A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins
Abstract
:1. Introduction
2. Preliminaries
2.1. Invariance of the Histogram Shape
2.2. Existing Histogram-Based Watermark Embedding
3. The Proposed Method
3.1. Embedding Range Selection
3.2. Block-Based Pixel Modification
3.3. Embedding and Extraction of the Watermark
3.3.1. Watermark Embedding Rules
3.3.2. Watermark Embedding Steps
- If it meets , the number of modified pixels is ( refers to the selected pixels, which will be moved from Bin 1 to Bin 2), these selected pixels of Bin 1 will be added to M;
- If it meets the condition , firstly, choose all pixels which will be moved from Bin 1 to Bin 2 by adding to M, then all pixels of Bin 2 are chosen to be modified so as to make them fall in Bin 3. To ensure the modification/adjustment degree M of each pixel, the order in the above steps cannot be changed because these pixels chosen from Bin 2 should not contain those that have been adjusted in Bin 1. The corresponding modification/adjustment degree of some pixels may be if the order is exchanged.
- The others are similar to the above.
Algorithm 1. Watermark embedding. | |
1: Input: | |
2: | |
3: Output: | |
4: | |
5: Process: | |
6: | |
7: | |
8: | |
9: | |
10: | |
11: | |
12: | Do nothing; |
13: | else |
14: | if |
15: | ; |
16: | ; |
17: | end |
18: | if |
19: | ; |
20: | ; |
21: | end |
22: | end |
23: | end |
24: | Other, do similarly to the above. |
25: |
3.3.3. Watermark Extraction Steps
Algorithm 2. Watermark extraction. | |
1: Input: | |
2: | |
3: Output: | |
4: | |
5: Process: | |
6: | |
7: | |
8: | |
9: | |
10: | |
11: | ; |
12: | end |
13: | |
14: | ; |
15: | end |
16: | end |
17: | Other, do similarly to the above. |
18: |
4. Experimental Results and Analysis
4.1. Embedding Capacity and Perceptual Similarity
4.1.1. Embedding Capacity versus Perceptual Similarity
4.1.2. Comparison with the State-of-the-Art Methods
4.2. Watermark Robustness
- AWGN attack: The standard deviation of AWGN was set from 1–10. Similarly, we can see from Figure 6g,h that the watermarked image could resist AWGN attack well.
- JPEG compression: The quality factor of JPEG compression was changed from 80–100. Figure 6i,j provides a significant indication that the proposed watermark method was equipped with the capability of resisting JPEG compression. Here, it should be emphasized that the BER (bit error rate) of our method was a little higher than the other methods; this is because approximately equal adjacent bins were considered in our method, and thus, this may have increased the error rate of watermark extraction.
5. Conclusions
Author Contributions
Acknowledgments
Conflicts of Interest
References
- Castiglione, A.; Pizzolante, R.; Palmieri, F.; Masucci, B.; Carpentieri, B.; Santis, A.; Castiglione, A. On-Board Format-Independent Security of Functional Magnetic Resonance Images. ACM Trans. Embed. Comput. Syst. 2017, 16, 56. [Google Scholar] [CrossRef]
- Li, M.; Ren, H.; Zhang, E.; Wang, W.; Sun, L.; Xiao, D. A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. Secur. Commun. Netw. 2018, 2018, 4313769. [Google Scholar] [CrossRef]
- Yang, C. Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment. Multimed. Tools Appl. 2017, 76, 1455–1477. [Google Scholar] [CrossRef]
- Kang, X.; Huang, J.; Shi, Y.; Lin, Y. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 776–786. [Google Scholar] [CrossRef] [Green Version]
- Barni, M. Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Process. Lett. 2005, 12, 158–161. [Google Scholar] [CrossRef]
- Pereira, S.; Pun, T. Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process. 2000, 9, 1123–1129. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Dugelay, J.; Roche, S.; Rey, C.; Doerr, G. Still-image watermarking robust to local geometric distortions. IEEE Trans. Image Process. 2006, 15, 2831–2842. [Google Scholar] [CrossRef]
- Zheng, D.; Zhao, J.; Saddik, A.E. RST-invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 753–765. [Google Scholar] [CrossRef]
- Dong, P.; Brankov, J.; Galatsanos, N.; Yang, Y.; Davoine, F. Digital watermarking robust to geometric distortions. IEEE Trans. Image Process. 2005, 14, 2140–2150. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Yuan, C.; Pun, C.; Chen, C. Geometric invariant watermarking by local Zernike moments of binary image patches. Signal Process. 2013, 93, 2087–2095. [Google Scholar] [CrossRef]
- Bas, P.; Chassery, J.; Macq, B. Geometrically invariant watermarking using feature points. IEEE Trans. Image Process. 2002, 11, 1014–1028. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Nikolaidis, A.; Pitas, I. Robust watermarking of facial images based on salient geometric pattern matching. IEEE Trans. Multimed. 2000, 2, 172–184. [Google Scholar] [CrossRef] [Green Version]
- Xiang, S.; Kim, H.; Huang, J. Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain. IEEE Trans. Circuits Syst. Video Technol. 2008, 18, 777–790. [Google Scholar] [CrossRef]
- Hu, X.; Wang, D. A Histogram Based Watermarking Algorithm Robust to Geometric Distortions. In Proceedings of the International Conference on Electrical, Computer Engineering and Electronics, Jinan, China, 29–31 May 2015. [Google Scholar]
- Deng, C.; Gao, X.; Peng, H.; An, L.; Ji, F. Histogram modification based robust image watermarking approach. Int. J. Multimed. Intell. Secur. 2010, 1, 153–168. [Google Scholar] [CrossRef]
- He, X.; Zhu, T.; Yang, G. A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimens. Syst. Signal Process. 2015, 26, 291–306. [Google Scholar] [CrossRef]
- Zong, T.; Xiang, Y.; Natgunanathan, I.; Guo, S.; Zhou, W.; Beliakov, G. Robust histogram shape-based method for image watermarking. IEEE Trans. Circuits Syst. Video Technol. 2015, 25, 717–729. [Google Scholar] [CrossRef]
- Feng, B.; Weng, J.; Lu, W. Improved Algorithms for Robust Histogram Shape-Based Image Watermarking. Int. Workshop Digit. Watermark. 2017, 10431, 275–289. [Google Scholar]
- Qi, H.; Zheng, D.; Zhao, J. Human visual system based adaptive digital image watermarking. Signal Process. 2008, 88, 174–188. [Google Scholar] [CrossRef] [Green Version]
- Miscelaneous Gray Level Images. Available online: http://decsai.ugr.es/cvg/dbimagenes/g512.php (accessed on 13 March 2014).
Case | Original | Its Binary | Pixel Modification Rules |
---|---|---|---|
Watermark | Type | ||
1 | 0 | 000 | a’=, b’=, c’= |
2 | 1 | 001 | a’=, b’=, c’= |
3 | 2 | 010 | a’=, b’=, c’= |
4 | 3 | 011 | a’=, b’=, c’= |
5 | 4 | 100 | a’=, b’=, c’= |
6 | 5 | 101 | a’=, b’=, c’= |
7 | 6 | 110 | a’=, b’=, c’= |
8 | 7 | 111 | a’=, b’=, c’= |
Payload (bit) | 32 | 48 | 56 | 63 | |||||
---|---|---|---|---|---|---|---|---|---|
Perceptual Similarity | PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | |
(dB) | (dB) | (dB) | (dB) | ||||||
69.09 | 1.0000 | 66.65 | 1.0000 | 65.55 | 1.0000 | 64.96 | 1.0000 | ||
Baboon | 59.08 | 0.9999 | 55.85 | 0.9997 | 54.88 | 0.9996 | 54.39 | 0.9996 | |
51.58 | 0.9992 | 49.85 | 0.9986 | - | - | - | - | ||
66.44 | 0.9999 | 65.27 | 0.9999 | 64.69 | 0.9999 | 64.29 | 0.9999 | ||
Barbara | 57.25 | 0.9993 | 55.53 | 0.9991 | 54.73 | 0.9990 | 54.39 | 0.9990 | |
51.72 | 0.9980 | 49.97 | 0.9973 | 49.44 | 0.9969 | - | - | ||
66.43 | 0.9999 | 65.26 | 0.9999 | 64.32 | 0.9999 | 63.73 | 0.9999 | ||
Lena | 56.84 | 0.9992 | 55.04 | 0.9988 | 53.89 | 0.9984 | 53.51 | 0.9982 | |
51.16 | 0.9971 | 49.49 | 0.9955 | - | - | - | - | ||
67.52 | 0.9999 | 64.98 | 0.9999 | 63.49 | 0.9998 | 62.99 | 0.9998 | ||
Peppers | 57.22 | 0.9993 | 56.05 | 0.9992 | 55.13 | 0.9990 | 54.59 | 0.9988 | |
52.62 | 0.9982 | 50.76 | 0.9970 | - | - | - | - |
Payload (bit) | 32 | 48 | 56 | 63 | |
---|---|---|---|---|---|
embedding range | [0.3A,1.7A] | [0.3A,1.7A] | - | - | |
Xiang et al. [13] | T | 2 | 6 | - | - |
M | 2 | 2 | - | - | |
bins’ number | 64 | 96 | - | - | |
embedding range | [0,255] | [0,255] | - | - | |
Zong et al. [17] | T | 2 | 4 | - | - |
M | 3 | 2 | - | - | |
bins’ number | 64 | 96 | - | - | |
embedding range | [15,244] | [15,244] | [15,244] | [15,244] | |
Scheme 1 [18] | T | 2 | 1.5 | 1.25 | 1.5 |
M | 2 | 2 | 2 | 2 | |
bins’ number | 64 | 96 | 112 | 126 | |
embedding range | [15,244] | [15,244] | [15,244] | [15,244] | |
Scheme 2 [18] | T | 3 | 2+sqrt(0.5) | 2.5 | 37/16+sqrt(0.5) |
M | 2 | 4 | 8 | 4 | |
bins’ number | 64 | 64 | 64 | 84 | |
embedding range | [0,255] | [0,255] | [0,255] | [0,255] | |
The proposed | T | 2 | 2 | 2 | 2 |
M | 2 | 2 | 2 | 2 | |
bins’ number | 32 | 48 | 56 | 63 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yue, Z.; Li, Z.; Ren, H.; Yang, Y. A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins. Appl. Sci. 2018, 8, 2617. https://doi.org/10.3390/app8122617
Yue Z, Li Z, Ren H, Yang Y. A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins. Applied Sciences. 2018; 8(12):2617. https://doi.org/10.3390/app8122617
Chicago/Turabian StyleYue, Zhen, Zichen Li, Hua Ren, and Yixian Yang. 2018. "A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins" Applied Sciences 8, no. 12: 2617. https://doi.org/10.3390/app8122617
APA StyleYue, Z., Li, Z., Ren, H., & Yang, Y. (2018). A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins. Applied Sciences, 8(12), 2617. https://doi.org/10.3390/app8122617