1 Introduction

In the last few decades, information security techniques have been receiving considerable attention [2, 14]. With the rapid development of network and multimedia technology [1, 7, 17, 18, 25, 29, 30], to protect the copyright and integrity of digital products has become a great challenge. Therefore, a variety of techniques in the purpose of protecting digital rights have been proposed. Digital watermarking is regarded as one of the most promising techniques to protect digital data among these techniques [5]. In term of the domain in which the watermark is applied, the watermark scheme can be classified into two categories: spatial-domain and frequency-domain methods [6]. In the algorithms of the first group, the watermark is superposed directly on image pixels [10]. On the other hand, the techniques of the second group take advantage of transformation domains, such as discrete Fourier transform (DFT) [16], discrete cosine transform (DCT) [15], discrete wavelet transform (DWT) [6] and singular value decomposition (SVD) [12], for watermarking purpose. In some new researches, Schur decomposition, which requires fewer computations compared to other transforms (e.g. SVD), has been applied in watermarking and proved to be a promising area that may compete with other transform domains [22]. In comparison with spatial domain schemes, the transform domain based watermarking is known as more robust and imperceptibility [6].

In recent years, a large number of image watermarking schemes have been introduced [6, 10, 12, 15, 16, 22]. Though numerous image watermarking schemes have been presented, most of the existing watermarking methods were designed for the copyright protection of grayscale images. However, color images are the basic components of multimedia systems and play an important role in the life now [28]. Hence, it is very important to developed effective watermarking techniques for color images. There exist different color spaces which are the representing models for color images, such as RGB, HSI, YCbCr, HSV and YIQ, could be a candidate to be employed in color image watermarking methods. For protecting the copyright of color image, watermarking schemes reported in [8], [23], [11] and [9] utilize RGB, YCbCr, HIS and YIQ color spaces, respectively. Since these watermarking methods ignore the correlation between different color channels and the significant color information, they are not robust against color attacks [3] including histogram equalization, contrast adjustment, gamma correction, brighten and darken etc., which are implemented easily by using image-editing software.

To overcome the above-mentioned problem, researchers have started to propose models to process the color channels intrinsically. Quaternion, which represents a color image by encoding its three channels on the imaginary parts of quaternion number, offers a solution to achieve this goal and has been employed in color image watermarking [21, 24, 26, 28]. By use of such a representation, a color image can be processed holistically in a vector manner [24]. Tsui et al. developed a non-blind technique that watermark signal is inserted into the quaternion discrete Fourier transform (QDFT) domain of the original color image [26]. Sun et al. proposed that the watermark is embedded into the amplitude of QDFT AC coefficients of the host color image [24]. Shao et al. suggested fusing the encrypted watermark into the middle coefficients of the quaternion gyrator transformed host image [21]. Though these color image watermarking methods consider the correlation between different color components, they cannot resist the geometric attacks, such as rotation and scaling. To withstand geometric attacks, Yang et al. presented a geometric robust color image watermarking approach based on LS-SVM training model and quaternion Exponent moments [28]. The drawbacks of this scheme is the high computation time for LS-SVM training [28].

In this paper, based on quaternion Hadamard transform (QHT) and Schur decomposition, a novel color image watermarking scheme is presented. To process the color image holistically as a vector field, the QHT is defined and its calculation for a color image, which is represented by quaternion matrix, is developed. Then the watermark is embedded into the host color image which is transformed by QHT and Schur decomposition. In the extraction procedure, the quaternion Zernike moment (QZM) [4] is employed to estimate the geometric distortion parameters of the attacked watermarked image. Experimental results show that the proposed scheme is invisible and robust against attacks including contrast adjustment, histogram equalization, gamma correction, brighten, darken, sharpening, filtering, noise addition, occlusion, rotation, scaling and combined geometric attacks, etc.

2 Preliminaries

2.1 Quaternion representation of a color image

Quaternions can be considered as generalizations of complex numbers. A quaternion number can be represented as follows [21]:

$$ q= a+ bi+ cj+ dk, $$
(1)

where a, b, c, and d are real numbers, and i, j, and k are three imaginary units obeying the following rules

$$ {i}^2={j}^2={k}^2= i jk=-1, ij=- ji= k, jk=- kj= i, ki=- ik= j. $$
(2)

The conjugate and modulus of a quaternion are respectively defined by

$$ {q}^{\ast }= a- bi- cj- dk,\kern0.5em \left| q\right|=\sqrt{a^2+{b}^2+{c}^2+{d}^2}. $$
(3)

When a = 0, q is a pure quaternion. Let f be a color image in the RGB color space. Each image pixel can be treated as a pure quaternion number which real part is 0:

$$ {f}_Q={f}_R i+{f}_G j+{f}_B k, $$
(4)

where f R , f G , and f B are the red, green and blue channels of f, respectively. By employing this representation, each color triple can be treated as a whole unit and be processed directly, without losing color information.

2.2 Hadamard transformation technique

The Hadamard transform (HT) is a non-sinusoidal, orthogonal transformation that decomposes a signal into a set of orthogonal, rectangular waveforms called Walsh functions [20]. Early studies [13, 20] make clear that the use of Hadamard transform as signal decomposition tool can not only offer simple implementation, low computation cost and ease of hardware implementation, but also be suitable for hiding the watermark. HT has two properties: one is that its elements are real; the other is that its rows and columns are orthogonal to each other [20]. Hence, H = H * = H T = H −1 [20]. Here, H is a Hadamard matrix and H *, H T and H −1 are the corresponding transpose matrix, inverse matrix and conjugate matrix, respectively. The product of Hadamard matrix H and its transpose H T is an identity matrix [20].

Let g be the original image and G the transformed image, the two-dimensional (2D) Hadamard transform is defined as [20]

$$ G={H}_N{gH}_N/ N, $$
(5)

where H N is an N × N Hadamard matrix.

The inverse 2D–Hadamard transform (IHT) is given as [20]

$$ g={H}_N^{-1}{GH}_N^{\ast }/ N={H}_N{GH}_N/ N, $$
(6)

2.3 Schur decomposition

In the mathematical discipline of linear algebra, the Schur decomposition is an important tool in matrix decomposition. Since Schur decomposition is a major intermediate step in SVD, it has lower computational complexity than that of SVD [22]. Therefore, Schur decomposition has been suggested to be applied in watermarking domain [19, 22]. The Schur decomposition of a real matrix A results in two matrices Q and S as shown in the following formulas [29]

$$ A={QSQ}^T, $$
(7)

where S is the block upper triangular matrix called the real Schur form and Q is a unitary matrix. Q T indicates the conjugate transpose of Q.

Note that all the signs of the first column elements in matrix Q are same and their values are very similar [22]. Thus, we utilized this property and insert the watermark into the coefficients in Q matrix of the QHT-transformed component after Schur decomposition.

2.4 Quaternion Zernike moment

By using the algebra of quaternions, Chen et al. introduced the quaternion Zernike moments, which are invariant to rotation, scaling and translation transformations, to process the color images in a holistic manner [28]. Owning to the non-commutative multiplication property of quaternions, two types of QZM, which are the left-side QZM and the right-side QZM respectively, can be defined [28]. In this work, the right-side QZM is used.

Let f(r,θ) be an RGB image, the right-side QZMs of order n with repetition m is defined as [28]

$$ {Z}_{n, m}^R(f)=\frac{n+1}{\pi}{\int}_0^1{\int}_0^{2\pi}{R}_{n, m}(r) f\left( r,\theta \right){e}^{-\upmu m\theta} rd\theta dr, $$
(8)

where |m| ≤ n and n-|m| is even and μ is a unit pure quaternion which meets the constraint that μ 2 = −1 and R n,m (r) is the real-valued radial polynomial given by [28]

$$ {R}_{n, m}(r)=\sum_{k=0}^{\left( n-| m|\right)/2}\frac{{\left(-1\right)}^k\left( n- k\right)!}{k!\left(\left(\left( n+| m|\right)/2- k\right)!\right(\left(\left( n-| m|/2\right)- k\right)!}{r}^{n-2 k} $$
(9)

3 Quaternion Hadamard transform

3.1 Definition

Because of the non-commutative multiplication property of quaternions, there are different types of QHT that can be defined. In this study, the left-side QHT (QHTL) and the right-side QHT (QHTR) are defined:

  • Left-side QHT:

$$ {F}_{QL}={QHT}_L\left({f}_q\right)=\upmu {H}_N{f}_q{H}_N/ N, $$
(10)
  • Right-side QHT:

$$ {F}_{QR}={QHT}_R\left({f}_q\right)={H}_N{f}_q{H}_N\upmu / N, $$
(11)

where f q is a two-dimensional quaternion function. QHT L () and QHT R () are the left-side QHT and right-side QHT operations, respectively.

The corresponding inverse QHT (IQHT) are defined as follows

  • Left-side IQHT (IQHTL):

$$ {f}_q^{\hbox{'}}={IQHT}_L\left({F}_{QL}\right)=-\upmu {H}_N^{-1}{F}_{QL}{H}_N^{\ast }/ N=-\upmu {H}_N{F}_{QL}{H}_N/ N, $$
(12)
  • Right-side IQHT (IQHTR):

$$ {f}_q^{\hbox{'}}={IQHT}_R\left({F}_{QR}\right)=-{H}_N^{-1}{F}_{QR}{H}_N^{\ast}\upmu / N=-{H}_N{F}_{QR}{H}_N\upmu / N, $$
(13)

In formulas (12) and (13), IQHT L () and IQHT R () are the inverse left-side QHT and right-side QHT operations, respectively. QHT and IQHT are transformation pairs of each other. They insure that a quaternion function f q which is transformed into the QHT domain can be reconstructed completely by the inverse process without losing any information. When f q represents a color image, it can be processed holistically in a vector manner by using QHT.

3.2 Analysis on QHT for color image watermarking

It can be observed from Eq. (4) that the real parts of the quaternion matrix which represents a color image are equal to zero. Hence, the corresponding reconstructed quaternion matrix, which is obtained by employing QHT and IQHT, must be a pure quaternion matrix after watermark embedding. Otherwise, if the real parts of the reconstructed quaternion matrix are not equal to zero, the watermarked color image which is acquired by taking only the three imaginary parts of it (see Eq. (4)) will discard non-zero real part data and bring about a loss of watermark information

For left-side QHT, substituting μ and Eq. (4) into Eq. (10), we have

$$ \begin{array}{l}{F}_{Q L}={ Q HT}_L\left({f}_Q\right)=\upmu {H}_N{f}_Q{H}_N/ N=\upmu \left[{H}_N\left({if}_R+{jf}_G+{kf}_B\right){H}_N\right]/ N\\ {}\kern1.25em =\upmu \left[{iH}_N{f}_R{H}_N+{jH}_N{f}_G{H}_N+{kH}_N{f}_B{H}_N\right]/ N\\ {}\kern1.25em =\upmu \left[ iHT\left({f}_R\right)+ jHT\left({f}_G\right)+ kHT\left({f}_B\right)\right]\end{array} $$
(14)

Considering the general unit pure quaternion μ = αi + βj + γk (α, β and γ are real numbers), substituting μ into (14) and using the properties of the quaternion shown in Eq. (2), we have

$$ {F}_{QL}={F}_0+{iF}_1+{jF}_2+{kF}_3, $$
(15)

where

$$ \begin{array}{l}{F}_0=-\alpha HT\left({f}_R\right)-\beta HT\left({f}_G\right)-\gamma HT\left({f}_B\right),\kern2em {F}_1=\beta HT\left({f}_B\right)-\gamma HT\left({f}_G\right),\\ {}{F}_2=\gamma HT\left({f}_R\right)-\alpha HT\left({f}_B\right),\kern7.25em {F}_3=\alpha HT\left({f}_G\right)-\beta HT\left({f}_R\right).\end{array} $$
(16)

Similarly, applying left-side IQHT to Eq. (12), the reconstructed f’ Q can be obtained.

$$ {f}_Q^{\hbox{'}}={IQHT}_L\left({F}_{Q L}\right)={IQHT}_L\left({F}_0+{iF}_1+{jF}_2+{kF}_3\right)={f}_{re}^{\hbox{'}}+{if}_R^{\hbox{'}}+{jf}_G^{\hbox{'}}+{kf}_B^{\hbox{'}}, $$
(17)

where

$$ {f}_{re}^{\hbox{'}}=\alpha {f}_1^{\hbox{'}}+\beta {f}_2^{\hbox{'}}+\gamma {f}_3^{\hbox{'}},\kern0.75em {f}_R^{\hbox{'}}=\gamma {f}_2^{\hbox{'}}-\alpha {f}_0^{\hbox{'}}-\beta {f}_3^{\hbox{'}},\kern0.75em {f}_G^{\hbox{'}}=\alpha {f}_3^{\hbox{'}}-\beta {f}_0^{\hbox{'}}-\gamma {f}_1^{\hbox{'}},\kern0.75em {f}_B^{\hbox{'}}=\beta {f}_1^{\hbox{'}}-\gamma {f}_0^{\hbox{'}}-\alpha {f}_2^{\hbox{'}}. $$
(18)

where

$$ {f}_0^{\hbox{'}}= IHT\left({F}_0\right),\kern1.5em {f}_1^{\hbox{'}}= IHT\left({F}_1\right),\kern1.25em {f}_2^{\hbox{'}}= IHT\left({F}_2\right),\kern1.5em {f}_3^{\hbox{'}}= IHT\left({F}_3\right). $$
(19)

It can be seen from Eqs. (14)–(19), by use of the traditional HT and IHT algorithms, the left-side QHT and IQHT of a color image which is represented by quaternion algebra can be calculated effectively. Notice that the right-side QHT of a color image can be implemented in a similar way. As mentioned before, to represent a color image, f’ Q must be a pure quaternion matrix. Therefore, the real parts of f’ Q are equal to zero. That is f’ re  = 0. It can be observed from Eq. (18), f’ re is computed without using f’ 0, while the three imaginary parts of f’ Q are calculated by utilizing f’ 0. It can be concluded that f’ re  = 0 can be still satisfied even if f’ 0 has been modified (e.g. watermark embedding). Since f’ R, f’ G and f’ B are employed to reconstruct the color image, the changes of f’ 0 will be spread to these three channels simultaneously. Consequently, when the watermark is inserted into f’ 0, not only the loss of watermark information can be avoided, but also the correlation between different color channels is considered. In this study, f’ 0 is chosen to embed the watermark.

By use of QHT, the advantage of processing a color image in a holistic manner without separating it into three channels can be obtained. The successful application in color image watermarking by use of the QHT which will be described in the following section shows its great potential. And we’d like to point out that, besides color image watermarking, the proposed QHT can be used for other color image processing fields, such as image template matching and image enhancement.

4 Rotation and scaling distortion parameters detection based on quaternion Zernike moment

To extract the watermark accurately, the rotation and scaling transform parameters of watermarked color image are estimated based on QZMs, and then correct the distorted watermarked color image by using these estimated parameters for the geometric attacks including rotation, scaling and combined rotation and scaling transformations.

4.1 Rotation detection

If a color image is rotated by θ degrees, the relationship between the original color image and the rotated color image is [4]

$$ Z{\hbox{'}}_{n, m}^R={Z}_{n, m}^R{e}^{-\upmu m\theta}. $$
(20)

where \( Z{\hbox{'}}_{n, m}^R \) and \( {Z}_{n, m}^R \) are the right-side QZM of the original and the rotated image respectively. The rotated angle θ can be estimated by using the following formula

$$ \theta =-\frac{ \arg \left( Z{\hbox{'}}_{n, m}^R\right)- \arg \left({Z}_{n, m}^R\right)}{m},\kern1em \left( m\ne 0\right). $$
(21)

Here, arg() denotes the phase extraction operator. The rotation parameter θ can also be estimated by employing the left-side QZM in a similar way.

4.2 Scaling detection

Assume that f” denotes a scaled version (with the scaling factor λ) of the original color image f. Let \( {\Gamma}_f={\left(|{Z}_{0,0}^R|\right)}^{1/2} \). Based on the definition of Γ f , it can be verified that [4]

$$ {\Gamma}_{f\hbox{'}}=\lambda {\Gamma}_f. $$
(22)

Then the scaling factor can be figured out as follows

$$ \lambda ={\Gamma}_{f\hbox{'}}/{\Gamma}_f=\sqrt{\left| Z{\hbox{'}}_{0,0}^R\Big|/\Big|{Z}_{0,0}^R\right|}. $$
(23)

Using the two detection methods mentioned above, the geometric distortion parameters of a color image which is under the combined rotation and scaling attacks can also be estimated.

In addition, the original color image is not needed for the above-mentioned detection procedures. However, some information of the original image including the right-side QZMs \( {Z}_{0,0}^R \), \( {Z}_{1,1}^R \) and \( {Z}_{2,2}^R \) is required. Since the color image is processed in a holistic manner via QZM, the correlation between different color channels and the significant color information is considered in the detection method. As a result, it is robust to the chromatic distortions such as brightness modifications.

5 The proposed watermarking method

A color image watermarking scheme, including its watermark embedding and extraction processes is proposed in this section. As mentioned above, QHT has the ability to distribute watermark energy to three channels simultaneously. Using the QZMs of color image, we can obtain an accurate estimation of geometric transformation parameters to make our scheme robust to geometric attacks.

5.1 Watermark embedding algorithm

The binary watermark is embedded into the host color image which is transformed by QHT and Schur decomposition. Let H and W be the color host image and the original watermark image, respectively. The watermarking process is described as follows.

  1. 1)

    To deal with the host color image in a holistic manner, H is transformed by QHT using Eqs. (14) and (15) to achieve F QL first. Then apply IQHT to F QL to acquire f’ Q by employing Eq. (17). According to the analysis mentioned in sub-section 3.2, the component f’ 0 is chosen to embed the watermark.

  2. 2)

    Divide f’ 0 into non-overlapping blocks with 8 × 8 pixels. Let f mn 0 be the (m,n)th block in f’ 0.

  3. 3)

    Apply Schur decomposition to every block f mn 0 to get Q mn and S mn : f mn 0 = Q mn S mn Q mn T.

  4. 4)

    An element of the W is embedded into one block in the embedding procedure. Each Q mn matrix of the to-be-embedded block is altered to insert the watermark. Let W mn be the (m,n)th element of W. The watermark is inserted by using the following formulas.

$$ \mathrm{if}\kern0.75em {W}_{mn}=1,\left\{\begin{array}{l} q{\hbox{'}}_{mn3,1}= sign\left({q}_{mn3,1}\right)\times \left(1+\Delta \right) avg\\ {} q{\hbox{'}}_{mn2,1}= sign\left({q}_{mn2,1}\right)\times \left[ abs\left({q}_{mn2,1}\right)-\Delta avg/2\right]\\ {} q{\hbox{'}}_{mn4,1}= sign\left({q}_{mn4,1}\right)\times \left[ abs\left({q}_{mn4,1}\right)-\Delta avg/2\right]\end{array}\right. $$
(24)
$$ \mathrm{if}\kern0.75em {W}_{mn}=0,\left\{\begin{array}{l} q{\hbox{'}}_{mn3,1}= sign\left({q}_{mn3,1}\right)\times \left(1-\Delta \right) avg\\ {} q{\hbox{'}}_{mn2,1}= sign\left({q}_{mn2,1}\right)\times \left[ abs\left({q}_{mn2,1}\right)+\Delta avg/2\right]\\ {} q{\hbox{'}}_{mn4,1}= sign\left({q}_{mn4,1}\right)\times \left[ abs\left({q}_{mn4,1}\right)+\Delta avg/2\right]\end{array}\right. $$
(25)

where q mn2,1, q mn3,1 and q mn4,1 are the second, the third and the fourth elements in the first column of Q mn , respectively. Avg. = (|q mn2,1| + |q mn4,1|)/2 and Δ is the embedding control factor. Sign(x) denotes the sign of x and abs(x) returns the absolute value of x, respectively. Let Q’ mn denote the altered Q mn . Experimental results indicate that the proposed method has good invisibility and robustness when Δ is between 0.02 and 0.04.

  1. 1)

    Use the following formula to acquire the watermarked component f” 0

$$ {f_{mn}}_0^{\hbox{'}\hbox{'}}={Q}_{\kern0.5em mn}^{\hbox{'}}{S}_{mn}{Q^{\hbox{'}}}_{mn}^T, $$
(26)

where f mn 0 be the (m,n)th block in f” 0.

  1. 2)

    Using Eq. (18), calculate the three components f’ R, f’ G and f’ B with f” 0 to spread watermark energy into three imaginary parts of f’ Q . Let f” R, f” G and f” B be the three watermarked imaginary components after calculation, respectively.

  2. 3)

    Compose the three channels f” R, f” G and f” B, the watermarked color image can be generated.

  3. 4)

    Calculate the QZMs \( {Z}_{0,0}^R \), \( {Z}_{1,1}^R \) and \( {Z}_{2,2}^R \) of the watermarked color image, which are needed in the detection process.

5.2 Watermark extraction

The watermark can be extracted without the host color image, but quaternion Zemike moments obtained in step 8) of the watermark embedding procedure are needed to estimate the geometric transformation parameters.

  1. 1)

    Let WI denote the watermarked color image. Using the method described in section 4, WI is inspected for geometric attacks including rotation, scaling and combine attack sequentially. If a possible attack (e.g., scaling) is detected successfully, the detection procedure is terminated and WI is corrected by use of the estimated geometric transformation parameters. Let WI indicate the recovered color image.

  2. 2)

    Apply QHT to WI to get FW QL first. Then transform FW QL by IQHT to obtain fw’ Q . Then the component fw’ 0, which is corresponding to f’ 0 in embedding procedure, is employed to extract the watermark.

  3. 3)

    Divide fw’ 0 is into non-overlapping blocks with 8 × 8 pixels. Let fw mn 0 denote the (m,n)th block in fw’ 0.

  4. 4)

    Perform Schur decomposition on every block to obtain the Q component. Let Qw mn denote the corresponding Q matrix of fw mn 0.

  5. 5)

    The watermark W′ is extracted according to the following formula.

$$ {W^{\hbox{'}}}_{mn}=\left\{\begin{array}{l}1,\kern1em \mathrm{if}\kern0.5em \left|{qw}_{mn3,1}\right|> avgw\\ {}0,\kern1em \mathrm{if}\kern0.5em \left|{qw}_{mn3,1}\right|\le avgw\end{array}\right., $$
(27)

where avgw = (|qw mn2,1| + |qw mn4,1|)/2. qw mn2,1, qw mn3,1 and qw mn4,1 are the second, the third and the fourth elements in the first column of Qw mn , respectively.

6 Experimental results

The performance, including imperceptibility and robustness, of the proposed scheme are verified by watermarking the original color images. The structural similarity (SSIM) index [23, 27], which was considered to be correlated with the quality perception of the human visual system (HVS), was used to evaluate the similarity between the original color image H and the watermarked color image H″. Different from conventional error summation methods, e.g. PSNR, the SSIM is developed via modeling any image distortion as a combination of the luminance distortion, the contrast distortion and loss of correlation [27]. The SSIM is defined as [23, 27]:

$$ SSIM\left( H, H\hbox{'}\right)=\left(\frac{2{\mu}_H{\mu}_{H\hbox{'}}+ C1}{\mu_H^2+{\mu}_{H\hbox{'}}^2+ C1}\right)\left(\frac{2{\sigma}_H{\sigma}_{H\hbox{'}}+ C2}{\sigma_H^2+{\sigma}_{H\hbox{'}}^2+ C2}\right)\left(\frac{\sigma_{H H\hbox{'}}+ C3}{\sigma_H{\sigma}_{H\hbox{'}}+ C3}\right), $$
(28)

where μH and μH are the two images’ mean luminance, σ H and σ H’ are the standard deviations for the two images, and σ HH’ is the covariance between H and H′, respectively. The positive constants C 1, C 2 and C 3 are used to avoid a null denominator. The values of the SSIM are in [0, 1]. The higher the SSIM is, the better the image quality is. To measure the correctness of the extracted watermark, the normalized correlation (NC) [23] between the embedded watermark W(m,n) and the extracted watermark W′(m,n) was used as a similarity metric.

$$ NC={\sum}_{m=1}^M{\sum}_{n=1}^N\left[ W\left( m, n\right)\times {W}^{\hbox{'}}\left( m, n\right)\right]/{\sum}_{m=1}^M{\sum}_{n=1}^N\left[{W}^2\left( m, n\right)\right]. $$
(29)

The sizes of the both watermarks are M × N. The NC is a metric to determine the robustness of extracted watermark from the attacked image. From Eq. (29), NC∈[0, 1]. In general, NC about 0.7 or above is considered acceptable.

The standard test color images including Lena, Peppers and Baboon (512 × 512 × 24) and a binary logo rose (64 × 64 × 2), which are shown in Fig. 1, were adopted as the host images and the watermark. In the Experiments, the unit pure quaternion is μ = (i + j + k )/31/2, and Δ = 0.03. The simulations in the experiment were implemented using MATLAB.

Fig. 1
figure 1

The host color images and the binary watermark. a Lena; b Peppers; c Baboon; d rose

Fig. 2 shows the results of the proposed watermarking method without any attacks. In Fig.2, (a), (c) and (e) are the watermarked color images, (b), (d) and (f) depict the watermarks which were extracted from the corresponding watermarked images. The SSIM values of the watermarked color images, which are compared with the scheme in [23], are listed in Table 1. It can be observed from Fig.2 and Table 1 that the watermarked color images whose SSIM values are approximately 1 have good imperceptibility and almost have no difference from the original ones in visual quality.

Fig. 2
figure 2

The watermarked images and the corresponding extracted watermark without any attacks. a The watermarked “Lena”. b extracted watermark of (a) (NC = 1). c the watermarked “Peppers”. (d) extracted watermark (NC = 1). (e) the watermarked “Baboon”. (f) extracted watermark of (e) (NC = 1)

Table 1 SSIM Values of watermarked color images between proposed method and scheme in [23]

To investigate the robustness of the proposed schemes, various attacks have been applied on the watermarked images, including contrast adjustment, histogram equalization, gamma correction, brighten, darken, sharpening, noise addition, filtering, cropping, JPEG compression, rotation, scaling and combined geometric attacks. Fig. 3 shows some attacked watermarked images. The corresponding watermarks which are extracted from the above attacked images in Fig. 4. The SSIMs of the corrupted watermarked images are also presented in Fig. 3. In Fig. 3, the ‘N/A’ indicates that the SSIM can not be calculate because the size of the distorted image is not the same as that of the original watermarked image. For all attack cases, the NC values obtained from both proposed method and scheme in [23] are presented in Table 2. In Table 2, the ’ /a’ and ’ /b’ indicate that Su’s method cannot withstand the corresponding attack [23] and the experimental result is not provided in the literature [23], respectively. It can be observed from the Table 2 and Fig. 4 that, although the watermarked images suffer from serious distortion, the presented scheme the proposed scheme offers satisfactory results for most attacks. All the extracted watermarks are clear enough to be recognized and most of the corresponding NC values are larger than 0.8.

Fig. 3
figure 3

The attacked watermarked images under attacks. a contrast adjustment (SSIM = 0.7283); b histogram equalization (SSIM = 0.6642); c gamma correction (SSIM = 0.8541); d brighten (SSIM = 0.7639); e darken (SSIM = 0.5327); f sharpening (SSIM = 0.5650); g Gaussian low-pass filtering (SSIM = 0.8931); h Butterworth high-pass filtering (SSIM = 0.8428); i median filtering (SSIM = 0.7234); j salt & pepper noise (SSIM = 0.7648); k Gaussian noise (SSIM = 0.3858); l cropping (SSIM = 0.7474); m JPEG (SSIM = 0.9884); n rotation (SSIM = 0.8187); o scaling (SSIM = N/A); p rotation + scaling (SSIM = N/A)

Fig. 4
figure 4

The corresponding extracted watermarks from the distorted watermarked images in Fig. 3. a contrast adjustment; b histogram equalization; c gamma correction; d brighten; e darken; f sharpening; g Gaussian low-pass filtering; h Butterworth high-pass filtering; i median filtering; j salt & pepper noise; k Gaussian noise; l cropping; m JPEG; n rotation; o scaling; p rotation + scaling

Table 2 NC values of extracted watermarks under attacks comparing between proposed method and scheme in [23]

It can be seen from Table 2 that, although the method in [23] achieves good results, i.e., filtering operation and noise addition, it fails to resist color attacks including histogram equalization, contrast adjustment, gamma correction, brighten and darken. The proposed method have large NC values in the case of the mentioned above color attacks since it employs a holistically processing approach by use of QHT. That is, our scheme is robust against color attacks.

Though Su et al. claimed that the method in [23] is robust against geometric attacks, it cannot resist the geometric attacks effectively. That reason is that it is assumed that the transformation parameters of the geometric distorted watermarked color images have been known and used for correcting geometric distorted watermarked images before watermark extraction. However, without using any estimation algorithm, it is hardly to obtain the geometric transformation parameters. As can be seen from the Table 2 and Fig. 4, our method is robust to geometric attacks including rotation, scaling and a combination of them effectively because the parameters of these geometric transformations can be estimated exactly by use of the QZM-based geometric detection algorithm described in section 4. In the experiments, all the watermarked color images were rotated with 10°, scaled with factor 1.6 and transformed by a combination of rotation 20° and scaling 1.5, respectively. The corresponding estimated distortion parameters of Fig. (n), Fig. (o) and Fig. (p) are 10.0227°, 1.603 and 20.035° and 1.506, respectively. After correcting the geometric distorted watermarked color images by use of these parameters, the watermarks can be extracted. All the watermarks can be distinguished and the NC values of them are greater than 0.8. From the above experiments, it appears that our algorithm can resist geometric attacks including rotation, scaling and combined rotation and scaling.

From the above measurements, several observations can be achieved. The proposed color image watermarking method offers satisfactory results for most attacks, especially for color attacks and geometric distortions. However, it is not very robust against some attacks, such as translation, median filtering and JEPG compression. The reasons are: (1) the QZM-based geometric distortion detection algorithm cannot measure the translation parameters effectively due to the lost information of the translated image; (2) some attacks such as median filtering and JEPG compression can destroy significantly the coefficients of the component of the host color image after QHT and Schur decomposition.

7 Conclusion

In this paper, the conventional Hadamard transform defined in gray-scale image is extended to color image using the algebra of quaternions first. Then an efficient method to calculate the QHT of a quaternion matrix is developed. Based on QHT and Schur decomposition, a novel color image watermarking scheme is presented. With QHT, the host color image is processed in a holistic manner and the watermark is embedded by changing the elements of Q matrix obtained by Schur decomposition. In order to withstand the geometric attacks, a geometric distortion detection algorithm based upon QZM, which considers the significant color information, is introduced. Before extracting the watermark, the geometric transformation parameters of corrupted watermarked image is estimated by using this algorithm. Subsequently, the distorted color image is corrected by employing the estimated distortion parameters, and the watermark can be extracted from the recovered image. Experimental results show that the proposed scheme not only has good imperceptibility but also is robust to various kinds of attacks, including contrast adjustment, histogram equalization, gamma correction, brighten, darken, sharpening, filtering, noise addition, cropping, rotation, scaling and combined geometric attacks, etc. In sum, compared with the earlier color image watermarking schemes in the literature, the advantages of the proposed approach are: (1) the robustness against color attacks is higher because the watermark is spread throughout the three RGB channels rather than simply considering the image luminance component; (2) since the rotation and scaling transform parameters of geometric distorted watermarked color image can be estimated by QZMs, the robustness against geometrical distortions is higher; (3) the complexity of it is lower than that of three channels separately processing method. Additionally, in the future work, we will extend the proposed idea to color video watermarking since color images are the basic component of video technologies.