Next Article in Journal
Backhaul-Aware Dimensioning and Planning of Millimeter-Wave Small Cell Networks
Next Article in Special Issue
A Multi-Objective Evolutionary Algorithm Based on KNN-Graph for Traffic Network Attack
Previous Article in Journal
Model-Free Hybrid Control with Intelligent Proportional Integral and Super-Twisting Sliding Mode Control of PMSM Drives
Previous Article in Special Issue
Pixel-Based Approach for Generating Original and Imitating Evolutionary Art
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Optimized Digital Watermarking Scheme Based on Invariant DC Coefficients in Spatial Domain

1
Department of Basic Sciences, PYD, King Faisal University, Al Ahsa 31982, Saudi Arabia
2
AI Graduate School, Gwangju Institute of Science and Technology (GIST), Gwangju 61005, Korea
3
Department of Applied Science and Engineering, Indian Institute of Technology (IIT), Rookree 600036, India
4
Department of Mathematics, University of Petroleum and Energy Studies, Dehradun 248007, India
5
Department of Mathematics, Graphic Era (Deemed to be) University, Dehradun 248002, India
*
Author to whom correspondence should be addressed.
Submission received: 16 August 2020 / Revised: 30 August 2020 / Accepted: 31 August 2020 / Published: 2 September 2020
(This article belongs to the Special Issue Evolutionary Machine Learning for Nature-Inspired Problem Solving)

Abstract

:
Digital watermarking has become an essential and important tool for copyright protection, authentication, and security of multimedia contents. It is the process of embedding a watermark in the multimedia content and its extraction. Block-based discrete cosine transform (DCT) is a widely used method in digital watermarking. This paper proposes a novel blind image watermarking scheme developed in the spatial domain by quantization of invariant direct current (DC) coefficients. The cover image is redistributed and divided into non-overlapped square blocks and then the DC coefficients invariant to rotation, row and column flip operations, without utilization of the DCT transform, are directly calculated in the spatial domain. Utilizing the quantization parameter and watermark information, the modified DC coefficients and the difference between DC and modified DC coefficients are calculated to directly modify the pixel values to embed watermark bits in the spatial domain instead of the DCT domain. Optimal values of the quantization parameter, which plays a significant role in controlling the tradeoff between robustness and invisibility, are calculated through differential evolution (DE), the optimization algorithm. Experimental results, compared with the latest similar schemes, demonstrate the advantages of the proposed scheme.

1. Introduction

Advancements in multimedia technologies and computer networks have made duplication and distribution of digital contents such as audio, video or digital images, much easier than ever before in recent years. Protection of such digital content has become a challenging task from a security and copyright point of view. To address these issues, the digital watermarking scheme was introduced [1,2]. The main concern of the digital image watermarking scheme is to maintain the quality of the host image showing good robustness against distortion attacks. Watermarking schemes can be categorized according to various factors, such as the domain in which the watermark is inserted, the spatial or frequency domain, visible or invisible watermarking, robust or fragile watermarking. A very brief discussion on these schemes is provided in the paragraphs below. However, for more details on watermarking schemes, the interested researchers may refer to [3,4].
The spatial domain watermarking schemes directly insert the watermark into the host image by modifying the pixels intensities [5,6,7]. Modifying the least significant bits (LSB) of the host image pixels to insert watermark bits is the simplest scheme in this category [5]. The spatial domain watermarking schemes are easy to implement, having a low cost of operation, but generally are not robust against image distortion attacks.
Frequency domain methods first transform the spatial representation into the frequency domain and then modify the frequency coefficients. Literature also reveals the implementation of various transforms, such as the discrete wavelet transform (DWT), discrete Fourier transform (DFT), quaternion wavelet transform (QWT), discrete fractional Fourier transform (DFrFT), singular value decomposition (SVD), discrete cosine transform (DCT), and their combinations, for image watermarking schemes [8,9,10,11,12,13,14,15,16]. A redistributed invariant discrete wavelet transform (RIDWT) image watermarking technique was introduced by Li et al. [17]. This transform is invariant to the ninety-degree multiple rotations, row, and column flipping and is obtained by shifting the pixels of the image to the new locations and then applying wavelet transform and some normalization process.
It can be identified from the literature review of DCT-based image watermarking schemes that, generally, the watermark is inserted into the host image in the frequency domain by modifying the frequency coefficients [10,11]. Implementation of DCT is a time taking process. Keeping this fact in mind, some researchers implemented watermark insertion into DC values computed in the spatial domain without using the DCT [18,19,20,21]. The host image is divided into 8 × 8 sub-blocks and DC coefficients are computed in the spatial domain for each block instead of applying the discrete cosine transform (DCT). Watermark bits are inserted by modifying DC coefficients of each block in the spatial domain. The robustness of these schemes is more or less the same as in transform domain schemes, because these schemes mimic the behavior of a transform domain scheme in the spatial domain.
Utilization of machine learning and optimization techniques, such as support vector machines, neural networks, fuzzy logic, and evolutionary algorithms (EAs) have played an important role in image watermarking [22,23,24].
Genetic algorithm (GA), artificial bee colony (ABC), particle swarm optimization (PSO), firefly algorithm (FA), differential evolution (DE), and teaching–learning-based optimization (TLBO) are a few examples from a long list of evolutionary algorithms (EAs) that have made several valuable contributions to watermarking. Some references are: determination of optimal scaling factors for watermark insertion using GA [22,24,25]; utilization of PSO in real life problems, including digital watermarking [23,26,27,28]; implementation of DE for finding the optimal parameters [29,30]. More recent applications include use of artificial bee colony (ABC) and FA for determining the optimal parameters [31,32,33,34].
In the present study, the focus is on differential evolution, an easy to implement, simple, and robust evolutionary algorithm. DE has gained popularity in being a good optimizer for solving diverse real-life application problems [35]. It is worth mentioning here that the DE has already been utilized successfully in image watermarking [29,30], but to the best of our knowledge, it has never been practiced on DC-based image watermarking in the spatial domain.
All of the above-mentioned DC-based watermarking schemes, without using DCT, are not robust to the ninety-degree multiple rotations and flipping attacks. These are the simple attacks that change the pixel location without changing the intensity to destroy the inserted watermark.
Furthermore, the quantization parameter used for watermark insertion and extraction is tuned and adjusted manually. A constant quantization parameter is not a suitable choice, as a different kind of image may have a different tolerance limit of modification. These problems can be solved by finding a mechanism of getting invariant features and an optimal quantization parameter for watermark insertion and extraction. The proposed watermarking scheme is motivated by the invariant property of the DC value of a dataset. The order of the entries in a dataset does not matter, the different permutation of the dataset will have the same DC values. Using this concept, the pixels in the host image are redistributed to a different location in such a way that the image blocks must have the same pixel values under the ninety-degrees multiple rotations, row and column flipping. If the blocks have the same pixel values under these operations, then obviously the DC values will be invariant. The host image is divided into blocks, DC values are calculated in the spatial domain without using DCT and then modified using the optimal quantization parameter obtained through the differential evolution (DE) algorithm to get the new DC values. The difference is calculated between the old and new DC values, and then the pixel values in the block are changed in such a way that the total amount of change is equal to the difference in the DC values. The performance of the proposed watermarking scheme is investigated by taking seven standard test images and two watermarks, and then employing various common image manipulation attacks. Results are compared with the other similar watermarking schemes available in the literature utilizing some well-known evaluation metrics, peak signal to noise ratio (PSNR), structural similarity index measure (SSIM), and normalized correlation (NC). Results analysis validates that the proposed watermarking scheme is robust against image distortion while maintaining the good quality of the watermarked image.
The structure of the paper is: invariant DC coefficient computation and the modification are explained in the Section 2. Section 3 describes the proposed watermarking scheme, and results analysis and comparisons are provided in Section 4. Concluding remarks and future research directions are given in the last section.

2. Invariant DC Coefficients Computation and Modification

This section provides the detailed process of DC coefficients computation invariant to ninety-degree rotation and image flipping in the spatial domain, and their modifications to insert the watermark.

2.1. Invariant DC Coefficient Computation in Spatial Domain

Discrete cosine transform (DCT) is one of the versatile mathematical transform techniques having numerous applications in image processing and digital watermarking [18,19,20,21]. It is used for the transformation of a signal from the spatial domain to the frequency domain and in the reconstruction of original data from the frequency data. In the transformed signal there is only one direct current (DC) component, the average of the given data, and multiple alternating current (AC) components. Generally, DCT-based watermarking schemes are implemented using spatially local transforms (block-based DCT). In block-based DCT watermarking, the input square image I (x, y) of size M × M (x = 0, 1, 2, ..., M − 1; y = 0, 1, 2, ..., M − 1) is divided into non-overlapping square blocks of size m × m. A commonly used block size for DCT watermarking, the same size adopted in the JPEG compression standard, is a square block of size 8 × 8 as shown in Figure 1.
Each image block Ii,j (x, y) (i = 0, 1, 2, ..., M/m−1; j = 0, 1, 2, ..., M/m−1) is transformed into corresponding DCT coefficients DIi,j (u, v) and can be reconstructed into the original block Ii,j (x, y) from DCT coefficient block DIi,j (u, v) using two dimensional DCT and its inverse transform, respectively, as follows:
D I i , j ( u , v ) = α u α v x = 0 m 1 y = 0 m 1 I i , j ( x , y ) × cos [ ( 2 x + 1 ) u π 2 m ] × cos [ ( 2 y + 1 ) v π 2 m ] ,
I i , j ( x , y ) = u = 0 m 1 v = 0 m 1 α u α v D I i , j ( u , v ) × cos [ ( 2 x + 1 ) u π 2 m ] × cos [ ( 2 y + 1 ) v π 2 m ] ,
where
α u = { 1 / m   i f   u = 0   2 / m   e l s e   , α v = { 1 / m   i f   v = 0   2 / m   e l s e  
The DC coefficient of each block DC (i, j), which is the average pixel intensity in the block as mentioned above, is given by putting u = v = 0 in Equation (1) as:
D C ( i , j ) = D I i , j ( 0 , 0 ) = 1 m x = 0 m 1 y = 0 m 1 I i , j ( x , y ) ,
It can be clearly understood from Equation (4), that the DC (i, j) coefficient of block Ii,j can directly be calculated by a simple averaged sum of all pixel values Ii,j (x, y) of the block in the spatial domain without utilizing DCT transform.
Although most of the existing block-based DCT watermarking techniques can resist common image manipulation attacks, there still is a scope of improvement for geometric distortion attacks such as multiples of 90° rotation and image flipping for which existing algorithms are not robust. These attacks change the spatial locations of the pixels in a watermarked image to destroy the inserted watermark, without changing their intensities. The pixel’s location may vary in a block under these attacks, but the intensity remains the same as the initial one. DC coefficient representing the mean intensity of the block does not consider the location.
Therefore, getting invariant DC values under the rotation and flipping operations may be achieved by using the concept introduced by Li et al. [17] and implemented by several other authors in the wavelet domain. According to this concept, pixels in the cover image are redistributed to different locations and then some normalization procedures are performed. The original image (I) of size M × M is partitioned into four (2 × 2) equal-sized sub-images and then the mean of intensities is calculated for each sub-image and stored in a matrix form as: [ μ 1 μ 2 μ 3 μ 4 ] , μ i 0 . With the help of these means, a normalization matrix (N) is constructed as:
N = [ N 1 N 2 N 3 N 4 ] = [ μ 1 + μ 2 + μ 3 + μ 4 μ 1 μ 2 + μ 3 μ 4 μ 1 μ 2 + μ 3 μ 4 μ 1 μ 2 + μ 3 μ 4 ] ,
Pixels in the given square image (I) are redistributed to the different locations to obtain the redistributed image (RI) using the distribution relation given in (6).
{ R I ( 2 i 1 ,   2 j 1 ) = I ( i ,   j ) , 1 i M / 2 ,   1 j M / 2 R I ( 2 i 1 ,   2 j M ) = I ( i , 3 M / 2 j + 1 ) , 1 i M / 2 ,   M / 2 j M R I ( 2 i M ,   2 j 1 ) = I ( 3 M / 2 i + 1 , j ) , M / 2 i M ,   1 j M / 2 R I ( 2 i M ,   2 j M ) = I ( 3 M / 2 i + 1 ,   3 M / 2 j + 1 ) , M / 2 i M ,   M / 2 j M
If | N 3 | > | N 2 | , where the term │*│represents the absolute value function, take the transpose of the redistributed image RI, otherwise leave it unchanged to obtain the redistributed normalized image. If this redistributed image is divided into square blocks of size 2n (n = 1, 2, 3, …│2n< M/2) and DC values are calculated for each block using Equation (1), then the obtained DC values are invariant to multiples of 90° rotation and row or column flipping. Using this concept, the obtained DC values of the original image, ninety-degree rotated original image, row flipped original image, and column flipped original image are shown in Figure 2, taking an example of a square image of order 8 × 8. This image is divided into blocks of size 4 × 4, to show the invariant DC values. From this figure, it is clear that the DC values of the blocks of the redistributed image are invariant under the operation of rotation and flipping.

2.2. DC Coefficients Modification in Spatial Domain

Watermark bits are embedded into the host image blocks by modifying the invariant DC coefficients in the spatial domain obtained in Section 2.1. This insertion procedure of the watermark into the DC component of the DCT domain can directly be achieved by modifying the values of the pixels in the spatial domain. The total amount of modification in intensities of all the pixels in the spatial domain of a block must be equal to the change in the DC coefficient in the DCT domain of that block. The inverse DCT of an image block given in Equation (2) can be written as:
I i , j ( x , y ) = α 0 α 0   D I i , j ( 0 , 0 ) + u = 1 m 1 v = 1 m 1 α u α v   D I i , j ( u , v ) × cos [ ( 2 x + 1 ) u π 2 m ] × cos [ ( 2 y + 1 ) v π 2 m ] ,
I i , j ( x , y ) = 1 m D C ( i , j ) + u = 1 m 1 v = 1 m 1 α u α v   D I i , j ( u , v ) × cos [ ( 2 x + 1 ) u π 2 m ] × cos [ ( 2 y + 1 ) v π 2 m ] ,
Initially, the embedding of the watermark in DC coefficients in the DCT domain is examined and then the concept is mapped to the equivalent method in the spatial domain. It is assumed that when embedding a bit of watermark W into the DC coefficient of the (i, j) th block, the new DC coefficient will get changed by an amount of Ci,j from the old DC coefficient. The traditional embedding process of the watermark bit into the DC coefficient of the (i, j) th square block is given as:
D C ( i , j ) = D C ( i , j ) + C i , j ,
where DC’ (i, j) is the new DC coefficient of (i, j)th block with the change by an amount of Ci,j in the value. Now, using this new DC value, the block of the host image can be reconstructed with the embedded watermark given in Equation (8) with the help of Equation (9) as:
I i , j ( x , y ) = 1 m D C ( i , j ) + u = 1 m 1 v = 1 m 1 α u α v   D I i , j ( u , v ) × cos [ ( 2 x + 1 ) u π 2 m ] × cos [ ( 2 y + 1 ) v π 2 m ] ,
I i , j ( x , y ) = 1 m [ D C ( i , j ) + C i , j ] + u = 1 m 1 v = 1 m 1 α u α v   D I i , j ( u , v ) × cos [ ( 2 x + 1 ) u π 2 m ] × cos [ ( 2 y + 1 ) v π 2 m ] ,
I i , j ( x , y ) = 1 m C i , j + 1 m D C ( i , j ) + u = 1 m 1 v = 1 m 1 α u α v   D I i , j ( u , v ) × cos [ ( 2 x + 1 ) u π 2 m ] × cos [ ( 2 y + 1 ) v π 2 m ] ,
I i , j ( x , y ) = 1 m C i , j + I i , j ( x , y ) ,
From Equation (13), it is clear that insertion of the watermark bit into the DC coefficient in the spatial domain is possible by directly changing the values of all the pixels in the block by an amount of Ci,j/m.

3. Proposed Watermarking Scheme

This section is dedicated to explaining the components of the proposed scheme. The scheme has different components such as watermark preprocessing, watermark insertion, watermark extraction, and optimal quantization factor. This study considers the host image “I” of a size of 512 × 512 and the watermark “W”, a binary image of a size of 64 × 64. The details of each component are listed as below.

3.1. Watermark Insertion Process

To provide an extra layer of security to the watermarking scheme, first the watermark is encrypted using the piecewise linear chaotic map (PWLCM) [36] before embedding it into the cover image. It is one of the chaotic maps that recently has gained popularity due to its simplicity in representation and efficiency in implementation, and dynamical behavior. An imposter or unauthorized user cannot directly get the watermark from the watermarked image without having the correct security key. A watermark and its encrypted version using PWLCM are shown in Figure 3. The watermark insertion process is explained here stepwise:
step 1.
Redistribute the host image “I” to get the invariant features as explained in Section 2.1, and divide this image into 8 × 8 non-overlapping blocks Ii,j (i = 0, 1, 2, …, 63; j = 0, 1, 2, …, 63), as shown in Figure 1. As a check point, the numbers of non-overlapping blocks should be equal to the numbers of the watermark bits because one bit of watermark is inserted per block. Scramble the watermark image W with a secret key to generate the scrambled watermark image.
step 2.
With the help of Equation (4), directly compute the invariant DC coefficient DC (i, j) in the spatial domain without applying the DCT transform.
step 3.
Based on the watermark bit information W (i, j), modifying magnitudes M1 and M2 are decided to modify the DC coefficient DC (i, j), as given in the Equations (14) and (15).
M 1 = { 0.5   Q   i f   W ( i , j ) = 1   0.5   Q   i f   W ( i , j ) = 0   ,
M 2 = { 1.5   Q   i f   W ( i , j ) = 1   1.5   Q   i f   W ( i , j ) = 0   ,
where “Q” is the quantization factor, that will be discussed in detail later in this section.
step 4.
Now, using these magnitudes M1 and M2, the possible quantization results Q1 and Q2 are computed as follows:
Q 1 = 2 k Q + M 1 Q 2 = 2 k Q + M 2 ,
where k is an integer such that k = floor (ceil (DC (i, j)/Q)/2), floor (*), and ceil (*) provides the least and largest nearest integers, respectively.
step 5.
New DC value DC (i, j) corresponding to old DC value DC (i, j) is calculated based on Q1 and Q2 as follows:
D C ( i , j ) = { Q 2 i f ( | D C ( i , j ) Q 2 | < | D C ( i , j ) Q 1 | ) Q 1 e l s e   ,
step 6.
Calculate the amount of change Ci, j in the value of the new DC coefficient using Equation (18):
C i , j = D C ( i , j ) D C ( i , j ) ,
step 7.
To insert the watermark bit W (i, j) directly to the host image block Ii,j in the spatial domain add Ci,j/8 to all pixels in the block according to Equation (13).
step 8.
Repeat steps 2–7 until all the pixels in all the blocks are modified to obtain the redistributed watermarked image. Then, apply the inverse redistribution operation to put back the pixels at their actual positions to obtain the watermarked image Iw.

3.2. Watermark Extraction Process

The detailed steps of extraction of the watermark (eW) from the watermarked image Iw are described as follows.
step 1.
Redistribute the distorted watermarked image “Iw”, and then divide this image into 8 × 8 non-overlapping blocks Iwi,j (i = 0, 1, 2, …, 63; j = 0, 1, 2, …, 63).
step 2.
With the help of Equation (4), directly compute the invariant DC coefficient DC’ (i, j) in the spatial domain without applying the DCT transform.
step 3.
Using the quantization parameter “Q” and DC’ (i, j), extract the watermark bit eW (i, j) such as given in Equation (19).
e W ( i , j ) = m o d ( c e i l ( D C ( i , j ) Q ) , 2 ) ,
step 4.
Repeat steps 2 and 3 until all the blocks are visited to extract the encrypted watermark image. Then, apply the decryption operation with the correct keys to get extracted watermark eW.

3.3. Finding the Optimal Quantization Parameter Using Differential Evolution

Several researchers have utilized the advantages of optimization schemes in finding the optimal parameters of image watermarking. Watermark robustness and its imperceptibility are two mutually contradictory and interrelated properties. The proposed watermarking scheme uses the binary square watermark for embedding in the invariant DC values directly modifying the pixel values in the spatial domain using a quantization parameter “Q”. It plays an important role in balancing the robustness and imperceptibility of the proposed watermarking algorithm. A small quantization parameter favors imperceptibility but reduces the robustness of the watermarked image towards several image manipulation attacks. On the other hand, a large quantization parameter favors robustness, but sacrifices the quality of the watermarked image. In the past, several watermarking algorithms have been tuned by adjusting this parameter manually [18,19,20,21]. A constant value of this parameter is not suitable for different kinds of images. The proper choice of this parameter is more difficult than expected, because it varies according to the image to achieve the robustness and imperceptibility goals. Therefore, an optimization technique is required to find its optimal value automatically depending upon the image and watermark. So, this study takes the help of the differential evolution (DE) optimization algorithm [29,30] to determine the optimal value of quantization parameter Q. DE is a simple, fast, and robust nature-inspired algorithm. The procedure starts by generating an initial population, which has a specific number of individuals or solutions (say 10), with the help of a random number generator. It has three main operations named mutation, crossover, and selection. In this study, the scaling factor used in the mutation operation and crossover rate is 0.5 for both. The maximum number of generations (iteration) is ten.
The watermark is inserted into the host image using this quantization parameter obtained by DE to get the watermarked image. Image distortion attacks are applied to the watermarked image to degrade the quality, and then extract the watermark from these distorted watermarked images. Objective function for each solution is calculated and then the solution corresponding to the higher fitness value is selected for the next generation. The objective function must include both of the important factors of image watermarking, imperceptibility and robustness. Out of the several quality metrics proposed in the literature, peak signal to noise ratio (PSNR) is a widely used metric for the quality assessment. The similarity of the inserted watermark image (W) with the extracted watermark image (eW) is evaluated by the normalized correlation coefficient (NC). The mathematical representation of the objective function involving these two main goals is given here [33]:
M i n i m i z e   f = 10 × | P S N R P S N R t a r g e t | + ( 1 1 N i = 1 N N C i ) ,
where N is the number of attacks; NCi is the normalized correlation corresponding to the ith attack; PSNRtarget is a desired PSNR value. This study aimed to achieve the PSNR value forty-five. The two evaluation metrics used in the objective function are formally defined as:
P S N R ( I , I w ) = 10 log 10 ( ( 255 ) 2 1 M × M i = 1 M j = 1 M ( I i , j I w i . j ) 2 ) ,
N C ( W , e W ) = i = 1 n j = 1 n W i , j × e W i , j i = 1 n j = 1 n W i , j 2   i = 1 n j = 1 n e W i , j 2 ,
where I and Iw stand for the original and the processed images; subscripts i and j denote the location of the pixel value in the respective images; M and n are the sizes of square host and watermark images, respectively.

4. Performance Evaluation and Experimental Discussion

This section is fully dedicated to the performance analysis of the proposed watermarking scheme and its comparison with the other similar type of the watermarking algorithms proposed by Parah et al. [19] and Zeng et al. [21]. Both of these schemes have used DC coefficients and constant quantization factor for watermark embedding, but different quantization methods. The proposed scheme uses invariant DC coefficients and the image dependent optimal quantization parameter obtained by the DE algorithm. Seven grayscale standard test images of size 512 × 512, and two binary logos (W1 and W2) of size 64 × 64, given in Figure 4, are considered for the performance evaluation of the proposed scheme. These test images are collected from various open image databases that are freely available. For the investigation of the robustness of the proposed scheme, various common image distortion attacks, given in the Table 1, are applied to make a dent in the quality of the watermarked image (Iw). The algorithm is coded in MATLAB and executed on a personal computer (PC) with Intel core i5 processor, Windows 8 and 4 GB RAM. Experimental results are given in Table 1, Table 2, Table 3, Table 4, Table 5, Table 6 and Table 7. In Table 6, the best results are highlighted in bold and the tie cases are highlighted in italics.

4.1. Imperceptibility Analysis

The watermark inserted into the host or cover image must be imperceptible in case of invisible watermarking. This property is related to the human visual system. Generally, a watermarking scheme is said to be imperceptible if both the images, original and the watermarked, are mutually identical. A good watermarking scheme does not degrade the quality of the host image in the watermark insertion process. To analyze the imperceptibility of the watermarked images, several evaluation metrics are available in the literature [29,30,31,32,33,34,35,36,37,38,39]. Peak signal to noise ratio (PSNR) and structural similarity index measure (SSIM) [18] are the two most frequently used imperceptibility evaluation metrics. Following the same trend, this study uses these two metrics to analyze the imperceptibility. In Table 2 and Table 3, PSNR and SSIM values are listed, obtained by the watermarking schemes for the comparison of imperceptibility. The proposed watermarking scheme is targeted to achieve forty-five PSNR value. It can be seen from Table 2 that the PSNR values for all the images are very close to 45 obtained by the proposed scheme, whereas the other algorithms are stuck near about 42 and 44. With a close observation of average PSNR, the proposed algorithm is better than the other algorithms. The average PSNR obtained by the proposed scheme is almost 5% higher than the other schemes. Similar types of responses can be seen from Table 3, which provides the SSIM. The proposed watermarking scheme provides better results in all the cases in comparison to the other algorithms.

4.2. Robustness Analysis against Attacks

This section is dedicated to the robustness analysis employing the image distortion attacks to the watermarked image given in Table 1. Normalized correlation (NC) given in Equation (22) is used to evaluate the quality of the extracted watermark. The extracted watermark is more similar to the inserted watermark as the NC value approaches closer to one. Results are given in Table 4 and Table 5 for the extracted watermark1 (W1) and watermark2 (W2), respectively. From Table 4 and Table 5, it can be seen that the proposed watermarking scheme survives against all the distortion attacks, having good NC values. Normalized correlation value 1 in cases of ninety-degree rotation, row and column flipping is the evidence that the proposed watermarking scheme extracted the watermarks the same as inserted. It is the main aim of the study that has achieved 100%. Average normalized correlation values over all the seven test images corresponding to each distortion attack are calculated and are given in Table 6 for comparison of the watermarking schemes. From Table 6, looking at the results, it can be said that all the schemes performed equally, having the average NC values 1 in cases without distortion and pixelation distortion attacks. In the remaining cases out of the thirteen, the proposed scheme performed better in seven cases (more than 50%) whereas the other schemes performed well in six cases. Having a look at the overall average NC values, we can say that the proposed scheme is able to achieve almost 7% higher values in comparison to the other schemes. Sample images of the attacks applied to the watermarked image “Lena” and the extracted watermarks are given in Figure 5 for the visual quality comparison of the schemes. Due to the space constraints, there is only one watermark shown in Figure 5. It is evident from the Figure 5, that the extracted watermark by the proposed scheme can be identified by naked eyes without any difficulty in all the cases, whereas the extracted watermarks by the other schemes are not visually clear in cases of ninety-degree rotation, row and column flipping. Therefore, the proposed scheme outperformed the other watermarking scheme in the competition. In some cases, mean filtering, Gaussian noise, JPEG compression, rescaling, median filtering, motion blur, the proposed scheme performed opposite to expectation in comparison to other schemes. Further studies need to investigate the reasons for not performing according to the expectation in these particular cases.

4.3. Execution Time Analysis

This section presents the computational complexity analysis of the proposed scheme in terms of time required for watermark insertion and extraction, and the results are given in Table 7. The main objective of copyright protection watermarking applications is to establish ownership of the owner, irrespective of time, and it is not a crucial factor in such kind of applications. While in broadcast monitoring applications, insertion and detection are performed in real time and this important factor cannot be neglected. It can be seen from Table 7 that the watermark insertion time of the other schemes is very low, whereas the extraction time is more or less same. This is because, not only the invariant DC values obtained in the proposed scheme, but also the differential evolution algorithm is used to get the optimal quantization parameter for the insertion process. Briefly, in the other watermarking schemes, watermark bits are inserted by modifying DC coefficients using a predefined quantization parameter. Hence, the proposed scheme is computationally complex in comparison to the other schemes.

4.4. Security and False Positive Detection of Watermark

Several researchers in the watermarking literature have observed false-positive detection problems in various digital image watermarking schemes. It happens generally due to the insertion of partial information of the watermark into the host image instead of complete watermark and partial watermark information being kept safe with the owner that is provided back at the time of the watermark extraction. The ownership problem or dispute remains unsolved in such a condition, as it creates an ambiguous situation. Insertion and extraction of the entire watermark instead of partial information are one of the solutions to this problem. A person who claims ownership of the image needs to extract the entire watermark from the watermarked image to prove it. Following the same principle, the proposed scheme inserts the entire watermark and extracts the entire watermark that makes it free from false-positive detection problems.
Furthermore, the inserted watermark has one extra layer of security that is provided by piecewise linear chaotic map (PWLCM) using two secret keys, control parameter and starting point. Without having these two correct keys it is impossible to extract the inserted watermark. Therefore, false-positive detection problems do not occur in the proposed scheme.

5. Conclusions

This study proposed a robust watermarking scheme based on DC values invariant to ninety-degrees multiple rotation, row and column flipping, by modifying the pixel values in the spatial domain. Modification for watermark insertion into the host is based on a quantization parameter that is optimally obtained by DE algorithm. This study provides another scope for improving the image watermarking scheme by using invariant DC and optimal parameters. The strength of the proposed watermarking scheme is investigated by taking seven standard test images and applying various image distortion attacks. The proposed watermarking scheme survived against most of the attacks considered in this study very well, which can be seen numerically as well as through images. It is seen that the performance of the proposed scheme on average is better than the other schemes considered in the comparison, in terms of imperceptibility and robustness. However, in some cases, mean filtering, Gaussian noise, JPEG compression, rescaling, median filtering, motion blur, the performance of the proposed scheme is not at par with other schemes. Further studies need to investigate the reasons for the dull performance of the proposed scheme in these particular cases. Excited by the performance of the proposed scheme, its extension for the video, audio and colored image watermarking is one of the future research plans.

Author Contributions

Conceptualization, M.A.; methodology, M.A.; software, M.A.; validation, M.A., C.W.A., M.P., S.K., M.K.S. and D.S.; formal analysis, M.A. and M.P.; investigation, M.A. and S.K.; resources, M.A. and M.K.S.; data curation, M.A. and S.K.; writing—original draft preparation, M.A.; writing—review and editing, C.W.A., M.P., S.K., M.K.S. and D.S.; visualization, M.A.; supervision, C.W.A. and M.P.; project administration, M.A.; funding acquisition, C.W.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by IITP grant funded by the Korea government (MSIT) (No. 2019-0-01842, Artificial Intelligence Gradate School Program (GIST)).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cox, I.J.; Miller, M.L.; Bloom, J.A. Digital Watermarking; Morgan Kaufmann Publishers: San Francisco, CA, USA, 2002. [Google Scholar]
  2. Liu, R.; Tan, T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 2002, 4, 121–128. [Google Scholar]
  3. Hussein, E.; Belal, M.A. Digital Watermarking Techniques, Applications and Attacks Applied to Digital Media: A Survey. Int. J. Eng. Res. Technol. 2002, 1, 1–8. [Google Scholar]
  4. Khan, A.; Siddiqa, A.; Munib, S.; Malik, S.A. A recent survey of reversible watermarking techniques. Inf. Sci. 2014, 279, 251–272. [Google Scholar] [CrossRef]
  5. Nikolaidis, N.; Pitas, I. Robust image watermarking in the spatial domain. Signal Process. 1998, 66, 385–403. [Google Scholar] [CrossRef]
  6. Abraham, J.; Paul, V. An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ. Comput. Inf. Sci. 2019, 31, 125–133. [Google Scholar] [CrossRef]
  7. Su, Q.; Yuan, Z.; Liu, D. An approximate Schur decomposition-based spatial domain color image watermarking method. IEEE Access. 2019, 7, 4358–4370. [Google Scholar] [CrossRef]
  8. Sakthivel, S.M.; Sankar, A.R. Computation-efficient image watermarking architecture with improved performance. Comput. Electr. Eng. 2020, 84, 106649. [Google Scholar] [CrossRef]
  9. Thanki, R.; Kothari, A.; Trivedi, D. Hybrid and blind watermarking scheme in DCuT–RDWT domain. J. Inf. Secur. Appl. 2019, 46, 231–249. [Google Scholar] [CrossRef]
  10. Yuan, Z.; Liu, D.; Zhang, X.; Su, Q. New image blind watermarking method based on two-dimensional, discrete cosine transform. Opt. Int. J. Light Electron Opt. 2020, 204, 164152. [Google Scholar] [CrossRef]
  11. Ariatmanto, D.; Ernawan, F. Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking. J. King Saud Univ. Comput. Inf. Sci. 2020. [Google Scholar] [CrossRef]
  12. Araghi, T.K.; Abd Manaf, A.; Araghi, S.K. A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst. Appl. 2018, 112, 208–228. [Google Scholar] [CrossRef]
  13. Attari, A.A.; Shirazi, A.A.B. Robust audio watermarking algorithm based on DWT using Fibonacci numbers. Multimed. Tools Appl. 2018, 77, 25607–25627. [Google Scholar] [CrossRef]
  14. Liu, J.; Rao, Y.; Huang, Y. Complex Wavelet-Based Image Watermarking with the Human Visual Saliency Model. Electronics 2019, 8, 1462. [Google Scholar] [CrossRef] [Green Version]
  15. Shoron, S.H.; Islam, M.; Uddin, J.; Shon, D.; Im, K.; Park, J.-H.; Lim, D.-S.; Jang, B.; Kim, J.-M. A Watermarking Technique for Biomedical Images Using SMQT, Otsu, and Fuzzy C-Means. Electronics 2019, 8, 975. [Google Scholar] [CrossRef] [Green Version]
  16. Fares, K.; Amine, K.; Salah, E. A robust blind color image watermarking based on Fourier transform domain. Opt. Int. J. Light Electron Opt. 2020, 208, 164562. [Google Scholar] [CrossRef]
  17. Li, L.; Xu, H.H.; Chang, C.C.; Ma, Y.Y. A novel image watermarking in redistributed invariant wavelet domain. J. Syst. Softw. 2011, 84, 923–929. [Google Scholar] [CrossRef]
  18. Su, Q.; Ni, Y.; Wang, Q.; Sheng, G. A blind color image watermarking based on DC component in the spatial domain. Optik 2013, 124, 255–6260. [Google Scholar] [CrossRef]
  19. Parah, S.A.; Loan, N.A.; Shah, A.A.; Sheikh, J.A.; Bhat, G.M. A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn. 2018, 93, 1933–1951. [Google Scholar] [CrossRef]
  20. Su, Q.; Chen, B. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018, 22, 91–106. [Google Scholar] [CrossRef]
  21. Zeng, G.; Qiu, Z. Image Watermarking Based on DC Component in DCT. Int. Symp. Intell. Inf. Technol. Appl. Workshops 2008, 573–576. [Google Scholar] [CrossRef]
  22. Maity, S.P.; Maity, S.; Sil, J.; Delpha, C. Perceptually adaptive MC-SS image watermarking using GA-NN hybridization in fading gain. Eng. Appl. Artif. Intell. 2014, 31, 3–14. [Google Scholar] [CrossRef]
  23. Tsai, H.H.; Lai, Y.S.; Lo, S.C. A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. J. Syst. Softw. 2013, 86, 335–348. [Google Scholar] [CrossRef]
  24. Maity, S.P.; Maity, S.; Sil, J.; Delpha, C. Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization. J. Syst. Softw. 2013, 86, 47–59. [Google Scholar] [CrossRef]
  25. Horng, S.J.; Rosiyadi, D.; Fan, P.; Wang, X.; Khan, M.K. An adaptive watermarking scheme for e-government document images. Multimed. Tools Appl. 2014, 72, 3085–3103. [Google Scholar] [CrossRef]
  26. Takore, T.T.; Kumar, P.R.; Devi, G.L. A new robust and imperceptible image watermarking scheme based on hybrid transform and pso. Int. J. Intell. Syst. Appl. 2018, 10. [Google Scholar] [CrossRef]
  27. Huang, Y.L.; Horng, S.J.; Kao, T.W.; Run, R.S.; Lai, J.L.; Chen, R.J.; Kuo, I.H.; Khan, M.K. An improved forecasting model based on the weighted fuzzy relationship matrix combined with a PSO adaptation for enrollments. Int. J. Innov. Comput. Inf. Control 2011, 7, 4027–4045. [Google Scholar]
  28. Hsu, L.Y.; Horng, S.j.; Fan, P.; Khan, M.K.; Wang, Y.R.; Run, R.S.; Lai, J.L.; Chen, R.J. MTPSO algorithm for solving planar graph coloring problem. Expert Syst. Appl. 2011, 38, 5525–5531. [Google Scholar] [CrossRef]
  29. Ali, M.; Ahn, C.W.; Siarry, P. Differential evolution algorithm for the selection of optimal scaling factors in image watermarking. Eng. Appl. Artif. Intell. 2014, 31, 15–26. [Google Scholar] [CrossRef]
  30. Ali, M.; Ahn, C.W. An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal Process. 2014, 94, 545–556. [Google Scholar] [CrossRef]
  31. Bakhsh, F.Y.; Moghaddam, M.E. A robust hdr images watermarking method using artificial bee colony algorithm. J. Inf. Secur. Appl. 2018, 41, 12–27. [Google Scholar] [CrossRef]
  32. Ansari, I.A.; Pant, M.; Ahn, C.W. Abc optimized secured image watermarking scheme to find out the rightful ownership. Opt. Int. J. Light Electron Opt. 2016, 127, 5711–5721. [Google Scholar] [CrossRef]
  33. Ali, M.; Ahn, C.W.; Pant, M.; Siarry, P. An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Inf. Sci. 2015, 301, 44–60. [Google Scholar] [CrossRef]
  34. Agarwal, C.; Mishra, A.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar]
  35. Hammouche, K.; Diaf, M.; Siarry, P. A comparative study of various meta-heuristic techniques applied to the multilevel thresholding problem. Eng. Appl. Artif. Intell. 2010, 23, 676–688. [Google Scholar] [CrossRef]
  36. Ali, M.; Ahn, C.W.; Pant, M.; Siarry, P. A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD. Discret. Dyn. Nat. Soc. 2016, 15–30. [Google Scholar] [CrossRef] [Green Version]
  37. Kwan, C.; Shang, E.; Trac, T.D. Perceptually Lossless Image Compression with Error Recovery. In Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, Las Vegas, NV, USA, 27–29 August 2018; Article No. 16. pp. 1–5. [Google Scholar] [CrossRef]
  38. Egiazarian, K.; Astola, J.; Ponomarenko, N.; Lukin, V.; Battisti, F.; Carli, M. A new full-reference quality metrics based on HVS. In Proceedings of the Second International Workshop on Video Processing and Quality Metrics, Scottsdale, AZ, USA, 22–24 January 2006; pp. 1–4. [Google Scholar]
  39. Kwan, C.; Larkin, J.; Budavari, B.; Chou, B.; Shang, E.; Tran, T.D. A Comparison of Compression Codecs for Maritime and Sonar Images in Bandwidth Constrained Applications. Computers 2019, 8, 32. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Decomposition of image into blocks.
Figure 1. Decomposition of image into blocks.
Electronics 09 01428 g001
Figure 2. Illustration of block-based invariant direct current (DC) components.
Figure 2. Illustration of block-based invariant direct current (DC) components.
Electronics 09 01428 g002
Figure 3. Piecewise linear chaotic map (PWLCM), (a) original watermark image, (b) scrambled watermark image.
Figure 3. Piecewise linear chaotic map (PWLCM), (a) original watermark image, (b) scrambled watermark image.
Electronics 09 01428 g003
Figure 4. (ag) Test image: Lena, Houses, Lighthouse, Clown, Kiel, Baboon, Couple, respectively, (h,i) binary watermark1 (W1) and watermark2 (W2).
Figure 4. (ag) Test image: Lena, Houses, Lighthouse, Clown, Kiel, Baboon, Couple, respectively, (h,i) binary watermark1 (W1) and watermark2 (W2).
Electronics 09 01428 g004
Figure 5. Illustration of image manipulation attacks applied to the watermarked images and extracted watermarks.
Figure 5. Illustration of image manipulation attacks applied to the watermarked images and extracted watermarks.
Electronics 09 01428 g005aElectronics 09 01428 g005bElectronics 09 01428 g005c
Table 1. Attacks used to distort the watermarked image for the robustness analysis.
Table 1. Attacks used to distort the watermarked image for the robustness analysis.
Attack IndicatorAttack’s Description
NONo attack applied
MFMean filtering with window size 3 × 3
ROAnticlockwise rotation by 90°
CR25% centered cropping
GNGaussian noise addition with mean zero and standard deviation 0.0005
JPEGJPEG compression with quality factor 60
RSRescaling 512→256→512
MDMedian filtering with window size 3 × 3
SPSalt and pepper noise with noise density 0.005
RCDDeleted 20 rows and 20 columns from random locations
GFGaussian low-pass filter with window size 9 × 9
FRFlipping of rows
FCFlipping of columns
MBMotion blur with window size 3 × 3
PIPixelation with window size 4 × 4
Table 2. Calculated peak signal to noise ratio (PSNR) (dB) values taking original and watermarked images.
Table 2. Calculated peak signal to noise ratio (PSNR) (dB) values taking original and watermarked images.
ImageParah et al. [19]Zeng et al. [21]Proposed
W1W2W1W2W1W2
Baboon42.794842.871943.548943.859445.003145.0002
Clown42.800742.942843.795643.587445.000344.9998
Couple42.810142.837144.005244.004145.001145.0000
Houses42.971842.868543.789343.856945.000145.0004
Kiel42.867742.882643.458643.578544.999944.9996
Lena42.891642.821144.057844.056844.999745.0003
Lighthouse42.747542.869844.045644.068545.000345.0008
Average42.840642.870543.814443.858845.000745.0001
Table 3. Calculated structural similarity index measure (SSIM) values taking original and watermarked images.
Table 3. Calculated structural similarity index measure (SSIM) values taking original and watermarked images.
ImageParah et al. [19]Zeng et al. [21]Proposed
W1W2W1W2W1W2
Baboon0.99640.99660.99580.99610.99660.9969
Clown0.98130.98120.98250.98330.98700.9870
Couple0.99330.99330.99220.99360.99340.9937
Houses0.99630.99610.99720.99650.99680.9966
Kiel0.99250.99310.99350.99410.99450.9968
Lena0.98990.98990.99050.99070.99330.9925
Lighthouse0.99370.99410.99430.99460.99380.9947
Average0.99190.99210.99230.99270.99360.9940
Table 4. Calculated normalized correlation (NC) values taking extracted (eW1) and original watermark (W1) images.
Table 4. Calculated normalized correlation (NC) values taking extracted (eW1) and original watermark (W1) images.
AttackBaboonClownCoupleHousesKielLenaLighthouse
NO1.00001.00001.00001.00001.00001.00001.0000
MF0.65340.76810.76770.57300.67810.85380.7302
RO1.00001.00001.00001.00001.00001.00001.0000
CR0.86620.86930.86830.86750.86980.86520.8690
GN0.91190.88870.90930.91080.91100.90870.9052
JPEG0.97350.98450.98490.96570.96970.98870.9834
RS0.77690.93580.91910.70920.78820.97470.8374
MD0.63930.86770.78550.60220.65280.91140.7113
SP0.83610.86800.85490.85280.84540.84860.8461
RCD0.80380.81140.77650.77240.76160.78460.7708
GF0.97820.97490.97250.95070.95040.97470.9538
FR1.00001.00001.00001.00001.00001.00001.0000
FC1.00001.00001.00001.00001.00001.00001.0000
MB0.86130.85470.89790.70600.84410.93240.8641
PI1.00001.00001.00001.00001.00001.00001.0000
Average0.88670.92150.91580.86070.88470.93620.8981
Table 5. Calculated normalized correlation (NC) values taking extracted (eW2) and original watermark (W2) images.
Table 5. Calculated normalized correlation (NC) values taking extracted (eW2) and original watermark (W2) images.
AttackBaboonClownCoupleHousesKielLenaLighthouse
NO1.00001.00001.00001.00001.00001.00001.0000
MF0.70060.81120.80780.63660.73310.87360.7779
RO1.00001.00001.00001.00001.00001.00001.0000
CR0.85890.86050.86030.85850.86150.85870.8597
GN0.92710.91770.92620.92800.92470.92490.9226
JPEG0.97800.98970.98510.97260.97880.98940.9865
RS0.81390.95030.92560.75800.83730.97360.8753
MD0.68360.89290.81060.65760.71160.92230.7599
SP0.86680.89980.86780.86640.85060.85390.8598
RCD0.81870.81520.81430.80560.83250.80190.8157
GF0.95760.98120.97810.97770.95330.98130.9767
FR1.00001.00001.00001.00001.00001.00001.0000
FC1.00001.00001.00001.00001.00001.00001.0000
MB0.87870.89020.90820.76090.88710.93950.8820
PI1.00001.00001.00001.00001.00001.00001.0000
Average0.89890.93390.92560.88150.90470.94130.9144
Table 6. Average NC values calculated by taking over all the seven test images corresponding to the different image manipulation attacks for the comparison of the schemes.
Table 6. Average NC values calculated by taking over all the seven test images corresponding to the different image manipulation attacks for the comparison of the schemes.
AttackW1W2
Parah et al. [19]Zeng et al. [21]ProposedParah et al. [19]Zeng et al. [21]Proposed
NO1.00001.00001.00001.00001.00001.0000
MF0.84580.77060.71780.87420.83050.7630
RO0.55460.66101.00000.69700.75981.0000
CR0.85060.84260.86790.85920.84180.8597
GN0.95480.90600.90650.96400.91520.9245
JPEG0.99770.99860.97860.99790.97640.9829
RS0.93510.86680.84870.94800.92160.8763
MD0.83680.71850.73860.86340.83170.7769
SP0.84070.81960.85030.86400.85380.8664
RCD0.77090.77370.78300.80880.80300.8149
GF0.96030.95390.96500.97180.95810.9723
FR0.55590.78651.00000.69730.86991.0000
FC0.57270.84561.00000.68740.83031.0000
MB0.92390.93760.85150.93800.92250.8781
PI1.00001.00001.00001.00001.00001.0000
Average0.84000.85870.90050.87810.88760.9143
Table 7. Execution time comparison of the proposed scheme with the other similar schemes (second).
Table 7. Execution time comparison of the proposed scheme with the other similar schemes (second).
TimeZeng et al. [21]Parah et al. [19]Proposed
Watermark insertion time0.0836620.09840065.09526
Watermark extraction time0.0204990.0223430.027098
Total time0.1041610.12074365.12236

Share and Cite

MDPI and ACS Style

Ali, M.; Ahn, C.W.; Pant, M.; Kumar, S.; Singh, M.K.; Saini, D. An Optimized Digital Watermarking Scheme Based on Invariant DC Coefficients in Spatial Domain. Electronics 2020, 9, 1428. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics9091428

AMA Style

Ali M, Ahn CW, Pant M, Kumar S, Singh MK, Saini D. An Optimized Digital Watermarking Scheme Based on Invariant DC Coefficients in Spatial Domain. Electronics. 2020; 9(9):1428. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics9091428

Chicago/Turabian Style

Ali, Musrrat, Chang Wook Ahn, Millie Pant, Sanoj Kumar, Manoj K. Singh, and Deepika Saini. 2020. "An Optimized Digital Watermarking Scheme Based on Invariant DC Coefficients in Spatial Domain" Electronics 9, no. 9: 1428. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics9091428

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop