CLC number: TP309.2
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2012-07-06
Cited: 10
Clicked: 9680
Hong-yuan Chen, Yue-sheng Zhu. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique[J]. Journal of Zhejiang University Science C, 2012, 13(8): 573-584.
@article{title="A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique",
author="Hong-yuan Chen, Yue-sheng Zhu",
journal="Journal of Zhejiang University Science C",
volume="13",
number="8",
pages="573-584",
year="2012",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.C1100338"
}
%0 Journal Article
%T A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique
%A Hong-yuan Chen
%A Yue-sheng Zhu
%J Journal of Zhejiang University SCIENCE C
%V 13
%N 8
%P 573-584
%@ 1869-1951
%D 2012
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.C1100338
TY - JOUR
T1 - A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique
A1 - Hong-yuan Chen
A1 - Yue-sheng Zhu
J0 - Journal of Zhejiang University Science C
VL - 13
IS - 8
SP - 573
EP - 584
%@ 1869-1951
Y1 - 2012
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.C1100338
Abstract: We propose a robust digital watermarking algorithm for copyright protection. A stable feature is obtained by utilizing QR factorization and discrete cosine transform (DCT) techniques, and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation (QIM) method. The combination of QR factorization, DCT, and QIM techniques guarantees the robustness of the algorithm. Furthermore, an embedding location selection method is exploited to select blocks with small modifications as the embedding locations. This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme. Several standard images were tested and the experimental results were compared with those of other published schemes. The results demonstrate that our proposed scheme can achieve not only better imperceptibility, but also stronger robustness against common signal processing operations and lossy compressions, such as filtering, noise addition, scaling, sharpening, rotation, cropping, and JPEG/JPEG2000 compression.
[1]Barni, M., Bartolini, F., Cappellini, V., Piva, A., 1998. A DCT-domain system for robust image watermarking. Signal Process., 66(3):357-372.
[2]Chandramouli, R., Nasir, M., Majid, R., 2002. Digital Watermarking. In: Hornak, J.P. (Ed.), Encyclopedia of Imaging Science and Technology. Wiley, New York, p.226-239.
[3]Chen, B., Wornell, G., 2001. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory, 47(4):1423-1443.
[4]Gupta, P.K., Shrivastava, S.K., 2010. Improved RST-Attacks Resilient Image Watermarking Based on Joint SVD-DCT. Int. Conf. on Computer and Communication Technology, p.46-51.
[5]Hu, Y., Wang, Z., Liu, H., Guo, G., 2011. A geometric distortion resilient image watermark algorithm based on DWT-DFT. J. Softw., 6(9):1805-1812.
[6]Huang, H., Yang, C., Hsu, W., 2010. A video watermarking technique based on pseudo-3-D DCT and quantization index modulation. IEEE Trans. Inf. Forens. Secur., 5(4):625-637.
[7]Lai, C.C., 2011a. An improved SVD-based watermarking scheme using human visual characteristics. Opt. Commun., 284(4):938-944.
[8]Lai, C.C., 2011b. A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Dig. Signal Process., 21(4):522-527.
[9]Liu, F., Han, K., Wang, C.Z., 2009. A Novel Blind Watermark Algorithm Based on SVD and DCT. IEEE Int. Conf. on Intelligent Computing and Intelligent Systems, p.283-286.
[10]Liu, J., Zhang, X., Sun, J., Lagunas, M.A., 2003. A Digital Watermarking Scheme Based on ICA Detection. 4th Int. Symp. on Independent Component Analysis and Blind Signal Separation, p.215-220.
[11]Mohammad, A.A., Alhaj, A., Shaltaf, S., 2008. An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Process., 88(9):2158-2180.
[12]Murillo-Fuentes, J.J., 2007. Independent component analysis in the blind watermarking of digital images. Neurocomputing, 70(16-18):2881-2890.
[13]Naderahmadian, Y., Hosseini-Khayat, S., 2010. Fast Watermarking Based on QR Decomposition in Wavelet Domain. 6th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, p.127-130.
[14]Phadikar, A., Maity, S.P., Verma, B., 2011. Region based QIM digital watermarking scheme for image database in DCT domain. Comput. Electr. Eng., 37(3):339-355.
[15]Rastegar, S., Namazi, F., Yaghmaie, K., Amir, A., 2011. Hybrid watermarking algorithm based on singular value decomposition and Radon transform. AEU Int. J. Electron. Commun., 65(7):658-663.
[16]Sakib, M.N., Alam, S.B., Sazzad, A.B.M.R., Shahnaz, C., Fattah, S.A., 2011. A Basic Digital Watermarking Algorithm in Discrete Cosine Transformation Domain. 2nd Int. Conf. on Intelligent Systems, Modelling and Simulation, p.419-421.
[17]Seo, Y., Kim, W., Suh, Y., Oh, W., Hwang, C., 2007. QIM Watermarking for Image with Two Adaptive Quantization Step-Sizes. 9th Int. Conf. on Advanced Communication Technology, p.797-800.
[18]Shen, Z.W., Liao, W.W., Shen, Y.N., 2009. Blind Watermarking Algorithm Based on Henon Chaos System and Lifting Scheme Wavelet. Int. Conf. on Wavelet Analysis and Pattern Recognition, p.308-313.
[19]Song, W., Hou, J., Li, Z., Huang, L., 2011. Chaotic system and QR factorization based robust digital image watermarking algorithm. J. Cent. South Univ. Technol., 18(1):116-124.
[20]Su, Q., Liu, X., Yang, W., 2009. A Watermarking Algorithm for Color Image Based on YIQ Color Space and Integer Wavelet Transform. Int. Conf. on Image Analysis and Signal Processing, p.70-73.
[21]Wang, W., Men, A., Chen, X., 2009. Robust Image Watermarking Scheme Based on Phase Features in DFT Domain and Generalized Radon Transformations. Int. Congress on Image and Signal Processing, p.1510-1514.
[22]Won, C.S., 2010. Boosting robustness against composite attacks for quantization index-modulation algorithms. J. Electron. Imag., 19(2):023010.
[23]Zeki, A.M., Manaf, A.A., Mahmod, S.S., 2011. High watermarking capacity based on spatial domain technique. Inf. Technol. J., 10(7):1367-1373.
Open peer comments: Debate/Discuss/Question/Opinion
<1>