Keywords

1 Introduction

The excessive use of multimedia content in the past decades led to threat of illegal copying and duplication of digital content. In the recent multimedia age, the sharing of multimedia content or information like images, videos, and data with another person is widespread. Current advances in transmission invention, distribution, and process have created new occasions for the unlawful modification, duplication, and spreading of digital content. In recent years, growth in digital transmission and within the cyber world has been incredibly fast, enhancing the requirement of confidentiality and authenticity of multimedia data. So digital watermarking techniques are used to solve the problem of modern digital content transmission. Digital image watermarking is defined as a scheme for embedding a watermark logo or image into the cover image using any key which will be extracted from watermarked image for copyright protection and authentication purpose [1]. In watermarking scheme, watermark can be visible or invisible. On the basis of information needed at the time of the extraction process, the watermarking techniques can be classified into three types: blind, semi-blind, and non-blind watermarking schemes [2]. In the blind types of techniques, there is no requirement of cover image only secret key is required, whereas in non-blind techniques, the cover image with the secret key both are required during extraction process. In semi-blind type of schemes, watermark bit sequence and secret key both are required [3]. Watermarking can be performed in spatial domain and transform domain. In spatial domain techniques, pixel values of cover image are modified to embed watermark, whereas in transform domain techniques, the cover image is transformed into the frequency domain and then watermark is embedded [4]. In hybrid image watermarking techniques, watermark information is embedded in both spatial domain and transform domain. The transform domain schemes have many advantages like better imperceptibility and robustness and higher payload capacity, whereas spatial domain techniques have advantages like lesser complexity and lesser cost. Wavelet-based watermarking schemes show wider scope as it is a time–frequency approach utilizes multi-resolution property [5].

Mohan et al. [6] developed a Schur-based technique that employs Schur triangular matrix to embed watermark. Liu et al. [7] suggested technique based on combination of Contourlet transform and Schur decomposition. Su et al. [8] investigated a technique based on Schur decomposition and uses dual color image watermark that employ correlation between Schur matrixes to embed the watermark. Ahmad [9] proposes a non-invertible technique in which cover image is converted into the blocks then subjected to Schur decomposition, and PN-sequences are generated to embed as watermark. Su et al. [10] suggested a primitive Schur decomposition based color image watermarking technique in which the watermark is embedded by modifying the relationship of two elements in the first column coefficient of the unitary matrix derived by Schur decomposition. This paper presents DWT and Schur decomposition-based watermarking scheme which provide better imperceptibility and robustness as well as it have lesser computational time.

This paper is arranged in following manner: In Sect. 2, the theory of DWT is explained, whereas in Sect. 3, the theory of Schur decomposition is presented, and in Sect. 4, proposed watermarking techniques are described. Section 5 contains the simulation result and finally conclusions are given in Sect. 6.

2 Discrete Wavelet Transform (DWT)

DWT decomposed image into four subbands, in each decomposition level which provides multi-resolution property. DWT uses based on wavelets as basis function, whereas DFT and DCT have everlasting sinusoidal or complex exponentials. Wavelets are generated by dilation and translation of mother wavelet. The DWT is mainly based on subband filtering. First original image is transformed into the four different subbands like LL1, LH1, HL1, and HH1. LL1 contains lower frequency components so it has maximum energy of image [3]. High frequency components LH1, HL1, HH1 hold the detailed information. It can be further divided into the subband by applying the second level wavelet decomposition into the LL1 subband which further provides four subbands which are LL2, LH2, HL2, and HH2. The process can be repeated to decompose image to the nth level subbands to get suitable subbands for watermarking where n is the level of decomposition. Similarly by using Inverse DWT, original image can be recovered. DWT provides suitable subband for watermarking according to human visual system. So watermark can be embedded into HL or LH subbands as they are not visible to human visible system [11, 12]. The DWT has limitation of shift invariance and phase sensitivity (Fig. 1).

Fig. 1
figure 1

DWT decomposition of image

3 Schur Decomposition

The Schur decomposition [9, 13, 14] provides Eigen values of pixel block easily.

It can be defined for any matrix M as

$$M=U\times A\times {U}^{T}$$
(1)

where M\({R}^{n\times n}\) and A is upper triangular matrix and U is a unitary matrix [8, 9].

The Schur decomposition provides two matrices unitary and upper triangular matrix. The Schur decomposition can be applied on square matrices. The Schur decomposition is based on theory of unitary transformation, and it is intermediate step of singular value decomposition (SVD) due to which it has lesser the computation time than SVD. The Schur decomposition diagonal matrices are same for A and AT as the Eigen value of both are same. The Schur vectors are invariants to scaling. The Schur decomposition is mainly based on unitary transformation which makes so it stable. These properties make the Schur decomposition suitable for its application in image decomposition and in image watermarking as well. The watermarking information can be embedding into both the matrices either unitary matrix or upper triangular matrix but generally upper triangular matric is preferred.

4 Proposed Watermarking Technique

The proposed watermarking algorithm is discussed in this section. In this work, a cover image as (I) of size M × N and binary watermark image as (Iw) of size m × n is considered.

4.1 Embedding Algorithm

The watermark is embedded based on procedure whose is shown in Fig. 2:

Fig. 2
figure 2

Block diagram representation of proposed schemes

  1. i.

    Perform DWT on cover image to decompose image into four subbands LL1, LH1, HL1, and HH1.

  2. ii.

    The Schur decomposition is obtained by applying the Schur transform into the LL1 subband.

  3. iii.

    The upper triangular matrix of LL subband of cover image is further subjected to singular values decomposition (SVD) which gives three matrices.

  4. iv.

    The watermark image is also subjected to SVD to obtain the singular values (SV) matrices.

  5. v.

    The watermark is embedded by manipulating the SVs of cover image to SVs of watermark image

    $${I}_{2}\left(i,j\right)={I}_{1}\left(i,j\right)+k{I}_{w}(i,j)$$
    (2)

    where k is gain factor.

  6. vi.

    Inverse process of SVD and Schur transform is applied to recover the modified LL subband.

  7. vii.

    The watermarked image is obtained by applying inverse DWT to the modified LL subband.

4.2 Extraction Process

The extraction procedure of binary watermark image is as following steps

  1. i.

    Apply DWT to obtain watermark image which results to four subband of watermarked image.

  2. ii.

    Perform Schur transform to LL subband to obtain the Schur vector matrix.

  3. iii.

    In next step, SVD is applied into the upper triangular matrix of Schur decomposition.

  4. iv.

    Extract transformed watermark image coefficients from watermarked image by applying

    $${I}_{w}\left(i,j\right)={(I}_{2}\left(i,j\right)-{I}_{1}(i,j))/k$$
    (3)
  5. v.

    Apply SVD to extract the watermark image.

5 Simulation Result

The effectiveness of proposed scheme is tested using various performance parameters for three images which are lena, girl, and pirates of as cover image of size 512 × 512 and binary watermark of size 256 × 256 is taken as watermark image shown in Fig. 3. Watermarked image obtained after applying the proposed algorithm is shown in Fig. 4.

Fig. 3
figure 3

Cover image a lena, b girl, c pirates, and d binary watermark

Fig. 4
figure 4

Watermarked images a lena, b pirates, c girl, and d extracted binary watermark

The performance of the proposed algorithm is evaluated by two parameters which are as follows.

5.1 Peak Signal to Noise Ratio (PSNR)

It is the parameter to evaluate the superiority of the watermarked image. It is ratio of peak value of signal power to noise power. PSNR used for evaluation of watermarking algorithm which is defined as:

$$\mathrm{PSNR }= 10*\mathrm{log}\frac{{255}^{2}}{\mathrm{MSE}}$$
(4)

where mean square error (MSE) for gray image is given by:

$$\mathrm{MSE }=\frac{1}{M \times N}\sum_{x=1}^{M}\sum_{y=1}^{N}{[I\left(x,y\right)-W\left(x,y\right)]}^{2}$$
(5)

5.2 Structural Similarity Index Measures (SSIM)

SSIM defines the structural similarity between the cover image and watermarked image. SSIM nearer to 1 shows that structure of cover image and watermarked image are same. SSIM provides knowledge about the imperceptibility of image which is an important characteristic of watermarking algorithm.

$$\mathrm{SSIM }(I, {W}_{c}) = \frac{\sum_{x=0}^{M}\sum_{y=0}^{N}[ C\left(x,y\right){{W}_{c},}\left(x,y\right)]}{\sum_{x=0}^{M}\sum_{y=0}^{N} |C\left(x,y\right)|{ }^{2}}$$
(6)

The SSIM and PSNR evaluated after applying various types of attacks.

Noise attack: The noise affected watermarked image is obtained by applying salt and pepper type noise with variance 0.01.

Histogram equalization: Histogram equalization modifies the intensity value of image which used to improve the contrast of the image.

Filtering attack: Various types of filtering attacks like Gaussian, median, and average filtering are performed.

Geometrical attack: There exit various types of geometrical attacks like rotation, translation, etc. Performance of proposed technique is tested against rotation attack by rotation of watermarked image.

In Fig. 5, watermarked image obtained after various attacks are shown. In Fig. 6, PSNR value is plotted against gain k. Various values of parameter obtained after applying various attacks are given in Table 1.

Fig. 5
figure 5

Watermarked image after various attacks: a salt and pepper noise (0.01), b Gaussian noise (0.01), c histogram attack equalization, d median filter (3 × 3), e average filtering, and f rotation (2°)

Fig. 6
figure 6

PSNR value on various values of k (gain)

Table 1 PSNR a value and structure similarity index measure (SSIM) of various watermarked image after applying attacks

It is clearly visible from Fig. 6, there exists an inverse relationship between the value of gain factor (k) and PSNR value. It shows the imperceptibility of watermarking scheme decreases with the increase value of k. In proposed scheme, PSNR value is greater than 30 dB for all value of k, which is more than the acceptable value of PSNR for any watermarking schemes.

Figure 7 shows the imperceptibility of proposed scheme which is better as compared to other method based on Schur decomposition proposed in [15,16,17].

Fig. 7
figure 7

Comparison of PSNR values of proposed scheme with Schur-based algorithm presented in [15,16,17]

6 Conclusion

Image watermarking scheme which is based on DWT and Schur decomposition is proposed in this paper. Binary watermark is embedded in cover image, after applying wavelet transform in LL subband. The proposed scheme shows good visual imperceptibility against various attacks. The proposed scheme shows very good PSNR and SSIM values. This algorithm can be further modified using RDWT as it has shift invariance property. Furthermore, the value of gain factor k can be optimized.