You are not logged in.

Robust histogram shape-based method for image watermarking

Zong, Tianrui, Xiang, Yong, Natgunanathan, Iynkaran, Guo, Song, Zhou, Wanlei and Beliakov, Gleb 2015, Robust histogram shape-based method for image watermarking, IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 5, pp. 717-729, doi: 10.1109/TCSVT.2014.2363743.

Attached Files
Name Description MIMEType Size Downloads

Title Robust histogram shape-based method for image watermarking
Author(s) Zong, Tianrui
Xiang, YongORCID iD for Xiang, Yong orcid.org/0000-0003-3545-7863
Natgunanathan, Iynkaran
Guo, Song
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Beliakov, GlebORCID iD for Beliakov, Gleb orcid.org/0000-0002-9841-5292
Journal name IEEE Transactions on Circuits and Systems for Video Technology
Volume number 25
Issue number 5
Start page 717
End page 729
Total pages 13
Publisher IEEE
Place of publication New York, NY
Publication date 2015-05-01
ISSN 1051-8215
Keyword(s) cropping
Gaussian filtering
histogram
Image watermarking
random bending
Summary Cropping and random bending are two common attacks in image watermarking. In this paper we propose a novel image-watermarking method to deal with these attacks, as well as other common attacks. In the embedding process, we first preprocess the host image by a Gaussian low-pass filter. Then, a secret key is used to randomly select a number of gray levels and the histogram of the filtered image with respect to these selected gray levels is constructed. After that, a histogram-shape-related index is introduced to choose the pixel groups with the highest number of pixels and a safe band is built between the chosen and nonchosen pixel groups. A watermark-embedding scheme is proposed to insert watermarks into the chosen pixel groups. The usage of the histogram-shape-related index and safe band results in good robustness. Moreover, a novel high-frequency component modification mechanism is also utilized in the embedding scheme to further improve robustness. At the decoding end, based on the available secret key, the watermarked pixel groups are identified and watermarks are extracted from them. The effectiveness of the proposed image-watermarking method is demonstrated by simulation examples.
Language eng
DOI 10.1109/TCSVT.2014.2363743
Field of Research 080106 Image Processing
Socio Economic Objective 861503 Scientific Instruments
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30073478

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 8 times in TR Web of Science
Scopus Citation Count Cited 10 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 196 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Thu, 28 May 2015, 09:47:09 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.