A Robust Grayscale Watermarking Algorithm

Abstract:

Article Preview

In this paper, a novel robust grayscale watermarking algorithm based on Two-Levels DCT and SVD is proposed. The watermark signal is (32× 32 × 8) bit gray image. First, the original image is divided into blocks according to the size of the watermark; each block corresponds to each pixel value of watermark. Second, the DCT is applied in each block twice and form new blocks. Then, Get the largest value of each new block to form a new matrix .Apply SVD on the new matrix to get matrices U, S and V for each block. The pixel value of watermark is embedded into the S matrix of the new matrix. And the watermark can be detected with the original image. The experimental results show that the algorithm can satisfy the transparence and robustness of the watermarking system very well. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks very well.

Info:

Periodical:

Advanced Materials Research (Volumes 225-226)

Edited by:

Helen Zhang, Gang Shen and David Jin

Pages:

8-12

DOI:

10.4028/www.scientific.net/AMR.225-226.8

Citation:

F. Liu et al., "A Robust Grayscale Watermarking Algorithm", Advanced Materials Research, Vols. 225-226, pp. 8-12, 2011

Online since:

April 2011

Export:

Price:

$38.00

[1] S. Craver, N. Memon, B. Yeo and M. Yeung , Can Invisible Watermarks Resolve Rightful Ownerships?, , IBM Research Report, RC 20509, (1996).

DOI: 10.1117/12.263419

[2] R. Schyndel, A. Trikel and C. Osborne, A Digital Watermark, Proc. ICIP , (1994).

[3] W. Bender, D. Gruhl and N. Morimoto, Techniques for Data Hiding, SPIE vol. 2420, (1995).

[4] I. Cox, J. Kilian, T. Leighton and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, NEC Research Inst. Tech. Report, 95-10, (1995).

[5] M.S. Fu, O.C. Au, Data hiding watermarking for halftone images, IEEE Transactions on Image Processing 11 (4) (2002) 477–484.

DOI: 10.1109/tip.2002.999680

[6] J.M. Guo, Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning, Signal Proces- sing 88 (6) (2008) 1496–1510.

DOI: 10.1016/j.sigpro.2007.12.015

[7] J. Cheng, A.C. Kot, Steganalysis of halftone image using inverse halftoning, Signal Processing 89 (6) (2009) 1000–1010.

DOI: 10.1016/j.sigpro.2008.12.002

[8] J. Fridrich , M. Goljan, R. Du, Detecting LSB steganography in color and gray-scale images, IEEE Multimedia 8 (4) (2001) 22–28.

DOI: 10.1109/93.959097

[9] Xiao Jun , Wang Ying A Robust Digital Watermarking Algorithm Based on Multiple-level Discrete Cosine Transform, Chinese Journal of Computer Vol. 5(2005).

DOI: 10.3724/sp.j.1016.2009.01055

[10] D. Kahaner, C. Moler and S. Nash, Numerical Methods and Software (New Jersey: Prentice-Hall, Inc, 1989).

[11] Liu, R. and Tan, T. An SVD-Based Watermarking Scheme for Protecting Rightful Ownership, IEEE Transactions on Multimedia, Vol. 4, No. 1 (2002), pp.121-128.

DOI: 10.1109/6046.985560

In order to see related information, you need to Login.