Share Email Print

Proceedings Paper

Histogram-based image watermarking algorithm using visual perception characteristics
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Watermarking algorithms based on the geometric invariance of image histogram are effective and can resist various common attacks. However, all existing histogram-based image watermarking algorithms are constructed from all the pixels of the entire image; thus the embedded watermark energy is randomly distributed throughout the image, causing visual quality degradation in the smooth areas. In this paper, an improved algorithm using human visual perception characteristics is proposed. Firstly, we calculate the JND threshold mapping of the carrier image and select a portion of the pixels with the largest threshold as samples of the statistical histogram. Secondly, we calculate the mean of the selected pixel set, determine the embedding region and divide it into several groups. Finally, by adjusting the number of pixels in three bins per group, 2 bits of the watermark are embedded. According to the geometric invariance of the histogram and the different sensitivity of human eyes to the smooth and textured areas, we embed the watermark in the positions which are not easily perceived by human eyes. Experiments show that the proposed algorithm significantly improves the visual quality of the smooth areas in the watermarked image, but it has weaker robustness to signal processing attacks.

Paper Details

Date Published: 27 November 2019
PDF: 7 pages
Proc. SPIE 11321, 2019 International Conference on Image and Video Processing, and Artificial Intelligence, 1132105 (27 November 2019); doi: 10.1117/12.2538409
Show Author Affiliations
Wenwen Du, Tsinghua Univ. (China)
Daoshun Wang, Tsinghua Univ. (China)
Shundong Li, Shanxi Normal Univ. (China)
Xianghui Zhao, China Information Technology Security Evaluation Ctr. (China)

Published in SPIE Proceedings Vol. 11321:
2019 International Conference on Image and Video Processing, and Artificial Intelligence
Ruidan Su, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?