[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3561613.3561639acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccvConference Proceedingsconference-collections
research-article

A Robust Image Watermarking Algorithm Based on Content Authentication and Intelligent Optimization

Published: 09 November 2022 Publication History

Abstract

Aiming at some shortcomings of current digital watermarking algorithms, a color image double watermarking algorithm based on content authentication and machine learning is proposed in this paper. Firstly, the algorithm combines discrete wavelet transform (DWT) and discrete cosine transform (DCT), and embeds the watermark through singular value decomposition (SVD) modulation. Secondly, using the learning and classification characteristics of Support Vector Machine (SVM), the watermark detection model is obtained through training a large number of data, and finally the robust watermark is extracted automatically. In order to realize content authentication and tamper location, the algorithm embeds a fragile watermark at the same time, and uses the relationship between the high-frequency coefficients of wavelet transform to embed and extract the watermark. Through the simulation results and data analysis, the proposed double watermarking algorithm not only realizes the intelligent watermark extraction process, but also can accurately locate malicious tampering while maintaining strong robustness.

References

[1]
Hai Tao, Jasni M Z, Mohammad A, .A wavelet-based particle swarm optimization algorithm for digital image watermarking[J]. Integrated Computer-Aided Engineering, 2012, 3( 19) :81-91.
[2]
Pardhu T, Rao B, Perli.Digital image watermarking in frequency domain[C]. IEEE international conference on communications and signal processing. IEEE, 2016.
[3]
Shire A. Comparative analysis of watermarking in digital images using DCT, DWT & LSB[J]. International Journal of Engineering Sciences & Research Technology, 2015, 3 ( 2) :173-176.
[4]
Chen Qing, Guo Gong-xun.A wavelet coefficient adjustment watermarking algorithm based on modulus operation[J].Journal of Chinese Computer Systems, 2019, 40( 2) : 157-162.
[5]
Makbol N M, Khoo B E, Rassem T H.Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics[J].IET Image Processing, 2016, 10( 1) : 34-52.
[6]
Qi Xiangming, GAO Ting.Invisible and Robust Watermarking Algorithm Based on an Image Block[J].Journal of Image and Graphics, 2017,22(6):719-730.
[7]
Urvoy M, Goudia D, Autrusseau F.Perceptual DFT Watermarking with Improved Detection and Roubustness to Geometrical Distortions[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(7): 1108-1119.
[8]
Lv Xiuli, BIAN Hongyu, YU Bo.Watermarking Algorithm for Digital Images Based on SVR and DCT[J]. Systems Engineering and Electronics, 2011. 33(5):1187-1190.
[9]
XIAO Zhenjiu, ZHANG Han, CHEN Hong,et al. Zero-Watermarking Based on Boost Normed Singular Value Decomposition and Cellular Neural Network[J].Journal of Image and Graphics, 2017, 22(3):288-296.
[10]
Peng H, Wang J, Wang W. Image watermarking method in multiwavelet domain based on support vector machines[J]. Journal of Systems & Software, 2010, 83(8): 1470-1477.
[11]
Xu Wei, Liu Ying, Zhu Ting-ge. Image hash watermarking algorithm based on DCT and SVD [J]. Computer Engineering and Design, 2020, 41( 1) : 145-149.
[12]
Reza S.H., Mohammad S. Transform-based watermarking algorithm maintaining perceptual transparency [J]. IET Image Processing, 2018, 12( 5) : 751-759.
[13]
Rajiv Vasudeva, “A Review on Digital Image Watermarking and Its Techniques, ” Journal of Image and Graphics, Vol.4, No. 2, pp.150-153, December 2016.

Cited By

View all
  • (2024)FaceSigns: Semi-fragile Watermarks for Media AuthenticationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/364046620:11(1-21)Online publication date: 12-Sep-2024

Index Terms

  1. A Robust Image Watermarking Algorithm Based on Content Authentication and Intelligent Optimization

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCCV '22: Proceedings of the 5th International Conference on Control and Computer Vision
    August 2022
    241 pages
    ISBN:9781450397315
    DOI:10.1145/3561613
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 November 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DCT-DWT-SVD
    2. SVM
    3. fragile watermarking
    4. robust watermarking

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCCV 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)14
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 19 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)FaceSigns: Semi-fragile Watermarks for Media AuthenticationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/364046620:11(1-21)Online publication date: 12-Sep-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media