| Literature DB >> 36185319 |
Divyanshu Awasthi1, Vinay Kumar Srivastava1.
Abstract
In this proposed work, a dual image watermarking algorithm is used to protect the data against copyright violations. In this work, the DICOM image is used as a host image. Two watermark images used are the MNNIT logo and the personal data of the patient. This method utilizes the advantages of Schur decomposition, lifting wavelet transform (LWT), discrete cosine transform (DCT) and singular value decomposition (SVD). The scaling factor is a vital parameter of watermarking technique. The firefly optimization technique is used to get the optimized scaling factor. The Speeded-up robust features (SURF) are used for watermarking authentication. To evaluate the performance of the proposed algorithm, peak signal-to-noise ratio (PSNR), normalized correlation coefficient (NCC), and structural similarity index measurement (SSIM) are used. The proposed method is tested against various attacks such as Salt and Pepper noise, Gaussian noise, Gaussian low pass filter, Average filter, Median filter, Histogram equalization, Sharpening, Rotation and Region of interest filtering. The proposed algorithm shows a high level of robustness and imperceptibility. It is found that the features of the input host image and the watermarked image are matching correctly on applying the SURF technique.Entities:
Keywords: Discrete cosine transform (DCT); Firefly optimization; Lifting wavelet transform (LWT); SURF; Schur decomposition; Singular value decomposition (SVD)
Year: 2022 PMID: 36185319 PMCID: PMC9513003 DOI: 10.1007/s11042-022-14002-8
Source DB: PubMed Journal: Multimed Tools Appl ISSN: 1380-7501 Impact factor: 2.577
Summary of the recent literature survey of image watermarking techniques
| Ref. No. | Purpose | Techniques used | Input image | Performance parameters | Attacks | Remark |
|---|---|---|---|---|---|---|
| [ | To propose a robust method for linear and non-linear attacks and the transparency of the watermarked images will be protected. | Discrete cosine transform (DCT), Discrete wavelet transform (DWT), Arnold transform (AT) | RGB host images: Baboon, Pears, Pepper, Jet plane, Barbara (1024x1024x3); Watermark images: 96 × 96 grayscale Lena, Cameraman, and Saturn | Peak signal to noise ratio (PSNR), Normalized correlation coefficient (NCC) | Blurring, Average filter, Sharpening, Resizing, JPEG, Median filter, Salt and Pepper, Speckle, Rotation | By embedding the DCT transformed watermark parts separately into all the DWT bands of each color component of the cover image, high robustness and imperceptibility have been obtained with the proposed method. |
| [ | Blind watermarking targets the recovery of the watermark when the host is not available during the detection stage | Discrete Shearlet Transform (DST), Discrete Wavelet Transform (DWT), Contourlet Transform (CT), Laplacian distribution | Host images of size 512 × 512: Baboon, Barbara, Clock, Cameraman, Pepper, Boat | Peak signal to noise ratio (PSNR), Structural similarity index measurement (SSIM), Root mean square error (RMSE) | – | The DST-based embedding provides a good imperceptibility and an improved payload, and the results demonstrate superior robustness against common image processing manipulations compared to DWT and CT |
| [ | To get high robustness against noise addition attacks | Discrete cosine transform (DCT), Discrete wavelet transform (DWT), Arnold cat map | Host image of size 512 × 512: Barbara, Baboon, Pepper; Watermark logo: 32 × 32 binary image | Mean absolute error (MAE), Peak Signal to noise ratio (PSNR) | Salt and pepper noises, Cropping, JPEG compression, Gaussian low pass filter, Scaling | The proposed method has high imperceptibility and robustness against different types of attacks. |
| [ | This paper proposed a survey on watermarking methods in the artificial intelligence domain and beyond. | |||||
| [ | Dual Watermarking for Security of COVID-19 Patient Record. | Redundant discrete wavelet transform (RDWT), Hessenberg Decomposition (HD), Randomized singular value decomposition (RSVD) | Host image of size 512 × 512: CT scan images of COVID-19 patients Electronic patient record (266 bits) and watermark image (256 × 256) | Peak Signal to noise ratio (PSNR), Normalized correlation coefficient (NCC), Bit error rate (BER), Unified Average Change Intensity (UACI), Number of Pixels Change Rate (NPCR) | Salt and pepper noises, Gaussian noise, Rotation, JPEG compression, Speckle noise, Median filter, Cropping, Scaling, Translation | Imperceptibility and robustness are achieved by a fuzzy inference system. The extracted watermark is denoised using the concept of deep neural network (DNN) to improve its robustness. |
| [ | To get significant improvement in transparency and the robustness under attacks. | Singular value decomposition (SVD), Genetic algorithm (GA) | Host image of size 256 × 256: Lena; Watermark image of size: 32 × 32 (grey-level) | Correlation coefficient (CC), PSNR | Rotation, Average filter, Scaling, Gaussian noise, Gamma correction, Histogram, Median filter | In the proposed method, GA is utilized to obtain multiple scaling factors (SF) for achieving the highest possible robustness without degrading image quality. |
| [ | This paper provides a comparison between PSO and JAYA as well as between LWT and DWT | LWT, DWT, DCT, SVD, PSO, JAYA | Host grayscale image: 512 × 512; Watermark grayscale: 256 × 256 | PSNR, SSIM, Normalized correlation coefficient (NCC), Mean square error (MSE) | JPEG compression, Gaussian noise, Median filter, Salt and Pepper, Low pass filter, Sharpening, Gamma correction, Scaling, Translation | The proposed work has been tested under different attacks and found robust and imperceptible. |
| [ | To improve the watermarked image’s integrity and perceived quality and to enhance the security of watermarking | DWT, SVD, Quantization, | Shore, Lena, Baboon, Pepper, Dark cloud: 200 × 200 | PSNR, Bit error rate (BER) | JPEG compression, Gaussian noise, Median filter, Cropping | The enhanced perceptual quality of the watermarked images and the proposed scheme preserve high PSNR. |
| [ | The proposed method uses 2-D Linear Discriminant Analysis (2DLDA) watermark scheme for copyright protection | 2-D linear discriminant analysis (2DLDA), Discrete cosine transform (DCT) | Host image: e 512 × 512, where each pixel is represented by 24 bits in the RGB color space; watermark of a recognizable pattern of size 32 × 25 | PSNR, Bit error rate (BER) | Cropping, Blurring, Mosaic, Luminance and contrast adjustment, JPEG | Experimental results demonstrate that the differences between the watermarked and original images are indistinguishable. The proposed method effectively resists standard image processing attacks. |
| [ | This paper proposed a dual watermarking-based multimedia content authentication and privacy preservation solution. | DWT, DCT, Encryption, Arnold transform | Host grayscale image: 512 × 512 Watermark grayscale: 64 × 64 | PSNR, BER (Bit error rate), NCC, BCR (Bit correction ratio) | JPEG, Gaussian noise, Salt and Pepper, Median filter, Gaussian LPF, Rotation, Brightness, Darkening, Scaling recovery, Wiener | A highly robust watermarking framework for copyright protection applications is proposed. It also serves the purpose of authentication. |
| [ | This paper presents a reliable digital watermarking technique that provides high imperceptibility and robustness for copyright protection | Optimal discrete cosine transform (DCT), psychovisual threshold, Arnold transform | Host image of size 512 × 512: LENA, Baboon, Cameraman, Pepper, Airplane, Livingroom; Watermark image: a binary logo image with 32 × 32 pixels | PSNR, BER (Bit error rate), NCC, Structural similarity index measurement (SSIM) | Sharpening, Histogram, JPEG, Average, Wiener, Median, GLP, Gaussian noise, Salt and Pepper, Adjust, JPEG2000 | The proposed method has higher values of NC and SSIM when compared with other methods |
| [ | In this paper, a robust and blind digital image watermarking technique is proposed to achieve copyright protection. | DWT, DCT, SVD | Host grayscale image: 512 × 512 Watermark grayscale: 256 × 256 | PSNR, NCC, MSE (Mean square error) | Motion blur, Gaussian blur, Sharpening, Gaussian noise, Salt and Pepper, Contrast, Rotation, Crop, Negative, Swirl | The suggested approach has been resistant to most attacks, which can be verified by recovering the watermark from any sub-bands. |
| [ | The proposed method is used for copyright protection and authentication. | DWT, SVD, Zig-Zag sequence | Host grayscale image: 512 × 512 Watermark grayscale: 128 × 128 | PSNR, NCC | JPEG, JPEG2000, Gaussian noise, Resize, Rotation, Crop | The proposed Dual image watermarking is robust. |
| [ | This paper proposed a dual watermarking-based multimedia content authentication and privacy preservation solution. | DWT, DCT, Encryption, Arnold transform | Host grayscale image: 512 × 512 Watermark grayscale: 64 × 64 | PSNR, BER (Bit error rate), NCC, BCR (Bit correction ratio) | JPEG, Gaussian noise, Salt and Pepper, Median filter, Gaussian LPF, Rotation, Brightness, Darkening, Scaling recovery, Wiener filter, | A highly robust watermarking framework for copyright protection applications is proposed. It also serves the purpose of authentication. |
| [ | To provide both robustness and imperceptibility | DWT, SVD | Host grayscale image: 512 × 512; Watermark grayscale: 256 × 256 | Peak signal to noise ratio (PSNR), Normalized correlation coefficient (NCC) | Gaussian blurring, Histogram eq., Rotation, JPEG, Salt & Pepper, Gamma correction, Median filtering | Significant improvement in imperceptibility and robustness under various attacks |
| [ | To optimize the tradeoff between imperceptibility and robustness properties, this paper proposes a robust and invisible blind image watermarking scheme | DWT, DCT, SVD, Chaotic map | Host image size of 512 × 512: Boat, Lena, Livingroom, Mandrill, Peppers, Pirate, Jet plane, Lake; Watermark: 32 × 32 binary logo images | Peak signal to noise ratio (PSNR), Normalized correlation coefficient (NC), SSIM, BER, feature similarity (FSIM) index | Gaussian blurring, Histogram eq., Rotation, JPEG, Salt & Pepper, Gamma correction, Median filtering, JPEG, JPEG2000 | The main aim of this work is to develop an effective watermarking scheme for protecting digital images against various signal processing attacks with high image quality |
| [ | Dual image watermarking is proposed to preserve ownership rights, using critical homomorphic transform features (HT). | DWT, HT, SVD, AT | Host grayscale image: 512 × 512 Watermark grayscale: 512 × 512 | PSNR, SSIM, Normalized correlation coefficient | JPEG compression, Gaussian noise, Median filter, Salt and Pepper, Low pass filter, Sharpening, Gamma correction, Scaling, Translation, Rotation, | The suggested technique is tested under multiple attacks; the simulation results demonstrate its high robustness and imperceptibility. |
| [ | To protect various types of digital data from malicious attacks and to provide high robustness and imperceptibility | Homomorphic transform (HT), DWT, SVD | Host grayscale image: 512 × 512 Watermark grayscale: 256 × 256 | PSNR, Normalized correlation coefficient (NCC) | Rotation, Gaussian noise, Histogram eq., Gaussian filter, Salt and Pepper, Sharpening, Average filter, Median | This approach makes the scheme blind in nature and ensures copyright protection. |
| [ | To provide high imperceptibility, robustness, capacity, and security | RDWT (Redundant discrete wavelet transform), DCT (Discrete cosine transform), SVD | Host grayscale image: 512 × 512 Watermark grayscale: 256 × 256 | PSNR, Normalized correlation coefficient (NCC) | Gaussian noise, Wiener filter, Salt and Pepper, Median filter, Gamma correction, Shearing, | The proposed watermarking algorithm is more robust than the existing watermarking scheme against various attacks. |
| [ | The proposed method uses a cloud-based buyer-seller watermarking technology that uses a semi-trusted third party to prevent copying and maintain privacy. | |||||
| [ | To make the watermarking scheme resistant to geometric attacks, a geometric distortion detection method based upon the quaternion Zernike moment is introduced | Quaternion Hadamard transform (QHT), Schur decomposition, Quaternion Zernike moment | Host image of size 512 × 512: Lena, Baboon, Boat; Watermark image of size: 64 × 64 | SSIM, Normalized correlation coefficient | Contrast adjustment, histogram equalization, gamma correction, sharpening, filtering, Cropping, rotation, scaling | Experimental results show that the proposed scheme has not only good imperceptibility but also is robust to various kinds of attacks |
| [ | A novel image watermarking method is proposed. The fruit fly optimization is used to get an optimized scaling factor | DWT, HD (Hessenberg decomposition), SVD, Fruit fly optimization | Host grayscale image: 512 × 512 Watermark grayscale: 256 × 256, 128 × 128, 64 × 64 | PSNR, MSE, SSIM (Structural similarity index measurement), Normalized correlation coefficient | JPEG compression, Gaussian noise, median filter, Cropping, Gaussian LPF, Rescaling, Sharpening | Significant improvement in imperceptibility and robustness under various attacks. |
| [ | This paper presents a dual watermarking technique for color images in which robust watermarks are embedded for copyright protection | Least significant bit (LSB), DWT | Host image of size 512 × 512: Lena, Airplane, Baboon, Pepper, Lake, Splash, House Watermark: 64 × 64 | Peak signal to noise ratio (PSNR), Normalized correlation coefficient (NCC), SSIM, feature similarity (FSIM) index | Salt and Pepper, JPEG, Blurring, Gaussian noise, Darken, Twist, Resizing, Contrast | The proposed dual watermarking technique shows higher robustness and imperceptibility. |
| [ | To avoid the false positive problem by integrating the watermark image’s primary features and, therefore, provide copyright protection | DWT, SVD, Particle swarm optimization | Host grayscale image: 256 × 256 Watermark grayscale: 128 × 128 | PSNR, Normalized correlation coefficient (NCC) | Gaussian noise, Average filtering, JPEG compression, Histogram eq., Gamma correction | The proposed algorithm removes the false-positive problem and diagonal line problem |
| [ | The proposed watermarking technique is used to protect data from illegal modification or reproduction | DWT, SVD | Host images: Cameraman, Cell, Circuit, MRI, Pout | MSE, PSNR, SSIM | Gaussian noise, Sharpening, Blurring, Salt and Pepper, Rotation, Cropping | Simulation results have shown that this technique can attain good imperceptibility, as the perceptual quality has not been degraded |
| [ | To propose a secured, robust and imperceptible watermarking technique. | DWT, BEMD (bi-dimensional empirical mode decomposition), DCT, PSO (particle swarm optimization), and SVD | Host image of size 512 × 512: Barbara, baboon, cameraman, Lena, Tank, Goldhill Watermark image of size: 128 × 128 | PSNR, MSE, NCC | Salt and pepper, Gaussian filter, rotation, median filter, speckle, gamma correction, scaling, Shearing | In comparison to the current methodologies, the proposed method offers a meaningful improvement in robustness, imperceptibility, and security. |
| [ | This paper proposed a blind watermarking technique. Medical images are used for watermarking purposes. This method is proposed to provide high imperceptibility and robustness. | DWT, SVD, Region of interest (ROI) | Host images of size 1024 × 1024: X-ray, CT scan; Watermark EC logo of size: 32 × 32 | NCC, MSE, PSNR, WPSNR (Weighted PSNR) | Salt & pepper noise, Histogram equalization, Gaussian noise, Sharpening, Average filter, Resize, Cropping, JPEG compression | Analysis of the proposed scheme for color images shows that the scheme’s performance is better for medical images than natural images. |
| [ | To provide security, reliability, and robustness against attacks and to get an optimized scaling factor | DWT, Block SVD, Particle swarm optimization (PSO) | Host grayscale image: 512 × 512 Watermark grayscale: 64 × 64 | PSNR, NCC, Normalized similarity ratio (NSR) | Rotation, Cropping, Gaussian noise, JPEG compression, Histogram eq., Gamma correction, Salt and Pepper | Significant improvement in imperceptibility and robustness under various attacks |
| [ | This paper is proposed a significant region (SR) based image watermarking technique to design a more robust scheme against various attacks | Lifting Wavelet Transform (LWT), Random shuffling, Quantization, Block selection process | Host images of size 512× 512: Goldhill, Lena, Man, Airport, Tank, Truck, Boat, Barbara, Mandrill; Binary watermark of size 32 × 16 | PSNR, Normalized correlation coefficient (NCC), MSE, BER | JPEG, Gaussian low pass, Histogram, Cropping, Median filter, Salt and Pepper, Gaussian noise, speckle noise, contrast Adjustment, amplification, scaling | Significant improvement in imperceptibility and robustness under various attacks |
| [ | The current state of web service composition research based on bio-inspired algorithms is reviewed in this study. | Ant Colony Optimization (ACO), Genetic Algorithm (GA), Evolutionary Algorithm (EA), and Particle Swarm (PSO) | -- | -- | -- | This study provides an overview of the research on bio-inspired algorithms in web application composition and points out future directions. |
| [ | This paper proposes an algorithm for health care applications such as tele-ophthalmology, tele-medicine, etc. | DWT, DCT, SVD, Back propagation neural network | Cover image: 512 × 512 Symptoms image: 128 × 128 Record image 64 × 64 | PSNR, NCC | JPEG, Salt, and Pepper, Gaussian noise, Crop, Rotation, Resize, Average filter, Low pass filter, Gamma correction | The proposed technique is suitable for preventing patient identity theft and alteration for healthcare applications. |
Fig. 1Lifting wavelet decomposition
Fig. 2Different cases of Firefly optimization
Fig. 3Flow chart of Firefly optimization
Fig. 4Embedding Block diagram
Fig. 5Extraction Block diagram
Fig. 6Host images: P1-Patient 1, P2-Patient 2, P3-Patient 3
Fig. 7Watermark images: W1-Watermark 1 (MNNIT logo), W2-Watermark 2 (Details of Patient)
Fig. 8Watermarked images: WP1- Watermarked Patient 1, WP2-Watermarked Patient 2, WP3-Watermarked Patient 3
Fig. 9Extracted watermark images: EW1-Extracted watermark 1 (MNNIT logo), EW2- Extracted watermark 2 (Details of Patient)
PSNR, SSIM, and NCC values for different host images without attack
| Host Image | PSNR (dB) | SSIM | NCC1 | NCC2 |
|---|---|---|---|---|
| P1 | 45.8168 | 0.9969 | 1.0000 | 1.0000 |
| P2 | 45.7966 | 0.9951 | 1.0000 | 1.0000 |
| P3 | 45.8186 | 0.9967 | 1.0000 | 1.0000 |
PSNR, SSIM, and NCC values for P1 host image under attacks
| Attacks | PSNR (dB) | SSIM | NCC1 | NCC2 |
|---|---|---|---|---|
| Salt and Pepper noise (0.001) | 34.7385 | 0.9751 | 0.9998 | 0.9999 |
| Gaussian noise (0,0.001) | 30.8709 | 0.9716 | 0.9995 | 0.9994 |
| Speckle noise (0.02) | 26.2916 | 0.7133 | 0.9971 | 0.9984 |
| Gaussian low pass filter (3 × 3) | 45.1891 | 0.9937 | 0.9995 | 0.9998 |
| Average filter (3 × 3) | 38.9229 | 0.9851 | 0.9957 | 0.9981 |
| Median filter (3 × 3) | 43.0525 | 0.9883 | 0.9997 | 0.9999 |
| Rotation (2) | 12.5608 | 0.6203 | 0.9950 | 0.9958 |
| Histogram eq. | 11.7571 | 0.5618 | 0.9845 | 0.9861 |
| Sharpening | 31.7900 | 0.9758 | 0.9730 | 0.9876 |
| Wiener filter (3 × 3) | 42.5133 | 0.9870 | 0.9989 | 0.9995 |
| JPEG (90) | 43.9055 | 0.9928 | 0.9994 | 0.9998 |
| JPEG 2000 (10) | 45.1019 | 0.9924 | 0.9996 | 0.9998 |
| Motion blur | 35.8291 | 0.9760 | 0.9982 | 0.9921 |
| Shearing | 12.2016 | 0.6012 | 0.9870 | 0.9816 |
| Region of interest filtering | 44.7626 | 0.9918 | 1.0000 | 1.0000 |
PSNR, SSIM, and NCC values for P2 host image under attacks
| Attacks | PSNR (dB) | SSIM | NCC1 | NCC2 |
|---|---|---|---|---|
| Salt and Pepper noise (0.001) | 35.2279 | 0.9667 | 0.9999 | 1.0000 |
| Gaussian noise (0,0.001) | 30.4923 | 0.9630 | 0.9999 | 0.9999 |
| Speckle noise (0.02) | 21.9830 | 0.8146 | 0.9978 | 0.9985 |
| Gaussian low pass filter (3 × 3) | 42.3107 | 0.9845 | 0.9998 | 0.9999 |
| Average filter (3 × 3) | 33.9608 | 0.9637 | 0.9981 | 0.9990 |
| Median filter (3 × 3) | 41.7102 | 0.9873 | 0.9993 | 0.9997 |
| Rotation (2) | 15.8857 | 0.5843 | 0.9430 | 0.9703 |
| Histogram eq. | 20.9272 | 0.8102 | 0.9917 | 0.9884 |
| Sharpening | 35.9569 | 0.9410 | 0.9864 | 0.9947 |
| Wiener filter (3 × 3) | 43.9449 | 0.9878 | 0.9998 | 0.9996 |
| JPEG (90) | 44.3145 | 0.9908 | 0.9999 | 1.0000 |
| JPEG 2000 (10) | 45.2125 | 0.9938 | 1.0000 | 1.0000 |
| Motion blur | 32.8780 | 0.9555 | 0.9991 | 0.9961 |
| Shearing | 11.5788 | 0.4518 | 0.9964 | 0.9718 |
| Region of interest filtering | 45.1307 | 0.9948 | 1.0000 | 1.0000 |
PSNR, SSIM, and NCC values for P3 host image under attacks
| Attacks | PSNR (dB) | SSIM | NCC1 | NCC2 |
|---|---|---|---|---|
| Salt and Pepper noise (0.001) | 34.5093 | 0.9726 | 1.0000 | 0.9999 |
| Gaussian noise (0,0.001) | 30.5798 | 0.6763 | 0.9999 | 0.9998 |
| Speckle noise (0.02) | 27.6779 | 0.7993 | 0.9994 | 0.9992 |
| Gaussian low pass filter (3 × 3) | 43.0262 | 0.9938 | 0.9998 | 0.9997 |
| Average filter (3 × 3) | 35.3777 | 0.9642 | 0.9982 | 0.9975 |
| Median filter (3 × 3) | 38.5289 | 0.9734 | 0.9995 | 0.9996 |
| Rotation (2) | 14.1548 | 0.5840 | 0.9924 | 0.9970 |
| Histogram eq. | 10.4261 | 0.4135 | 0.9493 | 0.9842 |
| Sharpening | 31.0042 | 0.8947 | 0.9879 | 0.9827 |
| Wiener filter (3 × 3) | 40.3403 | 0.9728 | 0.9993 | 0.9997 |
| JPEG (90) | 42.8298 | 0.9862 | 1.0000 | 1.0000 |
| JPEG 2000 (10) | 44.8913 | 0.9943 | 1.0000 | 1.0000 |
| Motion blur | 30.4943 | 0.9090 | 0.9988 | 0.9883 |
| Shearing | 13.0938 | 0.4119 | 0.9960 | 0.9821 |
| Region of interest filtering | 41.7626 | 0.9923 | 0.9999 | 0.9999 |
Fig. 10Comparison of PSNR values for P1, P2, and P3 (various attacks)
Fig. 11Comparison of SSIM values for P1, P2, and P3 (various attacks)
Fig. 12a Time analysis of Parent calling functions b Time analysis of Children calling functions
Fig. 13Profile Summary
Fig. 14Extracted watermark images for P1
Fig. 15Extracted watermark images for P2
Fig. 16Extracted watermark images for P3
Fig. 17Matched features (a) Rotation 5 (P1) (b) Rotation 10 (P1) (c) Rotation 15 (P1) (d) Rotation 5 (P2) (e) Rotation 10 (P2) (f) Rotation 15 (P2) (g) Rotation 5 (P3) (h) Rotation 10 (P3) (i) Rotation 15 (P3)
Matched features using SURF
| Rotation in degrees | Matched Features (P1) | Matched Features (P2) | Matched Features (P3) |
|---|---|---|---|
| 5 | 36 | 32 | 33 |
| 10 | 33 | 33 | 36 |
| 15 | 33 | 26 | 24 |