Skip to main content
Log in

Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes simple but robust digital watermarking for color images based on Euclidean norms and quick coefficient alignment. For increasing the amount of hidden storage, we embedded two data bits in a host block at a time using a quick adjustment technique and four criteria that follow Euclidean norms of pixels. Simulations confirmed that a large number of secret bits can be embedded in host images without compromising image quality. In addition, our method is free from the underflow/overflow issue. The hidden storage provided by the proposed method is larger than that provided by existing color image watermarking techniques. The watermarked images generated by the proposed method are robust against various types of attacks such as cropping, Gaussian/uniform noise addition, inversion, JPEG, JPEG2000, and zigzagging.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Comput Stand Interfaces 5:1002–1013

    Article  Google Scholar 

  2. Chang CC, Chen YH, Lin CC (2009) A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput 13:321–331

    Article  Google Scholar 

  3. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752

    Article  MATH  Google Scholar 

  4. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6:1673–1687

    Article  Google Scholar 

  5. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann, MA

    Google Scholar 

  6. Diffie W, Hellman ME (1977) Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10:74–84

    Article  Google Scholar 

  7. Eielinska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 57:86–95

    Article  Google Scholar 

  8. Findik O, Babaoglu İ, Űlker E (2010) A color image watermarking scheme based on hybrid classification method: particle swarm optimization and k-nearest neighbor algorithm. Opt Commun 283:4916–4922

    Article  Google Scholar 

  9. Findik O, Babaoglu İ, Űlker E (2011) A color image watermarking scheme based on artificial immune recognition system. Expert Syst Appl 38:1942–1946

    Article  Google Scholar 

  10. Fu YG, Shen RM (2008) Color image watermarking scheme based on linear discriminant analysis. Comput Stand Interface 30:115–120

    Article  Google Scholar 

  11. Li J, Li X, Yang B (2013) Reversible data hiding scheme for color image based on prediction-error and cross-channel correlation. Signal Process 93:2748–2758

    Article  Google Scholar 

  12. Niu PP, Wang XY, Yang YP, Lu MY (2011) A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Syst Appl 38:2081–2098

    Article  Google Scholar 

  13. Olmos A, Kingdom FAA (2004) A biologically inspired algorithm for the recovery of shading and reflectance images. Perception 33:1463–1473

    Article  Google Scholar 

  14. Phadikar A (2012) Data hiding techniques and applications specific designs. Academic Publishing, Saarbrucken

    Google Scholar 

  15. Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92:1137–1150

    Article  Google Scholar 

  16. Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image painting. IEEE Trans Image Process 23:969–978

    Article  MathSciNet  Google Scholar 

  17. Rivest RL (1992) The MD5 message-digest algorithm. Int Request for Comments (RFC) 1321, Int Act Board, Int Privacy Task Force

  18. Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120–126

    Article  MathSciNet  MATH  Google Scholar 

  19. Su Q, Niu Y, Liu X, Zhu Y (2012) A blind dual color images watermarking scheme based on IWT and state coding. Opt Commun 285:1717–1724

    Article  Google Scholar 

  20. Tsougenis ED, Papakostas GA, Koulouriotis DE, Karakasis EG (2014) Adaptive color image watermarking by the use of quaterion image moments. Expert Syst Appl 41:6408–6418

    Article  Google Scholar 

  21. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  22. Wang XY, Niu PP, Yang HY, Wang CP, Wang AL (2014) A new robust color image watermarking using local quaternion exponent moments. Inf Sci 277:731–754

    Article  Google Scholar 

  23. Yang CY (2012) Use of radius weighted mean to hide data in colour images. The 5th IET Int Conf on U-Media Comp, August 16–18, Xining, China

  24. Yang CY (2013) Robust watermarking scheme based on radius weight mean and feature-embedding technique. ETRI J 35:512–522

    Article  Google Scholar 

  25. Yang CY, Wang WF (2014) Block-based colour image steganography using smart pixel-adjustment. The 8th Int Conf on Genetic and Evolutionary Computing, October 18–20, Nanchang, China

  26. Yang CY, Wang WF (2014) Robust color image watermarking approach based on shape-specific points. The 10th Int Conf on Intelligent Information Hiding and Multimedia Signal Processing, August 27–29, Kitakyushu, Japan

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ching-Yu Yang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, CY. Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment. Multimed Tools Appl 76, 1455–1477 (2017). https://doi.org/10.1007/s11042-015-3065-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3065-8

Keyword

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy