Skip to main content
Log in

A robust blind watermarking framework based on Dn structure

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In this paper, a new robust watermarking framework is designed using the discrete cosine transform (DCT), binary decimal sequence (d-sequence) and Dn-structure. The core idea is to generate a binary d-sequence based on random number generator (RNG) and some secret keys. This binary sequence is then utilized to generate reference sets based on Dn-structure. For embedding purpose, the host image is transformed using DCT and selected coefficients are employed to construct a macro block. Each binary watermark bit is securely embedded into macro block by utilizing the reference set. The reverse process is finally formulated to extract the watermark at the receiver end. The proposed technique is experimentally analyzed using various quality metrics and attacks. The comprehensive experimental results illustrate that the proposed watermarking scheme is robust to both geometric distortions (resizing, cropping, wrapping and random row deletion) and general signal processing attacks (various noise addition, blurring, high pass filtering, image sharpening, contrast adjustment, Histogram equalization and gamma correction and JPEG compression) and outperforms state-of-the-art watermarking methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Appl:1–31

  • Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Trans Comput 100(1):90–93

    Article  MathSciNet  Google Scholar 

  • Al-Haj A (2007) Combined DWT-DCT digital image watermarking. J Comput Sci 3(9):740–746

    Article  Google Scholar 

  • Amini M, Ahmad M, Swamy M (2016) A robust multi-bit multiplicative watermark decoder using vector-based hidden Markov model in wavelet domain. IEEE Trans Circuits Syst Video Technol 28(2):402–413

    Article  Google Scholar 

  • Amini M, Ahmad MO, Swamy MNS (2017) Digital watermark extraction in wavelet domain using hidden Markov model. Multimed Tools Appl 76(3):3731–3749

    Article  Google Scholar 

  • Amirgholipour SK, Naghsh-Nilchi AR (2009) Robust digital image watermarking based on joint DWT-DCT. Int J Digit Content Technol Appl 3(2):42–54

    Google Scholar 

  • Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806–2817

    Article  Google Scholar 

  • Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circuits Syst Video Technol 15(1):96–102

    Article  Google Scholar 

  • Bas P, Furon T (2013) A new measure of watermarking security: the effective key length. IEEE Trans Inf Forensics Secur 8(8):1306–1317

    Article  Google Scholar 

  • Bhatnagar G, Jonathan Wu QM, Raman B (2012) Robust gray-scale logo watermarking in wavelet domain. Comput Electr Eng 38(5):1164–1176

    Article  Google Scholar 

  • Bhatnagar G, Jonathan Wu QM, Atrey PK (2014) Robust logo watermarking using biometrics inspired key generation. Expert Syst Appl 41(10):4563–4578

    Article  Google Scholar 

  • Chen S-T, Huang H-N, Kung W-M (2016) Optimization-based image watermarking with integrated quantization embedding in the wavelet domain. Multimed Tools Appl:5493–5511

  • Chen YY, Hsia CH, Jhong SY, Lin HJ (2018) Data hiding method for AMBTC compressed images. J Ambient Intell Humaniz Comput:1–9

  • Chen ST, Huang HN, Kung WM, Hsu CY (2016) Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain. Multimed Tools Appl 75(10):5493–5511

    Article  Google Scholar 

  • Cox IJ, Miller ML, Bloom JA (2002) Digital watermarking. Morgan Kaufmann Publishers, Burlington

    Google Scholar 

  • Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68(3):244–253

    Article  Google Scholar 

  • Di Martino F, Sessa S (2018) Fragile watermarking tamper detection via bilinear fuzzy relation equations. J Ambient Intell Human Comput:1–21

  • Dong L, Yan Q, Lv Y, Deng S (2017) Full band watermarking in DCT domain with Weibull model. Multimed Tools Appl 76(2):1983–2000

    Article  Google Scholar 

  • Etemad E, Samavi S, Soroushmehr SR, Karimi N, Etemad M, Shirani S, Najarian K (2018) Robust image watermarking scheme using bit-plane of hadamard coefficients. Multimed Tools Appl 77(2):2033–2055

    Article  Google Scholar 

  • Gallian JA (1990) Contemporary abstract algebra, 2nd edn. D. C. Heath and Company, Lexington

    MATH  Google Scholar 

  • Han J, Zhao X, Qiu C (2016) A digital image watermarking method based on host image analysis and genetic algorithm. J Ambient Intell Humaniz Comput 7(1):37–45

    Article  Google Scholar 

  • Hankerson D, Menezes A, Vanstone SA (2004) Guide to elliptic curve cryptography. Springer, New York

    MATH  Google Scholar 

  • Hsu LY, Hu HT (2017) Robust blind image watermarking using crisscross inter-block prediction in the DCT domain. J Vis Commun Image Represent 46:33–47

    Article  Google Scholar 

  • Iovane G, Giordano P, Borysenko SD (2011) Image watermarking via wavelet approach and face biometrics. J Ambient Intell Humaniz Comput 2:91–101

    Article  Google Scholar 

  • Lin SD, Shie S-C, Guo JY (2010) Improving the robustness of DCT-based image watermarking against JPEG compression. Comput Stand Interfaces 32(1–2):54–60

    Article  Google Scholar 

  • Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018a) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95–105

    Article  Google Scholar 

  • Liu XL, Lin CC, Yuan SM (2018b) Blind dual watermarking for color image authentication and copyright protection. IEEE Trans Circuits Syst Video Technol 28(5):1047–1055

    Article  Google Scholar 

  • Liu-Wei Z, Zhao B, Liu B, Su J, Xu L, Xu E (2014) A novel steganography approach for voice over IP. J Ambient Intell Humaniz Comput 5(4):601–610

    Article  Google Scholar 

  • Lu W, Lu H, Chung FL (2007) Novel robust image watermarking using difference correlation detector. Comput Stand Interfaces 29(1):132–137

    Article  Google Scholar 

  • Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca raton

    MATH  Google Scholar 

  • Ouyang J, Coatrieux G, Chen B, Shu H (2015) Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping. Comput Electr Eng 46:419–432

    Article  Google Scholar 

  • Parakh A (2006) A \(d\)-sequence based recursive random number generator. arXiv:cs/0603029 (preprint)

  • Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Sign Process 20(6):1597–1611

    Article  Google Scholar 

  • Perez-Freire L, Perez-Gonzalez F (2009) Spread-spectrum watermarking security. IEEE Trans Inf Forensics Secur 4(1):2–24

    Article  Google Scholar 

  • Reitwiesner GW (1960) Binary arithmetic. In: Advances in computers, vol 1. Elsevier, Amsterdam, pp 231–308

  • Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl:1–11

  • Singh SP, Bhatnagar G (2016) A novel chaos based robust watermarking framework. Int Conf Comput Vis Image Process 460(2):439–447

    Google Scholar 

  • Singh SP, Bhatnagar G (2017) A robust image hashing based on discrete wavelet transform. In: International conference on signal and image processing applications (ICSIPA), pp 440–444

  • Singh SP, Bhatnagar G (2018a) A robust watermarking scheme based on image normalization. In: IEEE international colloquium on signal processing & its applications, pp 140–144

  • Singh SP, Bhatnagar G (2018b) A new robust watermarking system in Integer DCT domain. J Vis Commun Image Represent 53:86–101

    Article  Google Scholar 

  • Singh SP, Bhatnagar G (2019) A simplified watermarking algorithm based on lifting wavelet transform. Multimed Tools Appl:1–22

  • Singh SP, Bhatnagar G, Gurjar DK (2018a) A secure image encryption algorithm based on polar decomposition. In: IEEE international colloquium on signal processing & its applications, pp 135–139

  • Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018b) Multiple watermarking technique for securing online social network contents using back propagation neural network. Fut Gen Comput Syst 86:926–939

    Article  Google Scholar 

  • Thakur S, Singh AK, Ghrera SP (2018) NSCT domain based secure multiple watermarking technique through lightweight encryption for medical images. Concurr Comput Pract Exp:5108

  • Wang S, Zheng D, Zhao J (2014) Adaptive watermarking and tree structure based image quality estimation. IEEE Trans Multimed 16(2):311–325

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satendra Pal Singh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, S.P., Bhatnagar, G. A robust blind watermarking framework based on Dn structure. J Ambient Intell Human Comput 11, 1869–1887 (2020). https://doi.org/10.1007/s12652-019-01296-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01296-0

Keywords

Navigation