Log in

A robust multiplicative watermarking technique for digital images in curvelet domain using normal inverse Gaussian distribution

  • 1209: Recent Advances on Social Media Analytics and Multimedia Systems: Issues and Challenges
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The illegal duplication of digital copies became easier because of increased communication speed and rapid growth of internetworked multimedia systems. So it is required to authenticate the legal owner of the digital data and protect the copyrights of the content owner. But the original image requirement during the verification of the owner becomes an overhead as it requires more storage. Instead of that, the watermark extraction without original data will be helpful which is also blind watermarking as the storage complexity is reduced. This article proposes a novel blind multiplicative watermarking (WM) system in the curvelet domain for copyright protection. The proper distribution of the curvelet coefficients has known by modeling the statistics of the curvelet coefficients of a digital image which is a heavy-tailed probability distribution function. It has shown that the normal inverse Gaussian (NIG) distribution suitably fits the empirical distribution. A secure watermark is used for watermarking, a combination of the pseudo-random sequence and the unique information of the owner in the proposed article. The design of the watermark extractor has been realized using NIG for the curvelet coefficients of digital images by using the above property. The watermark is decoded from NIG curvelet coefficients with expectation-maximization (EM) algorithm using maximum likelihood estimation (MLE). The watermark has been decoded using closed-form expressions in both the noise and noiseless environments. The experimental results on standard datasets (BOWS and SIPI) show that the proposed scheme provides approximately 20% improvement in PSNR and 50% reduction in bit error rate (BER) compared to the listed method in the article. The proposed technique shows high robustness against attacks such as crop**, rotation, median filtering, salt and pepper noise, Gaussian noise, average filtering, and gamma correction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Akhaee MA, Sahraeian SME, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment. IEEE Trans Image Process 19(4):967–980

    Article  MathSciNet  MATH  Google Scholar 

  2. Amini M, Ahmad MO, Swamy M (2016) A robust multibit multiplicative watermark decoder using a vector-based hidden markov model in wavelet domain. IEEE Trans Circuits Syst Video Technol 28(2):402–413

    Article  Google Scholar 

  3. Amini M, Ahmad MO, Swamy M (2017) A new locally optimum watermark detection using vector-based hidden markov model in wavelet domain. Signal Process 137:213–222

    Article  Google Scholar 

  4. Amini M, Sadreazami H, Ahmad MO, Swamy M (2018) A channel-dependent statistical watermark detector for color images. IEEE Trans Multimed 21 (1):65–73

    Article  Google Scholar 

  5. Amirmazlaghani M, Rezghi M, Amindavar H (2015) A novel robust scaling image watermarking scheme based on gaussian mixture model. Expert Syst Appl 42(4):1960–1971

    Article  Google Scholar 

  6. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  MATH  Google Scholar 

  7. Beaty M, Dodson M (2004) The whittaker–kotel’nikov–shannon theorem, spectral translates and plancherel’s formula. J Fourier Anal Appl 10(2):179–199

    Article  MathSciNet  MATH  Google Scholar 

  8. Bhuiyan MIH, Rahman R (2010) Dct-domain watermark detector using a normal inverse gaussian prior. IEEE, pp 1–4

  9. Bian Y, Liang S (2013) Locally optimal detection of image watermarks in the wavelet domain using bessel k form distribution. IEEE Trans Image Process 22(6):2372–2384

    Article  MathSciNet  MATH  Google Scholar 

  10. Briassouli A, Tsakalides P, Stouraitis A (2005) Hidden messages in heavy-tails: Dct-domain watermark detection using alpha-stable models. IEEE Trans. Multimedia 7(4):700–715

    Article  Google Scholar 

  11. Candès EJ, Donoho DL (2004) New tight frames of curvelets and optimal representations of objects with piecewise c2 singularities. Commun Pure Appl Math 57(2):219–266

    Article  MATH  Google Scholar 

  12. Cheng Q, Huang TS (2003) Robust optimum detection of transform domain multiplicative watermarks. IEEE Trans Sig Process 51(4):906–924

    Article  MathSciNet  MATH  Google Scholar 

  13. Cheng C-J, Hwang W-J, Zeng H-Y, Lin Y-C (2014) A fragile watermarking algorithm for hologram authentication. J Display Technol 10(4):263–271

    Article  Google Scholar 

  14. Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120

    Article  Google Scholar 

  15. Deng C, Zhu H, Wang S (2009) Curvelet domain watermark detection using alpha-stable models. In: 2009 Fifth international conference on information assurance and security. IEEE, vol 1, pp 313–316

  16. Doncel VR, Nikolaidis N, Pitas I (2007) An optimal detector structure for the fourier descriptors domain watermarking of 2d vector graphics. IEEE Trans Vis Comput Graph 13(5):851–863

    Article  Google Scholar 

  17. Donoho DL, Johnstone JM (1994) Ideal spatial adaptation by wavelet shrinkage. Biometrika 81(3):425–455

    Article  MathSciNet  MATH  Google Scholar 

  18. Garg P, Jain A (2022) A robust technique for biometric image authentication using invisible watermarking. Multimed Tools Appl:1–17

  19. Hamghalam M, Mirzakuchaki S, Akhaee MA (2013) Robust image watermarking using dihedral angle based on maximum-likelihood detector. IET Image Process 7(5):451–463

    Article  Google Scholar 

  20. Hanssen A, Oigard T (2001) The normal inverse gaussian distribution for heavy-tailed processes. Proc IEEE EURASIP Workshop Nonlinear Signal Image Process:3985–3988

  21. Igrd T, Hansen RHA, Godtliebsen F (2005) Em-estimation and modeling of heavy-tailed processes with multivariate normal inverse gaussian distribution. Signal Process 85(8):1655–1673

    Article  MATH  Google Scholar 

  22. Karlis D (2002) An em type algorithm for maximium likelihood estimation of the normal-inverse gaussian distribution. Statist Probability Lett 57:43–52

    Article  MathSciNet  MATH  Google Scholar 

  23. Lam K-Y, Chi C-H, Qing S (2012) Information and communications security

  24. Ma J, Plonka G (2010) The curvelet transform. IEEE Signal Proc Mag 27(2):118–133

    Article  Google Scholar 

  25. Mahto DK, Singh AK (2022) Firefly optimization-based dual watermarking for colour images with improved capacity. Multimed Tools Appl:1–19

  26. Mahto DK, Singh OP, Singh AK (2022) Fusiw: fusion-based secure rgb image watermarking using hashing. Multimed Tools Appl:1–17

  27. Mairgiotis A, Chantas G, Galatsanos N, Blekas K, Yang Y (2007) New detectors for watermarks with unknown power based on student-t image priors. IEEE, pp 353–356

  28. Minh N (2002) Directional multiresolution image representations. PhD thesis, Citeseer

  29. Moad MS, Kafi MR, Khaldi A (2022) Medical image watermarking for secure e-healthcare applications. Multimed Tools Appl:1–21

  30. Mohan BC, Kumar SS (2008) Robust digital watermarking scheme using contourlet transform. Int J Comput Sci Netw Secur 8(2):43–51

    Google Scholar 

  31. Ng T, Garg H (2005) Maximum-likelihood detection in dwt domain image watermarking using laplacian modeling. IEEE Sig Process Lett 12 (4):285–288

    Article  Google Scholar 

  32. (2015). http://bows2.ec-lille.fr. Accessed

  33. (2015). http://sipi.usc.edu/database/database.phpvolume=misc. Accessed

  34. Niu P, Tian J, Tian J, Wang X (2021) A new statistical image watermark detector in rhfms domain using beta exponential distribution

  35. Niu P, Wang L, Tian J, Zhang S, Wang X (2021) A statistical color image watermarking scheme using local qpcet and cauchy–rayleigh distribution. Circuits Syst Signal Process:1–30

  36. Qi X, **n X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327

    Article  Google Scholar 

  37. Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for dicom images. Biomed Eng Online 10(1):1

    Article  Google Scholar 

  38. Rahman SM, Ahmad MO, Swamy M (2009) A new statistical detector for dwt-based additive image watermarking using the gauss–hermite expansion. IEEE Trans Image Process 18(8):1782–1796

    Article  MathSciNet  MATH  Google Scholar 

  39. Sadreazami H, Ahmad MO, Swamy M (2014) Contourlet domain image modeling by using the alpha-stable family of distributions. IEEE, pp 1288–1291

  40. Sadreazami H, Ahmad MO, Swamy MS (2014) A study of multiplicative watermark detection in the contourlet domain using alpha-stable distributions. IEEE Trans Image Process 23(10):4348–4360

    Article  MathSciNet  MATH  Google Scholar 

  41. Sadreazami H, Ahmad MO, Swamy MS (2015) Optimum multiplicative watermark detector in contourlet domain using the normal inverse gaussian distribution. In: 2015 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1050–1053

  42. Sadreazami H, Ahmad MO, Swamy M (2016) Multiplicative watermark decoder in contourlet domain using the normal inverse gaussian distribution. IEEE Trans Multimed 18(2):196–207

    Article  Google Scholar 

  43. Sadreazami H, Amini M (2012) A robust spread spectrum based image watermarking in ridgelet domain. AEU-Int J Electr Commun 66(5):364–371

    Article  Google Scholar 

  44. Sadreazami H, Amini M (2018) A robust image watermarking scheme using local statistical distribution in the contourlet domain. IEEE Trans Circuits Syst II Express Briefs 66(1):151–155

    Google Scholar 

  45. Sharma S, Zou JJ, Fang G (2022) A dual watermarking scheme for identity protection. Multimed Tools Appl:1–30

  46. Shoukat MU, Bhatti UA, Yiqiang Y, Mehmood A, Nawaz SA, Ahmad R (2020) Improved multiple watermarking algorithm for medical images. In: Proceedings of the 2020 3rd international conference on artificial intelligence and pattern recognition, pp 152–156

  47. Wang Y, Yang Z, Xu N, Yu J, Yang C (2020) A watermarking detection algorithm based on statistical properties for vector geographic data. In: Journal of physics: conference series. IOP publishing, vol 1550, p 022009

  48. Zareian M, Tohidypour HR (2013) Robust quantisation index modulation-based approach for image watermarking. IET Image Process 7(5):432–441

    Article  Google Scholar 

  49. Zear A, Singh PK (2022) Secure and robust color image dual watermarking based on lwt-dct-svd. Multimed Tools Appl 81(19):26721–26738

    Article  Google Scholar 

  50. Zheng P, Huang J (2012) Walsh-hadamard transform in the homomorphic encrypted domain and its application in image watermarking. Springer, pp 240–254

  51. Zhou Y, Wang J (2012) Image denoising based on the symmetric normal inverse gaussian model and non-subsampled contourlet transform. IET Image Process 6(8):1136–1147

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Dr.Ayesha shaik contributed for methodology, visaulization, and draft preparation. Dr.Masilamani V contributed for methodology, and reviewing the draft.

Corresponding author

Correspondence to Ayesha Shaik.

Ethics declarations

Ethics Approval

Yes

Consent for Publication

yes

Additional information

Consent to Participate

Yes

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Masilamani V contributed equally to this work.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shaik, A., V, M. A robust multiplicative watermarking technique for digital images in curvelet domain using normal inverse Gaussian distribution. Multimed Tools Appl 82, 9223–9241 (2023). https://doi.org/10.1007/s11042-022-14137-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14137-8

Keywords

Navigation