Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2015 (2015), Article ID 370615, 8 pages
http://dx.doi.org/10.1155/2015/370615
Research Article

A Robust Watermarking Scheme Based on Maximum Wavelet Coefficient Modification and Optimal Threshold Technique

School of Electronic and Information Engineering, Zhongyuan University of Technology, Zhengzhou 450007, China

Received 15 April 2015; Revised 12 June 2015; Accepted 16 July 2015

Academic Editor: René Cumplido

Copyright © 2015 Chunlei Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar · View at Scopus
  2. W. Zeng and B. Liu, “A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images,” IEEE Transactions on Image Processing, vol. 8, no. 11, pp. 1534–1548, 1999. View at Publisher · View at Google Scholar · View at Scopus
  3. J.-L. Liu, D.-C. Lou, M.-C. Chang, and H.-K. Tso, “A robust watermarking scheme using self-reference image,” Computer Standards & Interfaces, vol. 28, no. 3, pp. 356–367, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002. View at Publisher · View at Google Scholar · View at Scopus
  5. L.-T. Ko, J.-E. Chen, H.-C. Hsin, Y.-S. Shieh, and T.-Y. Sung, “Haar-wavelet-based just noticeable distortion model for transparent watermark,” Mathematical Problems in Engineering, vol. 2012, Article ID 635738, 14 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. B.-Z. Li and Y.-P. Shi, “Image watermarking in the linear canonical transform domain,” Mathematical Problems in Engineering, vol. 2014, Article ID 645059, 9 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Lu, T. Qu, and H. R. Karimi, “Novel iris biometric watermarking based on singular value decomposition and discrete cosine transform,” Mathematical Problems in Engineering, vol. 2014, Article ID 926170, 6 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Kutter, F. Jordan, and F. Bossen, “Digital watermarking of color images using amplitude modulation,” Journal of Electronic Imaging, vol. 7, no. 2, pp. 326–332, 1998. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Kutter and S. Winkler, “A vision-based masking model for spread-spectrum image watermarking,” IEEE Transactions on Image Processing, vol. 11, no. 1, pp. 16–25, 2002. View at Publisher · View at Google Scholar · View at Scopus
  10. Y.-S. Juang, L.-T. Ko, J.-E. Chen, Y.-S. Shieh, T.-Y. Sung, and H. C. Hsin, “Histogram modification and wavelet transform for high performance watermarking,” Mathematical Problems in Engineering, vol. 2012, Article ID 164869, 14 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking,” Signal Processing, vol. 66, no. 3, pp. 357–372, 1998. View at Publisher · View at Google Scholar · View at Scopus
  12. D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” in Proceedings of the International Conference on Image Processing, vol. 3, pp. 544–547, 1997.
  13. M. Rabbani and R. Joshi, “An overview of the JPEG 2000 still image compression standard,” Signal Processing: Image Communication, vol. 17, no. 1, pp. 3–48, 2002. View at Publisher · View at Google Scholar · View at Scopus
  14. S.-H. Wang and Y.-P. Lin, “Wavelet tree quantization for copyright protection watermarking,” IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 154–165, 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. B. K. Lien and W. H. Lin, “A watermarking method based on maximum distance wavelet tree quantization,” in Proceedings of the 19th Conference on Computer Vision, Graphics and Image Processing, 2006.
  16. G.-D. Wu and P.-H. Huang, “Image watermarking using structure based wavelet tree quantization,” in Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS '07), pp. 315–319, IEEE, July 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. M.-J. Tsai and C.-L. Lin, “Constrained wavelet tree quantization for image watermarking,” in Proceedings of the IEEE International Conference on Communications (ICC '07), pp. 1350–1354, IEEE, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. M.-J. Tsai, C.-T. Lin, and J. Liu, “A wavelet-based watermarking scheme using double wavelet tree energy modulation,” in Proceedings of the 15th IEEE International Conference on Image Processing (ICIP '08), pp. 417–420, IEEE, San Diego, Calif, USA, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. W.-H. Lin, Y.-R. Wang, and S.-J. Horng, “A wavelet-tree-based watermarking method using distance vector of binary cluster,” Expert Systems with Applications, vol. 36, no. 6, pp. 9869–9878, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. R. Shijie and S. Xin, “A wavelet-tree-based watermarking method using fast ICA,” in Proceedings of the 2nd International Symposium on Computational Intelligence and Design (ISCID '09), vol. 2, pp. 162–164, IEEE, Changsha, China, December 2009. View at Publisher · View at Google Scholar
  21. M. J. Tsai, “Security enhancement by adopting the chaotic system for wavelet tree based digital image watermarking,” in Proceedings of the 16th IEEE International Conference on Image Processing (ICIP '09), pp. 3661–3664, IEEE, November 2009.
  22. R.-S. Run, S.-J. Horng, W.-H. Lin, T.-W. Kao, P. Fan, and M. K. Khan, “An efficient wavelet-tree-based watermarking method,” Expert Systems with Applications, vol. 38, no. 12, pp. 14357–14366, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. F. Davoine, “Comparison of two wavelet based image watermarking schemes,” in Proceedings of the International Conference on Image Processing (ICIP '00), vol. 3, pp. 682–685, IEEE, Vancouver, Canada, September 2000. View at Publisher · View at Google Scholar · View at Scopus
  24. G. Zhang, S. Wang, and Q. Wen, “An adaptive block-based blind watermarking algorithm,” in Proceedings of the 7th International Conference on Signal Processing (ICSP '04), pp. 2294–2297, IEEE, August 2004. View at Publisher · View at Google Scholar
  25. F. Khelifi, A. Bouridane, F. Kurugollu, and A. I. Thompson, “An improved wavelet-based image watermarking technique,” in Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance (AVSS '05), pp. 588–592, IEEE, Como, Italy, 2005. View at Publisher · View at Google Scholar
  26. W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, and Y. Pan, “An efficient watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Transactions on Multimedia, vol. 10, no. 5, pp. 746–757, 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. W.-H. Lin, Y.-R. Wang, S.-J. Horng, T.-W. Kao, and Y. Pan, “A blind watermarking method using maximum wavelet coefficient quantization,” Expert Systems with Applications, vol. 36, no. 9, pp. 11509–11516, 2009. View at Publisher · View at Google Scholar · View at Scopus
  28. Y.-R. Wang, W.-H. Lin, and L. Yang, “An intelligent watermarking method based on particle swarm optimization,” Expert Systems with Applications, vol. 38, no. 7, pp. 8024–8029, 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. V. S. Verma and R. K. Jha, “Improved watermarking technique based on significant difference of lifting wavelet coefficients,” Signal, Image and Video Processing, 2014. View at Publisher · View at Google Scholar · View at Scopus
  30. H.-H. Tsai, Y.-J. Jhuang, and Y.-S. Lai, “An SVD-based image watermarking in wavelet domain using SVR and PSO,” Applied Soft Computing, vol. 12, no. 8, pp. 2442–2453, 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. M. J. Sahraee and S. Ghofrani, “A robust blind watermarking method using quantization of distance between wavelet coefficients,” Signal, Image and Video Processing, vol. 7, no. 4, pp. 799–807, 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. B. Ma, Y. Wang, C. Li, Z. Zhang, and D. Huang, “A robust watermarking scheme based on dual quantization of wavelet significant difference,” in Proceedings of the Pacific-Rim Conference on Multimedia (PCM '12), 2012.
  33. P. Meerwald, C. Koidl, and A. Uhl, “Attack on watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Transactions on Multimedia, vol. 11, no. 5, pp. 1037–1041, 2009. View at Publisher · View at Google Scholar · View at Scopus
  34. J. Zhang, L. Tian, and H.-M. Tai, “A new watermarking method based on chaotic maps,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '04), vol. 2, pp. 939–942, IEEE, Taipei, Taiwan, June 2004. View at Publisher · View at Google Scholar · View at Scopus
  35. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  36. The USI-SIPI image database, volume 3, http://sipi.usc.edu/database/.