Literature DB >> 28680684

An indirect watermark hiding in discrete cosine transform-singular value decomposition domain for copyright protection.

Soumitra Roy1, Arup Kumar Pal2.   

Abstract

Digital image watermarking has emerged as a promising solution for copyright protection. In this paper, a discrete cosine transform (DCT) and singular value decomposition (SVD) based hybrid robust image watermarking method using Arnold scrambling is proposed and simulated to protect the copyright of natural images. In this proposed scheme, before embedding, watermark is scrambled with Arnold scrambling. Then, the greyscale cover image and encrypted watermark logo are decomposed into non-overlapping blocks and subsequently some selected image blocks are transformed into the DCT domain for inserting the watermark blocks permanently. For better imperceptibility and effectiveness, in this proposed algorithm, watermark image blocks are embedded into singular values of selected blocks by multiplying with a feasible scaling factor. Simulation result demonstrates that robustness is achieved by recovering satisfactory watermark data from the reconstructed cover image after applying common geometric transformation attacks (such as rotation, flip operation, cropping, scaling, shearing and deletion of lines or columns operation), common enhancement technique attacks (such as low-pass filtering, histogram equalization, sharpening, gamma correction, noise addition) and jpeg compression attacks.

Entities:  

Keywords:  Arnold scrambling; discrete cosine transform; imperceptibility; robust watermarking; singular value decomposition

Year:  2017        PMID: 28680684      PMCID: PMC5493926          DOI: 10.1098/rsos.170326

Source DB:  PubMed          Journal:  R Soc Open Sci        ISSN: 2054-5703            Impact factor:   2.963


Introduction

Nowadays with the advancement of high-speed communication network and personal computers, access, transmission, saving and distribution of digital data (such as images, video, audio and text) are becoming less complex and very much time and cost effective. But in today's forgery world, modification and perfect replication of digital data with the help of easy-to-use software and cheap digital materials like video cameras is turning out to be common practice for illegal uses. Internet is used in an illicit manner to distribute this modified and replicated illegitimate digital content. Therefore, authentication, integrity violation and copyright protection issues have been developed as a serious threat for this transmitted digital information. To avoid this type of security threat, sometimes extra digital data-related information is embedded into digital data in imperceptible way (termed as digital watermarking). Over the last few years, digital watermarking technology has been proposed as a better solution than cryptographic [1] and steganographic processes to overcome this authentication and copyright protection problem. In digital image watermarking method, certain information [2] (such as signature and logo ID number) uniquely related to the owner or distributor is permanently embedded into digital data so that it can be later detected or extracted for the verification of rightful ownership. The embedded watermark should still be detectable, while the perceptual quality of digital data remains to an acceptable level. The important parameters for digital image watermarking scheme are [3] imperceptibility, robustness, embedding capacity and readily embeddable and extractable watermark data. Among these characteristics, imperceptibility property is inversely proportional to the watermark embedding capacity. But, in general convention, robustness is improved with the increment of embedding capacity. So there should be some settlement between these three properties to design an effective watermarking scheme. Depending on the various properties, watermarking technique can be divided into various ways [1]. According to the human perception, watermarking can be divided into visible and non-visible watermarking. In visible watermarking, transparent watermark is present in the cover image. But preservation of the visual quality of watermark object and imperceptibility of watermark logo (by human perception) is the main concern in the non-visible watermarking technique. Watermarking schemes can also be divided into three schemes as blind, semi-blind and non-blind watermarking schemes. In blind watermarking scheme, neither original data nor watermark data are needed in detection process; whereas in semi-blind scheme, watermark data and some other side information are needed in detection process; while in non-blind watermarking scheme, original data and sometimes watermark data are needed in detection procedure. Owing to the need of the original data at the receiver side, non-blind scheme suffers from security compromises and practical application constraints [4]. In the early days, non-blind schemes were more robust than blind schemes, but in today's scenario, performance criteria of blind-based watermarking scheme are almost identical to those of non-blind schemes. Depending on its application, watermarking schemes can be classified into robust watermarking schemes and fragile watermarking schemes. Robust digital watermarking techniques are applied for copyright protection. In robust digital watermarking techniques, embedded watermark information almost preserves the image perceptual quality while resisting all types of attacks or changes to the watermarked image. Fragile watermarking schemes are widely used for data authentication and temper detection. In fragile watermarking schemes, the aim is to embed a watermark that should be alterable under common signal processing attacks. A semi-fragile watermarking scheme, which is designed according to the integrity property of cover object, is the mixture of robust and fragile watermarking scheme. Similar to the robust watermarking technique, semi-fragile watermarking can bear some kind of modification to the watermarked object by legitimate distortion while, like fragile one, it can detect the region of the object that is modified by illegitimate distortion and distinguish them from the authentic or unaltered region. Recently, researchers have proposed so many effective singular value decomposition (SVD) based watermarking schemes due to their attractive properties, and [5] geometric features from an image are easily obtained by SVD mathematical techniques. The main features of SVD are described in detail in §2.2. Basically, in SVD based watermarking scheme, SVs of an image are modified to embed watermark or watermark SVs. Liu & Tan [6] proposed a pure SVD based blind watermarking scheme. With the aim to increase the invisibility and capacity of SVD based watermarking scheme, Chung et al. [7] proposed two notes in which they modified the coefficients in both U and V components after SVD transformation. For further improvement of method in [7], Fan et al. [8] modified only the first column of U and V matrices after SVD transformation. But researchers found that there are some serious drawbacks in SVD-based singular value decomposition (SVD) based algorithm: (i) lower invisibility [9] in watermark image because one singular value modification alters all values in a pixel matrix; (ii) existence of false positive detection problem [10] in most SVD based watermarking methods; and (iii) alteration of the SVs of the cover image with the watermark image may create one diagonal line in [11] the recovered watermark. To achieve better robustness and high imperceptibility, recently researchers have developed their watermarking scheme using two or three transform domain techniques. These hybrid domain techniques provide better results than their single counterpart. In addition to this, the application of SVD mechanism in one single image requires huge computation [12]. So hybrid domain watermarking scheme is becoming more effective than pure SVD. Makbol & Khoo [12] present a new hybrid image watermarking scheme based on the redundant discrete wavelet transform (RDWT) and SVD. But, it is shown by Ling et al. [13] that the robust blind image watermarking scheme based on RDWT and SVD [12] has a fundamental flaw in its design that undermines the security of its scheme against the false positive problem. A non-blind DCT-SVD based hybrid domain watermarking is presented in [14]. In this technique, discrete cosine transform (DCT) is applied to the cover image at first, and then coefficients are scanned in zigzag order. Then SVs of the cover image are modified with the SVs of DCT transformed visual watermark. Its main disadvantage lies in its computational value. A DWT-SVD based watermarking scheme is proposed in [15]. After decomposing the cover image into four sub-bands, SVs of each sub-band are modified by SVs of watermark data in this technique. A DWT-SVD based watermarking technique is proposed in [16]. An RDWT and SVD based hybrid watermarking scheme is proposed in [17]. Rastegar et al. [18] proposed hybrid domain watermarking technique using SVD and radon transform. In [19], a new hybrid, secure and robust image watermarking scheme based on the integer wavelet transform (IWT) and SVD is proposed. In this work, authors raise the issue of the false positive problem for most of the SVD based watermarking schemes. Two reasons for this problem are also discussed in this paper: In watermark embedding step, embed the watermark into the SVs of cover image by multiplying with a scaling factor of α. In the next step, apply SVD to obtain , and matrices and keep and as secret keys for extraction purpose (as U and V preserve major information of an image). Therefore, illegitimate user can allege ownership using counterfeited and . (i) Reason 1: For watermark embedding, the modification of the SVs of the host with the SVs of the watermark. (ii) Reason 2: Use of the following equation in embedding process: Modern researchers suggest lots of solutions for the above stated security concerns. In [19], it has been solved by adopting a digital signature into the watermarked image. In another research work, Loukhaoukha et al. [20] encrypted the watermark before inserting it into the cover object. This encryption policy is adopted in this proposed method. The literature survey suggests that robustness of image watermarking scheme can be improved with the proper combination of SVD and suitable transform domain technique. To improve the effectiveness of watermarking scheme, in this proposed hybrid domain technique SVD is combined with block based DCT, and SVs of an image are modified with Arnold scrambled watermark data and not with the watermark SVs. After this introductory section, the rest of the paper is organized as follows. Preliminaries of the DCT and SVD and Arnold scrambling are presented in §2. The proposed watermark embedding and extraction algorithms are described in §3. Experimental results are furnished in §4. Finally, conclusions are drawn in §5.

Preliminaries

In the proposed robust image watermarking scheme, the greyscale encrypted watermark information is embedded in SVD domain. To make the scheme robust, watermark embedding process is developed in the DCT-SVD based hybrid domain. So in this section, DCT and SVD and Arnold scrambling are briefly explained.

Block based discrete cosine transform

DCT [21] is one of the popular and widely used signal decompositions and compression techniques that transform a signal from spatial domain representation into a spectral representation with an inherent ability to exhibit excellent energy compaction for the signal or image. It basically transforms the signal as a sum of sinusoids of varying magnitudes and frequencies. This transformation is used for transferring pixel values of the image from one domain to the other. DCT transformation consists of one DC coefficient and AC coefficients. Most of the information of transformed image stored in few low level frequency coefficients lies on the upper top left corner of the image. DC coefficient is the average of the pixels of the image and AC coefficients contain the significant information of the image, but less than that of DC component. In block based DCT, the input image, f of size M × N is decomposed into non-overlapping blocks of size m × n and then each block fb is transformed into corresponding DCT coefficients according to the following equation: where Sub-image is reconstructed from the transformed sub-image block Fb(u,v) by applying for x = 0,1,2,…,m − 1 and y = 0,1,2,…,n − 1 and α is defined as in equation (2.2). In block based DCT, significant information of the image decreases while traversing from one coefficient to another coefficient in zigzag order. Therefore, few upper coefficients of zigzag order are sufficient to represent an approximate image. Actually block based DCT produces three different frequency bands, namely high, middle and low frequency bands, as signal energies. In general, modification of low frequency band distorted the perceptual quality of the image as it contains maximum image information, while high frequency band can be removed by compression. That is why DCT based watermarking scheme is actually developed on using middle band frequency as it is less perceptible on modification. The top upper left DCT component of block based DCT image is F(0, 0), the average intensity of the image, and also known as the DC coefficient or the energy of the image. The other components of the DCT image are called AC coefficients with different low level values. In this proposed scheme, every coefficient of selected block is modified (figure 1).
Figure 1.

DCT's DC and AC coefficients of 8 × 8 image subpart in Zigzag order.

DCT's DC and AC coefficients of 8 × 8 image subpart in Zigzag order.

Singular value decomposition

In the linear algebra, SVD is a stable and reliable orthogonal matrix decomposition method which splits the system optimally in such a way that each linearly independent set persists with its own energy contribution [22]. In image processing, digital Image A of size n × n can be decomposed by its SVD as follows: where U, left singular matrix, is an n × n matrix with orthogonal columns, i.e. UTU = I, where I is the n × n identity matrix. V, right singular matrix, is an n × n orthogonal matrix, i.e. VT = V−1. S is an n × n diagonal matrix with non-negative SVs entries and these singular values are in sorted order or satisfying the condition . The superscript T denotes the transpose of the matrix. Owing to their attractive properties, SVD factorization methods efficiently compress an image matrix to a smaller sized matrix with almost identical representation of its energy compaction properties [23]. Main features of SVD based methods to apply in watermarking schemes are [23,24] as follows: (i) The SVs of an image have a very good stability. Let and their corresponding SVs are and , respectively, and they satisfied the condition , i.e. SVs of an image have so much stability that the addition of disturbance to the SVs is not greater than 2-norm of disturbance matrix. So, when a small perturbation is added to an image, its SVs do not change significantly; (ii) The SVs of an image exhibit proportionality property. The SVs of and the SVs of are related as means proportion invariance of SV must depend on the standardization of SV. (iii) The SVs of an image show transpose property. X and its transposed have same number of SVs. (iv) X and its flipped versions about vertical axis and about horizontal axis have the same number of non-zero SVs. (v) X and its rotated version (by an arbitrary angle) have the same number of non-zero SVs. (vi) Suppose, has the SVs , then its scaled version (s = scaling factor) has the where i ranges from 1,2,…,n. and Lr and Lc are the scaling factors of rows and columns. (vii) Both the matrix A and its translated counterpart AT have the same non-zero singular values. (viii) For SVD decomposition, the size of matrices can be either square or rectangle. (ix) Each singular value specifies the luminance of an image layer, while the corresponding pair of singular vectors specifies the geometry of the image.

Arnold scrambling

In order to expand the robustness of the algorithm and provide extra security to the embedded watermark, Arnold scrambling is employed in the pre-processing step of the proposed method. The classical Arnold scrambling jumbles up the pixel positions of the host image to generate a chaotic image and thus takes the responsibility to act as a secondary encryption technique. Eventually, the watermark is shared out in all space of the host image as space locations of watermark pixels are disturbed by scrambling method. This muddled watermark cannot be recovered without proper information about the scrambling algorithm, even if the attacker successfully extracts the watermark from cover image. Hence, scrambling transformation improves the security of the embedded watermark and increases the robustness of the proposed method. Two-dimensional Arnold scrambling transformation is defined as follows: where i, j is the pixel coordinate of the original space; , is the pixel coordinate after iterative computation scrambling and N is the size of the watermark. To restore the original watermark, the corresponding inverse transformation formula can be defined as

Proposed scheme

In this section, DCT-SVD based proposed watermarking scheme is elaborated in detail.

Watermark embedding procedure

Assume I represents the cover image of size M × N and W represents the watermark image of size M1 × N1 (figure 2). To embed W into the I, proposed DCT-SVD based watermark embedding method steps are as follows:
Figure 2.

Embedding block diagram.

Embedding block diagram. Step 1: Block processing of cover image: The cover image I is divided into 8 × 8 non-overlapping blocks according to the following equation: where 1 ≤ i ≤ M, 1 ≤ j ≤ N; nob = number of 8 × 8 non-overlapping cover image blocks = (M × N)/(8 × 8); and I_bp is the divided 8 × 8 non-overlapping cover image block where 1 ≤ p ≤ nob. Step 2: Selection of 8 × 8 cover image block for watermark component embedding: For security and authentication purposes, selection of watermark embedding position in cover image is one of the main concerns in the watermarking schemes. In this proposed scheme, one 8 × 8 non-overlapping cover image block is selected after four 8 × 8 non-overlapping cover image block and it starts from I_b1 (1st 8 × 8 non-overlapping cover image block). In other words, in each four 8 × 8 non-overlapping cover image blocks, the first block is selected for watermark module embedding purpose, i.e. I_b1 (1st 8 × 8 non-overlapping cover image block), I_b5 (5th 8 × 8 non-overlapping cover image block), I_b9 (9th 8 × 8 non-overlapping cover image block), … and so on till total 8 × 8 non-overlapping cover image block is traversed. So number of selected 8 × 8 non-overlapping cover image block for watermark component embedding is equal to nob/4 or 1/4th of total number of 8 × 8 non-overlapping cover image block. Keep these watermark embedding block values as the secret keys. (For this proposed embedding algorithm, watermark size is considered as 1/4th of cover image. So, embedded blocks are selected one among four successive blocks. If watermark size is 1/2 of cover image, embedded blocks are selected one among two successive blocks. Similarly, if watermark size is 3/4th of cover image, embedded blocks are selected three among four successive blocks. In this way, if watermark size is equal to the cover image, all the cover image blocks are needed for watermark embedding purpose. So in this proposed method, watermark embedding capacity can be varied according to the size of watermark image.) Step 3: DCT transformation of selected 8 × 8 cover image blocks: As discussed above, hybrid domain watermarking scheme provides better result than its single domain counterpart. So apply the DCT transformation to each selected 8 × 8 non-overlapping cover image block for watermark section embedding according to the following equation: where I_b dct is the DCT transformed 8 × 8 cover image block where 1 ≤ p ≤ nob/4. Step 4: Encrypting and block processing the watermark: At first, greyscale watermark W is encrypted to AW by Arnold scrambling technique. Then, scrambled watermark AW is partitioned into 8 × 8 non-overlapping blocks according to the following equation: where 1 ≤ i ≤ M1, 1 ≤ j ≤ N1, wnob = number of 8 × 8 non-overlapping watermark blocks = (M1 × N1)/(8 × 8) and W_b is the divided 8 × 8 non-overlapping watermark blocks, where 1 ≤ p ≤ wnob. Step 5: SVD transformation of DCT transformed cover image block: Apply SVD to each DCT transformed 8 × 8 cover image blocks according to the following equation: Step 6: Watermark embedding: Embed the 8 × 8 non-overlapping scrambled watermark blocks into the SVs of DCT-SVD transformed 8 × 8 cover image blocks (S) by multiplying with a scaling factor of α according to the following equation: where 1 ≤ p ≤ wnob Step 7: SVD transformation of watermark embedded SVs: Apply SVD to each watermark embedded 8 × 8 SVs block according to the following equation: where 1 ≤ p ≤ wnob Step 8: Inverse SVD transformation of SVD transformed watermark embedded SVs: Apply inverse SVD to the SVD transformed watermark embedded 8 × 8 SVs blocks according to the following equation: where 1 ≤ p ≤ wnob Step 9: Inverse DCT transformation to each inverse SVD applied block: Apply inverse DCT to each inverse SVD transformed 8 × 8 blocks according to the following equation: where 1 ≤ p ≤ wnob Step 10: Merging the divide image blocks: Merge the divided 8 × 8 watermarked cover image blocks with other unchanged 8 × 8 cover image block (if unchanged cover image block exists) to construct final watermarked image. (In this proposed method, it can be easily proved that there will be no unchanged cover image block, if cover image block size is equal to the watermark image size.)

Watermark extracting procedure

Assume I_attack represents the modified watermarked image of size M × N (figure 3). To recover watermark image of size M1 × N1 from modified watermarked image, proposed DCT-SVD based watermark extracting technique steps are as follows:
Figure 3.

Extracting block diagram.

Extracting block diagram. Step 1: Block processing of modified watermarked image: The modified watermarked image I_attack is divided into 8 × 8 non-overlapping blocks according to the following equation: where 1 ≤ i ≤ M, 1 ≤ j ≤ N, nob = number of 8 × 8 non-overlapping modified watermarked image blocks = (M × N)/(8 × 8), and I_attack b is the divided 8 × 8 non-overlapping modified watermarked image block, where 1 ≤ p ≤ nob. Step 2: Selection of 8 × 8 modified watermarked image block for extracting watermark component using secret key: In this proposed method, one 8 × 8 non-overlapping cover image block is selected after four 8 × 8 non-overlapping cover image blocks for watermark insertion. So, one 8 × 8 non-overlapping modified watermarked image block is selected after four 8 × 8 non-overlapping modified watermarked image blocks for watermark module extraction. Step 3: DCT transformation of selected 8 × 8 modified watermarked image blocks: Apply the DCT transformation to each selected 8 × 8 non-overlapping modified watermarked image block for watermark section extracting according to the following equation: where I_attackbdct is the dct transformed 8 × 8 modified watermarked image block, where 1 ≤ p ≤ nob/4. Step 4: SVD transformation of DCT transformed modified watermarked image blocks: Apply SVD to each DCT transformed 8 × 8 modified watermarked image blocks according to the following equation: where 1 ≤ p ≤ nob/4. Step 5: Inverse SVD transformation of DCT-SVD transformed modified watermarked image blocks: Inverse SVD is applied to the 8 × 8 DCT-SVD transformed modified watermarked image blocks according to the following equation: where 1 ≤ p ≤ wnob Step 6: Encrypted watermark extracting: Extract the 8 × 8 non-overlapping modified scrambled watermark blocks using the 8 × 8 modified watermarked image blocks (MSW), SVs of DCT-SVD transformed 8 × 8 cover image blocks (S) and value of α according to the following equation: where 1 ≤ p ≤ wnob Step 7: Recovering the watermark: Merge the recovered 8 × 8 modified scrambled watermark blocks into one block to produce scrambled watermark. Watermark is recovered after applying Arnold scrambling in the following step.

Experimental result

To evaluate the performance of the proposed schemes, a number of experiments are performed in the Matlab platform on four standard greyscale benchmark images of size 512 × 512, namely Lena, Baboon, Barbara and Pepper images and a 256 × 256 logo image taken as a watermark image. The proposed DCT-SVD based watermarking schemes are tested with various experiments in terms of imperceptibility, robustness, security and capacity analysis.

Imperceptibility analysis

To calculate the imperceptibility/invisibility analysis, alteration of perceptual image quality (by the proposed watermarking method) should be determined. The peak signal-to-noise ratio (PSNR) is used to find perceptual similarity between a host image and a watermarked image. In an effective invisible watermarking algorithm (i) watermark should be imperceptible/invisible from human visual system (HVS) and should check with (ii) standard benchmark PSNR. PSNR values are presented in decibel (dB). For optimized imperceptibility, the minimum acceptable value of PSNR is 38 dB as suggested by Kutter & Petitcolas [25]. This convention is dubious because PSNR is not a meaningful constraint in the context of geometric distortions [26]. PSNR can be defined as follows: where the mean square error (MSE) between host image x and the watermarked image is defined as follows: where the notations M and N represent the width and height of an image, respectively; is the pixel intensity value of coordinate (i, j) of the original image; and is the corresponding value of watermarked image. Basically, PSNR has been computed to compare the visual quality between cover image and watermarked image after embedding the watermark. Table 1 summarizes the experimental results for the proposed watermarking scheme in the context of PSNR value without any modification/attack of watermarked image.
Table 1.

Imperceptibility and robustness measurement table for proposed scheme with PSNR, normalized correlation (NC) and bit error rate (BER) without attack.

image namePSNR (in dB)NCBER
Lena50.52810.99450.0085
Pepper51.40040.99380.0094
Baboon53.92860.99480.0081
Barbara51.45410.99470.0078
Imperceptibility and robustness measurement table for proposed scheme with PSNR, normalized correlation (NC) and bit error rate (BER) without attack.

Robustness analysis

The robustness indicates that the watermarked object should resist against some watermark removal intentional/unintentional attacks. To measure the robustness property of proposed method, bit error rate (BER) and normalized correlation (NC) value between the original watermark and extracted distorted watermark (without attack/after applying different types of attack) is compared. The range of NC value lies between −1 and +1. If watermarked image is almost similar to the original image, then this correlation value is approximately 1, while −1 correlation value indicates negative image like watermarked image. It becomes totally unacceptable or uncorrelated, if the NC value tends to 0. NC is considered to be acceptable if it is 0.75 [23] or above. The BER and NC can be calculated as follows: and where M and N represent the width and height of the watermark image, respectively; w(i,j) = the pixel intensity value at coordinate (i,j) of original watermark,  = the pixel intensity value at coordinates (i,j) of extracting watermark, µ = mean of the original watermark,  = mean of the extracted watermark. BER and NC values of extracting watermark are calculated without any modification/attack of watermarked image. These values are presented in table 1. All the test images, watermark logo, encrypted watermark logo, watermarked images and recovered watermark logos from the corresponding watermarked images are shown side by side in figure 4.
Figure 4.

(a)–(d) Original test images, (e) the watermark of size, (f) the scrambled watermark, (g)–(j) all watermarked images and corresponding recovered watermarks without attack.

(a)–(d) Original test images, (e) the watermark of size, (f) the scrambled watermark, (g)–(j) all watermarked images and corresponding recovered watermarks without attack.

Security analysis

As discussed in the introduction section, there are at least three serious drawbacks in SVD based algorithm: (i) lower invisibility, (ii) false positive detection problem and (iii) diagonal line. To overcome lower invisibility and diagonal line, SVs of cover image are modified to embed watermark instead of watermark SVs. Recently, scientists have proposed lots of ways to solve the false positive detection problem. In [20], Loukhaoukha et al. suggest to encrypt the watermark before inserting it into the cover object. In this proposed scheme, this encryption policy is employed to overcome the false positive detection issue. So, watermark logo is encrypted in this technique using Arnold scrambling before inserting into SVs of host image.

Capacity analysis

For this proposed embedding algorithm, watermark size is considered as 128 × 128. So, embedded blocks are selected one among four successive blocks. If watermark size is 256 × 256, embedded blocks are selected one among two successive blocks. Similarly, if watermark size is 384 × 384, embedded blocks are selected three among four successive blocks. In this way, if watermark size is 512 × 512, all the cover image blocks are needed for the watermark embedding purpose. So in this proposed method, watermark embedding capacity can be varied. For performance evaluation and fair benchmarking, the proposed technique is verified against various attacks. In [26], Stirmark benchmark is represented as a watermarking scheme benchmark where different types of image watermarking scheme attacks are divided into categories such as signal enhancement, compression, scaling, cropping, shearing, rotation, linear transformations, other geometric transformations and random geometric distortions. These attacks are divided into three sections according to their properties as described in [25]. As a representative, Lena image figure has been shown under different types of attacks.

Enhancement technique attacks

(i) Low-pass filtering: Low-pass filtering operation is used to remove high frequency noise from a signal. To prove the robustness of the proposed technique against low-pass filter, Gaussian low-pass filtering attack with six different size parameters (2 × 2, 3 × 3, 5 × 5, 7 × 7, 9 × 9, 11 × 11) are applied on selected standard test images. With the increment of filter order size, high frequency components of watermarked image are attenuated by the low-pass filtering operation. Modified watermarked image under Gaussian low-pass filtering attack (3 × 3) and its corresponding recovered watermark logo are presented in figure 5a. BER and NC values of recovered watermark, from table 2, conclude that recovered watermark data of this proposed method survive the Gaussian low-pass manipulation filtering attack. Data from table 2 establish the consistency of recovered watermark data in the Gaussian low-pass filtering attack.
Figure 5.

Result under different types of attack and recovered watermark images using (a) Gaussian low-pass filter (3,3), (b) median filter (3,3), (c) Wiener filter (3,3), (d) average filter (3,3), (e) image sharpening, (f) histogram equalization, (g) gamma attack (γ = 2), (h) gamma attack (γ = 0.5), (i) salt and pepper noise (density = 0.01), (j) speckle noise (var = 0.01), (k) Gaussian noise (M = 0, var = 0.01), (l) rotation clockwise 5°, (m) cropping (256 × 256 by white), (n) scaling (zoomout = 2, zoomin = 0.5), (o) cut (40 columns), (p) translation (30,20), (q) image shearing (0.1, −0.2), (r) JPEG compression, Q = 50, (s) histogram equalization + salt and pepper noise (density = 0.01) and (t) JPEG compression Q = 50 + cropping (128 × 128 by white).

Table 2.

NC and BER of the extracted watermark under Gaussian low-pass filter attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) Gaussian low-pass filter (2,2)0.80120.21820.80620.20920.84240.17560.79130.2144
(B) Gaussian low-pass filter (3,3)0.82690.19380.81720.20350.84980.17890.81830.2079
(C) Gaussian low-pass filter (5,5)0.82910.19120.81690.20470.84930.19020.81830.2079
(D) Gaussian low-pass filter (7,7)0.82910.19120.81690.20470.84930.19020.81830.2079
(E) Gaussian low-pass filter (9,9)0.82910.19120.81690.20470.84930.19020.81830.2079
(F) Gaussian low-pass filter (11,11)0.82910.19120.81690.20470.84930.19020.81830.2079
(ii) Median filtering: In common image enhancement application, a median filter is not often used to achieve blurring rather than it is used in the noise reduction process. Basically, median filter modifies the centre pixel value of the window with the middle value of the sorted pixel values. The proposed scheme is examined against median filtering attacks with different window sizes. Recovered watermark logo and its corresponding median filtering (3 × 3) modified image are shown in figure 5b. BER and NC values of recovered watermark prove the robustness and steadiness of this scheme against median filtering attack. BER and NC values of recovered watermark in table 3 provide enough evidence to demonstrate the steadiness of the method.
Table 3.

NC and BER of the extracted watermark under median filter attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) median filter (2,2)0.80190.20130.80540.20320.84830.17180.80290.2042
(B) median filter (3,3)0.78250.23920.78400.22950.79330.20610.78320.2235
(C) median filter (5,5)0.77410.26650.77910.24700.78180.21740.77470.2355
(D) median filter (7,7)0.76600.26450.78820.23640.75410.25920.76600.2510
(E) median filter (9,9)0.76060.26280.78650.22370.74800.27630.76200.2566
(F) median filter (11,11)0.76070.26620.75200.26250.74460.27850.76410.2637
(iii) Wiener filtering: To simulate the effects of two-dimensional linear predictive image coding, Wiener filter is applied. With the improvement of prediction filter order size, the model becomes closer to the watermarked image block. So, estimation-based attack becomes easier, if the attacker has some basic knowledge about the watermark's embedding process. Image denoising is one of the malicious estimation based attacks. This technique is tested against Wiener filtering attack under different size parameters. Wiener filtering modified image and corresponding logo is depicted in figure 5c. Analyses of NC and BER values of table 4 exhibit the consistency of the recovered watermark data and confirm the reliability of the proposed scheme.
Table 4.

NC and BER of the extracted watermark under Wiener filter attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) Wiener filter (2,2)0.82810.19890.82650.27420.87140.14450.83510.1719
(B) Wiener filter (3,3)0.78920.23660.80300.20210.81400.20720.78810.2259
(C) Wiener filter (5,5)0.78030.24210.80120.20980.76820.25130.76640.2474
(D) Wiener filter (7,7)0.77580.23890.79260.21800.76090.25740.76840.2432
(E) Wiener filter (9,9)0.76080.24980.78790.23760.75370.26840.75440.2627
(F) Wiener filter (11,11)0.75270.25590.76840.25130.75090.26900.74790.2682
(iv) Average filtering: Average filtering is one of the well known image enhancement technique attacks and one of the denoising attacks. An average filter is applied to replace each sample of the watermarked image with the average value from the set of W × W neighbouring pixels or W window size. This scheme is verified against average filtering attack, as shown in figure 5d. NC and BER values of recovered watermark data demonstrate the inverse proportionality and proportionality with the window size. This is provided in table 5.
Table 5.

NC and BER of the extracted watermark under average filter attack to Lena, Pepper, Baboon and Barbara Image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) average filter (2,2)0.80120.20820.80620.20960.84240.17560.79130.2144
(B) average filter (3,3)0.76170.25560.77720.23340.78540.21240.77720.2413
(C) average filter (5,5)0.75810.25730.77710.23390.76920.23970.76470.2406
(D) average filter (7,7)0.75470.26380.76490.24460.76410.24450.75300.2688
(E) average filter (9,9)0.74940.26220.75220.26530.75420.26720.74460.2637
(F) average filter (11,11)0.74310.27610.74280.27040.75100.26630.73840.2755
(v) Gamma correction: Gamma correction is one of the popular image enhancement techniques to adjust poor image display quality. Also, sometimes intentionally or unintentionally, image is enhanced by power law transformation or gamma correction method. Figure 5g,h shows watermarked image after applying gamma correction with two different gamma values. Consistency of NC and BER values of recovered watermark data in shown in table 6.
Table 6.

NC and BER of the extracted watermark under gamma correction attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) gamma attack (γ = 3)0.89310.22070.88300.13250.87810.14030.85610.1407
(B) gamma attack (γ = 2)0.91070.10920.91590.10030.90020.10320.92550.0937
(C) gamma attack (γ = 0.75)0.96690.05230.96490.05580.93160.08100.95390.0623
(D) gamma attack (γ = 0.5)0.95230.06670.92650.09710.87300.13530.88100.1369
(E) gamma attack (γ = 0.25)0.87540.14980.87970.12490.85160.14330.78790.1915
(vi) Image sharpening: Sharpening attack is used to detect high-frequency noise introduced by unauthorized users. This proposed method is tested against sharpening operation as shown in figure 5e. NC and BER values of recovered watermark data (under image sharpening image enhancement attack) are given in table 7.
Table 7.

NC and BER of the extracted watermark under different types of attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) image sharpening0.95290.06150.94270.07230.93150.07360.94280.0707
(B) histogram equalization0.95300.06680.98060.03440.96130.05360.97750.0373
(vii) Histogram modification: To compensate the clarity and brightness of an image, sometimes histogram of the image is modified. The histogram modification, enhancement technique is common to improve the visual quality of any image. The proposed technique is tested against histogram modification operation as shown in figure 5f. NC and BER values of recovered watermark data are given in table 7. Result under different types of attack and recovered watermark images using (a) Gaussian low-pass filter (3,3), (b) median filter (3,3), (c) Wiener filter (3,3), (d) average filter (3,3), (e) image sharpening, (f) histogram equalization, (g) gamma attack (γ = 2), (h) gamma attack (γ = 0.5), (i) salt and pepper noise (density = 0.01), (j) speckle noise (var = 0.01), (k) Gaussian noise (M = 0, var = 0.01), (l) rotation clockwise 5°, (m) cropping (256 × 256 by white), (n) scaling (zoomout = 2, zoomin = 0.5), (o) cut (40 columns), (p) translation (30,20), (q) image shearing (0.1, −0.2), (r) JPEG compression, Q = 50, (s) histogram equalization + salt and pepper noise (density = 0.01) and (t) JPEG compression Q = 50 + cropping (128 × 128 by white). NC and BER of the extracted watermark under Gaussian low-pass filter attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under median filter attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under Wiener filter attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under average filter attack to Lena, Pepper, Baboon and Barbara Image. NC and BER of the extracted watermark under gamma correction attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under different types of attack to Lena, Pepper, Baboon and Barbara image. (viii) Noise addition: Most addressed non-geometrical attack in signal processing is the addition of additive noise and uncorrelated multiplicative noise. The proposed scheme is tested against salt and peppers, speckle and Gaussian noise.

Noise addition attack

Salt and pepper noise is caused by pixel's error at the time of data transmission. In salt and pepper noise, corrupted pixel values are either set to zero or maximum value or single bits flipped over. This pixel's value modification gives the image salt and pepper-like appearance where noise density is calculated by the alteration of percentage of pixels. This method is tested against salt and pepper noise with six different noise densities. Salt and pepper noise modified watermarked image with noise density 0.01 is shown in figure 5i. In salt and pepper noise, inverse proportionality of NC and proportionality of BER of recovered watermark with noise density is given in table 8.
Table 8.

NC and BER of the extracted watermark under salt and pepper noise attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) salt and pepper noise (density = 0.5)0.83840.17480.83570.18510.82940.19390.84860.1782
(B) salt and pepper noise (density = 0.3)0.85990.16410.84970.16790.85260.16370.86920.1460
(C) salt and pepper noise (density = 0.1)0.87930.12800.86040.14600.89840.11270.89810.1200
(D) salt and pepper noise (density = 0.05)0.90090.10650.88710.13150.90740.10310.90480.1031
(E) salt and pepper noise (density = 0.03)0.91370.09320.90960.10340.91140.12170.92110.0901
(F) salt and pepper noise (density = 0.01)0.93860.07390.91020.08750.95370.07460.93620.0873
NC and BER of the extracted watermark under salt and pepper noise attack to Lena, Pepper, Baboon and Barbara image. Speckle noise is one of the multiplicative noises where speckle exists inherently as a granular noise. The variance of a single pixel is equal to the variance of the local area that is centred on that pixel. This method is tested against speckle noise under six different noise variances. Manipulated watermarked image by speckle noise with variance = 0.01 is portrayed in figure 5j. NC values of recovered watermark exhibit inverse proportionality with speckle image noise variance where BER shows proportionality characteristic. This is tabulated in table 9.
Table 9.

NC and BER of the extracted watermark under speckle noise attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) speckle noise (var = 0.5)0.90040.10630.91990.10170.89780.12470.93970.0696
(B) speckle noise (var = 0.3)0.92330.09500.93250.07900.93710.08640.95980.0678
(C) speckle noise (var = 0.1)0.94530.07420.94350.07120.94030.07860.96100.0667
(D) speckle noise (var = 0.05)0.97030.05970.95900.06340.94760.07180.96430.0597
(E) speckle noise (var = 0.03)0.97500.05820.96350.05400.95450.06340.96670.0508
(F) speckle noise (var = 0.01)0.98590.04640.97430.04850.97050.04980.97830.0453
NC and BER of the extracted watermark under speckle noise attack to Lena, Pepper, Baboon and Barbara image. Gaussian noise is one of the commonly used statistical noise processing operations. The amount of noise is varied by its variance with zero mean. For robustness clarification, this statistical noise is added to the watermarked images of this method. Additions of Gaussian noise under different variances are depicted in table 10. Watermarked image with additive Gaussian noise (variance = 0.01, mean = 0) is described in figure 5k.
Table 10.

NC and BER of the extracted watermark under Gaussian image noise attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) Gaussian noise (M = 0, var = 0.5)0.90180.08930.89290.12600.90840.10990.91630.0983
(B) Gaussian noise (M = 0, var = 0.3)0.91230.07500.90240.10790.91850.09240.92460.0832
(C) Gaussian noise (M = 0, var = 0.1)0.92520.07250.91590.09480.92980.08420.93950.0797
(D) Gaussian noise (M = 0, var = 0.05)0.93620.07130.92760.07270.93840.07920.94910.0691
(E) Gaussian noise (M = 0, var = 0.03)0.94900.06070.93960.06710.94070.07140.95120.0677
(F) Gaussian noise (M = 0, var = 0.01)0.95570.05960.94510.05390.94430.06080.95770.0569
NC and BER of the extracted watermark under Gaussian image noise attack to Lena, Pepper, Baboon and Barbara image.

Geometric transformation attacks

(ix) Rotation: The commercial value of an image and its small rotated version is not differing too much. But watermark data can be affected by the little bit of rotation. To verify robustness against rotation geometric attack, the proposed technique is tested against rotation attack with different angles in clockwise and anticlockwise directions. BER and NC values of recovered watermark image are demonstrated in table 11. Figure of rotation attack under 5° is presented in figure 5l. Recovered watermark image, after rotation attack, is also given in the same figure. This image is not obscure and distinctively represents the watermark logo.
Table 11.

NC and BER of the extracted watermark under rotation attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) rotation (clockwise 5°)0.82460.20100.86590.15220.84480.17750.83310.1671
(B) rotation (anticlockwise 5°)0.81330.21390.86010.15340.84320.16780.83950.1719
(C) rotation (clockwise 25°)0.76710.25160.80550.20650.80420.20630.78760.2380
(D) rotation (anticlockwise 25°)0.77340.24310.80740.20490.80280.20910.77560.2408
(E) rotation (clockwise 45°)0.75410.26340.78560.23820.77260.24510.74520.2708
(F) rotation (anticlockwise 45°)0.76050.24010.78480.24150.76250.25410.75010.2713
(x) Cropping: To capture the required part of an object, cropping/focusing is done on the necessary part. The rest of an object or image is neglected. Cropping operation is also used to change aspect ratio of an image or to improve image framing. Robustness of the proposed technique is tested against cropping operation by changing the cropping window size. Watermarked images of the proposed scheme are tested against cropping geometric attack under different cropping window sizes. For this proposed method, 256 × 256, 128 × 128 and 64 × 64 cropping window size is used. This cropping window may be black or white alternatively. One cropping attack image where 256 × 256 pixels are replaced by white window is shown in figure 5m. Recovered watermark images NC and BER values provide enough evidence of the stability of the proposed method. Recovered watermark images NC and BER values are presented in table 12.
Table 12.

NC and BER of the extracted watermark under cropping attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) cropping (256 × 256 by black)0.98450.03270.98380.04460.97480.04200.96470.0452
(B) cropping (256 × 256 by white)0.98980.02190.98890.03440.97820.03680.96800.0307
(C) cropping (128 × 128 by black)0.99250.01250.99020.02040.98400.03570.98340.0221
(D) cropping (128 × 128 by white)0.99320.01190.99420.01070.98530.03400.98460.0198
(E) cropping (64 × 64 by black)0.99440.00900.99360.00970.99180.01810.99050.0149
(F) cropping (64 × 64 by white)0.99470.00860.99390.01050.99200.01450.99270.0096
(xi) Scaling: Image may be resized intentionally or unintentionally in uniform/non-uniform manner. For example, scaling of the image is a normal scenario for scanning of a hard copy image. So, the proposed scheme is tested against scaling operation to prove the robustness. At first, the image is resized by multiplying by a scaling factor. Then again the image is scaled back to its original size. As a representative, one watermarked image and corresponding recovered logo under this scaling geometric attack are represented in figure 5n. NC and BER values of recovered watermark images are given in table 13.
Table 13.

NC and BER of the extracted watermark under scaling attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) scaling (zoomout = 0.5, zoomin = 2)0.79260.22810.80290.21770.82820.19450.78910.2307
(B) scaling (zoomout = 0.25, zoomin = 4)0.78320.26650.79680.22070.80320.20090.79960.2203
(C) scaling (zoomout = 0.125, zoomin = 8)0.77610.27570.82530.19740.85040.17420.84090.1701
(D) scaling (zoomout = 2, zoomin = 0.5)0.86440.15770.84850.17840.89760.13650.85810.1638
(E) scaling (zoomout = 4, zoomin = 0.25)0.86650.14560.84960.16790.89870.12520.85990.1627
(F) scaling (zoomout = 8, zoomin = 0.125)0.86720.15420.85070.15520.89860.11470.86010.1562
(xii) Deletion of lines or columns: Very frequently some part of the image is removed or deleted intentionally or unintentionally. This is one of the geometric transformation attacks that have been widely used against some simple copyright protection watermarking systems. Sometimes, this deletion of lines or columns has the same effect as image scaling. The proposed technique is verified against this type of attack for better robustness. In this experiment, some lines (rows) or columns of watermarked images are deleted. For row deletion, some upper rows and lower rows, where row numbers are the same, are deleted. For column deletion, the same numbers of columns from left and right side of the watermarked images are deleted. One 40 column deleted watermarked image is shown in figure 5o. To prove the consistency of the proposed scheme, NC and BER values of recovered watermark images under different row and column sizes are shown in table 14.
Table 14.

NC and BER of the extracted watermark under deletion of lines or columns attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) cut (20 rows)0.98900.03400.98890.04830.99140.01480.98940.0395
(B) cut (20 columns)0.99050.01940.99390.01400.99480.00930.99470.0148
(C) cut (30 rows)0.98070.03610.98030.03020.98610.03710.98160.0314
(D) cut (30 columns)0.98820.02620.98760.03230.98830.02510.99100.0131
(E) cut (40 rows)0.96040.05510.97250.03940.97560.03810.96370.0507
(F) cut (40 columns)0.96420.04350.97380.03760.96180.04450.96480.0495
(xiii) Translation: Sometimes, deletion of part of an image and geometric transformation of the remaining part of the image is done in such a way that it looks like the image is translated into a new coordinate. To provide better robustness against translation attack, the proposed technique is verified against it by varying translation coordinate. In figure 5p, one translation attack image with translation coordinate (30,20) is presented and a corresponding recovered watermark is shown. To explicitly confirm the robustness of the proposed scheme, NC and BER values of recovered watermark image are shown in table 15.
Table 15.

NC and BER of the extracted watermark under translation attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) image translation (10,10)0.81920.20130.86040.16790.84950.18080.86920.1679
(B) image translation (10,20)0.80640.21240.85730.17760.83530.19480.81160.2065
(C) image translation (20,10)0.79460.21970.85080.18180.83330.19890.80800.2178
(D) image translation (20,20)0.79720.22940.82060.19400.79530.22860.76300.2558
(E) image translation (20,30)0.78210.23840.78100.23330.76870.25650.75440.2621
(F) image translation (30,20)0.77030.25540.77820.24670.76230.23990.73700.2969
(xiv) Shearing: To confirm the robustness against shear operation, the proposed technique is tested against image shearing with different parameters. Actually, shearing of an image means distortion of the image in the x-direction or y-direction or in both directions. Here one watermarked image is sheared in both directions with different parameter values, as shown in figure 5q. Recovered watermark images BER and NC values are tabulated in table 16 to prove robustness consistency under shearing operation.
Table 16.

NC and BER of the extracted watermark under shearing attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) image shearing (0.1,0.1)0.85560.17040.79450.22030.79470.22490.82620.1921
(B) image shearing (−0.1,0.1)0.82990.19060.76860.25130.78970.24090.79270.2361
(C) image shearing (0.1, −0.1)0.82170.20210.75820.26920.78060.24330.78830.2439
(D) image shearing (−0.1, −0.1)0.81870.19710.74660.27300.74710.28270.77740.2512
(E) image shearing (−0.1,0.2)0.78640.23100.72990.28990.72570.32750.73640.2966
(F) image shearing (0.1, −0.2)0.79120.24110.73920.27640.72310.31560.73670.2881
NC and BER of the extracted watermark under rotation attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under cropping attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under scaling attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under deletion of lines or columns attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under translation attack to Lena, Pepper, Baboon and Barbara image. NC and BER of the extracted watermark under shearing attack to Lena, Pepper, Baboon and Barbara image.

Compression attack

(xv) JPEG compression: JPEG compression is one of the most widely used common manipulation/compression attacks. Any effective watermark should be rigid to some degree of compression. The proposed scheme is checked against JPEG compression by changing quality factor. One compression attack image (quality factor = 50) along with recovered logo is given in figure 5r. Recovered watermark logos NC and BER values from the compressed watermarked image under different quality factor are given in table 17. Results in the table provide enough data to confirm the improvement of recovered watermark quality with the increment of JPEG compression quality factor.
Table 17.

NC and BER of the extracted watermark under JPEG attack to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
attackNCBERNCBERNCBERNCBER
(A) JPEG compression Q = 200.90190.11630.88970.13160.93960.08050.90710.1126
(B) JPEG compression Q = 250.91170.10240.89560.12530.94680.07230.90910.1020
(C) JPEG compression Q = 300.92630.09840.90180.11820.95590.06920.93270.0843
(D) JPEG compression Q = 400.93810.08530.90840.10050.95970.06760.94340.0579
(E) JPEG compression Q = 500.95000.05240.91620.09350.96440.05090.94790.0541
(F) JPEG compression Q = 700.96350.04500.93200.07560.96770.04950.96640.0448
NC and BER of the extracted watermark under JPEG attack to Lena, Pepper, Baboon and Barbara image.

Combinational attack

For robustness test, some combination of above discussed attacks is applied to all the standard test images. There can be lots of combinational attacks, but some of the different combinational attacks are presented as follows: (xvi) Combinational attack: For robustness clarity, combination of one enhancement technique attack (histogram equalization) and one geometric attack (cropping (128 × 128 by white)); combination of one enhancement technique attack (histogram equalization) and one noise addition attack (salt and pepper noise (density = 0.01)); combination of one enhancement technique attack (histogram equalization) and one compression attack (JPEG compression Q = 50); combination of one noise addition attack (salt and pepper noise (density = 0.01)) and one geometric attack (cropping (128 × 128 by white)); combination of one noise addition attack (salt and pepper noise (density = 0.01)) and one compression attack (JPEG compression Q = 50); combination of one compression attack (JPEG compression Q = 50) and one geometric attack (cropping (128 × 128 by white)) are applied on watermarked images of the proposed scheme (as given in table 18). For combinational attack, two of the attack images of this combinational attack are portrayed in figure 5s,t. Recovered watermarks for these attacks are also given in the same figure (figure 5s,t).
Table 18.

NC and BER of the extracted watermark under different combinational attacks to Lena, Pepper, Baboon and Barbara image.

Lena
Pepper
Baboon
Barbara
combinational attackNCBERNCBERNCBERNCBER
(A) histogram equalization + salt and pepper noise (density = 0.01)0.87810.14130.86870.15800.85580.16290.89230.1208
(B) histogram equalization + cropping (128 × 128 by white)0.92150.10900.91880.10360.90890.10370.92760.0903
(C) histogram equalization + JPEG compression Q = 500.93350.08890.89390.12040.92690.10610.90500.1289
(D) salt and pepper noise (density = 0.01) + cropping (128 × 128 by white)0.87570.13910.85290.17160.85400.16550.86240.1597
(E) salt and pepper noise (density = 0.01) + JPEG compression Q = 500.88650.14750.84260.18890.89290.12420.89430.1263
(F) JPEG compression Q = 50 + cropping (128 × 128 by white)0.89980.11420.90760.12150.91730.09160.92380.1052
NC and BER of the extracted watermark under different combinational attacks to Lena, Pepper, Baboon and Barbara image.

Comparative analysis

The proposed scheme is compared with some existing algorithm in tabular format with some predefined attacks. Then individual comparison is done with some existing methods as graphical plot (figures 6–10). Better results are shown as bold data in table 19.
Figure 6.

Comparison of proposed scheme with Lai & Tsai [16].

Figure 10.

Comparison of proposed scheme with Makbol & Khoo [12].

Table 19.

Comparative analysis of proposed scheme with some existing scheme in terms of various attack (‘—’ represent this experiment is not done in this technique; better results are in bold).

attackProposed schemeLai & Tsai [16]Rastegar et al. [18]aRastegar et al. [18]bLagzian et al. [17]Ganic & Eskicioglu [15]Makbol & Khoo [12]
(A) salt and pepper noise (density 0.3)0.85990.69670.75150.82580.8926
(B) salt and pepper noise (density 0.001)0.97530.99850.9940
(C) speckle noise (var = 0.01)0.98590.93930.96090.96670.952
(D) speckle noise (var = 0.04)0.97290.88960.8730
(E) Gaussian noise (M = 0, var = 0.5)0.90180.59490.79260.820.88500.8953
(F) Gaussian noise (M = 0, var = 0.005)0.96270.68380.9250
(G) Gaussian filtering (3 × 3)0.82690.93740.80230.98430.987
(H) median filtering (3 × 3)0.78250.78860.75340.97060.99420.982
(I) Wiener filtering (3 × 3)0.78920.88450.98240.95690.984
(J) sharpening0.95290.79840.96870.95110.69900.932
(K) histogram equalization0.95300.98620.96480.96280.85300.82300.990
(L) gamma correction (0.7)0.97120.99820.95400.9935
(M) gamma correction (0.8)0.96080.99800.72030.92170.96750.9950
(N) JPEG compression Q = 300.92630.987
(O) JPEG compression Q = 100.89150.85320.98240.98430.972
(P) JPEG compression Q = 50.87940.79260.85320.93540.952
(Q) JPEG compression 50%0.94140.9983
(R) scaling (zoomout = 0.5, zoomin = 2)0.79260.78470.51270.9530.94000.948
(S) rotation (angle = 2°)0.86270.74560.50680.96280.981
(T) rotation (angle = −20°)0.76510.97800.96300.9823
(U) rotation (angle = −50°)0.74190.86300.9850
(V) cut 200.99050.95120.989
(W) shift 2%0.81920.99890.9940
Comparison of proposed scheme with Lai & Tsai [16]. Comparison of proposed scheme with Rastegar et al. [18]. Comparison of proposed scheme with Lagzian et al. [17]. Comparison of proposed scheme with Ganic & Eskicioglu [15]. Comparison of proposed scheme with Makbol & Khoo [12]. Comparative analysis of proposed scheme with some existing scheme in terms of various attack (‘—’ represent this experiment is not done in this technique; better results are in bold).

Conclusion

In this paper, a DCT-SVD based robust hybrid image watermarking scheme using Arnold scrambling has been proposed. Special attention is given to security issues such as (i) lower invisibility, (ii) false positive detection problem and (iii) diagonal line problem of SVD-based watermarking algorithms. The proposed scheme is tested against common image manipulation attacks, geometric transformation attacks and compression attacks to confirm the imperceptibility and robustness property effectively. Experimental results section establishes the supremacy of the hybrid domain watermarking technique over their single counterpart. This scheme is compared with some existing schemes in terms of various attacks and in terms of different watermarking embedding characteristics (as presented in table 20). This comparative analysis confirms the superiority of this proposed scheme.
Table 20.

Comparative study of our proposed scheme with some existing schemes.

descriptionproposed schemeLai & Tsai [16]Rastegar et al. [18]Lagzian et al. [17]Ganic & Eskicioglu [15]Makbol & Khoo [12]
type of schemeblindblindnon-blindnon-blindnon-blindblind
type of transformDCT + SVDDWT + SVDRadon + DWT + SVDRDWT + SVDDWT + SVDRDWT + SVD
watermark action before embeddingno actionno actionSVDSVDSVDno action
size of host image512 × 512512 × 512257 × 257512 × 512512 × 512512 × 512
size of watermark image256 × 256256 × 25633 × 33512 × 512256 × 256512 × 512
tested host imageLena, Pepper, Baboon, BarbaraLenaLena, Pepper and BaboonLenaLenaLena, Pepper and Baboon
type of watermarkGreyGreyGreyGreyGreyGrey
False positive problemnoyesyesyesyesyes
Comparative study of our proposed scheme with some existing schemes.
  1 in total

1.  Secure spread spectrum watermarking for multimedia.

Authors:  I J Cox; J Kilian; F T Leighton; T Shamoon
Journal:  IEEE Trans Image Process       Date:  1997       Impact factor: 10.856

  1 in total
  1 in total

1.  Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness.

Authors:  Priyanka Singh; Kilari Jyothsna Devi; Hiren Kumar Thakkar; José Santamaría
Journal:  Entropy (Basel)       Date:  2021-12-08       Impact factor: 2.524

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.