OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 51, Iss. 27 — Sep. 20, 2012
  • pp: 6561–6570

Wave-atoms-based multipurpose scheme via perceptual image hashing and watermarking

Fang Liu, Qi-Kai Fu, and Lee-Ming Cheng  »View Author Affiliations


Applied Optics, Vol. 51, Issue 27, pp. 6561-6570 (2012)
http://dx.doi.org/10.1364/AO.51.006561


View Full Text Article

Enhanced HTML    Acrobat PDF (544 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

This paper presents a novel multipurpose scheme for content-based image authentication and copyright protection using a perceptual image hashing and watermarking strategy based on a wave atom transform. The wave atom transform is expected to outperform other transforms because it gains sparser expansion and better representation for texture than other traditional transforms, such as wavelet and curvelet transforms. Images are decomposed into multiscale bands with a number of tilings using the wave atom transform. Perceptual hashes are then extracted from the features of tiling in the third scale band for the purpose of content-based authentication; simultaneously, part of the selected hashes are designed as watermarks, which are embedded into the original images for the purpose of copyright protection. The experimental results demonstrate that the proposed scheme shows great performance in content-based authentication by distinguishing the maliciously attacked images from the nonmaliciously attacked images. Moreover, watermarks extracted from the proposed scheme also achieve high robustness against common malicious and nonmalicious image-processing attacks, which provides excellent copyright protection for images.

© 2012 Optical Society of America

OCIS Codes
(100.2000) Image processing : Digital image processing
(100.2960) Image processing : Image analysis
(110.6980) Imaging systems : Transforms
(100.3008) Image processing : Image recognition, algorithms and filters
(100.4994) Image processing : Pattern recognition, image transforms
(110.7410) Imaging systems : Wavelets

ToC Category:
Imaging Systems

History
Original Manuscript: May 17, 2012
Revised Manuscript: July 30, 2012
Manuscript Accepted: August 16, 2012
Published: September 14, 2012

Citation
Fang Liu, Qi-Kai Fu, and Lee-Ming Cheng, "Wave-atoms-based multipurpose scheme via perceptual image hashing and watermarking," Appl. Opt. 51, 6561-6570 (2012)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-51-27-6561


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41, 865–873 (2002). [CrossRef]
  2. H. T. Chang and C. L. Tsan, “Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain,” Appl. Opt. 44, 6211–6219 (2005). [CrossRef]
  3. J. Z. Li, “Robust image watermarking scheme against geometric attacks using a computer-generated hologram,” Appl. Opt. 49, 6302–6312 (2010). [CrossRef]
  4. J. Fridrich, M. Goljan, and A. C. Baldoza, “New fragile authentication watermark for images,” in Proceedings of IEEE International Conference on Image Processing (IEEE, 2000), pp. 446–449.
  5. G. S. Spagnolo, C. Simonetti, and L. Cozzella, “Content fragile watermarking based on a computer generated hologram coding technique,” J. Opt. A 7, 333–342 (2005). [CrossRef]
  6. E. Lin, C. Podilchuk, and E. Delp, “Detection of image alterations using semi-fragile watermarks,” Proc. SPIE 3971, 152–163 (2000). [CrossRef]
  7. K. Maeno, Q. Sun, S. F. Chang, and M. Suto, “New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization,” IEEE Trans. Multimedia 8, 32–45 (2006). [CrossRef]
  8. Z. M. Lu, D. G. Xu, and S. H. Sun, “Multipurpose image watermarking algorithm based on multistage vector quantization,” IEEE Trans. Image Process. 14, 822–831 (2005). [CrossRef]
  9. C. S. Lu and H. Y. M. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Trans. Image Process. 10, 1579–1592 (2001).
  10. L. H. Tian, N. N. Zheng, J. R. Xue, C. Li, and X. F. Wang, “An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection,” Signal Process., Image Commun. 26, 427–437 (2011). [CrossRef]
  11. M. Schneider and S. F. Chang, “A robust content based digital signature for image authentication,” in Proceedings of IEEE International Conference on Image Processing (IEEE, 1996), pp. 227–230.
  12. R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin, “Robust image hashing,” in Proceedings of IEEE International Conference on Image Processing (IEEE, 2000), pp. 664–666.
  13. C. Kailasanathan and R. S. Naini, “Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation,” presented at the IEEE-EURASIP Workshop on Nonlinear Signal Image Processing, Baltimore, Md., USA, 3–6 June 2001.
  14. C. Y. Lin and S. F. Chang, “A robust image authentication system distinguishing JPEG compression from malicious manipulation,” IEEE Trans. Circuits Syst. Video Technol. 11, 153–168 (2001). [CrossRef]
  15. C. S. Lu and H. Y. M. Liao, “Structural digital signature for image authentication,” IEEE Trans. Multimedia 5, 161–173 (2003). [CrossRef]
  16. S. Bhattacharjee and M. Kutter, “Compression tolerant image authentication,” in Proceedings of IEEE International Conference on Image Processing (IEEE, 1998), pp. 435–439.
  17. V. Monga, D. Vats, and B. L. Evans, “Image authentication under geometric attacks via structure matching,” in Proceedings of IEEE International Conference on Multimedia and Expo (IEEE, 2005), pp. 229–232.
  18. V. Monga and B. L. Evans, “Perceptual image hashing via feature points: performance evaluation and tradeoffs,” IEEE Trans. Image Process. 15, 3452–3465 (2006). [CrossRef]
  19. F. Khelifi and J. M. Jiang, “Perceptual image hashing based on virtual watermark detection,” IEEE Trans. Image Process. 19, 981–994 (2010). [CrossRef]
  20. J. Fridrich and M. Goljan, “Robust hash functions for digital watermarking,” in Proceedings of IEEE International Conference on Information Technology: Coding and Computing (IEEE, 2000), pp. 178–183.
  21. A. Swaminathan, Y. Mao, and M. Wu, “Robust and secure image hashing,” IEEE Trans. Inf. Forensics Security 1, 215–230 (2006). [CrossRef]
  22. V. Monga and M. K. Mihcak, “Robust and secure image hashing via non-negative matrix factorizations,” IEEE Trans. Inf. Forensics Security 2, 376–390 (2007). [CrossRef]
  23. C. H. Lin and C. Y. Yang, “Multipurpose watermarking based on blind vector quantization (BVQ),” J. Inform. Hiding Multimed. Signal Process. 2, 236–246 (2011).
  24. C. E. Zhang, L. L. Cheng, Z. D. Qiu, and L. M. Cheng, “Multipurpose watermarking based on multiscale curvelet transform,” IEEE Trans. Inf. Forensics Security 3, 611–619 (2008). [CrossRef]
  25. L. Demanet and L. Ying, “Wave atoms and sparsity of oscillatory patterns,” Appl. Comput. Harmon. Anal. 23, 368–387 (2007). [CrossRef]
  26. S. Mallat, A Wavelet Tour of Signal Processing, 2nd ed.(Academic, 1999).
  27. J. P. Antoine and R. Murenzi, “Two-dimensional directional wavelets and the scale-angle representation,” Signal Process. 52, 259–281 (1996). [CrossRef]
  28. F. Liu, H. Y. Leung, L. M. Cheng, and X. Y. Ji, “Content-based image hashing using wave atoms,” Chin. Phys. B 21, 040204 (2012). [CrossRef]
  29. T. Addabbo, M. Alioto, A. Fort, A. Pasini, S. Rocchi, and V. Vignoli, “A class of maximum-period nonlinear congruential generators derived from the Rényi chaotic map,” IEEE Trans. Circuits Syst. I, Reg. Papers 54, 816–828 (2007). [CrossRef]
  30. “Test images,” http://decsai.ugr.es/cvg/dbimagenes/g512.php .

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited