Welcome to Journal of Graphics share: 

Journal of Graphics ›› 2022, Vol. 43 ›› Issue (4): 659-666.DOI: 10.11996/JG.j.2095-302X.2022040659

• Image Processing and Computer Vision • Previous Articles     Next Articles

Grayscale watermarking algorithm via BEMD and texture complexity

  

  1. 1. School of Mathematical Sciences, Tiangong University, Tianjin 300387, China;
    2. Technology and Engineering Center for Space Utilization, Chinese Academy of Sciences, Beijing 100049, China
  • Online:2022-08-31 Published:2022-08-15
  • Contact: WANG Xiao-chao (1987), associate professor, Ph.D. His main research interests cover graphic image processing, computation geometry, etc
  • Supported by:
    The Science & Technology Development Fund of Tianjin Education Commission for Higher Education (2018KJ222); Open Project
    Program of the State Key Lab of CAD&CG, Zhejiang University (A2105)

Abstract:

This paper presented a grayscale watermarking algorithm combining texture complexity and bi-dimensional empirical mode decomposition (BEMD). Firstly, the watermark image after Arnold transform was decomposed by BEMD to obtain the intrinsic modal function (IMF) and the residual information of different scales. Then, the texture complexity of the host image after segmentation was calculated, and the region of high texture complexity was selected as the embedding location. In order to better fuse the IMF of the watermark image with the host image, BEMD decomposition was performed on the host image under the same sieving conditions as those for the watermark image. Finally, the watermark information was repeatedly embedded into the pre-selected location of the host image, and then the image embedded with watermarks was reconstructed by the IMF and the residual. Watermark extraction was the inverse process of watermark embedding. The experiments on host images at different texture levels revealed that the peak signal-to-noise ratios of images embedded with watermarks were all above 40 dB, and the normalized coefficients values of watermark extraction all exceeded 0.95 in the face of eight common attacks. Compared with the existing algorithms, the proposed algorithm performs well in large scale shearing, noise attack, image filtering, and JPEG compression attack, superior to the algorithms under comparison.


Key words:

CLC Number: