A Semi-Blind Watermarking of Color Images Using Slant Transform, DWT and SVD

Автор: Roshan Koju, Shashidhar Ram Joshi

Журнал: International Journal of Image, Graphics and Signal Processing(IJIGSP) @ijigsp

Статья в выпуске: 3 vol.9, 2017 года.

Бесплатный доступ

This paper presents a robust watermarking for still digital images based on a Slant transform, discrete wavelet transforms and Singular Value Decomposition (SVD). The cover image is transformed using discrete wavelet transform and singular value decomposition while watermark image is transformed using slant transform. It is watermarked by replacing singular values of the high-frequency and low-frequency component of an original image by that of slant transformed watermarks. Experimental results show that our method guarantees the robust resistance against no attack and the robustness against common image processing attacks such as JPEG compression, cropping, histogram equalization, sharpening etc.

Еще

Slant transform, double watermarking, copyright protection, JPEG compression, geometric attacks

Короткий адрес: https://sciup.org/15014174

IDR: 15014174

Текст научной статьи A Semi-Blind Watermarking of Color Images Using Slant Transform, DWT and SVD

Published Online March 2017 in MECS

Application and popularization of multimedia technologies and computer networks have made duplication and distribution much easier for multimedia contents. The digital media (such as video, image, audio, and text) can be modified easily by attackers who can claim their ownership. Then copyright protection of intellectual properties has become an important and challenging task. One way for copyright protection is digital watermarking. It is a pattern of bits inserted into a digital image, audio, video or text file that identifies the file's copyright information [1]. Watermarking is done either in spatial domain or frequency domain. Spatial domain methods have less complexity because we do not use any transform, but these are not robust in nature against attacks. Transform domain techniques of watermarking are highly robust than spatial domain watermarking techniques. This happens because the watermarked image is inversely transformed and watermark is irregularly over the image and it becomes difficult for the attacker to read or modify the image[2].

Robustness, transparency (invisibility), payload size and security are four essential factors to determine the quality of watermarking scheme[3]. Robustness means that the embedded watermarks cannot be removed by intentional or unintentional attacks. Although robustness can be obtained based on significant modifications to the host data, such modifications are noticeable and thus do not satisfy the requirement of transparency. Thus, there is a trade-off between robustness and transparency. On increasing robustness, transparency decreases and vice versa [3]. So, the new algorithm to embed the watermark in digital data is to be developed which provide strong robustness and at the same time good transparency.

In this paper, the fusion of Slant transform, discrete wavelet transform (DWT) and Singular value decomposition (SVD) approaches is proposed. This paper is organized as follows: Section II discusses a brief review of some of the works available. Section III presents the proposed method. Section IV throws light on the experimental results and comparison of results with works whereas the summary of results and the conclusion is presented in Section V.

  • II.    Related works

Very few works have been done with slant transform. First work was carried out by Xunzhan Zhu, Anthony T.S. Ho [4]. They transformed watermark image using slant transform. Such transformed image was used to replace the middle band frequencies of the cover image. This method was found to be robust against various geometric attacks. Similarly, Anthony T.S. Ho, Xunzhan Zhu and Jun Shen [5] also used slant transform to embed the watermark. They also transformed watermark image through slant transform then the resultant image was used to replace the middle frequencies of the cover image. This method was found robust against various geometric attacks. Alimohammad Latif [6] also used slant transform to watermark cover image. The author first converted the cover image into blocks. These blocks were passed through slant transform. Watermark was inserted into middle band frequencies using correlation. This method was found to transparent up to 33.956 dB. The method survived various geometric attacks. Amy Tun and Yadana Thein [7] used hybrid transform. They used discrete cosine transform in addition with LWT. They embedded the watermark using pseudo-random noise (PN) sequence.

The method was blind and spread spectrum based. Their watermarked image had transparency (Peak Signal to noise ratio (PSNR) value) up to 47.3425 dB.

  • C. N. Sujatha and P. Satyanarayana [8] applied DCT, DWT and SVD for color image watermarking. They embedded watermark image in singular values of DCT and DWT transformed RGB image. Their method was nonblind and needs watermark and cover image during extraction as well. Prescribed method had poor robustness though had good imperceptibility.

Ghazali Bin Sulong and et al [9] used the hybrid domain to watermark color images. They converted RGB color space into YCbCr color space before embedding the watermark. They used DWT and canny edge detection method. The prescribed method does not have good robustness as imperceptibility.

Hongshou Yan and Weimin Yang [10] used Hadamard transform (HT) in association with DWT to embed watermark. They embedded binary watermark image into the blue or green component of DWT and HT transformed cover image. Their prescribed method was robust to the common signal processing techniques.

In [11], author separated color components into R, G and B. They applied DWT to R component only up to two level. Then in HH sub-band, DCT was applied. Finally, SVD was used to embed the watermark. Performance was tested with various geometric attack and results found to be satisfactory. In [12] authors applied DWT to cover image first. They applied SVD to LL sub-band of and then applied DCT in U and V part of the result of SVD. Method applied was blind and survived Jpeg and Jpeg 2000 compression attack. In [13] original image is rearranged using zigzag sequence and DWT was applied in rearranged sequence. Then DCT and SVD are applied in all high bands LH, HL, HH. Watermarks are embedded modifying singular values of modified cover image. The Performance was tested with various geometric attacks and performs well. In [14] hybrid DWT and DCT based method was proposed. In [15] DCT wavelet transform of size 256*256 is generated using existing well known orthogonal transform DCT of dimension 128*128 and 2*2. This DCT Wavelet transform is used in combination with the orthogonal transform DCT and SVD to increase the robustness of watermarking. HL2 sub-band is selected for watermark embedding. The Performance of the proposed watermarking scheme is evaluated against various image processing attacks.

  • III.    Concepts

This section details the proposed semi-blind watermarking scheme for copyright protection of digital images. The following subsections present the steps involved in the watermark embedding and extraction processes along with a brief description about the Slant transform, DWT and SVD

  • A.    Slant transform

Slant transform is derived from saw tooth waveforms. A slant transform matrix has a constant basis vector corresponding to zero sequency and slant basis vector basis vectors monotonically decreases with sequency in the constant step from maximum to minimum. The matrix has sequency property and high energy compaction property [16]. The lowest order of slant matrix is 2 and 2 X 2 matrix is identical to Hadamard matrix. Twodimensional slant transform pair is given by

  • [f] = [S][F][S] T                         (1)

[ F ] = [ S ] T [ f ][ S ]

The Slant transform is a member of the orthogonal transforms. It has a constant function for the first row, and has a second row which is a slant function of the column index [4].

  • B.    Discrete wavelet transform (DWT)

DWT can be used to identify the areas in host image to embed watermark effectively as it has excellent spatio frequency localization properties [11]. It decomposes an image into four non-overlapping multi-resolution subbands: LL read as low-low, is a lower resolution approximation image; HL read as high-low, is a horizontal component LH read as low-high, is a vertical component and HH, read as high- high, is the diagonal component of given image. LL represents the coarse-scale DWT coefficients while LH, HL and HH represent the fine-scale of DWT coefficients. To obtain the next coarser scale of wavelet coefficients, the sub-band LL is further processed until some final scale N is reached. In general, most of the image energy is concentrated at LL sub bands. Thus embedding watermarks in these coefficient sets may decrease image quality significantly. Embedding in the high-frequency coefficient sets could increase robustness significantly. HH sub-bands include the edges and textures of the image. Changes in such coefficients are not visible to human eye. Thus embedding the watermark in HH allows the watermark to be embedded without being perceived by the human eye [17].

  • C.    SVD

Singular values of the image give very good stability. When a small value is added, it does not result too much variation. Hence Singular Value decomposition (SVD) in linear algebra is used to solve many mathematical problems [18].

Every real matrix A can be decomposed into product of three matrices

A = U I VT                  (2)

Where U and V are orthogonal matrices such that, UUT =1 and VVT = 1and ∑ is summation of diagonal entries λ1, λ2·gives the singular vectors of A. These diagonal entries are called as Singular Values of A and the decomposition is called as ‘Singular Value Decomposition’. Singular Values specifies the luminance of an image layer while corresponding pair of singular vectors specifies the geometry of the image layer [13].

In our previous work [19] Y channel of YCbCr performed better in image watermarking, so we chose the same channel here for color image watermarking.

  • IV.   Proposed Methods

    This paper proposes a new color image watermarking technique which is based on the Slant transform with DWT and SVD. Watermark image is processed through slant transform. Such transformed watermark is passed through SVD. On the other hand, Y component of the cover image is passed through DWT and SVD. Singular values of the cover image are replaced by that of watermark image. We used the cover image of size 512 x 512 and watermark image of size 32 x 32. Algorithm is realized in Matlab 2015 b.

Detail watermarking process and extraction processes are as follows:

  • A.    Watermark embedding process

  • 1.    Read RGB color cover image C

  • 2.    Convert C into YCbCr color space

  • 3.    Separate Y, Cb and Cr components of color image

  • 4.    Get Y channel 2D-DWT transformed. Apply 2D-DWT four times on HH sub band.

  • 5.    Apply svd on HH4 to obtain singular values Sc

  • 6.    Read watermark image W

  • 7.    Get Ws by dividing W into nonoverlapping blocks and apply slant transform

  • 8.    Apply SVD on Ws to obtain singular values Sw

  • 9.    Embed watermark by replacing Sc by Sw using (3)

  • 10.    Reconstruct HH4 using inverse SVD

  • 11.    Construct watermarked image in YCbCr color space using inverse 2D-DWT function four times

  • 12.    Reconstruct watermarked RGB image W’ from YCbCr image

ScNEW = a * Sw          (3)

  • B.    Watermark extraction process

  • 1.    Read watermarked RGB image W’

  • 2.    Convert W’ into YCbCr color space

  • 3.    Separate Y, Cb and Cr components of color image

  • 4.    Get Y channel 2D-DWT transformed. Apply 2D-DWT further four times to HH sub band.

  • 5.    Apply SVD on HH4 to obtain singular values S’c

  • 6.    Read watermark image W

  • 7.    Get Ws by dividing W into nonoverlapping blocks and apply slant transform

  • 8.  Apply SVD on Ws to obtain values Uw and Vw

  • 9.   Retrieve watermark bits Sr using following

  • 10.    Reconstruct recovered watermark image using Uw, Sr and Vw reverse SVD and inverse slant transform

equation

Sr = S c / a                 (4)

  • V.    Experimental Results

In this section, experimental results of the proposed method are presented. Algorithm is realized in Matlab. The performance is evaluated using on Peak Signal to Noise Ratio (PSNR) and Normalized Cross-Correlation (NC). RGB color images (i.e., Lena, F-16 flight, pen, Zelda and boat) have been used as cover images and a 32×32 gray image has been used a watermark. Cover image and watermark images are shown in figure 1. Two major tests, imperceptibility and robustness are conducted with varying values of scaling factor α. Imperceptibility is a measure of transparency.

(c)                               (d)

w

(e)

Fig.1. Test images and watermark image (a) Mandrill (b) boat (c) Lena (d) F-16 Flight (e) Watermark.

The peak signal to noise ratio (PSNR) is typically used as a measure of the quality of a watermarked image. If W is original image and W’ is modified image then PSNR and NC are calculated using following relations:

PSNR = 10 log10

MSE

= z

[W ( u , v ) - W '( u , v )] N 2

(255*255) *3

MSE ( red ) + MSE ( blue ) + MSE ( green )

NC =     ZZ W ( u , v )*W'(u,v)]

" VZZW(u,v)2 * VZZW?(u v)2

The efficiency of the proposed system is illustrated by showing PSNR value.

To determine the optimum value of α, it is varied from 0.01 to 0.1. Corresponding values of PSNR are recorded in table 1. Following figure 2 shows the watermarked image at different values of α.

(a)

(b)

(c)

(d)

Fig.2. Watermarked test images at different values of α.

Imperceptibility Test

To determine the better value of gain factor α, it is varied from 0.001 to 0.1. Corresponding values of PSNR are recorded in table 1. Maximum transparency recorded was 46.2956dB for F16 image at α=0.06 and minimum was 43.0161 dB for Mandrill image at α=0.1. Watermark image is extracted from watermarked image. Following table 2 NC values of extracted watermark images. Extracted watermarks are tabulated in table 3.

Table 1. PSNR values of different test images for Imperceptibility test (of Cover Image vs. Watermarked Image) at various values of α

α

Mandrill

Lena

F 16

Boat

0.01

49.6445

61.6895

62.061

62.917

0.02

50.2213

59.8283

60.1331

60.2002

0.03

50.54705

56.9924

57.1822

57.0009

0.04

50.71645

54.494

54.6186

54.4002

0.05

52.415

52.4389

52.5277

52.3194

0.06

49.47405

50.7319

50.7995

50.61

0.07

48.75135

49.2846

49.3384

49.1675

0.08

48.84135

48.0332

48.0776

47.9232

0.09

46.93985

46.9332

46.9709

46.8305

0.1

46.01685

45.9532

45.9859

45.8574

Table 2. NC values of different test images for Imperceptibility test (of Cover Image vs. Watermarked Image) at various values of α

α

Mandrill

Lena

F-16

Boat

0.01

0.9999

1

1

1

0.02

0.9999

1

1

1

0.03

0.9999

1

1

1

0.04

0.9999

1

1

1

0.05

0.9999

1

0.9999

0.9999

0.06

0.9999

0.9999

0.9999

0.9999

0.07

0.9999

0.9999

0.9999

0.9999

0.08

0.9998

0.9999

0.9999

0.9999

0.09

0.9998

0.9999

0.9998

0.9998

0.1

0.9998

0.9999

0.9998

0.9998

Table 3. Extracted watermarks at different values of α

α

Mandrill

Lena

F-16

Boat

0.01

w

0.02

w

w

w

w

0.03

w

w

w

w

0.04

w

w

w

w

0.05

w

w

w

w

0.06

w

w

w

0.07

w

w

w

w

0.08

w

w

w

w

0.09

w

w

w

w

0.1

w

w

w

w

It is clear from observations that proposed method is able to detect and identify the embedded watermarks with accuracy.

Robustness tests

Robustness against geometric attacks

To evaluate the response of the watermarking scheme to geometric attacks, watermarked images were passed through histogram equalization, median filtering sharpening, negative and blurring attacks. Figure 3 shows the geometrically attacked watermarked images at different scaling factor α. Their corresponding normalized correlation is shown in table 4 and BER values are shown in table 5. Table 6 shows the extracted watermarks from watermarked images after geometrically attacked under different scaling factors.

(b)

(c)

(d)

Fig.3. Different attacks on different watermarked images at α=0.07.(a)histogram equalized Lena (b) Sharpened Boat (c)Negative F-16 Flight (d) Median Filtered Mandrill

Robustness test: general cropping attacks

To evaluate the response of the watermarking scheme to cropping, watermarked images were trimmed at different places as shown in figure 4 below.

(a)

(b)

(a)                                   (b)

(c)                                   (d)

(c)

(e)

(d)

(e)

Fig.5. Variously compressed watermarked images with different qualities (a) Q=10 (b) Q=50 (c) Q=75 (d) Q=100 (e)Jpeg 2000

Fig.4. Cropped watermarked Lena images at α=0.07.(a) Center trimmed (b) Down trimmed (c)Up trimmed (d) Left trimmed (e) right trimmed

Their corresponding normalized correlation is shown in table 7 and BER values are shown in table 8. Table 9 shows the extracted watermarks from watermarked images after cropping attacked under different scaling factors.

Robustness test: general compression

To evaluate the response of the watermarking scheme to JPEG compression, watermarked images were compressed under different scaling factors and different JPEG qualities Qs: 10, 50, 75 and 100. Figure 5 shows the JPEG compression of the various watermarked images at different scaling factor. Their corresponding normalized correlation is shown in table 10 and BER values are shown in table 11. Extracted watermarks are tabulated in table 12.

Robustness test: noise attack

(c)

(b)

(d)

Table 4. NC of original and extracted watermarks on normal geometric attacks

Image

α

Normal Blur

Negative

Sharpening

Histogram Equalization

Median Filtering

Lena

0.03

0.9308

0.958

0.9587

0.9496

0.9561

0.07

0.1133

0.9941

0.994

0.9912

0.9938

0.1

0.9936

0.9963

0.9963

0.9938

0.996

Boat

0.03

0.9247

0.9636

0.9666

0.9249

0.961

0.07

0.9846

0.9931

0.9935

0.9767

0.9923

0.1

0.9927

0.9964

0.9963

0.986

0.9961

F-16

0.03

0.9265

0.9651

0.9675

0.9709

0.9617

0.07

0.9891

0.9964

0.9967

0.9947

0.9959

0.1

0.9951

0.9981

0.9981

0.9936

0.9978

Mandrill

0.03

0.1426

0.9126

0.9089

0.9115

0.9119

0.07

0.956

0.9846

0.9844

0.9829

0.9832

0.1

0.9761

0.9918

0.9916

0.9904

0.9913

Table 5. BER of original and extracted watermarks on normal geometric attacks

Image

α

Normal Blur

Negative

Sharpening

Histogram Equalization

Median Filtering

Lena

0.03

0.1436

0.1279

0.125

0.126

0.126

0.07

0.1133

0.0947

0.0947

0.1035

0.0898

0.1

0.1016

0.0879

0.0898

0.0977

0.0898

Boat

0.03

0.1396

0.124

0.126

0.1357

0.127

0.07

0.1201

0.0967

0.0957

0.1172

0.1006

0.1

0.1016

0.0918

0.0879

0.1016

0.0928

F-16

0.03

0.1348

0.1152

0.1143

0.124

0.1191

0.07

0.1084

0.0908

0.0918

0.0811

0.0996

0.1

0.1006

0.0781

0.0781

0.0898

0.0801

Mandrill

0.03

0.1426

0.1338

0.1328

0.1338

0.1338

0.07

0.127

0.1025

0.1025

0.1064

0.1045

0.1

0.123

0.0986

0.0977

0.0986

0.0996

Table 6. Extracted watermarks on normal geometric attacks

Image

α

Histogram Equalization

Normal Blur

Median Filtering

Negative

Sharpening

Lena

0.03

w

w

W

w

w

0.07

w

w

w

w

w

0.1

w

w

w

w

w

Boat

0.03

w

^

w

^

w

0.07

w

w

w

w

0.1

V?

w

w

w

w

F-16

0.03

w

ж

w

w

w

0.07

w

w

w

w

w

0.1

w

w

w

w

Mandrill

0.03

w

w

w

0.07

w

W

w

w

w

0.1

w

w

w

w

Table 7. NC values on cropping attacks

Image

α

Cropping

Cropping

Cropping UP

Cropping

Cropping RIGHT

Center

DOWN

LEFT

Lena

0.03

0.8831

0.9669

0.9646

0.9613

0.966

0.07

0.9538

0.9954

0.9959

0.9956

0.9956

0.1

0.9551

0.9972

0.9975

0.9973

0.9973

Boat

0.03

0.879

0.9779

0.9656

0.9687

0.9742

0.07

0.9424

0.9936

0.9958

0.9943

0.995

0.1

0.9519

0.9969

0.9974

0.9973

0.9973

F-16

0.03

0.8058

0.9818

0.9695

0.9763

0.975

0.07

0.8921

0.9989

0.9972

0.9981

0.9979

0.1

0.9017

0.9993

0.9985

0.9988

0.9988

Mandrill

0.03

0.1309

0.1543

0.1289

0.1377

0.1572

0.07

0.1025

0.0977

0.1318

0.1104

0.1406

0.1

0.0986

0.0947

0.125

0.0967

0.1396

Table 8. BER of original and extracted watermarks on cropping attacks

Image

α

Cropping center

Cropping DOWN

Cropping UP

Cropping LEFT

Cropping RIGHT

Lena

0.03

0.1484

0.1289

0.126

0.1318

0.1279

0.07

0.1396

0.0918

0.0938

0.0918

0.0898

0.1

0.1416

0.082

0.0811

0.0918

0.083

Boat

0.03

0.1553

0.1172

0.125

0.125

0.1221

0.07

0.1436

0.0957

0.083

0.0947

0.0898

0.1

0.1426

0.0869

0.0801

0.0869

0.0771

F-16

0.03

0.1641

0.1064

0.1182

0.1094

0.1143

0.07

0.1543

0.0693

0.0879

0.0752

0.085

0.1

0.1504

0.0654

0.0742

0.0625

0.0732

Mandrill

0.03

0.9249

0.81

0.9368

0.9103

0.8294

0.07

0.9865

0.99

0.9402

0.9854

0.9464

0.1

0.9921

0.9947

0.9671

0.9935

0.9662

Table 9. Extracted watermarks on cropping attacks

Image

α

Cropping center

Cropping DOWN

Cropping UP

Cropping LEFT

Cropping RIGHT

0.03

ж

w

w

w

Lena

0.07

w

w

w

w

w

0.1

w

w

w

w

w

0.03

w

w

w

w

w

Monarch

0.07

w

w

w

w

w

0.1

w

w

w

w

w

0.03

X

w

w

w

Boat

0.07

w

w

w

w

0.1

w

w

w

w

w

0.03

ж

w

w

w

F-16

0.07

w

w

w

w

0.1

w

w

w

w

Mandrill

0.03

w

ж

0.07

w

w

w

w

w

0.1

w

w

w

w

w

Table 10. NC values of extracted watermark from different Jpeg compressed images

Image

α

10

50

75

100

Jpeg 2000

Lena

0.03

0.8059

0.7171

0.8325

0.9561

0.9563

0.07

0.8716

0.853

0.9761

0.9939

0.994

0.1

0.8823

0.9897

0.9904

0.9963

0.9964

Monarch

0.03

0.7284

0.8218

0.8887

0.9746

0.9737

0.07

0.7559

0.8933

0.9665

0.9944

0.9944

0.1

0.7394

0.9542

0.9905

0.9982

0.9983

Boat

0.03

0.6405

0.7621

0.7894

0.9623

0.963

0.07

0.6351

0.8558

0.9855

0.993

0.9932

0.1

0.7369

0.9855

0.9958

0.9964

0.9965

F-16

0.03

0.6629

0.8805

0.9058

0.963

0.9637

0.07

0.8082

0.9869

0.9915

0.9962

0.9962

0.1

0.9476

0.9804

0.9949

0.9979

0.998

Mandrill

0.03

0.7293

0.7512

0.8191

0.9114

0.9125

0.07

0.7316

0.9036

0.947

0.9845

0.9843

0.1

0.771

0.9595

0.9741

0.9917

0.9918

Table 11. BER values of extracted watermark from different Jpeg compressed images

Image

α

10

50

75

100

Jpeg 2000

Lena

0.03

0.1602

0.1709

0.1553

0.1289

0.125

0.07

0.1563

0.1572

0.1367

0.0947

0.0928

0.1

0.1582

0.1172

0.1182

0.0879

0.0869

Boat

0.03

0.1982

0.165

0.1572

0.127

0.126

0.07

0.2012

0.1543

0.1035

0.0986

0.0957

0.1

0.1699

0.0664

0.0879

0.0898

0.0898

F-16

0.03

0.1904

0.1475

0.1436

0.1182

0.1172

0.07

0.1602

0.0693

0.0771

0.0938

0.0938

0.1

0.1289

0.0635

0.0596

0.0781

0.0801

Mandrill

0.03

0.1689

0.1641

0.1523

0.1328

0.1328

0.07

0.1689

0.1318

0.1201

0.1035

0.1025

0.1

0.166

0.1201

0.1152

0.1006

0.0986

Table 12. Extracted watermarks from different Jpeg compressed images

Image

α

Q=10

Q=50

Q=75

Q=100

Jpeg 2000

0.03

w

w

Lena

0.07

w

w

0.1

w

w

w

0.03

w

w

Monarch

0.07

w

w

w

0.1

w

w

w

0.03

w

w

Boat

0.07

w

w

w

0.1

w

w

w

w

Table 13. NC values of extracted watermark from different noise attacked images

Image

α

Gaussian

Salt and Pepper

1%

2%

1%

2%

Lena

0.03

0.6559

0.6203

0.7598

0.6869

0.07

0.8661

0.7953

0.9297

0.8926

0.1

0.9092

0.8562

0.9669

0.9343

Boat

0.03

0.6557

0.6098

0.7775

0.7027

0.07

0.8542

0.7714

0.9437

0.8909

0.1

0.9169

0.8521

0.9639

0.9385

F-16

0.03

0.6674

0.6164

0.7896

0.6893

0.07

0.8404

0.7527

0.9392

0.8873

0.1

0.9093

0.8387

0.9691

0.9348

Mandrill

0.03

0.6496

0.6123

0.7932

0.7124

0.07

0.8483

0.7597

0.9375

0.8904

0.1

0.9125

0.8553

0.9636

0.9359

Table 14. BER values of extracted watermark from different noise attacked images

Image

α

Gaussian

Salt and Pepper

1%

2%

1%

2%

Lena

0.03

0.1816

0.1982

0.1611

0.1719

0.07

0.1367

0.1484

0.124

0.1348

0.1

0.1289

0.1396

0.1191

0.127

Boat

0.03

0.1855

0.1982

0.1504

0.1689

0.07

0.1387

0.1553

0.125

0.1348

0.1

0.1299

0.1387

0.1162

0.125

F-16

0.03

0.1768

0.1943

0.1514

0.1729

0.07

0.1416

0.1602

0.127

0.1328

0.1

0.1328

0.1426

0.1172

0.126

Mandrill

0.03

0.1807

0.1943

0.1494

0.166

0.07

0.1357

0.1631

0.127

0.1338

0.1

0.1309

0.1406

0.1221

0.1279

Table 15. Extracted watermarks from different noise attacked images

Image

α

Gaussian

Salt and Pepper

1%

2%

1%

2%

Lena

0.03

w

0.07

w

ж

w

0.1

w

Boat

0.03

w

ж

0.07

ж

w

w

0.1

w

F-16

0.03

Ж

0.07

w

w

w

0.1

w

w

w

Mandrill

0.03

ж

w

я

0.07

ж

Comparison with other methods

In this section, we compared the performance of the proposed method with three other watermarking

approaches ( [20, 21]). The comparison is shown in tables 16, 17. Both approaches used images of 512 x 512 as cover image and 64 x 64 sized watermark image.

Table 16. Comparison with existing algorithm [20]

SN

Parameter

Existing method [20]

Proposed

1

Imperceptibility (PSNR)

40.8811dB

62.061dB

Attacks (NC)

1(NC)

Proposed(NC)

1

Jpeg 10

0.984005

--

2

Jpeg 50

0.768411

0.9897

3

Sharpening

0.99701

0.9983

4

Center cropping

0.94168

0.9631

5

Left side cropping

0.911363

0.9991

6

Histogram Equalization

0.943352

0.9947

7

down crop

0.94168

0.9993

Table 17. Comparison with existing algorithm [21]

SN

Parameter

Existing method [21]

Proposed

1

Imperceptibility (PSNR)

37.43 dB

62.06 dB1

Attacks (NC)

3(NC)

3(BER)

Proposed(NC)

Proposed(BER)

1

No attack

--

--

1

0.0723

2

Jpeg 10

0.1432

0.3018

0.895

0.123

3

Jpeg 50

0.5487

0.1846

0.9897

0.0635

4

Jpeg 100

0.9596

0.0146

1

0.0205

5

Sharpening

0.8782

0.0469

0.9983

0.0752

6

Blurring

0.9598

0.0146

0.9951

0.1006

7

Gaussian Noise

0.9598

0.0459

0.9169

0.1289

9

Left side cropping

0.8571

0.0508

0.9991

0.0605

From above tables, we notice the following:

  •    The proposed method performs better than referenced literatures. Proposed method has better imperceptibility value than [20, 21]

  •    Existing methods  [20  and  [21] used single

watermark. In both cases, our proposed algorithm has better performance in any types of attacks except for blurring and noise. In blurring attack, [21] has better result than that of proposed method.

From the previous results, we may conclude that, overall, the proposed method has a better performance than the compared watermarking schemes [20, 21].

VI. Conclusion

In this paper, a robust, yet simple watermarking scheme based on the combination of Slant transform along with DWT and SVD domains is presented. Overall, the experimental results demonstrate that our scheme provides excellent robustness against multiple image attacks such as cropping, JPEG compression, histogram equalization, cropping, sharpening, blurring and negative attacks, etc. Besides, the quality of the watermarked image is satisfactory in terms of imperceptibility as the PSNR per watermarked image is over 62 dB.

Acknowledgement

We would like to thank fresh graduate Ph.D. fellowship program, University Grant Commission for providing the research grant. We are also thankful to Research Department, Institute of Engineering, Pulchowk, Tribhuvan University for support and guidance.

Список литературы A Semi-Blind Watermarking of Color Images Using Slant Transform, DWT and SVD

  • S. H. Low, N. F. Maxemchuk, and A. M. Lapone, "Document identification for copyright protection using centroid detection," Communications, IEEE Transactions on, vol. 46, pp. 372-383, 1998.
  • P. Singh and R. Chadha, "A survey of digital watermarking techniques, applications and attacks," International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, pp. 165-175, 2013.
  • H.-K. Pan, Y.-Y. Chen, and Y.-C. Tseng, "A secure data hiding scheme for two-color images," in Computers and Communications, 2000. Proceedings. ISCC 2000. Fifth IEEE Symposium on, 2000, pp. 750-755.
  • A. T. Ho, X. Zhu, and J. Shen, "Slant transform watermarking for digital images," in Visual Communications and Image Processing 2003, 2003, pp. 1912-1920.
  • X. Zhu and A. T. Ho, "A slant transform watermarking for copyright protection of satellite images," in Information, Communications and Signal Processing, 2003 and Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint Conference of the Fourth International Conference on, 2003, pp. 1178-1181.
  • A. Latif and F. Rashidi, "A watermarking scheme based on the parametric slant-hadamard transform," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, pp. 377-386, 2011.
  • A. Tun and Y. Thein, "Digital Image Watermarking Scheme Based on LWT and DCT," International Journal of Engineering and Technology, vol. 5, p. 272, 2013.
  • S. P. Murty, U. M. Bhaskar, and R. P. Kumar, "A Semi-Blind Reference Watermarking Scheme Using DWT-DCT-SVD for Copyright Protection," International Journal of Computer Science & Information Technology, vol. 4, p. 69, 2012.
  • G. B. Sulong, H. Hasan, A. Selamat, M. Ibrahim, and S. Saparudin, "A New Color Image Watermarking Technique Using Hybrid Domain," International Journal of Computer Science Issues(IJCSI), vol. 9, 2012.
  • H. Yan and W. Yang, "A Watermarking Algorithm Based on Wavelet and Hadamard Transform for Color Image," Journal of Software Engineering and Applications, vol. 6, p. 58, 2013.
  • S. R. Hallur, S. Kuri, and G. H. Kulkarni, "Robust Digital Watermarking using DWT-DCT-SVD Algorithms for Color Image," International Journal of Current Engineering and Technology, vol. 5, pp. 2722-2726, August 2015.
  • H.-T. Hu and L.-Y. Hsu, "Exploring DWT–SVD–DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression," Computers & Electrical Engineering, vol. 41, pp. 52-63, 2015.
  • M. Rahman, "A DWT, DCT and SVD based watermarking technique to protect the image piracy," arXiv preprint arXiv:1307.3294, 2013.
  • J. Guo, P. Zheng, and J. Huang, "Secure watermarking scheme against watermark attacks in the encrypted domain," Journal of Visual Communication and Image Representation, vol. 30, pp. 125-135, 2015.
  • H. Kekre, T. Sarode, and S. Natu, "Hybrid Watermarking of Color Images using DCT-Wavelet, DCT and SVD," International Journal of Advances in Engineering & Technology, vol. 6, p. 769, 2013.
  • P. Mali, B. Chaudhuri, and D. D. Majumder, "Some properties and fast algorithms of slant transform in image processing," Signal processing, vol. 9, pp. 233-244, 1985.
  • A. Benoraira, K. Benmahammed, and N. Boucenna, "Blind image watermarking technique based on differential embedding in DWT and DCT domains," EURASIP Journal on Advances in Signal Processing, vol. 2015, p. 1, 2015.
  • C.-q. Yin, L. Li, A.-q. Lv, and L. Qu, "Color image watermarking algorithm based on DWT-SVD," in Automation and Logistics, 2007 IEEE International Conference on, 2007, pp. 2607-2611.
  • R. Koju and S. R. Joshi, "Comparative Analysis of Color Image Watermarking Technique in RGB, YUV, and YCbCr Color Channels," Nepal Journal of Science and Technology, vol. 15, pp. 133-140, 2015.
  • M. lee and O.-J. Kwon, "Color Image Watermarking Based on DS-CDMA Using Hadamard Kernel," IEEE explore, 2008.
  • D. K. Ramanjaneyulu, D. P. Pandarinath, and B. R. Reddy, "Robust and Oblivious Watermarking based on Swapping of DCT Coefficients," International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, pp. 445-452, 2013.
Еще
Статья научная