z-logo
open-access-imgOpen Access
Lossless digital image watermarking in sparse domain by using K‐singular value decomposition algorithm
Author(s) -
Deeba Farah,
Kun She,
Dharejo Fayaz Ali,
Zhou Yuanchun
Publication year - 2020
Publication title -
iet image processing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.401
H-Index - 45
eISSN - 1751-9667
pISSN - 1751-9659
DOI - 10.1049/iet-ipr.2018.6040
Subject(s) - discrete cosine transform , digital watermarking , sparse approximation , lossless compression , computer science , algorithm , pattern recognition (psychology) , singular value decomposition , artificial intelligence , cosine similarity , similarity (geometry) , mathematics , matching pursuit , image (mathematics) , compressed sensing , data compression
The crucial hurdle faced by the watermarking technique is to maintain the steadiness corresponding to several attacks while assisting a sufficient level of security. In this study, a robust lossless sparse domain‐based watermarking approach combined with discrete cosine transform (DCT) is introduced to hide the secret message in the selected significant sparse elements of the host image. The proposed method takes advantage of a sparse representation‐based dictionary learning process. To enhance the security of the original image, the authors first apply the DCT on a secret message. These DCT coefficients with some regularised parameters will be inserted into the selected significant sparse coefficients. At the extraction stage, the secret message is extracted from those significant sparse coefficients by employing the sparse domain orthogonal matching pursuit algorithm. Finally, the inverse DCT is applied to extract the secret message without any information loss. To show the effectiveness of the proposed method, different commonly used attacks are simulated. Simulation results in terms of peak signal‐to‐noise ratio, structural similarity, normal correlation, and feature similarity indicate that the proposed method can recover the hidden secret message accurately against seven different types of attacks including speckle, Gaussian, salt and pepper, rotate, crop, fold, and blur attack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here