Next Article in Journal
Event-Based Implementation of Fractional Order IMC Controllers for Simple FOPDT Processes
Next Article in Special Issue
Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy
Previous Article in Journal
Waste Segregation FMEA Model Integrating Intuitionistic Fuzzy Set and the PAPRIKA Method
Previous Article in Special Issue
Representations of Generalized Self-Shrunken Sequences
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Adaptive Embedding Strength Watermarking Algorithm Based on Shearlets’ Capture Directional Features

College of Computer Science and Technology, China University of Petroleum, Qingdao 266580, China
*
Author to whom correspondence should be addressed.
Submission received: 4 August 2020 / Revised: 12 August 2020 / Accepted: 13 August 2020 / Published: 17 August 2020
(This article belongs to the Special Issue Mathematics Cryptography and Information Security)

Abstract

:
The discrete wavelet transform (DWT) is unable to represent the directional features of an image. Similarly, a fixed embedding strength is not able to establish an ideal balance between imperceptibility and robustness of a watermarked image. In this work, we propose an adaptive embedding strength watermarking algorithm based on shearlets’ capture directional features (S-AES). We improve the watermarking algorithm in the domain of DWT using non-subsampled shearlet transform (NSST). The improvement is made in terms of coping with anti-geometric attacks. The embedding strength is optimized by artificial bee colony (ABC) to achieve higher robustness under the premise of satisfying imperceptibility. The principle components (PC) of the watermark are embedded into the host image to overcome the false positive problem. The simulation results show that the proposed algorithm has better imperceptibility and strong robustness against multi-attacks, especially those of high intensity.

1. Introduction

With the development of the Internet, the amount of image data being transmitted has significantly increased. These images are easily copied, modified, subsequently infringing the copyright of the author. Digital image watermarking [1,2] is a technique to protect images’ ownership. Watermarking with strong robustness is embedded into the image to protect the ownership of the image. The research on robust watermarking has achieved good research results. Most algorithms presented in the literature have the ability to resist common attacks effectively. In addition, these algorithms also have resistance against geometric attacks, such as rotation and translation attacks. However, the extracted watermarking becomes worse with the increase in the attacks’ intensity in many existing algorithms. Therefore, making significant improvements in the resistance provided by robust watermarking against high intensity attacks is an important research problem.
The embedding strength of the digital watermarking algorithm is closely related to robustness and imperceptibility. The larger the value of embedding strength, the better the robustness and the worse the imperceptibility. On the other hand, a smaller value of embedding strength leads to better imperceptibility and worsens robustness [3,4]. Therefore, the appropriate embedding strength must be selected appropriately to maximize the robustness of the algorithm to enable resistance against high intensity attacks. In recent years, researchers optimized embedding strength on the basis of the genetic algorithm (GA) [5], particle swarm optimization (PSO) [6], and artificial bee colony (ABC) [7]. Cui [8] uses the differential evolution algorithm to optimize the embedding strength, which involves normalized correlation (NC) of the watermarked image and the extracted watermark for improving the robustness. Ansari [9] uses artificial bee colony (ABC) to optimize the embedding strength. The proposed methods use peak signal-to-noise ratio (PSNR) of the watermarked image and the average NC value of the extracted watermarking after different types of attacks. The algorithm fully considers the impact of embedding strength on imperceptibility and robustness.
Existing watermarking algorithms are generally divided into two groups, namely, spatial domain algorithms and transform domain algorithms. The spatial domain algorithms realize the embedding of watermarking by modifying the pixel values of the image. On the other hand, the transform domain algorithms consider the embedding position of watermarking by performing DCT (discrete cosine transform) [10], DFT (discrete Fourier transform) [11], and DWT (discrete wavelet transform) [12,13] of the original image. The transform domain algorithms have stronger robustness than the spatial domain algorithms [14]. Currently, the research on robust watermarking mainly focuses on the transform domain. The research community has made efforts to improve the robustness of the watermarking algorithm by selecting the appropriate embedding positions. Sharma in [15] adopts the redundant wavelet transform (RDWT) with translation invariance to select the embedding position for improving the robustness of the algorithm. The watermarking algorithm performs 2-level DWT of the original image proposed by Ansari [9]. The proposed method performs resistance against compression and noise attacks. However, the DWT does not have the ability to represent the multidirectional features of the image effectively, due to the limitation of the types of directional filtering. This limits the resistance ability of the watermarking algorithm based on DWT to geometric attacks. The shearlet transform proposed by Gao [16] has multiscale and multidirectional characteristics, and has the ability to capture the directional features of the image effectively. Similarly, Mardanpour [17] proposed a watermarking algorithm based on shearlet transform to achieve stronger robustness against geometric attacks.
The singular values of matrix have good stability and are beneficial in enhancing the robustness of the watermarking algorithms. Therefore, the singular value decomposition (SVD) and the frequency domain transformations are usually combined in watermarking algorithms [18]. The process of embedding the singular values of the watermark into the host image improves the algorithms’ robustness [19,20]. However, the singular value matrix is unable to represent the unique features of the image, thus leading to the false positive problem. The false positive problem is the extraction of a wrong watermark, which was never embedded into the host image, from the watermarked image. Vali [21] embeds a digital signature which is calculated by the watermark’s edge information of the watermarked image. This algorithm solves the false positive problem, however, it adds verification steps. Makbol [22], Ali [23] and Lakrissi [24] solve the false positive problem by embedding the principle components or the entire watermark into the image. The principal components can be obtained by SVD. The principal components can represent the unique features of the watermark to make the algorithms free from the false positive problem. Ansari [9] embeds the watermark’s principal components into the singular value matrix of the host image to solve the false positive problem. In this algorithm, the image matrix is reconstructed directly after the watermark is embedded.
As presented in the literature, the multiscale and multidirectional characteristics of shearlet transform makes up for the deficiency posed by DWT transform, and the embedding strength is accomplished by using a suitable optimization algorithm to achieve robustness. Therefore, in this work, an adaptive embedding strength watermarking algorithm based on shearlets’ capture directional features (S-AES) is proposed. The multi-resolution characteristics of DWT and multi-directional characteristics of shearlet transform increases the resistance ability against common attacks and geometric attacks and optimize the embedding strength by ABC. As compared to other algorithms presented in [8,9,17], S-AES makes up for the lack of resistance ability of DWT against geometric attacks, and also overcomes the problem of shearlet transform to filter attacks. Moreover, S-AES fully considers the watermarking characteristics of imperceptibility and robustness, and uses an optimized algorithm to search for the embedding strength that meets the requirements of the watermarking algorithm. Therefore, S-AES achieves maximum robustness against various attacks under the premise of satisfying the imperceptibility. S-AES also has the ability to resist many kinds of attacks, especially strong intensity attacks. The main contributions of this work are as follows:
  • The watermarking algorithm in the domain of DWT is improved by using shearlet transform. The embedding position is selected on the basis of DWT and NSST to improve the robustness.
  • The ABC algorithm and the improved optimized function is used to optimize the embedding strength to achieve higher robustness.
  • The principle components of the watermark are embedded into the host image to solve the false positive problem of singular value decomposition.
The rest of this paper is organized as follows:
In Section 2, we present the preliminaries of this work. In Section 3, we present the proposed watermark embedding and extracting algorithm. In Section 4, we present the experimental results and analysis. Finally, in Section 5, we conclude our work.

2. Preliminaries

2.1. Discrete Wavelet Transform (DWT)

DWT is a multiresolution analysis tool [25,26]. DWT decomposes an image into three high frequency sub-bands which are low-high (HL), high-low (LH) and high-high (HH) and one low frequency sub-band low-low (LL). Among these bands, LL contains most of the information presented by the original image. The other three sub-bands, i.e., HL, LH, HH, represent the texture features and the edge information of the image. Figure 1 presents the two-level DWT decomposition of “Lena” [27].
The low frequency sub-band has good stability to resist different types of attacks because it contains most of the information of the image. S-AES selects low frequency sub-band of two-level DWT decomposition as the embedding position of the watermark.

2.2. Non-Subsampled Shearlet Transform (NSST)

Shearlet transform is a multiscale analysis technique [28]. It has better multiresolution capabilities and stronger directional characteristics as compared to wavelet transform to represent the features of images or high-dimensional signals effectively. The non-subsampled shearlet transform is a discretization of shearlet transform. First, the image is multiscale decomposed by non-subsampled pyramid filter (NSPF). Then, each scale sub-band image is multidirectional decomposed by shear filter (SF) [29]. Figure 2 presents the implementation of non-subsampled shearlet transform.
Here, f represents the original image. f d 1 and f a 1 are the high frequency and low frequency images after the first decomposition, respectively. Similarly, f d 2 and f a 2 represent the high frequency and the low frequency images after the second decomposition of the low frequency image, respectively. f s 2 is detail sub-band by directional decomposition of f d 2 . NSST decomposes an image into different directional sub-bands. Figure 3 presents the NSST decomposition of a zone plate.
DWT does not possess the capability to represent the directional features of an image effectively. Contrarily, NSST is able to effectively capture the multidirectional features. Therefore, S-AES performs DWT and NSST on the image, and then selects the sub-band with the richest directional features as the embedding position to improve robustness.

2.3. Singular Value Decomposition (SVD)

Singular value decomposition is one of the useful numerical analysis tools in linear algebra, which can decompose an image into three matrices. For matrix A of size M × M , singular value decomposition is defined as Equation (1):
A = U S V T
where U , V , and S are the real matrix of size N × N , represent the left singular matrix, the right singular matrix, and the singular matrix, respectively. S is a diagonal matrix, and the diagonal elements of S represent the image luminance. Matrix U and V represent the horizontal and vertical details of the image.
The singular values of the watermark are embedded into the host image to improve the resistance against various attacks because of its good stability. However, the matrices U and V contain the images’ important information that the singular values are unable to represent. The watermarking algorithm using singular values will have the false position problem [30]. The principle components (PC) of the watermark are defined as Equation (2) [15]:
P C = U × S
The principal components represent the unique features of the image. Therefore, the principle components of the watermark are embedded into the host image to solve the false positive problem and improve the security in S-AES.

2.4. Artificial Bee Colony (ABC)

Artificial bee colony [15] is a global optimization algorithm proposed by Karaboga in 2005. This algorithm estimates the optimal value by maximizing or minimizing the objective function. ABC is widely used for its various advantages, such as fast convergence speed, less control parameters, and easy implementation. S-AES designs a reasonable objective function and uses ABC to find out the embedding strength.

3. The Proposed Scheme

In order to achieve higher robustness under the premise of meeting imperceptibility, an adaptive embedding strength watermarking algorithm based on shearlets’ capture directional features (S-AES) is proposed. DWT and NSST are adopted to select the embedding position. ABC is used to optimize the embedding strength. Embedding the principle components of the watermark into the host image solves the false positive problem caused by SVD.

3.1. The Watermark Embedding Scheme

The watermark embedding process is presented in Figure 4. This process comprises seven steps, which are presented below.
Step 1 The color image of size N × N is transformed from RGB color space to YCbCr color space, which extracts I Y , I C b , I C r of the image, as demonstrated in Equation (3) [31]:
[ Y C b C r ] = [ 0.29890 0.58660 0.11450 0.16874 0.33126 0.50000 0.50000 0.41869 0.81310 ] [ R G B ] + [ 0 0.5 0.5 ]
According to human visual system, the human eyes are not sensitive to luminance components [32]. In order to guarantee better imperceptibility, S-AES embeds the watermark to luminance component I Y .
Step 2 Apply two-level DWT on I Y to obtain low frequency sub-band I L L as the embedding position. The low frequency sub-band contains most of the information to resist against different types of attacks to guarantee robustness.
Step 3 Apply NSST on low frequency sub-band I L L to obtain four different directional sub-bands. Calculate the entropy of these sub-bands, which is referred to as Equation (4):
H ( X ) = E [ l o g 1 p ( a i ) ] = i = 1 n p ( a i ) l o g   p ( a i )
where n represents the number of gray levels and p ( a i ) represents the probability of gray level a i of the image. The larger the values of entropy, the richer the directional features of the sub-band. The sub-band S u b b a n d m a x with the maximum entropy is selected to embed the watermark to ensure better imperceptibility against attacks.
Step 4 Apply k times Arnold transform on directional sub-band S u b b a n d m a x to obtain S u b b a n d , which is referred to as Equation (5):
[ x y ] = [ 1 1 1 2 ] [ x y ] ( m o d   x ) , x , y ϵ ( 0 , 1 , , M 1 )
where, ( x , y ) represents the original coordinates of the pixel and ( x , y ) represents the new coordinates of the transformed pixel. The size of directional sub-band is M × M . Arnold transformation breaks the spatial continuity between image pixels, which is conducive to the security of the algorithm.
Step 5 Apply SVD on scrambled directional sub-band S u b b a n d referred to as Equation (6):
S V D ( S u b b a n d ) = U S V T
Apply SVD on watermark image W a t e r , and extract principle components of the watermark P C w a t e r , as demonstrated in Equations (7) and (8):
S V D ( W a t e r ) = U w a t e r S w a t e r V w a t e r T
P C w a t e r = U w a t e r × S w a t e r
The principle components, which represent the unique features of the image, are embedded into the host image to avoid the false positive problem in the S-AES algorithm.
Step 6 Embed the PC of the watermark into the singular matrix of the host image, as demonstrated in Equation (9):
P C m a r k = S + α P C w a t e r
where α is embedding strength which is optimized by ABC. Please note that it is necessary to apply SVD on P C m a r k to maintain good stability of the singular matrix because P C m a r k is no longer a diagonal matrix.
S V D ( P C m a r k ) = U m a r k S m a r k V m a r k T
In [3], the authors perform inverse SVD using the singular matrix embedded with PC (e.g., s P C m a r k ), which leads to the worse ability of anti-geometric attacks, such as rotation.
Step 7 Apply inverse SVD to obtain the directional sub-band S u b b a n d m a r k containing the watermark, as demonstrated in Equation (11):
S u b b a n d m a r k = U × S m a r k × V T
Apply k times inverse Arnold transform, inverse NSST and inverse DWT on S u b b a n d m a r k to obtain I Y m a r k . Merge I Y m a r k with I C b , I C r , then transform YCbCr to RGB to obtain the watermarked color image, i.e., W a t e r m a r k e d I m a g e , as demonstrated in Equation (12) [31]:
[ R G B ] = [ 1 0 0.14020 1 0.34414 0.71414 1 1.77200 0 ] [ Y C b C r ] [ 0 0.5 0.5 ]

3.2. The Watermark Extracting Scheme

The watermark extracting process is presented in Figure 5. It contains three steps.
Step 1 The watermarked image W a t e r m a r k e d I m a g e is transformed RGB to YCbCr color space to extract luminance component I Y m a r k . Apply DWT and NSST on I Y m a r k to obtain the directional sub-band containing the watermark denoted as S u b b a n d m a r k . Perform the same transformations on the original image to obtain the directional sub-band S u b b a n d .
Step 2 Apply k times Arnold transform on directional sub-bands S u b b a n d m a r k and S u b b a n d , and then apply SVD on S u b b a n d m a r k and S u b b a n d to obtain the singular matrices S m a r k and S . Extract the embedding information as in Equation (13):
E m b e d = U m a r k × S m a r k × V m a r k T
Step 3 Extract the principle components of the watermark as in Equation (14):
P C = ( E m b e d S ) / α
Then extract the watermark using the side information using the following Equation (15):
E x t r a c t W a t e r = P C × V w a t e r T

3.3. Optimization of Embedding Strength

Most of the algorithms presented in the literature consider the fixed value of embedding strength. However, different images have different characteristics in terms of color, texture, and some other characteristics. The fixed embedding strength is unable to realize the good imperceptibility and robustness on various kinds of images. S-AES considers the characteristics of the host image and the watermark to optimize the embedding strength using ABC.
Normalized correlation (NC) is used to evaluate the robustness, and peak signal-to-noise ratio (PSNR) is used to evaluate imperceptibility, as demonstrated in Equations (16) and (17) [33]:
N C = i = 1 M j = 1 M W ( i , j ) × W ( i , j ) i = 1 M j = 1 M W ( i , j ) i = 1 M j = 1 M W ( i , j )
P S N R ( I , I ) = 10   l o g 10 255 2 1 N × N i = 1 N j = 1 N [ I ( i , j ) I ( i , j ) ] 2 ( d B )
where W and W represent the original watermark and the extracted watermark, respectively. I and I represent the host image and the watermarked image, respectively.
It makes sense to satisfy imperceptibility for the watermarking algorithms. The main idea of S-AES is to achieve higher robustness for multiple attacks under the premise of satisfying imperceptibility. N times different types and intensity attacks are applied to the watermarked image when the PSNR is above the threshold. The robustness of S-AES is maximized by maximizing the proposed objective function presented in Equation (18), where W is the original watermark, and W′ represents the extracted watermark.
{ P S N R > T h r e s h o l d f u n = i = 1 N N C ( W , W i ) / N
The embedding strength optimization process is presented in Figure 6. The values of parameters are presented in Table 1.

4. Results and Analysis

The experiments of S-AES are performed in MATLABR2017b, and they involve 10 host images and 2 watermark images that were selected from the standard image data-base. The size of each host image is 512 × 512, while that of the watermarked images is 128 × 128, as presented in Figure 7. The threshold value is 38 dB in this experiment. Figure 8 illustrates the convergence graph for the 10 host images embedding with the “UPC” watermark in Figure 7.
It is evident from Figure 8 that all 10 host images converge after 16 executed iterations.

4.1. Imperceptibility Analysis

The imperceptibility results are presented in Table 2.
According to the human visual system [34], the watermark has good imperceptibility when PSNR > 35 dB. As presented in Table 2, the PSNR values are about 38 dB, indicating that S-AES has good imperceptibility.

4.2. Robustness Analysis

NC and the bit error ratio (BER) are used to evaluate the robustness of the proposed algorithm. The larger value of NC results in better robustness. The BER is an indicator to measure the difference between the extracted watermark and the original watermark. Its mathematical definition is presented in Equation (19) [35].
B E R = B P × Q
where B is the number of erroneous bits in the extracted watermark, and P × Q represents the total number of bits in the extracted watermark. The lower value of the BER shows greater robustness of the proposed algorithm.

4.2.1. Robustness Results

The extracted “UPC” and “Logo” watermarks from the host images “Lena” and “Pepper” under crop, filer, and rotation attacks are presented in Table 3.
In Table 3, we can see that the extracted watermarks are slightly different from the original watermarks, and can represent the copyright information clearly. This indicates that S-AES has strong robustness under different attacks.
To illustrate the robustness of the algorithm accurately, the NC values are shown in Table 4.
The BERs of the extracted watermark under different types and parameter attacks are shown in Table 5.
According to the information presented in Table 4 and Table 5, the NC value of the extracted watermark decreases and the BER increases with the increase in the intensity of the attack. The robustness of “Lena” is stronger than “Pepper” in most cases under the same attack. The NC values of the watermarks are mostly around 0.99 and the BERs are mostly around 0.01. The NC value is above 0.95 and the BER is below 0.05 even under high intensity attacks. The NC values of S-AES are always above 0.99 under crop, Gaussian filter, compression, and speckle noise attacks. However, they drop to 0.95 under an average filter attack with the parameter of (5,5). This is because S-AES uses NSST to capture the texture and directional features of the image. However, the watermark can be extracted successfully, indicating that S-AES has the capability to resist average filter attacks.

4.2.2. Comparative Analysis

Optimization of Embedding Strength Comparison

We embed ”UPC” into “Lena” using the embedding strength optimized by the proposed method and the method presented in [9]. We then perform eight types of attacks on watermarked images. The comparison of NC values is presented in Figure 9.
It is evident from Figure 9 that the robustness is stronger using the embedding strength optimized by the proposed objective function than [9]. Notably, the NC values decrease more slightly as compared to [9] when the attack intensity increases. Therefore, the proposed algorithm is more robust.

Comparison of Robustness

In order to test the stronger robustness of S-AES, the NC values of the extracted watermark are compared with [9] under attacks with the same parameters. In addition, we also perform comparison with [13,15,17,21,22]. The results are presented in Table 6.
In Table 6, we can see that the NC values of S-AES are larger than [9] under the same attacks. S-AES has stronger robustness than other algorithms for compression and geometric attacks, such as crop and rescale. In most cases, S-AES has stronger robustness than other algorithms under translation attacks. The NC values of S-AES are slightly lower than [15] under the filter attack a larger window size. This is because S-AES uses NSST to select the embedding position.
Under the attacks with the same parameters, we compare the BER of S-AES with methods presented in [13,14,18,35]. The results are presented in Table 7.
It is evident from the comparison of the BER presented in Table 7 that the S-AES algorithm has better robustness.
We compared the NC values of the extracted watermark with [15,24] under multiple attacks. The results are shown in Table 8.
According to Table 8, most of the NC values of S-AES are larger than those in [15] and [24]. Therefore, S-AES has the ability to resist multiple attacks effectively.
The aforementioned experimental results show that S-AES has the capacity to resist not only single attacks but also multiple attacks. Furthermore, S-AES has stronger robustness compared with the existing algorithms.

4.3. False Positive Problem

In order to test the false positive problem, the watermarked image “Lena” is embedded with the “UPC” watermark used as a disputed image. “Logo” is used as a false watermark. The extracted results are presented in Figure 10.
Figure 10 shows that the watermark cannot be extracted successfully using side information of the false watermark. This indicates that S-AES overcomes the false positive problem.
According to the aforementioned experiments, S-AES has good imperceptibility and strong robustness for single attacks and multiple attacks. It also overcomes the false positive problem.

5. Conclusions

In this work, we propose an adaptive embedding strength watermarking algorithm based on shearlets’ capture directional features (S-AES). The multiscale and multidirectional characteristics of NSST are used to improve the watermarking algorithms in the domain of DWT. This enables the algorithm to resist common attacks and geometric attacks effectively. S-AES fully considers the watermarking characteristics of imperceptibility and robustness and optimizes the embedding strength using the proposed objective function, achieving maximum robustness under the premise of satisfying imperceptibility. As compared with other algorithms, S-AES has a greater ability to resist high intensity attacks. We embedded the principle components enclosing the unique features of the watermark into the host image to overcome the false positive problem. Even if someone provides a wrong singular matrix obtained from a false watermark, it cannot extract the watermark successfully using side information of the false watermark. The robustness of S-AES decreases slightly under average and median filter attacks with a larger window size. This can be improved in the future. In addition, S-AES can also be extended to the field of video watermarking.

Author Contributions

Conceptualization, Q.Z. and N.L.; methodology, N.L.; writing—original draft preparation, N.L.; writing—review and editing, N.L. and F.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 51274232; the Natural Science Foundation of Shandong Province of China, grant number ZR2018MEE004; and the Fundamental Research Funds for the Central Universities, grant number 19CX02030A.

Acknowledgments

The authors would like to sincerely thank the anonymous reviewers for their valued comments and constructive suggestions, which significantly improved the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Najafi, E.; Loukhaoukha, K. Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. J. Inf. Secur. Appl. 2019, 44, 144–156. [Google Scholar] [CrossRef]
  2. Arumugham, S.; Rajagopalan, S.; Rayappan, J.B.B.; Amirtharajan, R. Tamper-resistant secure medical image carrier: An IWT–SVD–Chaos–FPGA combination. Arab. J. Sci. Eng. 2019, 44, 9561–9580. [Google Scholar] [CrossRef]
  3. Bhinder, P.; Singh, K.; Jindal, N. Image-adaptive watermarking using maximum likelihood decoder for medical images. Multimed. Tools Appl. 2018, 77, 10303–10328. [Google Scholar] [CrossRef]
  4. Huang, Y.; Niu, B.N.; Guan, H.; Zhang, S.W. Enhancing image watermarking with adaptive embedding parameter and PSNR guarantee. IEEE Trans. Multimed. 2019, 21, 2447–2460. [Google Scholar] [CrossRef]
  5. Zhou, X.Y.; Cao, C.J.; Ma, J.X. An adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Math. Probl. Eng. 2018. [Google Scholar] [CrossRef]
  6. Kang, X.B.; Chen, Y.J.; Zhao, F.; Lin, G.F. Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft Comput. 2019, 24, 10561–10584. [Google Scholar] [CrossRef]
  7. Kuraparthi, S.; Kollati, M.; Kora, P. Robust optimized discrete wavelet transform-singular value decomposition based video watermarking. Trait. Signal 2019, 36, 565–573. [Google Scholar] [CrossRef]
  8. Cui, X.C.; Niu, Y.Y.; Zheng, X.W.; Han, Y.S. An optimized digital watermarking algorithm in wavelet domain based on differential evolution for color image. PLoS ONE 2018, 13, e0196306. [Google Scholar] [CrossRef] [Green Version]
  9. Ansari, I.A.; Pant, M. Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn. Lett. 2017, 94, 228–236. [Google Scholar] [CrossRef]
  10. Zhang, Q.; Li, Y.; Wei, X. An improved robust and adaptive watermarking algorithm based on DCT. J. Appl. Res. Technol. 2012, 10, 405–415. [Google Scholar] [CrossRef]
  11. Hamidi, M.; El Haziti, M.; Cherifi, H.; El Hassouni, M. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimed. Tools Appl. 2018, 77, 27181–27241. [Google Scholar] [CrossRef] [Green Version]
  12. Abdulrahman, A.K.; Ozturk, S. A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed. Tools Appl. 2018, 78, 17027–17049. [Google Scholar] [CrossRef]
  13. Wang, B.W.; Zhao, P. An adaptive image watermarking method combining SVD and Wang-Landau sampling in DWT domain. Mathematics 2020, 8, 691. [Google Scholar] [CrossRef]
  14. Islam, M.; Roy, A.; Laskar, R.H. SVM-based robust image watermarking technique in LWT domain using different sub-bands. Neural Comput. Appl. 2020, 32, 1379–1403. [Google Scholar] [CrossRef]
  15. Sharma, S.; Sharma, H.; Sharma, J.B. An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization. Appl. Soft Comput. 2019, 84, 105696. [Google Scholar] [CrossRef]
  16. Gao, X.B.; Lu, W.; Tao, D.C.; Li, X.L. Image quality assessment based on multiscale geometric analysis. IEEE Trans. Image Process. 2009, 18, 1409–1423. [Google Scholar]
  17. Mardanpour, M.; Chahooki, M.A.Z. Robust transparent image watermarking with Shearlet transform and bidiagonal singular value decomposition. AEU Int. J. Electron. Commun. 2016, 70, 790–798. [Google Scholar] [CrossRef]
  18. Liu, X.Y.; Wang, Y.F.; Du, J.Y.; Liao, S.H.; Lou, J.T.; Zou, B.J. Robust hybrid image watermarking scheme based on KAZE features and IWT-SVD. Multimed. Tools Appl. 2019, 78, 6355–6384. [Google Scholar] [CrossRef]
  19. Araghi, T.K.; Abd Manaf, A.; Araghi, S.K. A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst. Appl. 2018, 112, 208–228. [Google Scholar] [CrossRef]
  20. Ali, M.; Ahn, C.W.; Pant, M.; Siarry, P. A reliable image watermarking scheme based on redistributed image normalization and SVD. Discret. Dyn. Nat. Soc. 2016, 2016, 3263587. [Google Scholar] [CrossRef] [Green Version]
  21. Vali, M.H.; Aghagolzadeh, A.; Baleghi, Y. Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition. Expert Syst. Appl. 2018, 114, 296–312. [Google Scholar] [CrossRef]
  22. Makbol, N.M.; Khoo, B.E.; Rassem, T.H.; Loukhaoukha, K. A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inform. Sci. 2017, 417, 381–400. [Google Scholar] [CrossRef]
  23. Ali, M.; Ahn, C.W.; Siarry, P. Differential evolution algorithm for the selection of optimal scaling factors in image watermarking. Eng. Appl. Artif. Intell. 2014, 14, 15–26. [Google Scholar] [CrossRef]
  24. Lakrissi, Y.; Saaidi, A.; Essahlaoui, A. Novel dynamic color image watermarking based on DWT-SVD and the human visual system. Multimed. Tools Appl. 2017, 77, 13531–13555. [Google Scholar] [CrossRef]
  25. Yadav, N. DWT-SVD-WHT watermarking using varying strength factor derived from means of the WHT coefficients. Arab. J. Sci. Eng. 2018, 43, 4131–4143. [Google Scholar] [CrossRef]
  26. Araghi, T.K.; Abd Manaf, A. An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Future Gener. Comp. Syst. 2019, 101, 1223–1246. [Google Scholar] [CrossRef]
  27. Li, Y.W.; Song, W.; Zhao, X.B.; Wang, J.; Zhao, L.Z. A novel image tamper detection and self-recovery algorithm based on watermarking and chaotic system. Mathematics 2019, 7, 955. [Google Scholar] [CrossRef] [Green Version]
  28. Zhao, J.; Xu, W.S.; Zhang, S.L.; Fan, S.S.; Zhang, W.R. A strong robust zero-watermarking scheme based on shearlets’ high ability for capturing directional features. Math. Probl. Eng. 2016, 2016, 2643263. [Google Scholar] [CrossRef] [Green Version]
  29. Wang, X.Y.; Liu, Y.N.; Li, S.; Yang, H.Y.; Niu, P.P. Robust image watermarking approach using polar harmonic transforms based geometric correction. Neurocomputing 2016, 174, 627–642. [Google Scholar] [CrossRef]
  30. Thanki, R.; Borra, S.; Dwivedi, V.; Borisagar, K. An efficient medical image watermarking scheme based on FDCuT–DCT. Eng. Sci. Technol. 2017, 20, 1366–1379. [Google Scholar] [CrossRef]
  31. Moosazadeh, M.; Ekbatanifard, G. A new DCT-based robust image watermarking method using teaching-learning-based optimization. Optik 2019, 47, 28–38. [Google Scholar] [CrossRef]
  32. Tan, Y.; Qin, J.H.; Xiang, X.Y.; Ma, W.T.; Pan, W.Y.; Xiong, N.N. A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding. IEEE Access 2019, 7, 25026–25036. [Google Scholar] [CrossRef]
  33. Rakheja, P.; Vig, R.; Singh, P. An asymmetric watermarking scheme based on random decomposition in hybrid multi-resolution wavelet domain using 3D Lorenz chaotic system. Optik 2019, 198, 163289. [Google Scholar] [CrossRef]
  34. Zebbiche, K.; Khelifi, F.; Loukhaoukha, K. Robust additive watermarking in the DTCWT domain based on perceptual masking. Multimed. Tools Appl. 2018, 77, 21281–21304. [Google Scholar] [CrossRef] [Green Version]
  35. Ma, B.; Chang, L.L.; Wang, C.P.; Li, J.; Wang, X.Y.; Shi, Y.Q. Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Signal Process. 2020, 172, 107544. [Google Scholar] [CrossRef]
Figure 1. Schematic pictures of two-level discrete wavelet decomposition (DWT).
Figure 1. Schematic pictures of two-level discrete wavelet decomposition (DWT).
Mathematics 08 01377 g001
Figure 2. Schematic pictures of non-subsampled shearlet transform (NSST).
Figure 2. Schematic pictures of non-subsampled shearlet transform (NSST).
Mathematics 08 01377 g002
Figure 3. Schematic pictures of NSST decomposition. (a) Zone plate. (b) Low frequency sub-band. (c) Four different directional sub-bands. (d) Eight different directional sub-bands.
Figure 3. Schematic pictures of NSST decomposition. (a) Zone plate. (b) Low frequency sub-band. (c) Four different directional sub-bands. (d) Eight different directional sub-bands.
Mathematics 08 01377 g003
Figure 4. Schematic pictures of the watermark embedding scheme.
Figure 4. Schematic pictures of the watermark embedding scheme.
Mathematics 08 01377 g004
Figure 5. Schematic pictures of the watermark extracting scheme.
Figure 5. Schematic pictures of the watermark extracting scheme.
Mathematics 08 01377 g005
Figure 6. Schematic pictures of embedding strength optimization.
Figure 6. Schematic pictures of embedding strength optimization.
Mathematics 08 01377 g006
Figure 7. The host images and watermark images. (a) Lena. (b) Pepper. (c) Airplane. (d) Tiffany. (e) Baboon. (f) Sailboat. (g) Flower. (h) Goldhill. (i) Soccer. (j) Girl. (k) UPC. (l) Logo.
Figure 7. The host images and watermark images. (a) Lena. (b) Pepper. (c) Airplane. (d) Tiffany. (e) Baboon. (f) Sailboat. (g) Flower. (h) Goldhill. (i) Soccer. (j) Girl. (k) UPC. (l) Logo.
Mathematics 08 01377 g007
Figure 8. Convergence graph for the 10 host images embedding with the “UPC” watermark.
Figure 8. Convergence graph for the 10 host images embedding with the “UPC” watermark.
Mathematics 08 01377 g008
Figure 9. Comparison of NC values under different attacks. (a) Rotation. (b) Average filter. (c) Gaussian noise. (d) Rescale. (e) Median filter. (f) Crop. (g) Translation. (h) Pepper and salt noise.
Figure 9. Comparison of NC values under different attacks. (a) Rotation. (b) Average filter. (c) Gaussian noise. (d) Rescale. (e) Median filter. (f) Crop. (g) Translation. (h) Pepper and salt noise.
Mathematics 08 01377 g009aMathematics 08 01377 g009b
Figure 10. Result of the false positive problem. (a) Disputed image. (b) False watermark. (c) Extracted watermark.
Figure 10. Result of the false positive problem. (a) Disputed image. (b) False watermark. (c) Extracted watermark.
Mathematics 08 01377 g010
Table 1. Parameters values of embedding strength optimization.
Table 1. Parameters values of embedding strength optimization.
ParametersValues
Size of swarm20
Maximum iterations20
Limit10
Initialization range[0.005, 0.1]
Employed bees50% of size of swarm
Onlooker bees50% of size of swarm
Scout beesVariable
AttacksCrop, filter, noise, compression, rotation, sharpen and translation.
Table 2. Peak signal-to-noise ratio (PSNR) values of S-AES.
Table 2. Peak signal-to-noise ratio (PSNR) values of S-AES.
PSNR
(dB)
LenaPepperAirplaneTiffanyBaboonSailboatFlowerGoldhillSoccerGirl
UPC38.008838.030738.002338.000138.007338.002138.007338.018738.000138.0190
Logo38.013538.004138.003138.004838.00038.011738.000338.001538.008738.0091
Table 3. Extracted “UPC” and “Logo” watermarks from “Lena” and “Pepper” under different attacks.
Table 3. Extracted “UPC” and “Logo” watermarks from “Lena” and “Pepper” under different attacks.
AttacksLenaLogoPepperUPC
Centre crop 256 × 256 Mathematics 08 01377 i001 Mathematics 08 01377 i002 Mathematics 08 01377 i003 Mathematics 08 01377 i004
Average filter (3,3) Mathematics 08 01377 i005 Mathematics 08 01377 i006 Mathematics 08 01377 i007 Mathematics 08 01377 i008
Pepper and salt noise
0.1
Mathematics 08 01377 i009 Mathematics 08 01377 i010 Mathematics 08 01377 i011 Mathematics 08 01377 i012
Rescale
0.25
Mathematics 08 01377 i013 Mathematics 08 01377 i014 Mathematics 08 01377 i015 Mathematics 08 01377 i016
Rotation
45°
Mathematics 08 01377 i017 Mathematics 08 01377 i018 Mathematics 08 01377 i019 Mathematics 08 01377 i020
Translation 80 Mathematics 08 01377 i021 Mathematics 08 01377 i022 Mathematics 08 01377 i023 Mathematics 08 01377 i024
Table 4. The normalized correlation (NC) values of the extracted watermarks under different types and parameters attacks.
Table 4. The normalized correlation (NC) values of the extracted watermarks under different types and parameters attacks.
AttacksParametersLenaPepper
UPCLogoUPCLogo
Contrast adjustment20%0.99710.99890.99640.9960
Crop128 × 1280.99900.99720.99860.9967
256 × 2560.99870.99760.99780.9925
384 × 3840.99820.99700.96200.9562
Centre crop128 × 1280.99920.99730.99860.9969
256 × 2560.99870.99900.99860.9961
384 × 3840.97820.99780.99810.9939
Gaussian filter(2,2)0.99860.99700.99850.9939
(3,3)0.99860.99710.99860.9957
(5,5)0.99860.99710.99860.9957
Gaussian noise0.010.99870.99710.99860.9969
0.10.98680.99900.99600.9971
0.30.96070.99720.97290.9952
JPEG 2000 compression5:10.99860.99710.99860.9968
10:10.99860.99710.99860.9968
20:10.99860.99710.99860.9969
JPEG compression20%0.99860.99710.99860.9968
40%0.99860.99710.99860.9968
60%0.99860.99710.99860.9968
80%0.99860.99710.99860.9968
100%0.99860.99710.99850.9967
Average filter(2,2)0.99860.99700.99850.9939
(3,3)0.99850.99460.99630.9871
(5,5)0.97400.96800.95370.9430
Median filter(2,2)0.99860.99710.99860.9947
(3,3)0.99860.99700.99850.9943
(5,5)0.98840.98320.98800.9791
Motion blurθ = 4, l = 70.99860.99540.99500.9862
Pepper and salt noise0.010.99860.99710.99860.9969
0.10.99900.99760.99850.9970
0.30.97970.99860.98480.9969
Rescale256 × 2560.99860.99710.99850.9947
128 × 1280.97520.96950.97120.9591
1024 × 10240.99860.99710.99860.9968
2048 × 20480.99860.99710.99860.9968
Rotation0.99760.99720.99740.9959
−5°0.99870.99710.99440.9936
45°0.99640.99700.99500.9970
90°0.97000.99900.98750.9769
180°0.99860.99710.99850.9968
270°0.96780.99900.98750.9767
Sharpen0.80.99000.99230.99000.9845
Speckle noise0.010.99860.99710.99860.9969
0.10.99920.99760.99850.9970
0.30.99050.99900.99360.9971
Translation200.97720.99790.99860.9960
400.97870.99830.99850.9934
800.98200.99900.99600.9868
1600.99350.99760.98480.9744
Weiner filter(2,2)0.99860.99710.99860.9964
(3,3)0.99860.99710.99860.9952
(5,5)0.99790.99420.99710.9896
Histogram equalization 0.99940.99870.99790.9965
Table 5. The bit error ratio (BER) of the extracted watermarks under different types and parameters attacks.
Table 5. The bit error ratio (BER) of the extracted watermarks under different types and parameters attacks.
AttacksParametersLenaPepper
UPCLogoUPCLogo
Contrast adjustment20%0.00430.00120.00520.0046
Crop128 × 1280.00150.00310.00200.0038
256 × 2560.00200.00270.00320.0085
384 × 3840.00270.00340.05440.0504
Centre crop128 × 1280.00120.00310.00200.0034
256 × 2560.02140.00120.00200.0044
384 × 3840.03130.00250.00270.0070
Gaussian filter(2,2)0.00200.00340.00230.0069
(3,3)0.00200.00330.00200.0048
(5,5)0.00200.00330.00200.0049
Gaussian noise0.010.00200.00330.00210.0037
0.10.01900.00110.00950.0033
0.30.05700.00290.03460.0041
JPEG 2000 compression5:10.00200.00330.00210.0037
12:10.00200.00330.00200.0036
20:10.00200.00330.00200.0035
JPEG compression20%0.00200.00330.00200.0037
40%0.00200.00330.00200.0037
60%0.00200.00330.00200.0037
80%0.00200.00330.00210.0037
100%0.00200.00330.00210.0037
Average filter(2,2)0.00200.00340.00230.0069
(3,3)0.00210.00620.00540.0147
(5,5)0.03750.03670.06630.0657
Median filter(2,2)0.00200.00330.00210.0060
(3,3)0.00200.00340.00220.0065
(5,5)0.01670.01910.01730.0239
Motion blurθ = 4, l = 70.00210.00520.00730.0157
Pepper and salt noise0.010.00200.00330.00210.0035
0.10.00170.00270.00230.0033
0.30.02950.00130.02040.0034
Rescale256 × 2560.00200.00330.00210.0060
128 × 1280.03580.03500.04160.0472
1024 × 10240.00200.00330.00200.0037
2048 × 20480.00200.00330.00200.0037
Rotation0.00350.00320.00370.0046
−5°0.00200.00330.00820.0072
45°0.00520.00340.00730.0034
90°0.04300.00110.01810.0262
180°0.00200.00330.00230.0036
270°0.04330.00120.01810.0265
Sharpen0.80.01460.00870.01460.0178
Speckle noise0.010.00200.00330.00210.0037
0.10.00110.00300.00200.0034
0.30.01330.00100.00950.0033
Translation200.03270.00240.00200.0045
400.03070.00200.00220.0075
800.02450.00110.00580.0151
1600.00950.00270.02200.0295
Weiner filter(2,2)0.00200.00330.00200.0041
(3,3)0.00200.00330.00200.0055
(5,5)0.00300.00660.00430.0118
Histogram equalization0.00090.00150.00310.0040
Table 6. Comparison of NC values under attacks with the same parameters.
Table 6. Comparison of NC values under attacks with the same parameters.
AttacksParametersS-AESAnsari [9]Vali [21]Makbol [22]Sharma [15]Mandanpour [17]Wang [13]
Contrast adjustment20%0.99400.5806-----
Crop128 × 1280.9986--0.9801-0.9400-
256 × 2560.9966-0.9686-0.9659--
Center Crop128 ×1280.9970--0.9200---
Gaussian filter[3,3]0.99860.98980.98320.98740.99590.99000.9959
[5,5]0.9986-0.9899-0.99580.9900-
Gaussian noise0.0010.99860.91050.98380.98100.99650.99000.9983
0.010.9986-0.93040.97120.99140.9800-
0.50.9400-0.8181-0.9082--
JPEG 2000 compression5:10.9986---0.9963--
12:10.99860.9393-----
20:10.9986---0.9959--
JPEG compression10%0.9986-0.9733-0.99540.9900-
30%0.9986-0.92410.99300.99570.99000.9982
50%0.99860.97060.99380.98110.99600.9900-
90%0.9986-0.9740-0.99620.9900-
Average filter[2,2]0.9986---0.9955-0.9030
[3,3]0.99840.83530.94960.97960.99480.9700-
[5,5]0.9714---0.99170.9000-
Median filter[2,2]0.9986--0.98020.99580.9900-
[3,3]0.99860.93570.97160.98000.99550.98000.9971
[5,5]0.9856-0.9603-0.99450.9600-
Motion blurθ = 4, l = 70.99840.9575---0.7700-
Pepper and salt noise0.010.9986-0.96880.98410.99160.99000.9868
0.10.9969-0.89240.92200.98320.9600-
0.30.9632-0.82270.9353---
Rescale0.5 times0.9986-0.94700.98080.99480.9800-
0.25 times0.99860.98030.82890.96800.99030.89000.9977
2 times0.9986-0.9705--0.9900-
4 times0.99860.9941--0.9961--
Rotation45°0.9932-0.98510.9779-0.96000.3928
−50°0.9818-0.9820--0.9200-
Speckle noise0.0010.99860.98030.9953-0.99640.9900-
0.010.9986-0.96660.99030.98990.99000.9955
0.10.9979-0.92100.95780.98130.9700-
Translation[10,10]0.9985-0.9715-0.98950.9900-
[20,20]0.9746--0.93800.98140.9800-
[10,20]0.9984---0.9894--
[20,35]0.9855---0.9853--
[50,50]0.9985-0.9880-0.97280.9500-
Weiner filter[2,2]0.9986---0.9960--
[3,3]0.99860.96950.99400.99010.9953--
[5,5]0.9967-0.9533-0.9943--
Histogram equalization-0.9974-0.97210.95320.97250.98000.8176
Table 7. Comparison of the BER under attacks with the same parameters.
Table 7. Comparison of the BER under attacks with the same parameters.
AttacksParametersS-AESMa [35]Wang [13]Islam [14]Liu [18]
Crop10%0.0015---0.0052
Center crop10%0.0012---0.0160
Gaussian filter[3,3]0.0020-0.00870.00390.0246
JPEG compression20%0.00200.0065---
30%0.00200.00650.00070.0098-
50%0.00200.0052-0.0059-
90%0.0020---0.0024
Average filter[3,3]0.0021-0.11870.06640.0248
Median filter[3,3]0.00200.01040.0097-0.0125
Pepper and salt noise0.010.0020-0.00930.0488-
Rescale256 × 2560.00200.06580.0068-0.0466
1024 × 10240.00200.0052---
Rotation0.00350.0091-0.0352-
15°0.00590.0078--0.1354
25°0.00610.0117--0.0936
35°0.00460.0195---
45°0.00520.02160.7780--
Speckle noise0.010.00200.01910.0131--
Histogram equalization-0.0009-0.35240.0156-
Table 8. Comparison of NC values under multiple attacks.
Table 8. Comparison of NC values under multiple attacks.
Multiple attacksS-AESSharma [15]Lakrissi [24]
Pepper and salt noise (0.2) + JPEG compression (30%)0.99070.9868-
Histogram equalization + Rotation (5°)0.98610.9626-
Sharpen + Gaussian filter ([3,3])0.9966-1
Gaussian noise (0.2) + crop (25%)0.97190.9613-
Sharpen + Average filter ([5,5])0.99560.9940-
Rescale (0.5) + JPEG compression (50%)0.9986-0.9816
Gaussian noise (0.01) + JPEG compression (50%)0.9987-0.9633
Weiner filter ([5,5]) + Translation (10)0.99830.9899-
Average filter ([5,5]) + Rotation (5°)0.99850.9910-
Pepper and salt noise (0.2) + Gaussian noise (0.2)0.96530.9678-
Gaussian noise (0.01) + Gaussian filter ([3,3]) + JPEG compression (50%)0.9986-0.9800
Pepper and salt noise (0.01) + contrast adjustment (20%) + JPEG compression (50%)0.9984-0.8798

Share and Cite

MDPI and ACS Style

Zheng, Q.; Liu, N.; Wang, F. An Adaptive Embedding Strength Watermarking Algorithm Based on Shearlets’ Capture Directional Features. Mathematics 2020, 8, 1377. https://0-doi-org.brum.beds.ac.uk/10.3390/math8081377

AMA Style

Zheng Q, Liu N, Wang F. An Adaptive Embedding Strength Watermarking Algorithm Based on Shearlets’ Capture Directional Features. Mathematics. 2020; 8(8):1377. https://0-doi-org.brum.beds.ac.uk/10.3390/math8081377

Chicago/Turabian Style

Zheng, Qiumei, Nan Liu, and Fenghua Wang. 2020. "An Adaptive Embedding Strength Watermarking Algorithm Based on Shearlets’ Capture Directional Features" Mathematics 8, no. 8: 1377. https://0-doi-org.brum.beds.ac.uk/10.3390/math8081377

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop