Robust and blind image watermarking via circular embedding and bidimensional empirical mode decomposition

  • PDF / 3,500,350 Bytes
  • 14 Pages / 595.276 x 790.866 pts Page_size
  • 79 Downloads / 181 Views

DOWNLOAD

REPORT


ORIGINAL ARTICLE

Robust and blind image watermarking via circular embedding and bidimensional empirical mode decomposition Xiaochao Wang1 · Kun Hu2 · Jianping Hu3 · Ling Du1 · Anthony T. S. Ho4 · Hong Qin5

© Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract In this paper, a robust and blind image watermarking algorithm via circular embedding and bidimensional empirical mode decomposition (BEMD) is developed. First, the watermark image is scrambled by Arnold transform to increase the security of the algorithm. Second, the Hilbert curve is adopted to reduce the scrambled 2D watermark image to one-dimensional watermark signal. Third, the host image is decomposed by BEMD to obtain the multi-scale representation in the forms of intrinsic mode functions (IMFs) and a residue. Then, the extreme points of the IMFs are extracted as the embedding locations. Finally, the one-dimensional watermark signal is repeatedly and cyclically embedded in the extreme locations of the first IMF according to the texture masking characteristics of the human visual system, which greatly improves the ability of our algorithm against various attacks. The final watermarked image is reconstructed by combining the modified first IMF and the residual. The watermark can be successfully extracted without resorting to the original host image. Furthermore, image correction can be applied before image watermarking extraction if there are geometric attacks in watermarked image. A large number of experimental results and thorough evaluations confirm that our method can obtain higher imperceptibility and robustness under different types of attacks, and achieve better performance than the current state-of-the-art watermarking algorithms, especially in large-scale cropping attack, JPEG compression, Gaussian noise, sharpening, Gamma correction, scaling, histogram equalization, and rotation attacks. Keywords Image watermarking · Circular embedding · BEMD · Arnold transform · Hilbert curve

1 Introduction and motivation

B

Jianping Hu [email protected] Xiaochao Wang [email protected] Kun Hu [email protected] Ling Du [email protected] Anthony T. S. Ho [email protected] Hong Qin [email protected]

With the widespread popularity of image acquisition equipments and the rapid development of digital media communication technologies, magnanimous images could be easily acquired, duplicated, revised, and disseminated. Apart from these conveniences, the abuse of images, copyright infringement, malicious dissemination have arisen and attracted extensive attentions in the area of digital media and information technologies. To solve the aforementioned issue and protect the copyright of images, image watermarking has been widely studied as a very promising information security technology and plays an important role in protecting the copyright of digital images.

1

School of Mathematical Sciences, Tiangong University, Tianjin 300387, China

2

University of Chinese Academy of Sciences, Beijing 100049, China

4

Department of Computer Sci