OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 49, Iss. 32 — Nov. 10, 2010
  • pp: 6302–6312

Robust image watermarking scheme against geometric attacks using a computer-generated hologram

Jianzhong Li  »View Author Affiliations


Applied Optics, Vol. 49, Issue 32, pp. 6302-6312 (2010)
http://dx.doi.org/10.1364/AO.49.006302


View Full Text Article

Enhanced HTML    Acrobat PDF (769 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

Robustness against geometric attacks is one of the most important issues in digital watermarking. A novel geometric robust watermarking scheme that uses computer-generated holograms as the watermark is presented. To maintain imperceptibility and robustness, a quantization embedding algorithm is adopted to embed the mark hologram into the low-frequency subband of the wavelet-transformed host image. In the detection process, the geometric distorted watermarked images are recovered first by the proposed improved geometric correction method, which is based on the scale invariant feature transform, the invariant centroid, and the pulse coupled neural network. Then the mark holograms are extracted from the recovered images. In comparison with the traditional geometric estimation method, the suggested improved geometric correction method can estimate the geometric distortion parameters more accurately and needs less auxiliary information. Compared with other watermark schemes using digital holograms, the proposed method has the distinct advantage of robustness to geometric attacks. The experimental results demonstrate that the proposed method has good robustness to resist geometric attacks and common attacks including rotation, scaling, translation, image flipping, combined attacks, filtering, occlusion, cropping, and JPEG compression.

© 2010 Optical Society of America

OCIS Codes
(090.1760) Holography : Computer holography
(100.2000) Image processing : Digital image processing
(100.7410) Image processing : Wavelets
(110.1085) Imaging systems : Adaptive imaging

ToC Category:
Image Processing

History
Original Manuscript: August 23, 2010
Revised Manuscript: October 7, 2010
Manuscript Accepted: October 8, 2010
Published: November 5, 2010

Citation
Jianzhong Li, "Robust image watermarking scheme against geometric attacks using a computer-generated hologram," Appl. Opt. 49, 6302-6312 (2010)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-49-32-6302


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. J. S. Seo and C. D. Yoo, “Localized image watermarking based on feature points of scale-space representation,” Pattern Recog. 37, 1365–1375 (2004). [CrossRef]
  2. D. Zheng, Y. Liu, and J. Y. Zhao, “RST invariant digital image watermarking based on a new phase-only filtering method,” Signal Process. 85, 2354–2370 (2005). [CrossRef]
  3. L. Zhang, G. B. Qian, and Z. Ji, “Geometric distortion-invariant watermarking based on Tschebycheff transform and dual-channel detection,” Opt. Express 15, 12922–12940(2007). [CrossRef]
  4. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41, 865–873 (2002). [CrossRef] [PubMed]
  5. H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain,” Appl. Opt. 44, 6211–6219 (2005). [CrossRef] [PubMed]
  6. S. Kishk and B. Javidi, “3D object watermarking by a 3D hidden object,” Opt. Express 11, 874–888 (2003). [CrossRef] [PubMed]
  7. O. E. Okman and G. B. Akar, “Quantization index modulation-based image watermarking using digital holography,” J. Opt. Soc. Am. A 24, 243–253 (2007). [CrossRef]
  8. M. Liu, G. L. Yang, and H. Y. Xie, M. Xia, J. Hu, and H. Zha, “Computer-generated hologram watermarking resilient to rotation and scaling,” Opt. Eng. 46, 060501 (2007). [CrossRef]
  9. T. Kreis, Holographic Interferometry: Principles and Methods, 1st ed. (Akademie-Verlag, 1996).
  10. G. Tricoles, “Computer generated holograms: an historical review,” Appl. Opt. 26, 4351–4357 (1987). [CrossRef] [PubMed]
  11. N. Pavillon, C. S. Seelamantula, J. Kühn, M. Unser, and C. Depeursinge, “Suppression of the zero-order term in off-axis digital holography through nonlinear filtering,” Appl. Opt. 48, H186–H195 (2009). [CrossRef] [PubMed]
  12. J. M. Blackledge, Digital Image Processing: Mathematical and Computational Methods (Woodhead, 2005).
  13. Z. H. Li and H. Z. Wu, “A cropping robust geometric distortion correcting algorithm for watermarked image based on SIFT,” in The 2nd IEEE International Congress on Image and Signal Processing (IEEE, 2009), pp. 1466–1470.
  14. D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” Int. J. Comput. Vis. 60, 91–110 (2004). [CrossRef]
  15. H. Y. Lee, H. S. Kim, and H. K. Lee, “Robust image watermarking using local invariant features,” Opt. Eng. 45, 037002 (2006). [CrossRef]
  16. B. S. Kim, J. G. Choi, C. H. Park, J. U. Won, D. M. Kwak, S. K. Oh, C. R. Koh, and K. H. Park, “Robust digital image watermarking method against geometrical attacks,” Real-Time Imag. 9, 139–149 (2003). [CrossRef]
  17. Q. Liu, Y. D. Ma, S. G. Zhang, and W. S. He, “Image target recognition using pulse coupled neural networks time matrix,” in The 26th Chinese Control Conference (Publishing House of Beijing University of Aeronautics and Astronautics, 2007), pp. 96–99.
  18. J. J. Shen and J. M. Ren, “A robust associative watermarking technique based on vector quantization,” Digital Signal Process. 20, 1408–1423 (2010). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited