当前位置:
X-MOL 学术
›
Multidimens. Syst. Signal Process.
›
论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain
Multidimensional Systems and Signal Processing ( IF 2.5 ) Pub Date : 2020-06-04 , DOI: 10.1007/s11045-020-00732-1 Priyank Khare , Vinay Kumar Srivastava
Multidimensional Systems and Signal Processing ( IF 2.5 ) Pub Date : 2020-06-04 , DOI: 10.1007/s11045-020-00732-1 Priyank Khare , Vinay Kumar Srivastava
Image watermarking is one of the reliable methods which easily retains integrity and confidentiality of images against illegitimate users thereby ensuring copyright protection. In this paper a new image watermarking technique is proposed which employs fusion of discrete wavelet transform (DWT), homomorphic transform (HT), singular value decomposition along with Arnold transform (AT). In this work first level DWT is performed on host image which results in various subbands (LL, HL, LH and HH). HL subband is chosen which is further transformed by HT to decompose it in illumination and reflectance components. The watermark is scrambled with AT in order to strengthen security towards malicious attacks. Scrambled watermark is now embedded into singular values of the reflectance component. As reflectance component contains prominent image features, hence embedding in this part provides better immunity against several attacks and imperceptibility is also attained as this component varies very rapidly. Thus, major aim for proposed watermarking technique is achieved. The proposed scheme is implemented with numerous wavelet families such as Haar, Coiflet, symlet and biorthogonal. The main idea for implementing with different wavelets is to judge which wavelet demonstrates good robustness against various attacks. Proposed scheme performance is also evaluated by examining comprehensively under several attacks such as rotation, sharpening. Results clearly prove high robustness for the proposed scheme. Superiority of proposed scheme is clearly indicated by comparing it with other commonly—used schemes as reported by other researchers. Benchmark attacks like “Checkmark” attacks are also verified for the proposed scheme.
中文翻译:
一种可靠安全的DWT域同态变换图像水印算法
图像水印是一种可靠的方法,可以轻松地保持图像的完整性和机密性,防止非法用户使用,从而确保版权保护。本文提出了一种新的图像水印技术,它采用离散小波变换(DWT)、同态变换(HT)、奇异值分解和阿诺德变换(AT)的融合。在这项工作中,第一级 DWT 在主机图像上执行,从而产生各种子带(LL、HL、LH 和 HH)。选择 HL 子带,它通过 HT 进一步变换以将其分解为照明和反射分量。水印与 AT 加扰,以加强对恶意攻击的安全性。加扰水印现在嵌入到反射分量的奇异值中。由于反射分量包含突出的图像特征,因此嵌入在这部分可以更好地抵御多次攻击,并且由于该组件变化非常快,因此也可以实现不可察觉。因此,实现了所提出的水印技术的主要目标。所提出的方案是用许多小波族实现的,例如 Haar、Coiflet、symlet 和双正交。用不同的小波实现的主要思想是判断哪个小波对各种攻击表现出良好的鲁棒性。还通过在旋转、锐化等几种攻击下综合检查来评估所提出的方案性能。结果清楚地证明了所提出方案的高稳健性。通过与其他研究人员报告的其他常用方案进行比较,可以清楚地表明所提出方案的优越性。
更新日期:2020-06-04
中文翻译:
一种可靠安全的DWT域同态变换图像水印算法
图像水印是一种可靠的方法,可以轻松地保持图像的完整性和机密性,防止非法用户使用,从而确保版权保护。本文提出了一种新的图像水印技术,它采用离散小波变换(DWT)、同态变换(HT)、奇异值分解和阿诺德变换(AT)的融合。在这项工作中,第一级 DWT 在主机图像上执行,从而产生各种子带(LL、HL、LH 和 HH)。选择 HL 子带,它通过 HT 进一步变换以将其分解为照明和反射分量。水印与 AT 加扰,以加强对恶意攻击的安全性。加扰水印现在嵌入到反射分量的奇异值中。由于反射分量包含突出的图像特征,因此嵌入在这部分可以更好地抵御多次攻击,并且由于该组件变化非常快,因此也可以实现不可察觉。因此,实现了所提出的水印技术的主要目标。所提出的方案是用许多小波族实现的,例如 Haar、Coiflet、symlet 和双正交。用不同的小波实现的主要思想是判断哪个小波对各种攻击表现出良好的鲁棒性。还通过在旋转、锐化等几种攻击下综合检查来评估所提出的方案性能。结果清楚地证明了所提出方案的高稳健性。通过与其他研究人员报告的其他常用方案进行比较,可以清楚地表明所提出方案的优越性。