DOI QR코드

DOI QR Code

Cellular Automata Transform based Invisible Digital Watermarking in Middle Domain for Gray Images

  • Li, Xiao-Wei (Department of information and Communication, Pukyong National University) ;
  • Kim, Seok-Tae (Dept. of Electronics, Computer and Telecommunication Engineering, Pukyong National University)
  • Received : 2011.10.14
  • Accepted : 2011.11.21
  • Published : 2011.12.31

Abstract

Cellular automata are discrete dynamical systems, which provide the basis for the synthesis of complex emergent behavior. This paper proposes a new algorithm of digital watermarking based on cellular automata transform (CAT). The idea of two-dimensional CAT is introduced into the algorithm. After the original image is disassembled with 2D CAT, the watermark information is embedded into the Middle-frequency of the carrier picture. Cellular automata have a huge number of combinations, such as gateway values, rule numbers, initial configuration, boundary condition, etc. Using CAT, the robustness of the watermark will be tremendous strengthened as well as its imperceptibility. Experimental results show that this algorithm can resist some usual attacks such as compression, sharpening and so on. The proposed method is robust to different attacks and is more security.

Keywords

References

  1. W. C. Chu, "DCT-Based Image Watermarking Using Subsampling", IEEE Trans. on Multi-media., Vol. 1, pp.34-38, 2003.
  2. J. W. Wang, G. Liu, Y. W. Dai, J. S. Sun, Z. Q. Wang, S. G. Lian, "Locally Optimum Detection for Barni's Multiplicative Watermarking in DWT Domain", International Journal of Signal Processing, Vol. 88, No. 1, pp. 117-130, 2008. https://doi.org/10.1016/j.sigpro.2007.07.012
  3. S.j. Cho, U.S. Choi, H.D. Kim and Y.H. Hwang, "Analysis of Complemented CA Derived from Linear Hybrid Group CA", Computers and Mathematics with Applications,Vol.53,NO.1,pp.54-63,2007. https://doi.org/10.1016/j.camwa.2006.04.027
  4. R.Shiba, S.Kang and Y.Aoki, "An Image Watermarking Technique using CAT", 2004 IEEE region 10 Conference, Vol.1, pp.303-306, 2004.
  5. O.E. Lafe, "Data Compression and Encryption Using Cellular Automata Transforms", Engineering Applications of Artificial Intelligence, Vol.10, pp.589-591, 1997.
  6. Y.R. Piao, S.T. Kim, "Two-dimensional Cellular Automata Transform for a Novel Edge Detection", Computability in Europe 2008 logic and theory of algorithms,Greece,June,2008.
  7. S.T. Kim, Y.R. Piao, "Robust and Secure InIm-based 3D Watermarking Scheme using Cellular Automata Transform", IJMICS, pp.1767-1778, 2009.
  8. X.W. Li, J.S. Yun, S.J. Cho and S.T. Kim, "Watermarking Based on Complemented MLCA and 2D CAT", KIMICS, Vol.9, No.2, pp.212-216, Apr.2011.
  9. X.W. Li, J.S. Yun, S.J. Cho and S.T. Kim, "Watermarking Using Low and High Bands Based on CAT", IEEE ICCSIT 2011, 2011.