4.7 Article

Blind watermarking scheme for medical and non-medical images copyright protection using the QZ algorithm

Journal

EXPERT SYSTEMS WITH APPLICATIONS
Volume 241, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.eswa.2023.122547

Keywords

Forgery Attacks; False -Positive Problem; QZ Algorithm; Discrete Wavelet Transform-Singular Value; Decomposition (DWT-SVD)

Ask authors/readers for more resources

This paper presents a novel blind watermarking scheme based on the QZ algorithm, which solves the non-blind problem in existing watermarking schemes by using the watermark and host image as inputs for the QZ algorithm. The experimental results show that our scheme is robust against various attacks and forgeries, and out-performs the existing addition-based schemes in terms of invisibility.
The widely used watermarking technique is to hide the watermark information through adding process, which means the watermark is added with the host image to realize embedding. The constraints of these addition-based watermarking systems mainly are non-blind, they are vulnerable to forgery attacks and have the false-positive problem. To solve these problems, a novel blind watermarking scheme based on the QZ algorithm for medical and normal images is first presented in this paper. In the presented scheme, we take the watermark and the host image as two inputs of the QZ algorithm to realize embedding, rather than the adding process. The outputs of the QZ algorithm include four parts: two upper quasitriangular matrices and two unitary matrices. Then the three parts of the outputs are synthesized by the vector synthesis and inverse discrete wavelet transform-singular value decomposition (DWT-SVD) to obtain the watermarked host image. Due to the characteristics of the QZ algorithm, our scheme is blind. The performance is tested and compared by applying our scheme to both medical and non -medical images. The experimental results show that our scheme is robust against various image-processing at-tacks, forgery attacks, and false-positive problem. And from the comparison results, the proposed scheme out-performs the existing addition-based schemes in terms of robustness against the Median filter, Low-pass filter, Gaussian blur attacks, and forgery attacks, while maintaining good invisibility.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available