Abstract
Advancement and expansion of the internet, along with regular software upgrades, have generated many benefits in communication patterns. This rapid growth has also had a negative impact on the security of communicated content, such as images, audio/video messages, and especially on copyright protection for important images. In this paper, a novel watermarking technique is proposed to address the challenge of copyright protection more effectively. Initially, a chaotic dynamical system presented by coupled differential equations is utilized to generate three random, as well as chaotic, sequences of numbers. These sequences are then processed on each channel (red, green, and blue) of a colored image, respectively. Subsequently, the watermark (logo image) is embedded by converting its most significant bits (MSBs) to least significant bits (LSBs). The watermark in the processed image is nearly invisible due to the presence of third-order nonlinearity in the chaotic system and the complexity of the watermarking technique. This technique has demonstrated remarkable resistance to various attacks, such as noise attacks, compression attacks, and more specifically cropping attacks, confirming its applicability in copyright protection for digital images.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Today, the contemporary world is a prime example of esteemed development in every sector, yet it has transformed the entire mechanism of communication on a large scale. Rapid and hassle-free communication between two parties is now a matter of mere moments. The emphasis on growth is not only devoted to the invention of computing devices and their software, but also to the rapid evolution of communication methods. The expansion of digital data in the form of e-libraries, digital repositories, video and audio messages, etc., has been observed in recent times. The utmost concern associated with this advancement is its security and copyright protection. To address this issue, researchers have utilized cryptosystems for the secure transmission of digital content, particularly encryption and watermarking. The originality of images and their genuine author/creator is securely communicated through the use of watermarking techniques.
The two prominent watermarking techniques used in copyright protection are spatial domain [1] and frequency domain [2]. In spatial domain, the main idea is to substitutes the pixel or set of pixels of host image with the pixels of watermark image directly, which in return produces the watermarked image having great proficiency towards attacks. Whereas in the frequency domain, firstly host image is converted into frequency domain, then watermarking is done on the coefficients’ value of the host image to tackle mischievous attacks. The objective in each case is same i.e. to provide copyright protection, integrity, broadcast monitoring, authentication and sturdiness towards mischievous attacks [3].
Literature reveals many techniques of watermarking in both of the aforementioned types [1, 4,5,6,7]. Discrete fractional Fourier transform (DFRFT) [8], discrete Fourier transform (DFT) [9], discrete wavelet transform (DWT) [10] and discrete cosine transform (DCT) have been widely used in watermarking [11]. In [12] authors suggest a novel technique of watermarking which uses chaotic Arnold transform and LU decomposition to strengthen the invisibility of watermark. Likewise in [13], the authors proposes two preprocessing steps before embedding of watermark. First is to change the size of watermark and second is to scramble it. Whereas, the security goals for the proposed technique are achieved by a simple, secure and direct approach. In comparison to [13], the inclusion of substitution box (S-box) in watermarking has enhanced the security level and utilization of chaos based differential equations added the strength in the randomness of the substitution box. These distinctive features contribute in uplifting the imperceptibility level of the technique [7].
Similarly, in [10], authors propose a hybrid watermarking technique while remaining in the frequency domain by merging DCT and DWT for embedding and extraction of the watermark. The combination of these two methods yields more benefits and creates one hybrid method. In [11], a different but simpler and robust approach was proposed by the authors, which focuses on the size of the watermarked image and the original image in the embedding process using the DCT approach only. Similarly, some other interesting watermarking techniques have been proposed in the recent past [14,15,16,17,18].
Literature reveals the utilization of many simple chaotic systems in image encryption and watermarking techniques [19,20,21,22]. However, complex chaotic dynamical systems have not been widely used in such areas. Moreover, chaotic systems with higher-order nonlinearities and dimensions are rarely seen in this field. Since such nonlinear multi-dimensional chaotic systems exhibit complex, unpredictable, and random trajectories, this gap motivated us to use a complex chaotic dynamical system for copyright protection. Keeping this aspect in mind, a third-order nonlinear chaotic dynamical system is used in this article for the design of the watermarking technique.
In this article, we will utilize DCT to propose a robust and secure technique of watermarking. It offers a high degree of freedom, due to the multi-resolution attribute. Furthermore, this transformation is not block-based. DCT can also be amalgamated with other transforms to utilize their benefits as well like in [2, 10] and [14]. The theme behind the application of differential equations (DE) in watermarking schemes is to introduce continuous chaotic systems in such schemes. It is a well-established and fostered division of mathematics which is used to represent dynamical systems in terms of mathematical equations. Chaos generating DE have strong and complex random behavior extremely suitable for the secure design of cryptosystem. Recent developments in multimedia applications have revealed productive outcomes from such systems. But there are very few applications of such systems in image watermarking techniques.
The remaining article is organized as follows, Section 2 gives the detailed description of the coupled chaotic system of DE and the watermarking technique. Section 3 presents the complete statistical analyses for the host image and watermarked images. Several attacks of image processing are applied to test the robustness of the suggested technique in Section 4. The whole article is concluded in Section 5.
2 System of coupled differential equations and watermarking technique
A physical system depending upon two or more variables is modelled in terms of ordinary differential equations (ODEs) to exhibit its bifurcation pattern completely in near future. A coupled differential equation is a system of equations where the dependent variables in each equation depend on more than one independent variable. This concept was used to measure randomness appearing in non-equilibrium frictional medium from modulation instability. It involves three variables and hence generates a system of chaotic coupled differential equations involving three ODEs. This system was initially modelled by Rabinovich-Fabricant (RF) [23, 24], whose formation in mathematical form is given below.
The system (1) is chaotic and highly sensitive towards initial input and parameters. Slight variation in the system generates complex, chaotic and completely different dynamical behavior. Fixing parameters and initial conditions at one stage can result in generation of pseudorandom sequences of excellent cryptographic properties. In Fig. (1), different trajectories are plotted for slightly varied parameters and initial conditions.
2.1 Watermarking technique
The purpose of the watermarking technique is to acquire copyright protection of valuable digital content. Both types of visible and invisible watermarks are usually inserted in the plaintext images. The theme of inserting an invisible watermark is used to protect the ownership of content circulated using insecure channels. The procedure of embedding and extraction of watermark in frequency domain using DE is explained hereafter.
2.1.1 Embedding procedure
The following steps describes the embedding procedure of the watermark logo into the plaintext image.
-
A plaintext image having size \(M\times N\) is selected and segmented into three layers i.e. blue, green and red for the utilization of embedding procedure of watermark logo.
-
The solutions of RF system (given in Eq. 1) are then used to generate sequences \(X, Y\;and\;Z\). The red, green and blue layers are being permuted by sequences \(X, Y and\;Z\) respectively by making use of Eq. 2.
$$\left\{\begin{array}{ll}S^{R,G,B}\left(i,j\right)=I^{R,G,B}\left(i-x_i,j-x_j\right)&if\;i-x_i\geq1;j-x_j\geq1\\S^{R,G,B}\left(i,j\right)=I^{R,G,B}\left(M+i-x_i,N+j-x_j\right)&if\;i-x_i<1;j-x_j<1\\S^{R,G,B}\left(i,j\right)=I^{R,G,B}\left(i+x_i,j+x_j\right)&if\;i+x_i\leq M;j+x_J\leq N\\S^{R,G,B}(i,j)=I^{R,G,B}\left(i+x_i-M,j+x_j-N\right)&if\;i+x_i\geq M;i+x_i\geq N\end{array}\right.$$(2)
-
A watermark logo image of dimension \((K\times K)\) is taken into account and obtained \((2 K\times 2 K)\) LSBs through a shift procedure by altering its MSBs to LSBs.
-
Next, a block of dimension \((2 K\times 2 K)\) is selected from the image in 1st step and replaced its LSBs by the LSBs obtained in previous step.
-
Finally, the processed image from the previous step undergoes inverse permutations utilizing the corresponding inverse equations to obtain the watermarked image. The complete watermarking technique is elucidated in Fig. 2.
2.1.2 Extraction procedure
To maintain the productivity of the technique and ensure copyright protection, the extraction procedure is outlined as follows:
-
The permutations to each layer using the generated sequences X, Y, and Z is applied after separating the watermarked image into three channels.
-
A block of dimension \((2 K\times 2 K)\) is selected from permuted layer and splited into the MSBs and LSBs.
-
\((K\times K)\) MSBs and LSBs are being extracted from the previous step.
-
As a final point, inverse permutations are applied on the \((K\times K)\) LSBs to extract the watermark logo from the watermarked image.
3 Statistical analysis and simulation results
This section of the paper presents comprehensive details of essential analyses aimed at validating the efficacy of the proposed watermarking technique. These analyses encompass contrast, correlation, homogeneity, energy, peak signal-to-noise ratio, and mean square error. The evaluation of these metrics is conducted by examining the Gray Level Co-occurrence Matrix (GLCM) of both the watermarked and host images. It is noteworthy that the size of the watermarked and original images remains consistent. The strength of the watermarking technique is established through a thorough assessment of robustness, invisibility, security, and capacity.
3.1 Homogeneity
GLCM is used to measure the homogeneity of an image. The diagonal closeness distribution is measured in homogeneity. If \(p(i,j)\) represents pixel position at ith row and jth column then formula is
3.2 Contrast
In response to intensity modifications the sensitivity of the image textures is calculated in doing the analysis of contrast. It is mathematically defined as
3.3 Energy
Here the sum of squares of entire values of gray pixels of each row and column is calculated, mathematically,
3.4 Entropy
The amount of randomness in a digital image is measured in entropy. It is used to quantify the uncertainty in digital images. Mathematically it is given as
The entropy results in Table 6 for the host and the watermarked images suggest that the two images are quite the same also depicted in the Fig. 6.
3.5 Correlation
Pixels of a plaintext image are highly correlated to its neighboring pixels. This pattern in a watermarked image of pixels should also remain approximately same if the watermarking technique is fine enough. The similarity of original and watermarked images is evaluated by this analysis. Mathematical representation is given as follows.
Where \(\sigma\) and \(\mu\) are standard deviation and mean respectively.
The results of these analyses for both the host and watermarked images exhibit a high degree of similarity, as summarized in Table 6. Moreover, the comparison indicates that the watermarked image with proposed technique is more similar to the original image as compared to the [7] and [26]. Achieving such congruence in outcomes is the ultimate objective for a watermarking technique (Table 1).
3.6 Mean squared Error
How dissimilar are the two images i.e. watermarked and the original image, are examined by the Mean Square Error (MSE). Its mathematical expression is given in Eq. 8 and the values are being tabulated in Tables 2, 3, 4, 5, and 6.
3.7 Peak signal to noise ratio
The Peak Signal to Noise Ratio (PSNR) is defined by the given expression.
In the above equation, the denominator represents the dissimilarity between the images, specifically the MSE, while the numerator corresponds to the signal strength. The evaluation of invisibility is determined using metrics such as PSNR and Structural Similarity Index (SSIM), which measure the similarity between the watermarked and the original image [17, 25].
3.8 Complexity and differential analysis
One very important factor in analyzing the different algorithms of information security is the complexity analyses. The speed of embedding and extraction of watermarks in the era of speedy communication matters a lot. The speed of extraction and embedding for the proposed technique is very close to the other similar techniques as one given in Table 3, whereas the level of security attained by this technique is much superior than [26]. The entire procedure is executed using MATLAB (R2013a) on a laptop running Windows 8, equipped with an Intel(R) Core(TM) i5-4300U CPU @ 1.90 GHz (2.50 GHz) and 4 GB RAM.
The unified average changing intensity (UACI) ensures the efficiency of cryptosystem to stand against the differential attacks with an optimal value about 33.333%. The resistance against the plaintext attack improves as number of pixels change rate (NPCR) approaches 100%. These expressions are expressed as follows.
where \({C}_{1}\)and \({C}_{2}\) are the watermarked images before and after one pixel of the host image is altered and \(D\) is their difference. If \({C}_{1}\ne {C}_{2}\), \(D=1\) else \(D=0\). The results of these analyses are calculated in Tables 1, 2, 4 and 5. Figures 3, 4, 5, 6, 7, 8 and 9 showcase the respected images, illustrating the effectiveness of the proposed watermarking technique.
4 Robustness test
The resemblance between the extracted and the inserted watermark is the mathematical calculation of two watermarks [27]. Robustness is achieved when these two watermarks exhibit high correlation, which translates to a similarity outcome on the higher side. If the kth term of the extracted and original watermark is \({e}_{k}\) and \({o}_{k}\), respectively then the similarity is mathematically given as follows:
The optimal value of similarity index for strong watermarking should be approximately 100. It turns out to be 99.92 for the proposed technique that is almost the optimal value. The similarity values for the Lena and Pepper images are tabulated and compared with those in [26] in Table 7, demonstrating the validity of the proposed technique. Noise, compression and cropping attacks are deliberated in the upcoming subsections.
4.1 Noise attack
For the resistance against several noise attacks, 1% Speckle noise and 1% salt noise have been added to the images. Table 7 shows the great resistance against noise attack.
4.2 Compression attack
For the compression attack of the proposed watermarking technique, the Joint Photographic Experts Group (JPEG) is examined and presented in Table 7.
4.3 Cropping attack
Either the extracted image is deliberately distorted or less material than the host image is provided in this attack. Tables 1, 2, and 7 comprises the results of nearly all data processing attacks.
5 Conclusion
Digital watermarking is indeed an appropriate choice for the fortification of copyrights of multimedia data. In this article an innovative watermarking technique is obtained which operates on the solution space of ordinary coupled differential equations. Initially, from system of ODE three random sequences are being generated contrary to the usual sequences obtained from Galois field/ring. The encouraging outcomes of these sequences suggested their applications in multimedia security. Secondly, a watermarking technique based on DE is devised for the copyright protection of the data. The watermark becomes nearly imperceptible due to the permutation process and frequency domain make it more secure by its specific features. Furthermore, the results of the robustness test and statistical analyses substantiate our assertion that this technique exhibits semi-fragility in the context of copyright protection.
Data availability
The datasets generated during the current study are not publicly available due to privacy but are available from the corresponding author on reasonable request.
References
Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans Multimed 6(1):1–15
Lin SD, Chen CF (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consumer Electron 46:415–421
Caronni G (1995) Assuring ownership rights for digital images. Proceedings of Reliable IT Systems, viewveg Publishing Company, Germany, pp 251–263
Kang Y, Huang X, Shi J, Lin YQ (2003) A DWT DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol 13(8):776–786
Batool SI, Shah T (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25:2037–2045. https://doi.org/10.1007/s00521-014-1691-0
Giovanardi A, Mazzini G Frequency domain chaotic watermarking. The 2001 IEEE International Symposium on Circuits and Systems (ISCAS), 2, pp 521–524
Jamal SS, Khan MU, Shah T (2016) A Watermarking technique with chaotic fractional S-Box Transformation. Wirel Personal Communictions 90(4). https://doi.org/10.1007/s11277-016-3436-0
Chiu W, Tai Y, Hsue W (2017) Image watermarking based on discrete fractional fourier transforms with multiple parameters. 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp 2687–2693. https://doi.org/10.1109/FSKD.2017.8393202
Chen B, Coatrieux G, Chen G, Sun X, Coatrieux JL, Shu H (2014) Full 4-D quaternion discrete fourier transform based watermarking for color images. Digit Signal Proc 28(1):106–119. https://doi.org/10.1016/j.dsp.2014.02.010
Barnouti NH, Sabri ZS, Hameed KL (2018) Digital watermarking based on DWT (Discrete Wavelet transform) and DCT (Discrete Cosine Transform). Int J Eng Technol 7(4):4825–4829. https://doi.org/10.14419/ijet.v7i4.25085
Li X, Wang X, Chen A, Xiao L (2017) A Simplified and Robust DCT-based Watermarking Algorithm. 2nd International. Conference on Multimedia and Image Processing. (ICMIP), 167–171. https://doi.org/10.1109/ICMIP.2017.18
Su Q, Wang G, Zhang X, Lv G, Chen B (2018) A new algorithm of blind color image watermarking based on LU decomposition. Multidimensional Syst Signal Process 29:1055–1074. https://doi.org/10.1007/s11045-017-0487-7
Zhang X, Li Q, Wei Y (2012) An improved robust and adaptive watermarking algorithm based on DCT. J Appl Res Technol 10(3):405–415
Hernández JR, Amado M, Pérez-González F (2000) DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans Image Process 9(1):55–68. https://doi.org/10.1109/83.817598
Khan M, Shah T (2015) A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput Appl 26:845–855. https://doi.org/10.1007/s00521-014-1747-1
Kaur RK, Sidhu S (2016) Robust digital image watermarking for copyright protection with SVD-DWT-DCT and Kalman filtering. Int J Emerg Technol Eng Res (IJETER) 4(1):59–63
Wang D-H, Li D-M, Jun Y, Chen X F (2007) An Improved Chirp Typed Blind Watermarking Algorithm Based on Wavelet and Fractional Fourier Transform, 4th International Conference on Image and Graphics, Chengdu, China, 291–296. https://doi.org/10.1109/ICIG.2007.38
Vasudev R (2016) A review on digital image watermarking and its techniques. J Image Graphics 4(2):150–153. https://doi.org/10.18178/joig.4.2
Javeed A, Shah T, Ullah A (2020) Construction of non-linear component of block cipher by means of chaotic dynamical system and symmetric group. Wirel Personal Commun 112:467–480. https://doi.org/10.1007/s11277-020-07052-4
Attaullah A, Javeed A, Shah T (2019) Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed Tools Appl 78(22):31467–31484. https://doi.org/10.1007/s11042-019-07981-8
Razaq A, Yousaf A, Shuaib U, Siddiqui N, Ullah A, Waheed A (2017) A novel construction of substitution box involving coset diagram and a bijective map. Secur Commun Netw. https://doi.org/10.1155/2017/5101934
Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91:359–370. https://doi.org/10.1007/s11071-017-3874-6
Rabinovich MI, Fabrikant AL (1979) Stochastic self-mudulation of waves in non-equilibrium media. Inst Appl Phys Acad Sci USSR 77:617–629
Danca MF, Kuznetsov N, Chen G (2017) Unusual dynamics and hidden attrackters of the Rabinovich-Fabrikant system. Nonlinear Dyn 88:791–805
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image qualty assessment: from error visibilty to structural similarity. IEEE Trans Image Process 13(4):600–612. https://doi.org/10.1109/TIP.2003.819861
Jamal SS, Shah T, Farwa S, Khan MU (2019) A new technique of frequency domain watermarking based on a local ring. Wireless Netw 25(4):1491–1503. https://doi.org/10.1007/s11276-017-1606-y
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proc 6(12):1673–1687. https://doi.org/10.1109/83.650120
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interests regarding the publication of this paper.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Attaullah, Javeed, A., Shah, D. et al. Watermarking technique for copyright protection of digital images using coupled differential equations. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19337-y
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-19337-y