OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 19, Iss. 11 — May. 23, 2011
  • pp: 10241–10251
« Show journal navigation

A blind robust watermarking scheme with non-cascade iterative encrypted kinoform

Ke Deng, Guanglin Yang, and Haiyan Xie  »View Author Affiliations


Optics Express, Vol. 19, Issue 11, pp. 10241-10251 (2011)
http://dx.doi.org/10.1364/OE.19.010241


View Full Text Article

Acrobat PDF (1505 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A blind robust watermarking scheme is proposed. A watermark is firstly transformed into a non-cascade iterative encrypted kinoform with non-cascade phase retrieve algorithm and random fractional Fourier transform (RFrFT). An iterative algorithm and Human Visual System (HVS) are both presented to adaptively embed the kinoform watermark into corresponding 2-level DWT coefficients of the cover image. The kinoform accounts for much less data amount to be embedded than regular computer-generated hologram (CGH). And the kinoform can be extracted with the only right phase key and right fractional order, and reconstructed to represent original watermark without original cover image. The experiments have shown the scheme’s high security, good imperceptibility, and robustness to resist attacks such as noise, compression, filtering, cropping.

© 2011 OSA

1. Introduction

To enhance the security of a watermarking scheme, some techniques in the field of security has been used in the watermarking. Double random phase encoding technique, proposed by Javidi, has been applied to optically or numerically encrypt the original watermark [7

7. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]

9

9. Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-Feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17(5), 3270–3284 (2009). [CrossRef] [PubMed]

]. As a generation of traditional Discrete Fourier Transform (DFT), the fractional Fourier Transform (FrFT) [13

13. C. Candan, M. A. Kutay, and H. M. Ozaktas, “The discrete fractional Fourier transform,” IEEE Trans. Signal Process. 48(5), 1329–1337 (2000). [CrossRef]

] provides additional key for watermark embedding in the DFT domain of the cover image [10

10. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Express 15(24), 16067–16079 (2007). [CrossRef] [PubMed]

]. The cascaded Fresnel digital hologram is used for the encryption of digital image without lens architecture [11

11. S. Deng, L. Liu, H. Lang, W. Pan, and D. Zhao, “Hiding an image in cascaded Fresnel digital holograms,” Chin. Opt. Lett. 4, 268–271 (2006).

,12

12. S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Watermarks encrypted in the cascaded Fresnel digital hologram,” Optik (Stuttg.) 118, 302–305 (2007). [CrossRef]

]. Also some other encryption algorithms such as pixel permutations and so on, are generally used to increase the difficulty to decrypt the watermark [1

1. M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17(25), 22462–22473 (2009). [CrossRef]

].

Meanwhile, to enhance the robustness of a watermarking scheme, Computer-generated hologram (CGH) has been investigated and used in watermarking [2

2. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41(5), 865–873 (2002). [CrossRef] [PubMed]

5

5. K. Deng, G. Yang, and C. Zhang, “Burch computer-generated hologram watermarking resilient to strong cropping attack,” Biomedical Optics and 3-D Imaging (BIOMED) Topical Meeting, OSA Optics and Photonics Congress, April 2010, in Miami, FL, USA.

]. With very good feature of the residue of empirical mode decomposition (EMD) to resist noise attack, literature [22

22. N. Bi, Q. Sun, D. Huang, Z. Yang, and J. Huang, “Robust image watermarking based on multiband wavelets and empirical mode decomposition,” IEEE Trans. Image Process. 16(8), 1956–1966 (2007). [CrossRef] [PubMed]

] proposed robust image watermarking in multiband wavelet transform. However, an effective watermarking scheme demands comprehensive performance such as high security, good robustness and imperceptibility. The usage of CGH in watermarking accounts for large data amount and is reconstructed with conjugate images. Its security is much fragile. Besides, cascade phase retrieve watermarking algorithm converges slowly, which may lead to loss of source. Its robustness is poor as well. However, random fractional Fourier transform (RFrFT) [14

14. S.-C. Pei and W.-L. Hsue, “Random discrete fractional Fourier transform,” IEEE Signal Process. Lett. 16(12), 1015–1018 (2009). [CrossRef]

16

16. Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32(15), 2088–2090 (2007). [CrossRef] [PubMed]

] possesses good mathematical properties and can be directly used in optical encryption and decryption, which ensured good security. And non-cascade phase retrieve kinoform [6

6. H. Zhai, F. Liu, X. Yang, G. Mu, and P. Chavel, “Improving binary images reconstructed from kinoforms by amplitude adjustment,” Opt. Commun. 219(1-6), 81–85 (2003). [CrossRef]

] converges quickly and account for less data amount, which not only ensured good imperceptibility, but also was reconstructed without conjugate image. The iterative embedding algorithm in Jianzhong Li’s adaptive watermarking scheme [17

17. J. Li, X. Zhang, S. Liu, and X. Ren, “Adaptive watermarking scheme using a gray-level computer generated hologram,” Appl. Opt. 48(26), 4858–4865 (2009). [CrossRef] [PubMed]

] ensued both the imperceptibility and robustness of the watermarking. According to HVS, the Pixel-Mask model [18

18. M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Process. 10(5), 783–791 (2001). [CrossRef]

] also improved the imperceptibility of the watermarked image. Therefore, based on RFrFT, non-cascade phase retrieve kinoform and iterative embedding algorithm with HVS model, a new watermarking scheme is proposed in this paper to ensure quick convergence, high security, good imperceptibility, and robustness to resist attacks.

2. Non-cascade iterative encrypted kinoform

Compared to traditional CGH, kinoform is the one with less data amount and can be reconstructed with only one image. Also, because DFT is too simple to decrypt, the security of CGH is seriously affected. Therefore, a non-cascade iterative encrypted kinoform is proposed to ensure the security and less data amount to be stored.

2.1 Random fractional Fourier transform (RFrFT)

It is known that fractional Fourier transform (FrFT) [13

13. C. Candan, M. A. Kutay, and H. M. Ozaktas, “The discrete fractional Fourier transform,” IEEE Trans. Signal Process. 48(5), 1329–1337 (2000). [CrossRef]

] is generalization of common Fourier transform with high security of its fractional order. The α th order FrFT is defined as follows:
Fα{f(x)}(u)=f(x)Kα(x;u)dx,
(1)
where theFαdenotes the α th order FrFT function of thef(x), thef(x) denotes the original watermark, Kα(x;u) denotes the transform kernel function, and is defined as follows:
Kα(x;u)=Aαexp[iπ(u2+x2tanθα2xusinθα)],
(2)
where,

Aα=1icotθα,
(3)
θα=απ/2.
(4)

Based on FrFT definition, RFrFT [16

16. Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32(15), 2088–2090 (2007). [CrossRef] [PubMed]

] possesses good mathematical properties by randomizing the kernel function of FrFT to improve its high security. And it is defined as follows:
α{f(x)}(u)=f(x)K'α(x;u)dx,
(5)
whereK'α(x;u)=P(x)Kα(x;u)P*(u), P(x)and P*(u)represent two random mutually conjugated pure phase masks. Its simulation experiment has been done as shown in Fig. 1
Fig. 1 (a) Cover image, (b) RFrFT amplitude image of the cover image (a), (c) RFrFT phase image of the cover image (a).
and Fig. 2
Fig. 2 Reconstructed image (a) with wrong order, (b) with wrong phase key, (c) with right order and right phase key.
.

2.2 Kinoform watermark generation

In order to conquer the disadvantage of large data amount of regular CGH, a non-cascade iterative encrypted kinoform, which possesses much less data amount and without conjugated image in reconstruction, is proposed based on the RFrFT and non-cascade phase retrieve algorithm. Its flowchart has been shown in Fig. 3
Fig. 3 Kinoform watermark generation flowchart.
.

In the flowchart above, the original watermark image is defined as W(x,y); the amplitude and random phase mask of input object function gn(x,y) are ωn(x,y)andejφn(x,y) , respectively; the orders of RFrFT and inverse random fractional Fourier transform (iRFrFT) are α and α, respectively; the phase keys for RFrFT and iRFrFT areP(x,y)andP'(x,y), respectively; the amplitude and phase mask of output image function is A(u,v)andejϕ(u,v), respectively. The limitation of the input plane and output plane are ω(x,y)=W(x,y)and A(u,v)=c (i.e., c is a constant, normally c = 1), respectively.

The output image function and input object function is presented as follows:

{A(u,v)ejϕ(u,v)=αP{ω(x,y)ejφ(x,y)}ω(x,y)ejφ(x,y)=αP*{A(u,v)ejϕ(u,v)}.
(6)

The non-cascade iterative encrypted kinoform is generated according to the following steps:

Step 1: The phase function φ0(x,y)of input object functiongn(x,y), which uniquely distributes in(0,2π), is generated; and the amplitude function ω0(x,y)of input object function is the original watermark imageW(x,y). Therefore, the input complex function g0(x,y)=ω0(x,y)ejφ0(x,y) is obtained. According to the need of the scheme, the fractional order α and key P(x,y) are generated;

Step 2: g0(x,y)is transformed by RFrFT to generate output image functionGn(u,v)=An(u,v)ejϕn(u,v); According to the output limitationGn(u,v)=cejϕn(u,v);

Step 3: The new image function is transformed by iRFrFT and phase key P'(x,y), andtheinputobjectcomplexfunction gn+1(x,y)=iRFrFT(Gn(u,v))=ωn+1(x,y)ejφn+1(x,y);

a: if the NMSE between ωn+1(x,y) and W(x,y) converges, go to step 4;

b: if not, according to the input limitation, gn+1(x,y)=W(x,y)ejφn+1(x,y), and go to Step 2;

Step 4: The output image complex function is generated asG(u,v)=αP{W(x,y)ejφ(x,y)}=cejϕ(u,v), which actually is a pure phase function. After quantification, ϕn(u,v)is saved as a kinoformK(u,v).

After generation of the non-cascade iterative encrypted kinoform, it can be embedded into the cover image according to the proposed embedding algorithm, which will be described in the following section.

3. Watermarking embedding

In order to extract original watermark without original cover image, a method is proposed to embed the kinoform into corresponding 2-level DWT coefficients of the cover image. First, the cover image is transformed by 2-level DWT, and HL2, LH2, HL1, and LH1 are selected and divided into several 3✕3 blocks, as shown in Fig. 4
Fig. 4 Blocks and 2-level DWT coefficients selection.
. Then, certain coefficients of the central position in each block are revised according to the kinoform and revision intensity of HVS mode [18

18. M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Process. 10(5), 783–791 (2001). [CrossRef]

,19

19. A. Reddy and B. Chatterji, “A new wavelet based logo-watermarking scheme,” Pattern Recognit. Lett. 26(7), 1019–1027 (2005). [CrossRef]

]. In order to embed more information, overlapping blocks are preferred.

According to the HVS model proposed in Ref [18

18. M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Process. 10(5), 783–791 (2001). [CrossRef]

], coefficient revision intensityβi is calculated; According to the embedding algorithm proposed in Ref [17

17. J. Li, X. Zhang, S. Liu, and X. Ren, “Adaptive watermarking scheme using a gray-level computer generated hologram,” Appl. Opt. 48(26), 4858–4865 (2009). [CrossRef] [PubMed]

], we proposed the following embedding algorithm in Fig. 5
Fig. 5 Kinoform watermark embedding flowchart.
. Δ is the quantization step; Ciis the value of central position in each block; Aiis the average value of Ci’s 8 nearest neighbor positions; Ki (0Ki1) is normalized gray kinoform value; γicontrols embedding intensity; and the embedding algorithm is executed as follows:

Step1: LetCi'=|Ai|+γiKi,mi=0;

Step2: If |Ci'|Ci||>βi|Ci|, revise appropriate value of mi according to the following rules:

a: If Ci'|Ci|>βi|Ci|, let Ci'=Ci'Δ and mi=mi+1. Repeat untilCi'|Ci|βi|Ci|. Otherwise go to b.

b: If Ci'|Ci|<βi|Ci|, let Ci'=Ci'+Δandmi=mi1. Repeat untilCi'|Ci|βi|Ci|.

Step 3: IfCi<0, letCi'=Ci';

Step 4: Replace CiwithCi'.

After kinoform watermark embedding, the coefficients satisfy the following equations. And a watermarked image is obtained after inverse 2-level DWT.

{|Ci'|=|Ai|+γiKimiΔ|Ci'Ci|βi|Ci|Ci'Ci>0.
(7)

4. Watermarking extraction and reconstruction

Similar to the watermarking embedding procedure, the watermarked image is decomposed to be LL2, HL2, LH2, HH2, HL1, LH1, LL2 by 2-level DWT; and the corresponding embedding position is selected from HL2, LH2, HL1 and LH1. According to the following equation, the each pixel of the kinoform could be extracted:

Ki'=|Ci||Ai|+miΔγi.
(8)

After rearrangement of extracted pixel values, K'(u,v)could be obtained. Then, according to the kinoform generation flowchart and Eq. (9), the original watermark can be reconstructed with the right order α and phase key P'.

W'(x,y)=|αP*{ejK'(u,v)}|.
(9)

5. Numerical simulations and analysis

5.1 Judgment principle

In order to evaluate the performance of the proposed scheme, three parameters are defined and used to make a quantitative measure.

A. to measure the perceptual distortion of the watermarked image, the Peak Signal to Noise Ratio (PSNR) was defined as follows:
PSNR=10log10L21NxNyx=1Nxy=1Ny[Io(x,y)Iw(x,y)]2   dB,
(10)
where L is the peak value of the signal, and the size of the image isNx×Ny, Io(x,y)and Iw(x,y)represent the original cover image and watermarked image, respectively.

B. To evaluate the similarity degree between the original watermark and extracted watermark, Normalized Cross Correlation (NCC) is defined as follows:
NCC=ijWijWij'ij(Wij)2,
(11)
where the Wijand Wij'present the pixel values at the position (i,j) of the original and extracted watermark by that 0iNx,0jNy, respectively.

C. To evaluate the convergence of the generated kinoform, Normalized Mean Square Error (NMSE) is used and defined as follows:
NMSE=1NxNyx=1Nxy=1Ny[Io(x,y)αIr(x,y)]2,
(12)
where α=x=1Nxy=1NyIo(x,y)Ir(x,y)x=1Nxy=1Ny[Ir(x,y)]2, the size of the image isNx×Ny, Io and Ir represent original image and reconstructed image, respectively.

5.2 Numerical simulations

In the numerical simulation experiments, a gray image “Lena” (256 × 256 pixels) and a binary image “PKU” (64 × 64 pixels) are chosen as the cover image and the original watermark, respectively, as shown in Fig. 6 (a) and (b)
Fig. 6 (a) Original cover image (256✕256 pixels), (b) original watermark (64✕64 pixels).
. And several numerical tests are implemented to verify the performance of the proposes watermarking scheme under the hardware environment of Dell Precision T 5400 Intel Xeon CPU 2.5 GHz workstation with 4 GB RAM memory and MATLAB version 7.

5.2.1 Non-cascade encrypted kinoform generation

A non-cascade encrypted kinoform (64 × 64 pixels) is generated and shown in Fig. 7(a)
Fig. 7 (a) Non-cascade encrypted kinoform, (b) watermarked image (PSNR = 42.34), (c) extracted kinoform, (d) reconstructed watermark (NCC = 0.9592).
according to the kinoform watermark generation algorithm. After watermark embedding procedure, a watermarked image(PSNR = 42.34, 256 × 256 pixels)is generated, as shown in Fig. 7(b). Without any attacks, a whole kinoform (64 × 64 pixels) can be extracted, as shown in Fig. 7(c), and the original watermark can be reconstructed with high NCC value of 0.9592, as shown in Fig. 7(d).

5.2.2 Convergence tests

During the non-cascade iterative encrypted kinoform generation periods, the kinoform is obtained after iterative calculation. After each loop, the amplitude of the new object function is calculated by NMSE, as shown in Fig. 8
Fig. 8 NMSE value and iterative loops for non-cascade encrypted kinoform generation.
. In Fig. 8, we can find that the NMSE is converging fast before 20 loops, and slow down after 20 loops. Compared to HE’s method [1] “Cascade FrFT” in Fig. 8, the convergence in the proposed scheme goes much quickly than that of HE’s method. And the NMSE in the proposed scheme can reach less than 0.08, while the HE’s method can only reach about 0.1. Therefore, the proposed watermarking scheme converges much faster and reaches a much lower NMSE value.

5.2.3 Security tests

The watermarking scheme possessed good security characteristics with α order and phase keyP(x,y)in RFrFT. From Fig. 9
Fig. 9 Extracted watermark with right phase key and (a) withα = 0.15, NMSE = 0.9111, NCC = 0.2981, (b) with α = 0.8, NMSE = 0.6647, NCC = 0.5791, (c) with α = 0.8718, NMSE = 0.0757, NCC = 0.9614, (d) with α = 0.9, NMSE = 0.3738, NCC = 0.7913, (e) with α = 0.99, NMSE = 0.7327, NCC = 0.5170.
, it is found that on the condition of right phase keyP(x,y), only with the right order (α=0.8718), the watermark image can be extracted with high NCC value of 0.9614. When α goes much closer to the right order value, the watermark can be extracted with a much higher NCC value, which can be shown in Fig. 9 and the curve “Right phase key” in Fig. 11
Fig. 11 The NMSE value in kinoform reconstruction with different fractional order by the right phase key and wrong phase key.
. And vice versa.

However, with the wrong phase keyP(x,y), the watermark cannot be extracted with high NCC value whatever α order is, which can be shown as Fig. 10
Fig. 10 Extracted watermark with wrong phase key and (a) with α = 0.15, NMSE = 0.9201, NCC = 0.2826, (b) with α = 0.8, NMSE = 0.9270, NCC = 0.2702, (c) with α = 0.8718, NMSE = 0.9257, NCC = 0.2726, (d) with α = 0.9, NMSE = 0.9230, NCC = 0.2775, (e) with α = 0.99, NMSE = 0.9178, NCC = 0.2867.
and the curve “Wrong phase key” in Fig. 11.

And, the following curve in Fig. 11 also account for the high security.

5.2.4 Attack tests

Because of the property of CGH to resist cropping attack, the proposed watermarking scheme with the kinoform is tested with different kinds of cropping attacks. The experiment results are shown in Fig. 13
Fig. 13 Robustness to resist cropping attack (a) column attack 50%,PSNR=8.46dB, (b) cross attack 44%, PSNR=10.03dB, (c) anonymous attackPSNR=7.83dB, (d) circle attackPSNR=9.72dB, (e) extracted watermark from (a) NCC=0.7465, (f) extracted watermark from (b) NCC=0.7634, (g) extracted watermark from (c) NCC=0.7142, (h) extracted watermark from (d) .
.

The measurement of robustness to resist other attacks and extracted watermark images have been shown in Table 1

Table 1. Robust to Different Attacks

table-icon
View This Table
and Fig. 14
Fig. 14 Reconstruction of extracted kinoform under different attacks (a) Gaussian noise (sigma = 0.001), (b) Salt and pepper noise (0.01), (c) Gaussian filtering (4✕4, sigma = 1), (d) Average filtering (4✕4), (e) Median filtering (4✕4), (f) Motion Blurring, (g) Histogram Equalization.
, respectively. Table 1 shows the measure of the robustness of the proposed scheme to resist different attacks.

6. Conclusion

By means of non-cascade iterative encrypted kinoform and corresponding embedding algorithm, a new watermarking scheme has been proposed to embed the kinoform to the 2-level DWT coefficients of the cover image. The proposed scheme secured watermarked image’s imperceptibility and possesses good security as well as robustness. And the watermark is extracted without original cover image. Compared to the optical holography, the kinoform is much easier to generate by computers. Besides, the data amount of the kinoform account only 1/4 of the CGH, which can be embedded into the cover image so as to ensure the watermarked image’s good imperceptibility. And the kinoform generation algorithm converges more quickly than the cascaded method in literature [1]. Besides, with the good security feature of RFrFT, the proposed scheme possesses high security, and can also resist other malicious attacks, such as JPEG compression, cropping attack, noise attack, filtering. Therefore, the scheme generally possesses comprehensive performance (imperceptibility, quick convergence, less data amount, security, and robustness).

References and links

1.

M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17(25), 22462–22473 (2009). [CrossRef]

2.

N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41(5), 865–873 (2002). [CrossRef] [PubMed]

3.

Y. Aoki, “Watermarking technique using computer-generated holograms,” Electron. Commun. Jpn. 84(1), 21–31 (2001). [CrossRef]

4.

M. Liu, G. Yang, H. Xie, M. Xia, J. Hu, and H. Zha, “Computer-generated hologram watermarking resilient to rotation and scaling,” Opt. Eng. 46(6), 060501 (2007). [CrossRef]

5.

K. Deng, G. Yang, and C. Zhang, “Burch computer-generated hologram watermarking resilient to strong cropping attack,” Biomedical Optics and 3-D Imaging (BIOMED) Topical Meeting, OSA Optics and Photonics Congress, April 2010, in Miami, FL, USA.

6.

H. Zhai, F. Liu, X. Yang, G. Mu, and P. Chavel, “Improving binary images reconstructed from kinoforms by amplitude adjustment,” Opt. Commun. 219(1-6), 81–85 (2003). [CrossRef]

7.

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]

8.

S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41(26), 5462–5470 (2002). [CrossRef] [PubMed]

9.

Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-Feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17(5), 3270–3284 (2009). [CrossRef] [PubMed]

10.

R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Express 15(24), 16067–16079 (2007). [CrossRef] [PubMed]

11.

S. Deng, L. Liu, H. Lang, W. Pan, and D. Zhao, “Hiding an image in cascaded Fresnel digital holograms,” Chin. Opt. Lett. 4, 268–271 (2006).

12.

S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Watermarks encrypted in the cascaded Fresnel digital hologram,” Optik (Stuttg.) 118, 302–305 (2007). [CrossRef]

13.

C. Candan, M. A. Kutay, and H. M. Ozaktas, “The discrete fractional Fourier transform,” IEEE Trans. Signal Process. 48(5), 1329–1337 (2000). [CrossRef]

14.

S.-C. Pei and W.-L. Hsue, “Random discrete fractional Fourier transform,” IEEE Signal Process. Lett. 16(12), 1015–1018 (2009). [CrossRef]

15.

S.-C. Pei and W.-L. Hsue, “The multiple-parameter discrete fractional Fourier transform,” IEEE Signal Process. Lett. 13(6), 329–332 (2006). [CrossRef]

16.

Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32(15), 2088–2090 (2007). [CrossRef] [PubMed]

17.

J. Li, X. Zhang, S. Liu, and X. Ren, “Adaptive watermarking scheme using a gray-level computer generated hologram,” Appl. Opt. 48(26), 4858–4865 (2009). [CrossRef] [PubMed]

18.

M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Process. 10(5), 783–791 (2001). [CrossRef]

19.

A. Reddy and B. Chatterji, “A new wavelet based logo-watermarking scheme,” Pattern Recognit. Lett. 26(7), 1019–1027 (2005). [CrossRef]

20.

P. Bao, “Xiaohu Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE Trans. Circ. Syst. Video Tech. 15, 96–102 (2005). [CrossRef]

21.

W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, and Y. Pan, “An efficient watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Trans. Multimed. 10(5), 746–757 (2008). [CrossRef]

22.

N. Bi, Q. Sun, D. Huang, Z. Yang, and J. Huang, “Robust image watermarking based on multiband wavelets and empirical mode decomposition,” IEEE Trans. Image Process. 16(8), 1956–1966 (2007). [CrossRef] [PubMed]

OCIS Codes
(090.1760) Holography : Computer holography
(100.2000) Image processing : Digital image processing
(070.2575) Fourier optics and signal processing : Fractional Fourier transforms
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Image Processing

History
Original Manuscript: October 11, 2010
Revised Manuscript: March 4, 2011
Manuscript Accepted: May 9, 2011
Published: May 10, 2011

Citation
Ke Deng, Guanglin Yang, and Haiyan Xie, "A blind robust watermarking scheme with non-cascade iterative encrypted kinoform," Opt. Express 19, 10241-10251 (2011)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-19-11-10241


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17(25), 22462–22473 (2009). [CrossRef]
  2. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41(5), 865–873 (2002). [CrossRef] [PubMed]
  3. Y. Aoki, “Watermarking technique using computer-generated holograms,” Electron. Commun. Jpn. 84(1), 21–31 (2001). [CrossRef]
  4. M. Liu, G. Yang, H. Xie, M. Xia, J. Hu, and H. Zha, “Computer-generated hologram watermarking resilient to rotation and scaling,” Opt. Eng. 46(6), 060501 (2007). [CrossRef]
  5. K. Deng, G. Yang, and C. Zhang, “Burch computer-generated hologram watermarking resilient to strong cropping attack,” Biomedical Optics and 3-D Imaging (BIOMED) Topical Meeting, OSA Optics and Photonics Congress, April 2010, in Miami, FL, USA.
  6. H. Zhai, F. Liu, X. Yang, G. Mu, and P. Chavel, “Improving binary images reconstructed from kinoforms by amplitude adjustment,” Opt. Commun. 219(1-6), 81–85 (2003). [CrossRef]
  7. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]
  8. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41(26), 5462–5470 (2002). [CrossRef] [PubMed]
  9. Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-Feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17(5), 3270–3284 (2009). [CrossRef] [PubMed]
  10. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Express 15(24), 16067–16079 (2007). [CrossRef] [PubMed]
  11. S. Deng, L. Liu, H. Lang, W. Pan, and D. Zhao, “Hiding an image in cascaded Fresnel digital holograms,” Chin. Opt. Lett. 4, 268–271 (2006).
  12. S. Deng, L. Liu, H. Lang, D. Zhao, and X. Liu, “Watermarks encrypted in the cascaded Fresnel digital hologram,” Optik (Stuttg.) 118, 302–305 (2007). [CrossRef]
  13. C. Candan, M. A. Kutay, and H. M. Ozaktas, “The discrete fractional Fourier transform,” IEEE Trans. Signal Process. 48(5), 1329–1337 (2000). [CrossRef]
  14. S.-C. Pei and W.-L. Hsue, “Random discrete fractional Fourier transform,” IEEE Signal Process. Lett. 16(12), 1015–1018 (2009). [CrossRef]
  15. S.-C. Pei and W.-L. Hsue, “The multiple-parameter discrete fractional Fourier transform,” IEEE Signal Process. Lett. 13(6), 329–332 (2006). [CrossRef]
  16. Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32(15), 2088–2090 (2007). [CrossRef] [PubMed]
  17. J. Li, X. Zhang, S. Liu, and X. Ren, “Adaptive watermarking scheme using a gray-level computer generated hologram,” Appl. Opt. 48(26), 4858–4865 (2009). [CrossRef] [PubMed]
  18. M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Process. 10(5), 783–791 (2001). [CrossRef]
  19. A. Reddy and B. Chatterji, “A new wavelet based logo-watermarking scheme,” Pattern Recognit. Lett. 26(7), 1019–1027 (2005). [CrossRef]
  20. P. Bao, “Xiaohu Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE Trans. Circ. Syst. Video Tech. 15, 96–102 (2005). [CrossRef]
  21. W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, and Y. Pan, “An efficient watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Trans. Multimed. 10(5), 746–757 (2008). [CrossRef]
  22. N. Bi, Q. Sun, D. Huang, Z. Yang, and J. Huang, “Robust image watermarking based on multiband wavelets and empirical mode decomposition,” IEEE Trans. Image Process. 16(8), 1956–1966 (2007). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited