Skip Content
You are currently on the new version of our website. Access the old version .
Applied SciencesApplied Sciences
  • Article
  • Open Access

9 March 2018

Robust Image Watermarking Algorithm Based on ASIFT against Geometric Attacks

,
and
School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China
*
Author to whom correspondence should be addressed.

Abstract

Image processing technology has been developed rapidly in recent years, and altering the content of an image is easy for everyone, but may be illegal for an attacker. Thus, it is urgent and necessary to overcome this problem to protect the integrity and authenticity of images. Watermarking is a powerful technique proposed to solve this problem. This paper introduces a robust image watermarking algorithm working in the wavelet domain, embedding the watermark information into the third level low frequency coefficients after the three-level discrete wavelet transform (DWT) and singular value decomposition (SVD). Additionally, to improve the robustness to geometric attacks, the affine-scale-invariant feature transform (ASIFT) is applied to obtain feature points which are invariant to geometric attacks. Then, features of acquired points between the watermarked image and the received image are used to realize the resynchronization to improve the robustness. Experimental results show that the proposed algorithm achieves great balance between robustness and imperceptibility, and is robust against geometric attacks, JPEG compression, noise addition, cropping, median filters, and so on.

1. Introduction

With the fast development of information technology, multimedia data has become the most important carrier for information transmission. Digital images, as one of the most important ways for transmitting the information in one or more images, can be easily altered and destroyed by the developed techniques. Thus, to protect the authenticity and integrity of images, schemes applied for copyright protection of images can be essential and meaningful. Based on this purpose, there are mainly two methods proposed to overcome the above problems, which are digital signature [1,2] and digital image watermarking [3,4,5]. Digital signature is a kind of number string produced by the sender, which can be used as the secret key for both senders and receivers. But it can only detect that images have been tampered or not, and it cannot identify the tampered region location. Thus, watermarking technique is proposed as an effective method to solve the copyright issue of image contents. The categories of digital watermarking algorithms can be divided on the basis of their different robustness and functions: robust watermarking, semi-fragile watermarking, and fragile watermarking. Robust watermarking, as its name implies, should have robustness to all kinds of attacks, which is used for copyright protection. On the converse, fragile watermarking is sensitive to image modification, which includes malicious tampering and un-malicious processing. The last one is semi-fragile watermarking, which can be utilized to make the judgement between malicious tampering and non-malicious modification. Actually, semi-fragile watermarking integrates advantages in robust and fragile watermarking with each other. In addition, semi-fragile watermarking is superior to fragile watermarking when considering the ability of resisting common image operations. In perspective of the domain where the watermark works, watermarking technique can be categorized as spatial or frequency domain [6]. The embedding method of watermark information in spatial domain methods is to directly alter the pixel value of the digital image, and advantages of spatial domain watermarking are easy implementation and low computational complexity. But it has shortcoming that spatial watermarking is not robust to some image processing operations in some degree. Accordingly, the frequency domain methods embed the watermark information by use of modifying frequency coefficients of the original image after transforms. Compared with spatial methods, with the help of mathematical transform, frequency domain watermarking has the better imperceptibility and robustness. There are common mathematical transforms applied in the frequency domain watermarking: discrete wavelet transform (DWT), discrete cosine transform (DCT), singular value decomposition (SVD), and discrete Fourier transform (DFT) [7]. Many typical watermarking schemes are proposed as well as applied in the field of the medical research. Based on Lagrangian support vector regression (LSVR) and lifting wavelet transform (LWT), Mehta et al. [8] proposed an efficient image watermarking scheme, where the Arnold scrambled watermark is embedded into the selected blocks from low frequency sub-band by one level DWT. Makbol et al. [9] presented an innovative image watermarking scheme based on SVD and integer wavelet transform (IWT) to overcome the false positive problem (FPP). In [9], the singular matrix of the watermark is embedded into the singular values of the host image. To obtain the optimized scaling factor, multi-objective ant colony optimization (MOACO) is utilized. Rasti et al. [10] proposed a colour image watermarking algorithm to divide the host image into three channels and calculate the entropy of the patches obtained in the blocks. Certain patches are selected according to the comparison with a predefined threshold for further transforms to embed the watermark. In the aspect of functional magnetic resonance imaging (FMRI) protection, Castiglione et al. [11] introduced a fragile reversible watermarking scheme for achieving authenticity and integrity. In the field of microscopy images protection, Pizzolante et al. [12] introduced a novel watermarking scheme to embed the watermark information into the confocal microscopy image.
Traditional watermarking algorithms have robustness to the common attacks, such as noise addition, filter operation, cropping, and so on. However, owing to the unique features of geometric attacks, the watermark synchronization can be destroyed, bringing about the failure in watermark extraction [13]. Thus, it is urgent to propose watermarking algorithms which have resistance to geometric attacks. In recent years, there have been many schemes proposed to solve these problems, which are based on Zernike moments [14], harmonic transform [15], feature points [16], and so on. Due to the fact that SIFT is efficient for the application obtaining the image feature and matching the two images, which makes it more suitable for watermark embedding. However, the scale-invariance feature transform (SIFT) has some advantages: firstly, the significant amount of feature points can be extracted with appropriate parameter settings; secondly, the image feature extracted by SIFT has great uniqueness, which is suitable for accurate matching; finally, SIFT features are invariant to the rotation, scaling, and translations [17], which can be applied as an efficient tool for robust watermarking to acquire the robustness to the geometric attacks. Lee et al. [18] introduced to use local invariant feature for embedding the watermark into the patches of circle shapes generated by SIFT, and proposed an innovative image watermarking scheme. To deal with the watermark synchronization errors, Luo et al. [19] proposed an innovative watermarking scheme based on DFT and SIFT. Based on two techniques, SIFT and DWT, Lyu et al. [20] presented an image watermarking scheme, performing the DWT on the SIFT areas which are selected for watermark embedding. Thorat and Jadhav [21] proposed a watermarking scheme resistant to the geometric attacks based on IWT and SIFT, where SIFT is utilized on the red channels, and the feature points are extracted. Then, blue and green components are performed by IWT, and low-frequency coefficients can be extracted for watermark embedding. In [22], Pham et al. introduced a robust watermarking algorithm on the basis of SIFT and DCT, where the watermark information is embedded into the specific feature region performed by DCT. In [23], based on SVD and SIFT, Zhang and Tang proposed a robust watermarking scheme for solving the watermark synchronization problem, and SIFT is applied for watermarking resynchronization. To deal with the issue of copyright protection for depth image based rendering (DIBR) 3D images, Nam et al. [24] proposed a SIFT features-based blind watermarking algorithm, where feature points are extracted from different view images. Besides, a watermark pattern selection algorithm based on feature points orientation and spread spectrum technique for watermark embedding are applied in this algorithm. In [25], Kwawamura and Uchida presented a SIFT-based watermarking method, which is evaluated by the information hiding criteria (IHC). The local feature regions around SIFT features are applied for scaling and rotation robustness, and two error correction algorithms are used, which are weighted majority voting (WMV) and low density parity check (LDPC) code to correct the errors of extracted watermarks. As the fast algorithm compared with SIFT, speed up robust feature (SURF) algorithm is applied into watermarking algorithm. Fazli and Moeini [26] presented a geometric-distortion resilient watermarking algorithm, using the fuzzy C-means clustering to process the feature points extracted by SURF, and extracted feature point sets are used to divide the image into triangular patches for watermark embedding.
However, the traditional SIFT algorithm can match feature points under the condition of rotation and scaling. As for the tilted image, the feature extracted from the image can be of a small quantity. Concretely, the SIFT algorithm has the feature of scale invariance instead of affine invariance, which can result in the limitation that extraction for an image whose shooting angle changes with a large angle is difficult. In this paper, a novel robust watermarking based on affine-scale-invariance feature transform (ASIFT) [27] in the wavelet domain is presented. Firstly, DWT is performed on the host image for three times, and SVD is operated on the selected low frequency component in horizontal and vertical directions (LL) sub-band. Secondly, the watermark information is embedded into the obtained three-level LL sub-band. The ASIFT points are saved as feature keys for the correction of attacks. Thus, anti-attacks capability can be attained with the help of matching ASIFT feature points in the extraction phase. Finally, experimental results demonstrate that the proposed scheme is imperceptible and resilient to common image processing such as Gaussian noise, salt and pepper noise, speckle noise, median filters, cropping, and so on. Especially for geometric attacks, it has better performance than SIFT-based watermarking.
The remainder of this paper is arranged as follows: in Section 2, the related work is reviewed, including the theories of DWT, SVD, and ASIFT; Section 3 introduces the distortion correction by the ASIFT points; Section 4 gives concrete watermark embedding and extraction procedure; comparison with previous schemes in evaluation of robustness and imperceptibility and demonstration of the advantages in the proposed scheme are given in Section 5; conclusions and future work are illustrated finally in Section 6.

3. Resynchronization Algorithm Based on ASIFT

In general, the image can be attacked by different kinds of factors, such as common image processing and geometric attacks. Most robust image watermarking can resist the common processing, but geometric attacks can change the properties of an image, which can result in the destruction of watermark synchronization. To overcome this problem, an ASIFT-based resynchronization algorithm is used to extract the feature points as reference points for matching establishment between watermarked and received images. Then, the distortion parameter will be calculated and inverse processing can be done before watermark extraction to get the corrected image.

3.1. Resynchronization of Rotation

The definition of rotation operation is to rotate the image by a certain angle, which may result in the information loss of the original image. After obtaining the feature points of the watermarked image and attacked image, the resynchronization process of rotation can be expressed as
α r = 1 q k = 1 q β k ,   β k = arccos ( i w j w × i a j a | i w j w | × | i a j a | ) ,
where α r is the correction factor of the rotation, q is the quantity of the matching points between two images, k is the rank of matchings, and β k is the angle between two images in one matching of the rank k . Moreover, according to the basic mathematic theory of the angle between two vectors, which is that a × b = | a | | b | cos θ a , b , the β k can be calculated. Based on the coordinates of the matching points, the vectors between two matching points can be obtained, which are i w j w , vectors in the watermarked image and i a j a , vectors in the received image. Finally, the β k can be obtained according to trigonometric function transform.
Figure 4 shows the matchings between watermarked image and rotated image ( 45 ° ).
Figure 4. Matching points between image and rotated image ( 45 ° ).

3.2. Resynchronization of Translation

The definition of a translation operation is to move the pixel points in an image from one coordinate to the other one vertically or horizontally, which can lead to the error position of the pixel points. After obtaining the feature points of the watermarked image and received image, the resynchronization process of translation can be expressed as
( x t , y t ) = { ( x a x w + M , y a y w + N ) , x a < x w , y a < y w , ( x a x w , y a y w ) , otherwise ,
where ( x t , y t ) is the corrected coordinate of the received image, ( x a , y a ) is the coordinate of the points in the attacked image, and ( x w , y w ) is the coordinate in the watermarked image. Besides, sizes of both watermarked image and attacked image are M × N . Apparently, the resynchronization of the translation is to move the pixel points with the same number of pixels in the converse direction for the translation compensation.
Figure 5 shows the matchings between watermarked image and translated image vertically (256 pixels).
Figure 5. Matching points between watermarked image and translated image vertically (256 pixels).

3.3. Resynchronization of Scaling

The definition of scaling operation is to zoom in and out of the image with a certain ratio, which can result in the ratio distortion of the original image. Similarly, after obtaining the feature points of the watermarked image and attacked image, the resynchronization process of scaling can be expressed as
α s = 1 q k = 1 q s w k s a k ,
where the scaling correction factor α s can be calculated by the sum of the ratio between watermarked image s w k and attacked image s a k . q is the quantity of the matching points between two images, and k is the rank of matchings. After α s is obtained, the attacked image can be scaled with the inverse ratio, and the resynchronized image can be reconstructed.
Figure 6 shows the matchings between watermarked image and image after scaling (0.5).
Figure 6. Matching feature points between watermarked image and scaled image (0.5).

4. The Proposed Algorithm

The basic procedure of the proposed algorithm can be concluded as three stages: the watermark embedding stage, resynchronization, and watermark extraction. For easy demonstration, the resynchronization process is categorized as a part of watermark extraction. Moreover, in order to improve the security of the watermarking scheme, Arnold transform is applied to scramble the watermark for encryption. With the help of a certain key, the watermark can be scrambled, and the extracted watermark can be decrypted similarly with the certain key in the extraction phase. The watermark embedding and extraction methods are shown in Figure 7a and Figure 7b, respectively. Watermark embedding and extraction algorithms are given below.
Figure 7. Flowchart of watermark embedding and extraction: (a) watermark embedding; (b) watermark extraction.
Algorithm 1 Watermark Embedding Algorithm
Variable Declaration:
  • Elaine: host image
  • SDU: watermark image
  • I: read the host image
  • W: read the watermark image
  • α : scaling factor for controlling the embedding intensity
  • DWT, SVD and ASIFT: transform applied in the algorithm
  • Wavelet filters: Haar
  • Arnold: the scrambling algorithm
  • K: the period for scrambling
  • LL1, LH1, HL1, and HH1: first level DWT coefficients for host image
  • LL2, LH2, HL2, and HH2: second level DWT coefficients for LL1
  • LL3, LH3, HL3, and HH3: third level DWT coefficients for LL2
  • W : watermark image
  • S : diagonal matrix for LL3
  • U and V : orthogonal matrices for LL3
  • S w : the watermarked diagonal matrix
  • S ww : diagonal matrix for S w
  • U w and V w : orthogonal matrices for S w
  • I w : watermarked image
  • T: transpose of the matrix
  • LL3w: the watermarked LL3
  • LL2w: the watermarked LL2
  • LL1w: the watermarked LL1
  • P : feature points key by ASIFT
Embedding Procedure:
1
Read the images.
I Elaine.bmp (host image with size of 512 × 512);
W SDU.bmp (watermark image with size of 64 × 64);
2
Apply three-level DWT on the host image.
[LL1, LH1, HL1, HH1] DWT (I, ‘Haar’);
[LL2, LH2, HL2, HH2] DWT (LL1, ‘Haar’);
[LL3, LH3, HL3, HH3] DWT (LL2, ‘Haar’);
3
Choose the LL3 sub-band in Step 4
U S V T SVD (LL3);
4
Select the optimized scaling factor from 0.1 to 1 manually.
W = Arnold (W, K);
for α 0.01:1
S w = S + α × W ;
endfor;
5
Perform the dual SVD
U w S ww V w T SVD ( S w );
6
Reconstruct the watermarked three-level LL sub-band.
LL3w U S ww V T ;
7
Apply inverse DWT for three times on the sub-band to reconstruct the watermarked image.
LL2w inverse DWT (LL3w, LH3, HL3, HH3);
LL1w inverse DWT (LL2w, LH2, HL2, HH2);
I w inverse DWT (LL1w, LH1, HL1, HH1);
8
Acquire the ASIFT feature points.
P ASIFT ( I w );
Algorithm 2 Watermark Extraction Algorithm
Variable Declaration:
  • Ia: read the attacked image
  • I a : attacked image at the receiving end
  • P : feature points key by ASIFT in watermarked image
  • P a : feature points key by ASIFT in attacked image
  • I c : corrected image after the resynchronization process
  • α : scaling factor
  • M : matchings
  • d r : rotation distortion parameter
  • d s : scaling distortion parameter
  • c r : corrected parameter of rotation
  • c s : corrected parameter of scaling
  • x c : corrected x-coordinate of translation
  • y c : corrected y-coordinate of translation
  • x w : x-coordinate of feature points in watermarked image
  • y w : y-coordinate of feature points in watermarked image
  • x a : x-coordinate of feature points in attacked image
  • y a : y-coordinate of feature points in attacked image
  • M : length of image
  • N : width of image
  • Arnold: the scrambling algorithm
  • K: the period of scrambling
  • DWT, SVD and ASIFT: transform applied in the algorithm
  • Wavelet filters: Haar
  • LL1w*, LH1*, HL1*, and HH1*: first level DWT coefficients for I c
  • LL2w*, LH2*, HL2*, and HH2*: second level DWT coefficients for LL1w*
  • LL3w*, LH3*, HL3*, and HH3*: third level DWT coefficients for LL2w*
  • W e * : extracted watermark image
  • U * and V * : orthogonal matrices for LL3*
  • S w * : watermarked diagonal matrix in corrected image
  • S ww * : watermarked diagonal matrix for
  • S w *
  • U w and V w : orthogonal matrices for S w
  • T: transpose of the matrix
Extraction Procedure:
1
Read the attacked image.
Ia Attacked image.bmp;
2
Perform ASIFT on attacked image to extract the feature points for resynchronization
P a ASIFT ( I a );
3
Feature matching and watermark resynchronization.
Find the matchings between P a and P .
M matching ( P a , P );
Judge the type of attacks.
if ( d r 0 ) then
I c imrotate ( I a , c r );
endif;
if ( d s 0 ) then
I c imresize ( I a , c r );
endif;
if ( d t 0 ) then
//x-coordinate correction
if ( x w > x a ) then
x c = x a x w + M
else
x c = x a x w ;
endif;
//y-coordinate correction
if ( y w > y a ) then
y c = y a y w + N ;
else
y c = y a y w ;
endif;
endif;
4
Perform DWT on corrected Image to get the LL3 with watermark information
[LL1w*, LH1, HL1, HH1] DWT ( I c , ‘Haar’);
[LL2w*, LH2, HL2, HH2] DWT (LL1w*, ‘Haar’);
[LL3w*, LH3, HL3, HH3] DWT (LL2w*, ‘Haar’);
5
Perform SVD on the selected sub-band.
U w S ww V w T SVD ( S w );
6
Matrix S w * retrieval.
S w * = U w S ww * V w T ;
7
Watermark extraction and decryption.
W e * = ( S w * S ) / α ;
W e * = Arnold ( W e * , K);

5. Experimental Results and Discussion

In this section, performances of the ASIFT-based watermarking method are shown and discussed, which is executed on the 512 × 512 host image and 64 × 64 binary watermark. Additionally, the scheme is tested on MATLAB R2015a with an Intel (R) Core (TM), i7-6500U 2.50 GHz CPU, 6 GB memory computer. To testify the effectiveness of the proposed algorithm, the watermarking scheme is performed on several images, which are shown in Figure 8.
Figure 8. Test images: (a) Airplane; (b) Elaine; (c) Lena; (d) Mountain; (e) Bank; (f) Peppers; (g) Milk drop; (h) Gold hill.

5.1. Performance Evaluation

The performance of the watermarking algorithm can be evaluated in aspects of imperceptibility and robustness mainly by two indexes: peak signal-to-noise ratio (PSNR) and normalized correlation (NC) coefficients. Generally, a larger PSNR value represents a better visual quality and imperceptibility, and watermarked image whose PSNR is greater than 35 dB can be acceptable. The definition of PSNR for the image with size of M × N can be
PSNR = 10 lg 255 2 MSE = 10 lg [ 255 2 M N i = 0 M 1 j = 0 N 1 [ I ( i , j ) I w ( i , j ) ] 2 ] ( dB ) ,
where I ( i , j ) is the pixel coordinate in the original image, and I w ( i , j ) is that in the watermarked image. MSE is the short form for mean square error.
The robustness of the algorithm can be determined by NC with the value range from 0 to 1, which evaluates the similarity between original watermark and extracted watermark. Similarly, the NC should be 1, but the value greater than 0.7 is acceptable.
NC = i = 1 m j = 1 n W ( i , j ) × W e ( i , j ) i = 1 m j = 1 n W ( i , j ) × W ( i , j ) ,
where W ( i , j ) and W e ( i , j ) are original watermark and the extracted watermark, respectively. The size of the watermark is m × n .

5.2. Results and Discussion

5.2.1. Performance of Imperceptibility

To test the watermark transparency of the watermarked image, the image labelled ‘Elaine’ is used, which contains abundant information, and watermark image of the letter ‘SDU’ (the abbreviation for Shandong University) is used to finish the experiments. As is shown in Figure 9, the watermarked image can achieve good quality of transparency compared with the original image.
Figure 9. Transparency of the watermarked image: (a) original image; (b) original watermark; (c) watermarked image; (d) extracted watermark.
Additionally, the number of ASIFT feature points in test images are shown in Table 1.
Table 1. Number of affine-scale-invariant feature transform (ASIFT) feature points.
As can be seen in Table 1, the number of points obtained by ASIFT are significant, which has advantages for points matching and distortion correction.

5.2.2. Performance of Robustness

To test the robustness of the proposed watermarking scheme thoroughly, common attacks and geometric attacks are performed on the watermarked images. Here, the image labelled ‘Elaine’ is selected as the specific illustration. Figure 10 gives the attacked images and extracted watermarks under different kinds of processes and attacks, which contains JPEG (50 and 70), salt and pepper noise with densities of 0.01 and 0.05, speckle noise with density of 0.01 and 0.1, Gaussian noise with the mean of 0 and the variances of 0.05 and 0.1, median filter with the window sizes of 3 × 3, 4 × 4, and 5 × 5, and center cropping (25%).
Figure 10. Attacked images and extracted watermarks under different kinds of attacks: (a) JPEG (70); (b) extracted watermark from (a); (c) JPEG (50); (d) extracted watermark from (c); (e) salt and pepper noise (0.01); (f) watermark extracted from (e); (g) salt and pepper noise (0.05); (h) extracted watermark from (g); (i) speckle noise (0.01); (j) extracted watermark from (i); (k) speckle noise (0.1); (l) extracted watermark from (k); (m) Gaussian noise (0, 0.01); (n) extracted watermark from (m); (o) Gaussian noise (0, 0.05); (p) extracted watermark from (o); (q) median filter (3 × 3); (r) extracted watermark from (q); (s) median filter (4 × 4); (t) extracted watermark from (s); (u) median filter (5 × 5); (v) extracted watermark from (u); (w) center cropping (25%); (x) extracted watermark from (w).
In Figure 11, attacked images and extracted watermarks under different kinds of geometric attacks are given, including scaling with parameters of 0.25, 0.5, 0.9, and 1.2, rotation with parameters of 5 ° , 10 ° , 30 ° , and 45 ° , and translation with parameters of 128 pixels and 256 pixels in horizontal and vertical directions.
Figure 11. Attacked images and extracted watermarks under geometric attacks: (a) 5 ° rotation; (b) extracted watermark from (a); (c) 10 ° rotation; (d) extracted watermark from (c); (e) 30 ° rotation; (f) extracted watermark from (e); (g) 45 ° rotation; (h) extracted watermark from (g); (i) scaling (0.25); (j) extracted watermark from (i); (k) scaling (0.5); (l) extracted watermark from (k); (m) scaling (0.9); (n) extracted watermark from (m); (o) scaling (1.2); (p) extracted watermark from (o); (q) vertical translation (256 pixels); (r) extracted watermark from (q); (s) horizontal translation (256 pixels); (t) extracted watermark from (s).
Table 2 and Table 3 give the robustness performance of the proposed scheme on different images, and the image labelled ‘Elaine’ with less points as well as the image labelled ‘Gold hill’ with more points are selected as the representatives.
Table 2. Robustness of the proposed algorithm on image Elaine.
Table 3. Robustness of the proposed algorithm on image Gold hill.
As can be seen in Table 2, the robustness performance of the proposed algorithm is given on the host image ‘Elaine’ and the watermark image ‘SDU’. The PSNR value of the proposed method is 52.57 dB, which illustrates the good transparency of the watermarked image.
In Table 3, the robustness performance of the proposed algorithm is given on the host image ‘Gold hill’ and the watermark image ‘SDU’. The PSNR value is 51.01 dB. In general, the image labelled ‘Gold hill’ has more points than the image labelled ‘Elaine’. Thus, the robustness to geometric attacks on ‘Gold hill’ is a little better than that on ‘Elaine’.

5.3. Performance Comparison

To further prove the performance of the proposed algorithm, the experiments were executed on comparing the proposed method with previous scheme [31], which applied the SIFT algorithm for distortion correction. The NC results are shown in Table 4. It can be concluded that, the ASIFT-based watermarking scheme has better robustness in scaling, translation, and rotation in small angles than the watermarking algorithm based on SIFT.
Table 4. Performance comparisons with previous algorithms.

6. Conclusions

With the rapid development of image processing technology, altering the content of an image is easy for everyone, but may be illegal for an attacker. It is urgent and necessary to overcome this problem, to protect the integrity and authenticity of images. Watermarking is a powerful technique proposed to solve this problem. In this paper, an ASIFT-based robust watermarking algorithm is proposed to solve the geometric attacks in copyright protection issues. In the proposed algorithm, the watermark information is inserted into the low frequency sub-band after DWT three times, where the SVD is performed again for watermark embedding. While in the extraction process, to improve the robustness to geometric attacks, ASIFT is applied to obtain feature points which are invariant to geometric attacks. Then, features of acquired points between the watermarked image and received image are used to realize the resynchronization to improve the robustness. Experimental results show that the proposed algorithm achieves great balance between robustness and imperceptibility, and is robust against geometric attacks, JPEG compression, noise addition, copping, filter operation, and so on. In the future work, SIFT correction can be applied to video watermarking for rotation resistance.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61702303, No. 61201371); the Natural Science Foundation of Shandong Province, China (No. ZR2017MF020, No. ZR2015PF004); and the Research Award Fund for Outstanding Young and Middle-Aged Scientists of Shandong Province, China (No. BS2013DX022).

Author Contributions

Chengyou Wang and Yunpeng Zhang conceived the algorithm and designed the experiments; Yunpeng Zhang performed the experiments; Chengyou Wang and Xiao Zhou analyzed the results; Yunpeng Zhang drafted the manuscript; Chengyou Wang, Yunpeng Zhang and Xiao Zhou revised the manuscript. All authors read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shiva, M.G.; D’Souza, R.J.; Varaprasad, P. Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Sens. J. 2012, 12, 2941–2949. [Google Scholar]
  2. Chain, K.; Kuo, W.C. A new digital signature scheme based on chaotic maps. Nonlinear Dyn. 2013, 74, 1003–1012. [Google Scholar] [CrossRef]
  3. Asifullah, K.; Ayesha, S.; Summuyya, M.; Sana, A.M. A recent survey of reversible watermarking techniques. Inf. Sci. 2014, 279, 251–272. [Google Scholar]
  4. Ritu, J.; Munesh, C.T.; Shailesh, T. Digital audio watermarking: A survey. In Proceedings of the International Conference on Computer, Communication and Computational Sciences, Ajmer, India, 12–13 August 2016; Volume 554, pp. 433–443. [Google Scholar]
  5. Asikuzzaman, M.; Mark, R.P. An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. 2017. [Google Scholar] [CrossRef]
  6. Su, Q.T.; Wang, G.; Lv, G.H.; Zhang, X.F.; Deng, G.L.; Chen, B.J. A novel blind color image watermarking based on contourlet transform and Hessenberg decomposition. Multimed. Tools Appl. 2017, 76, 8781–8801. [Google Scholar] [CrossRef]
  7. Singh, D.; Singh, S.K. DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed. Tools Appl. 2017, 76, 13001–13024. [Google Scholar] [CrossRef]
  8. Mehta, R.; Rajpal, N.; Vishwakarma, V.P. A robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform. Int. J. Mach. Learn. Cybern. 2017, 8, 379–395. [Google Scholar] [CrossRef]
  9. Makbol, N.M.; Khoo, B.E.; Rassem, T.H.; Loukhaoukha, K. A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf. Sci. 2017, 417, 381–400. [Google Scholar] [CrossRef]
  10. Rasti, P.; Anbarjafari, G.; Demirel, H. Colour image watermarking based on wavelet and QR decomposition. In Proceedings of the 25th Signal Processing and Communications Applications Conference, Antalya, Turkey, 15–18 May 2017. [Google Scholar]
  11. Castiglione, A.; De Santis, A.; Pizzolante, R.; Castiglione, A.; Loia, V.; Palmieri, F. On the protection of fMRI images in multi-domain environments. In Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, Gwangju, Korea, 25–27 March 2015; pp. 476–481. [Google Scholar]
  12. Pizzolante, R.; Castiglione, A.; Carpentieri, B.; De Santis, A.; Castiglione, A. Protection of microscopy images through digital watermarking techniques. In Proceedings of the International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, 10–12 September 2014; pp. 65–72. [Google Scholar]
  13. Fazli, S.; Moeini, M. A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 2016, 127, 964–972. [Google Scholar] [CrossRef]
  14. Lutovac, B.; Daković, M.; Stanković, S.; Orović, I. An algorithm for robust image watermarking based on the DCT and Zernike moments. Multimed. Tools Appl. 2017, 76, 23333–23352. [Google Scholar] [CrossRef]
  15. Yang, H.Y.; Wang, X.Y.; Niu, P.P.; Wang, A.L. Robust color image watermarking using geometric invariant quaternion polar harmonic transform. ACM Trans. Multimed. Comput. Commun. Appl. 2015, 11, 1–26. [Google Scholar] [CrossRef]
  16. Zhang, Y.P.; Wang, C.Y.; Wang, X.L.; Wang, M. Feature-based image watermarking algorithm using SVD and APBT for copyright protection. Future Internet 2017, 9, 13. [Google Scholar] [CrossRef]
  17. Ye, X.Y.; Chen, X.T.; Deng, M.; Wang, Y.L. A SIFT-based DWT-SVD blind watermark method against geometrical attacks. In Proceedings of the 7th International Congress on Image and Signal Processing, Dalian, China, 14–16 October 2014; pp. 323–329. [Google Scholar]
  18. Lee, H.; Kim, H.; Lee, H. Robust image watermarking using local invariant features. Opt. Eng. 2006, 45, 535–545. [Google Scholar]
  19. Luo, H.J.; Sun, X.M.; Yang, H.F.; Xia, Z.H. A robust image watermarking based on image restoration using SIFT. Radio Eng. 2011, 20, 525–532. [Google Scholar]
  20. Lyu, W.L.; Chang, C.C.; Nguyen, T.S.; Lin, C.C. Image watermarking scheme based on scale-invariant feature transform. KSII Trans. Internet Inf. Syst. 2014, 8, 3591–3606. [Google Scholar]
  21. Thorat, C.G.; Jadhav, B.D. A blind digital watermark technique for color image based on integer wavelet transform and SIFT. Procedia Comput. Sci. 2010, 2, 236–241. [Google Scholar] [CrossRef]
  22. Pham, V.Q.; Miyaki, T.; Yamasaki, T.; Aizawa, K. Geometrically invariant object-based watermarking using SIFT feature. In Proceedings of the 14th IEEE International Conference on Image Processing, San Antonio, TX, USA, 16–19 September 2007; Volume 5, pp. 473–476. [Google Scholar]
  23. Zhang, L.; Tang, B. A combination of feature-points-based and SVD-based image watermarking algorithm. In Proceedings of the International Conference on Industrial Control and Electronics Engineering, Xi’an, China, 23–25 August 2012; pp. 1092–1095. [Google Scholar]
  24. Nam, S.H.; Kim, W.H.; Mun, S.M.; Hou, J.U.; Choi, S.; Lee, H.K. A SIFT features based blind watermarking for DIBR 3D images. Multimed. Tools Appl. 2017, 1–40. [Google Scholar] [CrossRef]
  25. Kawamura, M.; Uchida, K. SIFT feature-based watermarking method aimed at achieving IHC ver. 5. In Proceedings of the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Matsue, Shimane, Japan, 12–15 August 2017; pp. 381–389. [Google Scholar]
  26. Fazli, S.; Moeini, M. A rough geometric-distortion resilient watermarking algorithm using fuzzy C-means clustering of SURF points. Int. J. Eng. Technol. Sci. 2015, 3, 210–220. [Google Scholar]
  27. Yu, G.S.; Morel, J.M. ASIFT: An algorithm for fully affine invariant comparison. Image Process. On Line 2011, 1, 11–38. [Google Scholar] [CrossRef]
  28. Lowe, D.G. Object recognition from local scale-invariant features. In Proceedings of the 7th IEEE International Conference on Computer Vision, Kerkyra, Corfu, Greece, 20–27 September 1999; Volume 2, pp. 1150–1157. [Google Scholar]
  29. Morel, J.M.; Yu, G.S. ASIFT: A new framework for fully affine invariant image comparison. SIAM J. Imaging Sci. 2009, 2, 438–469. [Google Scholar] [CrossRef]
  30. Moisan, L.; Stival, B. A probabilistic criterion to detect rigid point matches between two images and estimate the fundamental matrix. Int. J. Comput. Vis. 2004, 57, 201–218. [Google Scholar] [CrossRef]
  31. Zhang, Y.P.; Wang, C.Y.; Zhou, X. RST resilient watermarking scheme based on DWT-SVD and scale-invariant feature transform. Algorithms 2017, 10, 41. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.