Volume 49 Issue 1
Jan.  2023
Turn off MathJax
Article Contents
HU K,LI C,HU J P,et al. Robust multiple watermarking algorithm for color image via BEMD and DCT[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(1):165-176 (in Chinese) doi: 10.13700/j.bh.1001-5965.2021.0214
Citation: HU K,LI C,HU J P,et al. Robust multiple watermarking algorithm for color image via BEMD and DCT[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(1):165-176 (in Chinese) doi: 10.13700/j.bh.1001-5965.2021.0214

Robust multiple watermarking algorithm for color image via BEMD and DCT

doi: 10.13700/j.bh.1001-5965.2021.0214
Funds:  The Science & Technology Development Fund of Tianjin Education Commission for Higher Education (2018KJ222); The Open Funding Projection of State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (BUAA-VR-16KF-23,BUAA-VR-17KF-04)
More Information
  • Corresponding author: E-mail:wangxiaochao18@163.com
  • Received Date: 22 Apr 2021
  • Accepted Date: 06 Jun 2021
  • Available Online: 16 Jan 2023
  • Publish Date: 15 Jun 2021
  • In order to solve the problem that the color image watermarking algorithm has low algorithm fault tolerance, and the size matching problem between the host image and the watermark image during embedding, and to improve the robustness of the algorithm in attack resistance, this paper proposes a robust multiple water-marking algorithm for color images based on bi-dimensional empirical mode decomposition (BEMD) and discrete cosine transform (DCT). Firstly, Arnold transform is used to scramble three binary watermark images. Then, the RGB channels of the color host image are then decomposed using BEMD in addition to derive the intrinsic modal functions (IMFs) and residues for each channel. The first IMF of each channel is selected as the watermark embedding layer and recorded as IMF1. After that, each channel is divided into non-overlapping sub-blocks, and DCT is performed on each sub-blocks. Finally, the scrambled binary watermark image is repeatedly embedded in the middle bands coefficients of each channel sub-block after a Zigzag scan, and the inverse Zigzag scan and inverse DCT are adopted to obtain the IMF1 after embedding watermark information in each channel, and then the remaining intrinsic modal functions and residues of each channel are used to reconstruct the color image after the watermark embedding. The watermark extraction is the inverse of the watermark embedding process. The algorithm in this paper can implement blind extraction of embedded watermarks. In the process of watermark extraction, the voting strategy is used to extract the repeatedly embedded watermarks, which enhances the fault tolerance of the algorithm. A large number of experimental results show that the peak signal-to-noise ratio (PSNR) of the host images is above 34 dB after several watermarks have been embedded on various sets of host photos, according to a vast number of experimental results, and the watermark images have a high degree of invisibility. The host images after embedding can be against various attacks such as large-scale cropping, salt and pepper noise, etc. The values of the extracted watermark images are all above 0.96, and some can reach 1, watermark images can be completely extracted and precisely recognized. Compared with a large number of existing color image watermarking algorithms, the color image watermarking algorithm proposed in this paper has a strong ability to resist various attacks, and the images after embedding watermarks have higher invisibility.

     

  • loading
  • [1]
    ATTAULLAH, SHAH T, JAMAL S S. An improved chaotic cryptosystem for image encryption and digital watermarking[J]. Wireless Personal Communications, 2020, 110(3): 1429-1442. doi: 10.1007/s11277-019-06793-1
    [2]
    THANKI R, DWIVEDI V, BORISAGAR K. A hybrid watermarking scheme with CS theory for security of multimedia data[J]. Journal of King Saud University-Computer and Information Sciences, 2019, 31(4): 436-451. doi: 10.1016/j.jksuci.2017.05.005
    [3]
    KARAJEH H, KHATIB T, RAJAB L, et al. A robust digital audio watermarking scheme based on DWT and Schur decomposition[J]. Multimedia Tools and Applications, 2019, 78(13): 18395-18418. doi: 10.1007/s11042-019-7214-3
    [4]
    LAKRISSI Y, SAAIDI A, ESSAHLAOUI A. Novel dynamic color image watermarking based on DWT-SVD and the human visual system[J]. Multimedia Tools and Applications, 2018, 77(11): 13531-13555. doi: 10.1007/s11042-017-4974-5
    [5]
    ABDULRAHMAN A K, OZTURK S. A novel hybrid DCT and DWT based robust watermarking algorithm for color images[J]. Multimedia Tools and Applications, 2019, 78(12): 17027-17049. doi: 10.1007/s11042-018-7085-z
    [6]
    ROY S, PAL A K. A blind DCT based color watermarking algorithm for embedding multiple watermarks[J]. AEU-International Journal of Electronics and Communications, 2017, 72: 149-161.
    [7]
    SU Q T, LIU Y H, LIU D C, et al. A new watermarking scheme for colour image using QR decomposition and ternary coding[J]. Multimedia Tools and Applications, 2019, 78(7): 8113-8132. doi: 10.1007/s11042-018-6632-y
    [8]
    SU Q T, YUAN Z H, LIU D C. An approximate schur decomposition-based spatial domain color image watermarking method[J]. IEEE Access, 2019, 7: 4358-4370. doi: 10.1109/ACCESS.2018.2888857
    [9]
    LIU D C, YUAN Z H, SU Q T. A blind color image watermarking scheme with variable steps based on Schur decomposition[J]. Multimedia Tools and Applications, 2020, 79(11-12): 7491-7513. doi: 10.1007/s11042-019-08423-1
    [10]
    SU Q T, ZHANG X F, WANG G. An improved watermarking algorithm for color image using Schur decomposition[J]. Soft Computing, 2020, 24(1): 445-460. doi: 10.1007/s00500-019-03924-5
    [11]
    HUANG N E, SHEN Z, LONG S R, et al. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis[J]. Proceedings of the Royal Society of London Series A:Mathematical, Physical and Engineering Sciences, 1998, 454(1971): 903-995. doi: 10.1098/rspa.1998.0193
    [12]
    李翠芸, 曹潇男, 姬红兵, 等. 基于偏微分方程的快速二维经验模态分解方法及其应用[J]. 计算机辅助设计与图形学学报, 2014, 26(7): 1143-1150.

    LI C Y, CAO X N, JI H B, et al. A fast bidimensional empirical mode decomposition based on partial differential equation and its application on image processing[J]. Journal of Computer-Aided Design & Computer Graphics, 2014, 26(7): 1143-1150(in Chinese).
    [13]
    DING S F, DU P, ZHAO X Y, et al. BEMD image fusion based on PCNN and compressed sensing[J]. Soft Computing, 2019, 23(20): 10045-10054. doi: 10.1007/s00500-018-3560-8
    [14]
    CHEN Y Q, ZHANG L N, ZHAO B B. Identification of the anomaly component using BEMD combined with PCA from element concentrations in the Tengchong tin belt, SW China[J]. Geoscience Frontiers, 2019, 10(4): 1561-1576. doi: 10.1016/j.gsf.2018.09.015
    [15]
    AN F P, LIU Z W. Bi-dimensional empirical mode decomposition (BEMD) algorithm based on particle swarm optimization-fractal interpolation[J]. Multimedia Tools and Applications, 2019, 78(12): 17239-17264. doi: 10.1007/s11042-018-7097-8
    [16]
    MA X M, ZHOU X W, AN F P. Bi-dimensional empirical mode decomposition (BEMD) and the stopping criterion based on the number and change of extreme points[J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11(2): 623-633. doi: 10.1007/s12652-018-0955-4
    [17]
    NUNES J C, BOUAOUNE Y, DELECHELLE E, et al. Image analysis by bidimensional empirical mode decomposition[J]. Image and Vision Computing, 2003, 21(12): 1019-1026. doi: 10.1016/S0262-8856(03)00094-5
    [18]
    REN G H, HAN J N, FU J H, et al. Asymmetric multiple-image interference cryptosystem using discrete cosine transform and conditional decomposition[J]. Optical Review, 2020, 27(1): 1-8. doi: 10.1007/s10043-019-00552-0
    [19]
    MOGHADDASI Z, JALAB H A, NOOR R M. Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients[J]. Neural Computing and Applications, 2019, 31(11): 7867-7877. doi: 10.1007/s00521-018-3586-y
    [20]
    ZHANG L N, WEI D Y. Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization[J]. Multimedia Tools and Applications, 2019, 78(19): 28003-28023. doi: 10.1007/s11042-019-07902-9
    [21]
    ABBAS N A. Image encryption based on independent component analysis and arnold’s cat map[J]. Egyptian Informatics Journal, 2016, 17(1): 139-146. doi: 10.1016/j.eij.2015.10.001
    [22]
    LI X S, LI T Y, WU J, et al. Joint image compression and encryption based on sparse Bayesian learning and bit-level 3D Arnold cat maps[J]. PLoS One, 2019, 14(11): 0224382. doi: 10.1371/journal.pone.0224382
    [23]
    XIE J H, WU D L, WANG J, et al. The analysis of additive noise of thermal test low-frequency cable fault detection based on M sequence correlation algorithm[J]. Cluster Computing, 2019, 22(4): 9303-9312.
    [24]
    王小超, 胡坤, 胡建平. 结合BEMD与Hilbert曲线的重复嵌入图像水印算法[J]. 计算机辅助设计与图形学学报, 2020, 32(2): 287-296.

    WANG X C, HU K, HU J P. Repeated embedding algorithm for image watermarking based on BEMD and Hilbert curve[J]. Journal of Computer-Aided Design & Computer Graphics, 2020, 32(2): 287-296(in Chinese).
    [25]
    WANG X C, HU K, HU J P, et al. Robust and blind image watermarking via circular embeddingand bidimensional empirical mode decomposition[J]. The Visual Computer, 2020, 36(10-12): 2201-2214. doi: 10.1007/s00371-020-01909-2
    [26]
    HONG D, CHO H, LEE S, et al. Volumetric image reconstruction in a dental panoramic imaging system with a limited-angle zigzag scan geometry[J]. Journal of the Korean Physical Society, 2013, 62(2): 333-338. doi: 10.3938/jkps.62.333
    [27]
    HUYNH-THU Q, GHANBARI M. Scope of validity of PSNR in image/video quality assessment[J]. Electronics Letters, 2008, 44(13): 800. doi: 10.1049/el:20080522
    [28]
    SU Q T, WANG G, JIA S L, et al. Embedding color image watermark in color image based on two-level DCT[J]. Signal, Image and Video Processing, 2015, 9(5): 991-1007. doi: 10.1007/s11760-013-0534-2
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(18)  / Tables(2)

    Article Metrics

    Article views(405) PDF downloads(45) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return