Functional Watermarking Algorithm Based on Contourlet Transform and ECC

Article Preview

Abstract:

User-defined functional watermarking algorithm was presented based on contourlet transform field and Ellipse Curve Cryptography(ECC) spatial field. First the edge and direction information of image was obtained by contourlet transform, the discrete functional watermarking was embedded into high frequency parts, and the embedding data was avoided to the image edge. ECC encrypts embedding coordinate’s series. Watermarking changes little original image because of less function data, and attends to zero watermarking algorithms. The results show that the algorithm is invisible to watermarking and also has enough robustness to noise and cropping attack.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

187-193

Citation:

Online since:

September 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R B Wolfgang, C I Podilchuk, E J Delp. Perceptual Watermarks for Digital Images and Video [J]. Proceedings of the IEEE (S0018-9219), 1999, 87(7): 1108-1126.

DOI: 10.1109/5.771067

Google Scholar

[2] HE Hong-jie, CHEN Fan. On the Security of the Self-Embedding Watermarking Scheme[J]. ACTA ELECTRONICA SINICA. 2007, 35(3): 557-562.

Google Scholar

[3] Ingermar J Cox , Joe Kilian , Tom Leighton , et al . Secure-Spread-spectrum watermarking for images , audio and video. Proc. ICIP'96 , 3 : 243 —246.

DOI: 10.1109/icip.1996.560429

Google Scholar

[4] Huang Jiwu , Shi Yun Q , Shi Yi. Embedding image water-marks in DC components. IEEE Tans. On Circuits and Systems f or Video Technology , 2000 , 10 : 974 —979.

DOI: 10.1109/76.867936

Google Scholar

[5] Juan R Hernández , Martín Amado , Fernando Pérez-González. DCT-domain watermarking techniques for stillimages : detector performance analysis and a new structure. I EEE Tans. on Image Processing , 2000 , 9 (1) : 55 —68.

DOI: 10.1109/83.817598

Google Scholar

[6] Kundur D , Hatzinakos D. A robust digital image water-marking method using wavelet-based fusion. In : Proc. I EEE Internat . Conf . Image Processing , 1997 , 1 : 544 —547.

DOI: 10.1109/icip.1997.647970

Google Scholar

[7] Piva A , Barni M , Bartolini F. Copyright protection of digital images by means of frequency domain watermarking. In : Proc S PI E , Mathematics of Data/ Image Coding , Compression , and Encryption , 1998 , 3456 : 25 —35.

DOI: 10.1117/12.330369

Google Scholar

[8] Liu Xu-chong, WANG Jian-xin, LUO Yong, A Watermarking Algorithm for Image Authentication Based on Statistical Model and Directional Wavelet[J], Journal of Hunan University(Natural Sciences), 2010, 37(11), 77-81.

Google Scholar

[9] WANG Jian ping , LV Shu wang, Image Watermarking Algorithm Based on Singular Value Decomposition and Contourlet Transform[J], CHINESE JOURNAL OF SENSORS AND ACTUATORS 2009, 22(6): 883-886.

Google Scholar

[10] Do Minh N , Vetterli Martin. Contourlets : A new directional multiresolution image representation. Signals , Systems and Computers , 2002 , 1 : 497-501.

DOI: 10.1109/acssc.2002.1197232

Google Scholar

[11] LI Ji-guo, YU Chun-wu , Mathematic Fundamental of Information Secrecy[M], WuHan: WuHan University Press, 2006:139-146.

Google Scholar