Journal Pre-proof New image blind watermarking method based on two-dimensional Discrete Cosine Transform Zihan Yuan, Decheng Liu, Xueting Zhang, Qingtang Su
PII:
S0030-4026(19)32051-0
DOI:
https://doi.org/10.1016/j.ijleo.2019.164152
Reference:
IJLEO 164152
To appear in:
Optik
Received Date:
25 October 2019
Revised Date:
18 December 2019
Accepted Date:
28 December 2019
Please cite this article as: Yuan Z, Liu D, Zhang X, Su Q, New image blind watermarking method based on two-dimensional Discrete Cosine Transform, Optik (2019), doi: https://doi.org/10.1016/j.ijleo.2019.164152
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. © 2019 Published by Elsevier.
New image blind watermarking method based on two-dimensional Discrete Cosine Transform
Zihan Yuan1, Decheng Liu1, Xueting Zhang1, Qingtang Su1*
[email protected] 1 School
of Information and Electrical Engineering, Ludong University, Yantai 264025, China
*
Corresponding author: Tel.: +86-535-6672343 , (Qingtang Su)
ro of
Highlights
The size relationship between the selected middle frequency coefficients of 2D-DCT is used to embed and extract watermark information;
Comparing with traditional algorithms which are based on DCT, the watermark capacity of this algorithm is larger;
The proposed algorithm is a blind watermarking algorithm, and the original data or original watermark is not needed in the process of watermark extraction;
Comparing with other relevant algorithm, the proposed algorithm has higher invisibility and stronger robustness, which is suitable for digital image copyright protection.
lP
re
-p
na
Abstract: In this paper, a new image blind watermarking method based on two-dimensional Discrete
Cosine Transform (2D-DCT) is presented to realize copyright protection of color image. At first,
ur
2D-DCT is performed on the selected image blocks, and some fixed coefficients in the middle
Jo
frequency are selected as embedding position of watermark. Then, the watermark embedding and extraction procedure are completed by modifying the relationship of size between the selected middle-frequency coefficients with the proposed rules. The advantages of the presented algorithm include the following two points: 1) the relationship of size between the selected middle-frequency coefficients of 2D-DCT is used to fulfill the process of watermark embedding and extraction; 2) the presented algorithm uses color digital image as carrier image and watermark image, which is not 1
same as most watermarking techniques. In recent years, most of the watermarking algorithms used gray or binary image as watermark. In this presented algorithm, all the digital carrier images are chosen from two public standard image databases, i.e. CVG-UGR and USC-SIPI. A series of simulation results prove that this presented algorithm not only satisfies the invisibility of watermarking algorithm, but also makes good performance of robustness, security and embedding capacity.
ro of
Keywords: Blind watermarking; Color image; Discrete Cosine Transform; Frequency domain
1 Introduction
-p
In recent years, as the rapid advancement of the multimedia and Internet, we can obtain more
re
required information accurately and efficiently, and many achievements and creations are stored and
lP
published on the Internet in the form of digit, but it also produced a series of serious problems, such as piracy, infringement, tampering, and so on. Therefore, the protection of intellectual property and
na
copyright is extremely urgent [1]-[4], and digital watermarking technology emerges at the historic moment [5]. It is well known that digital watermarking is an important branch of information hiding
ur
technology [6], which uses data redundancy or visual redundancy of the digital multimedia to embed the digital watermark into the digital multimedia directly by some certain embedding methods. The
Jo
successful embedding and extraction of digital watermarks can effectively solve the problem of protecting copyright. According to the difference of carrier image processing ways, digital watermarking algorithms are divided into the spatial-domain watermarking algorithm [7, 8] and frequency-domain watermarking algorithm [5, 9, 16]. The spatial-domain watermarking algorithm 2
refers to modify the image pixel value directly in order to embed watermark information. Spatial-domain watermarking algorithm is simple and efficient in execution, but its robustness is relatively weak. For example, Abraham et al. [7] presented a novel color image watermarking algorithm using spatial-domain technique, and generated a watermarked image with excellent quality. Furthermore, the frequency-domain watermarking algorithms embed watermark information in frequency-domain coefficients, which makes good use of the human vision,
ro of
auditory and other characteristics. This watermarking method has good robustness, but its
calculation is more complex. The frequency-domain watermarking algorithms often use Discrete Wavelet Transform (DWT) [10, 15, 24], Discrete Cosine Transform (DCT) [9, 12, 13, 16],
-p
Discrete Fourier Transform (DFT) [11, 21], and matrix factorization [5, 14, 19, 20, 23] and so on.
lP
than the spatial watermarking method [13].
re
In a word, the watermarking method in frequency domain has better invisibility and robustness
Therefore, considering the invisibility and robustness of watermark, many watermarking
na
algorithms based on the frequency domain have been presented to protect the copyright over the years. For instance, Ernawan et al. [9] presented a DCT-based digital image watermarking method
ur
which used the best psychovisual threshold. The watermark information was not embedded to the DCT coefficients directly as other watermarking methods. In this algorithm, the watermark
Jo
information was embedded by modifying the correlation coefficients based on specific rules. This watermarking algorithm has better robustness and invisibility. However, the used carrier image is gray-scale image [16], and the used watermark image is binary image in this method. As we all know, digital color images are more vivid, bright and informative, and its utilization rate far exceeds that of gray-scale images. 3
Pradhan et al. [10] proposed a non-blind digital watermarking algorithm using DWT and cross chaos. This method belongs to non-blind watermarking algorithm since the original data is needed in watermark extraction process. Nevertheless, in practice, obtaining the primary data is not easy when detecting watermark in most cases. Therefore, non-blind watermarking method has certain defects, and blind watermarking method has more practical value and application prospect. Hence, Roy et al. [12] proposed a blind DCT-based watermarking scheme which can embed
ro of
multiple watermark images. This watermarking scheme can extract the watermark information without the need of original data, so it belongs to blind watermarking scheme. In addition, the watermarking scheme embedded multiple watermark information into middle-frequency
-p
coefficients based on zig-zag order, and it has high robustness. This method can against common
re
image processing attacks mainly include image enhancement such as low-pass filtering, median
lP
filtering, image sharpening, adding noise; geometric processing such as rotation, cropping, scaling; and compression attacks such as JPEG compression, JPEG2000 compression. But, it is needed to
na
modify 22 coefficients of middle-frequency of DCT in [12] so each image block can embed 11 watermark bits. Therefore, the quality of watermarked image was seriously distorted. Su et al. [13]
ur
presented a digital watermarking algorithm; this watermarking algorithm embedded the digital color watermark into carrier image successfully, which could resist many common attacks.
Jo
However, the algorithm requires two times operations of two-dimensional Discrete Cosine Transform (2D-DCT), so the computational complexity is high. Song et al. [19] proposed a robust digital image watermarking scheme which is using the QR decomposition and chaotic system, this method has excellent robustness and it can resist a variety of attacks. However, as we all know, the number and magnitude of modified pixel values can directly affect the watermark invisibility. 4
Since the pixel values are modified extensively during the watermark embedding process in [19], its invisibility performance is not good. The requirements of a good digital watermark include invisibility, robustness, security, watermark capacity, blind extraction and so on. However, many watermarking techniques still cannot meet these requirements better. Therefore, how to devise a blind watermarking technology for meeting the requirements of robustness, invisibility, and security has become a hot research
ro of
topic.
A color digital image blind watermarking algorithm based on 2D-DCT is proposed in this
-p
paper. This presented algorithm selects the special middle coefficients of image blocks after
2D-DCT, and modifies the size relationship between the selected middle coefficients to fulfill the
re
watermark embedding and extracting process. At first, dividing the carrier image and color
lP
watermark image into red, green and blue three color layers; then, dividing each layer of the watermark image into non-overlapping pixel blocks. Afterwards, the block to be embedded of
na
color carrier image is selected by pseudo-random sequence and transformed by 2D-DCT, and then embedding the scrambled watermark into the specific position of the DCT coefficients following
ur
zig-zag order. This presented watermarking algorithm has better performance on watermark
Jo
invisibility and robustness, which is suitable for digital image copyright protection.
The remainder of this paper is organized as follows: the relevant knowledge is described in
part 2, which includes Arnold scrambling transformation, randperm function and 2D-DCT. Part 3 shows the process of watermark embedding and watermark extraction. Part 4 shows simulation attacks result and analysis. At last, the conclusion is given in part 5.
5
2 Preliminaries
2.1 Arnold scrambling transformation Arnold scrambling transformation is usually used as pretreatment of information hiding. The digital watermark is scrambled before watermark embedding, which can greatly improve the watermarking security. Therefore, Arnold scrambling transformation is widely used in the
ro of
scrambling of watermark image to ensure watermarking algorithm security. Arnold scrambling transformation is defined as follows: u ' 1 1 u mod P . v ' 1 2 v
-p
(1)
where, u, v, u', v' ∈{0, 1, 2,…, P-1}, P is the size of the watermark image to be scrambled, (u, v)
re
is the position of pixel in watermark image before scrambling, (u', v') is the position of pixel in
lP
watermark image after scrambling. Arnold transformation can move the pixel value of digital watermark image from the original position (u, v) to the new position (u', v').
na
Using Arnold transformation to scramble the original watermark image can realize the hiding of image information. The scrambling times can be used as the private key Kai, which can
ur
strengthen the confidentiality and security of the watermarking scheme.
Jo
Correspondingly, for restoring the original watermark image, the corresponding inverse Arnold scrambling transformation is as follows: u 2 1 u ' P mod P. v 1 1 v ' P
2.2 Randperm function 6
(2)
For improving the security of watermarking algorithm, we use the randperm function to choose the non-overlapping blocks randomly for embedding watermark information. Randperm function, as a build-in function in MATLAB, can scramble a number sequence randomly. For example, randperm(n, m) means select m numbers from {1, 2,…, n} randomly, where n is greater than m, and m, n is often viewed as the private key. Therefore, we reuse the randperm function twice time to generate two random sequences to select the non-overlapping embedded block
ro of
randomly.
2.3 Two-dimensional discrete cosine transform (2D-DCT)
-p
Discrete Cosine Transform (DCT), as a widely used signal decomposition and compression
re
technique, is mainly used for data compression and image compression. DCT can convert the signal from the spatial domain to the frequency domain, which has better performance of
lP
de-correlation. DCT is a special case of the Fourier transform, which avoids the complex operation in the Fourier transform, and it is a transform in real number domain.
na
After applying DCT to an image, its coefficients can be divided into a direct component (DC)
ur
and some altering components (AC). The DC component represents the average brightness, and the AC components concentrate the main energy of the original image block. DCT algorithm has
Jo
the advantages of high speed and accuracy. Therefore, DCT plays a vital role in image processing.
Two-dimensional Discrete Cosine Transform (2D-DCT) means to perform DCT again based
on the one-dimensional DCT. After performing 2D-DCT, the DCT coefficients of matrix A of sized M×N are obtained by Eq. (3):
7
M 1 N 1 (2 x 1)u (2 y 1)v F (u, v) c(u )c(v) f ( x, y) cos cos . 2M 2N x 0 y 0
(3)
among them, v 0 1 N c (v ) = . 2 N v 1, 2,..., N 1 u 0 1 M c(u ) = . 2 M u 1, 2,..., M 1
ro of
x and y are the sampling values in spatial domain, and f(x, y) is the pixel value at position (x, y) in spatial domain correspondingly, u and v are the sampling values in frequency domain, and F(u, v)
is the frequency coefficient at position (u, v) after 2D-DCT in frequency domain correspondingly.
-p
When used in digital image processing, digital image is usually represented by square pixel matrix,
re
that is M=N.
The formula of inverse transform of 2D-DCT (2D-IDCT) is given as follows: (4)
na
3 Proposed method
lP
(2 x 1)u (2 y 1)v M 1 N 1 f ( x, y) c(u )c(v) F (u, v) cos cos . 2M 2N u 0 v 0
ur
The implementation of the presented watermarking algorithm includes into two processes that
Jo
are watermark embedding and watermark extracting. Specific steps of watermark embedding and watermark extracting are described below.
3.1 Process of watermark embedding The specific steps of watermark embedding process are shown in Fig. 1.
8
Pre-processing the carrier image
Pre-processing the watermark image
Key Kc
Key Kb
Key Ka Selecting the embedded block of the carrier image Getting binary watermark sequence Selecting the specific middle frequency coefficients of the pixel block
Obtaining the watermarked pixel block
re
Obtaining the watermarked image
-p
Updating the block of watermarked pixels to corresponding position
ro of
Modifying the size relation between middle frequency coefficient pairs
lP
Fig. 1 The diagram of watermark embedding process.
Step1: Preprocessing of the color carrier image and color watermark image.
na
At first, dividing the color carrier image H which size is M×M into three layer carrier images Hi of red (R), green (G), and blue (B) color, and then dividing each layered image Hi into
ur
non-overlapping pixel blocks which size is 8×8. Secondly, dividing the watermark image which size
Jo
is N×N into three layer watermark images Wi of R, G, and B color. Then scrambling each layered watermark image Wi using Arnold transformation which is based on the key Kai to enhance the security of watermarking algorithm, transforming all pixel value with decimal format to binary information. Afterwards, all the binary information is connected to form the watermark bit sequences SWi. The length of sequence SWi is 8N2, where i = 1, 2, 3, and it is the R, G, and B three layer images, respectively. 9
Step 2: Choosing the embedded pixel block from color carrier image. The pseudo-random sequences generated by randperm function based on the key Kbi and Kci are used to generate two random numbers that are the row and column coordinates of the pixel block to be embedded, then the pixel block A is selected from the layer carrier image Hi, where i =1, 2, 3, and it is the R, G, and B three layer images. Step 3: Selecting the specific middle-frequency coefficients of the pixel block after
ro of
two-dimensional Discrete Cosine Transform (2D-DCT).
According to Eq. (5), 2D-DCT is carried out on the chosen pixel block A for obtaining the
transformation matrix dctA, and four pairs of DCT middle-frequency coefficients (cp1, cp2) of the
-p
transformation matrix dctA are selected by the zig-zag order, p =1, 2, 3, 4, respectively:
dctA dct2( A).
re
(5)
lP
where, dct2 (.) is the DCT function, the selected four pairs of DCT middle-frequency coefficients have their fixed positions, which are position (4, 2) and (3, 3), (2, 4) and (1, 5), (4, 3) and (3, 4), (2,
na
5) and (1, 6).
Step 4: Modifying the size relation between DCT middle-frequency coefficient pairs.
ur
Selecting four watermark bits wp from SWi successively and using Eq. (6) and Eq. (7) to modify the size relation between DCT middle-frequency coefficient pairs (cp1, cp2) for embedding the
Jo
watermark bit wp, where p =1, 2, 3, 4, respectively. The modified DCT middle-frequency coefficient pairs (cp1*, cp2*) are obtained as follow:
signc (c p1 ) (avg 0.3 T ), if w '1' and abs (c p 2 ) abs (c p1 ) T * c p1 = signc (c p1 ) ( avg 0.7 T ), if w '0 ' and abs (c p1 ) abs (c p 2 ) T . c , else p1
10
(6)
if w '1' and abs (c p 2 ) abs (c p1 ) T signc (c p 2 ) (avg 0.7 T ), * c p 2 = signc (c p 2 ) ( avg 0.3 T ),if w '0 ' and abs (c p1 ) abs (c p 2 ) T c , else p2
.
(7)
where, signc (.) is defined as below: sign( x), signc( x) 1,
if x 0 else
.
where, sign (.) is sign function, avg=(abs(cp1)+abs(cp2))/2, abs(.) is absolute value function, T is the quantization step of this presented algorithm.
ro of
Step 5: Embedding watermark.
Replacing the original DCT middle-frequency coefficient pairs (cp1, cp2) with the modified
DCT middle-frequency coefficient pairs (cp1*, cp2*) to obtain the watermarked transformation matrix
-p
dctA*, where p =1, 2, 3, 4, and it is the p-th pair of DCT middle-frequency coefficient, respectively.
re
Step 6: Updating the block of watermarked pixels to the corresponding locations of the layered
lP
carrier image.
According to Eq. (8), inverse transform of 2D-DCT (2D-IDCT) is performed on the
na
watermarked transformation matrix dctA* to obtain the watermarked pixel block A*, and the watermarked pixel block A* are updated to their corresponding locations of the layered carrier image
ur
Hi, where i =1, 2, 3, and it is the R, G, and B three layer images, respectively:
A* idct2(dctA* ).
(8)
Jo
where idct2 (.) is the inverse 2D-DCT function. Step 7: Repeating. The steps 2 to 6 are repeated until embedding all the watermark information, and the layered watermarked image Hi* is obtained. At last, the layered watermarked images Hi* are combined to get final watermarked image H*, where i =1, 2, 3, and it is the R, G, and B three layer images. 11
3.2 Process of watermark extraction Since this presented algorithm is belong to blind watermarking algorithm, in the watermark extraction process, watermark information can be extracted from final watermarked image H* and doesn’t need the original data. The specific steps of watermark extraction are given in Fig. 2. Pre-processing the watermarked image
Obtaining the extraction block of the watermarked image
Key Kc
Selecting the middle frequency coefficients of watermarked pixel block
re
Key Ka
-p
Extracting watermark bit
ro of
Key Kb
lP
Getting binary watermark sequence
Obtaining the extracted watermark
na
Fig. 2 The diagram of the process of watermark extraction.
Step 1: Preprocessing of obtained watermarked image.
ur
At first, dividing watermarked image H* into three layered images Hi* of R, G, and B color. At the same time, dividing each layered image Hi* into non-overlapping pixel blocks which size is
Jo
8×8, where i =1, 2, 3, and it is the R, G, and B three layers, respectively. Step 2: Obtaining extracted block from the watermarked image. Using pseudo-random sequences generated by randperm function with the key Kbi and Kci to choose the pixel block A* from the layered watermarked image Hi*, where i =1, 2, 3, and it is respectively the R, G, and B three layers. 12
Step 3: Selecting the specific middle-frequency coefficients from the chosen watermarked pixel block after two-dimensional Discrete Cosine Transform (2D-DCT). Applying 2D-DCT to the watermarked pixel block A* in order to obtain the transformation matrix dctA*. Four pairs of DCT middle-frequency coefficients (cp1*, cp2*) corresponding to the embedding process are selected following zig-zag order in the transformation matrix dctA*, where p
Step 4: Extracting watermark bit.
ro of
=1, 2, 3, 4, and it is the p-th pair of the DCT middle-frequency coefficient, respectively.
According to the size relation between DCT middle-frequency coefficient pairs (cp1*, cp2*), the watermark bit is extracted from the watermarked block by Eq. (9):
-p
abs(c p1 ) abs(c p 2 ) '1', if wp * . '0', else
(9)
Step 5: Repeating.
lP
middle-frequency coefficients, respectively.
re
where, abs(.) is absolute value function, p =1, 2, 3, 4, and it is the p-th pair of the DCT
na
The steps 2 to 4 are repeated to get the binary extraction watermark sequence SWi* of each layer watermarked image Hi*, dividing each 8-bit binary information in the watermark bit sequences
ur
SWi* into a group, converting it to decimal pixel values, and getting the decimal sequence, where i
Jo
=1, 2, 3, and it is respectively the R, G, and B layer. Step 6: Obtain final extracted watermark. Using inverse Arnold transform which is based on key Kai on the decimal pixel sequence of
three layers respectively to get the extracted layered watermark Wi*. At last, the extracted layered watermark Wi* is recombined to get the final extracted watermark W*, where i =1, 2, 3, and it is the R, G, and B layer, respectively. 13
4 Experimental results
For testing the performance in terms of invisibility, robustness, security, and embedding capacity of the presented algorithm, ten color digital images of sized 512×512 given in Figs. 3(a)-(j) are selected as the carrier images in this paper. All the carrier images are chosen from two public standard image databases, that is CVG-UGR [17] and USC-SIPI [18]. Two color digital images of
ro of
sized 32×32 given in Figs. 4(a)-(b) are selected as digital watermark images. Then the selected images are used in a series of experiments, and the presented algorithm is compared to some
relevant methods. For example, a color digital image watermarking method based on two times
-p
operations of two-dimensional Discrete Cosine Transform (2D-DCT) [13], a robust digital image
re
watermarking method using chaotic system and QR decomposition [19], and a novel fast and robust spatial-domain watermarking algorithm [21]. The presented algorithm is frequency-domain
lP
watermarking method based on 2D-DCT in this paper. So, we selected algorithms [13] and [19] as comparative method, because the algorithm [13] is also used 2D-DCT to complete the operations
na
of watermark embedding and extraction, and algorithm [19] is also a frequency-domain
ur
watermarking algorithm. In addition, in order to prove the presented watermarking algorithm has better performance compared with the spatial-domain watermarking algorithm, the algorithm [21]
Jo
is also selected as comparative method.
14
(a)
(b)
(c)
(f)
(d)
(g)
(e)
(h)
(i)
(j)
Fig. 3 Carrier images: (a) Lena, (b) Peppers, (c) Kid, (d) SailBoat, (e) Baboon, (f) Bear, (g) Barbara, (h) Couple,
(a)
ro of
(i) Avion, and (j) House.
(b)
Fig. 4 Watermark images: (a) watermark 1, and (b) watermark 2.
-p
The imperceptibility and robustness performance of the presented watermarking algorithm are
re
evaluated by specific performance indexes in following experiments. For example, peak
lP
signal-to-noise ratio (PSNR) is an important objective evaluation index of watermarked image distortion measurement, is usually used to calculate the similarity between the original carrier image and watermarked image. It can be defined as follows: M N max{[ H (u, v, j )]2 }
na
PSNR j 10 lg
M
N
[ H (u, v, j) H * (u, v, j)]2
.
(10)
u 1 v 1
ur
among them, H (u, v, j ) , H * (u, v, j ) are the pixels whose coordinates are (u, v) in layer j of
Jo
original carrier image and the watermarked one, M, N are respectively the row and column size of the test image. The PSNR of color image is defined by: (11)
3
PSNR PSNR j . j 1
Due to the specific structure of natural signals and the strong interrelationship between pixels, a new evaluation standard, i.e. structural similarity index measurement (SSIM), is proposed from the 15
perspective of human visual system [22]. The value of SSIM can measure the image quality effectively, and it is defined as follows: SSIM ( H , H * ) l ( H , H * )c( H , H * ) s( H , H * ).
(12)
where, l ( H , H * ) (2 H H * C1 ) ( H2 H2 * C1 ) * 2 2 . c( H , H ) (2 H H * C2 ) ( H H * C2 ) * s( H , H ) ( HH * C3 ) ( H H * C3 )
ro of
l ( H , H * ) , c( H , H * ) and s( H , H * ) is the luminance comparison, contrast comparison and structure
comparison function, respectively.
In addition, as an evaluation criterion, normalized cross-correlation (NC) can estimate the
-p
robustness of watermarking algorithm effectively. As for color digital watermark, Eq. (13) is used to
re
calculate the NC value in order to evaluate the robustness of the watermarking algorithm. The
3
NC
m
n
lP
calculation of NC is defined as follows:
(W (u, v, j ) W * (u, v, j)) j 1 u 1 v 1
3
m
n
3
m
n
W (u, v, j) W 2
j 1 u 1 v 1
(u, v, j )
na
j 1 u 1 v 1
*
(13)
.
2
where W* is extracted color digital watermark, and W is original digital watermark, 1
ur
m and n represent the row and column size of color digital watermark respectively, j represents the
Jo
j-th layer of color digital watermark.
16
the value of SSIM/NC
SSIM
NC
1 0.98 0.96 0.94 0.92 0.9 0.88 0.86 0.84 0.82 0.8 16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
quantization step
ro of
Fig. 5 The average values of structural similarity index measurement (SSIM) and normalized cross-correlation (NC) under different quantization steps.
As we all know, the quantization step T is an important parameter. In order to select an
-p
effective quantization step, we did many experiments. Embedding the color image watermarks as shown in Figs. 4(a) and (b) into the carrier images as shown in Figs. 3(a)-(j) with different
re
quantization steps. The experimental results are shown in Fig. 5. SSIM becomes smaller and smaller
lP
and NC becomes bigger and bigger while the quantization step T is adding, which indicates that the invisibility of watermark becomes worse and worse, while the robustness of watermark becomes
na
better and better. Thus, in order to have a good performance in robustness and invisibility
ur
simultaneously, we choose the quantization step T as 23 in this paper.
4.1 The imperceptibility test and analysis
Jo
The invisibility of digital watermark is the ability that hiding the digital watermark information
in the carrier image. As an effective watermarking algorithm, the invisibility requires the embedded digital watermark cannot be detected by human perception system. The invisibility is an important character of watermarking algorithm. Table 1 shows the value of peak signal-to-noise ratio (PSNR) and structural similarity index measurement (SSIM) of the extracted watermark 17
images after embedding the watermark images in Figs. 4(a) and (b) to the carrier images in Figs. 3 (a)-(j), respectively. Table 1 The invisibility results (PSNR/SSIM) of embedding test watermark images into carrier images watermark 2
Lena
37.5851/0.9350
37.4625/0.9323
Peppers
38.0702/0.9241
38.1277/0.9250
Kid
37.4801/0.9242
37.6455/0.9250
SailBoat
38.1685/0.9403
38.4066/0.9414
Baboon
36.3189/0.9725
36.1885/0.9724
Bear
38.0001/0.9441
38.0903/0.9448
Barbara
37.3726/0.9385
37.4858/0.9395
Couple
38.2239/0.9193
38.2255/0.9196
Avion
37.1426/0.9245
37.2966/0.9255
House
38.2472/0.9149
38.3659/0.9154
Average
37.6609/0.9337
37.7295/0.9341
ro of
watermark 1
-p
From Table 1 we can see that when watermarks 1 and 2 are respectively embedded into
re
different carrier images, the values of PSNR are greater than 36dB, and the values of SSIM are close to 1. This indicates that the watermark is imperceptible through the human visual system after
lP
embedding watermark information into carrier image. It is proved that the presented watermarking algorithm has good performance of invisibility.
na
For comparing the invisibility of this presented watermarking algorithm with other watermarking algorithms, the digital watermark 1 in Fig. 4(a) is respectively embedded into two
ur
carrier images in Figs. 3(a) and (b), the digital watermark 2 in Fig. 4(b) is respectively embedded
Jo
into two carrier images in Figs. 3(c) and (d) . After embedding the selected watermarks to the color carrier images, the PSNR and SSIM values of different algorithms are shown as Table 2. NC values of different algorithms without the attack are given as Table 3. As can be seen from Table 2, algorithm [13] is a two-level two-dimensional Discrete Cosine Transform (2D-DCT) watermarking algorithm, while the presented algorithm is a one-level 2D-DCT algorithm. Therefore, we select the one-level 2D-DCT part of algorithm [13] for comparing with this paper. Although algorithm [13] 18
has high PSNR and SSIM, which indicated it has high watermark invisibility, as we can see in Table 3, its normalized cross-correlation (NC) is small that means its robustness is weak. On the contrary, in algorithm [19], the PSNR values and SSIM values are much smaller than other algorithms, which mean its invisibility is weak but its robustness is very strong. Because of that, the algorithm [19] is not used as comparison in the analysis of robustness. Good balance between the performance of invisibility and robustness is achieved and satisfies the requirements of the invisibility and
ro of
robustness in the presented watermarking algorithm. As shown in Table 2, the values of PSNR are greater than 37dB, the values of SSIM are close to 1. The experimental result indicates that the presented algorithm has better performance of invisibility.
-p
Table 2 The invisible comparison results for (PSNR/SSIM) of various watermarking algorithms Algorithm [19]
Algorithm [21]
Algorithm [23]
Lena
48.6761/0.9956
22.5616/0.6332
38.0535/0.9414
39.4385/0.9656 37.5851/0.9350
Peppers
40.7425/0.9708
23.2864/0.7111
37.6262/0.9231
38.3367/0.9299 38.0702/0.9241
Kid
41.6958/0.9857
22.3026/0.6846
36.8241/0.9231
34.4638/0.8650 37.6455/0.9250
SailBoat
45.7757/0.9933
18.7103/0.6301
37.7440/0.9458
34.2340/0.8766 38.4066/0.9414
lP
re
Algorithm [13]
Presented Algorithm
Table 3 The compare results for NC values of various watermarking algorithms Algorithm [13]
Algorithm [19] Algorithm [21]
Algorithm [23]
Presented Algorithm
1.0000
1.0000
0.9937
1.0000
0.9475
Peppers
0.8568
0.9975
1.0000
0.9826
1.0000
Kid
0.8441
1.0000
1.0000
0.9771
0.9997
SailBoat
0.8746
1.0000
1.0000
0.9817
1.0000
ur
na
Lena
Jo
4.2 The robustness test and analysis The robustness of digital watermark refers to the digital watermarking algorithm has the ability
to resist various linear and nonlinear filtering operations, common geometric transformations and other common transformations attacks. The robustness of watermark is also one of the important characteristics of watermarking technology. In this part, for measuring robustness of the presented watermarking algorithm, a series of 19
simulation attacks are preceded, such as JPEG compression, adding noise, filtering, scaling, cropping. As we all know, as an objective similarity measure of the final extracted watermark W* and original watermark W, normalized cross-correlation (NC) value is used to estimate the robustness of watermarking algorithm effectively. After a serious of attacks, watermarks were extracted from watermarked image namely “Lena” and “Peppers”. Fig. 6 shows the visual effect of extracted watermarks and its NC values under various attacks respectively.
ro of
For proving the robustness of this algorithm further, we embedded the watermarks in Fig. 4(a) and (b) to carrier digital image “Lena” in Fig. 3(a) and carried out a series of attacks and compared with other relevant algorithms [13], [21], [23]. The simulation results are given in Figs. 7-10. Salt &
Butterworth
Peppers
low-pass
Attack
JPEG 2000 JPEG (40)
Median
white noise (5:1)
Cropping
Zoom-in
(25%)
(4:1)
filtering
noise (0, 0.001)
filtering
(3×3)
(0.2%)
(100, 5)
re
Watermark
-p
Gaussian
0.9929
0.9999
0.9714
0.9351
na
Fig.3 (b)
lP
Fig.3 (a)
0.9997
0.8590
0.9755
0.8199
0.9737
0.8456
0.9999
0.9643
0.8502
0.9451
0.9615
0.9999
ur
Fig. 6 Extract the watermarks from the watermarked image “Lena” after various attacks and their NC values
Image compression is a common processing method, and JPEG compression attack and JPEG
Jo
2000 compression attack are effective methods to measure the robustness of watermarking schemes. Fig. 7 shows the experimental results of watermarked images after image compression attacks on JPEG and JPEG 2000. As shown in Fig. 7 that this presented algorithm has better robustness compared with other watermarking algorithms and it can resist different image compression attacks.
20
Algorithm [13] 1
Algorithm [21]
Algorithm [23]
Presented Algorithm
0.9
NC value
0.8 0.7 0.6 0.5 0.4 0.3 JPEG 60
JPEG 2000 (4:1)
ro of
Fig. 7 The comparison of NC value between various algorithms after compression attacks.
Then, Fig. 8 gives the experimental results after Salt & Peppers noising attack with a noise
intensity of 0.2% and Gaussian noise with a variance of 0.001. As Fig. 8 shows that the presented
-p
algorithm has stronger robustness than other compared algorithms relatively in terms of resisting
re
different noise attacks. Fig. 9 gives the experimental results after median filtering attack and
lP
Butterworth low-pass filtering attacks. The median filtering attack which window size is 3×3 and the Butterworth low-pass filtering attack which filter order is 10 are respectively carried out on the
na
watermarked images. It is indicated that this presented watermarking algorithm can effectively against the filtering attacks. Algorithm [13]
Algorithm [23]
Presented Algorithm
ur
1
Algorithm [21]
0.9
NC value
Jo
0.8 0.7 0.6 0.5 0.4 0.3
Salt & Peppers noise (0.002)
Gaussian noise (0,0.001)
Fig. 8 The comparison of NC value between various algorithms after noising attacks. 21
Algorithm [13]
Algorithm [21]
Algorithm [23]
Presented Algorithm
1 0.9 0.8 0.7
NC value
0.6 0.5 0.4 0.3 0.2 0.1 0 Median filtering (3×3)
ro of
Butterworth low-pass filtering (100,10)
Fig. 9 The comparison of NC value between various algorithms after filtering attacks.
In addition, image cropping and zooming are the common image geometric attack and will
-p
directly affect the image quality. Fig. 10 givens the NC values of the watermarked image attacked
by cropping with a cropping ratio of 50% and scaling with a scaling ratio of 400%. The results show
re
that the presented algorithm can against both the cropping and zooming attacks. As a whole, the
Algorithm [13]
lP
presented watermarking algorithm can meet the requirements of robustness better.
Algorithm [21]
0.9
0.7
ur
NC vlaue
0.8
Presented Algorithm
na
1
Algorithm [23]
0.6
Jo
0.5 0.4 0.3
Cropping (50%)
Zoom in (400%)
Fig. 10 The comparison of NC value between various algorithms after cropping and zoom in attacks.
In order to estimate performance of robustness of the presented watermarking algorithm accurately, the comparison of the mentioned algorithms’ average NC values in Figs. 7-10 are given 22
by Fig. 11. As we can see from Fig. 11, the values of average NC of these mentioned algorithms are 0.7694, 0.9423, 0.7156, and 0.9430, respectively. Comparing with other algorithms, the average NC value of the presented algorithm is the highest. These results show that the robustness of the presented algorithm is better than other relevant algorithms [13], [21], and [23].
1 0.9430
0.9423
0.95
ro of
0.9
NC value
0.85 0.8
0.7694
0.75
0.7156
0.65 0.6 Algorithm [21]
Algorithm [23]
Presented Algorithm
re
Algorithm [13]
-p
0.7
lP
Fig. 11 The average NC of different algorithms after various attacks.
na
4.3 The security analysis
In order to improve the security and robust performance of watermarking algorithm, this
ur
paper divided the color watermark image into red, green, and blue layered watermark images, and then using Arnold transformation with private key Kai to scrambe the layered watermark images.
Jo
The key Kai is decided by integer number, and the integer number range is 1-32767, so the length of every layered key Kai is 15, in other word, the key space of every layered key Kai is 215. Therefore, for the color digital watermark, its key space is 245. In addition, the pseudo-random sequences generated by the randperm function based on the keys Kbi and Kci are used to choose the embedding block of the color carrier image, the key Kbi 23
and the key Kci are determined by two integers respectively. Since the key space of each factor determined by integer is 215. Therefore the key space of Kbi is 230 which is as same as the key space of Kci. Thus, the key space of the embedding block includes the key space of red, green and blue three layers is 2180. Thus, the key space of this watermarking algorithm determined by the key Kai, Kbi and Kci is
ro of
2225, and the presented algorithm has higher security.
4.4 The embedding capacity analysis
We calculated maximum embedding capacity of our presented watermarking algorithm and
-p
other relevant watermarking algorithms to compare the watermark embedding capacity of them.
Usually, the embedded watermark bits and the pixels number of carrier image are used to calculate
re
the embedding capacity. The embedding capacities of the mentioned algorithms are shown in Table
lP
4. In the presented algorithm, the color watermark image which size is 32×32 was embedded into the color carrier image which size is 512×512, therefore the maximum embedding capacity of the
na
presented algorithm can be calculate by dividing the watermark length by the number of carrier image pixels. As we can see from Table 4, the maximum embedding capacity of this presented
ur
algorithm is equal to algorithms [21] and [23]. Algorithm [13] embedded eight watermark bits in
Jo
one image block. In detail, it embedded one watermark bit to direct component (DC) coefficient and embedded seven watermark bits to the altering components (AC) coefficients at the same time. Moreover, the size of its color digital watermark is 64×64. Thus, the embedding capacity of algorithm [13] is bigger than other algorithms.
24
Table 4 The result of maximum embedding capacity of various algorithms Algorithm
Watermark image (Bit)
Carrier image (Pixel)
Bit/Pixel
Algorithm [13]
98304
786432
0.12500
Algorithm [21]
24576
786432
0.03125
Algorithm [23]
24576
786432
0.03125
Presented Algorithm
24576
786432
0.03125
5 Conclusion
ro of
A new image blind watermarking algorithm based on two-dimensional Discrete Cosine Transform (2D-DCT) is presented for protecting the digital color image copyright in this paper. This method selects four pairs of middle-frequency coefficients from the pixel block after 2D-DCT, and
-p
completes the embedding watermark and extracting watermark by modifying the size relationship between the selected middle-frequency coefficients. Moreover, the carrier image and watermark
re
image used in this method are both color images. As can be seen from simulation results, this
lP
presented watermarking algorithm not only has good invisibility, but also has strong robustness, high security and large embedded capacity, which is suitable for digital image copyright protection
na
with color logo of company in the future. In detail, this novel watermarking algorithm can embed the registered color trademark of company into the protected color digital image, which has an
ur
important value in terms of application and can be implemented in the industry of digital image
Jo
copyright protection in the near future.
Declaration of interest statement The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work report in this paper.
25
Acknowledgements The research was supported by the National Natural Science Foundations of China (No. 61771231, 61772253, 61872170, and 61873117), and the Key Research and Development
Jo
ur
na
lP
re
-p
ro of
Program of Shandong Province (No. 2019GGX101025, 2019GGX101032).
26
References [1] A. Cedillo-Hernandez, M. Cedillo-Hernandez, M. N. Miyatake, H. P. Meana, A spatiotemporal saliency-modulated JND profile applied to video watermarking, Journal of Visual Communication and Image Representation 52 (2018) 106-117,
ro of
https://doi.org/10.1016/j.jvcir.2018.02.007. [2] N. Sahu, A. Sur, SIFT based video watermarking resistant to temporal scaling, Journal of Visual Communication and Image Representation 45 (2017) 49-64,
-p
https://doi.org/10.1016/j.jvcir.2017.02.013.
[3] M. Asikuzzaman, M. J. Alam, A. J. Lambert, M. R. Pickering, Robust DT CWT-based DIBR
re
3D video watermarking using chrominance embedding, IEEE Transactions on Multimedia 18
lP
(9) (2016) 1733-1748, https://doi.org/10.1109/TMM.2016.2589208. [4] N. M. Makbol, B. E. Khoo, T. H. Rassem, et al, A new reliable optimized image watermarking
na
scheme based on the integer wavelet transform and singular value decomposition for copyright protection, Information Sciences 417 (2017) 381-400,
ur
https://doi.org/10.1016/j.ins.2017.07.026.
Jo
[5] Q. Su, Y. Niu, G. Wang, S. Jia, J. Yue, Color image blind watermarking scheme based on QR decomposition, Signal Processing 94 (1) (2014) 219-235, https://doi.org/10.1016/j.sigpro.2013.06.025.
[6] M. Tang, W. Song, X. Chen, et al, An image information hiding using adaptation and radix, Optik-International Journal for Light and Electron 126 (23) (2015) 4136-4141, https://doi.org/10.1016/j.ijleo.2015.07.200. 27
[7] J. Abraham, V. Paul, An imperceptible spatial domain color image watermarking scheme, Journal of King Saud University-Computer and Information Sciences 31 (1) (2019) 125-133, https://doi.org/10.1016/j.jksuci.2016.12.004. [8] Q. Su, Z. Yuan, D. Liu, An approximate Schur decomposition-based spatial domain color image watermarking method, IEEE Access 7 (1) (2019) 4358-4370, https://doi.org/10.1109/ACCESS.2018.2888857.
ro of
[9] F. Ernawan, M. N. Kabir, A robust image watermarking technique with an optimal dct-psychovisual threshold, IEEE Access 6 (4) (2018) 20464-20480, https://doi.org/10.1109/ACCESS.2018.2819424.
re
cross chaos, Procedia Technology 6 (2012) 897-904,
-p
[10] C. Pradhan, S. Rath, A. K. Bisoi, Non blind digital watermarking technique using DWT and
lP
https://doi.org/10.1016/j.protcy.2012.10.109.
[11] J. Ouyang, G. Coatrieux, B. Chen, et al, Color image watermarking based on quaternion
na
Fourier transform and improved uniform log-polar mapping, Computers & Electrical Engineering 46 (2015) 419-432, https://doi.org/10.1016/j.compeleceng.2015.03.004.
ur
[12] S. Roy, A. K. Pal, A blind DCT based color watermarking algorithm for embedding multiple watermarks, AEU-International Journal of Electronics and Communications 72 (2017)
Jo
149-161, https://doi.org/10.1016/j.aeue.2016.12.003.
[13] Q. Su, G. Wang, S. Jia, X. Zhang, Q. Liu, X. Liu, Embedding color image watermark in color image based on two-level DCT, Signal, Image and Video Processing 9 (5) (2015) 991-1007, https://doi.org/10.1007/s11760-013-0534-2. [14] Q. Su, Novel blind colour image watermarking technique using Hessenberg decomposition, 28
IET image processing 10 (11) (2016) 817-829, https://doi.org/10.1049/iet-ipr.2016.0048. [15] A. T. Koohpayeh, M. A. Abd, A. S. Kohpayeh, A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition, Expert Systems with Applications 112 (2018) 208-228, https://doi.org/10.1016/j.eswa.2018.06.024. [16] L. Y. Hsu, H. T. Hu, Robust blind image watermarking using crisscross inter-block prediction in the DCT domain, Journal of Visual Communication and Image Representation 46 (7) (2017)
ro of
33-47, https://doi.org/10.1016/j.jvcir.2017.03.009.
[17] University of Granada, Computer Vision Group. CVG-UGR Image Database, http://decsai.ugr.es/cvg/dbimagenes/c512.php, last accessed 2019/10/20.
-p
[18] University of Southern California, Signal and Inage Processing Institute. USC-SIPI Image
re
Database, http://sipi.usc.edu/database/, last accessed 2019/10/20.
lP
[19] W. Song, J. Hou, Z. Li, L. Huang, Chaotic system and QR factorization based robust digital image watermarking algorithm, Journal of Central South University of Technology 18 (1)
na
(2011) 116-124, https://doi.org/10.1007/s11771-011-0668-8. [20] Q. Su, Y. Niu, H. Zou, et al, A blind double colour image watermarking algorithm based on
ur
QR decomposition, Multimedia Tools and Application 72 (1) (2014) 987-1009, https://doi.org/10.1007/s11042-013-1653-z.
Jo
[21] Q. Su, D. Liu, Z. Yuan, et al, New rapid and robust color image watermarking technique in spatial domain, IEEE Access 7 (3) (2019) 30398-30409, https://doi.org/10.1109/ACCESS.2019.2895062. [22] Z. Wang, A. C. Bovik, H. R. Sheikh, et al, Image quality assessment: from error visibility to structural similarity, IEEE Transactions on Image Processing 13 (4) (2004) 600-612, 29
https://doi.org/10.1109/TIP.2003.819861. [23] N. E. H. Golea, R. Seghir, R. Benzid, A bind RGB color image watermarking based on singular value decomposition, in: IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), 2010, pp. 1–5, https://doi.org/10.1109/AICCSA.2010.5586967. [24] A. A. Attari, A. A. B. Shirazi, Robust audio watermarking algorithm based on DWT using Fibonacci numbers, Multimedia Tools & Applications 77 (19) (2018) 25607-25627,
Jo
ur
na
lP
re
-p
ro of
https://doi.org/10.1007/s11042-018-5809-8.
30