Constructing of Digital Watermark Based on Generalized Fourier Transform
Abstract
:1. Introduction
2. Materials and Methods
2.1. Definition of Ateb-Functions
2.2. Construction of Orthogonal Ateb Transforms
2.3. Properties of One-Dimensional Orthogonal Ateb-Transforms
2.3.1. Property of Linearity
2.3.2. Property of Symmetry
2.3.3. Property of Similarity
2.4. Properties of Two-Dimensional Orthogonal Ateb-Transforms
2.4.1. Property of Linearity
2.4.2. Property of Symmetry
2.4.3. Property of Similarity
2.5. Construction of the Digital Watermark
- File resize 10%, 25%, 50%, 75%, 150%, and 200%;
- Turn 1°, 5°, 10°, 45°, 90°, and 180°;
- Compress the image to 10%, 25%, or 50%;
- Change the color depth of an image 256 → 128, 256 → 64, 256 → 32, 256 → 16, 256 → 8, 256 → 4, 256 → 2.
3. Results
4. Discussion
5. Conclusions
- Application of the presented Hartley transform to the creation of a digital water signature, and testing of its resistance to attacks based on the developed scheme of experiments;
- Development, application, and research of the method of constructing a digital water signature based on the Ateb-cosine and Ateb-sine transform;
- Research of the method of constructing a digital water signature on the basis of Ateb-transform for other types of images, in particular, for multispectral images;
- Application of Ateb-transform parameters for the identification of data on electronic media;
- Development, application, and research of the method of constructing a digital water signature based on one-dimensional Ateb-transform for sound files.
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Lipinski, P. Odporne Cyfrowe Znaki Wodne w Obrazach: Adaptacyjny Dobór Dziedziny Osadzania; Akademicka oficyna wydawnictwa EXIT: Warszawa, Poland, 2013; p. 221. (In Polish) [Google Scholar]
- Sokil, B.I. Nonlinear oscillations of mechanical systems and analytical methods of their research. Diploma Thesis, Lviv Polytechnic National University, Lviv, Ukraine, 2001. [Google Scholar]
- Dronyuk, I.M.; Nazarkevych, M.A. Development of modified amplitude-modulated screening method for improving printing quality. Actual Probl. Econ. 2014, 4, 455–461. [Google Scholar]
- Dronyuk, I.M. Technologies for Protecting Information on Tangible Media. Monography; Lviv Polytechnic Publishing: Lviv, Ukraine, 2017; p. 200. (In Ukrainian) [Google Scholar]
- Peleshko, D.; Ivanov, Y.; Sharov, B.; Izonin, I.; Borzov, Y. Design and implementation of visitors queue density analysis and registration method for retail videosurveillance purposes. In Proceedings of the 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 23 August 2016; pp. 159–162. [Google Scholar] [CrossRef]
- Ivanov, Y.; Peleshko, D.; Makoveychuk, O.; Izonin, I.; Malets, I.; Lotoshunska, N. Adaptive moving object segmentation algorithms in cluttered environments. In Proceedings of the Experience of Designing and Application of CAD Systems in Microelectronics, Lviv, Ukraine, 24–27 February 2015; pp. 97–99. [Google Scholar] [CrossRef]
- Tsymbal, Y.; Tkachenko, R. A digital watermarking scheme based on autoassociative neural networks of the geometric transformations model. In Proceedings of the 2016 IEEE 1st International Conference on Data Stream Mining and Processing, DSMP 2016, Lviv, Ukraine, 23 August 2016. [Google Scholar] [CrossRef]
- Ahmadi, S.B.B.; Zhang, G.; Wei, S. Robust and hybrid SVD-based image watermarking schemes: A survey. Multimed. Tools Appl. 2020, 79, 1075–1117. [Google Scholar] [CrossRef]
- Trunov, A.; Fisun, M.; Malcheniuk, A. The processing of hyperspectral images as matrix algebra operations. In Proceedings of the 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), Lviv, Ukraine, 20–24 February 2018. [Google Scholar]
- Dronyuk, I.; Fedevych, O.; Demyda, B. Signals and images protection based on Ateb-transforms in infocommunication systems. In Proceedings of the 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PICST, Lviv, Ukraine, 20–24 February 2018; pp. 461–464. [Google Scholar] [CrossRef]
- Fares, K.; Amine, K.; Salah, E. A robust blind color image watermarking based on Fourier transform domain. Optik 2020, 208. [Google Scholar] [CrossRef]
- Dronjuk, I.; Nazarkevich, M. A study on Ateb transform as a generalization of Fourier transform. Curr. Trends Anal. Appl. 2015, 723–731. [Google Scholar] [CrossRef]
- Abramowitz, M.; Stegun, I. Handbook of Mathematical Functions with Formulas, Graphs and Mathematical Tables. Available online: http://people.math.sfu.ca/~cbm/aands/abramowitz_and_stegun.pdf (accessed on 14 May 2020).
- Rozenberg, R.M. The Ateb(h)-functions and their properties. Quart. Appl. Math. 1963, 21, 37–47. [Google Scholar] [CrossRef] [Green Version]
- Cveticanin, L.; Vujkov, S.; Cveticanin, D. Application of modified generalized trigonometric functions in identification of human tooth vibration properties. Commun. Nonlinear Sci. Numer. Simul. 2020, 89. [Google Scholar] [CrossRef]
- Cveticanin, L.; Zukovic, M.; Cveticanin, D. Exact steady states of periodically forced and essentially nonlinear and damped oscillator. Commun. Nonlinear Sci. Numer. Simul. 2019, 78. [Google Scholar] [CrossRef]
- Arena, P.; Basile, A.; Bucolo, M.; Fortuna, L. An object oriented segmentation on analog CNN chip. J. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 2003, 50, 837–846. [Google Scholar] [CrossRef]
Attack Type | File Sizing, % | Rotation Angle, ° | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Embed Ways | 10 | 25 | 50 | 75 | 150 | 200 | 1 | 5 | 10 | 45 | 90 | 180 | |
Without attack | + | + | + | + | + | + | + | + | + | + | + | + | + |
Method 1, α = 0.1 | − | − | − | − | − | − | + | + | + | + | + | + | + |
Method 1, α = 0.2 | − | − | − | − | − | − | + | + | + | + | + | + | + |
Method 1, α = 0.5 | − | − | − | − | − | − | + | + | + | + | + | + | + |
Method 1, α = 0.9 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 2, α = 0.1 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 2, α = 0.2 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 2, α = 0.5 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 2, α = 0.9 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 3, α = 0.1 | − | − | − | − | − | − | + | + | + | + | + | + | + |
Method 3, α = 0.2 | − | − | − | − | − | − | + | + | + | + | + | + | + |
Method 3, α = 0.5 | − | − | − | − | − | − | + | + | + | + | + | + | + |
Method 3, α = 0.9 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 4, α = 0.1 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 4, α = 0.2 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 4, α = 0.5 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 4, α = 0.9 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Pressing Times, % | Change the Color Depth of the Image | ||||||||
---|---|---|---|---|---|---|---|---|---|
Embed Ways | 10 | 25 | 50 | 128 | 64 | 32 | 16 | 8 | 4 |
Without attack | + | + | + | + | + | + | + | + | + |
Method 1, α = 0.1 | − | + | + | + | + | + | + | + | − |
Method 1, α = 0.2 | − | + | + | + | + | + | + | + | − |
Method 1, α = 0.5 | − | + | + | + | + | + | + | + | − |
Method 1, α = 0.9 | + | + | + | + | + | + | + | + | − |
Method 2, α = 0.1 | + | + | + | + | + | + | + | + | − |
Method 2, α = 0.2 | + | + | + | + | + | + | + | + | − |
Method 2, α = 0.5 | + | + | + | + | + | + | + | + | − |
Method 2, α = 0.9 | + | + | + | + | + | + | + | + | − |
Method 3, α = 0.1 | − | + | + | + | + | + | + | + | − |
Method 3, α = 0.2 | − | + | + | + | + | + | + | + | − |
Method 3, α = 0.5 | − | + | + | + | + | + | + | + | − |
Method 3, α = 0.9 | + | + | + | + | + | + | + | + | − |
Method 4, α = 0.1 | + | + | + | + | + | + | + | + | − |
Method 4, α = 0.2 | − | + | + | + | + | + | + | + | − |
Method 4, α = 0.5 | − | + | + | + | + | + | + | + | − |
Method 4, α = 0.9 | + | + | + | + | + | + | + | + | − |
Attack Type | File Sizing, % | Rotation Angle, ° | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Embed Ways | 10 | 25 | 50 | 75 | 150 | 200 | 1 | 5 | 10 | 45 | 90 | 180 | |
Without attack | + | + | + | + | + | + | + | + | + | + | + | + | + |
Method 1, α = 0.1 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 1, α = 0.2 | + | + | + | − | − | − | + | + | + | + | + | + | + |
Method 1, α = 0.5 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 1, α = 0.9 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 2, α = 0.1 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 2, α = 0.2 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 2, α = 0.5 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 2, α = 0.9 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 3, α = 0.1 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 3, α = 0.2 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 3, α = 0.5 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 3, α = 0.9 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 4, α = 0.1 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 4, α = 0.2 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 4, α = 0.5 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Method 4, α = 0.9 | + | + | − | − | − | − | + | + | + | + | + | + | + |
Pressing Times, % | Change the Color Depth of the Image | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
Embed Ways | 10 | 25 | 50 | 128 | 64 | 32 | 16 | 8 | 4 | 2 |
Without attack | + | + | + | + | + | + | + | + | + | + |
Method 1, α = 0.1 | − | + | + | + | + | + | + | + | − | − |
Method 1, α = 0.2 | − | + | + | + | + | + | + | + | − | − |
Method 1, α = 0.5 | − | + | + | + | + | + | + | + | − | − |
Method 1, α = 0.9 | + | + | + | + | + | + | + | + | − | − |
Method 2, α = 0.1 | + | + | + | + | + | + | + | + | − | − |
Method 2, α = 0.2 | + | + | + | + | + | + | + | + | − | − |
Method 2, α = 0.5 | + | + | + | + | + | + | + | + | − | − |
Method 2, α = 0.9 | + | + | + | + | + | + | + | + | − | − |
Method 3, α = 0.1 | − | + | + | + | + | + | + | + | − | − |
Method 3, α = 0.2 | − | + | + | + | + | + | + | + | − | − |
Method 3, α = 0.5 | − | + | + | + | + | + | + | + | − | − |
Method 3, α = 0.9 | + | + | + | + | + | + | + | + | − | − |
Method 4, α = 0.1 | + | + | + | + | + | + | + | + | − | − |
Method 4, α = 0.2 | − | + | + | + | + | + | + | + | − | − |
Method 4, α = 0.5 | − | + | + | + | + | + | + | + | − | − |
Method 4, α = 0.9 | + | + | + | + | + | + | + | + | − | − |
Attack Type | Changing File Format | |||
---|---|---|---|---|
Embed Ways | Converting Jpg → Tiff | Converting Jpg → Bmp | Converting Tiff → Jpg | Converting Bmp → Jpg |
Without attack | + | + | − | + |
Method 1, α = 0.1 | − | + | − | − |
Method 1, α = 0.5 | − | + | − | + |
Method 1, α = 0.9 | + | + | − | + |
Method 2, α = 0.1 | − | + | − | − |
Method 2, α = 0.5 | − | + | − | + |
Method 2, α = 0.9 | − | + | − | + |
Method 3, α = 0.1 | − | + | − | − |
Method 3, α = 0.5 | − | + | − | + |
Method 3, α = 0.9 | − | + | − | + |
Method 4, α = 0.1 | − | − | − | − |
Method 4, α = 0.5 | − | + | − | + |
Method 4, α = 0.9 | − | + | − | + |
Attack Type | Changing File Format | |||
---|---|---|---|---|
Embed Ways | Converting Jpg → Tiff | Converting Jpg → Bmp | Converting Tiff → Jpg | Converting Bmp → Jpg |
Without attack | + | + | − | + |
Method 1, α = 0.1 | − | − | − | − |
Method 1, α = 0.5 | − | + | − | − |
Method 1, α = 0.9 | + | + | + | + |
Method 2, α = 0.1 | − | + | + | − |
Method 2, α = 0.5 | − | + | + | − |
Method 2, α = 0.9 | − | + | + | − |
Method 3, α = 0.1 | − | + | − | − |
Method 3, α = 0.5 | − | + | − | − |
Method 3, α = 0.9 | − | + | + | − |
Method 4, α = 0.1 | − | + | − | |
Method 4, α = 0.5 | − | + | + | − |
Method 4, α = 0.9 | − | + | + | −− |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dronyuk, I.; Fedevych, O.; Kryvinska, N. Constructing of Digital Watermark Based on Generalized Fourier Transform. Electronics 2020, 9, 1108. https://doi.org/10.3390/electronics9071108
Dronyuk I, Fedevych O, Kryvinska N. Constructing of Digital Watermark Based on Generalized Fourier Transform. Electronics. 2020; 9(7):1108. https://doi.org/10.3390/electronics9071108
Chicago/Turabian StyleDronyuk, Ivanna, Olga Fedevych, and Natalia Kryvinska. 2020. "Constructing of Digital Watermark Based on Generalized Fourier Transform" Electronics 9, no. 7: 1108. https://doi.org/10.3390/electronics9071108
APA StyleDronyuk, I., Fedevych, O., & Kryvinska, N. (2020). Constructing of Digital Watermark Based on Generalized Fourier Transform. Electronics, 9(7), 1108. https://doi.org/10.3390/electronics9071108