding Author
Mianjie Li
School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
Correspondence Mianjie Li, School of Electronics and Information, Guangdong Polytechnic Normal University, 510665 Guangzhou, China.
Email: [email protected]
Search for more papers by this authorAbstract
Multimedia information (e.g., photos) is subject to numerous attacks when extensively dispersed, excellent stealth and robustness play a critical role in information concealment. Next, to further improve the imperceptibility of the generated images, we introduce an information embedding based on feature extraction, since the feature points themselves are robust as strong corner points in the images. We will perform specific practical applications in information-hiding scenarios, such as ticket anticounterfeiting, copyright protection, tampering hints, and covert marking. As a result, while assuring the accuracy of hidden data, assault resistance must also be addressed. In this paper, a strategy for watermark embedding utilizing image feature points is proposed. In principle, the embedding and extraction of digital watermarks are achieved in the transform domain by discrete wavelet transform processing to make digital images more robust than before. The effectiveness of the algorithm is analyzed by experimental data, in which different wavelet bases are used. To check the robustness of the watermarking algorithm, various attacks are performed on watermarked images.
CONFLICTS OF INTEREST
The authors declare no conflicts of interest.
REFERENCES
- 1Kumar C, Singh AK, Kumar P. A recent survey on image watermarking techniques and its application in e-governance. Multimedia Tools Appl. 2018; 77(3): 3597-3622.
- 2Lai C-C. A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Process. 2011; 21(4): 522-527.
- 3Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication. Proc IEEE. 1999; 87(7): 1167-1180.
- 4Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia. 2002; 4(1): 121-128.
- 5Singh AK. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools Appl. 2017; 76(6): 8881-8900.
- 6Zhou NR, Luo AW, Zou WP. Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimedia Tools Appl. 2019; 78(2): 2507-2523.
- 7Zhou NR, Hou WMX, Wen RH, et al. Imperceptible digital watermarking scheme in multiple transform domains. Multimedia Tools Appl. 2018; 77(23): 30251-30267.
- 8Pereira S, Voloshynoskiy S, Pun T. Optimal transform domain watermark embedding via linear programming. Signal Process. 2001; 81(6): 1251-1260.
- 9Su Q, Chen B. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018; 22(1): 91-106.
- 10Verma VS, Jha RK, Ojha A. Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst Appl. 2015; 42(21): 8184-8197.
- 11Roy S, Pal AK. A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU—Int J Electron Commun. 2017; 72: 149-161.
- 12Lang J, Zhang Z-G. Blind digital watermarking method in the fractional Fourier transform domain. Opt Lasers Eng. 2014; 53: 112-121.
- 13Ernawan F, Kabir MN. A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access. 2018; 6: 20464-20480.
- 14Kang X, Huang J, Shi YQ, et al. A DWT–DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol. 2003; 13(8): 776-786.
- 15Rajani D, Kumar PR. An optimized blind watermarking scheme based on principal component analysis in redundant discrete wavelet domain. Signal Process. 2020; 172:107556.
- 16Hamidi M, ElHaziti M, Cherifi H, et al. Hybrid blind robust image watermarking technique based on DFT–DCT and Arnold transform. Multimedia Tools Appl. 2018; 77(20): 27181-27214.
- 17Saadi S, Merrad A, Benziane A. Novel secured scheme for blind audio/speech norm-space watermarking by Arnold algorithm. Signal Process. 2019; 154: 74-86.
- 18Zear A, Singh AK, Kumar P. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl. 2018; 77(4): 4863-4882.
- 19Liu Y, Tang S, Liu R, et al. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl. 2018; 97: 95-105.
- 20Hu H-T, Hsu L-Y. Collective blind image watermarking in DWT–DCT domain with adaptive embedding strength governed by quality metrics. Multimedia Tools Appl. 2017; 76(5) .
10.1007/s11042-016-3332-3 Google Scholar
- 21Chen L, Zhao J. Contourlet-based image and video watermarking robust to geometric attacks and compressions. Multimedia Tools Appl. 2018; 77(6): 7187-7204.
- 22Benedict SR, Kumar JS. Geometric shaped facial feature extraction for face recognition. In: 2016 IEEE International Conference on Advances in Computer Applications (ICACA). IEEE; 2016: 275-278.
- 23Kadhim HA, Araheemah WA. A method to improve corner detectors (Harris, Shi–Tomasi & FAST) using adaptive contrast enhancement filter. Periodicals Eng Nat Sci (PEN). 2020; 8(1): 508-515.
- 24Rublee E, Rabaud V, Konolige K, et al. ORB: an efficient alternative to SIFT or SURF. In: 2011 International Conference on Computer Vision. IEEE; 2011: 2564-2571.
- 25Rosten E, Drummond T. Machine learning for high-speed corner detection. In: Leonardis A, Bischof H, Pinz A, eds. European Conference on Computer Vision. Springer; 2006: 430-443.
- 26Harris C, Stephens M. A combined corner and edge detector. In: Alvey Vision Conference; 1988: 10-5244.
- 27Kale P, Singh K. A technical analysis of image stitching algorithm. Int J Comput Sci Inf Technol. 2015; 6(1): 284-288.
- 28Shi J. Good features to track. In: 1994 Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE; 1994: 593-600.
- 29Tommasini T, Fusiello A, Trucco E, et al. Making good features track better. In: Proceedings of the 1998 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No. 98CB36231); 1998: 178-183.
- 30Gong L-H, Tian C, Zou W-P, et al. Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain. Multimedia Tools Appl. 2021; 80(1): 439-461.
- 31Araghi TK, Abd Manaf A, Araghi SK. A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst Appl. 2018; 112: 208-228.
- 32Sripradha R, Deepa K. Robust and imperceptible digital image watermarking based on DWT–DCT-Schur. In: Thampi SM, Krishnan S, Hegde R M, Ciuonzo D, Hanne T, Kannan RJ, eds. International Symposium on Signal Processing and Intelligent Recognition Systems. Springer; 2020: 337-351.
- 33Sharif I, Khare S. Comparative analysis of Haar and Daubechies wavelet for hyper spectral image classification. Int Arch Photogramm Remote Sens Spatial Inf Sci. 2014; 40(8): 937.
10.5194/isprsarchives-XL-8-937-2014 Google Scholar
- 34Wang X, Gong G, Li N. Automated recognition of epileptic EEG states using a combination of Symlet wavelet processing, gradient boosting machine, and grid search optimizer. Sensors. 2019; 19(2): 219.
- 35Glowacz A. DC motor fault analysis with the use of acoustic signals, Coiflet wavelet transform, and K-nearest neighbor classifier. Arch Acoust. 2015; 40(3): 321-327.
- 36Savakar D, Ghuli A. Non-blind digital watermarking with enhanced image embedding capacity using DMeyer wavelet decomposition, SVD, and DFT. Pattern Recognit Image Anal. 2017; 27(3): 511-517.
10.1134/S1054661817030257 Google Scholar
- 37Batool SI, Waseem HM. A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimedia Tools Appl. 2019; 78(19): 27611-27637.
- 38Ambadekar SP, Jain J, Khanapuri J. Digital image watermarking through encryption and DWT for copyright protection. In: Bhattacharyya S, Mukherjee A, Bhaumik H, Das S, Yoshida K, eds. Recent Trends in Signal and Image Processing. Springer; 2019: 187-195.
10.1007/978-981-10-8863-6_19 Google Scholar
- 39Vaidya SP, Mouli PC. Adaptive digital watermarking for copyright protection of digital images in wavelet domain. Procedia Comput Sci. 2015; 58: 233-240.
10.1016/j.procs.2015.08.063 Google Scholar
- 40Peng F, Li X, Yang B. Adaptive reversible data hiding scheme based on integer transform. Signal Process. 2012; 92(1): 54-62.
- 41Veni M, Meyyappan T. Digital image watermark embedding and extraction using oppositional fruit Fly algorithm. Multimedia Tools Appl. 2019; 78(19): 27491-27510.
- 42Hashmi MF, Shukla RJ, Keskar AG. Platform independent real time copyright protection embedding and extraction algorithms on android and embedded framework. In: 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE; 2014: 000189-000194.
- 43Wu J-Y, Huang W-L, Xia-Hou W-M, et al. Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition. Multimedia Tools Appl. 2020; 79: 22727-22747.