Keywords

1 Introduction

With the advancement of technology in today’s world, new ideas are coming up every day—both constructive and destructive. These days, digital information can be replicated and reproduced with an ease. To prevent this treachery, few methods are implemented to retain the originality and digital watermarking is one of them [1]. It is a proficient mechanism for copyright protection of digitalized information. In this process data is hidden within an object by some unique ways so that others can’t reach to the original data and later on the data can be extracted by the owner itself [1, 2].

The proposal of this paper is regarding digital image watermarking technique based on Itti-Koch saliency map of an image in which the watermark will be implanted in the less prominent areas of that image. Saliency map signifies visual saliency of a consequent visual sense topographically. It facilitates in evaluating the imperceptibility of an image along with its data embedding capacity. In this proposed technique data hiding is the maximum at those positions where perceptibility is low [3, 4]. By adaptive least significant bit (LSB) substitution technique, the watermark is implanted within the original image [5]. As the bits of watermark are implanted at least significant locations of image, imperceptibility is superior. The data is hidden at numerous places and more than one time to improve the robustness and data hiding capacity [2].

This preliminary introduction about the proposed work is followed by some other sections like description of steps of watermark embedding and the extraction, followed by experimental results and discussions, finally conclusion and reference.

2 Watermark Embedding and Extraction

The process of digital image watermarking proposed here aims to attain the trade-off between robustness and imperceptibility of the watermarked image i.e. the original image embedded with the watermark, through increasing the data hiding capacity by embedding multiple copies of the logo in an effective way [5].

Figure 1 shows the process of encrypting a watermark in an image:

Fig. 1
figure 1

Block diagram of watermark encoder

At first the Saliency Map of the original image is produced. Here Itti-Koch algorithm has been followed to produce the map. Hiding capacity estimation is done based on the previous map and main regions where the watermarks can be hidden are approximated. Based on the hiding capacity of the image, the watermark is embedded into it by adaptive LSB replacement process. More bits of the original image are replaced by the bits of the watermark where the original image is more inconspicuous. Thus the Watermarked image is obtained.

Figure 2 provides a scheme of the process of decoding a watermark form a watermarked image.

Fig. 2
figure 2

Block diagram of watermark decoder

Saliency map of the original image is produced and hiding capacity estimation of the original image is done as it was done in the encoding process. On the basis of original image & hiding capacity in the original image, LSB is extracted from the pixels of the watermarked image. Adaptive symmetry of the bits of the same order, extracted from different regions of the watermarked image derived from saliency, is computed to retrieve the binary watermark.

2.1 Watermark Embedding and Extraction

The architecture for Itti-Koch model [6] is presented in Fig. 3.

Fig. 3
figure 3

Architecture of Itti and Koch model

The model unites multi-scale image features into a solo topographical saliency map in a bottom-up approach. Visual pre-processing (presented within the marked enclosure), for every pixel in the pyramid, three color channels R, G, B are generated. Four Gaussian pyramids R(\( \sigma \)), G(\( \sigma \)), B(\( \sigma \)), I(\( \sigma \)) are created from these color channels, where I = \( \frac{{{\text{r}} + {\text{g}} + {\text{b}}}}{3} \), r, g and b are the colors. The projected approach utilizes grayscale images, to obtain the saliency map. Therefore all the three color channels are assigned as gray channels.

In mammals the sensitivity of intensity and contrast is detected by the neurons that are sensitive either to dark centers on bright surroundings or vice versa, is computed in a set of six maps and the center-surround is implemented here as the difference between center and surround scales.

Orientation feature maps encode local orientation contrast between the centers and surround scales. The feature maps are combined into three conspicuity maps, \( {\bar{\text{I}}} \) for Intensity, \( {\bar{\text{C}}} \) for Color, \( {\bar{\text{O}}} \) for Orientation. This three conspicuity maps are normalized and summed to find out the ultimate output \( S \), the saliency map.

$$\mathcal{S} \,=\, \frac{1}{3}\left( {N\left( {\overline{I} } \right) \,+\, N\left( {\overline{C} } \right) \,+\, N\left( {\overline{O} } \right)} \right)$$
(1)

2.2 Hiding Capacity Estimation

From the produced saliency map, a hiding capacity estimation map is prepared by using high embedding potency in less perceptible saliency areas and a low embedding potency in areas of more perceptible saliency areas, to acquire enhanced watermark invisibility and to improve the hiding capacity of the embedded watermark.

$$\mathcal{S}_{{{temp}_{{m}} }} \,= \,{min} ({\mathcal{S}}_{{m}} )$$
(2)
$$ {\text{where,}}\;m\, \le \,\mathcal{S}_{m} \,<\, {\left( {m \,+\, 1} \right) \,\times\, 0.10} ;\,{\text{for}}\;m \,=\, 0 $$
(3)
$$ {\text{and}}\quad {\mathcal{S}}_{{temp_{m} }} \,=\, {max}\left( {\mathcal{S}_{m} } \right) $$
(4)
$$ {\text{where}},\;(m \times 0.10)\, \le\, \mathcal{S}_{m} \,<\, (m \times 0.25);\;{\text{for}}\,m \,=\, 1, $$
(5)
$$ ((m \,-\, 1) \,\times\, 0.25) \,\le\, \mathcal{S}_{m} \,< \,(m \,\times\, 0.25) ;\;{\text{for 2}} \,\le\, m \,\le\, 3 , $$
(6)
$$ ((m \,-\, 1) \,\times\, 0.25) \,\le\, \mathcal{S}_{m} \,\le\, (m \,\times\, 0.25) ;\;{\text{for }}m\,{ = }\, 4 $$
(7)

where \( {\mathcal{S}}_{m} \) is the Saliency map of original gray-scale image \( I_{{o_{m} }} \).

2.3 Encoder and Decoder

Let the original gray-scale image be \( I_{{o_{m} }} \) of size \( {\text{C}} \times {\text{D}} \) and \( \mathcal{W}_{b} \) be the binary watermark with size of \( {\text{P}} \times {\text{Q}} \) and illustrated as:

$$ I_{{o_{m} }} \,=\, \left\{ {{\text{X}}\left( {{\text{a}},{\text{b}}} \right)} \right\};0 \,\le \,{\text{a < C}}, \, 0 \,\le\, {\text{b \,<\, D}},{\text{ X}}\left( {{\text{a}},{\text{b}}} \right) \in \{ 0,1, \ldots ,255\} $$
(8)
$$ \mathcal{W}_{b} \,= \,\{ {\text{Y}}(i,j)\} ;\;0 \,\le \,i \,< \,{\text{P}},0\, \le \,j \,< \,{\text{Q, Y}}(i, \, j )\in {\{ 0,1\} } $$
(9)

\( \mathcal{D}_{b} \) is the function for Decimal to Binary conversion and \( \mathcal{B}_{d} \) is the function of converting Binary to Decimal.

The adaptive LSB watermarking is defined as functions \( (\mathcal{F}_{enc} ,\mathcal{F}_{dec}) \).

$$ \mathcal{D}_{b} \{ I_{om} \} \,=\, \mathcal{B}I_{{o_{m} }} $$
(10)
$$ \mathcal{B}I_{{o_{m} }} (0,\mathcal{M}) \,=\, \mathcal{W}_{b} $$
(11)

where \( \mathcal{M} \,\le\, 7 \,-\, (4 \,+\, m){\text{ and }} \mathcal{M} \) is a positive integer with \( m \,=\, \{ 0,1,2,3\} \)

The watermark is implanted only once for every region i.e. \( \mathcal{S}_{{temp_{m} }} \).

So here,

$$ \mathcal{F}_{enc} :\mathcal{B}_{d} \{ \mathcal{B}I_{{o_{m} }} \,0,\mathcal{M}\} \to I_{w} $$
(12)

\( I_{w} \) is the watermarked image of size \( C \times D \).

Likewise, for decrypting the watermark, \( \mathcal{S}_{{temp_{m} }} ,I_{{o_{m} }} \;{\text{and }}I_{w} \) are compared to get the region where the watermark has been concealed for every value of \( m \). Let the region be

$$ \mathcal{E}{w}{m} \,=\, \{\mathcal{E}wm(p,q)\} ;\;{\text{where \, 0}}\, \le \,{\text{p}\,< \,\text{P},}\, 0\,\le \,{\text{q}\,< \,\text{Q},}\;\mathcal{E}wm(p,q) \in \{ 0,1, \ldots ,255\} $$
(13)
$$ \mathcal{D}_{b} \{\mathcal{E}_{wm} \} = \mathcal{B}\mathcal{E}_{m}$$
(14)

Now if \( Count_{m} \) be the function to count binary ‘0’ and ‘1’ in LSBs of each pixel of \( \mathcal{E}_{wm} \) in the following manner and the function returns the value of majority to \( \mathcal{C}_{{bit_{m} }} \) where

$$ \mathcal{C}_{{bit_{m} }}\, =\, \{ \mathcal{C}_{{bit_{m} }} (g,h)\} ;{\text{Where 0}} \,\le\, {g< \text{P}},\, 0 \,\le \,h < Q,\mathcal{C}_{{bit_{m} }} (g,h) \in \{ 0,1\} $$
(15)

Then,

For \( m = 0 \) and \( \mathcal{S}_{temp} = 0 \);

$$ \mathcal{C}_{{bit_{m} }} = Count_{m} \{ \mathcal{B}\mathcal{E}_{m} (0,3),\mathcal{B}\mathcal{E}_{m} (0,2),\mathcal{B}\mathcal{E}_{m} (0,1)\} $$
(16)

For \( m = 1 \) and \( \mathcal{S}_{{temp_{m} }} = 0.25; \)

$$ \mathcal{C}_{{bit_{m} }} = Count_{m} \{\mathcal{B}\mathcal{E}_{m} (0,2),\mathcal{B}\mathcal{E}_{m} (0,1),\mathcal{B}\mathcal{E}_{m} (0,0)\} $$
(17)
$$ \text{For } m = 2 \text{ and }\mathcal{S}_{{temp_{m} }} = 0.50;\mathcal{C}_{{bit_{m} }} = \{\mathcal{B}\mathcal{E}_{m} (0,1)\} $$
(18)
$$ {\text{For }}m = 3{\text{ and }}\mathcal{S}_{{temp_{m} }} = 0.75;\;\mathcal{C}_{{bit_{m} }} = \{\mathcal{B}\mathcal{E}_{m} (0,0)\} $$
(19)

\( Count \) be the function to count binary ‘0’ and ‘1’ for value at the same positions for \( \mathcal{C}_{{bit_{3} }} ,\mathcal{C}_{{bit_{2} }} ,\mathcal{C}_{{bit_{1} }} \) and the function returns the value of majority to

$$ \mathcal{C} = \mathcal{C}(g,h);{\text{Where 0}} \le {{g < \text{P},}}\, 0\le h < {\text{Q}},\,\mathcal{C}_{bit} (g,h) \in \{ 0,1\} $$
(20)

Then,

$$ \mathcal{C} = Count\{ \mathcal{C}_{{bit_{3} }} ,\mathcal{C}_{{bit_{2} }} ,\mathcal{C}_{{bit_{1} }} \} $$
(21)

where \( \mathcal{C} \) is the decrypted binary watermark.

Hence, following the above processes we get:

$$ \mathcal{F}_{dec} :l_{w} \to \mathcal{C};{\text{Where }}\mathcal{C} \equiv \mathcal{W}_{b}. $$
(22)

3 Results and Discussion

The segment reports the experimental outcomes which have been evaluated through comparative study between the earlier methods and the proposed technique. To study the performance of the proposed algorithm by means of imperceptibility, robustness and hiding capacity, four regularly accessible grayscale test images of size 256 × 256 and single binary watermark image of dimension 16 × 16 are used. The binary watermark image is given in Fig. 4 and the test gray scale images are given in Fig. 5. Figure 6 shows the saliency maps for original grayscale images and Fig. 7 stands for hiding capacity estimation based on the saliency maps where different shades represent different hiding capacity. The black region represents the less perceptible saliency region whereas the white region represents the most perceptible saliency region. Figure 8 illustrates the watermarked Images.

Fig. 4
figure 4

Binary watermark (logo)

Fig. 5
figure 5

Original grayscale images

Fig. 6
figure 6

Itti-Koch saliency maps of original grayscale images

Fig. 7
figure 7

Hiding capacity estimation based on the saliency maps

Fig. 8
figure 8

Watermarked images

Imperceptibility, in this context, refers to the invisibility of the embedded watermark in the test or original images without corrupting the perceptual quality of watermarking [2, 4, 5]. Table 1 tabularizes the number of quality measures required to check the imperceptibility of the watermarks in the watermarked images.

Table 1 The performance results of imperceptibility

A considerable degradation of quality or information loss will occur if any means of intentional or unintentional processing is applied on the image. Table 2 presents the average results of performance against different attacks comparing the original watermark and the watermark extracted from the watermarked images under attack. Figure 9 provide recovered watermarks after different image impairments.

Table 2 Results for robustness
Fig. 9
figure 9

Recovered watermarks after different image impairments

To validate the performance of the proposed scheme, a comparison among different algorithms is presented in Table 3. The assessment verifies that the projected approach offer improved imperceptibility and better capacity.

Table 3 The performance comparison

4 Conclusion

In proposed technique saliency map is used as a classifier to distinguish feature of an image based on perceptibility which helps to secure imperceptibility along with robustness of an image. The experimental conclusion implies that the algorithm stand against various attacks with superior hiding capacity. Comparison of the technique with some state of the art technique recommends that projected scheme can be an efficient tool for copyright protection and authentication. Other algorithms may be used in future other than LSB replacement to increase the effectiveness of the watermarking efficiently.