Abstract
In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks. Further, recent state-of-the-art watermarking techniques as reported by noted authors are discussed in brief. It includes the performance comparison of reported transform/spatial domain based watermarking techniques presented in tabular form. This comprehensive survey will be significant for researchers who will be able to implement more efficient watermarking techniques. Moreover, we present a robust watermarking technique using fusion of discrete wavelet transform (DWT) and Karhunen-Loeve transform for digital images. Further, visual quality of the watermarked image is enhanced by using different image de-noising techniques. The results are obtained by varying the gain factor, size of the image watermark, different DWT sub-bands, and image processing attacks. Experimental results demonstrate that the method is imperceptible and robust for different image processing attacks.
1 Introduction
Nowadays, growth in technology such as computers and computer network offers widespread use of multimedia contents such as digital image, audio, and video [17, 20, 22, 23, 24, 25, 27, 29]. This growth has also made easy the duplication and distribution of these multimedia data. Therefore, protection of multimedia content has become an essential and difficult job. Cryptography, steganography, and digital watermarking are the important methods for protection of multimedia contents [27]. The important differences between these three methods are illustrated in Table 1 [27]. The image watermarking technique is a security tool for hiding digital information into multimedia cover documents. The hidden watermark can be later extracted or detected for the purpose of multimedia document security. As discussed in Table 1, the watermarking technique is better than other methods (cryptography and steganography) for protection of multimedia contents.
Essential Difference between Cryptography, Steganography, and Watermarking.
Cryptography | Steganography | Watermarking |
---|---|---|
Secret writing | Covered writing | Covered writing |
Protection of data in encoded form | Concealing any data | Hide the digital object information and robustness is on top |
Message will be unsecure once the it is decrypted, which is required for human perception | Hide the data within cover, no one can detect it | Hide the data even after decryption |
The key characteristics of the digital watermark are imperceptibility, robustness, security, data pay load, and computational complexity [25]. However, it is noticed that these characteristics are hindering each other. Therefore, it is clear that there are different watermarking techniques for improving one or a subset of these characteristics, but they compromise with other remaining characteristics. The popular application of digital watermarking is depicted in Figure 1 [25].

Potential Applications of Digital Watermarking.
Depending on the type of multimedia data to be watermarked, the watermarking methods is defined as text, image, audio, and video watermarking [23, 25]. Out of four multimedia data types, data embedding capacity of the image is better than other media. In this context, the present work considers image as cover media. Image watermarking is divided into spatial and transform domain techniques. However, the transform domain techniques are more robust than the spatial domain techniques, as reported by various surveys [17, 20, 22, 23, 24, 27, 29]. The important transform domain techniques are discrete wavelet transform (DWT), Karhunen-Loeve transform (KLT), discrete Fourier transform, and singular value decomposition (SVD).
Recently, the higher robustness of watermark has been achieved by using wavelet based watermarking [1, 17, 20, 22, 23, 24, 25, 27, 29]. The DWT is a filter based system, which decomposes an image into a set of four non-overlapping multi-resolution sub-bands. The human eyes are much more sensitive to low-low (LL) sub-band of DWT; the watermark can be embedded into the other three sub-bands to maintain better visual quality of the image. The process can be repeated to obtain multiple scale wavelet decomposition. Further, it is observed that the energy of an image is concentrated in the high decomposition levels corresponding to the perceptually significant low frequency coefficients; the low decomposition levels accumulate a minor energy proportion, thus being vulnerable to image alterations. Therefore, watermarks requiring great robustness are embedded in higher level DWT sub-bands. However, DWT has poor directional information, shift sensitivity, and lack of phase information.
The subsequent part of the paper is structured as follows: Section 2 presents a brief literature review of some state-of-the-art techniques. Section 3 summaries the current state-of-the-art techniques. Section 4describes the proposed watermarking technique. Experimental results along with performance analysis are presented in Section 5. Section 6 provides concluding remarks of overall work followed by future scope of the work.
2 Literature Review
In this section, we are presenting a detailed review of related and recent watermarking methods.
Ali Al-Haj [1] proposed a combined robust and imperceptible image watermarking method using a combination of DWT and discrete cosine transform (DCT). The pseudo-noise (PN) sequence is generated for the gray scale watermark information before embedding into the cover image. Further, the sequence number is embedded into the DCT transform of the cover image. The visual quality and robustness performance of the method is evaluated and found to be robust for different known attacks. The authors in [14] present a robust and secure watermarking method through DWT, Arnold transform, and code division multiple access (CDMA). Initially, the Y component of the YIQ color model is decomposed by DWT, and the scrambled binary watermark information is encrypted by using the CDMA to generate a random number sequence. This sequence is now embedded into the selected sub-band of the DWT cover. The robustness of the method is evaluated for different attacks. Simultaneous embedding of robust and fragile watermark on the cover image using pseudo-random sequence based bit substitution is proposed by Shen and Chen [21]. Initially, the method decomposes the cover image up to third level DWT where the fragile and robust watermark is embedded into the significant and non-significant coefficient of the DWT, respectively. The method is extensively evaluated for various attacks. A robust and secure logo watermarking technique through SVD and fractional wavelet packet transform (FRWPT) is presented by Bhatnagar et al. [4]. Initially, the considered host image is decomposed into the different sub-bands by FRWPT, and SVD is applied on the FRWPT transformed coefficients. The singular value of the transformed FRWPT coefficients is modified with the singular value of the watermark image. The performance of the method is extensively evaluated in terms of peak signal-to-noise ratio (PSNR), NC, and computational and time complexity. Arsalan et al. [3] developed a blind medical image watermarking method using genetic algorithm (GA) and integer wavelet transform (IWT). In the block (size=16) based embedding process of the watermark, compression function is applied on IWT coefficients, and the watermark bit is embedded into the compressed coefficient. The compression function is only applied on those IWT coefficients which are greater than or equal to a chosen threshold value. Bouslimi et al. [6] proposed a combined encryption and watermarking technique for verifying the reliability of the echographic image through Rivest Cipher 4 (RC4), quantization index modulation (QIM), and spatial domain least significant bit (LSB) technique. The experimental results demonstrated that the performance of the method is evaluated in terms of entropy and PSNR. Lei et al. [16] proposed a watermarking technique for binary image through Haar wavelet. Initially, the cover binary image is divided into different blocks, whereas each block is also divided into the embedding and level area. Further, the method determined the number of black pixels for every block. The method first determines the flippable pixels through Haar wavelet and these pixels are embedding into the selected area of the cover image. Rosiyadi et al. [19] describe a robust and non-blind image watermarking method for copyright protection of e-government documents through DCT, SVD, and GA. In the embedding process of the logo watermark, DCT is applied on cover e-government document image using the space-filling curve for the DCT coefficients of the cover. Further, SVD is applied on each area of the DCT coefficients having different frequencies in a rectangular shape. The SVD coefficient of the cover document is modified by the control parameters consisting of the left singular vectors and singular values of the DCT-transformed logo watermark to avoid the false-positive problem as suffered by the SVD based watermarking techniques. In addition to that, the scaling factor is optimized by using the GA. The experimental results demonstrated that the performance of the method is extensively evaluated for all four areas of the DCT coefficients and found to be robust for the 19 different attacks. Bhatnagar et al. [5] proposed a robust DWT based watermarking method where the logo watermark of size 32×32 is embedded into the significant wavelet coefficient of the cover image using ZIG-ZIG sequence. The experimental result demonstrated that the performance of the method is evaluated in terms of PSNR, NC, and time efficiency (embedding and extraction) for different images. For the copyright, protection through image watermarking method is proposed by Lang and Sun [15] using fractional Fourier transform (FRFT) and hyperchaos. The middle coefficients of the FRFT transformed cover image are considered to embed binary watermark. The experimental results established that the method is robust for different attacks. Horng et al. [12] presents a robust and secure blind watermarking technique for the protection of e-governance document using DCT, SVD and GA. In the embedding process of the watermark logo image, DCT is applied on the gray scale cover image. All the DCT coefficients of the cover image are scanned into the four different blocks (from lower to higher) in a zigzag way. Further, SVD is applied on each block of the DCT transformed image where the singular value of each block of the DCT coefficient is modified with quantizing value using GA. The motivation behind using the GA is to improve the PSNR and NC performance of watermarking algorithms. Rahmati et al. [18] proposed watermarking method to protect verification documents for E-commerce application. In this method, a person identification number considered as watermark is embedded into the cover digital card image using block based watermarking algorithm. The performance (PSNR and average error ratio) of the method is evaluated for print scan attack. Region based multiple watermarking method is presented in [2] for securing the medical information through DWT, SVD, and LSB technique. The patient information considered as robust watermark is embedded in the region of noninterest (RONI) of the image through the transform domain techniques which provide the confidentiality and authenticity of the image. However, the logo watermark is considered as fragile watermark and is embedded into the region of interest (ROI) part of the cover image through LSB technique to provide the image integrity. Experimental results established that the performance of the method is extensively evaluated for various attacks. Dual level security for the medical applications is also provided through combined encryption and watermarking technique proposed by Kannammal and Rani [13]. In the embedding process of the medical image watermark, the watermark is embedded into the selected sub-band of the natural cover image. Further, the security of the watermarked is enhanced by using three different encryption techniques applied on the watermarked image. The performance of these three encryption techniques is compared in terms of time to encrypt and decrypt the message. The experimental results established that the method is robust for different kinds of attacks, and the RC4 encryption technique performs better than the other two encryption techniques. Singh et al. [26] proposed a robust medical image watermarking method through DWT and SVD. The method is embedding the image and text watermark simultaneously into the DWT cover image for patient recognition purposes. Further, the bit error rate (BER) performance of the method is reduced by applying four different error correcting codes (ECCs) on the text watermark of size 20 characters before embedding into the medical cover image. The performance of the method is extensively evaluated for various attacks with and without using the ECCs. The experimental results demonstrated that the performance of hybrid ECCs consisting of Bose–Chaudhuri–Hocquenghem and repetition code is better than other ECCs. Singh et al. [24] proposed a secure spread spectrum based text watermarking technique, where four different medical text watermarks are embedded simultaneously at different DWT sub-bands of the medical cover image to solve the medical data management issues. Further, the security of the medical information is enhanced by using encryption technique before the information is embedded into the cover image. The method is robust for various signal processing attacks. The proposed method can embed 104 characters without degradation of the visual quality of the watermarked image. Chen and zhao [8] developed a robust and blind watermarking technique for 3D images using contourlet transform and depth-image-based rendering (DIBR). The watermark generated through spread spectrum method and each watermark bits is embedded into the selected coefficients of the cover contourlet sub-bands through proper quantization. In [10] authors present a JND (just noticeable distortion) DCT based visible watermarking technique, where JND is used to rectify the distortion made by the embedding process. For watermark embedding, grey scale cover image is divided into nonoverlapping blocks, and DCT is applied on the different blocks. To achieve the embedding strength, the mapping is performed on the watermarking intensity range and the cover image’s intensity range using JND technique. An improved spread transform dither modulation based robust and secure watermarking technique is proposed by Cao et al. [7]. The watermark is only embedded into the selected embedding subspace. The security and robustness performance of the method is extensively evaluated for estimation of projection vector and amplitude scaling attacks, respectively. Zolotavkin and Juhola [30] proposed a robust watermarking method using QIM. The performance of the method is measured by watermark to noise ratio (WNR) and document to watermark ratio (DWR). The method is found to be robust. It provides high robust for additive white Gaussian noise and gain attack. Wang and Allebach [28] proposed a halftone image watermarking in which watermark is embedded into the halftone by using synchronization pattern. The performance of the method is evaluated in terms of PSNR, normalized human visual system (HVS) mean square error, and watermark rate and found to be good visual quality and achieved high watermark capacity. Essaidani et al. [9] present a robust image watermarking method using Delaunay triangulation and the feature points of the cover image. The sobel edge detector is used to determine the feature points which are used to produce Delaunay triangulation. A region based robust and secure watermarking method is presented by Sharma et al. [20] for medical applications. The method initially uses DWT and DCT to embed multiple watermark information into the cover medical image. Further, the security of the image and text watermark information is enhanced by message digest (MD5) hash algorithm and Rivest-Shamir-Adleman (RSA), respectively, before embedding into the medical cover image. In order to enhance the robustness of the text watermark, Hamming error correction code is also applied on the encrypted watermark. The experimental results have shown that the method is robust for important signal processing attacks.
3 Current State-of-the-Art Watermarking
The current state-of-the-art in wavelet based image watermarking as available in the literature is given below.
In [8], an author has developed a robust and blind watermarking technique for 3D images.
A summary of various state-of-the-art techniques is presented in Table 2.
Summary of State-of-the-art Techniques.
Reference number | Objective | Technique to achieve the objective | Results | Other important points/issues | |
---|---|---|---|---|---|
[20] | Secure multiple watermarking technique using various ECCs for medical images | DWT, DCT, RSA Hamming code, MD5 | PSNR (without processing attacks): 51.833272 dB Max NC value for Gaussian LPF: 0.965043 BER for Gaussian LPF: 0.123c3 | – | Medical image of size of 512×512 and watermark of size 256×256 is selected |
– | DWT is being applied to LL of ROI and LL band of NROI of cover image | ||||
– | Low NC value against the rotation attack | ||||
– | NC value drops if the value of noise is increased in salt and pepper attack and speckle attack | ||||
– | Robustness is increased using Hamming code | ||||
– | PSNR value decreases if gain factor is increased | ||||
[17] | Robust and secure watermarking technique for teleophthalmology application | DWT, SVD, SHA-512, ROI, and NROI | PSNR value=39.97 dB and BER=0 against at gain factor=0.2, where NC=0.99 at same gain | – | Robust against various kinds of attacks including checkmark attacks |
– | Cover and watermark image of size 1024×1024 and 512×512, respectively. The EPR text watermark of size=5145 bits | ||||
[24] | Secure, robust spread spectrum based text watermarking technique for medical image | Harr wavelet transform | Gain factor: 15 PSNR: 31.23 dB with encryption of 104 BER(%) Median filtering characters: 0.0480 | – | Tested for test watermarks |
– | Gray scale cover image is used | ||||
– | High BER value with JPEG compression attack (0.4326) | ||||
– | High multiresolution, superior HVS quality | ||||
– | Text watermarks are added to the third band HL3 and LH3 sub-bands | ||||
– | Patient records are added to the HL2 and LH2 sub-bands | ||||
– | Complexity is increased as the text watermark is encrypted | ||||
[1] | Robust and imperceptible watermarking method for copyright protection | DWT, DCT | Max NC for Gaussian attacks=0.9738 Max PSNR(with HL2 sub-bands)=97.072 dB | – | Combined techniques compensate the drawback of each other |
– | Tested for different DWT sub-bands and three important attacks | ||||
– | Grey scales cover and watermark image of size 512×512 and 256×256, respectively | ||||
[14] | Robust and secure watermarking method | DWT2, Arnold scramble, CDMA | For value k=0.5 PSNR (Lena): 78.01 dB Max correlation (JPEG compression attack): 0.9999 | – | Tested for small watermark sizes (27×27) |
– | Cover image size is 512×512 | ||||
– | Addition of more PN sequence alters the image transparency | ||||
– | High complexity due to the scrambling | ||||
[21] | Using multiple watermarking to protect the information and integrity of media | Three level DWT, pseudo random sequence based bit substitution | PSNR (mean shift ): 28.5274 Max NC for median filter attack:0.9999 | – | Fragile watermark technique |
– | Two watermarks are used (robust and fragile) | ||||
– | NC falls to 0.6062 when noise is increased 10% | ||||
[4] | Secure, imperceptible, user adjustable watermarking scheme | SVD, FRWPT | PSNR: 41.0695 dB Correlation coefficient: 0.7296 (sharpen attack) | – | Tested on gray scale images |
– | High complexity | ||||
– | Cropping attack lead to cropping of the watermarked image | ||||
– | Quality of image is directly associated with the watermark | ||||
[3] | Imperceptible and intelligent watermarking scheme for medical images | Block based embedding, GA, integer wavelet transform | PSNR: (X-ray) 56.6 SSIM (Lena): 0.9982 | – | Gray Scale images are used, both cover and watermark |
– | If number of block size increased, then threshold matrix is increased for extraction | ||||
[6] | Joint encryption and watermarking to ensure integrity and authenticity for medical images | LSB substitution, QIM modulation, RC4 | PSNR: 49.366 Entropy of encrypted image: 7.995 | – | Gray scale watermark is used |
– | Less robust to attack like lossy image compression | ||||
– | Digital signatures are used to ensure the reliability of the image | ||||
– | Embedded messages are randomly generated | ||||
[16] | Robust and blind watermarking schemes for binary cover images | Harr wavelet transform | Number of black flappable pixels: Text: 2770 Picture: 2502 Number of white flappable pixels: Text: 2620 Picture: 2567 Text: 3.4673 Picture: 2.4063 | – | Increased salt and pepper noise alters the detection of the watermark |
– | Probability of error increases if the mean value of Gaussian noise is increased | ||||
[19] | Robust and non-blind image watermarking method for copyright protection of e-government documents | DCT, SVD | Cropping on right half with replacement: PSNR: 36.6554 NC: 0.9882 | – | Low PSNR value for rotation attacks |
– | Low NC value for Gaussian noise | ||||
– | Can be implemented by adaptive watermarking scheme based on texture and edge masking | ||||
[5] | Secure and robust watermarking technique based on image fusion | DWT | PSNR (Lena): 57.7460 Time efficency (extraction+embedding): 11.0994 | – | Gray scale watermark is used |
– | Watermark size is particularly smaller (32×32) | ||||
– | Gray scale cover image (256×256 is used) | ||||
– | Single watermark is used | ||||
– | Increase in noise; degrade the watermark (extracted watermark noisy) | ||||
[15] | Robust, imperceptible, secure watermarking scheme for copyright protection | Hyperchaos system, FRFT | NC (salt and pepper noise): 0.94596 | – | Gray level image is used (Cover) 512×512 and watermark size is 64×64 pixels |
– | Binary image is used as the watermark | ||||
– | If the standard deviation is increased, the NC value drops for all attacks | ||||
[12] | Robust and secure method for copyright protection of E-documents | DCT, SVD, GA | Gaussian noise for variance value 1.5 PSNR: 22.2400 NC: 0.5891 | – | Increase in computational complexity after applying SVD to the DCT transformed image |
– | Single watermark is used | ||||
– | Blind watermarking scheme | ||||
– | NC value drops if variance is increased | ||||
[18] | Watermarking method for protecting verification documents for E-commerce application | Block based watermarking algorithm | PSNR: 44.3324 Average error ratio (rotation 5°): 1.12% | – | Identification number is taken as a watermark |
– | High average error ratio if cropping rate is increased 75% | ||||
[2] | Secure, blind region based watermarking scheme for medical images | DWT, LSB, SVD | PSNR: 34.1107 (X-ray image) Gaussian noise NC: 0.979 | – | ROI is watermarked in the spatial domain and RONI is watermarked in frequency domain (fragile and robust watermarks) |
– | Low robust to JPEG compression attack | ||||
– | Time for execution is high if smaller block is used for watermarking process | ||||
[13] | Robust dual level security for the medical applications | Discrete non-tensor product wavelet transform, RSA, AES, RC4 | (Brightness attack) PSNR: 91.70 dB NC: 1 (RC4 encrypted) CV: 0.09 SSIM:0.677 | – | Tested on radiological images |
– | Watermark is embedded on the LH sub-band by LSB substitution | ||||
– | Watermark processing complexity is increased as the watermarked image is encrypted with encryption algorithm | ||||
– | RC4 results in speed and performance are better than AES and RSA | ||||
[26] | Robust, secure medical image watermarking | DWT, SVD | Highest PSNR obtained with ECCs (140 text bits) is 37.22 dB NC: 1 BER: 0 (all gain factors) | – | Gray level image is made as a cover image (512×512) |
– | Two watermarks (text and image) were added | ||||
– | Four different types of ECCs were used | ||||
– | Image watermark is embedded using DWT and SVD and text watermark using ECCs | ||||
[8] | Robust and blind watermarking technique for 3D images | Contourlet transform, (DIBR) | For art image: PSNR: 42.71 SSIM: 0.995 MOS: 4.7 | – | Quality factor decreased if BER increased in the case of JPEG compression |
– | Gaussian noise variance increased if BER increased in case of Gaussian noise | ||||
[10] | Robust visible watermarking technique | JND, DCT | Obtrusiveness controlling factor: 60 | – | Gray scale watermark image is used |
– | Can be used with the JND estimation | ||||
– | To avoid blocking artifact JND b=0 | ||||
– | Future scope involves finding the non-linearity between the watermark and texture | ||||
[7] | Secure and robust (to amplitude scaling) technique for watermarking | STDM, ISTDM | WCR: 20 dB Nv=400 | – | ISTDM uses STDM to embed the watermark in embedding space |
– | Only tested with text watermark | ||||
– | Comparative study is done and tested for Gaussian noise and amplitude scaling | ||||
[30] | Robust watermarking method using scalar quantization to achieve higher amount of extracted information | GA, brute force optimization, RDM, DCQIM | DWR: 28 dB WNR: 12 dB | – | Tested for gray scale images |
– | Not tested for the watermark tampering attacks | ||||
– | Optimization of the embedding procedure is computationally difficult | ||||
[28] | Robust, imperceptible halftone image watermarking technique | Half toning, DBS | For host image (Lena) PSNR: 30.3 dB NMSE: 24.5 dB BER: 0.73% WMR: 4.62% PER: 0.79% | – | Complexity is increased due to every step pixel-by-pixel scanning |
– | Cover image of size 512×512 is chosen | ||||
– | Error decoding rate depends on the P&S recovery | ||||
[9] | Robust, blind image watermarking method using Delaunay triangulation | Delaunay triangulation | NC (Rot crop_0.5): 19.9123 PSNR: 42.62 dB | – | High complexity |
– | Modified triangulation is immune to the geometric transformation | ||||
– | Tested on gray scale (665*586) cover image | ||||
– | Watermark size is particularly smaller (28×28) |
FRWPT, fractional wavelet packet transform; SVD, singular value decomposition; DWT, discrete wavelet transform; CDMA, code division multiple access; RSA, Rivest Shamir and Adleman; FRFT, fractional fourier transform; DIBR, depth-image-based rendering; DBS, direct binary search; DCT, discrete cosine transform; STDM, spread transform dither modulation; ISTDM, improved spread transform dither modulation; GA, genetic algorithm; LSB, least significant bit; EPR, electronic patient record; MOS, mean opinion score; RDM, rational dither modulation; DC-QIM, distortion compensated quantization index modulation; NMSE, normalized HVS mean squared value; WMR, watermark rate; PER, pixel error rate; P&S, printing and scanning; SSIM, the structural similarity index; AES, advanced encryption standard.
4 Proposed Technique
In this paper, a robust and imperceptible watermarking technique is proposed using fusion of DWT and KLT instead of applying DWT or KLT individually. The KLT for digital images has been discussed detail in [11]. Figure 2A and B show the watermark embedding and extraction process, respectively. The extraction algorithm is just the reverse process of the embedding algorithm. The cover image is decomposed by DWT, and KLT transform is applied on the selected sub-band of the cover. The watermark information transformed by DWT is embedded into the KLT coefficients of the DWT cover image. In order to enhance the visual quality of the watermarked image and reduce the bandwidth requirements, different de-noising dictionary based method is applied on the image. It is noticed that adaptive based dictionary method is better than DCT and global dictionary method. The method is also robust for different image processing attacks.

Watermark (A) Embedding and (B) Extraction Process.
5 Experimental Result and Analysis
In this section, the performance of the proposed watermarking technique in terms of PSNR and NC has been investigated. For testing the visual quality (determined by PSNR) of the watermarked image and robustness (determined by NC) of the possibly distorted watermark, image MATLAB is used. The weighted peak signal to noise ratio (WPSNR) [25] is a modified version of the PSNR. Further, WPSNR uses noise visibility function to determine how much texture exists in any area of an image. In the proposed technique cover image of size 512×512 [5], the image watermark of different sizes (512×512, 256×256, and 64×64) are used for testing. Figure 3A shows the cover image and Figure 3B–D shows watermark images different sizes. The performance of the proposed technique is extensively determined in Tables 3–5 . It is noticed that larger gain factor results in stronger robustness of the extracted watermark, whereas smaller gain factor provides better visual quality of the watermarked image. It is quite apparent that the size of the watermark affects the quality of the watermarked image. However, degradation in quality of the watermarked image will not be observable if the size of watermark is small. Table 3 shows the performance of the proposed technique that is evaluated at different gains along with three different de-noising techniques. It is noticed that the PSNR performance with adaptive dictionary based de-noising method is better than the other two. However, the NC values are always greater than 0.9710 at the selected gain factors ranging from 0.04 to 0.1. Due to better robustness performance of the proposed technique, we are selecting the gain=0.1. Table 4 shows the PSNR and NC performance of the proposed technique with different sizes of watermark images. It is observed that the PSNR and NC values are always greater than 31 dB and 0.9583, respectively. Table 5 shows the NC performance of the proposed technique for different attacks. Refereeing this table, it is observed that the NC value is always greater than 0.9437.
Performance at Different Gain.
Gain | PSNR | NC | PSNR with DCT dictionary | PSNR with global dictionary | PSNR with adaptive dictionary |
---|---|---|---|---|---|
0.1 | 31.29 | 0.9924 | 31.32 | 31.59 | 31.72 |
0.09 | 31.31 | 0.9905 | 31.34 | 31.59 | 31.73 |
0.08 | 31.31 | 0.9886 | 31.38 | 31.64 | 31.77 |
0.07 | 31.31 | 0.9858 | 31.37 | 31.64 | 31.76 |
0.06 | 31.31 | 0.9823 | 31.383 | 31.63 | 31.77 |
0.05 | 31.30 | 0.9778 | 31.328 | 31.58 | 31.7 |
0.04 | 31.31 | 0.9710 | 31.33 | 31.61 | 31.71 |
PSNR and NC Performance for Different Size of Watermark.
Watermark size | PSNR (in dB) | NC |
---|---|---|
256*256 | 31.3149 | 0.9731 |
128*128 | 31.3176 | 0.9583 |
64*64 | 31.32 | 1.00 |
NC Performance Against Attacks at Gain=0.1.
Attack | NC value |
---|---|
Speckle noise at different intensity level | |
0.01 | 0.9868 |
0.02 | 0.9800 |
0.03 | 0.9761 |
0.04 | 0.9719 |
Salt and pepper noise at different intensity level | |
0.01 | 0.9888 |
0.02 | 0.9859 |
0.03 | 0.9827 |
0.04 | 0.9792 |
Poisson noise | 0.9871 |
Gaussian noise with mean=0 and different variance | |
0.01 | 0.9594 |
0.02 | 0.9437 |
Gaussian noise with mean=0.002 and different variance | |
0.01 | 0.9582 |
0.02 | 0.9457 |

(A) Cover Image and Watermark Image of Size (B) 512×512, (C) 128×128, and (D) 64×64.
6 Conclusions and Future Directions
In this paper, we have presented a brief introduction of digital watermark, important applications, and a detailed literature review of different state-of-the-art watermarking methods. The summary of some existing techniques is presented in tabular format. In addition, a robust watermarking technique using fusion of discrete wavelet transform (DWT) and KLT for digital images is proposed. Further, visual quality of the watermarked image is enhanced by using different image de-noising techniques. The purpose of combined DWT-KLT is to improve the robustness of the watermark at acceptable visual quality of the watermarked image which is the prime objective of the research. However, it may have increased the computational complexity to some extent which needs to be investigated separately. The computational complexity of the proposed watermarking method can be minimized by selecting and exploring the other wavelet instead of DWT. In future, the performance of the method can also be improved with directional transform techniques, different error correction codes, and machine learning/GAs. In addition, the robustness performance of the method can also be determined with standard benchmark software.
We would like to further improve the performance, which will be reported in future communication.
Acknowledgments
The authors are sincerely thankful to the potential/anonymous reviewers for their critical comments and suggestions to improve the quality of the paper.
Bibliography
[1] A. Al-Haj, Combined DWT-DCT digital image watermarking, J. Comput. Sci. 3 (2007), 740–746.10.3844/jcssp.2007.740.746Suche in Google Scholar
[2] A. Al-Haj and A. Amer, Secured telemedicine using region-based watermarking with tamper localization, J. Digit. Imaging27 (2014), 737–750.10.1007/s10278-014-9709-9Suche in Google Scholar PubMed PubMed Central
[3] M. Arsalan, S. A. Malik and A. Khan, Intelligent reversible watermarking in integer wavelet domain for medical images, J. Syst. Software85 (2012), 883–894.10.1016/j.jss.2011.11.005Suche in Google Scholar
[4] G. Bhatnagar, Q. M. J. Wu and B. Raman, A new robust adjustable watermarking scheme, Comput. Secur.31 (2011), 40–58.10.1016/j.cose.2011.11.003Suche in Google Scholar
[5] G. Bhatnagar, Q. M. J. Wu and B. Raman, Robust gray scale watermarking in wavelet domain, Recent Adv. Secur. Privacy Dist. Commun. Image Proc.38 (2012), 1164–1176.10.1016/j.compeleceng.2012.02.002Suche in Google Scholar
[6] D. Bouslimi, G. Coatrieux and C. Roux, A joint encryption encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images, Comput. Meth. Prog. Bio.106 (2011), 47–54.10.1016/j.cmpb.2011.09.015Suche in Google Scholar PubMed
[7] J. Cao, H. Li, W. Luo and J. Huang, An improved spread transform dither modulation for robust and secure watermarking, IEEE24 (2016), 2718–2722.10.1109/ICIP.2016.7532853Suche in Google Scholar
[8] L. Chen and J. Zhao, Robust contourlet-based watermarking for depth-image-based rendering 3D images, in: IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), ISSN: 2155–5052, 2015.10.1109/BMSB.2016.7521956Suche in Google Scholar
[9] D. Essaidani, H. Seddik and E. Ben Braiek, Robust and blind watermarking approach based on modified delaunay triangulation, in: 2nd International Conference on Advanced Technologies for Signal and Image Processing - ATSIP’2016, IEEE, March 21–24, 2016.10.1109/ATSIP.2016.7523049Suche in Google Scholar
[10] E. Fragoso-Navarro, H. Santoyo-García, K. Rangel-Espinoza, M. Nakano-Miyatake and R. Reyes-Reyes, Visible watermarking technique in compressed domain based on JND, in: International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), pp. 1–6, IEEE, 2015, Mexico City, Mexico.10.1109/ICEEE.2015.7357921Suche in Google Scholar
[11] M. A. Hajjaji, E.-B. Bourennane, A. B. Abdelali and A. Mtibaa, Combining Haar wavelet and Karhunen Loeve transforms for medical images watermarking, BioMed Res. Int.2014 (2014), 1–15.10.1155/2014/313078Suche in Google Scholar PubMed PubMed Central
[12] S.-J. Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo and M. K. Khan, A blind image copyright protection scheme for e-government, J. Vis. Commun. Image R.24 (2013), 1099–1105.10.1016/j.jvcir.2013.07.008Suche in Google Scholar
[13] A. Kannammal and S. S. Rani, Two level security for medical images using watermarking/encryption algorithms, Int. J. Imag. Syst. Tech.24 (2014), 111–120.10.1002/ima.22086Suche in Google Scholar
[14] M. Khalili, A secure and robust CDMA digital image watermarking algorithm based on DWT, YIQ color space and arnold transform, Signal Image Proc. Int. J.2 (2011).10.5121/sipij.2011.2211Suche in Google Scholar
[15] J. Lang and J.-Y. Sun, Digital watermarking algorithm based on hyperchaos and fractional Fourier transform, in: IEEE 14th International Conference on Communication Technology (ICCT), pp. 691–694, 2012.10.1109/ICCT.2012.6511287Suche in Google Scholar
[16] J. Lei, S. Zhiyuanb, C. Yaping, F. Yong, A Haar wavelet transform based watermarking algorithm for binary images, Int. Conf. Comput. Elect. Eng.13 (2011), 2972–2978.Suche in Google Scholar
[17] R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, Multimed. Tools Appl.75 (2016), 14381–14397, DOI: 10.1007/s11042-016-3536-6.10.1007/s11042-016-3536-6Suche in Google Scholar
[18] P. Rahmati, A. Adler and T. Tran, Watermarking in e-commerce, Int. J. Adv. Comput. Sci. Appl.4 (2013), 252–265.10.14569/IJACSA.2013.040634Suche in Google Scholar
[19] D. Rosiyadi, S.-J. Horng, P. Fan, X. Wang, M. K. Khan and P. Yi, An efficient copyright protection scheme for e-government document images, in IEEE MultiMedia19 (2012), 62–73.10.1109/MMUL.2011.41Suche in Google Scholar
[20] A. Sharma, A. K. Singh and S. P. Ghrera, Robust and Secure Multiple Watermarking Technique for Medical Images, Wireless Pers. Commun.92 (2016), 1611–1624, Springer US, DOI: 10.1007/s11277-016-3625-x.10.1007/s11277-016-3625-x.Suche in Google Scholar
[21] H. Shen and B. Chen, From single watermark to dual watermark: a new approach for image watermarking, Recent Adv. Secur. Privacy Dist. Commun. Image Proc.38 (2012), 1310–1324.10.1016/j.compeleceng.2011.11.012Suche in Google Scholar
[22] A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl., Springer US, 2016, DOI: 10.1007/s11042-016-3514-z.10.1007/s11042-016-3514-z.Suche in Google Scholar
[23] A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl.75 (2015), 8381–8401, DOI: 10.1007/s11042-015-2754-7, Springer US.10.1007/s11042-015-2754-7Suche in Google Scholar
[24] A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133–2150, DOI: 10.1007/s11277-015-2505-0, Springer US.10.1007/s11277-015-2505-0Suche in Google Scholar
[25] A. K. Singh, B. Kumar, M. Dave, S. P. Ghrera and A. Mohan, Digital image watermarking: techniques and emerging applications, in: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, pp. 246–272, 2016, IGI Global, USA, DOI: 10.4018/978-1-5225-0105-3.ch011.10.4018/978-1-5225-0105-3.ch011Suche in Google Scholar
[26] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Robust and imperceptible dual watermarking for telemedicine applications. Wireless Pers. Commun.80 (2014), 1415–1433, Springer.10.1007/s11277-014-2091-6Suche in Google Scholar
[27] A. K. Singh, B. Kumar, S. K. Singh and A. Mohan, Multiple watermarking technique for securing online social network contents using back propagation neural network, Future Gener Comp Sy. 2016, In Press, DOI: 10.1016/j. future.2016.11.023.10.1016/j. future.2016.11.023.Suche in Google Scholar
[28] F. Wang and J. P. Allebach, Printed image watermarking using direct binary search halftoning, in: IEEE International Conference of Image Processing (ICIP), ISSN: 2381-8549, IEEE 2016.10.1109/ICIP.2016.7532855Suche in Google Scholar
[29] A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimed. Tools Appl. (2016), Springer US, DOI: 10.1007/s11042-016-3862-8.10.1007/s11042-016-3862-8Suche in Google Scholar
[30] Y. Zolotavkin and M. Juhola, A new scalar quantization method for digital image watermarking, J. Electr. Comput. Eng.2016 (2016) 1–16.10.1155/2016/9029745Suche in Google Scholar
©2018 Walter de Gruyter GmbH, Berlin/Boston
This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Artikel in diesem Heft
- Frontmatter
- Editorial
- Introduction to the Special Issue on Recent Developments in Multimedia Watermarking Using Machine Learning
- Multiple Watermarking for Healthcare Applications
- Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
- An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization
- A Novel Scene-Based Video Watermarking Scheme for Copyright Protection
- Novel Relevance Feedback Approach for Color Trademark Recognition Using Optimization and Learning Strategy
- A Parallel Algorithm for Wavelet Transform-Based Color Image Compression
- Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images
- Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network
- An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm
Artikel in diesem Heft
- Frontmatter
- Editorial
- Introduction to the Special Issue on Recent Developments in Multimedia Watermarking Using Machine Learning
- Multiple Watermarking for Healthcare Applications
- Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
- An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization
- A Novel Scene-Based Video Watermarking Scheme for Copyright Protection
- Novel Relevance Feedback Approach for Color Trademark Recognition Using Optimization and Learning Strategy
- A Parallel Algorithm for Wavelet Transform-Based Color Image Compression
- Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images
- Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network
- An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm