Table of Contents Author Guidelines Submit a Manuscript
Discrete Dynamics in Nature and Society
Volume 2016 (2016), Article ID 3263587, 15 pages
http://dx.doi.org/10.1155/2016/3263587
Research Article

A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD

1Department of Natural and Applied Science, Glocal University, Saharanpur-247122, India
2Department of Computer Engineering, Sungkyunkwan University, Suwon-440746, Republic of Korea
3Department of Applied Science and Engineering, IIT Roorkee-247667, India
4Laboratoire Images, Signaux et Systèmes Intelligents (LiSSi, EA 3956), Université Paris-Est Créteil Val de Marne, 61 avenue du Général de Gaulle, 94010 Créteil, France

Received 23 July 2015; Revised 4 October 2015; Accepted 15 October 2015

Academic Editor: David Arroyo

Copyright © 2016 Musrrat Ali et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002. View at Publisher · View at Google Scholar · View at Scopus
  3. M. L. Miller, I. J. Cox, J.-P. M. G. Linnartz, and T. Kalker, “A review of watermarking principles and practices,” in Digital Signal Processing in Multimedia Systems, K. K. Parhi and and T. Nishitani, Eds., pp. 461–485, Marcell Dekker, 1999. View at Google Scholar
  4. E. Hussein and M. A. Belal, “Digital watermarking techniques, applications and attacks applied to digital media: a survey,” International Journal of Engineering Research and Technology, vol. 1, no. 7, pp. 1–8, 2012. View at Google Scholar
  5. A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, “A recent survey of reversible watermarking techniques,” Information Sciences, vol. 279, pp. 251–272, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. L.-D. Li and B.-L. Guo, “Localized image watermarking in spatial domain resistant to geometric attacks,” AEU: International Journal of Electronics and Communications, vol. 63, no. 2, pp. 123–131, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. Q. Su, Y. Niu, Q. Wang, and G. Sheng, “A blind color image watermarking based on DC component in the spatial domain,” Optik, vol. 124, no. 23, pp. 6255–6260, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 488–497, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. S. S. Jamal, T. Shah, and I. Hussain, “An efficient scheme for digital watermarking using chaotic map,” Nonlinear Dynamics, vol. 73, no. 3, pp. 1469–1474, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. S. D. Lin, S.-C. Shie, and J. Y. Guo, “Improving the robustness of DCT-based image watermarking against JPEG compression,” Computer Standards and Interfaces, vol. 32, no. 1-2, pp. 54–60, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Cedillo-Hernandez, M. Cedillo-Hernandez, M. Garcia-Vazquez, M. Nakano-Miyatake, H. Perez-Meana, and A. Ramirez-Acosta, “Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT,” Signal Processing, vol. 97, pp. 40–54, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. B. Chen, G. Coatrieux, G. Chen, X. Sun, J. L. Coatrieux, and H. Shu, “Full 4-D quaternion discrete Fourier transform based watermarking for color images,” Digital Signal Processing, vol. 28, no. 1, pp. 106–119, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Lang and Z.-G. Zhang, “Blind digital watermarking method in the fractional Fourier transform domain,” Optics and Lasers in Engineering, vol. 53, pp. 112–121, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. W. Lu, H. Lu, and F.-L. Chung, “Feature based robust watermarking using image normalization,” Computers and Electrical Engineering, vol. 36, no. 1, pp. 2–18, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. E. H. Elshazly, O. S. Faragallah, A. M. Abbas et al., “Robust and secure fractional wavelet image watermarking,” Signal, Image and Video Processing, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. L. Li, H.-H. Xu, C.-C. Chang, and Y.-Y. Ma, “A novel image watermarking in redistributed invariant wavelet domain,” Journal of Systems and Software, vol. 84, no. 6, pp. 923–929, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. N. Liu, H. Li, H. Dai, D. Guo, and D. Chen, “Robust blind image watermarking based on chaotic mixtures,” Nonlinear Dynamics, vol. 80, no. 3, pp. 1329–1355, 2015. View at Publisher · View at Google Scholar
  18. M.-Q. Fan, H.-X. Wang, and S.-K. Li, “Restudy on SVD-based watermarking scheme,” Applied Mathematics and Computation, vol. 203, no. 2, pp. 926–930, 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. A. A. Mohammad, A. Alhaj, and S. Shaltaf, “An improved SVD-based watermarking scheme for protecting rightful ownership,” Signal Processing, vol. 88, no. 9, pp. 2158–2180, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  20. Q. Su, Y. Niu, H. Zou, and X. Liu, “A blind dual color images watermarking based on singular value decomposition,” Applied Mathematics and Computation, vol. 219, no. 16, pp. 8455–8466, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. H.-T. Hu and L.-Y. Hsu, “Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression,” Computers and Electrical Engineering, vol. 41, pp. 52–63, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. N. M. Makbol and B. E. Khoo, “Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition,” AEU—International Journal of Electronics and Communications, vol. 67, no. 2, pp. 102–112, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. N. M. Makbol and B. E. Khoo, “A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition,” Digital Signal Processing, vol. 33, pp. 134–147, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. X.-Y. Wang, Y.-P. Yang, and H.-Y. Yang, “Invariant image watermarking using multi-scale Harris detector and wavelet moments,” Computers & Electrical Engineering, vol. 36, no. 1, pp. 31–44, 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. X. Wu and W. Sun, “Robust copyright protection scheme for digital images using overlapping DCT and SVD,” Applied Soft Computing Journal, vol. 13, no. 2, pp. 1170–1182, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. P.-P. Zheng, J. Feng, Z. Li, and M.-Q. Zhou, “A novel SVD and LS-SVM combination algorithm for blind watermarking,” Neurocomputing, vol. 142, pp. 520–528, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, “Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm,” Expert Systems with Applications, vol. 41, no. 17, pp. 7858–7867, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. M. Ali and C. W. Ahn, “An optimized watermarking technique based on self-adaptive de in DWT-SVD transform domain,” Signal Processing, vol. 94, no. 1, pp. 545–556, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. M. Ali, C. W. Ahn, and M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Optik, vol. 125, no. 1, pp. 428–434, 2014. View at Publisher · View at Google Scholar · View at Scopus
  30. M. Ali, C. W. Ahn, M. Pant, and P. Siarry, “An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony,” Information Sciences, vol. 301, pp. 44–60, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Ali, C. W. Ahn, and P. Siarry, “Differential evolution algorithm for the selection of optimal scaling factors in image watermarking,” Engineering Applications of Artificial Intelligence, vol. 31, pp. 15–26, 2014. View at Publisher · View at Google Scholar · View at Scopus
  32. S. H. Amiri and M. Jamzad, “Robust watermarking against print and scan attack through efficient modeling algorithm,” Signal Processing: Image Communication, vol. 29, no. 10, pp. 1181–1196, 2014. View at Publisher · View at Google Scholar · View at Scopus
  33. J.-M. Guo and H. Prasetyo, “False-positive-free SVD-based image watermarking,” Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1149–1163, 2014. View at Publisher · View at Google Scholar · View at Scopus
  34. C.-C. Lai, “An improved SVD-based watermarking scheme using human visual characteristics,” Optics Communications, vol. 284, no. 4, pp. 938–944, 2011. View at Publisher · View at Google Scholar · View at Scopus
  35. B. Lei, D. Ni, S. Chen, T. Wang, and F. Zhou, “Optimal image watermarking scheme based on chaotic map and quaternion wavelet transform,” Nonlinear Dynamics, vol. 78, no. 4, pp. 2897–2907, 2014. View at Publisher · View at Google Scholar · View at Scopus
  36. R.-S. Run, S.-J. Horng, J.-L. Lai, T.-W. Kao, and R.-J. Chen, “An improved SVD-based watermarking technique for copyright protection,” Expert Systems with Applications, vol. 39, no. 1, pp. 673–689, 2012. View at Publisher · View at Google Scholar · View at Scopus
  37. M. Ali and C. W. Ahn, “Comments on ‘optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm’,” Expert Systems with Applications, vol. 42, no. 5, pp. 2392–2394, 2015. View at Publisher · View at Google Scholar · View at Scopus
  38. J.-M. Guo and H. Prasetyo, “Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU—International Journal of Electronics and Communications, vol. 68, no. 9, pp. 816–834, 2014. View at Publisher · View at Google Scholar · View at Scopus
  39. G. C.-W. Ting, “Ambiguity attacks on the Ganic-Eskicioglu robust DWT-SVD Image watermarking scheme,” in Information Security and Cryptology—ICISC 2005, D. H. Won and S. Kim, Eds., vol. 3935 of Lecture Notes in Computer Science, pp. 378–388, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  40. X.-P. Zhang and K. Li, “Comments on ‘an SVD-based watermarking scheme for protecting rightful ownership’,” IEEE Transactions on Multimedia, vol. 7, no. 3, pp. 593–594, 2005. View at Publisher · View at Google Scholar
  41. C. Jain, S. Arora, and P. K. Panigrahi, “A reliable SVD based watermarking schem,” http://arxiv.org/abs/0808.0309.
  42. A. Bakhshandeh and Z. Eslami, “An authenticated image encryption scheme based on chaotic maps and memory cellular automata,” Optics and Lasers in Engineering, vol. 51, no. 6, pp. 665–673, 2013. View at Publisher · View at Google Scholar · View at Scopus