Literature DB >> 35791414

A sophisticated and provably grayscale image watermarking system using DWT-SVD domain.

Seif Eddine Naffouti1, Anis Kricha2,3, Anis Sakly1.   

Abstract

Digital watermarking has attracted increasing attentions as it has been the current solution to copyright protection and content authentication in today's digital transformation, which has become an issue to be addressed in multimedia technology. In this paper, we propose an advanced image watermarking system based on the discrete wavelet transform (DWT) in combination with the singular value decomposition (SVD). Firstly, at the sender side, DWT is applied on a grayscale cover image and then eigendecomposition is performed on original HH (high-high) components. Similar operation is done on a grayscale watermark image. Then, two unitary and one diagonal matrices are combined to form a digital watermarked image applying inverse discrete wavelet transform (iDWT). The diagonal component of original image is transmitted through secured channel. At the receiver end, the watermark image is recovered using the watermarked image and diagonal component of the original image. Finally, we compare the original and recovered watermark image and obtained perfect normalized correlation. Simulation consequences indicate that the presented scheme can satisfy the needs of visual imperceptibility and also has high security and strong robustness against many common attacks and signal processing operations. The proposed digital image watermarking system is also compared to state-of-the-art methods to confirm the reliability and supremacy.
© The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022.

Entities:  

Keywords:  Copyright protection; Digital image watermarking; Discrete wavelet transform (DWT); Imperceptibility; Robustness; Singular value decomposition (SVD)

Year:  2022        PMID: 35791414      PMCID: PMC9247949          DOI: 10.1007/s00371-022-02587-y

Source DB:  PubMed          Journal:  Vis Comput        ISSN: 0178-2789            Impact factor:   2.835


Introduction

Owing to the popularity of the Internet and the rapid growth of multimedia technology, interactive media have become the most important gadgets for transmitting information [1]. Day by day, the scenario of the global pandemic situations is increasing, which makes the mode of business and communication is converted into digital form. This means that there are a lot of data are moving worldwide in the digital platform. Consequently, due to the pandemic situation of COVID-19, exchanging digital multimedia data has become a very frequently task and has caused considerable interest within the community. However, such open access to Internet makes way for digital multimedia data such as text, image, audio and video to be easily duplicated, modified and redistributed without the owner’s permission. So, protecting ownership of digital media content has become a paramount issue. Digital watermarking stands here as suitable solution to verify the authenticity and to solve ownership issues. Digital watermarking is a technique for hiding data, which can be a logo for an organization, digital signature or image of an author, into multimedia object like text, image, audio or video. Furthermore, high security requirements of images in many scenarios such as military and trade stimulate the development of digital image encryption [2-5] and forensic algorithms [6]. Transparency and robustness are considered two mainly important properties for digital watermarking algorithm [7], as well they are measured using a quality metric: peak signal-to-noise ratio and normalized correlation, respectively. According to the domain in which the watermark is inserted, digital watermarking techniques could be classified into two main categories that are in spatial domain and in frequency domain transform. The least significant bit (LSB) substitution, pixel value differencing (PVD), exploiting modification direction (EMD), and modulus function (MF) are some of the well-known approaches in spatial domain [8]. On the contrary, transformed domain-based watermark embedding technique inserts a watermark by altering the transformed coefficients of the original image. There are a lot of transform domain watermarking methods which are available in the various literature such as discrete wavelet transform (DWT) [9], singular value decomposition (SVD) [10], discrete cosine transforms (DCT) [11], discrete Fourier transforms (DFT) [12], discrete Hadamard transform (DHT) [13] and redundant wavelet transform (RWT) [14]. It is said that, in terms of resisting attacks, the frequency domain techniques are not only better than most of spatial domain techniques but also further complex than the spatial method [15] and require higher computational cost [16]. Depending on its objective, data hiding can be divided into watermarking for copyright protection and steganography for securing confidentiality [17]. Researchers have proposed a lot of effective techniques to overcome some of the inherent limitations of data hiding. Therefore, the design of a simple and efficient, yet sufficiently imperceptible and robust watermarking method still constitutes a challenging task. The LSB approaches hide the secret data directly inside the cover image pixel [18]. Wu and Hwang [19] proposed an improved LSB substitution using a group of three pixels as an embedding unit to hide three bit of secret data. The possible modification for each pixel is at most ±1. Sahu and Swain [20] improved the hiding capacity (HC) using the concept of bit differencing and modified LSB matching. The motivation behind pixel value differencing (PVD) steganography [21] is to make a clear distinction among the smooth and textured areas of an image. The smooth areas are the low-intensity sections where the neighboring pixel values are close to each other, but texture areas have a considerable difference. Hence, the smooth areas cannot tolerate high changes as compared to the textured areas. An adaptive PVD approach has been proposed by Swain [22], to improve the HC. The data embedding is performed in both horizontal and vertical directions. Various articles have been proposed in the literature using PVD approaches [23, 24]. Aiming to secure information, and copyright protection authentication, the solution is also to apply an appropriate hybrid method. Wu et al. [25] combined the LSB substitution and PVD approach. This improved the HC as compared to the PVD approach of Wu and Tsai [21]. The work has been carried out by many researchers [26-28] to improve the HC as well as security. In the same context, a lot of attention has also been paid to combine the frequency domain with the eigendecomposition values of the image, i.e., the use of the frequency channels and thus the eigenvalues and their corresponding eigenfunctions of the image. Due to its excellent spatio-frequency localization properties, the DWT is very suitable to identify areas in the cover image where a watermark can be imperceptibly embedded. One of attractive mathematical properties of SVD is that slight variations of singular values do not affect the visual perception of the cover image, which motivates the watermark embedding procedure to achieve better transparency and robustness. Consequently, many image watermarking techniques combining these two transform methods have been proposed. For example, Yasmeen and Uddin [29] proposed an improved DWT–SVD-based hybrid approach to further ensure the robustness and protection of digital data. This method contrasted with existing schemes and proved to be a good mechanism for both grayscale and color images. Makbol et al. [30] used DWT-SVD image transform and human visual system (HVS) to improve performance of watermarking scheme where watermark was embedded by modifying several elements in its U matrix. Recently, similar work also has been pursued by Ahmadi et al. [31] in which a hybrid (DWT–SVD) watermarking scheme, human visual system and an intelligence optimization algorithm known as PSO (particle swarm optimization) are used to provide high robustness and capacity. However, their method is not invariant against rotational attacks. Moreover, its security needs to be improved by encrypting the watermark image before embedding. DWT and SVD were also employed in a robust and secure watermarking scheme by Ansari et al. [32]. Zear et al. [33] studied a blind watermarking method by fusing DWT, DCT and SVD, where the noise effects in watermark extraction are suppressed by the back propagation neural network (BPNN). Liu Y et al. [34] designed a non-blind watermarking scheme with DWT and SVD, the security of watermarks has been improved significantly with RSA encryption algorithm. For further detailed description on the aforementioned approaches, we refer keen reader to [35-37]. Further, Liao et al. [38] introduced a novel amplifying channel modification probabilities (ACMP) approach for color images. The traditional steganographic approaches conceal the secret data equally in the RGB channels. On the contrary, Liao et al. explored the correlations among the RGB channels and conceals the data adaptively to achieve high HC and resistance against various steganalysis attacks. Various steganographic approaches utilizing color images were presented in the literature [39, 40]. Liao et al. in [41] have newly proposed two payload strategies, which are based on the image texture complexity and the distortion distribution as indicator for secure capacity of each cover image. These strategies are applied on single image steganographic algorithms and experiments shown better resistance to modern universal pooled steganalysis compared to existing methods. Example of two-level DWT transform

Contributions

This paper introduces a sophisticated hybrid SVD-DWT for an efficient image watermarking technique for grayscale image hiding. Because of the conflict between invisibility and robustness, the insertion of watermark is usually made in LH, HL and HH sub-bands to maintain the quality of the original image. As HVS (human visual system) is less sensitive to high-frequency parts, HH sub-band is chosen for embedding watermark as it contains finer details and contributes insignificantly toward signal energy. Hence, watermarking embedding in this region will furnish better image quality, but at the same time yields to poor results when extracting watermark. However, our proposed technique has highly overcome this issue in the watermark extraction process. We aggregated DWT-SVD domain with the chosen HH sub-band in which the watermark should be embedded and extracted too. At last, with these observations in mind, we construct our watermarking approach and demonstrate that guarantees to achieve high invisibility and robustness. The rest of the paper is structured as follows. Section 2 shows the relevant theoretical background information. The watermark embedding and extraction algorithms proposed in this paper are described in detail in Sect. 3. Section 4 introduces the image quality measures. Section 5 presents the experimental setup and simulation results of the proposed approach with imperceptibility, robustness, computational complexity and capacity analysis and compares its performance with other related algorithms. Finally, conclusions and future work are provided in Sect. 6.

Background

This section is devoted to the brief explanations of the concepts being used in the proposed scheme such as DWT and SVD transforms. Interested to know more in detail may refer to the respective studies [10, 42–47].

Discrete wavelet transform (DWT)

Discrete wavelet transform (DWT) is widely used as an ideal tool in the field of frequency analyzing and signal processing, including image watermarking. It is indeed a multiscale signal analysis method, inherits and develops the idea of Fourier transform fixed resolution, having features of multiresolution and local signal analysis [44]. The strength of DWT over Fourier transform is its ability to produce a temporal resolution in which it captures both frequency and location information. One-level DWT or one-dimensional DWT splits an original image into four non-overlapping multiresolution sub-bands, including a low-frequency sub-band LL and three high-frequency sub-bands HL, LH, HH [42, 43]. Among them LL, standing for the coarse-level coefficients is the most similar sub-image to the original image, called approximation sub-band. The other three sub-bands LH, HL and HH represent the finest scale wavelet coefficients denoting horizontal direction detail, vertical and diagonal detail direction image, respectively. Moreover, the low-frequency sub-band can be further decomposed into another four different sub-bands. Two-level DWT decomposition is shown in Fig. 1, where the low-frequency component represents the most contents of the original image and the high-frequency represents the edge, contour and texture characteristics of the original image. Figure 1b expresses the different frequency schematic picture of the original image ‘Lena,’ and Fig. 1c shows the structures of ‘Lena’ image after the two-level discrete wavelet transform decomposition.
Fig. 1

Example of two-level DWT transform

Singular value decomposition (SVD)

Singular value decomposition (SVD) is a matrix diagonalization efficient algorithm in the numerical linear algebra technique for a variety of applications [10, 45–47]. The basic idea behind the SVD-based watermarking techniques is to find the SVD of the cover image or each block of the cover image and then modify the singular values to embed the watermark. There are three main key features of SVD in digital image watermarking techniques: From the perspective of image processing, an image can be viewed as a matrix with non-negative scalar entries. Let A be a rectangular matrix with size; then according to SVD, it can be decomposed mathematically into three matrices aswhere U and V are orthogonal (or unitary) matrices, i.e., , ; S is non-negative diagonal matrix whose diagonal elements (singular values) coincide with the square roots of the eigenvalues of and arranged in descending order as . Thus, the columns of U are the left singular vectors, whereas the columns of V are the right singular vectors of A. A graphical description of the procedure of SVD of an image is presented in Fig. 2 [48].
Fig. 2

The procedure of SVD decomposition

The singular value of an image has very good stability and noise immunity. When a small perturbation is added to an image, large variation of its singular values does not occur. The singular value in the value sequence obtained by SVD operation of an image specifies the luminance of an image layer, where pairs of singular vectors specify the geometry of the image. The inherent algebraic image properties are demonstrated by the singular values [44, 47]. The extracted watermark image will always be disturbed by the process of geometric manipulations, especially the extraction of blind or semi-blind watermarking algorithm. According to the characteristics of SVD, the cover image is able to withstand certain geometric distortions, if singular value decomposition is performed on the processes of watermark embedding and extraction.

Proposed watermarking system

In this section, grayscale image watermarking approach is proposed. It is based on SVD and DWT techniques. The major goal of this proposal is to embed a grayscale watermark image into a grayscale image without perceptual degradation of watermark taking into account robustness against several kinds of attacks. Moreover, both imperceptibility and robustness can be achieved simultaneously. The suggested algorithm for secure communication of image belongs to two parts: the watermark embedding and extraction algorithm. Embedding and extraction processes are two main phases for image-watermarking scheme. Both parts along with respective flowcharts are described in detail in Sects. 3.1 and 3.2. The procedure of SVD decomposition Block diagram of the proposed embedding algorithm

Embedding process for sending side

A step-by-step procedure of the embedding algorithm at the sender side as illustrated in Fig. 3 is explained below:
Fig. 3

Block diagram of the proposed embedding algorithm

Apply one-level DWT to the original image A to decompose it into four sub-bands as given in Eq. (2). Apply the eigendecomposition SVD to the high-frequency sub-band HH as given in Eq. (3). where the unitary and diagonal matrices are , and ; superscript O corresponds to original image. Repeat steps 1 to 2 for watermark image W and after eigendecomposition the corresponding matrices are , and ; where superscript W represents watermark image. Modify the singular value of the decomposed image with the singular value of the watermark image using a scaling factor which controls the strength of the watermark to be inserted. This is given in (4). Combine the orthogonal matrices of the decomposed original image with the modified singular value matrix to obtain a modified DWT coefficients as given in (5). where T is transpose of a matrix. Apply one-level inverse DWT (iDWT) to resultant image instead of HH sub-band to produce the watermarked image, as shown in (6). Transmit through a secure channel the diagonal matrix of the original image, the unitary matrices and of the watermark image, and the first three non-modified DWT sub-bands of the watermark to be subsequently used at the receiver side for the extraction watermarking process.

Extraction process for receiving side

A step-by-step procedure of the extraction algorithm at the receiver side as illustrated in Fig. 4 is detailed below:
Fig. 4

Block diagram of the proposed extracting algorithm

Apply DWT to the watermarked (possibly distorted) image , that we receive it from the public channel, to decompose it into four sub-bands as given in Eq. (7). where is a mark of probable corruption resultant from attacks. Apply SVD to the high-frequency sub-band as given in Eq. (8). Block diagram of the proposed extracting algorithm The diagonal matrix of the decomposed original image is already received from the private channel. Compute the correlation coefficient (Cr) to measure closeness between the diagonal components and of the decomposed original image and the decomposed watermarked image, respectively, such that where and are the average values of and , respectively. The value of Cr ranges between and . The Cr gives numerical result that expresses how well two diagonal components match. The higher the metric, the more accurate the match. At this stage, even before constructing the watermark, a preliminary decision could be taken to claim that the watermark will be successfully extracted or not. Depending on the Cr value, verify the following conditions: If , this means that the watermarked image was not attacked. So subtract the received singular value of the decomposed original image from the singular value of the decomposed watermarked image and divide the values by the scaling factor to obtain the singular value of the watermark image. This is given in Eq. (9). If not, i.e., which means that the watermarked image was indeed attacked; recompute the singular value of the watermark without dividing by the scaling factor using Eq. (10). The orthogonal matrices of the watermark image are also already received from the private channel; combine them with the recovered singular value matrix to obtain a modified DWT coefficients as given in Eq. (11) By using the obtained sub-band together with the three other sub-bands of one-level DWT of watermark image, recreate the watermark image by performing the one-level inverse DWT, as shown in Eq. (12) Finally, the sending watermark image W and the recovered image are compared using common performance metrics for image quality assessment.

Performance evaluation metrics

Watermarking algorithms are usually evaluated with respect to imperceptibility and robustness. In this paper, PSNR, mean square error (MSE), structural similarity (SSIM) index measure, universal image quality index (UIQI) and normalized correlation (NC) are chosen as quality assessment parameters.

Peak signal to noise ratio

The peak signal-to-noise ratio (PSNR) is used to measure a watermarked image quality. The PSNR, which is measured in decibels, defines the resemblance between an original image and the reconstructed image [49]. In the ideal case, the PSNR should be infinite [50]. In fact, this cannot be accomplished with watermarked image. So, the larger PSNR the better. The PSNR in decibels (dB) can be calculated using Eq. (13).where is the maximum possible pixel value of the grayscale image A.

Mean square error

Mean square error (MSE) is a standard quality measurement. It is the average of the pixel difference between two images. In ideal case, the MSE must be zero. In fact, this is cannot be reached with watermarked image [51]. So, the smaller the value of MSE, the better the quality is. MSE is defined aswhere A is the original image before watermarking, is the watermarked image, and M & N are the original image width and height, respectively.

Structural similarity

Structural similarity (SSIM) index measure is a method for quality assessment used as a performance metric to evaluate invisibility between two images. It is considered as a full reference metric; in other words, the prediction or measurement of image quality is based on an initial distortion-free or uncompressed image as reference. The SSIM index is defined byhere, and are the average of image A and , respectively. and are the variance of image A and , respectively. is the covariance of image A and , respectively. , are used to keep the stabilization of the division with a weak denominator. L is the dynamic range of the pixel-values (typically ), with and by default [52].

Universal image quality index

Watermarked image quality can be also measured by using universal image quality index (UIQI). In fact, this quality index models any distortion as a combination of three different factors: loss of correlation, luminance distortion, and contrast distortion [53]. The dynamic range of UIQI is . A UIQI value closer to 1 specifies that the watermarked image is indistinguishable to the cover image. The UIQI between two images can be calculated as follows:where and are the average of image A and , respectively. and are the variance of image A and , respectively. is the covariance of image A and , respectively.

Normalized correlation

Normalized correlation (NC) can be used to measure the degree to which the used algorithm can withstand attack. In ideal case, NC should equal 1 [54]. In real, this could be achieved unless the watermarked image does not undergo any kind of attack. A larger NC value means a higher degree of similarity between two images. The NC is defined as follows:where W is the original watermark image and is the corresponding extracted watermark.

Experiments and results

In this section, we present the qualitative and quantitative results for image watermarking to evaluate the performance of our proposed framework. Note that reading input images, performing discrete wavelet transform, solving eigenproblem, and computing performance evaluation metrics are all of them implemented in MATLAB© R2015b environment. The effectiveness of our approach is validated by carrying out a comprehensive comparison with several state-of-the-art methods. a–g Cover images for test: ‘Zelda,’ ‘Lena,’ ‘Goldhill,’ ‘Peppers,’ ‘Butterfly,’ ‘Baboon,’ ‘Lake,’ respectively; h Watermark image

Datasets

The performance of the proposed framework is tested for two different tasks, i.e., for watermark embedding and extraction; as well as it is evaluated on a two challenging standard test images: we use dataset of standard grayscale test images provided by computer vision group [55] which contains 49 test images, and image repository provided by the waterloo fractal coding and analysis group [56] that is divided into three sets from which we use 12 images existing in Grayscale Set 2. List of various attacking operations and their parameter values

Experimental settings

Several experiments are performed comprehensively for evaluating effectiveness of the proposed algorithm. Seven standard grayscale images, namely ‘Zelda,’ ‘Lena,’ ‘Goldhill,’ ‘Peppers,’ ‘Butterfly,’ ‘Baboon’ and ‘Lake,’ are taken as cover images of size as depicted in Fig. 5a–g, whereas WaterMark logo of size is used as a watermark image presented in Fig. 5h. Although we have shown just seven test images, the proposed algorithm was also executed on other standard test images obtained from the same aforementioned image databases.
Fig. 5

a–g Cover images for test: ‘Zelda,’ ‘Lena,’ ‘Goldhill,’ ‘Peppers,’ ‘Butterfly,’ ‘Baboon,’ ‘Lake,’ respectively; h Watermark image

Relative parameter used in the proposed algorithm is set up according to the experiment results. Associated parameter setting is the scaling factor alpha of the watermark image. The scaling factor alpha is chosen manually through a trial-and-error basis. In order to pull the essence of our watermarking algorithm, we recommend . This allows our watermarking algorithm itself to achieve its satisfactory performance and thus to fulfill a better trade-off between imperceptibility and robustness as simultaneously as possible. To estimate the robustness and reliability of the proposed method, watermarked images are exposed against different kinds of image attacks. The image attacks can be divided into four categories and are listed as follows: (1) noising attack: Gaussian noise (Gs), salt & pepper noise (Slp), and speckle noise (Spn); (2) denoising attack: Gaussian filter (GF), average filter (Avg), median filter (Md) and Wiener filter (WF); (3) image-processing attack: histogram equalization (HE), sharpening (Shp) and gamma correction (Gc); (4) geometrical attack: rotation crop (Rtc), cropping (Cr), translation (Tr), rescaling (Rsc), flipping of rows (Fpr) and flipping of columns (Fpc), which are listed in Table 1 with their corresponding attack parameters, where abbreviation of TL donates the position of top-left corner.
Table 1

List of various attacking operations and their parameter values

Full name of attack typeAttack indexParameterParameter values
Gaussian noiseGsMean, variance0 and 0.01 (default)
Salt & pepper noiseSlpNoise density0.05 (default)
Speckle noiseSpnVariance0.05 (default)
Rotation \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$+$$\end{document}+ cropRtcAngle\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$45^{\circ }$$\end{document}45
CroppingCrProportionTL1/4
TranslationTrDisplacement\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(80\times 80)$$\end{document}(80×80)
Histogram equalizationHEBins64 (default)
RescalingRscScale\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\rightarrow 256\rightarrow 512$$\end{document}512256512
SharpeningShpAmount, radius1 and 0.8 (default)
Gaussian filterGFFilter size and standard deviation\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$[3\times 3]$$\end{document}[3×3] and 0.5 (default)
Average filterAvgFilter size\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$[3\times 3]$$\end{document}[3×3] (default)
Median filterMdNeighborhood size\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$[3\times 3]$$\end{document}[3×3] (default)
Wiener filterWFNeighborhood size\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$[3\times 3]$$\end{document}[3×3] (default)
Gamma correctionGcGamma value0.2
Flipping of rowsFprDimension1 (default)
Flipping of columnsFpcDimension2
Results of watermarked images and corresponding extracted watermarks without attack: a–g watermarked images; a1–g1 extracted watermarks

Proof of imperceptibility

Imperceptibility is an important feature of the watermarking scheme. In this subsection, the imperceptibility analysis of the proposed scheme is done. PSNR and SSIM are most commonly used objective performance metrics to examine the perceptual transparency of the watermarking techniques. In general, if the PSNR value is 48 dB that means the quality of image is excellent and there is no changes which can be noticed. PSNR value in between 35 and 48 dB means good image quality and PSNR value ranging from 29 to 35 dB signifies acceptable image quality. PSNR value below 25 dB means the image is perceptible. Figure 6a–g illustrates the watermarked versions of original images after applying the proposed embedding algorithm. Table 2 displays the testimony of these images, and tabulates PSNR, MSE, SSIM, UIQI and NC values of all watermarked images under no attack. Still referring to Table 2, the proposed watermarking method is excellent in terms of imperceptibility since the average PSNR value is 48.1308 dB, and the PSNR values from all watermarked images are above 48 dB. Maximum PSNR and UIQI values are obtained for ‘Baboon’ image and are found here as 48.1314 dB and 1.0000, respectively. Moreover, SSIM, UIQI and NC are greater than 0.999 in each case. MSE, in turn, as a distortion index, illustrates low values that indicate higher quality. So, all values of these metrics provide well-founded results for the watermarked images. Obviously, no matter which cover image is used, the transparency of the image is always very good; which means that the proposed method performs well in imperceptibility.
Fig. 6

Results of watermarked images and corresponding extracted watermarks without attack: a–g watermarked images; a1–g1 extracted watermarks

Table 2

PSNR (dB), MSE, SSIM, UIQI and NC values of watermarked images under no attack

Cover imagePSNRMSESSIMUIQINC
Zelda48.13081.00000.99990.99971.0000
Lena48.13081.00001.00000.99991.0000
Goldhill48.13081.00001.00000.99991.0000
Peppers48.13091.00001.00000.99901.0000
Butterfly48.13061.00001.00000.99991.0000
Baboon48.13140.99991.00001.00001.0000
Lake48.13081.00001.00000.99991.0000
Average48.13080.99990.99990.99971.0000
PSNR (dB), MSE, SSIM, UIQI and NC values of watermarked images under no attack PSNR (dB), MSE, SSIM, UIQI and NC values of extracted watermark image under no attack Comparison chart of the proposed method with the state-of-the-art methods under no attack. All methods used ‘Lena’ as a test image Bold values indicate the data with the best comparison results Comparison chart of the proposed method with the state-of-the-art methods under no attack. All methods used ‘Peppers’ as a test image Bold values indicate the data with the best comparison results Furthermore, PSNR, MSE SSIM, UIQI and NC are reused to evaluate the proposed extracting algorithm under no attack. Figure 6a1–g1 illustrates the extracted watermarks from the watermarked images, and the subsequent Table 3 conveys all their numerical results between original and extracted watermark. As can be seen in this table, maximum SSIM of 1.0000 is obtained for all extracted watermark images, while UIQI and NC values are very close to 1; that shows a high reconstruction of the extracted watermark images. In addition, PSNR and MSE values also validate the output. In short, original grayscale watermark image could be extracted completely without attack .
Table 3

PSNR (dB), MSE, SSIM, UIQI and NC values of extracted watermark image under no attack

Cover imagePSNRMSESSIMUIQINC
Zelda36.004616.31621.00000.97760.9996
Lena35.968116.45381.00000.97740.9996
Goldhill35.941516.55501.00000.97710.9996
Peppers36.090015.99871.00000.97770.9996
Butterfly36.063516.09641.00000.97680.9996
Baboon35.947416.53241.00000.97730.9996
Lake35.981416.40381.00000.97750.9996
Average35.999516.33661.00000.97730.9996
Table 5 indicates the comparison of the watermarked image and extracted watermark for the proposed method against several baseline approaches (see [29, 31, 49, 52, 57–64] and references therein); in which all methods used ‘Lena’ as a test image. As is observed from this table, especially compared to the methods of [29, 31, 49, 52, 58–62, 64], our proposal obtains better results in terms of PSNR and SSIM. For instance, the proposed method significantly outperforms [29] by 4.2946 dB and 0.91%, respectively, in PSNR and SSIM for watermarked image; 9.8433 dB and 0.62%, respectively, in PSNR and NC for extracted watermark. [57] and [63] also obtain good invisibility, and their average PSNRs are greater than 55 dB. However, the invisibility of [49] is poor so that PSNR value is less than 30 dB.
Table 5

Comparison chart of the proposed method with the state-of-the-art methods under no attack. All methods used ‘Peppers’ as a test image

MethodWatermarked imageExtracted watermark
PSNRSSIMPSNRNC
Agoyi et al. [49]34.30.90671
Ernawan et Kabir [52]0.99680.9872
Begum and Uddin [57]48.90650.97211
Verma et al. [58]38.191
Wang and Zhao [59]40.100.99951
Khare and Srivastava [63]60.23200.99981
Ray et al. [65]27.3823
Hu et al. [66]45.1281
Kang et al. [67]42.250.97471
Kazemivash et al. [68]37.76831
Kazemivash et al. [69]38.97081
Moeinaddini et al. [70]51.98020.9814
Proposed method48.13091.000036.09000.9996

Bold values indicate the data with the best comparison results

The watermarked images and their corresponding PSNR values after sixteen attacks Again, the three performance criteria, i.e., PSNR, SSIM and NC, are used in order to evaluate the quality of the watermarked image and the extracted watermark quantitatively. Table 5 illustrates the quality using these metrics and the comparison between the proposed method and the state-of-the-art methods [49, 52, 57–59, 63, 65–70] without attacks. Note that all these methods used ‘Peppers’ as a test image. As can be seen in this table, maximum SSIM of 1.0000 is obtained for the proposed scheme, which means that the visual quality of the watermarked image is excellent. For the extracted watermark, our proposed method performs better than [52] by 1.24%, whereas is slightly lower than [49, 57–59, 63, 65–70] with a very little difference of 0.0004 in terms of the NC metric. In summary, with regard to the result of Fig 6, Tables 5 and 6 and the brief discussion, it is obvious that the proposed algorithm achieves good transparency whether for the watermarked image or the extracted watermark under no attack.
Table 6

UIQI and NC values of the watermarks extracted from the watermarked image under sixteen different attacks

AttackImageAverage
ZeldaLenaGoldhillPeppersButterflyBaboonLakeUIQINC
UIQINCUIQINCUIQINCUIQINCUIQINCUIQINCUIQINC
No attack0.97760.99960.97740.99960.97710.99960.97770.99960.97680.99960.97730.99960.97730.99960.97730.9996
Gs0.91590.99970.89940.99950.90420.99960.90100.99950.92330.99980.90520.99980.89870.99950.90680.9996
Slp0.89570.99930.87280.99890.87550.99900.86740.99880.90470.99960.88720.99950.86120.99870.88060.9991
Spn0.90630.99940.89440.99930.91140.99950.88890.99920.91750.99970.87700.99930.88960.99900.89780.9993
Rtc0.98050.99980.95470.99980.94690.99990.96160.99980.97380.99980.93150.99980.95390.99980.95750.9998
Cr0.97590.99960.97530.99960.97490.99960.97200.99960.97320.99950.96020.99930.97280.99950.97200.9995
Tr0.97410.99960.97130.99960.96590.99960.96190.99960.94880.99960.92720.99940.94690.99950.95660.9995
HE0.98120.99970.98260.99980.98320.99980.98240.99980.98250.99980.98731.00000.97630.99980.98220.9998
Rsc0.96550.99940.96550.99930.95990.99920.95150.99920.93190.99900.91310.99800.94240.99900.94710.9990
Shp0.98150.99980.98500.99980.98490.99990.98480.99990.97930.99990.98451.00000.98500.99990.98350.9999
GF0.97260.99950.97240.99950.97010.99940.96850.99940.96110.99930.95200.99900.96490.99930.96590.9993
Avg0.96680.99940.96760.99930.96240.99920.95920.99920.94010.99910.92320.99820.95230.99910.95300.9990
Md0.97010.99950.97290.99950.96770.99940.96770.99940.96210.99930.94250.99870.96360.99930.96380.9993
WF0.96520.99950.97070.99950.96580.99940.96630.99940.93330.99930.93410.99890.95960.99930.95640.9993
Gc0.97290.99950.97000.99940.96780.99940.97120.99950.96200.99920.94010.99860.96410.99930.96400.9992
Fpr0.97760.99960.97720.99960.97740.99960.97770.99960.97680.99960.97730.99960.97710.99960.97730.9996
Fpc0.97760.99960.97730.99960.97730.99960.97770.99960.97680.99960.97730.99960.97720.99960.97730.9996

Proof of robustness

Robustness implies that how efficiently the watermark can be extracted from various intention or accidental types of attacks employed in the watermarked image. To test the robustness and reliability of the proposed method, sixteen common attacks are performed on watermarked images, and their descriptions are given in Table 1. Thus, to show the performance of our algorithm more intuitively, the seven watermarked images of the proposed algorithm are exposed to these attacks, the corrupted watermarked test images are shown in Fig. 7 and then the corresponding UIQI and NC values of the extracted watermarks are given in Table 6. As illustrated in the table, the average values of UIQI and NC metrics for each extracted watermark remained above 0.88 and 0.999, respectively. Moreover, the proposed algorithm has strong resistance to sharpening, rotationcropping (Rtc), cropping and other attacks. Even if the watermarked images are simultaneously rotated by 45 and cropped to fit the size of the input images, good watermarks can still be extracted, and the mean value of NC reaches 0.999. Still referring to Fig. 7 and Table 6, when the top-left corner of the watermarked images is cropped by 1/4, we have noticed that they are strongly distorted as their mean value of PSNR is under 13 dB; nevertheless, the extracted watermarks are easily identifiable according to the mean value of NC which is still greater than 0.999, while the mean value of UIQI reaches 0.97, which in turns indicate the high robustness of the system.
Fig. 7

The watermarked images and their corresponding PSNR values after sixteen attacks

UIQI and NC values of the watermarks extracted from the watermarked image under sixteen different attacks s In order to ensure the fairness and show the advantage of the proposed scheme in terms of robustness, experimental and comparative results of NC values with other previous watermarking methods [49, 52, 58, 59, 66, 67, 71] for cover images ‘Lena’ and ‘Peppers’ are performed and compiled in Tables 7 and 8, respectively. From these tables, we briefly detail our observations of the behavior of these algorithms including our algorithm. It can be clearly seen that the proposed algorithm has strong robustness, especially against rotationcropping (Rtc), cropping and translation attacks, and the NC value under each attack is greater than 0.9995. The performance of [49] to deal with the flipping of columns attack is better than that of the proposed algorithm, but this algorithm is less resistant to Gaussian noise, histogram equalization, rescaling, sharpening and gamma correction attacks than the proposed algorithm. NC values of the extracted watermarks computed only for ‘Lena’ image show that [52] is highly robust to histogram equalization and sharpening but performs poorly against salt and pepper noise, speckle noise, 45-degree rotationcropping (Rtc), cropping, translation and denoising attacks. On the other hand, by calculating the average NC values for the two used test images, we surprisingly realized that our proposed scheme is superior to [52] method for all listed attacks. Moreover, the proposed algorithm outperforms [58, 59, 66] in each case. In terms of its resistance to the unique attack namely Gaussian filtering (GF), [67] shows stronger robustness than our algorithm, but for other attacks, the proposed algorithm is superior to [67].
Table 7

Comparison of NC values of the extracted watermark computed for ‘Lena’ image under different types of attacks

Attack indexAgoyi et al. [49]Ernawan et Kabir [52]Verma et al. [58]Wang and Zhao [59]Hu et al. [66]Kang et al. [67]Gong et al. [71]Proposed method
Gs (0.01)0.63620.9614 (0.005)0.8320 (0.05)0.9983 (0.001)0.939 (0.005)0.81420.9769 (0.001)0.9995
Slp (0.05)0.9309 (0.03)0.9141 (0.01)0.9868 (0.01)0.9830.8386 (0.02)0.9502 (0.005)0.9989
Spn (0.05)0.8451 (0.04)0.9102 (0.01)0.9955 (0.01)0.980 (0.005)0.80750.9631 (0.005)0.9993
Rtc \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(45^{\circ })$$\end{document}(45)0.4941 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(2^{\circ })$$\end{document}(2)0.7305 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(5^{\circ })$$\end{document}(5)0.39280.9998
Cr (1/4)0.80480.9922 (10%)0.95740.9964 (1/16)0.9996
Tr (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$80 \times 80$$\end{document}80×80)0.4128 (10, 10)0.7891 (2, 15)0.9996
HE (64)0.97761.00000.93360.81760.9620.99530.94950.9998
Rsc (0.5)−0.61780.99220.94530.99770.64080.99870.99460.9993
Shp (1, 0.8)0.45611.00000.96480.98910.99930.9998
GF (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3 \times 3$$\end{document}3×3), 0.50.93460.95700.99591.00000.97540.9995
Avg (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3 \times 3$$\end{document}3×3)0.93460.86330.9641-0.9993
Md (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3 \times 3$$\end{document}3×3)0.93770.92580.99710.9560.99670.99280.9995
WF (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3 \times 3$$\end{document}3×3)0.9995
Gc (0.2)0.9810.76370.9994
Fpr (1)0.9996
Fpc (2)10.9996

The horizontal bar indicates that there are no relevant data in the corresponding paper. The data in parentheses represent the parameters of the attacks. Bold values represent the data with the best comparison results

Table 8

Comparison of NC values of the extracted watermark computed for ‘Peppers’ image under different types of attacks. The horizontal bar indicates that there is no relevant data in the corresponding paper. The data in parentheses represent the parameters of the attacks. Bold values represent the data with the best comparison results

Attack indexAgoyi et al. [49]Ernawan and Kabir [52]Verma et al. [58]Wang and Zhao [59]Hu et al. [66]Kang et al. [67]Gong et al. [71]Proposed method
Gs (0.01)0.66840.8928 (0.005)0.8008 (0.05)0.9986 (0.001)0.904 (0.005)0.80520.9646 (0.001)0.9995
Slp (0.05)0.8883 (0.03)0.9102 (0.01)0.9782 (0.01)0.9820.8544 (0.02)0.9611 (0.005)0.9988
Spn (0.05)0.8398 (0.04)0.8906 (0.01)0.9964 (0.01)0.995 (0.005)0.81660.9982 (0.005)0.9992
Rtc \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(45^{\circ })$$\end{document}(45)0.4986 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(2^{\circ })$$\end{document}(2)0.7227 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(5^{\circ })$$\end{document}(5)0.13650.9998
Cr (1/4)0.85440.9727 (10%)0.95880.9302 (1/16)0.9996
Tr (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$80 \times 80$$\end{document}80×80)0.4713 (10, 10)0.7773 (2, 15)0.9996
HE (64)0.89680.97430.93750.85790.996010.9998
Rsc (0.5)−0.59450.90720.94140.99420.99870.97860.9992
Shp (1, 0.8)0.99260.98830.97660.98770.99930.9999
GF (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3 \times 3$$\end{document}3×3), 0.50.95360.96090.99551.00000.94980.9994
Avg (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3 \times 3$$\end{document}3×3)0.85940.97230.9992
Md (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3 \times 3$$\end{document}3×3)0.91900.91800.9980.97650.99110.9994
WF (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3 \times 3$$\end{document}3×3)0.9994
Gc (0.2)0.99210.76470.9995
Fpr (1)0.9996
Fpc (2)10.9996
As a remark, despite the fact that our watermarked images were undergo severe attacks, since we have set the parameters of the attacks with values greater than or equal to that used in the aforementioned watermarking techniques (see Tables 7 and 8 then compare data in parentheses), the proposed algorithm shows stronger resistance to sharpening, rotationcropping (Rtc), and histogram equalization attacks, and has strong robustness under each attack. Comparison of NC values of the extracted watermark computed for ‘Lena’ image under different types of attacks The horizontal bar indicates that there are no relevant data in the corresponding paper. The data in parentheses represent the parameters of the attacks. Bold values represent the data with the best comparison results Comparison of NC values of the extracted watermark computed for ‘Peppers’ image under different types of attacks. The horizontal bar indicates that there is no relevant data in the corresponding paper. The data in parentheses represent the parameters of the attacks. Bold values represent the data with the best comparison results

Computational complexity

This section describes the computational complexity of the proposed approach in terms of big-Oh notation, where worst-case scenarios are considered. The complexity of digital image watermarking approaches is usually assessed in terms of required number of different operations. Let us remind the reader that we have introduced a grayscale image watermarking system using DWT-SVD domain. The complexity of the proposed watermarking scheme is therefore determined by analyzing independently the time complexity of these two frequency domains. Generally speaking, the time complexity of DWT of size is O(MN); the wavelet transforms incur lesser time complexity due to nice features of space-frequency localization and multiresolutions. Here, the size of cover image is and the size of watermark image is , where and . Further, the dimension of cover image in this scheme is the same, i.e., . So, the time complexity of DWT in our watermarking method is . On the other hand, the time complexity of SVD in general case requires , wherefore its complexity in the proposed scheme is . Therefore, the overall time complexity (T) for the presented algorithm is given byfrom which we deduce that this technique has cubic complexity. All in all, according to the chosen solution, the moderate computational complexity and the high results in terms of imperceptibility and robustness make the proposed approach practical for real-time applications.

Capacity analysis

In this section, we provide a detailed analysis of the capacity of the proposed watermarking algorithm and compare it with other seven related algorithms [72-78]. The capacity of a watermarking algorithm is defined as the ratio of the number of bits contained in the maximum embeddable watermark to the number of pixels in the cover image. In the proposed watermarking algorithm, the 8 bits grayscale watermark image of size is embedded in the cover image of size . The number of bits contained in this watermark is , so the capacity of our algorithm is . Table 9 gives the capacity of the proposed algorithm and those of the related comparison algorithms [72-78]. From Table 9, we can see that [72, 73] and [77] have the same capacity, namely 0.015625, and the capacity of the proposed algorithm is 512 times that of these three algorithms. Moreover, our algorithm is superior to [74, 75] and [76] in terms of capacity, whereas it has the same capacity as [78]. In brief, our algorithm has a large capacity.
Table 9

Capacity comparison between the proposed algorithm and related algorithms

MetricAli et al. [72]Ali et al. [73]Ali et al. [74]Ansari et al. [75]Makbol et al. [76]Roy et al. [77]Li et al. [78]Proposed method
Size of cover image\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512
Number of bits in the maximum embeddable watermark4096409632768131072524288409620971522097152
Capacity (b/p)0.0156250.0156250.1250.520.01562588
Capacity comparison between the proposed algorithm and related algorithms Comparative analysis of the proposed algorithm and other related algorithms

Comparative analysis

Based on the sizes and types of the cover image and the watermark image, the comparison results of the proposed algorithm and those of the main related algorithms [72-78] are given in Table 10. It can be concluded from the table that all the algorithms use grayscale images as the cover image; the proposed algorithm and the algorithms in [74–76, 78] use grayscale watermarks, while [72, 73] and [77] are only applicable to binary watermark images. [73, 74] embed watermarks into some selected blocks of the redistributed invariant discrete wavelet transform (RIDWT), wherefore [74], in particular, did not well satisfy the invisibility requirement. [76] embeds watermarks in the integer wavelet transform (IWT), whereas [78] uses a DCT on the basis of the RIDWT, and selects low-frequency and high-frequency regions for embedding watermarks; both schemes, despite competitiveness, have less invisibility than the proposed algorithm. Differently, the proposed algorithm and [75] embed watermarks in the discrete wavelet domain, but this algorithm uses a blend of DWT-SVD domain, and selects high-frequency region for embedding watermarks, which results higher robustness. Obviously, the proposed algorithm has higher reliability and invisibility. Moreover, except for [78] with which we are equal, the proposed algorithm is superior to the other algorithms in terms of capacity.
Table 10

Comparative analysis of the proposed algorithm and other related algorithms

MetricAli et al. [72]Ali et al. [73]Ali et al. [74]Ansari et al. [75]Makbol et al. [76]Roy et al. [77]Li et al. [78]Proposed method
Size of cover image\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512
Type of cover imageGrayGrayGrayGrayGrayGrayGrayGray
Size of watermark\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$64\times 64$$\end{document}64×64\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$32\times 32$$\end{document}32×32\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$64\times 64$$\end{document}64×64\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$128\times 128$$\end{document}128×128\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$256\times 256$$\end{document}256×256\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$64\times 64$$\end{document}64×64; \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$128\times 32$$\end{document}128×32\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$64\times 64$$\end{document}64×64\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document}512×512
Type of watermarkBinaryBinaryGrayGrayGrayBinaryGrayGray
Transform domainRIDWT + DWT + FRFT + SVDRIDWT +SVDRIDWT + SVDDWT + SVDIWT + SVDRDWT + DCTRIDWT + DCT+ SVDDWT + SVD
Embedding sub-bandsLL\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_1$$\end{document}1Some blocks of LLSome blocks of LLAll sub-bandsLL\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_{1}$$\end{document}1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$8\times 8$$\end{document}8×8 blocksLL\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_{1}$$\end{document}1 and HH\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_{1}$$\end{document}1HH\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$_{1}$$\end{document}1
Signal qualityGoodAcceptableGoodGoodGoodGoodExcellent
Invisibility (PSNR)41.876529.583938.410341.223441.346441.961648.1308
Capacity (b/p)0.0156250.0156250.1250.520.01562588

Conclusions and future work

In this paper, a revisited hybrid watermarking technique based on DWT and SVD has been presented to achieve simultaneously the trade-off between robustness and invisibility. At the sender side, the one-level DWT is used to decompose the original image to seek for the embedding position and then the watermark is inserted. Some key parameters are transmitted through a private channel to later recover the watermark image. At the receiver end, our system can recognize if the received watermarked image is attacked or not by computing Cr value. The use of the scaling factor is mandatory for extracting watermark from merely watermarked image; otherwise, the watermark is correctly and efficiently extracted from the watermarked attacked image as long as the scaling factor is no longer used. Comprehensive performance analysis of the proposed scheme is conducted including imperceptibility analysis, robustness analysis, computational complexity and capacity analysis. The proposed approach has been implemented with acceptable computational complexity of . This result remains encouraging and ensures that the proposed approach would be practical for real time processes. Besides that, experimental results of the proposed algorithm clearly account for high level of robustness, security, reliability and imperceptibility, so it can be used for copyright protection and content authentication. The limitations of this paper and future research directions are given below. First, as watermarking is carried out in HH sub-band, robustness of the proposed scheme against salt and pepper attack is moderate. We see, as well, some future directions for our work. Our algorithm is designed for gray cover images and watermarks, and it is not suitable for binary watermarks. Based on the proposed watermarking algorithm, the study of watermarking algorithms for embedding binary watermarks is a first direction for future research. Second, we will also work on hiding multiple grayscale or binary watermarks into the gray cover image for more flexibility.
Table 4

Comparison chart of the proposed method with the state-of-the-art methods under no attack. All methods used ‘Lena’ as a test image

MethodWatermarked imageExtracted watermark
PSNRSSIMPSNRNC
Yasmeen and Uddin [29]43.83620.990926.12480.9934
Ahmadi et al. [31]43.32810.97211
Agoyi et al. [49]29.490.8671
Ernawan et Kabir [52]0.99651
Begum and Uddin [57]50.91250.97451
Verma et al. [58]41.51071
Wang and Zhao [59]40.740.99961
Wang [60]42.381
Salama and Mokhtar [61]41.2830
Das et al. [62]41.781
Khare and Srivastava [63]59.98500.99991
Takore et al. [64]45.2223
Proposed method48.13081.000035.96810.9996

Bold values indicate the data with the best comparison results

  3 in total

1.  Noise estimation and filtering using block-based singular value decomposition.

Authors:  K Konstantinides; B Natarajan; G S Yovanof
Journal:  IEEE Trans Image Process       Date:  1997       Impact factor: 10.856

2.  An optimized digital watermarking algorithm in wavelet domain based on differential evolution for color image.

Authors:  Xinchun Cui; Yuying Niu; Xiangwei Zheng; Yingshuai Han
Journal:  PLoS One       Date:  2018-05-21       Impact factor: 3.240

3.  An Efficient Watermarking Approach Based on LL and HH Edges of DWT-SVD.

Authors:  Fauzia Yasmeen; Mohammad Shorif Uddin
Journal:  SN Comput Sci       Date:  2021-02-08
  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.