Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain
Autor: | Yuan-Min Li, Lina Zhang, Deyun Wei |
---|---|
Rok vydání: | 2021 |
Předmět: |
Information Systems and Management
Computer science 05 social sciences 050301 education Wavelet transform Watermark 02 engineering and technology Fractional Fourier transform Computer Science Applications Theoretical Computer Science Wavelet Artificial Intelligence Control and Systems Engineering Robustness (computer science) Computer Science::Multimedia 0202 electrical engineering electronic engineering information engineering Discrete cosine transform 020201 artificial intelligence & image processing Invariant (mathematics) 0503 education Algorithm Digital watermarking Software Computer Science::Cryptography and Security |
Zdroj: | Information Sciences. 551:205-227 |
ISSN: | 0020-0255 |
Popis: | The existing watermarking algorithms invariant wavelet domain are weak at resisting geometric attacks and have small embedding capacities. In this paper, a robust double-encrypted watermarking algorithm based on the fractional Fourier transform (FRFT) and discrete cosine transform (DCT) in invariant wavelet domain is proposed. A hybrid domain is obtained by applying the redistributed invariant wavelet transform (RIDWT) and cosine transform to the enlarged host image. The low-frequency and high-frequency regions of the domain have advantages against different attacks; thus, the two components are both selected for watermark embedding. To solve the false positive problem, the enlarged watermark is double-encrypted by the Arnold transform and the FRFT before a singular value decomposition is applied to it, which enhances the security of the algorithm due to the generation of more keys. Multiparameter particle swarm optimization (MP-PSO) is used to obtain the optimal embedding factors for achieving the balance between invisibility and robustness. The simulation results and comparative experiments show that the proposed algorithm exhibits high robustness under the premise of satisfying security, reliability and invisibility, especially for geometric attacks such as rotation, cropping and translation. |
Databáze: | OpenAIRE |
Externí odkaz: |