Robust Image watermarking Method Using Homomorphic Block-Based KLT

This paper introduces two robust image watermarking methods using a combination of homomorphic transform and Karhunen Loeve Transform (KLT). The first proposal is denoted as homomorphic-based KLT image watermarking. It works by inserting the watermark during applying the KLT to the reflectance compo...

Full description

Saved in:
Bibliographic Details
Published in:Optik (Stuttgart) Vol. 127; no. 4; pp. 2374 - 2381
Main Authors: Abdallah, Hanaa A., Faragallah, Osama S., Elsayed, Hala S., hadhoud, Mohiy M., Shaalan, Abdalhameed A., El-samie, Fathi E. Abd
Format: Journal Article
Language:English
Published: Elsevier GmbH 01-02-2016
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This paper introduces two robust image watermarking methods using a combination of homomorphic transform and Karhunen Loeve Transform (KLT). The first proposal is denoted as homomorphic-based KLT image watermarking. It works by inserting the watermark during applying the KLT to the reflectance component estimated from employing the homomorphic transform on the host image that will be watermarked. The reflectance component includes significant merits of image, so the embedded watermark with this component is immune to various types of attacks. The second proposal is denoted as homomorphic block-based KLT image watermarking. It works by segmenting the reflectance component of the host image into blocks using spiral scan and adding the watermark to every block during the application of the KLT to each block, separately. The watermark addition using block-by-block principle strengthens the watermark and makes it more immune to attacks. The two proposed methods are compared with homomorphic-based Singular Value Decomposition (SVD) image watermarking method, homomorphic block-based SVD image watermarking method, the traditional SVD watermarking method, and other image watermarking methods. Experimental results ensure that the two proposed methods are immune and secure to different attacks like cropping, scaling, JPEG compression and Gaussian noise without degrading the watermarked image to the same level as the other techniques.
ISSN:0030-4026
1618-1336
DOI:10.1016/j.ijleo.2015.10.050