Abstract
In this article, a new DWT-SVD and DCT with Arnold Cat Map encryption based robust and blind watermarking scheme is proposed for copyright protection. The proposed scheme solves the most frequently occurring watermarking security problems in Singular Value Decomposition (SVD) based schemes which are unauthorized reading and false-positive detection. This scheme also optimizes fidelity and robustness characteristics. The grey image watermark splits into two parts using four bits MSBs and four bits LSBs of each pixel. Discrete Cosine Transform (DCT) coefficients of these MSBs and LSBs values are embedded into the middle singular value of each block having size 4 × 4 of the host image’s one level Discrete Wavelet Transform (DWT) sub-bands. The reason for incorporating Arnold Cat Map in the proposed scheme is to encode the watermark image before embedding it in the host image. The proposed scheme is a blind scheme and does not require the choice of scaling factor. Thus, the proposed scheme is secure as well as free from the false positive detection problem. The proposed watermarking scheme is tested for various malicious and non-malicious attacks. The experimental results demonstrate that the scheme is robust, imperceptible and secure to several attacks and common signal processing operations.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
The fast development of the Internet and multimedia technologies has enabled the ease of multimedia content distribution, communication and reproduction. However, some very crucial issues for multimedia such as illegal copying, distribution, editing and copyright protection have arisen due to these technological advancements [8, 41]. To tackle these problems, digital watermarking has emerged as an obvious solution [8, 11, 12, 33, 44]. The first technology of copyright protection is cryptography where the content is encrypted prior to delivery and a decryption key is provided only to those who have purchased legitimate copies of the content. In addition, cryptography can protect content from manipulation only in encrypted form but once decrypted, the content has no further protection from illegal duplication. Watermarking schemes can be introduced as a standard solution to tackle these increasing requirements. It is a technique that attempts to guard digital content from illegal copying and manipulation even after decryption [13]. Digital watermarks could have a wide range of applications like copyright protection, content authentication, broadcast monitoring, transaction tracking, owner identification, copy control and media forensics [44, 55].
Digital watermarking can be defined as the practice of embedding secret imperceptible piece of information into the multimedia data (i.e., images, videos and audios).The secret imperceptible piece of information is called watermark and the multimedia data in which watermark gets embedded is called cover or host signal [13, 59]. A variety of watermarking schemes have been proposed in literature. Digital watermarking techniques can be categorized in various ways on the basis of criteria like embedding method, visibility, attack resistance etc. Based on attack resistance, digital watermarking is categorized into three classes: robust watermarking, semi-fragile watermarking and fragile watermarking. In these days, the robust digital watermarking has received a great attention. In this type of watermarking, watermark is designed to resist intentional or unintentional manipulations in the host signal [9, 58]. In the fragile watermarking, watermark is intended to be destroyed even after the minor unintentional or intentional manipulation in the host signal [29, 52–54]. In the semi-fragile watermarking, watermarks have the ability to resist unintentional manipulations caused by common image processing operations like JPEG compression and are fragile against intentional manipulations [43, 46]. The main purpose of the robust watermarking is to protect copyright and ownership of the digital data, whereas the fragile watermarking and semi-fragile watermarking are employed to ensure the integrity and content authentication of the digital data [55, 57].
Digital watermarking is categorized into blind, semi-blind and non-blind watermarking, based on the requirements for watermark detection or extraction. The non-blind (or private) watermarking techniques require both the original host image and the secret key(s) to identify the watermark. Semi-blind watermarking techniques require the presence of the secret key(s) and the watermark for watermark extraction. On the other hand, the blind (or public) watermarking schemes require only the secret key(s) for extraction [15].
The watermark techniques can also be broadly classified into two major classes based on the embedding domain: spatial domain techniques and transform domain techniques [20, 57]. Spatial domain techniques are the simplest and in these techniques, the watermark directly applies on pixel intensities of the host signal [20, 31, 51, 52]. On the other hand, transform domain techniques perform the watermarking by changing the transformed domain coefficients of the host signal [20]. The transform domain coefficients can be Discrete Wavelet Transform (DWT) [17, 60], Redundant Discrete Wavelet Transform (RDWT) [14, 16, 36], Discrete Fourier Transform (DFT) [45, 56], Discrete Cosine Transforms (DCT) [6, 22], Singular Value Decomposition(SVD) [35, 39] and Divisive Normalization Transform (DNT) [28, 42] coefficients etc. Typically, the transform domain techniques are more robust in various attacks than the spatial domain techniques [12, 37, 48]. The performance of transform domain techniques can be further improved by joining two or more transform coefficients.
Most of the current literature focus on the performance measures like imperceptibility, robustness and capacity. Inclusion of security along with performance measures is an essential issue in many critical watermarking applications, such as medical image watermarking, authentication of legal documents, fingerprinting and data monitoring. In [31], Lin et al. proposed a lossless watermarking scheme for copyright protection based on 1/T rate forward error correction. This scheme is blind and based on spatial domain. In this scheme, watermark logo was fused with noise bits to improve the security, and later XORed with the feature value of the image by 1/T rate FEC. In [33], Lin et al. proposed a wavelet-tree-based watermarking scheme for copyright protection, using distance vector of binary cluster. In this scheme, wavelet trees were classified into two clusters using the distance vector to denote binary watermark bits so that they exhibit a sufficiently large statistical difference based on the distance vector. This difference is utilized for subsequent watermark extraction. In [32, 34], Lin et al. proposed two blind watermarking scheme for copyright protection based on wavelet coefficient quantization. In the first scheme, the significant difference between the maximum wavelet coefficient and the second maximum wavelet coefficient was utilized for embedding. In the second scheme, watermark was embedded in the local maximum coefficient using different sub-bands.
Many of the existing SVD-based digital watermarking schemes suffer from the false positive detection problem which is referred as the ability to extract an un-embedded watermark from the digital host image. Several authors have conducted experiments on SVD-based watermarking to find the robust watermarking scheme. In literature listed in Table 1, only the singular values of watermark(or singular values of host image and watermark) are embedded into the host image. These approaches cause the false positive detection problem because the SVD subspaces (left and right singular vectors) represent the detailed information about the image whereas singular values only determine the luminance of the image layers produced by left and right singular vectors [3, 23, 62]. These schemes mainly deal with robustness and imperceptibility issues. Jain et al. [23] proposed a reliable SVD-based digital watermarking scheme which was capable to handle the false positive detection problem. In this scheme the principal component of watermark is embedded into the host image rather than singular values of the watermark. Gupta and Raval [16] proposed a DWT-SVD based scheme which was also capable to handle the false positive detection problem. This scheme handles such problem by incorporating signature-based authentication mechanism. Further Bhatnagar et al. [10] proposed a logo image watermarking scheme based on Wavelet Frame Transform, SVD and automatic thresholding. The core idea of this scheme is using reversible random extension transform, to randomly upscale the size of cover image followed by the embedding of logo watermark in the Wavelet Frame domain. After embedding logo watermark, a verification phase is performed with the help of a binary watermark and Toral Automorphism. Second critical problem of digital watermarking scheme is the problem of multiple claims of ownership. If an attacker embeds another illegal watermark to the already watermarked image, proofing the ownership becomes a serious problem. Mohammad et al. [39] suggested a solution to deal with this problem by ensuring to reach the maximum allowable amount of embedded information to prevent the attacker from adding any extra information to the image. However, this solution is not applicable in that watermarking scheme where it requires multiple number of watermarks to be embedded. Further, Run et al. [49] proposed a digital watermarking scheme that solves the ambiguities and false positive detection problem but at the same time it is poor with respect to imperceptibility and robustness of host image. Third common security challenge that watermarking techniques face is keeping the secret message unreadable for unauthorized persons. Cryptography techniques like Arnold transformation [4], chaotic encryption [24] can be used to deals with this problem.
An important issue related to the efficiency and feasibility of watermarking schemes is blind watermarking. The blind watermarking scheme has a great significance and practical value in many applications where keeping the original image without security is not practical.
In this DWT-SVD based blind watermarking scheme, an effective solution for these challenging problems is proposed and evaluated using gray image watermark. The false positive detection problem is tackled by embedding complete watermark into host image. To tackle the unauthorized reading issue, an attempt is made to encode the watermark using Arnold transformation. Scaling factor plays an important role to control the transparency and robustness of the watermarked image. There is no exact algorithm to choose the value of scaling factor. Most of the existing algorithms are based on trial-and-error method. In our scheme, there is no requirement for choosing scaling factor as it makes the addition of other watermarks harder. To maintain the transparency we split the watermark into two parts as MSBs and LSBs planes. The DCT coefficients of MSBs and LSBs planes are embedded into singular values of LH and HL sub-bands in block-wise manner.
The rest of this paper is organized as follows: Section 2 gives brief backgrounds of DWT, SVD, DCT and Arnold Cat Map transformation. Section 3 describes the details of the proposed watermarking scheme. Sections 4 discusses experimental results. Finally, Section 5 draws the Conclusion.
2 Background
2.1 Discrete wavelet transform (DWT)
The small waves of varying frequency and limited duration are wavelet [1, 18, 40]. Wavelet transform has become an important tool in watermarking and image processing due to its excellent space and frequency energy compaction properties. At each level, DWT decomposes an image into four sub-bands i.e. a lower resolution approximation component (LL) and three other spatial direction components corresponding to horizontal (HL), vertical (LH) and diagonal (HH) detail components. The LL sub-band is obtained by low-pass filtering in both horizontal and vertical directions. It contains an approximate description of the image. The HH sub-band is obtained by applying high-pass filter in both horizontal and vertical directions. It contains the high-frequency components along the diagonals. The HL and LH sub-bands are obtained by low-pass filtering in one direction and high-pass filtering in another direction. HL contains the horizontal detail information while LH represents the vertical detail information. At each level of decomposition the magnitude of the DWT coefficients is larger in the approximation sub band (LL), and smaller for other high resolution sub bands (HL, LH and HH). The high resolution sub bands help in locating the edge and texture patterns of any image. DWT-based watermarking techniques enable good spatial localization and have multi-resolution characteristics, which are similar to the human visual system (HVS).
2.2 Discrete cosine transformation (DCT)
The DCT has distinct property that most of the significant information of the image is concentrated in just a few low frequency coefficients of the DCT. It is referred as energy compaction property. DCT is often used in image and signal processing due to its strong energy compaction property [30]. The two-dimensional DCT transform formula is given in (1).
where x, y, u, v = 0, 1, 2, . . . , N − 1, and
The inverse transform (IDCT) formula is given in (2).
where f(x, y) is the gray value of a pixel and F(u, v) is the DCT coefficient. The top left corner coefficient of the frequency domain matrix represent the DC value, and the remaining coefficients represent the AC values of the image.
2.3 Singular value decomposition (SVD)
SVD is a well-known factorizing technique for real or complex rectangular matrix in numerical analysis. If I is an image, it is indicated as I ∈ R M × N, where R represents the real number domain. The SVD of I is defined as follows [10, 41]:
where U ∈ R M × M and V ∈ R N × N are unitary matrices and S ∈ R N × N is a diagonal matrix with diagonal entries \(s_{i}^{,s} \) satisfying s 1 ≥ s 2 ≥ s 3... ≥ s N ≥ 0 and the superscript t denotes matrix transposition. The U and V are left and right singular vectors and S is a singular value matrix. The main properties of the SVD in terms of image processing applications is the singular values of the image have very good stability to know when a small perturbation is made in the image of the singular value does not change significantly [19, 35]. It is worth noting that, the singular vectors of an image specify the image geometry while the singular values specify the luminance (energy) of the image. It is found that slight variations in the singular values do not affect the visual perception of the quality of the image. The property based on psycho-visual effect allows one to embed the watermark bits in the original image through minor modification of the singular values of the original image.
2.4 Arnold cat map
To enhance the security of the watermarking scheme watermark should be randomized before embedding into cover image. Among the various ways for scrambling, we are using Arnold Cat Map (or Arnold transform) [61] which is an iterative process to move the pixel position. We assume the dimension of the original grayscale image I is N × N which have pixels S = {(x, y)|x, y = 0, 1, 2, ... , N − 1}. The generalized 2D Arnold transform is defined as:
where x k and y k are transformed coordinates corresponding to coordinates x and y after K iterations; N is the height or width of the square image processed; p and q are positive integers. It is an iterative process, if the location (x, y) is transformed several times then it returns to its original position after T iterations. This T is called the period of the transformation and depends on parameters p, q and N. These parameters can be used as secret keys. Periodicity is required to get back the image. If the scrambling is done by performing K iterations, one can get back the original image by performing (T − K) iterations.
Let us consider, an image of size 128 × 128, when parameters p =1, q =1 are given, then it recovers the original pixel positions after being iterated 96 times. By varying the size of the image and parameters p, q, the image can be recovered after a different number of iterations. In other words, periodicity (T) of the image depends on the size of the image and choosing the parameters p and q value. So the size of the image and the parameters of the Arnold cat map may be treated as secret keys for image encryption. For the parameters p = 1, q = 1 of an image of size 256 × 256, total 192 iterations is required to recover the original pixel positions. For the parameters p = 10, q = 8 of an image of size 256 × 256, total 128 iterations is required to recover the original pixel positions.
3 Proposed methodology
Proposed DWT-SVD and DCT based watermarking scheme is presented in this section. The scheme can be divided into two stages: first stage discuses watermark embedding procedure where as second stage consists of watermark extraction procedure. Overview of these procedures can be seen in Figs. 1 and 2 respectively. The detailed procedures are discussed in the following subsections.
3.1 Watermark embedding procedure
The procedure to embed gray scale watermark image W into cover image I is formulated as follows.
Input[ Host Image: I, Watermark Image: W ]
-
Step 1. On the basis of MSBs and LSBs plane, split the input watermark W into two parts W 1 and W 2 as follows:
$$ {b_{n,m}} = \lfloor\frac{w_{n}}{2^{m-1}}\rfloor \bmod 2, m=1,2,...,8 $$(5)$$ W_{1} = bin2dec([b_{n,1}, b_{n,2}, b_{n,3}, b_{n,4}]) $$(6)$$ W_{2} = bin2dec([ b_{n,5}, b_{n,6}, b_{n,7}, b_{n,8}]) $$(7)where w n represents the n th pixel of watermark image, b n, m represents eight bits binary values of w n and bin2dec() is used to convert binary number string to decimal number.
-
Step 2. Apply DCT followed by Arnold Cat Map (K) times on the entire Generated Watermarks W 1 and W 2. The resultant outputs are called as scrambled watermarks W 1s and W 2s .
$$ D_{k}=DCT2(W_{k}), k=1,2 $$(8)$$ W_{ks}=ACM(D_{k}, K), k=1,2 $$(9)where ACM () represents the Arnold Cat Map function.
-
Step 3. Apply one-level Haar DWT on the host image I to decompose it into four sub-bands LL, LH, HL and HH.
-
Step 4. Divide the LH and HL sub-bands into non-overlapping blocks of size 4 × 4.
-
Step 5. Perform SVD operation on all blocks of LH and HL sub-bands.
$$ [U_{k,i} S_{k,i} V_{k,i}]= SVD(B_{k,i}) , i=1,2, ..., N; k=1,2 $$(10)where k represents one of two sub–bands, B k, i is the i th block of corresponding sub-band and N is the total number of blocks in LH (or HL) sub-band.
-
Step 6. Modify the middle singular values S k, i of block B k, i with the help of absolute values of Scrambled Watermarks W 1s and W 2s in the following ways:
$$ \delta_{k,i}= S_{k,i}(2,2) - S_{k,i}(3,3), i=1,2, ..., N; k=1,2; $$(11)$$ {\Delta}_{k,i}= abs(W_{ks}(i)) - \delta_{k,i}, i=1,2, ..., N; k=1,2 $$(12)$$ S_{k,i}(2,2)= S_{k,i}(2,2) +{\Delta}_{k,i}, i=1,2, ..., N; k=1,2 $$(13) -
Step 7. Obtain two non-zero binary sequences and call them as Generated Keys i.e. K e y 1 and K e y 2with the help of S k, i (1,1) and modified S k, i (2, 2) by using (12).
$$ Key_{k}(i) = \left\{ \begin{array}{ll} 1 & \text{if \(S_{k,i}(1,1) \geq S_{k,i}(2,2)\)}\\ -1 & \text{if \(S_{k,i}(1,1) < S_{k,i}(2,2)\)} \end{array} \right. , i=1,2, ..., N; k=1,2 $$(14) -
Step 8. Obtain another two non-zero Generated Keys i.e. K e y 3 and K e y 4 using the Scrambled Watermarks W 1s and W 2s as follows:
$$ Key_{p}(i,j) \,=\, \left\{ \begin{array}{ll} 1 & \text{if \(W_{ks}(i,j) \geq 0\)}\\ -1 & \text{Otherwise} \end{array} \right. , i\,=\,1,2, ..., X; j\,=\, 1,2,..,Y; k\,=\,1,2; p\,=\,3, 4 $$(15)where X and Y are the height and width of Scrambled watermarks.
-
Step 9. Apply inverse SVD to all blocks to construct modified LH and HL sub-band..
$$ B_{k,i}^{w}= U_{k,i} S_{k,i} V_{k,i}^{t} , i=1,2, ..., N; k=1,2 $$(16) -
Step 10. Apply one- level inverse Haar DWT to get the desired watermarked image, denoted by I w .
Output [ Watermarked Image: I w , Generated Keys: K e y 1, K e y 2, K e y 3, K e y 4 ]
3.2 Watermark extraction procedure
In the watermark extraction procedure, our objective is to obtain the original watermark. For watermark extraction, only generated Keys (K e y 1, K e y 2, K e y 3, K e y 4) are required. Hence, the watermark extraction is blind procedure. The extraction process can be done by the following steps.
Input [ Suspected watermarked image: \({I^{*}_{w}}\), Generated Keys: K e y 1, K e y 2, K e y 3, K e y 4, Arnold Cat Map parameters: p, q, K, T ]
-
Step 1. Apply one-level Haar DWT on the suspected watermarked image \({I^{*}_{w}}\) (possibly distorted) to decompose it into four sub-bands L L ∗, L H ∗, H L ∗, H H ∗.
-
Step 2. Divide L H ∗ and H L ∗ sub-bands into blocks of size 4 × 4.
-
Step 3. Perform SVD operation on all blocks of L H ∗ and H L ∗ sub-bands.
$$ [U_{k,i } S_{k,i} V_{k,i}]= SVD(B^{*}_{k,i}) , i=1,2, ..., N; k=1,2 $$(17)where k represents one of two sub–bands, \({B^{*}_{k,i}}\) is the i th block of corresponding sub-band and N is the total number of blocks in L H ∗ (or H L ∗) sub-band.
-
Step 4. Extract the scrambled watermarks W 1s and W 2s using K e y 1 and K e y 2 as
$$ W_{ks}(i) = \left\{ \begin{array}{ll} S_{k,i }(2,2) - S_{k,i }(3,3) & \text{if \(Key_{k}(i) =1 \)}\\ S_{k,i }(1,1) - S_{k,i }(3,3) & \text{if \(Key_{k}(i) = -1 \)} \end{array} \right. , i=1,2,...,N; k=1,2 $$(18) -
Step 5. Apply Arnold Cat Map (T- K) times on extracted W 1s and W 2s to get absolute values of DCT coefficients (W 1D and W 2D ) of Generated watermark \({W^{*}_{1}}\) and \({W^{*}_{2}}\). Here T is the time period of Generated watermarks and K is the number of iterations are used in Arnold Cat Map at the time of watermark embedding.
-
Step 6. Using Keys, K e y 3 and K e y 4 , the DCT coefficients of Generated watermark \({W^{*}_{1}}\) and \({W^{*}_{2}}\) are obtained by (19) and further apply Inverse DCT2 to get the generated watermarks \({W^{*}_{1}}\) and \({W^{*}_{2}}\).
$$ W^{*}_{kD}(i) = \left\{ \begin{array}{ll} W_{kD} & \text{if \(Key_{j}(i) =1 \)}\\ - W_{kD}& \text{if \(Key_{j}(i) = -1 \)} \end{array} \right. , i=1,2,...,N; k=1,2; j=3,4 $$(19)$$ W^{*}_{k}=IDCT2(W^{*}_{kD}), k=1,2 $$(20)where IDCT2 () represents the Inverse DCT2 function.
-
Step 7. Finally, extracted watermark W ∗ is constructed by appending the \({W^{*}_{1}}\) (i.e. MSBs plane values)with \({W^{*}_{2}}\) (i.e. corresponding LSBs plane values ) which makes 8 bits plane.
Output [ Extracted watermark W ∗ ]
4 Experimental results and discussions
The proposed DWT–SVD based scheme was implemented in MATLAB 13 b. The computational platform was a Core i7-3770 processor having clock frequency of 3.40 GHz with 2 GB of RAM. To evaluate the performance of the proposed methodology, cover images and watermark images of size 1024 × 1024 and 128 × 128 were used. The performance of the proposed scheme is examined with various experiments in terms of imperceptibility and robustness against various attacks. Many performance evaluation criteria are suggested in literature to estimate the imperceptibility and the robustness. The most widely used performance evaluation criteria are the Peak Signal-to-Noise Ratio (PSNR) and the Normalized Correlation (NC), which are employed consecutively. The PSNR is utilized to estimate the imperceptibility; a term used to evaluate the similarity between a host image and a watermarked image, and can be defined as follows [41]:
where MSE is Mean Square Error defined as
where f and \({\hat {f}}\) are the two gray scale images of size M × N in which first one is the original cover image and second one is the corresponding watermarked image. A good imperceptibility means that the watermarked image looks nearly identical to the original image, and thus, the host image is barely affected by the embedding process.
The NC is a criterion that measures robustness by evaluating the similarities between the original and extracted watermark. The NC can be estimated as follows [10, 41]:
where μ 1 and μ 2 are the mean value of images w and \({\hat {w}}\) respectively. The correlation coefficient has the value \(NC(w,\hat {w})=1\), if two images are absolutely identical, \(NC(w,\hat {w})=0\) if they are completely uncorrelated, and \(NC(w,\hat {w})= -1\) if they are completely anti-correlated. When the NC value is closer to 1 under applicable attacks, the scheme is robust against those attacks. In general, an NC value is acceptable if it is 0.75 or higher. Figure 3 shows some of the original covers, original watermark, watermarked and extracted watermark (without any attacks). Table 2 shows the PSNR and NCC values of watermarked image relative to the original test images and NC values of original watermark with extracted watermark. As the embedding PSNR and NC values are very high, so it is highly difficult to differentiate between the watermarked and the original image in vision.
The imperceptibility of the proposed scheme has also been compared with Gupta & Raval, 2012 [16] and Lai and Tsai, 2010 [27], shown in Table 3. In this comparison, L e n a, P h o t o, P i r a t e and W o m a n image are taken as host image. The P h o t o image of size 128 × 128 is chosen as the watermark. The PSNR value of proposed scheme is better than [16] and [27].
The robustness of the proposed scheme has been demonstrated by considering a variety of attacks namely Salt & Pepper noise, Speckle noise and Gaussian noise addition, Averaging and Median Filtering, JPEG Compression, Cropping, Resizing, Histogram Equalization, Motion Blur, Gamma Correction, Log Transformation and Sharpen attacks on the watermarked image. The resultant Normalized Correlation Coefficient (NC) values for all extracted watermark of test images are given in Table 4. It demonstrates the enhanced performance of proposed scheme in terms of robustness against different kinds of attacks. The visual results are shown in Figs. 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 and 16 after considering different kinds of attacks on watermarked P h o t o and L e n a images.
The noise addition is most common attack on an image. Digital image is degraded and distorted by noise. Robustness against noise addition attack is estimated by Salt & Pepper noise(100 %),Gaussian noise (γ = 0.1) and Speckle noise (γ = 0.1) as shown in Figs. 4, 5 and 6. Figures (4a & c, 5a &c, 6a &c) show the watermarked of P h o t o and L e n a image after addition of Salt & Pepper, Gaussian and Speckle noise respectively. Figures 4b, d, 5b, d, 6b and d consequently represent the extracted watermark.
Figures 7 and 8 demonstrate robustness against geometric attacks, resizing and cropping. Figures 7a and c show the watermarked of P h o t o and L e n a image after resizing (1024 → 512 → 1024). In Fig. 7b and d, extracted watermarks are shown. Similarly, Fig. 8a and c show the watermarked of P h o t o and L e n a image after cropping (50 %). Cropping attack is a lossy operation. The extracted watermarks are shown in Fig. 8b and d.
Figure 9 demonstrates the robustness the proposed scheme against histogram equalization. Figure 9a and c show the watermarked of P h o t o and L e n a image after histogram equalization. Histogram equalization is a common signal processing operation. In Figs. 9b and d, extracted watermarks are shown. To verify the robustness of our proposed scheme against Image Compression, the watermarked of P h o t o and L e n a image are tested with JPEG compression attack as shown in Fig. 10. Figure 10a and c show the watermarked of P h o t o and L e n a image after JPEG compression (Q F = 30). The extracted watermarks are shown in Fig. 10b and d, respectively.
The robustness of proposed scheme against filtering attack is shown in Figs. 11, 12 and 14. Filtering is a common signal processing operation which is capable to reduce noise and enhance smoothness. Robustness against filtering attack is estimated by motion blur, median and averaging filtering. Figures 11a, c, 12a, c, 13a and c, show the degraded watermarked of P h o t o and L e n a image after applying motion blur, median and averaging filtering, respectively. The corresponding extracted watermarks are depicted in Figs. 11b, d, 12b, d, and 13b, d.
The robustness of proposed scheme against image enhancement operations are shown in Figs. 14, 15 and 16. Figure 14 demonstrates the robustness against gamma correction. Figure 14a and c show the watermarked of P h o t o and L e n a image after gamma correction (γ = 0.6). Figure 14b and d, depicts the extracted watermarks. Figure 15 demonstrates the robustness against log transformation. Figure 15a and c show the watermarked of P h o t o and L e n a image after log transformation. The extracted watermarks are shown in Fig. 15b and d, respectively. Similarly Fig. 16 demonstrates the robustness against sharpen attack. Figure 16a and c show the degraded watermarked of P h o t o and L e n a image after sharpen attack. The extracted watermarks are shown in Fig. 16b and d, respectively.
The false positive detection problem normally occurs in most of the SVD-based image watermarking schemes. This occurs due to only singular values of watermark (or singular values of host and watermark image) are embedded into the host image. During extraction it is needed to provide some information which may give a fake watermark with an acceptable quality. The proposed scheme succeeds in tackling the false positive detection problem by embedding the whole original watermark into host image. Moreover the watermark extraction is a blind procedure. Figure 17 demonstrates this big issue. The valid four keys and parameters (p,q,K) of Arnold Cat Map enable the extraction of the correct watermark image shown in Fig. 17c, whereas, providing fake keys and parameters of Arnold Cat Map enable the extraction of an unrecognized image, shown in Fig. 17d.
Watermark, scrambled by Arnold Cat Map is unreadable. Only the legal receiver can reconstruct the watermark using four generated keys and three parameters (p,q,K) used in Arnold Cat Map. Even if the attacker identified the generated keys, it is difficult to reconstruct the watermark as it depends on the three parameters (p,q,K) of Arnold Cat Map.
The time complexity of the proposed watermarking scheme in a DWT-SVD domain has been computed by following equation
where T 1(M, N) represents the complexity of DWT of size M × N, T 2(4,4) is the complexity of SVD of size 4 × 4, T 3(4,4) is the complexity of block-wise watermark embedding, T 4(4,4) is the complexity of Inverse SVD of a block, T 5(M, N) is the complexity of inverse DWT of size M × N and T 6(X, Y) is the time complexity of watermark generation. Suppose the size of Cover image is M × N and the size of watermark is X × Y, where X < M and Y < N. we obtain the following relations.
-
Time Complexity of DWT(M,N) = T 1(M, N) = O(M N)
-
Time Complexity of SVD(4, 4) = T 2(4, 4) = O(43) = C o n s t a n t = O(c)
-
Time Complexity of Watermark Embedding(4, 4) = T 3(4, 4) = C o n s t a n t = O(c)
-
Time Complexity of Inverse SVD(4,4) = T 4(4,4) = O(43) = C o n s t a n t = O(c)
-
Time Complexity of Inverse-DWT(M,N) = T 5(M, N) = O(M N)
-
Time Complexity of watermark generation = T 6(X, Y) = O(X Y)
After putting these values in (22), in general complexity of proposed watermarking scheme is
So the overall complexity of the proposed watermarking technique is approximated O(M N). Further if we consider the cover image of equal dimension(i.e. M = N) then by using (25), the overall complexity of the proposed scheme is O(N 2).
The significant performance of proposed watermarking scheme is compared with the comparable existing schemes proposed by Bhatnagar et al., 2012 [8], Ganic & Eskicioglu, 2005 [15], Gupta &Raval, 2012 [16], Lai & Tsai, 2010 [27] and Liu & Tan, 2002 [35]. Except Gupta & Raval [16], all other existing schemes [8, 15, 27] and [35] suffer from false positive detection problem. The comparative analysis is concluded using L e n a image as the cover and camera image as watermark image.
The existing and proposed schemes extract watermarks for Gaussian noise, Salt & Pepper noise, Speckle noise, Average Filtering, Median Filtering, Cropping, Histogram Equalization, Resizing, Sharpening, JPEG Compression, Motion Blur, Gamma Correction and Log Transformation attacks. Table 5 shows the result of detailed comparison. It is easily seen through Table 5, in most of the attacks performance of proposed scheme is better than the existing schemes. In the case of Gamma Correction, Log Transformation and Histogram Equalization, proposed scheme and all existing schemes except scheme proposed by Liu & Tan in [35] perform nearly similar. The performance of watermarking scheme proposed by Liu & Tan [35] gives very poor results for these attacks. In the case of cropping attack, watermarking scheme proposed by Bhatnagar et al. [8], gives poor result. In the case of rotation attacks, all the schemes perform almost equally except schemes proposed by Liu & Tan, 2002 [35] and Ganic & Eskicioglu [15]. In the case of JPEG and Resizing attacks, all the schemes perform almost equally except scheme proposed by Gupta & Raval [16]. The main reasons behind the better performance of the proposed watermarking scheme are:
-
Reason 1: In the proposed scheme, the whole watermark is embedded instead of singular values of watermark. So proposed scheme is free from false positive detection problem.
-
Reason 2: In the proposed scheme, DCT coefficients of watermark image are embedded instead of direct watermark value.
-
Reason 3: In the proposed scheme, it is not required to set scaling factor. Most of the existing schemes have drawback related to the computation time for finding scaling factors.
-
Reason 4: The proposed scheme is a blind watermarking scheme. So at the time of watermark extraction, there is no requirement for original watermark and cover image.
-
Reason 5: In the proposed scheme, the watermark is embedded in the middle singular value (i.e. second diagonal value). Since, the largest singular value is more significant for quality of the image, while the smallest singular values are more sensitive to the noise. Hence, the proposed scheme is more robust and imperceptible.
5 Conclusions
In this paper, a new Discrete Wavelet Transform(DWT) and Singular Value Decomposition (SVD) based robust and blind watermarking scheme has been presented for copyright protection. The watermark is split in MSBs and LSBs planes. DCT coefficients of MSBs and LSBs planes of the watermark are embedded in the singular values of 4 × 4 block of LH and HL sub-bands of the cover image. The proposed scheme is free from false positive detection problem which normally occurs in the SVD-based watermarking schemes. Another major advantage of proposed scheme is that it is a blind scheme. So, there is no requirement of original watermark and cover image for watermark extraction. There is also no requirement to choose the scaling factor. Therefore, the proposed scheme is free from drawback related to the computation time for finding scaling factors. In consequence of this it has smaller time complexity i.e. O(N 2). The use of Arnold Cat Map on watermark successfully deals with the unauthorized reading problem. Further, the robustness of the proposed scheme is studied by a variety of attacks along with security and comparative analysis. The proposed watermarking scheme can be extended for video and audio multimedia processing.
References
Akansu AN, Serdijn WA, Selesnick IW (2010) Emerging applications of wavelets: a review. Phys Commun 3(1):1–18
Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive de in dwt–svd transform domain. Signal Process 94:545–556
Ali M, Ahn CW (2015) Comments on ?optimized gray-scale image watermarking using dwt-svd and firefly algorithm?. Expert Syst Appl 42(5):2392–2394
Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using svd and differential evolution in dct domain. Optik-Int J Light Electron Opt 125(1):428–434
Aslantas V (2009) An optimal robust digital image watermarking based on svd using differential evolution algorithm. Optics Commun 282(5):769–777
Barni M, Bartolini F, Cappellini V, Piva A (1998) A dct-domain system for robust image watermarking. Signal Process 66(3):357–372
Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on dwt-svd. Comput Standards Interf 31(5):1002–1013
Bhatnagar G, Wu QJ, Raman B (2012) A new robust adjustable logo watermarking scheme. Comput Secur 31(1):40–58
Bhatnagar G, Wu QJ, Raman B (2013) A new aspect in robust digital watermarking. Multimed Tools Appl 66(2):179–200
Bhatnagar G, Wu QMJ, Atrey PK (2013) Secure randomized image watermarking based on singular value decomposition. ACM Trans Multimed Comput Commun Appl 10(1):4:1–4:21. doi:10.1145/2542205.2542207
Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Processg Mag 30(2):87–96
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Cox IJ, Miller ML, Bloom JA, Honsinger C (2002) Digital watermarking, vol 53. Springer
Fowler JE (2005) The redundant discrete wavelet transform and additive noise. IEEE Signal Process Lett 12(9):629–632
Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 14(4):043,004–043, 004
Gupta AK, Raval MS (2012) A robust and secure watermarking scheme based on singular values replacement. Sadhana 37(4):425–440
Hamghalam M, Mirzakuchaki S, Akhaee MA (2013) Geometric modeling of the wavelet coefficients for image watermarking. In: 2013 8th Iranian conference on machine vision and image processing (MVIP). IEEE, pp 27–32
Heil CE, Walnut DF (1989) Continuous and discrete wavelet transforms. SIAM Rev 31(4):628–666
Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72(3):3085–3103
Horng SJ, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105
Huang F, Guan ZH (2004) A hybrid svd-dct watermarking method based on lpsnr. Pattern Recog Lett 25(15):1769–1775
Islam MS, Chong U (2015) Performance of a hybrid dct svd visually imperceptible digital watermarking against signal processing attacks. In: Computer science and its applications. Springer, pp 7– 14
Jain C, Arora S, Panigrahi PK (2008) A reliable svd based watermarking schem. arXiv:0808.0309
Keyvanpour M, Bayat FM (2013) Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the dwt domain. Math Comput Modell 58(1):56–67
Lagzian S, Soryani M, Fathy M (2011) Robust watermarking scheme based on rdwt-svd: Embedding data in all subbands. In: 2011 International symposium on artificial intelligence and signal processing (AISP). IEEE, pp 48–52
Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digit Signal Process 21(4):522–527
Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrument Measur 59(11):3060–3063
Li Q, Wang Z (2009) Reduced-reference image quality assessment using divisive normalization-based image representation. IEEE J Selected Topics Signal Process 3(2):202–211
Lin ET, Delp EJ (1999) A review of fragile image watermarks. In: Proceedings of the multimedia and security workshop (ACM Multimedia’99) multimedia contents. Citeseer, pp 25–29
Lin SD, Shie Sc, Guo JY (2010) Improving the robustness of dct-based image watermarking against jpeg compression. Comput Standards Interfaces 32(1):54–60
Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Terano T (2009) Image copyright protection with forward error correction. Expert Syst Appl 36(9):11,888–11,894
Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746–757
Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869–9878
Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36(9):11,509–11,516
Liu R, Tan T (2002) An svd-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121–128
Makbol NM, Khoo BE (2013) Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 67(2):102– 112
Megalingam RK, Nair MM, Srikumar R, Balasubramanian VK, Sarma VSV (2010) Performance comparison of novel, robust spatial domain digital image watermarking with the conventional frequency domain watermarking techniques. In: International conference on signal acquisition and processing, 2010. ICSAP’10. IEEE, pp 349–353
Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using dwt–svd and firefly algorithm. Expert Syst Appl 41(17):7858–7867
Mohammad AA, Alhaj A, Shaltaf S (2008) An improved svd-based watermarking scheme for protecting rightful ownership. Signal Process 88(9):2158–2180
Ouhsain M, Hamza AB (2009) Image watermarking scheme using nonnegative matrix factorization and wavelet transform. Expert Syst Appl 36(2):2123–2129
Pandey P, Kumar S, Singh SK (2014) Rightful ownership through image adaptive dwt-svd watermarking algorithm and perceptual tweaking. Multimed Tools Appl 72(1):723–748
Pandey P, Kumar S, Singh SK (2014) A robust logo watermarking technique in divisive normalization transform domain. Multimed Tools Appl 72(3):2653–2677
Peng F, Guo RS, Li CT, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2d cad engineering graphics based on log-polar transformation. Comput-Aided Des 42(12):1207– 1216
Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18(4):33–46
Pun CM (2006) A novel dft-based digital watermarking system for images. In: 2006 8th International conference on signal processing, vol 2. IEEE
Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200
Rastegar S, Namazi F, Yaghmaie K, Aliabadian A (2011) Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU-Int J Electron Commun 65(7):658–663
Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE MultiMed 19(3):62–73
Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved svd-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689
Shieh JM, Lou DC, Chang MC (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Comput Standards Interf 28(4):428–440
Shivani S, Patel AK, Kamble S, Agarwal S (2011) An effective pixel-wise fragile watermarking scheme based on ara bits. In: Proceedings of the 2011 international conference on communication, computing & security. ACM, pp 221–226
Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: Intelligent interactive technologies and multimedia. Springer, pp 111–122
Singh D, Singh SK (2015) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl:1–25
Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent pp. doi:10.1016/j.jvcir.2016.04.023. http://www.sciencedirect.com/science/article/pii/S1047320316300566
Singh P, Chadha R (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol (IJEIT) 2(9)
Solachidis V, Pitas I (2004) Optimal detector for multiplicative watermarks embedded in the dft domain of non-white signals. EURASIP J Appl Signal Process 2004:2522–2532
Song C, Sudirman S, Merabti M (2009) Recent advances and classification of watermarking techniques in digital images. In: Proceedings of post graduate network symposium
Song C, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent 23(3):549–568
Tareef A, Al-Ani A (2015) A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Syst Appl 42(4):2224–2233
Wang Y, Doherty JF, Van Dyck RE (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11(2):77–88
Wu L, Zhang J, Deng W, He D (2009) Arnold transformation algorithm and anti-arnold transformation algorithm. In: 2009 1st International conference on information science and engineering (ICISE). IEEE, pp 1164–1167
Yavuz E, Telatar Z (2013) Comments on a digital watermarking scheme based on singular value decomposition and tiny genetic algorithm?. Digit Signal Process 23(4):1335–1336
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Singh, D., Singh, S.K. DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76, 13001–13024 (2017). https://doi.org/10.1007/s11042-016-3706-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3706-6