Citation: | Zhang Fangyan, Luo Ting, Jiang Gangyi, et al. Robust stereo images watermarking based on correlations of left and right views[J]. Opto-Electronic Engineering, 2018, 45(12): 180054. doi: 10.12086/oee.2018.180054 |
[1] | Schierl T, Narasimhan S. Transport and storage systems for 3-D video using MPEG-2 systems, RTP, and ISO file format[J]. Proceedings of the IEEE, 2011, 99(4): 671-683. doi: 10.1109/JPROC.2010.2091370 |
[2] | Zhang L, Vazquez C, Knorr S. 3D-TV content creation: automatic 2D-to-3D video conversion[J]. IEEE Transactions on Broadcasting, 2011, 57(2): 372-383. doi: 10.1109/TBC.2011.2122930 |
[3] | Jiang L L, He J Q, Zhang N, et al. An overview of 3D video representation and coding[J]. 3D Research, 2010, 1(1): 43-47. doi: 10.1007/3DRes.01(2010)6 |
[4] | Smolic A, Mueller K, Stefanoski N, et al. Coding algorithms for 3DTV—a survey[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2007, 17(11): 1606-1621. doi: 10.1109/TCSVT.2007.909972 |
[5] | 张宪海, 杨永田.基于脆弱水印的图像认证算法研究[J].电子学报, 2007, 35(1): 34-39. doi: 10.3321/j.issn:0372-2112.2007.01.007 Zhang X H, Yang Y T. Image authentication scheme research based on fragile watermarking[J]. Acta Electronica Sinica, 2007, 35(1): 34-39. doi: 10.3321/j.issn:0372-2112.2007.01.007 |
[6] | 王国栋, 刘粉林, 刘媛, 等.一种能区分水印或内容篡改的脆弱水印算法[J].电子学报, 2008, 36(7): 1349-1354. doi: 10.3321/j.issn:0372-2112.2008.07.019 Wang G D, Liu F L, Liu Y, et al. An image authentication scheme with discrimination of tampers on watermark or image[J]. Acta Electronica Sinica, 2008, 36(7): 1349-1354. doi: 10.3321/j.issn:0372-2112.2008.07.019 |
[7] | 刘东彦, 刘文波, 张弓.图像内容可恢复的半脆弱水印技术研究[J].中国图象图形学报, 2010, 15(1): 20-25. Liu D Y, Liu W B, Zhang G. Research of recoverable semi-fragile watermarking for image content[J]. Journal of Image and Graphic, 2010, 15(1): 20-25. |
[8] | 白韬韬, 刘真, 卢鹏.基于QR码的Contourlet域数字水印算法[J].光电子•激光, 2014, 25(4): 769-776. Bai T T, Liu Z, Lu P. Digital watermarking scheme in Contourlet domain based on QR code[J]. Journal of Optoelectronics • Laser, 2014, 25(4): 769-776. |
[9] | 王晓红, 孙业强.基于QR码和Schur分解的感兴趣区域水印算法[J].光电子•激光, 2017, 28(4): 419-426. Wang X H, Sun Y Q. Region of interest based watermarking algorithm based on QR code and Schur decomposition[J]. Journal of Optoelectronics • Laser, 2017, 28(4): 419-426. |
[10] | 任克强, 张丹丹, 吴帆.融合DCT和汉明码的自适应鲁棒图像水印[J].光电工程, 2016, 43(11): 54-61. doi: 10.3969/j.issn.1003-501X.2016.11.009 Ren K Q, Zhang D D, Wu F. Adaptive robust image watermarking based on DCT and Hamming code[J]. Opto-Electronic Engineering, 2016, 43(11): 54-61. doi: 10.3969/j.issn.1003-501X.2016.11.009 |
[11] | Chen H Y, Zhu Y S. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique[J]. Journal of Zhejiang University-Science C, 2012, 13(8): 573-584. doi: 10.1631/jzus.C1100338 |
[12] | 叶天语.离散小波变换域鲁棒量化灰度水印算法[J].光电工程, 2012, 39(7): 120-125. doi: 10.3969/j.issn.1003-501X.2012.07.019 Ye T Y. A robust quantization-based Gray watermarking algorithm in discreet wavelet transform domain[J]. Opto-Electronic Engineering, 2012, 39(7): 120-125. doi: 10.3969/j.issn.1003-501X.2012.07.019 |
[13] | Kang X B, Zhao F, Lin G F, et al. A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength[J]. Multimedia Tools and Applications, 2018, 77(11): 13197-13224. doi: 10.1007/s11042-017-4941-1 |
[14] | Cedillo-Hernández M, García-Ugalde F, Nakano-Miyatake M, et al. Robust hybrid color image watermarking method based on DFT domain and 2D histogram modification[J]. Signal Image and Video Processing, 2014, 8(1): 49-63. doi: 10.1007/s11760-013-0459-9 |
[15] | Sun L, Xu J C, Liu S W, et al. A robust image watermarking scheme using Arnold transform and BP neural network[J]. Neural Computing and Applications, 2018, 30(8): 2425-2440. doi: 10.1007/s00521-016-2788-4 |
[16] | Liu N S, Li H J, Dai H Y, et al. Robust blind image watermarking based on chaotic mixtures[J]. Nonlinear Dynamics, 2015, 80(3): 1329-1355. doi: 10.1007/s11071-015-1946-z |
[17] | Luo T, Jiang G Y, Wang X D, et al. Stereo image watermarking scheme for authentication with self-recovery capability using inter-view reference sharing[J]. Multimedia Tools and Applications, 2014, 73(3): 1077-1102. doi: 10.1007/s11042-013-1435-7 |
[18] | Campsi P. Object-oriented stereo-image digital watermarking[J]. Journal of Electronic Imaging, 2008, 17(4): 043024. doi: 10.1117/1.3009554 |
[19] | Wu A H, Yu M, Peng Z J, et al. Relationship modulation based blind stereoscopic image watermarking algorithm for 3D media[C]// International Conference on Internet Technology and Applications. Wuhan, 2011: 1-4. |
[20] | Ou Z H, Chen L H. A robust watermarking method for stereo-pair images based on unmatched block bitmap[J]. Multimedia Tools and Applications, 2016, 75(6): 3259-3280. doi: 10.1007/s11042-014-2433-0 |
[21] | Vo P H, Nguyen T S, Huynh V T, et al. A robust hybrid watermarking scheme based on DCT and SVD for copyright protection of stereo images[C]// Proceedings of the 4th NAFOSTED Conference on Information and Computer Science. Hanoi, 2017: 331-335. |
Overview: With the development of network and multimedia technology, two dimensional (2D) image or video has become ubiquitous in all aspects of people's life, and real-time 2D video visual communication has matured. However, the 2D video cannot meet the visual requirements of people. The 3D realism has gradually become a fashion pursuit, since 3D images or videos provide the depth information of the scene and enhance the sense of reality. The demand for the development and applications of the 3D video system in the market is becoming much more urgent. It has a wide range of applications prospects in many fields such as stereoscopic digital television, distance education, 3D video conference system, virtual reality system, telemedicine, etc. With the popularity of 3D videos or images, 3D multimedia content may be transmitted through the Internet and other non-secure channels, and they may be copied, tampered or illegally used. It is essential to prevent illegal dissemination of 3D multimedia information, and watermarking as embedding the secret data into the 3D images is the main technology of protecting copyright. So far, the robust watermarking method for the monocular image is almost mature, but only a few stereo image robust watermarking methods are reported. As shown in Fig, to solve the copyright protection of stereo images, a robust stereo image watermarking method based on correlations of left and right views is proposed. Because Tucker decomposition can preserve the main energy of the image well, it is performed on left and right views to make full use of the correlations of three channels in the color view. Each view is decomposed into three feature images, where the first feature map retains relationships of three channels in each view. Secondly, considering correlations between the left and right views, the first feature images of the left and right views are combined to be performed by using Tucker decomposition, and the main energy features images of the stereo image are obtained. Finally, the main energy feature image is decomposed by singular value decomposition, and watermark is embedded for the purpose of improving the robustness. The experimental results show that when different kinds of stereo images are attacked by Convolution Filter, JPEG compression, Median Filter, Scaling and Cropping, watermark can be extracted blindly, and recognized with high NC. Compared with the monocular image watermarking methods, the proposed algorithm is more robust.
Third-order tensor decomposition diagram
Three feature images of Baby after Tucker decomposition. (a) The first feature image; (b) The second feature image; (c) The third feature image
Block diagrams of robust stereo images watermarking based on correlations of left and right views. (a) Watermark embedding process; (b) Watermark extraction process
Original stereoscopic images. (a) Baby; (b) Bowling; (c) Art; (d) Dolls
Watermarked stereoscopic images. (a) Baby; (b) Bowling; (c) Art; (d) Dolls
Original watermark
Extracted watermark image after attack. (a) Conv1(NC=0.9249); (b) Conv2(NC=0.9655); (c) JPEG90(NC=0.9884); (d) Scaling0.9(NC=0.9271); (e) Scaling2(NC=0.9781); (f) Cropping0.95(NC=0.9911)