Skip to content
BY 4.0 license Open Access Published by De Gruyter September 11, 2020

A Novel Dual Image Watermarking Technique Using Homomorphic Transform and DWT

  • Priyank Khare EMAIL logo and Vinay Kumar Srivastava

Abstract

In this paper a new technique of dual image watermarking is proposed for protection of ownership rights which utilizes salient properties of homomorphic transform (HT), discrete wavelet transform (DWT), singular value decomposition (SVD) and Arnold transform (AT). In embedding algorithm host image is splitted into reflectance and illumination components using HT, DWT is further applied to the reflectance component resulting in frequency subbands (HL and LH) which are transformed by SVD. Two image watermarks are selected for embedding process whereas security of proposed algorithm is strengthen by performing scrambling of second watermark through AT. Both watermarks are transformed with DWT and SVD. Singular values (SVs) of both transformed watermark are embedded into SVs of host image. Simulation results clearly signifies for high robustness and imperceptibility of proposed algorithm as it is examined under various attacks. Superiority of proposed technique is illustrated by comparing it with other reported methods.

MSC 2010: 94A08; 68P20

1 Introduction

With progressive development of communication technologies over the years made accessibility of multimedia data such as audio, text and images in an easyway. By virtue of this accessibility, one individual can easily exchange their information contents with other individuals in an efficient manner. Nowadays confidentiality and integrity of these data needs to be protected from illegitimate activities attempted by unauthorized users such as manipulation of information. So, researchers have drawn their attention to resolve such issues in a suitable manner. Digital image watermarking is a well renowned method for retaining confidentiality of multimedia data [1, 2]. In this methodology a secondary signal in form of an image generally which bears meaningful information is concealed into a host image. Image watermarking methods can be broadly classified in spatial and transform domain. In spatial domain approach, embedding take place just by altering pixel values of images whereas in transform domain numerous transforms are being employed such as discrete cosine transform (DCT), DWT, Karhunen – Loeve transform (KLT) [3, 4, 5, 6, 7, 8, 9, 10, 11, 12] for embedding of watermark. Out of these two transform domain method is widely preferred as they exhibit better robustness.

Significant features of a watermarking technique are imperceptibility, robustness, security and capacity. Imperceptibility accounts for visual similarity among original and watermarked images whereas robustness describes ability of algorithm to resist against attacks. Security is a vital parameter which protect watermark from unauthorized users whereas number of bits to be embedded are defined by capacity. There always exist a trade-off among robustness and imperceptibility. For maintaining balance between these properties hybrid watermarking techniques are designed such as DWT– SVD, DCT – SVD [10, 13,14,15]. In single image watermark embedding embedded watermark may get distorted or manipulated easily due to undesirable reasons and the copyright information can easily be revealed. So, this scenario really motivates us to develop a dual image watermarking technique with aid of various transforms so that this major concern can be resolved. Recently multiple watermarking techniques are widely used in practices as; they offer better resilience from unethical users which means even if first watermark is infringed by the attacker then second watermark can deliver meaningful information required for copyright protection. On the other hand these approaches reduces storage requirement of several multimedia data in the form of multiple watermarks that can be transmitted at once. These all merits accounts for good efficiency of multiple image watermarking.

Lai et al. [16] reported a method which utilizes combination of DWT and SVD in which host image is decomposed using DWT in numerous subbands from which middle frequencies subbands (LH and HL) are chosen whereas watermark is being divided in two halves. Each halves of watermark are directly embedded into SVs of HL and LH subbands. The main advantage of this method is that developed scheme is blind. Image watermarking technique using HT is investigated in [17] where HT of cover image is performed resulting in reflectance and illumination components further Svs of reflectance component are varied with watermark directly. The same idea is also extended by authors to block level for achieving better immunity but it seems method does not achieves satisfactory results. Another method using HT is suggested by Khare et al. [18] in which reflectance component of host image is processed with DWT and watermark is directly added to SVs of reflectance component of LL subband. It appears that this reported method attains better robustness and imperceptibility due to use of DWT which provides subband analysis of reflectance component. Dual image watermarking methodology is proposed in [19] where two watermarks are simultaneously embedded inside a medical host image. In this approach host image is decomposed upto IIIrd level DWT, followed by DCT and SVD. Similarly both watermarks are also processed by DCT and SVD. SVs of first watermark are embedded into SVs of LH2 subband of host image whereas SVs of second watermark are altered with SVs of LL3 subband. To enhance robustness of algorithm back propagation neural network (BPNN) is applied. In [20] similar approach using BPNN is reported in which single image watermark along with two text watermarks are embedded into a host image for different values of scaling factors.

Bhatnagar et al. [21] proposed multiple watermarking of two images using DWT. In this methodology secondary watermark is embedded inside a primary watermark, afterwards SVs of new primary watermark are inserted into SVs of cover image. However, this method does not yield sufficient value of correlation coefficient. Another similar method is investigated in [22]. Major difference lying in both schemes is use of image transforms. In this approach redundant discrete wavelet transform (RDWT) is employed whereas in [21] DWT is used for decomposing the cover image. Assini et al. [23] also developed multiple image watermarking method using fusion of DWT – fast Walsh – Hadamard – SVD. SVs of various watermarks were embedded into SVs of host image in this scheme. A fire fly optimized multiple watermarking algorithm is developed in [24]. In this procedure different watermarks are embedded into a host image with aim of maximizing certain objective function, so that scheme can become more robust and imperceptible. A DWT- KLT method of watermarking is reported by Sharma et al. [25] where cover image is decomposed with help of DWT, followed by KL transform on chosen subband, similarly watermark is also processed with DWT and embedding of wavelets coefficients of watermark is done in KL transformed subband. Khare et al. [26] developed a non – blind method of image watermarking using RDWT-DCT- SVD. High degree of robustness is attained in this method due to RDWT.

Kannammal et al. [27] suggested a watermarking technique using non – tensor wavelet transform where embedding of watermark is done in LH subband using least significant bit (LSB) method. Singh et al. [28] presented a multiple watermarking technique using DWT- DCT- SVD in which DWT of host medical image is performed, then DCT and SVD. Similarly watermark image is also processed by DCT- SVD, another text watermark is also encrypted and SVs of image watermark are embedded into SVs of host image. Encrypted text watermark is also embedded in HH2 subband coefficients of the host image. Singh et al. [29] suggested a new watermarking technique for medical purposes in which a medical image is decomposed into various subbands using IInd level of DWT decomposition, whereas two watermarks are used in this algorithm. First one is image watermark and second is text watermark. Text watermark consist of medical information about a patient which is being encrypted with error correcting codes, image watermark is splitted in two halves. Each watermark part is embedded with SVs of original medical image; similarly text watermark is also embedded by same procedure. This technique presented a new way for securing health information of patients. A multiple image watermarking technique for color images is discussed in [30] where two image watermarks are concurrently embedded inside a color host image. In this approach, a RGB colored host image is transformed into YCbCr color space. Further ‘Y’ component is decomposed upto IInd level using lifting wavelet transform (LWT) where LL2 and LH2 subbands are further transformed by DCT. DCT is also applied on both the watermarks, out of which first watermark is encrypted through AT. Finally these DCT transformed watermarks are embedded into host image.

Ray et al. [31] introduced a watermarking methodology which basically uses Rivest – Shamir – Adleman (RSA) algorithm. In this scheme, different frequency subbands of host image are obtained using Ist level DWT whereas SVs of watermark are attained which are further encrypted with help of RSA algorithm. These encrypted SVs of watermark image are embedded into SVs of transformed host image. Though it appears that developed scheme attains low imperceptibility but since it uses RSA algorithm which increases security of the developed scheme. In [32] a watermarking technique is discussed where two watermarks are simultaneously embedded inside a medical host image by using combination of non-subsampled contourlet transform (NSCT) - RDWT- SVD transforms. For providing more security to the technique chaotic encryption is employed. Kaur et al. [33] established a new approach of watermarking with the help of dual tree complex wavelet transform (DTCWT) and AT. A host image is decomposed into various subplanes using DTCWT whereas encrypted watermark image is also decomposed in a similar manner using DTCWT while encryption of watermark is done through AT. Further embedding process is performed for all subplanes distinctively whereas inverse DTCWT leads to generation of watermarked image. However, the developed scheme turns out to be a non-blind scheme which requires original host image for recovery of watermark. A multiple image watermarking approach is proposed in [34] where LWT along with DCT is employed. In this methodology a colored host image is converted from RGB to YIQ color space. Further ‘Y’ component is chosen for embedding of watermark while two encrypted watermarks are embedded concurrently inside the host image. Developed technique seems to be robust against numerous attacks and provides adequate security to the watermarks. Briefly several watermarking techniques are elaborated in [35], where authors have highlighted the salient features of numerous watermarking techniques. This actually helps researchers in providing roadmap for developing new watermarking methodologies. Researchers have proposed a novel dual image watermarking technique in [36] where RDWT, NSCT, AT and SVD transforms are effectively used. Dual image watermarks are embedded in this methodology whereas set partitioning in hierarchical tree (SPIHT) algorithm is employed successfully for compressing the watermarked image.

Layout of remaining paper is structured as: Section 2 highlights main significance of the proposed work whereas Section 3 elaborates basic concepts of HT, DWT, SVD and AT. In Section 4 proposed watermarking technique is presented. Section 5 deals with simulation results whereas conclusions are illustrated in Section 6.

2 Main Significance of the Proposed Work

A new approach of dual image watermarking is presented in this paper. Use of this technique leads to various advantages such as storage reduction, security and bandwidth requirements. In proposed methodology HT on host image is performed which results in illumination and reflectance components. Out of these two components reflectance component is preferred for embedding of watermark since it bears key features of image, so embedding in this part can lead to better immunity against attacks whereas perceptual invisibility is also increased simultaneously as this component varies very rapidly hence watermark becomes invisible to human perception easily. DWT is used to decompose reflectance component into numerous subbands [9, 14]. Use of DWT provides multiresolution analysis which strengthens imperceptibility. Choice of HL and LH sub-bands for embedding ensures that robustness and imperceptibility are achieved concurrently whereas use of SVD [5, 6, 7] increases robustness of algorithm as SVs are not much affected by various signal processing attacks. Usage of DWT increases computational complexity of the technique. Therefore, in order to overcome this short coming of DWT various other transforms such as RDWT [37, 38], NSCT [32, 36, 39] which possess shift invariance property can be used to reduce the computational complexity . However, false positive problem which tends to occur with usage of SVD transform needs to be eliminated. Shuffled SVD (SSVD) [40] is one of the possible methods which can be applied for the removal of false positive problem. In proposed method image watermark 1 is transformed by DWT resulting in HL subband whose SVs are computed using SVD. Similarly image watermark 2 is scrambled through AT and then DWT is applied on this scrambled watermark. Further SVs of LH subband of image watermark 2 are evaluated and SVs of HL and LH subbands of host image are modified with SVs of both watermarks. ‘EC’ logo is used as image watermark 1 whereas ‘MNNIT’ logo is used as image watermark 2 which ensures that privacy of information content is maintained even if one logo is tampered other logo delivers correct information. Therefore main significant features of proposed work are:

  • In [19] DCT is used for the processing of two image watermarks whereas in proposed approach we have utilized DWT. Use of DWT enhances perceptual invisibility in comparison to DCT which suffers from blocking artifacts. So, the proposed scheme becomes more imperceptible by embedding two watermarks in suitable frequency subbands.

  • Security is increased upto large extent as image watermark 2 ‘MNNIT’ logo is scrambled through AT and embedding two watermarks concurrently in a single host image reduces unethical activities carried out by unlawful users.

  • Reflectance component promises to deliver excellent robustness and perceptual invisibility therefore it is chosen for embedding of both watermarks as depicted in Tables 1-5.

  • Bandwidth requirement is also decreased as two watermark images are concurrently transmitted inside a single cover image.

Table 1

Performance Metrics for Proposed Technique under No Attacks.

Images MSE PSNR (dB) WPSNR (dB) NC1 NC2 SSIM
Goldhill 9.8474×10−7 60.0668 76.9511 1.00 1.00 0.9998
Peppers 9.4798×10−7 60.2320 77.4798 1.00 1.00 0.9998
Couple 1.0608×10−6 59.7436 76.4922 1.00 1.00 0.9998
Lena 1.0035×10−6 59.9850 76.8346 1.00 1.00 0.9999
Clock 1.2108×10−6 59.1692 76.2251 1.00 1.00 0.9997
Aerial 1.2323×10−6 59.0929 76.3081 1.00 1.00 0.9998
Table 2

Measuring Performance of the proposed technique Under Various Sizes of Watermarks.

Size of watermark images Image PSNR (dB) SSIM NC1 NC2
Goldhill 58.1871 0.9994 1.00 1.00
Peppers 56.4652 0.9989 1.00 1.00
256×256 Couple 49.1298 0.9949 1.00 1.00
Lena 48.4964 0.9927 1.00 1.00
Clock 62.2569 0.9998 1.00 1.00
Aerial 52.6356 0.9986 1.00 1.00
Goldhill 46.7389 0.9920 1.00 1.00
Peppers 45.5398 0.9883 1.00 1.00
Couple 41.0958 0.9765 1.00 1.00
128×128 Lena 40.5402 0.9692 1.00 1.00
Clock 53.0098 0.9971 1.00 1.00
Aerial 41.4954 0.9836 1.00 1.00

3 Basic Concepts

This section throws light on basic concepts regarding HT, DWT, SVD and AT in brief.

3.1 Homomorphic Transform

An image z (p1, p 2) can be considered as product of illumination component i (p1,p2) and reflectance r (p1,p2) component [18, 41, 42], where (p1, p2) represents spatial coordinates.

(1) z ( p 1 , p 2 ) = i ( p 1 , p 2 ) r ( p 1 , p 2 )

Above Eq. (1) is made separable using logarithm function as:

(2) ln ( z ( p 1 , p 2 ) ) = ln ( i ( p 1 , p 2 ) ) + ln ( r ( p 1 , p 2 ) )

This Eq. (2) is transformed in frequency domain by using fast fourier transform.

(3) Z ( u , v ) = Z i ( u , v ) + Z r ( u , v )

For extraction of ‘Zr(u, v)’ from Eq. (3) it is passed through a high pass filter ‘H(u,v)’.

(4) F ( u , v ) = Z i ( u , v ) H ( u , v ) + Z r ( u , v ) H ( u , v )

Inverse transformation of Eq. (4) is done for yielding reflectance component. This component comprises of vital image features with a low energy hence embedding watermark in this component will improve imperceptibility and robustness of proposed scheme as embedded watermark will be difficult to be perceived by human perception and greater noise immunity will be attained. Diagrammatic representation of HT decomposition of an image is depicted in Figure 1.

Figure 1 Illumination and Reflectance Component of an Image.
Figure 1

Illumination and Reflectance Component of an Image.

3.2 Discrete Wavelet Transform

DWT is a transformation used for frequency domain analysis of image. Basically it consists of a filter system which decomposes a given image into numerous subbands as: A (approximation), H (horizontal), V (vertical) and D (diagonal) [43, 44, 45]. Approximation is a low frequency subband while other three remaining are high frequency subbands. These subbands contain coarse and fine details of image which are closely related to human visual system. This decomposition can be increased to multiple times for higher subbands decomposition. The key feature of DWT is it exhibits good frequency localization which improves imperceptibility as watermark can be embedded into any desired subband.

3.3 Singular Value Decomposition

A real matrix ‘B’ is decomposed into three matrices U, D and V using SVD where U, V are left and right orthogonal matrices and ‘D’ is a diagonal matrix which consists of SVs [46, 47]. Mathematically it is formulated as:

(5) B = U 1 D 1 V 1 T + U 2 D 2 V 2 T + U R D R V R T

Here ‘R’ denotes rank of matrix ‘B’. In watermarking techniques SVD is very frequently used as SVs demonstrates excellent stability towards various changes made in image under several attacks. Hence resistance of watermarking schemes is increased with usage of SVD.

3.4 Arnold Transform

Protection of ownership is a challenging task so that information can be protected from malicious attacks. Therefore scrambling of image are performed using AT. Scrambling is performed for fixed number of iterations whereas after applying inverse AT original image is recovered back [48, 49, 50]. Mathematically AT is formulated as:

(6) l 1 l 2 = 1 1 1 2 l 1 l 2 mod P

where l 1 l 2 and l 1 l 2 represents image pixels after and before AT whereas ‘P’ is size of image. This transform is periodic which means after finite iterations original image is retrieved back.

4 Proposed Algorithm

This section discusses about the proposed algorithm regarding watermark embedding and its extraction from noisy watermarked image. Embedding algorithm make use of HT, DWT, SVD along with AT to enhance the security. Embedding of watermark in reflectance component ensures that imperceptibility and robustness are simultaneously attained which is a prime requirement for any watermarking algorithm. The steps for these algorithms are discussed below. Figure 2A and B depicts embedding and extraction algorithms to distinctly define the flow of the proposed technique.

Figure 2 (A) Embedding Algorithm (B) Extraction Algorithm.
Figure 2

(A) Embedding Algorithm (B) Extraction Algorithm.

4.1 Embedding Algorithm

  • Illumination ‘I’ and reflectance ‘R’ components of host image ‘Y’ are computed using HT.

  • Apply DWT on ‘R’ resulting in HL and LH subbands, further apply SVD to these selected subbands.

(7) S V D ( R H L ) = U H L S H L V H L T
(8) S V D ( R L H ) = U L H S L H V L H T
  • Apply DWT on EC logo and select HL subband whose SVs are computed using SVD.

(9) S V D ( W E C ) = U W E C S W E C V W E C T
  • AT of MNNIT watermark is performed, afterwards LH subband of scrambled watermark is obtained by one level DWT of it and then SVD of selected subband is done.

(10) S V D ( W M N N I T ) = U W M N N I T S W M N N I T V W M N N I T T
  • EC and MNNIT watermarks are embedded into the host image according to following Eqs. (11) and (12)

(11) S w 1 = S H L + α S W E C
(12) S w 2 = S L H + α S W M N N I T

here α is a scaling parameter whose value is set to 0.005.

  • Now inverse SVD is applied on obtained modified coefficients ‘Sw1’ and ‘Sw2’, followed by inverse DWT.

  • Inverse HT is successively performed for obtaining watermarked image ‘YWM.

4.2 Extraction Algorithm

  • HT of watermarked image ‘YWM’ is performed for separating out illumination and reflectance components.

  • Apply one level DWT to reflectance component and then apply SVD to HL and LH subbands.

(13) S V D ( R W M H L ) = U W M H L S W M H L V W M H L T
(14) S V D ( R W M L H ) = U W M L H S W M L H V W M L H T
  • Modified SVD coefficients for both image watermarks are recovered using Eqs. (15) and (16) respectively.

(15) S Re cov E C = ( S W M H L S H L ) / α
(16) S Re cov M N N I T = ( S W M L H S L H ) / α
  • Inverse SVD is distinctively applied on SRecovEC and SRecovMNNIT for obtaining modified wavelet coefficients of EC and MNNIT logos.

  • Inverse DWT is performed for recovery of EC logo whereas inverse DWT followed by inverse AT is done to decrypt MNNIT logo.

5 Simulation Results and its Analysis

Several experiments were performed comprehensively for evaluating effectiveness of proposed algorithm. Six standard gray scale images namely, Goldhill, Couple, Lena, Peppers, Aerial and Clock are taken as host images of size 512×512 as depicted in Figure 3A-F whereas EC and MNNIT logos of size 512×512 are used as image watermarks presented in Figure 4A and B. All simulation results are computed using MATLAB software. Figure 5A-D illustrates original Goldhill image, watermarked Goldhill image and both image watermarks recovered after applying extraction algorithm.

Figure 3 Various Host Images taken (A) Goldhill (B) Couple (C) Lena (D) Peppers (E) Aerial (F) Clock.
Figure 3

Various Host Images taken (A) Goldhill (B) Couple (C) Lena (D) Peppers (E) Aerial (F) Clock.

Figure 4 Image Watermarks used (A) EC Logo (B) MNNIT Logo.
Figure 4

Image Watermarks used (A) EC Logo (B) MNNIT Logo.

Figure 5 (A) Original Goldhill Image (B) Watermarked Image (C) Recovered EC Logo (D) Recovered MNNIT Logo.
Figure 5

(A) Original Goldhill Image (B) Watermarked Image (C) Recovered EC Logo (D) Recovered MNNIT Logo.

Mean squared error (MSE), peak signal to noise ratio (PSNR), normalized correlation (NC) [51], structural similarity index [52] and weighted PSNR (WPSNR) [53, 54] are the parameters which are employed for evaluating performance of the proposed technique. Table 1 tabulates MSE, PSNR, WPSNR, NC and SSIM values for the proposed algorithm under no attacks. Maximum PSNR and WPSNR is obtained for Peppers image of 60.2320 dB and 77.4798 dB whereas NC for recovered EC logo (NC1) is 1.00 and for MNNIT logo (NC2) is 1.00 for all host images respectively while highest SSIM of 0.9999 is attained for Lena image. Thus excellent values of PSNR, WPSNR, NC and SSIM are achieved for the proposed scheme.

Table 2 evaluates the variations in size of image watermarks for the proposed technique. For varying size of watermark images again performance parameters are evaluated and it is observed that they yield satisfactory results. Hence on changing the size of watermark images our proposed technique exhibits good robustness and perceptual invisibility.

In Figure 6 imperceptibility analysis for proposed technique is carried out in which PSNR is computed for various host images under influence of various attacks. It is observed from Figure 6 that highest PSNR of 57.1796 dB is attained for JPEG compression (100) attack for Lena image whereas lowest PSNR value of 10.8908 dB is obtained for Clock image under rotation (3°) attack. For majority of attacks PSNR values are well above 30 dB which signifies high perceptual invisibility of the proposed scheme. SSIM values are also evaluated for the proposed technique under influence of numerous attacks as demonstrated graphically in Figure 7. This metric values accounts for remarkable perceptual invisibility of the proposed approach for majority of attacks except for rotation (3°) attack where SSIM values are low.

Figure 6 Imperceptibility Analysis for Proposed Scheme under Several Attacks (A) Salt & pepper Noise (0.05) (B) Speckle Noise (0.02) (C) Gaussian Noise (0, 0.0002) (D) Sharpening (E) Gaussian Filter (3×3) (F) Average Filter (3×3) (G) Median Filter (3×3) (H) JPEG Compression (100) (I) Rotation (3°) (J) Gamma Correction (0.8) (K) Scaling (0.5, 2) (L) Translation [10 10] + Salt & pepper Noise (0.001) (M) JPEG Compression (60) + Salt & pepper Noise (0.04) (N) JPEG Compression (80) + Scaling (2,0.5).
Figure 6

Imperceptibility Analysis for Proposed Scheme under Several Attacks (A) Salt & pepper Noise (0.05) (B) Speckle Noise (0.02) (C) Gaussian Noise (0, 0.0002) (D) Sharpening (E) Gaussian Filter (3×3) (F) Average Filter (3×3) (G) Median Filter (3×3) (H) JPEG Compression (100) (I) Rotation (3°) (J) Gamma Correction (0.8) (K) Scaling (0.5, 2) (L) Translation [10 10] + Salt & pepper Noise (0.001) (M) JPEG Compression (60) + Salt & pepper Noise (0.04) (N) JPEG Compression (80) + Scaling (2,0.5).

Figure 7 
SSIM Values Evaluated for Proposed Technique under Several Attacks (A) Salt & pepper Noise (0.004) (B) Speckle Noise (0.001) (C) Gaussian Noise (0, 0.0002) (D) Histogram equalization (E) Sharpening (F) Gaussian Filter (3×3) (G) Average Filter (3×3) (H) Median Filter (3×3) (I) JPEG Compression (90) (J) Rotation (3°) (K) Gamma Correction (0.8) (L) Scaling (0.5, 2) (M) JPEG Compression (80) + Scaling (2,0.5).
Figure 7

SSIM Values Evaluated for Proposed Technique under Several Attacks (A) Salt & pepper Noise (0.004) (B) Speckle Noise (0.001) (C) Gaussian Noise (0, 0.0002) (D) Histogram equalization (E) Sharpening (F) Gaussian Filter (3×3) (G) Average Filter (3×3) (H) Median Filter (3×3) (I) JPEG Compression (90) (J) Rotation (3°) (K) Gamma Correction (0.8) (L) Scaling (0.5, 2) (M) JPEG Compression (80) + Scaling (2,0.5).

Table 3 presents NC values for both recovered watermark images when several watermarked images are subjected to different attacks. On observing Table 3 it appears that NC values for both watermarks are well above 0.9 for most of the attacks.

Table 3

NC Values for Extracted Watermark Logos under Attacks.

Attacks Goldhill Couple Peppers Lena Clock Aerial

NC1 NC2 NC1 NC2 NC1 NC2 NC1 NC2 NC1 NC2 NC1 NC2
Salt & pepper noise (0.04) 0.9995 0.8385 0.9996 0.9074 0.9994 0.8161 0.9994 0.8680 0.9994 0.7845 0.9996 0.8145
Speckle noise (0.02) 0.9998 0.9664 0.9998 0.9759 0.9998 0.9542 0.9997 0.9710 0.9997 0.9295 0.9998 0.9327
Gaussian noise 0.9997 0.9480 0.9998 0.9721 0.9997 0.9463 0.9997 0.9645 0.9998 0.9647 0.9998 0.9454
(0, 0.005)
Histogram equalization 0.9998 0.9221 0.9995 0.7414 0.9999 0.9925 0.9998 0.9492 0.9999 0.9518 0.9995 0.9388
Sharpening 0.9999 0.9895 0.9998 0.9340 0.9999 0.9937 0.9999 0.9642 0.9999 0.9919 0.9999 0.9943
Gaussian filter (3×3) 1.00 0.9997 1.00 0.9904 1.00 0.9996 1.00 0.9946 1.00 0.9999 1.00 0.9994
Averaging filter (3×3) 0.9996 0.9954 0.9997 0.9589 0.9996 0.9930 0.9997 0.9849 0.9995 0.9928 0.9998 0.9927
Median filter (3x3) 1.00 0.9988 1.00 0.9770 1.00 0.9995 1.00 0.9897 1.00 0.9988 1.00 0.9983
JPEG compression (50) 1.00 1.00 1.00 1.00 1.00 1.00 0.9999 0.9925 1.00 0.9981 1.00 0.9990
Rotation (3°) 0.9996 1.00 0.9997 1.00 0.9997 0.9898 0.9997 0.9952 0.9996 0.9269 0.9999 0.9760
Gamma correction (0.8) 1.00 1.00 1.00 0.9979 1.00 0.9993 1.00 0.9986 1.00 1.00 1.00 0.9980
Translation [30 20] 0.9998 0.9994 0.9999 0.9997 0.9999 0.9979 0.9999 1.00 0.9998 0.9929 1.00 0.9964
Table 4

Robustness Evaluation for Proposed Technique under Hybrid Attacks.

Attacks Goldhill Couple Peppers Lena Clock Aerial

NC1 NC2 NC1 NC2 NC1 NC2 NC1 NC2 NC1 NC2 NC1 NC2
Gamma correction (0.9) + JPEG compression (70) 1.00 1.00 1.00 1.00 1.00 0.9996 1.00 0.9999 1.00 1.00 1.00 0.9990
Translation [10 10] + Salt & pepper noise (0.0002) 0.9999 0.9997 0.9999 0.9998 1.00 0.9995 1.00 1.00 0.9999 0.9952 1.00 0.9993
JPEG compression (80) + Scaling (2,0.5) 1.00 0.9999 1.00 0.9965 1.00 1.00 1.00 0.9969 1.00 0.9995 1.00 0.9995
Table 5

PSNR (dB) Comparison among Various Schemes.

[19] [21] [30] [31] [33] Proposed method
30.99 43.2093 34.5164 27.3823 56.2135 60.2320
Table 6

Comparison of Proposed Technique with Other Reported Methods.

Attacks [19]a [19]b [21] [22] Proposed scheme

NC1 NC2 NC1 NC2 NC1 NC2 NC1 NC2 NC1 NC2
JPEG compression (50) * * * * 0.9887 0.7393 0.6963 0.5998 1.00 0.9990
Gaussian noise (0, 0.001) 0.8939 0.9901 0.9515 0.9908 * * * * 1.00 0.9966
Salt & pepper noise (0.05) 0.6287 0.6596 0.8405 0.6828 * * * * 0.9996 0.7706
Median (3×3) 0.8457 0.9833 0.8657 0.9861 * * * * 1.00 0.9983
filter (11×11) * * * * –0.5432 0.3314 * * 1.00 0.9749
Average (3×3) 0.6709 0.9809 0.7348 0.9863 * * * * 0.9998 0.9927
filter (11×11) * * * * -0.5394 0.3170 * * 1.00 0.9645
Rotation (5°) 0.5798 0.7843 0.7912 0.9806 * * * * 1.00 0.9830
Gamma correction 0.9249 0.9200 0.9650 0.9668 * * * * 1.00 0.9980
Scaling 0.9206 0.9825 0.9626 0.9879 * * 0.6365 0.5783 1.00 0.9945

Numerous hybrid attacks such as JPEG compression (80) + scaling (2, 0.5), gamma correction (0.9) + JPEG compression (70), Translation [10 10] + Salt & pepper noise (0.0002) are also applied to the proposed technique for examining its robustness as tabulated in Table 4. So from Table 3 and 4 it can easily be concluded that proposed methodology offers good amount of robustness against numerous attacks as NC values for recovered watermarks are lying close to 1.

Table 5 presents imperceptibility comparison among different schemes as reported in [19, 21, 30, 31] and [33] with our proposed approach and it is found that our developed scheme outperforms all remaining schemes in terms of imperceptibility with a high value of PSNR of 60.2320 (dB).

In Figure 8 given below graphical comparison of NC values for both image watermarks has been performed among proposed scheme and scheme reported in [30]. It is found that NC1 and NC2 of proposed scheme are much higher than the values obtained in [30] for same set of attacks.

Figure 8 NC Values Comparison among Proposed Scheme and Scheme Reported in [30].
Figure 8

NC Values Comparison among Proposed Scheme and Scheme Reported in [30].

Table 6 emphasizes the efficacy of proposed algorithm by comparing it with other reported techniques such as [19]a, [19]b, [21] and [22] where [19]a signifies technique without BPNN and [19]b denotes technique using BPNN. Symbol ‘*’ means NC values were not reported for these attacks. On observing Table 6 it can be easily interpreted that proposed scheme is superior as it offers better robustness in comparison to other reported techniques. NC values are quite high for proposed technique as they are ranging from 0.7706 to 1.00 which is quite remarkable.

6 Conclusions

In this paper a novel dual image watermarking technique is proposed which uses fusion of HT, DWT, SVD and AT. HT decomposition of image gives reflectance component in which embedding of two image watermarks is performed. Embedding is performed in reflectance component due to its characteristics which exhibits better robustness and imperceptibility whereas DWT also provides better perceptual invisibility by embedding these watermarks in high frequency subbands. SVD enhances robustness of proposed method against geometrical attacks, while AT strengthens security of algorithm. Embedding of dual watermarks inside a single host image reduces risk of tampering and storage requirements simultaneously. Simulation results clearly accounts for high robustness and imperceptibility of proposed scheme under numerous attacks as well as its superiority is illustrated by comparing it with other existing methods such as [19]a, [19]b, [21, 22, 30, 31] and [33]. Hence a reliable and secure dual image watermarking technique is developed in this paper. The proposed watermarking technique finds its potential application in the field of medical health care where a patient record bearing vital information can be transmitted as watermark along with medical image watermark. Secondly, applying proposed technique for color image watermarking can be an interesting area of research.

References

[1] T. S Tagare and S. Kuri, Digital image watermarking–an overview, Int. J. Comput. Sci. Inform. Eng. Techno., 3 (2013), 2277-4408.Search in Google Scholar

[2] M. Agbaje, O. Awodele and C. Ogbonna, Applications of digital watermarking to cyber security (cyber watermarking), in: Proceedings of Informing Science & IT Education Conference (InSITE), Florida, USA, pp. 1–11, 2015.10.28945/2138Search in Google Scholar

[3] S. Singh, R. Singh, A. K. Singh and T. J. Siddiqui, SVD-DCT based medical image watermarking in NSCT domain, in: Quantum Computing: An Environment for Intelligent Large Scale Real Application, Springer, Cham, pp. 467-488, 2018.10.1007/978-3-319-63639-9_20Search in Google Scholar

[4] S. Roy and A. K. Pal, A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification, International Journal of Information and Computer Security. 10 (2018), 216-236.10.1504/IJICS.2018.091469Search in Google Scholar

[5] C. C. Chang, P. Tsai and C. C. Lin, SVD-based digital image watermarking scheme, Pattern Recognition Letters. 26 (2005), 1577-1586.10.1016/j.patrec.2005.01.004Search in Google Scholar

[6] K. L. Chung, W. N. Yang, Y. H. Huang, S. T. Wu and Y. C. Hsu, On SVD-based watermarking algorithm, Applied Mathematics and Computation. 188 (2007), 54-57.10.1016/j.amc.2006.09.117Search in Google Scholar

[7] M. Q. Fan, H. X. Wang, and S. K Li, Restudy on SVD-based watermarking scheme, Applied Mathematics and Computation. 203 (2008), 926-930.10.1016/j.amc.2008.05.003Search in Google Scholar

[8] P. Khare, A.K. Verma and V.K. Srivastava, Digital image watermarking scheme in wavelet domain using chaotic encryption, in: Engineering and Systems (SCES), 2014 Students Conference on. pp. 1-4, IEEE, 2014.10.1109/SCES.2014.6880072Search in Google Scholar

[9] A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Personal Communications. 83 (2015), 2133-2150.10.1007/s11277-015-2505-0Search in Google Scholar

[10] S. Madhesiya and S. Ahmed, Advanced technique of digital watermarking based on SVD-DWT-DCT and Arnold transform, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET). 2 (2013), pp-1918.Search in Google Scholar

[11] S.A. Parah, S. Ashraf and A. Ashraf, Robustness analysis of a digital image watermarking technique for various frequency bands in DCT domain, in: 2015 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), pp. 57-62, IEEE, 2015.10.1109/iNIS.2015.41Search in Google Scholar

[12] E. Ganic and A. M. Eskicioglu, Robust DWT-SVD domain image watermarking: embedding data in all frequencies, in: Workshop on Multimedia and Security, Magdeburg, Germany, ACM, pp. 166–174, 2004.10.1145/1022431.1022461Search in Google Scholar

[13] G. Bhatnagar, Q. M. J. Wu and B. Raman, Robust gray scale watermarking in wavelet domain, Recent Adv. Secur. Privacy Dist. Commun. Image Proc. 38 (2012), 1164–1176.10.1016/j.compeleceng.2012.02.002Search in Google Scholar

[14] A. Al-Haj, Combined DWT-DCT digital image watermarking, J. Comput. Sci. 3 (2007), 740–746.10.3844/jcssp.2007.740.746Search in Google Scholar

[15] I.A. Ansari and M. Pant, Multipurpose image watermarking in the domain of DWT based on SVD and ABC, Pattern Recogn Lett. 94 (2016), 228–236.10.1016/j.patrec.2016.12.010Search in Google Scholar

[16] C. C. Lai and C. C. Tsai, Digital image watermarking using discrete wavelet transform and singular value decomposition, IEEE Transactions on instrumentation and measurement 59 (2010), 3060-3063.10.1109/TIM.2010.2066770Search in Google Scholar

[17] H. A. Abdallah , R. A. Ghazy , H. Kasban , O. S. Faragallah , A. A. Shaalan , M. M. Hadhoud and F. E. A. El-Samie , Homomorphic image watermarking with a singular value decomposition algorithm, Information Processing & Management. 50 (2014), 909-923.10.1016/j.ipm.2014.07.001Search in Google Scholar

[18] P. Khare and V. K. Srivastava, Image Watermarking Scheme using Homomorphic Transform in Wavelet Domain, in: 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) pp. 1-6, IEEE, 2018.10.1109/UPCON.2018.8597025Search in Google Scholar

[19] A. Zear, A. K. Singh and P. Kumar, Multiple watermarking for healthcare applications, Journal of Intelligent Systems. 27 (2018), 5-18.10.1515/jisys-2016-0036Search in Google Scholar

[20] Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimedia Tools and Applications. 77 (2018), 4863-4882.10.1007/s11042-016-3862-8Search in Google Scholar

[21] G. Bhatnagar , B.Raman and K. Swaminathan, DWT-SVD based dual watermarking scheme, in: Applications of Digital Information and Web Technologies, 2008. ICADIWT 2008 pp. 526-531, IEEE, 2008.10.1109/ICADIWT.2008.4664404Search in Google Scholar

[22] S. Gaur and V. K. Srivastava, A RDWT and Block-SVD based Dual Watermarking Scheme for Digital Images, International Journal of Advanced Computer Science and Applications. 8 (2017), 211-219.10.14569/IJACSA.2017.080430Search in Google Scholar

[23] Assini , A. Badri, K. Safi, A .Sahel and A. Baghdad, Hybrid multiple watermarking technique for securing medical image using DWT-FWHT-SVD, in: Advanced Technologies for Signal and Image Processing (ATSIP), 2017 International Conference on. pp. 1-6, IEEE, 2017.10.1109/ATSIP.2017.8075569Search in Google Scholar

[24] S. Sejpal and N. Shah, A novel multiple objective optimized dual watermarking scheme based on DWT-SVD using Firefly algorithm, in: Computing, Analytics and Security Trends (CAST), International Conference on. pp. 46-51, IEEE, 2016.10.1109/CAST.2016.7914938Search in Google Scholar

[25] A. Sharma, A. K. Singh, and P. Kumar, Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images, Journal of Intelligent Systems. 27 (2018), 91-103.10.1515/jisys-2017-0032Search in Google Scholar

[26] P. Khare and V. K. Srivastava, Robust Digital Image Watermarking Scheme Based on RDWT-DCT-SVD, in: 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 88-93, IEEE, 2018.10.1109/SPIN.2018.8474125Search in Google Scholar

[27] A. Kannammal and S. Subha Rani, Two level security for medical images using watermarking/encryption algorithms, International Journal of Imaging Systems and Technology. 24 (2014), 111-120.10.1002/ima.22086Search in Google Scholar

[28] K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimedia Tools and Applications. 75 (2016), 8381-8401.10.1007/s11042-015-2754-7Search in Google Scholar

[29] K. Singh, B. Kumar, M. Dave and A. Mohan, Robust and imperceptible dual watermarking for telemedicine applications, Wireless Personal Communications. 80 (2015), 1415-1433.10.1007/s11277-014-2091-6Search in Google Scholar

[30] Preet and R.K. Aggarwal, Multiple image watermarking using LWT, DCT and arnold transformation, in: 2017 International Conference on Trends in Electronics and Informatics (ICEI) pp. 158-162, 2017.10.1109/ICOEI.2017.8300908Search in Google Scholar

[31] A.K. Ray, S. Padhihary, P.K. Patra and M.N. Mohanty, Development of a new algorithm based on SVD for image watermarking, in: Computational Vision and Robotics Springer, New Delhi, pp. 79-87, 2015.10.1007/978-81-322-2196-8_10Search in Google Scholar

[32] S. Thakur, A. K. Singh, S.P. Ghrera and A. Mohan, Chaotic based securewatermarking approach for medical images, Multimedia Tools and Applications. (2018), 1-14, 10.1007/s11042-018-6691-0.Search in Google Scholar

[33] S.Kaur and R. Talwar, Arnold transform based Security Enhancement using Digital Image Watermarking with Complex Wavelet Transform, International Journal of Electronics Engineering Research.9 (2017), pp. 677-693.Search in Google Scholar

[34] A. K. Singh, Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image, Multimedia Tools and Applications. (2019), 1-11.10.1007/s11042-018-7115-xSearch in Google Scholar

[35] L. Singh, A. K. Singh and P. K. Singh, Secure data hiding techniques: a survey, Multimedia Tools and Applications. (2018), 1-21.Search in Google Scholar

[36] C. Kumar, A. K. Singh, P. Kumar, R. Singh and S. Singh, SPIHT-basedmultiple image watermarking in NSCTdomain, Concurrency and Computation: Practice and Experience. (2018), e4912.10.1002/cpe.4912Search in Google Scholar

[37] N. M. Makbol and B. E. Khoo, Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition, AEU-International Journal of Electronics and Communications. 67(2013), 102-112.10.1016/j.aeue.2012.06.008Search in Google Scholar

[38] S. Roy and A. K. Pal, A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling, Multimedia Tools and Applications. 76(2017), 3577-3616.10.1007/s11042-016-3902-4Search in Google Scholar

[39] S. Singh, V.S. Rathore, R. Singh and M.K. Singh, Hybrid semi-blind image watermarking in redundant wavelet domain, Multimedia Tools and Applications. 76(2017), 19113-19137.10.1007/s11042-017-4570-8Search in Google Scholar

[40] M. Guo and H. Prasetyo, False-positive-free SVD-based image watermarking, Journal of Visual Communication and Image Representation. 25(2014), 1149-1163.10.1016/j.jvcir.2014.03.012Search in Google Scholar

[41] R. C. Gonzalez and R. E. Woods, Digital image processing second edition, Beijing: Publishing House of Electronics Industry, 455, 2002.Search in Google Scholar

[42] H. A. Abdallah , O. S. Faragallah , H. S. Elsayed, A. A. Shaalan , and F.E.A. El-samie, Robust image watermarking method using homomorphic block-based KLT, Optik-International Journal for Light and Electron Optics. 127 (2016), 2374-2381.10.1016/j.ijleo.2015.10.050Search in Google Scholar

[43] S. G. Mallat, A theory for multiresolution signal decomposition: the wavelet representation, IEEE transactions on pattern analysis and machine intelligence. 11(1989), 674-693.10.1515/9781400827268.494Search in Google Scholar

[44] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Multiple watermarking on medical images using selective DWT coefficients, J. Med. Imaging Health Inform. 5 (2015), 607–614.10.1166/jmihi.2015.1432Search in Google Scholar

[45] K. Singh, Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images, Multimedia Tools and Applications. 76 (2017), 8881-8900.10.1007/s11042-016-3514-zSearch in Google Scholar

[46] R. Liu, and T. Tan, An SVD-based watermarking scheme for protecting rightful ownership, IEEE transactions on multimedia. 4 (2002), 121-128.10.1109/6046.985560Search in Google Scholar

[47] X. P. Zhang and K. Li, Comments on An SVD-based watermarking scheme for protecting rightful Ownership, IEEE Transactions on Multimedia. 7 (2005), 593-594.10.1109/TMM.2005.843357Search in Google Scholar

[48] Z. Tang and X. Zhang, Secure image encryption without size limitation using Arnold transform and random strategies, Journal of multimedia. 6 (2011), 202-206.10.4304/jmm.6.2.202-206Search in Google Scholar

[49] M. Hamidi , M.El Haziti , H. Cherifi and M. El Hassouni, Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform, Multimedia Tools and Applications. 77 (2018), 1-34.10.1007/s11042-018-5913-9Search in Google Scholar

[50] R. G. Zhou, W. Hu, P. Fan and G. Luo, Quantum color image watermarking based on Arnold transformation and LSB steganography, International Journal of Quantum Information. 16 (2018), 1850021.10.1142/S0219749918500211Search in Google Scholar

[51] M. Kutter and F.A. Petitcolas, Fair evaluation methods for image watermarking systems, Journal of Electronic Imaging. 9 (2000), 445-45610.1117/1.1287594Search in Google Scholar

[52] Z.Wang, A.C. Bovik, H.R.Sheikh and E.P. Simoncelli, Image quality assessment: from error visibility to structural similarity, IEEE transactions on image processing 13(2004), 600-612.10.1109/TIP.2003.819861Search in Google Scholar

[53] A. Navas, S. A. Thampy, and M. Sasikumar, EPR hiding in medical images for telemedicine, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering. 2(2008), 223-226.Search in Google Scholar

[54] F. N. Thakkar and V.K. Srivastava, A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications, Multimedia Tools and Applications. 76(2017), 3669-3697.10.1007/s11042-016-3928-7Search in Google Scholar

Received: 2019-02-16
Accepted: 2019-08-10
Published Online: 2020-09-11

© 2020 P. Khare and V. Kumar Srivastava, published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Downloaded on 25.4.2024 from https://www.degruyter.com/document/doi/10.1515/jisys-2019-0046/html
Scroll to top button