A robust multiplicative watermarking technique for digital images in curvelet domain using normal inverse Gaussian distribution

Ayesha Shaik,Masilamani V
DOI: https://doi.org/10.1007/s11042-022-14137-8
IF: 2.577
2023-02-23
Multimedia Tools and Applications
Abstract:The illegal duplication of digital copies became easier because of increased communication speed and rapid growth of internetworked multimedia systems. So it is required to authenticate the legal owner of the digital data and protect the copyrights of the content owner. But the original image requirement during the verification of the owner becomes an overhead as it requires more storage. Instead of that, the watermark extraction without original data will be helpful which is also blind watermarking as the storage complexity is reduced. This article proposes a novel blind multiplicative watermarking (WM) system in the curvelet domain for copyright protection. The proper distribution of the curvelet coefficients has known by modeling the statistics of the curvelet coefficients of a digital image which is a heavy-tailed probability distribution function. It has shown that the normal inverse Gaussian (NIG) distribution suitably fits the empirical distribution. A secure watermark is used for watermarking, a combination of the pseudo-random sequence and the unique information of the owner in the proposed article. The design of the watermark extractor has been realized using NIG for the curvelet coefficients of digital images by using the above property. The watermark is decoded from NIG curvelet coefficients with expectation-maximization (EM) algorithm using maximum likelihood estimation (MLE). The watermark has been decoded using closed-form expressions in both the noise and noiseless environments. The experimental results on standard datasets (BOWS and SIPI) show that the proposed scheme provides approximately 20% improvement in PSNR and 50% reduction in bit error rate (BER) compared to the listed method in the article. The proposed technique shows high robustness against attacks such as cropping, rotation, median filtering, salt and pepper noise, Gaussian noise, average filtering, and gamma correction.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering
What problem does this paper attempt to address?