| Literature DB >> 35791414 |
Seif Eddine Naffouti1, Anis Kricha2,3, Anis Sakly1.
Abstract
Digital watermarking has attracted increasing attentions as it has been the current solution to copyright protection and content authentication in today's digital transformation, which has become an issue to be addressed in multimedia technology. In this paper, we propose an advanced image watermarking system based on the discrete wavelet transform (DWT) in combination with the singular value decomposition (SVD). Firstly, at the sender side, DWT is applied on a grayscale cover image and then eigendecomposition is performed on original HH (high-high) components. Similar operation is done on a grayscale watermark image. Then, two unitary and one diagonal matrices are combined to form a digital watermarked image applying inverse discrete wavelet transform (iDWT). The diagonal component of original image is transmitted through secured channel. At the receiver end, the watermark image is recovered using the watermarked image and diagonal component of the original image. Finally, we compare the original and recovered watermark image and obtained perfect normalized correlation. Simulation consequences indicate that the presented scheme can satisfy the needs of visual imperceptibility and also has high security and strong robustness against many common attacks and signal processing operations. The proposed digital image watermarking system is also compared to state-of-the-art methods to confirm the reliability and supremacy.Entities:
Keywords: Copyright protection; Digital image watermarking; Discrete wavelet transform (DWT); Imperceptibility; Robustness; Singular value decomposition (SVD)
Year: 2022 PMID: 35791414 PMCID: PMC9247949 DOI: 10.1007/s00371-022-02587-y
Source DB: PubMed Journal: Vis Comput ISSN: 0178-2789 Impact factor: 2.835
Fig. 1Example of two-level DWT transform
Fig. 2The procedure of SVD decomposition
Fig. 3Block diagram of the proposed embedding algorithm
Fig. 4Block diagram of the proposed extracting algorithm
Fig. 5a–g Cover images for test: ‘Zelda,’ ‘Lena,’ ‘Goldhill,’ ‘Peppers,’ ‘Butterfly,’ ‘Baboon,’ ‘Lake,’ respectively; h Watermark image
List of various attacking operations and their parameter values
| Full name of attack type | Attack index | Parameter | Parameter values |
|---|---|---|---|
| Gaussian noise | Gs | Mean, variance | 0 and 0.01 (default) |
| Salt & pepper noise | Slp | Noise density | 0.05 (default) |
| Speckle noise | Spn | Variance | 0.05 (default) |
| Rotation | Rtc | Angle | |
| Cropping | Cr | Proportion | TL1/4 |
| Translation | Tr | Displacement | |
| Histogram equalization | HE | Bins | 64 (default) |
| Rescaling | Rsc | Scale | |
| Sharpening | Shp | Amount, radius | 1 and 0.8 (default) |
| Gaussian filter | GF | Filter size and standard deviation | |
| Average filter | Avg | Filter size | |
| Median filter | Md | Neighborhood size | |
| Wiener filter | WF | Neighborhood size | |
| Gamma correction | Gc | Gamma value | 0.2 |
| Flipping of rows | Fpr | Dimension | 1 (default) |
| Flipping of columns | Fpc | Dimension | 2 |
Fig. 6Results of watermarked images and corresponding extracted watermarks without attack: a–g watermarked images; a1–g1 extracted watermarks
PSNR (dB), MSE, SSIM, UIQI and NC values of watermarked images under no attack
| Cover image | PSNR | MSE | SSIM | UIQI | NC |
|---|---|---|---|---|---|
| Zelda | 48.1308 | 1.0000 | 0.9999 | 0.9997 | 1.0000 |
| Lena | 48.1308 | 1.0000 | 1.0000 | 0.9999 | 1.0000 |
| Goldhill | 48.1308 | 1.0000 | 1.0000 | 0.9999 | 1.0000 |
| Peppers | 48.1309 | 1.0000 | 1.0000 | 0.9990 | 1.0000 |
| Butterfly | 48.1306 | 1.0000 | 1.0000 | 0.9999 | 1.0000 |
| Baboon | 48.1314 | 0.9999 | 1.0000 | 1.0000 | 1.0000 |
| Lake | 48.1308 | 1.0000 | 1.0000 | 0.9999 | 1.0000 |
| Average | 48.1308 | 0.9999 | 0.9999 | 0.9997 | 1.0000 |
PSNR (dB), MSE, SSIM, UIQI and NC values of extracted watermark image under no attack
| Cover image | PSNR | MSE | SSIM | UIQI | NC |
|---|---|---|---|---|---|
| Zelda | 36.0046 | 16.3162 | 1.0000 | 0.9776 | 0.9996 |
| Lena | 35.9681 | 16.4538 | 1.0000 | 0.9774 | 0.9996 |
| Goldhill | 35.9415 | 16.5550 | 1.0000 | 0.9771 | 0.9996 |
| Peppers | 36.0900 | 15.9987 | 1.0000 | 0.9777 | 0.9996 |
| Butterfly | 36.0635 | 16.0964 | 1.0000 | 0.9768 | 0.9996 |
| Baboon | 35.9474 | 16.5324 | 1.0000 | 0.9773 | 0.9996 |
| Lake | 35.9814 | 16.4038 | 1.0000 | 0.9775 | 0.9996 |
| Average | 35.9995 | 16.3366 | 1.0000 | 0.9773 | 0.9996 |
Comparison chart of the proposed method with the state-of-the-art methods under no attack. All methods used ‘Peppers’ as a test image
| Method | Watermarked image | Extracted watermark | |||
|---|---|---|---|---|---|
| PSNR | SSIM | PSNR | NC | ||
| Agoyi et al. [ | 34.3 | 0.9067 | – | ||
| Ernawan et Kabir [ | – | 0.9968 | – | 0.9872 | |
| Begum and Uddin [ | 48.9065 | 0.9721 | – | ||
| Verma et al. [ | 38.19 | – | – | ||
| Wang and Zhao [ | 40.10 | 0.9995 | – | ||
| Khare and Srivastava [ | 0.9998 | – | |||
| Ray et al. [ | 27.3823 | – | – | – | |
| Hu et al. [ | 45.128 | – | – | ||
| Kang et al. [ | 42.25 | 0.9747 | – | ||
| Kazemivash et al. [ | 37.7683 | – | – | ||
| Kazemivash et al. [ | 38.9708 | – | – | ||
| Moeinaddini et al. [ | 51.9802 | 0.9814 | – | – | |
| Proposed method | 48.1309 | 0.9996 | |||
Bold values indicate the data with the best comparison results
UIQI and NC values of the watermarks extracted from the watermarked image under sixteen different attacks
| Attack | Image | Average | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Zelda | Lena | Goldhill | Peppers | Butterfly | Baboon | Lake | UIQI | NC | ||||||||
| UIQI | NC | UIQI | NC | UIQI | NC | UIQI | NC | UIQI | NC | UIQI | NC | UIQI | NC | |||
| No attack | 0.9776 | 0.9996 | 0.9774 | 0.9996 | 0.9771 | 0.9996 | 0.9777 | 0.9996 | 0.9768 | 0.9996 | 0.9773 | 0.9996 | 0.9773 | 0.9996 | 0.9773 | 0.9996 |
| Gs | 0.9159 | 0.9997 | 0.8994 | 0.9995 | 0.9042 | 0.9996 | 0.9010 | 0.9995 | 0.9233 | 0.9998 | 0.9052 | 0.9998 | 0.8987 | 0.9995 | 0.9068 | 0.9996 |
| Slp | 0.8957 | 0.9993 | 0.8728 | 0.9989 | 0.8755 | 0.9990 | 0.8674 | 0.9988 | 0.9047 | 0.9996 | 0.8872 | 0.9995 | 0.8612 | 0.9987 | 0.8806 | 0.9991 |
| Spn | 0.9063 | 0.9994 | 0.8944 | 0.9993 | 0.9114 | 0.9995 | 0.8889 | 0.9992 | 0.9175 | 0.9997 | 0.8770 | 0.9993 | 0.8896 | 0.9990 | 0.8978 | 0.9993 |
| Rtc | 0.9805 | 0.9998 | 0.9547 | 0.9998 | 0.9469 | 0.9999 | 0.9616 | 0.9998 | 0.9738 | 0.9998 | 0.9315 | 0.9998 | 0.9539 | 0.9998 | 0.9575 | 0.9998 |
| Cr | 0.9759 | 0.9996 | 0.9753 | 0.9996 | 0.9749 | 0.9996 | 0.9720 | 0.9996 | 0.9732 | 0.9995 | 0.9602 | 0.9993 | 0.9728 | 0.9995 | 0.9720 | 0.9995 |
| Tr | 0.9741 | 0.9996 | 0.9713 | 0.9996 | 0.9659 | 0.9996 | 0.9619 | 0.9996 | 0.9488 | 0.9996 | 0.9272 | 0.9994 | 0.9469 | 0.9995 | 0.9566 | 0.9995 |
| HE | 0.9812 | 0.9997 | 0.9826 | 0.9998 | 0.9832 | 0.9998 | 0.9824 | 0.9998 | 0.9825 | 0.9998 | 0.9873 | 1.0000 | 0.9763 | 0.9998 | 0.9822 | 0.9998 |
| Rsc | 0.9655 | 0.9994 | 0.9655 | 0.9993 | 0.9599 | 0.9992 | 0.9515 | 0.9992 | 0.9319 | 0.9990 | 0.9131 | 0.9980 | 0.9424 | 0.9990 | 0.9471 | 0.9990 |
| Shp | 0.9815 | 0.9998 | 0.9850 | 0.9998 | 0.9849 | 0.9999 | 0.9848 | 0.9999 | 0.9793 | 0.9999 | 0.9845 | 1.0000 | 0.9850 | 0.9999 | 0.9835 | 0.9999 |
| GF | 0.9726 | 0.9995 | 0.9724 | 0.9995 | 0.9701 | 0.9994 | 0.9685 | 0.9994 | 0.9611 | 0.9993 | 0.9520 | 0.9990 | 0.9649 | 0.9993 | 0.9659 | 0.9993 |
| Avg | 0.9668 | 0.9994 | 0.9676 | 0.9993 | 0.9624 | 0.9992 | 0.9592 | 0.9992 | 0.9401 | 0.9991 | 0.9232 | 0.9982 | 0.9523 | 0.9991 | 0.9530 | 0.9990 |
| Md | 0.9701 | 0.9995 | 0.9729 | 0.9995 | 0.9677 | 0.9994 | 0.9677 | 0.9994 | 0.9621 | 0.9993 | 0.9425 | 0.9987 | 0.9636 | 0.9993 | 0.9638 | 0.9993 |
| WF | 0.9652 | 0.9995 | 0.9707 | 0.9995 | 0.9658 | 0.9994 | 0.9663 | 0.9994 | 0.9333 | 0.9993 | 0.9341 | 0.9989 | 0.9596 | 0.9993 | 0.9564 | 0.9993 |
| Gc | 0.9729 | 0.9995 | 0.9700 | 0.9994 | 0.9678 | 0.9994 | 0.9712 | 0.9995 | 0.9620 | 0.9992 | 0.9401 | 0.9986 | 0.9641 | 0.9993 | 0.9640 | 0.9992 |
| Fpr | 0.9776 | 0.9996 | 0.9772 | 0.9996 | 0.9774 | 0.9996 | 0.9777 | 0.9996 | 0.9768 | 0.9996 | 0.9773 | 0.9996 | 0.9771 | 0.9996 | 0.9773 | 0.9996 |
| Fpc | 0.9776 | 0.9996 | 0.9773 | 0.9996 | 0.9773 | 0.9996 | 0.9777 | 0.9996 | 0.9768 | 0.9996 | 0.9773 | 0.9996 | 0.9772 | 0.9996 | 0.9773 | 0.9996 |
Fig. 7The watermarked images and their corresponding PSNR values after sixteen attacks
Comparison of NC values of the extracted watermark computed for ‘Lena’ image under different types of attacks
| Attack index | Agoyi et al. [ | Ernawan et Kabir [ | Verma et al. [ | Wang and Zhao [ | Hu et al. [ | Kang et al. [ | Gong et al. [ | Proposed method |
|---|---|---|---|---|---|---|---|---|
| Gs (0.01) | 0.6362 | 0.9614 (0.005) | 0.8320 (0.05) | 0.9983 (0.001) | 0.939 (0.005) | 0.8142 | 0.9769 (0.001) | |
| Slp (0.05) | – | 0.9309 (0.03) | 0.9141 (0.01) | 0.9868 (0.01) | 0.983 | 0.8386 (0.02) | 0.9502 (0.005) | |
| Spn (0.05) | – | 0.8451 (0.04) | 0.9102 (0.01) | 0.9955 (0.01) | 0.980 (0.005) | 0.8075 | 0.9631 (0.005) | |
| Rtc | – | 0.4941 | 0.7305 | 0.3928 | – | – | – | |
| Cr (1/4) | – | 0.8048 | 0.9922 (10%) | – | – | 0.9574 | 0.9964 (1/16) | |
| Tr ( | – | 0.4128 (10, 10) | 0.7891 (2, 15) | – | – | – | – | |
| HE (64) | 0.9776 | 0.9336 | 0.8176 | 0.962 | 0.9953 | 0.9495 | 0.9998 | |
| Rsc (0.5) | −0.6178 | 0.9922 | 0.9453 | 0.9977 | 0.6408 | 0.9987 | 0.9946 | |
| Shp (1, 0.8) | 0.4561 | 0.9648 | 0.9891 | – | 0.9993 | – | 0.9998 | |
| GF ( | – | 0.9346 | 0.9570 | 0.9959 | – | 0.9754 | 0.9995 | |
| Avg ( | – | 0.9346 | 0.8633 | – | – | 0.9641 | - | |
| Md ( | – | 0.9377 | 0.9258 | 0.9971 | 0.956 | 0.9967 | 0.9928 | |
| WF ( | – | – | – | – | – | – | – | |
| Gc (0.2) | 0.981 | – | – | 0.7637 | – | – | – | |
| Fpr (1) | – | – | – | – | – | – | – | |
| Fpc (2) | – | – | – | – | – | – | 0.9996 |
The horizontal bar indicates that there are no relevant data in the corresponding paper. The data in parentheses represent the parameters of the attacks. Bold values represent the data with the best comparison results
Comparison of NC values of the extracted watermark computed for ‘Peppers’ image under different types of attacks. The horizontal bar indicates that there is no relevant data in the corresponding paper. The data in parentheses represent the parameters of the attacks. Bold values represent the data with the best comparison results
| Attack index | Agoyi et al. [ | Ernawan and Kabir [ | Verma et al. [ | Wang and Zhao [ | Hu et al. [ | Kang et al. [ | Gong et al. [ | Proposed method |
|---|---|---|---|---|---|---|---|---|
| Gs (0.01) | 0.6684 | 0.8928 (0.005) | 0.8008 (0.05) | 0.9986 (0.001) | 0.904 (0.005) | 0.8052 | 0.9646 (0.001) | |
| Slp (0.05) | – | 0.8883 (0.03) | 0.9102 (0.01) | 0.9782 (0.01) | 0.982 | 0.8544 (0.02) | 0.9611 (0.005) | |
| Spn (0.05) | – | 0.8398 (0.04) | 0.8906 (0.01) | 0.9964 (0.01) | 0.995 (0.005) | 0.8166 | 0.9982 (0.005) | |
| Rtc | – | 0.4986 | 0.7227 | 0.1365 | – | – | – | |
| Cr (1/4) | – | 0.8544 | 0.9727 (10%) | – | – | 0.9588 | 0.9302 (1/16) | |
| Tr ( | – | 0.4713 (10, 10) | 0.7773 (2, 15) | – | – | – | – | |
| HE (64) | 0.8968 | 0.9743 | 0.9375 | 0.8579 | – | 0.9960 | 0.9998 | |
| Rsc (0.5) | −0.5945 | 0.9072 | 0.9414 | 0.9942 | – | 0.9987 | 0.9786 | |
| Shp (1, 0.8) | 0.9926 | 0.9883 | 0.9766 | 0.9877 | – | 0.9993 | – | |
| GF ( | – | 0.9536 | 0.9609 | 0.9955 | – | 0.9498 | 0.9994 | |
| Avg ( | – | – | 0.8594 | – | – | 0.9723 | – | |
| Md ( | – | 0.9190 | 0.9180 | 0.998 | – | 0.9765 | 0.9911 | |
| WF ( | – | – | – | – | – | – | – | |
| Gc (0.2) | 0.9921 | – | – | 0.7647 | – | – | – | |
| Fpr (1) | – | – | – | – | – | – | – | |
| Fpc (2) | – | – | – | – | – | – | 0.9996 |
Capacity comparison between the proposed algorithm and related algorithms
| Metric | Ali et al. [ | Ali et al. [ | Ali et al. [ | Ansari et al. [ | Makbol et al. [ | Roy et al. [ | Li et al. [ | Proposed method |
|---|---|---|---|---|---|---|---|---|
| Size of cover image | ||||||||
| Number of bits in the maximum embeddable watermark | 4096 | 4096 | 32768 | 131072 | 524288 | 4096 | 2097152 | 2097152 |
| Capacity (b/p) | 0.015625 | 0.015625 | 0.125 | 0.5 | 2 | 0.015625 | 8 | 8 |
Comparative analysis of the proposed algorithm and other related algorithms
| Metric | Ali et al. [ | Ali et al. [ | Ali et al. [ | Ansari et al. [ | Makbol et al. [ | Roy et al. [ | Li et al. [ | Proposed method |
|---|---|---|---|---|---|---|---|---|
| Size of cover image | ||||||||
| Type of cover image | Gray | Gray | Gray | Gray | Gray | Gray | Gray | Gray |
| Size of watermark | ||||||||
| Type of watermark | Binary | Binary | Gray | Gray | Gray | Binary | Gray | Gray |
| Transform domain | RIDWT + DWT + FRFT + SVD | RIDWT +SVD | RIDWT + SVD | DWT + SVD | IWT + SVD | RDWT + DCT | RIDWT + DCT+ SVD | DWT + SVD |
| Embedding sub-bands | Some blocks of | Some blocks of | All sub-bands | |||||
| Signal quality | – | Good | Acceptable | Good | Good | Good | Good | Excellent |
| Invisibility (PSNR) | − | 41.8765 | 29.5839 | 38.4103 | 41.2234 | 41.3464 | 41.9616 | 48.1308 |
| Capacity (b/p) | 0.015625 | 0.015625 | 0.125 | 0.5 | 2 | 0.015625 | 8 | 8 |
Comparison chart of the proposed method with the state-of-the-art methods under no attack. All methods used ‘Lena’ as a test image
| Method | Watermarked image | Extracted watermark | |||
|---|---|---|---|---|---|
| PSNR | SSIM | PSNR | NC | ||
| Yasmeen and Uddin [ | 43.8362 | 0.9909 | 26.1248 | 0.9934 | |
| Ahmadi et al. [ | 43.3281 | 0.9721 | – | ||
| Agoyi et al. [ | 29.49 | 0.867 | – | ||
| Ernawan et Kabir [ | – | 0.9965 | – | ||
| Begum and Uddin [ | 50.9125 | 0.9745 | – | ||
| Verma et al. [ | 41.5107 | – | – | ||
| Wang and Zhao [ | 40.74 | 0.9996 | – | ||
| Wang [ | 42.38 | – | – | ||
| Salama and Mokhtar [ | 41.28 | – | 30 | – | |
| Das et al. [ | 41.78 | – | – | ||
| Khare and Srivastava [ | 0.9999 | – | |||
| Takore et al. [ | 45.2223 | – | – | – | |
| Proposed method | 48.1308 | 0.9996 | |||
Bold values indicate the data with the best comparison results