Blind image watermarking in canonical and cepstrum domains based on 4-connected t-o'clock scrambling

Farhana Shirin Chowdhury, Pranab Kumar Dhar, Kaushik Deb, Takeshi Koshiba

Research output: Contribution to journalArticle

Abstract

Copyright protection of multimedia content is confronted with great challenges such as easy access to the Internet. Digital watermarking is widely applicable technique for copyright protection of multimedia contents. In this paper, a blind symmetric watermarking method in canonical and cepstrum domains based on four-connected t-o'clock scrambling is proposed. Initially, the watermark image is scrambled using the four-connected t-o'clock method to enhance the security. Then, the rotation operation is applied to the host image to extract the region where the watermark bits are embedded. After that, discrete linear canonical transform (DLCT) is applied to the extracted region to obtain the DLCT region. Cepstrum transform (CT) is performed on DLCT region to attain CT region. The CT region is then divided into non-overlapping blocks. The watermark bits are inserted into each block using max-heap and min-heap tree property. Experimental results illustrate that the proposed method shows high robustness against numerous attacks. Moreover, it produces high quality watermarked images and provides high security. Furthermore, it has superior performance to recent methods in terms of imperceptibility, robustness, and security.

Original languageEnglish
Article number266
JournalSymmetry
Volume12
Issue number2
DOIs
Publication statusPublished - 2020 Feb 1

Keywords

  • Cepstrum transform
  • Discrete linear canonical transform
  • Four-connected t-o'clock
  • Robustness
  • Scrambling
  • Security

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Chemistry (miscellaneous)
  • Mathematics(all)
  • Physics and Astronomy (miscellaneous)

Fingerprint Dive into the research topics of 'Blind image watermarking in canonical and cepstrum domains based on 4-connected t-o'clock scrambling'. Together they form a unique fingerprint.

  • Cite this