Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2015 Apr 17;10(4):e0123427.
doi: 10.1371/journal.pone.0123427. eCollection 2015.

Invariant domain watermarking using heaviside function of order alpha and fractional Gaussian field

Affiliations

Invariant domain watermarking using heaviside function of order alpha and fractional Gaussian field

Almas Abbasi et al. PLoS One. .

Abstract

Digital image watermarking is an important technique for the authentication of multimedia content and copyright protection. Conventional digital image watermarking techniques are often vulnerable to geometric distortions such as Rotation, Scaling, and Translation (RST). These distortions desynchronize the watermark information embedded in an image and thus disable watermark detection. To solve this problem, we propose an RST invariant domain watermarking technique based on fractional calculus. We have constructed a domain using Heaviside function of order alpha (HFOA). The HFOA models the signal as a polynomial for watermark embedding. The watermark is embedded in all the coefficients of the image. We have also constructed a fractional variance formula using fractional Gaussian field. A cross correlation method based on the fractional Gaussian field is used for watermark detection. Furthermore the proposed method enables blind watermark detection where the original image is not required during the watermark detection thereby making it more practical than non-blind watermarking techniques. Experimental results confirmed that the proposed technique has a high level of robustness.

PubMed Disclaimer

Conflict of interest statement

Competing Interests: The authors have declared that no competing interests exist.

Figures

Fig 1
Fig 1. (a)Watermark consist of random sequence of +1, -1. (b-c) Watermark pattern.
Fig 2
Fig 2. Watermark embedding scheme for the Invariant domain.
Fig 3
Fig 3. Watermark Detection.
Fig 4
Fig 4. Robustness against JPEG compression attack. Five watermarked images are tested for the JPEG compression quality factor ranging from 10 to 90.
Fig 5
Fig 5. Robustness against circular shift Attack. Comparison of the Correlation and Threshold values of five watermarked test images against the circular shift attack.
Fig 6
Fig 6. Circular shift attack operation of 50% image size.
(a) Original image. (b) Pixels at lower half of the image shifted upwards. (c) Circular shift attacked image. Pixels at left half of image shifted towards right hand side of the image.
Fig 7
Fig 7. Robustness against scaling Attack.
(a-d) Comparison of Correlation values of four images after scaling attack of the proposed technique.
Fig 8
Fig 8. Robustness against rotation attack.
The rotated images have also been scaled and cropped. (a-d) Original Test Images, (e-h) Attacked watermarked Test Images: Rotation attack for different values of the angles are taken such as 5, 10, 15 and 30 degree respectively.
Fig 9
Fig 9. Robustness of Proposed Technique against Rotation attacks.
Five watermarked images are tested for the rotation attack. Rotation angle is taken of different values such as 5, 10, 15, 30, 45 and 90 degrees.
Fig 10
Fig 10. Robustness of Proposed Technique against Cropping attack.
(a-c) Original images of size 512×512 pixels. (d) strips 25 and 26 pixels wide were cropped from the bottom and right hand side of the image respectively. The size of the image after cropping attack is 487×486 pixels. (e) strips 54 pixels wide were cropped from the bottom and right hand side of the image. The size of the image after cropping attack is 458×458 pixels. (f) strips 149 pixels wide were cropped from the bottom and right hand side of the image. The size of the image after cropping attack is 363×363 pixels.

References

    1. Nikolaidis N, Pitas I. Robust image watermarking in the spatial domain. Signal processing. 1998; 66(3), 385–403.
    1. Darmstaedter V, Delaigle J-F, Nicholson D, Macq B. A block based watermarking technique for MPEG2 signals: Optimization and validation on real digital TV distribution links Multimedia Applications, Services and Techniques—ECMAST'98, Springer; 1998; 1425, 190–206.
    1. Wolfgang RB, Delp EJ. A watermark for digital images. Paper presented at the Image Processing, 1996 Proceedings of International Conference on. 1996; 3, 219–222.
    1. Hernandez JR, Amado M, Perez-Gonzalez F. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. Image Processing, IEEE Transactions on. 2000; 9(1), 55–68. doi: 10.1109/83.817598 - DOI - PubMed
    1. Kundur D, Hatzinakos D. Digital watermarking using multi resolution wavelet decomposition. Paper presented at the Acoustics, Speech and Signal Processing. Proceedings of the 1998 IEEE International Conference on. 1998; 5, 2969–2972.

Publication types

LinkOut - more resources