نهاننگاری تصویر دیجیتال مقاوم در برابر برش با استفاده از جدول سودوکو در حوزه مکان و تبدیلات
محورهای موضوعی : انرژی های تجدیدپذیر
1 - کارشناس ارشد - دانشکده مهندسی برق، واحد نجفآباد، دانشگاه آزاد اسلامی، نجف آباد، اصفهان، ایران
2 - استادیار - دانشکده مهندسی برق، واحد نجفآباد، دانشگاه آزاد اسلامی، نجف آباد، ایران
کلید واژه: برش, نهان نگاری تصویر دیجیتال, جدول سودوکو, حوزه مکان, حوزه تبدیلات,
چکیده مقاله :
با توسعه سریع فناوریهای دیجیتال، حفاظت از حق تالیف و اثبات مالکیت اطلاعات اهمیت فراوانی یافته است. در نهاننگاری تصویر، اطلاعات داخل تصویر به نحوی جاسازی میشود که کیفیت بصری تصویرکاهش نیابد و گیرنده بتواند اطلاعات مورد نظر را دریافت کند. همچنین برخی از حملات مانند برش تصویر، اطلاعات نهاننگار را از بین میبرند. در این مقاله طرح جدیدی برای نهاننگاری تصویر دیجیتال پیشنهاد شده که در مقابل حمله برش شدید مقاوم است. در این طرح از جدول سودوکوی کلاسیک که یک جدول 9×9 است، استفاده شده است. یکی از ویژگیهای جدول سودوکو این است که محدودیتهای جدول باعث شده اعداد یا سمبلها در سرتاسر جدول به صورت یکنواخت پراکنده شوند. در این روش پیشنهادی از جدول سودوکو و نهاننگاری مبتنی بر حوزه مکان و تبدیلات از قبیل تبدیل کسینوسی گسسته و تبدیل موجک گسسته و مزایای هر حوزه بهره بردهایم. عدم استفاده از راه حل جدول سودوکو در مرحله استخراج و کشف راه حل صحیح برای دستیابی به نهاننگار از نوآوریهای این طرح است. مقاوم بودن این روش نهاننگاری در مقابل برش تا 92% درصد، عملکرد مطلوب این طرح را نشان میدهد.
With rapid development of digital technology, protecting information such as copyright, content ownership confirmation has become more important. In image watermarking, information of the image is inserted such that the visual quality of the image is not reduced and the receiver is able to get the required information. Some attacks such as image cropping, destroy the watermark’s information. In this article, a new watermarking scheme is proposed which is robust against tough cropping. In the proposed scheme, classic Sudoku table which is a 9*9 table, has been used. One feature of Sudoku table is that Sudoku's limitations cause uniform scattering of symbols or numbers throughout the table. In the proposed scheme, Sudoku table and both watermarking approaches based on spatial domain and transform domain such as DCT and DWT are used. Lack of using of soduko solution at the stage of extraction and finding correct solution to obtain watermark, is innovation of this scheme. Robustness of watermarking against cropping attack is up to 92%, which shows good and effective performance of the proposed scheme.
[1] K. Heylen and T. Dams, “An image watermarking tutorial tool using Matlab,” ةn Proc. of SPIE Vol, Vol. 7075, p. 70750D–1, 2008.
[2] S.P. Mohanty, K.R. Ramakrishnan, M. Kankanhalli, “A dual watermarking technique for images,” In Proceedings of the seventh ACM international conference on Multimedia (Part 2), 1999, pp. 49–51.
[3] A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, Vol. 90, No. 3, pp. 727–752, 2010.
[4] S.M. Mousavi, A. Naghsh, S.A.R. Abu-Bakar, “Watermarking techniques used in medical images: A survey,” J. Digit. Imaging, Vol. 27, No. 6, pp. 714–729, 2014.
[5] Pianhui Wu,”Research on digital image watermark encryption based on Hyperchaos”, A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy,Faculty of Business, Computing and Law Universityof Derby,May 2013.
[6] Aggarwal, A., Singla, M, ”Robust watermarking of color image under noise and croppin attack in spatial domain”, International Journal of Computer Science and Information Technologies, Vol. 2, No. 5, pp.2036-2041,2011.
[7] Rawat, S., Raman, B, ”A new robust watermarking scheme for color images”, Proceedings of the IEEE 2nd International Advance Computing Conference, pp.206-209,2010.
[8] Li Zhang, Xilan Yan, Hongsong Li, Minrong Chen, “A dynamic multiple watermarking algorithm based on DWT and HVS”, Int. J. Communication,Network and System Scinces, 2012.
[9] Nallagarla Ramamurthy, Dr.s.Varadarajan, “Robust digital image watermarking scheme with neural network and fuzzy logic approach”, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Issue 9, Sep. 2012.
[10] Kiratpreet Singh,Rajneet Kaur, “Robust watermarking scheme against geometrical attacks”, Ijcsmc, Vol. 2, Issue. 4, pp.278-284, April 2013.
[11] Kamal Ahmad Khalid Shamsul,Mat Deris Mustafa, Malik Mohammad Kamaruddin, ”Anti cropping digital image watermarking using Sudoku”, International Journal of Grid and Utility Computing, Vol. 4, Issue 2/3, Sep. 2013.
[12] F.H. Wang, J.S. Pan, L.C. Jain, Innovations in digital watermarking techniques, Vol. 232. Springer 2009.
[12] Z. Wenyin, F.Y. Shih, “Semi-fragile spatial watermarking based on local binary pattern operators,” Opt. Commun., Vol. 284, No. 16, pp. 3904–3912, 2011.
[13] E.F. Badran, M. Sharkas, O. Attallah, and others, “Multiple watermark embedding scheme in wavelet-spatial domains based on ROI of medical images,” In Radio Science Conference, NRSC 2009. National, pp. 1–8, 2009.
[14] J.M. Zain, M. Clarke, “Reversible region of non-interest (RONI) watermarking for authentication of DICOM images,” arXiv Prepr. arXiv1101.1603, 2011.
[15] A. Bamatraf, R. Ibrahim, M.N.B.M. Salleh, “Digital watermarking algorithm using LSB,” In Computer Applications and Industrial Electronics (ICCAIE), 2010 International Conference on, pp. 155–159, 2011.
[16] A.B. Dehkordi, S.N. Esfahani, A.N. Avanaki, “Robust LSB watermarking optimized for local structural similarity,” In Electrical Engineering (ICEE), 2011 19th Iranian Conference on, pp. 1–6, 2011.
[17] V. Solachidis, I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” Image Process. IEEE Trans., Vol. 10, No. 11, pp. 1741–1753, 2001.
[18] M. Cedillo-Hernandez, F. Garcia-Ugalde, M. Nakano-Miyatake, H. Perez-Meana, “Robust watermarking method in DFT domain for effective management of medical imaging,” Signal, Image Video Process., pp. 1–16, 2013.
[19] S. Das, M.K. Kundu, “Hybrid contourlet-DCT based robust image watermarking technique applied to medical data management,” In Pattern Recognition and Machine Intelligence, Springer, pp. 286–292, 2011.
[20] B. Yang, M. Schmucker, W. Funk, C. Busch, S. Sun, “Integer DCT-based reversible watermarking for images using companding technique,” In Electronic Imaging 2004, pp. 405–415, 2014.
[21] J. Li, W. Du, Y. Bai, Y. Chen, “3D-DCT based zero-watermarking for medical volume data robust to geometrical attacks,” In Wireless Communications and Applications, Springer, pp. 433–444, 2012.
[22] B. Yang, M. Schmucker, X. Niu, C. Busch, S. Sun, “Reversible image watermarking by histogram modification for integer DCT coefficients,” In Multimedia Signal Processing, 2004 IEEE 6th Workshop on, pp. 143–146, 2004.
[23] M. Rohani, A.N. Avanaki, “A watermarking method based on optimizing SSIM index by using PSO in DCT domain,” In 2009 14th International CSI Computer Conference, 2009.
[24] H.-K. Lee, H.-J. Kim, K.-R. Kwon, J.-K. Lee, “ROI medical image watermarking using DWT and bit-plane,” In Communications, 2005 Asia-Pacific Conference on, pp. 512–515, 2005.
[25] M.-S. Wang, W.-C. Chen, “A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography,” Comput. Stand. Interfaces, Vol. 31, No. 4, pp. 757–762, 2009.
[26] M. Makhloghi, F.A. Tab, H. Danyali, “A new robust blind DWT-SVD based digital image watermarking,” In Electrical Engineering (ICEE), 2011 19th Iranian Conference on, pp. 1–5, 2011.
[27] M.R. Keyvanpour, F. Merrikh-Bayat, “Robust dynamic block-based image watermarking in DWT domain,” Procedia Comput. Sci., Vol. 3, pp. 238–242, 2011.
[28] T.-C. Lin, C.-M. Lin, “Wavelet-based copyright-protection scheme for digital images based on local features,” Inf. Sci. (Ny)., Vol. 179, No. 19, pp. 3349–3358, 2009.
[29] N.A. Memon, S.A.M. Gilani, “Adaptive data hiding scheme for medical images using integer wavelet transform,” In Emerging Technologies, 2009. ICET 2009. International Conference on, pp. 221–224, 2009.
[30] M. Arsalan, S.A. Malik, A. Khan, “Intelligent reversible watermarking in integer wavelet domain for medical images,” J. Syst. Softw., Vol. 85, No. 4, pp. 883–894, 2012.
[31] S. Agreste, L. Puccio, “Wavelet-based watermarking algorithms: theory, applications and critical aspects,” Int. J. Comput. Math., Vol. 88, No. 9, pp. 1885–1895, 2011.
[32] I.W. Selesnick, R.G. Baraniuk, N.G. Kingsbury, “The dual-tree complex wavelet transform,” Signal Process. Mag. IEEE, Vol. 22, No. 6, pp. 123–151, 2005.
[33] F. Rahimi, H. Rabbani, Others, “A dual adaptive watermarking scheme in contourlet domain for DICOM images,” Biomed. Eng. Online, Vol. 10, No. 1, p. 53, 2011.
[34] M.N. Do, M. Vetterli, “The contourlet transform: an efficient directional multiresolution image representation,” Image Process. IEEE Trans., Vol. 14, No. 12, pp. 2091–2106, 2005.
[35] S. Khalighi, P. Tirdad, H.R. Rabiee, “A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks,” EURASIP J. Adv. Signal Process., Vol. 2010, p. 21, 2010.
[36] V. Aslantas, “An optimal robust digital image watermarking based on SVD using differential evolution algorithm,” Opt. Commun., Vol. 282, No. 5, pp. 769–777, 2009.
[37] A. Mansouri, A.M. Aznaveh, F.T. Azar, “Secure digital image watermarking based on SVD-DCT,” in Advances in Computer Science and Engineering, Springer, pp. 645–652, 2009.
[38] W. Al-Nuaimy, M.A.M. El-Bendary, A. Shafik, F. Shawki, A.E. Abou-El-azm, N.A. El-Fishawy, S.M. Elhalafawy, S.M. Diab, B.M. Sallam, F.E.A. El-Samie, and others, “An SVD audio watermarking approach using chaotic encrypted images,” Digit. Signal Process., Vol. 21, No. 6, pp. 764–779, 2011.
[39] H.-H. Tsai, Y.-J. Jhuang, Y.-S. Lai, “An SVD-based image watermarking in wavelet domain using SVR and PSO,” Appl. Soft Comput., Vol. 12, No. 8, pp. 2442–2453, 2012.
[40] M. Ali, C.W. Ahn, “An optimized watermarking technique based on self-adaptive DE in DWT--SVD transform domain,” Signal Processing, Vol. 94, pp. 545–556, 2014.
[41] B.Y. Lei, Y. Soon, Z. Li, “Blind and robust audio watermarking scheme based on SVD--DCT,” Signal Processing, Vol. 91, No. 8, pp. 1973–1984, 2011.
[42] C.-C. Lai, “An improved SVD-based watermarking scheme using human visual characteristics,” Opt. Commun., Vol. 284, No. 4, pp. 938–944, 2011.
[43] J.C. Patra, J.E. Phua, C. Bornand, “A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Digit. Signal Process., Vol. 20, No. 6, pp. 1597–1611, 2010.
[44] M. Ali, C.W. Ahn, M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Opt. J. Light Electron Opt., Vol. 125, No. 1, pp. 428–434, 2014.
[45] O.S. Faragallah, “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU-International J. Electron. Commun., Vol. 67, No. 3, pp. 189–196, 2013.
[46] X. Guo, T. Zhuang, “A region-based lossless watermarking scheme for enhancing security of medical data,” J. Digit. Imaging, Vol. 22, No. 1, pp. 53–64, 2009.
[47] M. Ali, C.W. Ahn, “An optimized watermarking technique based on self-adaptive DE in DWT--SVD transform domain,” Signal Processing, Vol. 94, pp. 545–556, 2014.
[48] A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, “Multiple image watermarking applied to health information management,” Inf. Technol. Biomed. IEEE Trans., Vol. 10, No. 4, pp. 722–732, 2006.
[49] B.L. Gunjal, S.N. Mali, “ROI based embedded watermarking of medical images for secured communication in telemedicine,” Int. J. Comput. Commun. Eng., Vol. 6, No. 48, pp. 293–298, 2012.
[50] V.S. Jabade, D.S. R. Gengaje, “Literature review of wavelet based digital image watermarking techniques,” Int. J. Comput. Appl., Vol. 31, No. 1, pp. 28–35, 2011.
[51] N.G. Kingsbury, “The dual-tree complex wavelet transform: A new efficient tool for image restoration and enhancement,” in Proc. EUSIPCO, 1998, Vol. 98, pp. 319–322.
[52] N.A. Memon, A. Chaudhry, M. Ahmad, Z.A. Keerio, “Hybrid watermarking of medical images for ROI authentication and recovery,” Int. J. Comput. Math., Vol. 88, No. 10, pp. 2057–2071, 2011.
[53] O.M. Al-Qershi, B.E. Khoo, “Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images,” J. Digit. Imaging, Vol. 24, No. 1, pp. 114–125, 2011.
[54] B. Felgenhauer and F. Jarvis, “Mathematics of sudoku I,” Math. Spectr., Vol. 39, No. 1, pp. 15–22, 2006.
[55] W.-C. Wu, G.-R. Ren, “A new approach to image authentication using chaotic map and Sudoku puzzle,” In Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP’09. Fifth International Conference on, 2009, pp. 628–631.
[56] C.-C. Chang, P.-Y. Lin, Z.H. Wang, M.C. Li, “A sudoku-based secret image sharing scheme with reversibility,” J. Commun., Vol. 5, No. 1, pp. 5–12, 2010.
[57] P.M. Naini, S.M. Fakhraie, A.N. Avanaki, “Sudoku bit arrangement for combined demosaicking and watermarking in digital camera,” In 2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications, 2010, pp. 41–44.
_||_