A blind CT and DCT based robust color image watermarking method


Sarıtaş Ö. F., Ozturk S.

MULTIMEDIA TOOLS AND APPLICATIONS, cilt.82, sa.10, ss.15475-15491, 2023 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 82 Sayı: 10
  • Basım Tarihi: 2023
  • Doi Numarası: 10.1007/s11042-022-13928-3
  • Dergi Adı: MULTIMEDIA TOOLS AND APPLICATIONS
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, FRANCIS, ABI/INFORM, Applied Science & Technology Source, Compendex, Computer & Applied Sciences, INSPEC, zbMATH
  • Sayfa Sayıları: ss.15475-15491
  • Anahtar Kelimeler: Color image watermarking, Contourlet Transform (CT), Copyright protection, Discrete Cosine Transform (DCT), ALGORITHM, EFFICIENT
  • Kayseri Üniversitesi Adresli: Evet

Özet

With the development of multimedia and communication technology, the protection of image copyright arises as a necessity. In the protection of copyright, image watermarking techniques are mostly used to improve robustness, invisibility, and security features. In this article, we present a novel hybrid Contourlet Transform (CT) and Discrete Cosine Transform (DCT) based blind and robust color image watermarking method to improve these features. This method is based on embedding 24-bit watermark information into an 8 x 8 image block using one-level CT and block DCT in Cb color channel of the image in YCbCr color space. In this embedding process, the DCT block is modified by using a new natural logarithm function based on the block DC coefficient. Also, a color image is used as a watermark and scrambled using Arnold transform to increase security before embedding process. The performance of the proposed method is demonstrated by applying image enhancement, geometric, and compression attacks to the watermarked images. Also, the proposed method is compared with some state-of-art methods. Experimental results illustrate that the proposed method protects the transparency of the watermarked image and has effective robustness against the attacks. The source code of this paper can be obtained from .