|Table of Contents|

[1] Chen Liquan, Sun Xiaoyan, Lu Miao, Shao Chen, et al. Contourlet watermarking algorithmbased on Arnold scrambling and singular value decomposition [J]. Journal of Southeast University (English Edition), 2012, 28 (4): 386-391. [doi:10.3969/j.issn.1003-7985.2012.04.003]
Copy

Contourlet watermarking algorithmbased on Arnold scrambling and singular value decomposition()
基于Arnold置乱及SVD的Contourlet数字水印算法
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
28
Issue:
2012 4
Page:
386-391
Research Field:
Computer Science and Engineering
Publishing date:
2012-12-30

Info

Title:
Contourlet watermarking algorithmbased on Arnold scrambling and singular value decomposition
基于Arnold置乱及SVD的Contourlet数字水印算法
Author(s):
Chen Liquan Sun Xiaoyan Lu Miao Shao Chen
School of Information Science and Engineering, Southeast University, Nanjing 210096, China
陈立全 孙晓燕 卢苗 邵辰
东南大学信息科学与工程学院, 南京 210096
Keywords:
digital watermarking contourlet transform Arnold scrambling singular value decomposition(SVD)
数字水印 Contourlet变换 Arnold置乱 奇异值分解
PACS:
TP309.2
DOI:
10.3969/j.issn.1003-7985.2012.04.003
Abstract:
A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition(SVD)scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt-and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured.
为了提高数字水印的鲁棒性和抗攻击能力, 提出了一种基于Contourlet变换的新型数字水印算法.该方法从水印预处理和嵌入方式2个方面入手, 用Arnold置乱来预处理水印数据, 通过对载体图像进行奇异值分解(SVD)处理来寻找最合适的嵌入位置.载体图像经过Contourlet变换后, 对中频子带进行SVD分解以得到SVD数值, 将Arnold置乱后的水印分散嵌入到中频子带的SVD参数中, 再经过Contourlet反变换得到嵌入水印后的载体图像.在提取端, Contourlet水印的提取采用半盲检测提取方法.仿真结果表明, 与传统Contourlet算法和结合SVD的Contourlet算法相比, 所提出的算法具有更好的隐藏性能和鲁棒性.同时, 在保证安全性能的基础上, 当嵌入的水印受到高斯噪声、椒盐噪声、图像扩展、图像剪裁等攻击时, 所提算法具有良好的鲁棒性能.

References:

[1] Boato G, de Natale F, Fontanari C. Digital image tracing by sequential multiple watermarking [J]. IEEE Transactions on Multimedia, 2007, 9(4): 677-686.
[2] Do M N, Vetterli M. Contourlets: A directional multi-resolution image representation [C]//IEEE International Conference on Image Processions. New York, USA, 2002: 357-360.
[3] Xiao S Q, Ling H F, Zou F H, et al. Adaptive image watermarking algorithm in contourlet domain [C]//Japan-China Joint Workshop on Frontier of Computer Science and Technology. Tokyo, Japan, 2007: 125-130.
[4] Shu Z H, Liu G D, Gan L X, et al. Image watermarking based on wavelet-based contourlet packet transform with best tree [C]//Second International Symposium on Electronic Commerce and Security. Nanchang, China, 2009: 203-207.
[5] Akhaee M A, Sahraeian S M E, Marvasti F. Contourlet-based image watermarking using optimum detector in a noisy environment [J]. IEEE Transactions on Image Processing, 2010, 19(4): 967-980.
[6] Kaviani H R, Karimi N, Samavi S. Robust watermarking in singular values of contourlet coefficients [C]//The 7th Iranian Machine Vision and Image Processing(MVIP). Tehran, Iran, 2011: 1-5.
[7] Lai C C, Tsai C C. Digital image watermarking using discrete wavelet transform and singular value decomposition[J].IEEE Transactions on Instrumentation and Measurement, 2010, 59(11): 3060-3063.
[8] Liu F, Wang Y K. Restoring of the watermarking image in Arnold scrambling [C]//The 2nd International Conference on Signal Processing Systems(ICSPS). Dalian, China, 2010: 771-774.
[9] Po D D Y, Do M N. Directional multiscale modeling of images using the contourlet transform [J]. IEEE Transactions on Image Processing, 2006, 15(6): 1610-1620.
[10] Bamberger R H, Smith M J T. A filter bank for the directional decomposition of images: theory and design [J]. IEEE Transactions on Signal Processing, 1992, 40(4): 882-893.
[11] Dubolia R, Singh R, Bhadoria S, et al. Digital image watermarking by using discrete wavelet transform and discrete cosine transform and comparison based on PSNR [C]//International Conference on Communication Systems and Network Technologies(ICCSNT). Harbin, China, 2011: 593596.

Memo

Memo:
Biography: Chen Liquan(1976—), male, doctor, associate professor, lqchen@seu.edu.cn.
Foundation item: The National Natural Science Foundation of China(No.69092008).
Citation: Chen Liquan, Sun Xiaoyan, Lu Miao, et al. Contourlet watermarking algorithm based on Arnold scrambling and singular value decomposition[J].Journal of Southeast University(English Edition), 2012, 28(4):386-391.[doi:10.3969/j.issn.1003-7985.2012.04.003]
Last Update: 2012-12-20