1. A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet Transform
- Author
-
Shanshan Shi, Ting Luo, Jiangtao Huang, and Meng Du
- Subjects
Science (General) ,Article Subject ,Computer Networks and Communications ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image processing ,02 engineering and technology ,Tone mapping ,Color space ,Q1-390 ,Computer Science::Multimedia ,Singular value decomposition ,0202 electrical engineering, electronic engineering, information engineering ,Discrete cosine transform ,T1-995 ,Digital watermarking ,Technology (General) ,Computer Science::Cryptography and Security ,business.industry ,020206 networking & telecommunications ,Pattern recognition ,Watermark ,Feature (computer vision) ,Computer Science::Computer Vision and Pattern Recognition ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Information Systems - Abstract
In this paper, a novel high dynamic range (HDR) image zero-watermarking algorithm against the tone mapping attack is proposed. In order to extract stable and invariant features for robust zero-watermarking, the shift-invariant shearlet transform (SIST) is used to transform the HDR image. Firstly, the HDR image is converted to CIELAB color space, and the L component is selected to perform SIST for obtaining the low-frequency subband containing the robust structure information of the image. Secondly, the low-frequency subband is divided into nonoverlapping blocks, which are transformed by using discrete cosine transform (DCT) and singular value decomposition (SVD) to obtain the maximum singular values for constructing a binary feature image. To increase the watermarking security, a hybrid chaotic mapping (HCM) is employed to get the scrambled watermark. Finally, an exclusive-or operation is performed between the binary feature image and the scrambled watermark to compute robust zero-watermark. Experimental results show that the proposed algorithm has a good capability of resisting tone mapping and other image processing attacks.
- Published
- 2021