An improved robust image watermarking method using DCT and YCoCg-R color space

An improved robust image watermarking method using DCT and YCoCg-R color space

Accepted Manuscript Title: An Improved Robust Image Watermarking Method Using DCT and YCoCg-R Color Space Author: Mohammad Moosazadeh Gholamhossein Ek...

1MB Sizes 2 Downloads 38 Views

Accepted Manuscript Title: An Improved Robust Image Watermarking Method Using DCT and YCoCg-R Color Space Author: Mohammad Moosazadeh Gholamhossein Ekbatanifard PII: DOI: Reference:

S0030-4026(17)30533-8 http://dx.doi.org/doi:10.1016/j.ijleo.2017.05.011 IJLEO 59156

To appear in: Received date: Accepted date:

15-8-2016 4-5-2017

Please cite this article as: Mohammad Moosazadeh, Gholamhossein Ekbatanifard, An Improved Robust Image Watermarking Method Using DCT and YCoCg-R Color Space, (2017), http://dx.doi.org/10.1016/j.ijleo.2017.05.011 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

paper.tex

ip t

An Improved Robust Image Watermarking Method Using DCT and YCoCg-R Color Space Mohammad Moosazadeha,∗, Gholamhossein Ekbatanifardb,∗ a Department

us

cr

of Information Technology Engineering, Mehrastan University, Astaneh Ashrafiyeh, Gilan, Iran b Department of Computer Engineering, Lahijan Branch, Islamic Azad University, Lahijan, Gilan, Iran

an

Abstract

Watermarking is one of the solutions to prevent unauthorized use of digital media. This solution can help the protection of ownership rights by embedding

M

the copyright information in the intended media. In this paper, a digital image watermarking algorithm in YCoCg-R color space is proposed. Thriplet components of YCoCg-R color space have a good decorrelation and changing one

d

component has the least impact on the two other color components. So it can be

te

effective in increasing the robustness of watermarking against various attacks. For watermark embedding the proposed method uses Discrete Cosine Transform and its coefficients relationship. During watermark bits embedding, complexity amount of host image blocks is utilized to select the target blocks and energy

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

value of host image blocks is used to adaptive selection of embedding strengths that it causes a very high robustness especially against JPEG compression. The Arnold transformation, also, plays an important role in increasing the security of our proposed method by scrambling the watermark. Considering the conflict among three main requirements of watermarking, including imperceptibility, robustness and capacity, the proposed method is compared with other algorithms and the results show the superior robustness of the proposed method over the other algorithms with same capacity. ∗ Corresponding

author Email addresses: [email protected] (Mohammad Moosazadeh), [email protected] (Gholamhossein Ekbatanifard)

Preprint submitted to Journal of LATEX Templates

August 15, 2016

Page 1 of 31

Keywords: Robust image watermarking, Coefficients relation, Discrete Cosine Transform (DCT), YCoCg-R color space, JPEG compression, Arnold

ip t

Transform Map (ATM)

cr

2010 MSC: 68U10

1. Introduction

us

Nowadays with pervasive growth of Internet and increasing the speed of communication networks, websites and social networks are used in humans real life as some of the basic tools. These applications provide users with easy access to digital assets such as images, videos, sounds, etc. So they can buy and

an

5

sell or copy the digital media without the permission of their owners. There-

M

fore, the protection of ownership rights of digital media has become a challenge for content producers. One of the methods of dealing with this issue is digital watermarking. Digital watermarking is embedding a piece of digital copyright information in the media that can be a logo or a pseudo-random sequence. The

d

10

term digital watermarking was first used by Tirkel in 1993 [1]. Digital wa-

te

termarking algorithms are generally divided into two domains: spatial domain methods in which digital watermarks are add into image pixel values directly, and frequency domain methods that embed digital watermarks by changing the

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

15

values of host image transforms coefficients. Meanwhile, algorithm plays a vital role in watermarking quality, and if the used watermarking technique is efficient, the embedded watermark cannot easily be detected [1]. Another category for watermarking consists of robust watermarking for protecting the ownership rights of digital media and fragile watermarking for authenticating the digital

20

media [2].

Various algorithms have been designed and tested for watermark embedding

so far. In [3], a watermarking algorithm in YCbCr color space is presented by integration spatial and frequency domains. In this method, after 8×8 blocking the Y component of the host image, the DC coefficient of each block is computed 25

directly without DCT. Then in order to watermark embedding, DC coefficient

2

Page 2 of 31

value is changed based on the corresponding watermark bit and quantization step and then a percentage of this changing amount is added to the other pixels

ip t

of the block in the spatial domain. In [4] at first, DWT is applied on the host image and then with help of multiple scaling factors, the block wise singular

components are used for watermark embedding. In this method, in order to

cr

30

find the values of scaling factors, the ABC (artificial bee colony) is used. In

us

[5] four neighbor 8×8 blocks from the transform coefficients of the blue channel of the host image are selected and a low-frequency coefficient is determined by the same position in all four blocks, then one coefficient is selected randomly from these four coefficients for watermark embedding and the others are used as

an

35

references. The watermark image is encoded by BCH code, and then embedded into the selected DCT coefficients. In [6], a robust watermarking method is

M

proposed that consists of two embedding stages. In the first stage, the image is divided into several blocks and the Contourlet transform (CT) is performed 40

on each block. Then the watermark is embedded in the high frequency com-

d

ponent of each block. In the second stage, the Contourlet transform (CT) is

te

applied on global image and the watermark is embedded in the low frequency component. During watermark extracting, with the help of a measure, between the two extracted watermarks, the most appropriate watermark is selected. The

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

45

reasoning of this method is that by embedding the watermark in the local as well as the global CT coefficients of two different frequency bands, it could obtained good robustness against various attacks. In [7], a ridgelet-based watermarking algorithm is proposed which modulates ridgelet coefficients on strongest energy direction using an energy modulation technique, and then by designing a wa-

50

termarking framework based on tissue P systems, a special membrane structure is designed and its cells are used as parallel computing units to find the optimal watermarking parameters. Digital watermarking in [8] by changing the angle quantization index modulation (AQIM) method, proposes a new method, called the difference AQIM (DAQIM) method that embeds the watermark bit

55

by quantizing the difference of the two angles formed by two vectors instead of quantizing the angles directly. In [9], a method called the improved AQIM 3

Page 3 of 31

(IAQIM) is proposed which has also tried to improve the AQIM, by two ways: designing the minimum distortion angle quantization and using the amplitude

60

ip t

projection strategy.

Our goal in this paper is to propose a method of robust watermarking against

cr

various attacks especially JPEG compression. We have considered five principles to acquire a robust method:

us

• transferring the host image to a suitable color space with the lowest correlation between its components

• considering a good feature to select the target blocks for watermark em-

an

65

bedding

M

• choosing the optimal embedding strengths for each block separately • applying a suitable embedding method stable against changes • increasing the watermark security by an appropriate reversible scrambling method.

d

70

te

In this paper, by considering these five principles, we have introduced a new robust watermarking algorithm that uses YCoCg-R color space. For choosing the target blocks for watermark embedding and choosing the optimal embedding

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

strengths, the complexity amount of the blocks and the mean of its coefficients

75

are considered respectively. Also for watermark bits embedding, the relation between DCT coefficients and for scrambling the watermark, the Arnold transformation are used.

The remaining part of this paper is organized as follows: In section 2, 3 and

4 Discrete Cosine Transform, Arnold transform map and YCoCg-R color space

80

are described respectively. In section 5 the proposed watermarking method is explained. Performance evaluation and experimental discussion of the proposed method is presented in section 6 and performance comparison with other algorithms is given in section 7. Finally, the conclusion of this paper is drawn in section 8.

4

Page 4 of 31

7

15

16

28

29

3

5

8

14

17

27

30

43

4

9

13

18

26

31

42

44

10

12

19

25

32

41

45

54

11

20

24

33

40

46

53

55

21

23

34

39

47

52

56

61

22

35

38

48

51

57

60

62

36

37

49

50

58

59

63

64

cr

6

us

2

an

85

1

ip t

Table 1: DCT coefficients order in zigzag scan

2. Discrete Cosine Transform

M

One of the methods for transforming spatial domain to frequency domain is Discrete Cosine Transform or DCT. According to Table1, by using zigzag scan, the obtained coefficients can be divided into three different frequency

90

d

bands, including high, middle and low frequency bands. The low frequency band coefficients have most energy and in fact, they are perceptually significant

te

portion of image. Also the high frequency band coefficients have lowest energy and they are very vulnerable against attacks. So the watermark is usually embedded into middle frequency band (including 7 to 28 coefficients) ) [10].

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

DCT-based watermarking algorithms are more robust than spatial domain

95

methods. They have robustness against common image processing operations such as low pass filtering, brightness and contrast adjustment, blurring etc. But, they are weak against geometric attacks such as rotation, scaling, cropping etc. DCT watermarking field is classified in two categories including global DCT watermarking and block-based DCT watermarking [1].

100

3. Arnold Transform Map To scramble the images, lots of methods such as Arnold Transformation, Magic Transformation, Hilbert Curve, Conway Game, Broad Gray Code Transformation and Orthogonal Latin Square Transformation are used [11]. Our 5

Page 5 of 31

that is defined as Eq.(1) [12]:    x0 1  = y0 1

1 2

 

x y

  (modN )

(1)

cr

105

ip t

choice to scramble the watermark image is Arnold Transform Map or ATM

In which (x, y) are the original image pixels, and (x’, y’) are the scrambled image pixels, and N is order watermark image. Arnold transforming as a reversible

us

transformation has a specific feature: after certain times of this transforming, image returns to its original state. Therefore, watermarking image scrambling time can be used as watermarking key.

an

110

4. YCoCg-R Color Space

M

Most of the watermarking schemes are presented for gray scale images. Some watermarking methods are, also, implemented on color images that are mainly performed on RGB, YUV, YIQ and YCbCr color spaces [3, 5, 12, 13]. Although the algorithms presented for gray images can be generalized to work

d

115

te

with color images, but most of the times the ultimate action is not satisfactory [14]. So choosing color space for watermark embedding is an important issue for researchers, investigated in [15, 16].

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

For achieving the robustness in watermarking, a change in one color compo-

120

nent from the host image should not impact on other color components. Color spaces like YCbCr have good decorrelation, but even better decorrelation can be obtained by the YCoCg [17]. The YCoCg color space breaks down a color image into three components Luminance (Y), Chrominance orange (Co) and Chrominance green (Cg). Compared with RGB, this color space, provides a

125

good decorrelation [18].

YCoCg-R is the reversible integer to integer version of YCoCg. According to Eq.(2), the RGB to YCoCg-R transformation and its inverse are defined as

6

Page 6 of 31

[19]: t = Y + bCg/2c

t = B + bCo/2c

⇐⇒

G = Cg + t B = t − bCo/2c

Y = t + bCg/2c

R = B + Co

(2)

cr

Cg = G − t

ip t

Co = R − B

YCoCg-R features are similar to YCoCg, but it provides better reversibility. For lossless encoding, using a reversible transformation can be useful and

us

130

YCoCg-R has this ability. In [17] the coding gain YCoCg-R is compared to several YCbCr transforms specified in H.264/AVC Annex E, and the YCoCg-R

an

has a 0.7 dB improvement. Also the YCoCg-R color space can improve PSNR as much as 3 dB.

5. Proposed Method

M

135

The proposed method utilizes the relationship between one selected middle

d

frequency coefficient and five low frequency coefficients from each block to embed the watermark bits. Based on our tests, we have selected YCoCg-R color space

140

te

for watermarking due to low dependence of its color components to each other. Also in order to increase the security, we have used Arnold transform map for scrambling the watermark. In embedding procedure, we have considered block

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

complexity feature for selecting the suitable blocks and also we have chosen embedding strength for each block adaptively based on energy value of each block. This section will describe the proposed method in detail and the block

145

diagram of the proposed watermark embedding and extraction algorithm is described in Fig.1 and Fig.2 respectively. 5.1. Watermark Embedding Algorithm The proposed model for watermark embedding includes 10 steps as follows: Step 1. Scrambling watermark image by Arnold transformation (5 times)

150

Step 2. Converting the host image from RGB to YCoCg-R color space and separating the three components Y, Co and Cg.

7

Page 7 of 31

Step 3. Selecting the Y component for watermark embedding, and transferring

ip t

it to frequency domain by DCT and performing 8×8 blocking. Step 4. Calculating the complexity of each block by variance function, then 155

sorting and selecting the most complex blocks for watermark embedding

cr

in order to increasing the resistance of watermarking against JPEG compression.

us

Step 5. Calculating the energy amount of each block by mean function and selecting embedding strength (α) based on energy value of each block 160

according to Eq.(3), So that for a block with lower energy, larger α

an

value is selected.

α = F 1 × (1 − M )

(3)

M

Where M means the result of applying mean function on each block and F1 is the impact factor of mean value to create a balance in robustness and imperceptibility.

Step 6. Running the zigzag scan on each block and dividing its coefficients into

d

165

low, middle and high bands according to Table1.

te

Step 7. Performing embedding operations in each block according to Eq.(4) R = (C(2) + C(3) + C(4) + C(5) + C(6) ) × F 2   R − α if R − C < α and W = 0  i (x)   0 C(x) = R + α if C(x) − R < α and Wi = 1     C

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

(4)

(x)

In which C(2) , C(3) , C(4) , C(5) and C(6) are the low frequency coefficients

in position 2 to 6 in zigzag scan, F2 is the impact factor of low fre-

170

quency coefficients, C(x) is the selected coefficient for embedding, α is 0 the embedding strength, Wi is corresponding watermark bit and C(x)

is watermarked coefficient in selected block. Step 8. Repeating the steps 5 to 7 for embedding all watermark bits. Step 9. Returning watermarked Y component from frequency domain to spatial 175

domain by inverse DCT.

8

Page 8 of 31

ip t cr us an M d te

Figure 1: Watermark embedding model

Step 10. Combining watermarked Y component with two other original compo-

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

nents and then returning host image from YCoCg-R to RGB color space and finally obtaining the watermarked image.

5.2. Watermark Extraction Algorithm

180

The proposed model for watermark extraction includes 6 steps as follows:

Step 1. Converting the watermarked image from RGB to YCoCg-R color space and separating the three components Y, Co and Cg. Step 2. Selecting the Y component for watermark extraction, and transferring it to frequency domain by DCT and perform 8×8 blocking.

185

Step 3. Selecting watermarked blocks based on the embedding sorting.

9

Page 9 of 31

ip t cr us an

Figure 2: Watermark extracting model

M

Step 4. Running the zigzag scan on each block and dividing its coefficients into low, middle and high bands according to Table1. Step 5. Performing extracting operations according to Eq.(5)

(5)

te

d

0 0 0 0 0 R0 = (C(2) + C(3) + C(4) + C(5) + C(6) ) × F2   1 if C 0 > R0 (x) Wi0 =  0 otherwise

0 0 0 0 0 In which C(2) , C(3) , C(4) , C(5) and C(6) are the low frequency coefficients

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

190

in position 2 to 6 in zigzag scan, F2 is the impact factor of low frequency 0 coefficients, C(x) is watermarked coefficient,Wi0 is the extracted water-

mark bit in selected block.

Step 6. Repeating steps 4 and 5 for extracting all watermark bits and finally obtaining the extracted watermark image.

195

6. Performance Evaluation and Experimental Discussion To evaluate the proposed method, we have used six famous images from USC-SIPI image database including Lena, Peppers, Baboon, Barbara, Fishing Boats, F16 with the size of 512×512 pixels as the host images and also an image with size of 32×32 pixels as the watermark image. Host images and watermark 10

Page 10 of 31

Table 2: Original host images with best position for watermark embedding and the resulting PSNR

Fishing Boats

Barbara

PSNR=41.03

PSNR=40.42

Position(x)=13

Position(x)=13

Position(x)=12

Baboon

Peppers

Lena

us

cr

ip t

F16

M

an

PSNR=40.07

d te

PSNR=39.28

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Position(x)=13

200

PSNR=40.33

PSNR=40.30

Position(x)=13

Position(x)=10

image are shown in Table2 and Fig.3 respectively. In [1], the most important features of digital watermarking algorithm are introduced as imperceptibility, robustness, security, capacity, reversibility, complexity and possibility of verification. By embedding the 1024 bits watermark into each of the six host images, we have considered the capacity of our proposed method 1024 bits and then

205

evaluated the robustness and imperceptibility of our proposed method against various attacks. In next sections the amount of imperceptibility and robustness value of our proposed method will be described respectively.

11

Page 11 of 31

Figure 3: Watermark image and its scrambled version

cr

6.1. Imperceptibility Evaluation

ip t

⇐⇒

Cox et al. define imperceptibility as ”perceptual similarity between the original and the watermarked versions of the cover work” [20]. Imperceptibil-

us

210

ity means that after watermarking implementation, not any visible distortion should appear in the image because it will reduce the commercial value of digi-

an

tal media [21]. According to Eq.(6), peak signal to noise ratio (PSNR) is used as a measure for determining the degree of degradation of watermarked image quality compared to the host image [4]. P SN R = 10log10

M

215

n × n × (Xmax )2 Pn Pn ∗ 2 i=1 j=1 (Xi,j − Xi,j )

! (6)

d

In which X is the host image, X ∗ is the watermarked image both in n×n and Xmax is peak signal value in the host image. Imperceptibility is associated with

te

human sensory properties. A clear watermark causes no quality loss [1]. In general PSNR ≥ 48dB represents that the image quality is excellent, without 220

any noticeable changes. PSNR between 35dB to 48dB means good quality and

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

PSNR between 29dB to 35dB represent acceptable quality. PSNR=25dB is the critical point. If the PSNR comes under this amount, in fact watermarking will be obvious [22].

In order to evaluate the imperceptibility of the proposed algorithm, 1024 bits

225

of intended watermark is embedded into each of these six host images and PSNR is calculated. Embedding parameters are considered F1=5.49, F2=0.0000014. The obtained PSNR and suitable positions to watermark bits embedding for each host image are represented in Table 2. As can be observed, maximum amount of PSNR is achieved for F16 image with 41.03 dB and minimum value

230

is achieved for Baboon image with 39.28 dB and the imperceptibility of other images are between these two values. The obtained results represent that our

12

Page 12 of 31

proposed method has high imperceptibility according to presented condition in

ip t

[22]. 6.2. Robustness Evaluation 235

Cox et al. define robustness as ”ability to detect the watermark after com-

cr

mon signal processing operations” [20]. According to Eq.(7), the normalized correlation (NC) has been used for quantitative evaluation of the similarity be-

(7)

an

us

tween original and extracted watermark [3]: Prw Pcw 0 (Wi,j × Wi,j ) i=1 Prwj=1 Pcw NC = 2 W i,j i=1 j=1

0 In which Wi,j and Wi,j are the original and extracted watermark respectively 240

with size of rw×cw. In general, similarity between the original and extracted

M

watermark is achieved with NC> 0.85 [23].

Some researchers use metric BER to evaluate the robustness of watermarking. According to Eq.(8), the bit error ratio (BER) is used to detect the bit

which the zero amount shows no error in extracted watermark [5]:

te

245

d

error rate in the extracted watermark compared with the original watermark in

BER =

m X n 0 X Wi,j ⊕ Wi,j (m × n) i=1 j=1

(8)

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

In which W and W’ are original and extracted watermark image respectively with size of n×m and ⊕ means Xor operation. In the following, the robustness

of our proposed method is investigated under five general groups of attacks. Obtained results after applying 27 various attacks on Lena watermarked image

250

are represented in Table 3, Table 4 and Table5. 6.2.1. Filtering Attacks

One of the most common manipulations in digital image is filtering. In this group of attacks we use three famous filters including Median filter, Average filter and Gaussian low-pass filter. In Median filtering, each pixel is replaced by 255

the median of its neighbors, whereas the Average filtering is to replace each pixel with the average value of its neighbors. The pattern of neighbors is called the 13

Page 13 of 31

Table 3: Robustness of proposed method for Lena host image against first series attacks

Filter

Average

Filter

Median

3×3

3×3

NC

1

0.9724

0.9961

BER

0

0.0136

0.0019

cr

3×3

us

Attacked Image

Extracted water-

50%

Scaling 50%

Left

te

Extracted water-

Cropping

d

Left-Up

25%

M

Cropping Attack

an

mark

Attacked Image

Filter

ip t

Gaussian Attack

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

mark NC

0.8418

0.7615

0.9862

BER

0.0830

0.1279

0.0068

Attack

Rotation 1 degree

Histogram Sharpening Equalization

Attacked Image

Extracted watermark NC BER

0.9705 0.0146

14

1

1

0

0

Page 14 of 31

Gaussian Noise

Salt

&

noise

Poisson Noise

us

Attacked Image

Extracted water-

an

mark 0.9941

1

0.9488

BER

0.0029 0

0

0.0253

Attack

Speckle Noise

AWGN SNR=10

JPEG70+Gaussian

d

Noise

te

Extracted water-

M

NC

Attacked Image

Pepper

cr

Attack

ip t

Table 4: Robustness of proposed method for Lena host image against second series attacks

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

mark NC

0.8780

0.5800

0.9882

BER

0.0605

0.2099

0.0058

Attack

JPEG50+Average JPEG50+Median JPEG70+Scaling50% Filter Filter

Attacked Image

Extracted watermark NC BER

0.9803 0.0097

15

0.9685

0.9862

0.0156

0.0068

Page 15 of 31

Table 5: Robustness of proposed method for Lena host image against third series attacks

JPEG QF=10

JPEG QF=20

JPEG QF=30

NC

0.9370

1

BER

0.0313

0

0

Attack

JPEG QF=40

JPEG QF=50

JPEG QF=60

ip t

Attack

Extracted water-

NC

M te

mark

1

d

Attacked Image

Extracted water-

an

mark

us

cr

Attacked Image

0

1

1

BER

0

0

0

Attack

JPEG QF=70

JPEG QF=80

JPEG QF=90

NC

0

1

1

BER

0

0

0

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

Attacked Image

Extracted watermark

16

Page 16 of 31

”window” and its size is changeable. Also Gaussian low-pass filtering reduces the high frequency components in the signal and produces a version of the

260

ip t

original image without high frequency components. After performing these

filters on host images, the quality of extracted watermark is evaluated by NC

cr

and BER. The results are represented in Table 6. As can be seen, robustness of the proposed method in all six host images against Gaussian low-pass filter is

us

the maximum possible value. Also the most robustness amount against Median and Average filters belongs to Fishing Boats and F16 images and the minimum 265

amount belongs to Baboon image. In total, the results indicate a very high

an

resistance of the proposed method against these three filters. 6.2.2. Geometric Attacks

M

The robustness of the proposed method against four types of Geometric attacks Cropping 25%, Cropping 50%, Scaling 50%, one degree Rotation are 270

explained in Table 6.

d

Image cropping is frequently used in real life. Cropping refers to the selecting and removing a portion of an image. So some of the embedded watermark bits

te

may be eliminated. The minimum value of robustness against these cropping attacks belongs to Barbara and Fishing Boats host images. Also other host images especially F16 have good robustness.

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

275

Scaling is commonly performed to fit the image into the desired size, which

causes losing the image information. In Scaling 50%, image size is reduced to 1/2 and again, it is returned to original size. Quality of extracted watermark against this attack is very high, so at the least amount, the NC is equal to

280

0.9744.

Rotation is a circular movement of an input image around a pivot point.

In this attack, host image is rotated by one degree and again returned to the previous state. Then with cutting the main part of image and removing the additional pixels, the least NC value is obtained equal to 0.9705 in the Lena

285

host image.

17

Page 17 of 31

6.2.3. Image Enhancement Attacks This group includes Histogram Equalization and Sharpening attacks. Val-

ip t

ues in Table 6, show that our proposed method has the maximum amount of robustness against these two attacks and the extracted watermark is in the best situation.

cr

290

6.2.4. Compression Attacks

us

Regarding the increasing use of Internet and reducing uploaded images size by users because of low bandwidth, the watermarking algorithm should be ro-

295

an

bust against Compression attacks. Here we have utilized JPEG Compression with quality factor (QF) from 10 to 90. The results in Table 7 indicate that the proposed method has extraordinary robustness against this attack and just

M

with QF=10 some embedded information is lost. 6.2.5. Noise Attacks

300

d

This group of attacks is various and includes five different types of noise, Gaussian noise, Poisson noise, Salt & Pepper noise, Speckle noise, Add White

te

Gaussian Noise (AWGN). In general, noise addition is for degrading the watermark information, which causes difficulty in the watermark extraction. As can be seen in Table 8, the most corrupting influence is given to the watermark-

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

ing algorithm by white noise with SNR = 10 and in the four other noises, with

305

NC> 0.85 , the obtained results indicate high resistance of the proposed method against these noises.

6.2.6. Combined Attacks

Sometimes, the user executes processing operations consecutively, so investi-

gating the watermarking robustness against combined attacks is important. In

310

our proposed method we have tested four types of combined attacks, including JPEG QF=70 + Gaussian Noise, JPEG QF=70 + Scaling50%, JPEG QF=50 + Average Filter, JPEG QF=50 + Median Filter. Quality of the extracted watermark after applying these types of attacks is investigated in Table 8 and obtained results show high robustness of the proposed method. 18

Page 18 of 31

ip t

Table 6: Resulted NC of proposed method for six host images against first series attacks

Filter

Average 3×3

Lena

1

0.9724

Peppers

1

0.994

Baboon

1

0.9705

Barbara

1

0.9746

Fishing Boats

1

F16

1

Attack

Cropping

0.8418

Peppers Baboon

Fishing Boats

0.9646

0.9764

1

1

1

1

Cropping

50%

Scaling 50%

0.7615

0.9862

0.8318

0.5807

0.9921

0.8502

0.612

0.9744

0.5907

0.4742

0.9764

0.5409

0.4282

1

te

Barbara

0.9902

Left

d

Lena

Filter

0.9961

M

Left-Up

25%

Median 3×3

an

3×3

Filter

cr

Gaussian

us

Attack

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

F16

0.9236

0.721

1

Attack

Rotation 1 degree

Histogram

Sharpening

Equalization

Lena

0.9705

1

1

Peppers

0.9724

1

1

Baboon

0.9626

1

1

Barbara

0.9665

1

1

Fishing Boats

0.9921

1

1

F16

0.9921

1

1

19

Page 19 of 31

ip t

Attack

JPEG QF=10

JPEG QF=20

Lena

0.937

1

Peppers

0.1301

1

Baboon

0.107

1

Barbara

0.1105

1

Fishing Boats

0.1292

F16

0.1791

Attack

JPEG QF=40

Lena

1

Peppers

1

Baboon

1

Barbara

1

cr

Table 7: Resulted NC of proposed method for six host images against third series attacks

JPEG QF=30

us

1

1

1

1

1

1

JPEG QF=50

JPEG QF=60

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Attack

JPEG QF=70

JPEG QF=80

JPEG QF=90

Lena

1

1

1

Peppers

1

1

1

Baboon

1

1

1

Barbara

1

1

1

Fishing Boats

1

1

1

F16

1

1

1

F16

d

te

Fishing Boats

M

an

1

1

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

20

Page 20 of 31

ip t

Table 8: Resulted NC of proposed method for six host images against second series attacks

Gaussian Noise

Poisson Noise

Salt

&

Pepper

cr

Attack

noise

1

Peppers

0.9902

1

Baboon

0.9882

1

Barbara

0.9921

1

Fishing Boats

0.9843

F16

0.9862

Attack

Speckle Noise

Peppers Baboon

Fishing Boats

0.9508

0.9607

0.9586

1

0.9077

AWGN SNR=10

JPEG70+Gaussian Noise

0.58

0.9882

0.8427

0.6113

0.994

0.872

0.6078

0.9882

0.9134

0.6113

0.9961

0.9135

0.5937

0.9783 0.9842

te

Barbara

0.935

1

M

0.878

d

Lena

0.9488

us

0.9941

an

Lena

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

F16

0.6872

0.5665

Attack

JPEG70+

JPEG50+Average JPEG50+Median

Scaling50%

Filter

Filter

Lena

0.9803

0.9685

0.9862

Peppers

0.9902

0.9921

0.9902

Baboon

0.9744

0.9508

0.8957

Barbara

0.9764

0.9707

0.953

Fishing Boats

0.9961

0.9961

0.9941

F16

0.9961

1

1

21

Page 21 of 31

ip t cr us an

Figure 4: The tradeoffs among three main requirements of watermarking

7. Performance Comparison with Other methods

M

315

Among the requirements of the Digital watermarking, three requirements

d

including imperceptibility, robustness and capacity are in conflict with each other and as can be seen in Fig.4 increase in either of these requirements will lead

320

te

to a reduction of two other requirements. Performance of various watermarking methods can be compared with each other in terms of these three requirements. An appropriate way for a fair comparison between watermarking algorithms

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

is embedding a watermark with the same size as the other algorithms into the common host image. In this case, the capacity value among all algorithms is equaled and necessary conditions for comparison of imperceptibility and robust-

325

ness will be provided. In this section, in order to compare our proposed method with other watermarking algorithms, Lena image is used as host image. Then watermarks with various lengths: 4096 bits (64×64), 1024 bits (32×32), 900 bits (30×30) and 256 bits (16×16) are embedded in Lena host image. At first we embedded a 4096 bits (64×64) watermark in Lena host image

330

and then we compared the proposed method with [4] algorithm. PSNR in our method and in [4] are 33.26 and 33.12 respectively so imperceptibility of our proposed method is higher. As can be seen in Table 9 and Fig.5, robustness of

22

Page 22 of 31

Table 9: Robustness comparison for 2048 bits watermark

Proposed

[4]

Gaussian Filter

5×5

1

0.9895

Average Filter

3×3

0.9876

0.9157

Median Filter

5×5

0.7816

0.8545

Scaling

50%

0.9882

0.9878

0.9916

0.8272

Salt & Pepper

0.9388

0.7256

Speckle Noise

0.8271

0.8132

1

0.988

an

Gaussian Noise

JPEG Compression

QF=50

[4]

M

Proposed 1.2 1

NC

cr

Parameter

us

Attack type

ip t

Based on NC

0.8 0.6

d

0.4 0.2

te

0

Gaussian Filter Average Filter Median Filter 5×5 3×3 5×5

Scaling 50% Gaussian Noise Salt & Pepper Speckle Noise

JPEG QF=50

Figure 5: Comparison between the proposed Proposed [5] method and [4]

Ac ce p 0.3

0.25

the0.2proposed method in all of attacks (except Median filter 5×5) is higher than BER

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

[4].0.15

335

0.1

In the second stage, watermark length is reduced to 1024 bits (32×32). After

0.05

0

Gaussian Cropping Rotation Gaussian JPEG JPEG JPEG10 JPEG JPEG and JPEG also JPEGit that, proposed method is compared withJPEG [5] inJPEG Table and Fig.6 Filter

25%

1 degree

Noise

QF=10

QF=20

QF=30

QF=40

QF=50

QF=60

QF=70

QF=80

QF=90

is compared with [6] in Table 10 and Fig.7. In this case, PSNR of our method is 40.30, while in [5] and [6] are 38.12 and 38.72 respectively. Obtained results show higher PSNR of our proposed method than [5] and [6]. Also regarding

340

robustness, our proposed method has higher resistance especially in compression JPEG and only in Cropping 25%, [5] is better. In compare with [6], our proposed method has higher robustness and just in two Cropping attacks, the way [6] has

23

Page 23 of 31

Proposed

[4]

1.2

0.6 0.4 0.2 0 Gaussian Filter Average Filter Median Filter 5×5 3×3 5×5

Scaling 50% Gaussian Noise Salt & Pepper Speckle Noise

Proposed

JPEG QF=50

[5]

0.3

0.2

0.15 0.1

0.05 0 JPEG QF=20

JPEG QF=30

JPEG QF=40

JPEG QF=50

JPEG QF=60

JPEG QF=70

JPEG QF=80

JPEG QF=90

cr

Gaussian Cropping Rotation Gaussian JPEG Filter 25% 1 degree Noise QF=10

ip t

BER

0.25

Proposed

[6]

1.2

an

NC

1

us

Figure 6: Comparison between the proposed method and [5]

0.8 0.6 0.4

M

0.2

d

0

0.3

te

Figure 7: Comparison between the proposed method and [6] Proposed [7] 0.35

BER

0.25 performance. better 0.2

In the third stage, a watermark with 900 bits (30×30) length is used and the

0.15

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

NC

1 0.8

0.1

345

obtained results are compared with [7] in Table 11 and Fig.8. PSNR value in 0.05 0

Gaussian Filter Median and Filter [7] Cropping 25% Scaling 41.64 50% Gaussian Noise Salt &The Pepper results JPEG Q=60 our proposed method is 42.06 and respectively. show

that our proposed method has much higher imperceptibility and resistance in all applied attacks.

In the last stage, a watermark 256 bits (16×16) length is embedded in the

350

Lena host image and then the robustness of the proposed method in Table 12 and Fig.9 with [8] and in Table 12 and Fig.10 with [9] are compared. PSNR value in our proposed method, [8] and [9] are 44, 42 and 43 respectively. As can be seen in Table5, our proposed method, in addition to having high imperceptibility, has better robustness than two other methods except AWGN.

24

Page 24 of 31

Table 10: Robustness comparison for 1024 bits watermark

Proposed

[5]

Proposed

[6]

Gaussian Filter

0

0

1

1

Median Filter

-

-

0.9961

0.531

25%

0.0830

0.046

0.8418

0.9908

50%

-

-

0.7615

0.9861

1◦

0.0146

0.074

-

-

-

1

0.9858

-

1

1

0.0029

0.02

0.9941

0.985

-

-

1

1

-

-

0.9488

0.869

QF=10

0.0313

0.274

-

-

QF=20

0

0.231

-

-

0.181

-

-

Cropping

Rotation

-

Sharpening

-

an

Histogram Equalization

Gaussian Noise Poisson Noise

M

Salt & Pepper JPEG Compression

QF=30

0

QF=40

0

0.092

-

-

QF=50

0

0.071

-

-

QF=60

0

0.047

-

-

0.2

QF=70

0

0.01

1

0.9906

0

QF=80

0

0

1

1

QF=90

0

0

1

1

1.2

te

1

NC

[6]

d

Proposed

cr

Parameter

us

Attack type

Based on NC

ip t

Based on BER

0.8 0.6

Ac ce p

0.4

Proposed

[7]

0.35 0.3

0.25

BER

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

0.2

0.15 0.1 0.05 0 Gaussian Filter

Median Filter

Cropping 25%

Scaling 50%

Gaussian Noise

Salt & Pepper

JPEG Q=60

Figure 8: Comparison between the proposed method and [7]

25

Page 25 of 31

Based on BER Parameter

Proposed

[7]

Gaussian Filter

0

0.2147

Median Filter

0

0.3012

cr

Attack type

25%

0.1433

0.2358

Scaling

50%

0.0011

0.1974

Gaussian Noise

0.0156

0.1952

Salt & Pepper

0.0178

0.1027

an

us

Cropping

JPEG Compression

ip t

Table 11: Robustness comparison for 900 bits watermark

QF=60

0

0.1043

M

Table 12: Robustness comparison for 256 bits watermark

Gaussian Filter

[8]

[9]

0

0

0

0

0.0018

-

0

0.0001

0

150%

0

0

-

200%

0

0

-

0.5 ◦

0

0.3653

0.3421

0

-

0.4251

D=0.01

0

0

0

D=0.02

0.0078

-

0.0101

D=0.04

0.0039

-

0.0302

SNR=10

0.1289

0.0179

0.0112

QF=20

0

0.0171

0.0102

QF=30

0

0.0039

0.0014

QF=40

0

-

0.0001

QF=60

0

-

0

Median Filter Scaling

Rotation

Salt & Pepper

AWGN

JPEG Compression

Based on BER

Proposed

te

Average Filter

Parameter

d

Attack type

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

1



26

Page 26 of 31

[8] [8]

ip t

Proposed Proposed

0

Gaussian Filter Gaussian Filter

Average Filter Average Filter

Median Filter

Scaling 2

Median Filter

Scaling 2

cr

BER BER

0.4 0.35 0.4 0.3 0.35 0.25 0.3 0.2 0.25 0.15 0.2 0.1 0.15 0.05 0.1 0.050

Rotation 0.5 Salt & Pepper AWGN 10 JPEG Q=20 JPEG Q=30 D=0.01 Rotation 0.5 Salt & Pepper AWGN 10 JPEG Q=20 JPEG Q=30 D=0.01

Proposed Proposed

[9] [9]

an

BER BER

0.45 0.4 0.45 0.35 0.4 0.3 0.35 0.25 0.3 0.2 0.25 0.15 0.2 0.1 0.15 0.05 0.1 0 0.05 0

us

Figure 9: Comparison between the proposed method and [8]

M

Gaussian Median Rotation Rotation 1 Salt&Pep Salt&Pep Salt&Pep AWGN Filter Filter 0.5 D=0.01 D=0.02 D=0.04 10 Gaussian Median Rotation Rotation 1 Salt&Pep Salt&Pep Salt&Pep AWGN Filter Filter 0.5 D=0.01 D=0.02 D=0.04 10

JPEG Q=20 JPEG Q=20

JPEG Q=30 JPEG Q=30

JPEG Q=40 JPEG Q=40

JPEG Q=60 JPEG Q=60

8. Conclusion

te

355

d

Figure 10: Comparison between the proposed method and [9]

In this paper, a color space called YCoCg-R, which has been applied rarely so far in watermarking algorithms and its component have a good decorrelation,

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

is used. In the proposed watermarking method, the relationship between DCT coefficients in Y component of the host image is used for watermark embedding.

360

Among features of this method we can mention utilizing variance function and complexity characteristics for choosing the suitable blocks and also applying mean function to adaptive selection of the embedding strengths. Also in order to increase security, the Arnold transform is performed to scramble the watermark image. To evaluate the proposed method, a watermark with 1024 bits length

365

embedded in six host image and experimental results show high robustness against various attacks especially JPEG compression. Then by changing in watermarking capacity and inserting the watermarks with various lengths, the proposed method was compared with six other algorithms and the results showed

27

Page 27 of 31

that in the same capacity condition, our proposed method has higher robustness than other algorithms.

ip t

370

References

cr

References

us

[1] P. Singh, R. Chadha, A survey of digital watermarking techniques, applications and attacks, International Journal of Engineering and Innovative 375

Technology (IJEIT) 2 (9) (2013) 165–175.

an

[2] H.-y. Yang, Y. Zhang, P. Wang, X.-y. Wang, C.-p. Wang, A geometric correction based robust color image watermarking scheme using quaternion exponent moments, Optik-International Journal for Light and Electron Op-

380

M

tics 125 (16) (2014) 4456–4469. doi:10.1016/j.ijleo.2014.02.028. [3] Q. Su, Y. Niu, Q. Wang, G. Sheng, A blind color image watermarking

d

based on dc component in the spatial domain, Optik-International Journal

te

for Light and Electron Optics 124 (23) (2013) 6255–6260. doi:10.1016/ j.ijleo.2013.05.013.

[4] I. A. Ansari, M. Pant, C. W. Ahn, Abc optimized secured image water-

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

385

marking scheme to find out the rightful ownership, Optik-International Journal for Light and Electron Optics 127 (14) (2016) 5711–5721. doi: 10.1016/j.ijleo.2016.03.070.

[5] Y. Fu, Robust oblivious image watermarking scheme based on coefficient relation, Optik-International Journal for Light and Electron Optics 124 (6)

390

(2013) 517–521. doi:10.1016/j.ijleo.2011.12.042.

[6] S. Ranjbar, F. Zargari, M. Ghanbari, A highly robust two-stage contourletbased digital image watermarking method, Signal Processing: Image Communication 28 (10) (2013) 1526–1536. doi:10.1016/j.image.2013.07. 002.

28

Page 28 of 31

395

[7] H. Peng, J. Wang, M. J. P´erez-Jim´enez, A. Riscos-N´ un ˜ez, The framework of p systems applied to solve optimal watermarking problem, Signal Pro-

ip t

cessing 101 (2014) 256–265. doi:10.1016/j.sigpro.2014.02.020.

[8] N. Cai, N. Zhu, S. Weng, B. W.-K. Ling, Difference angle quantization in-

400

cr

dex modulation scheme for image watermarking, Signal Processing: Image Communication 34 (2015) 52–60. doi:10.1016/j.image.2015.03.010.

us

[9] Y.-G. Wang, G. Zhu, An improved aqim watermarking method with minimum-distortion angle quantization and amplitude projection strategy,

an

Information Sciences 316 (2015) 40–53. doi:10.1016/j.ins.2015.04.029. [10] M. Khalili, Dct-arnold chaotic based watermarking using jpeg-ycbcr, 405

Optik-International Journal for Light and Electron Optics 126 (23) (2015)

M

4367–4371. doi:10.1016/j.ijleo.2015.08.042.

[11] Y. Li, Y. Hao, C. Wang, A research on the robust digital watermark of

d

color radar images, in: Information and Automation (ICIA), 2010 IEEE

410

te

International Conference on, IEEE, 2010, pp. 1091–1096. [12] X.-y. Wang, Y.-n. Liu, S. Li, H.-y. Yang, P.-p. Niu, Robust image watermarking approach using polar harmonic transforms based geometric correc-

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

tion, Neurocomputing 174 (2016) 627–642. doi:10.1016/j.neucom.2015. 09.082.

[13] K. K. Kabi, B. J. Saha, C. Pradhan, et al., Blind digital watermarking

415

algorithm based on dct domain and fractal images, in: IT in Business, Industry and Government (CSIBIG), 2014 Conference on, IEEE, 2014, pp. 1–7.

[14] A. Roy, R. S. Chakraborty, R. Naskar, Reversible color image watermarking in the ycocg-r color space, in: International Conference on Information

420

Systems Security, Springer, 2015, pp. 480–498. [15] E. Vahedi, R. A. Zoroofi, M. Shiva, On optimal color coordinate selection for wavelet-based color image watermarking, in: Intelligent and Advanced 29

Page 29 of 31

Systems, 2007. ICIAS 2007. International Conference on, IEEE, 2007, pp.

425

ip t

635–640. [16] R. Koju, S. R. Joshi, Comparative analysis of color image watermarking technique in rgb, yuv, and ycbcr color channels, Nepal Journal of Science

cr

and Technology 15 (2) (2015) 133–140.

[17] H. Malvar, G. Sullivan, Ycocg-r: A color space with rgb reversibility and

430

us

low dynamic range, ISO/IEC JTC1/SC29/WG11 and ITU-T SG16 Q 6.

[18] P. V. Agawane, Implementation and evaluation of residual color transform

an

for 4: 4: 4 lossless RGB coding, ProQuest, 2008.

[19] H. S. Malvar, G. J. Sullivan, S. Srinivasan, Lifting-based reversible color

M

transformations for image compression, in: Optical Engineering+ Applications, International Society for Optics and Photonics, 2008, pp. 707307– 435

707307.

d

[20] I. J. Cox, M. L. Miller, J. A. Bloom, C. Honsinger, Digital watermarking,

te

Vol. 1558607145, Springer, 2002.

[21] V. Porwal, S. Gupta, Digital watermarking: A survey on image watermarking in frequency domain using genetic algorithm, International Journal of

Ac ce p

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

440

Advanced Research in Computer Engineering & Technology (IJARCET) 4 (2015) 1135–1145.

[22] J.-C. Yen, Watermark embedded in permuted domain, Electronics letters 37 (2) (2001) 80–81. doi:10.1049/el:20010065.

[23] F. Y. Shih, Y.-T. Wu, Enhancement of image watermark retrieval based

445

on genetic algorithms, Journal of Visual Communication and Image Representation 16 (2) (2005) 115–133. doi:10.1016/j.jvcir.2004.05.002.

30

Page 30 of 31

Ac ce p

te

d

M

an

us

cr

ip t

watermarkedimage.jpg Click here to download high resolution image

Page 31 of 31