Startseite Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images
Artikel Open Access

Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images

  • Akankasha Sharma , Amit Kumar Singh EMAIL logo und Pardeep Kumar
Veröffentlicht/Copyright: 25. Mai 2017
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks. Further, recent state-of-the-art watermarking techniques as reported by noted authors are discussed in brief. It includes the performance comparison of reported transform/spatial domain based watermarking techniques presented in tabular form. This comprehensive survey will be significant for researchers who will be able to implement more efficient watermarking techniques. Moreover, we present a robust watermarking technique using fusion of discrete wavelet transform (DWT) and Karhunen-Loeve transform for digital images. Further, visual quality of the watermarked image is enhanced by using different image de-noising techniques. The results are obtained by varying the gain factor, size of the image watermark, different DWT sub-bands, and image processing attacks. Experimental results demonstrate that the method is imperceptible and robust for different image processing attacks.

1 Introduction

Nowadays, growth in technology such as computers and computer network offers widespread use of multimedia contents such as digital image, audio, and video [17, 20, 22, 23, 24, 25, 27, 29]. This growth has also made easy the duplication and distribution of these multimedia data. Therefore, protection of multimedia content has become an essential and difficult job. Cryptography, steganography, and digital watermarking are the important methods for protection of multimedia contents [27]. The important differences between these three methods are illustrated in Table 1 [27]. The image watermarking technique is a security tool for hiding digital information into multimedia cover documents. The hidden watermark can be later extracted or detected for the purpose of multimedia document security. As discussed in Table 1, the watermarking technique is better than other methods (cryptography and steganography) for protection of multimedia contents.

Table 1:

Essential Difference between Cryptography, Steganography, and Watermarking.

CryptographySteganographyWatermarking
Secret writingCovered writingCovered writing
Protection of data in encoded formConcealing any dataHide the digital object information and robustness is on top
Message will be unsecure once the it is decrypted, which is required for human perceptionHide the data within cover, no one can detect itHide the data even after decryption

The key characteristics of the digital watermark are imperceptibility, robustness, security, data pay load, and computational complexity [25]. However, it is noticed that these characteristics are hindering each other. Therefore, it is clear that there are different watermarking techniques for improving one or a subset of these characteristics, but they compromise with other remaining characteristics. The popular application of digital watermarking is depicted in Figure 1 [25].

Figure 1: Potential Applications of Digital Watermarking.
Figure 1:

Potential Applications of Digital Watermarking.

Depending on the type of multimedia data to be watermarked, the watermarking methods is defined as text, image, audio, and video watermarking [23, 25]. Out of four multimedia data types, data embedding capacity of the image is better than other media. In this context, the present work considers image as cover media. Image watermarking is divided into spatial and transform domain techniques. However, the transform domain techniques are more robust than the spatial domain techniques, as reported by various surveys [17, 20, 22, 23, 24, 27, 29]. The important transform domain techniques are discrete wavelet transform (DWT), Karhunen-Loeve transform (KLT), discrete Fourier transform, and singular value decomposition (SVD).

Recently, the higher robustness of watermark has been achieved by using wavelet based watermarking [1, 17, 20, 22, 23, 24, 25, 27, 29]. The DWT is a filter based system, which decomposes an image into a set of four non-overlapping multi-resolution sub-bands. The human eyes are much more sensitive to low-low (LL) sub-band of DWT; the watermark can be embedded into the other three sub-bands to maintain better visual quality of the image. The process can be repeated to obtain multiple scale wavelet decomposition. Further, it is observed that the energy of an image is concentrated in the high decomposition levels corresponding to the perceptually significant low frequency coefficients; the low decomposition levels accumulate a minor energy proportion, thus being vulnerable to image alterations. Therefore, watermarks requiring great robustness are embedded in higher level DWT sub-bands. However, DWT has poor directional information, shift sensitivity, and lack of phase information.

The subsequent part of the paper is structured as follows: Section 2 presents a brief literature review of some state-of-the-art techniques. Section 3 summaries the current state-of-the-art techniques. Section 4describes the proposed watermarking technique. Experimental results along with performance analysis are presented in Section 5. Section 6 provides concluding remarks of overall work followed by future scope of the work.

2 Literature Review

In this section, we are presenting a detailed review of related and recent watermarking methods.

Ali Al-Haj [1] proposed a combined robust and imperceptible image watermarking method using a combination of DWT and discrete cosine transform (DCT). The pseudo-noise (PN) sequence is generated for the gray scale watermark information before embedding into the cover image. Further, the sequence number is embedded into the DCT transform of the cover image. The visual quality and robustness performance of the method is evaluated and found to be robust for different known attacks. The authors in [14] present a robust and secure watermarking method through DWT, Arnold transform, and code division multiple access (CDMA). Initially, the Y component of the YIQ color model is decomposed by DWT, and the scrambled binary watermark information is encrypted by using the CDMA to generate a random number sequence. This sequence is now embedded into the selected sub-band of the DWT cover. The robustness of the method is evaluated for different attacks. Simultaneous embedding of robust and fragile watermark on the cover image using pseudo-random sequence based bit substitution is proposed by Shen and Chen [21]. Initially, the method decomposes the cover image up to third level DWT where the fragile and robust watermark is embedded into the significant and non-significant coefficient of the DWT, respectively. The method is extensively evaluated for various attacks. A robust and secure logo watermarking technique through SVD and fractional wavelet packet transform (FRWPT) is presented by Bhatnagar et al. [4]. Initially, the considered host image is decomposed into the different sub-bands by FRWPT, and SVD is applied on the FRWPT transformed coefficients. The singular value of the transformed FRWPT coefficients is modified with the singular value of the watermark image. The performance of the method is extensively evaluated in terms of peak signal-to-noise ratio (PSNR), NC, and computational and time complexity. Arsalan et al. [3] developed a blind medical image watermarking method using genetic algorithm (GA) and integer wavelet transform (IWT). In the block (size=16) based embedding process of the watermark, compression function is applied on IWT coefficients, and the watermark bit is embedded into the compressed coefficient. The compression function is only applied on those IWT coefficients which are greater than or equal to a chosen threshold value. Bouslimi et al. [6] proposed a combined encryption and watermarking technique for verifying the reliability of the echographic image through Rivest Cipher 4 (RC4), quantization index modulation (QIM), and spatial domain least significant bit (LSB) technique. The experimental results demonstrated that the performance of the method is evaluated in terms of entropy and PSNR. Lei et al. [16] proposed a watermarking technique for binary image through Haar wavelet. Initially, the cover binary image is divided into different blocks, whereas each block is also divided into the embedding and level area. Further, the method determined the number of black pixels for every block. The method first determines the flippable pixels through Haar wavelet and these pixels are embedding into the selected area of the cover image. Rosiyadi et al. [19] describe a robust and non-blind image watermarking method for copyright protection of e-government documents through DCT, SVD, and GA. In the embedding process of the logo watermark, DCT is applied on cover e-government document image using the space-filling curve for the DCT coefficients of the cover. Further, SVD is applied on each area of the DCT coefficients having different frequencies in a rectangular shape. The SVD coefficient of the cover document is modified by the control parameters consisting of the left singular vectors and singular values of the DCT-transformed logo watermark to avoid the false-positive problem as suffered by the SVD based watermarking techniques. In addition to that, the scaling factor is optimized by using the GA. The experimental results demonstrated that the performance of the method is extensively evaluated for all four areas of the DCT coefficients and found to be robust for the 19 different attacks. Bhatnagar et al. [5] proposed a robust DWT based watermarking method where the logo watermark of size 32×32 is embedded into the significant wavelet coefficient of the cover image using ZIG-ZIG sequence. The experimental result demonstrated that the performance of the method is evaluated in terms of PSNR, NC, and time efficiency (embedding and extraction) for different images. For the copyright, protection through image watermarking method is proposed by Lang and Sun [15] using fractional Fourier transform (FRFT) and hyperchaos. The middle coefficients of the FRFT transformed cover image are considered to embed binary watermark. The experimental results established that the method is robust for different attacks. Horng et al. [12] presents a robust and secure blind watermarking technique for the protection of e-governance document using DCT, SVD and GA. In the embedding process of the watermark logo image, DCT is applied on the gray scale cover image. All the DCT coefficients of the cover image are scanned into the four different blocks (from lower to higher) in a zigzag way. Further, SVD is applied on each block of the DCT transformed image where the singular value of each block of the DCT coefficient is modified with quantizing value using GA. The motivation behind using the GA is to improve the PSNR and NC performance of watermarking algorithms. Rahmati et al. [18] proposed watermarking method to protect verification documents for E-commerce application. In this method, a person identification number considered as watermark is embedded into the cover digital card image using block based watermarking algorithm. The performance (PSNR and average error ratio) of the method is evaluated for print scan attack. Region based multiple watermarking method is presented in [2] for securing the medical information through DWT, SVD, and LSB technique. The patient information considered as robust watermark is embedded in the region of noninterest (RONI) of the image through the transform domain techniques which provide the confidentiality and authenticity of the image. However, the logo watermark is considered as fragile watermark and is embedded into the region of interest (ROI) part of the cover image through LSB technique to provide the image integrity. Experimental results established that the performance of the method is extensively evaluated for various attacks. Dual level security for the medical applications is also provided through combined encryption and watermarking technique proposed by Kannammal and Rani [13]. In the embedding process of the medical image watermark, the watermark is embedded into the selected sub-band of the natural cover image. Further, the security of the watermarked is enhanced by using three different encryption techniques applied on the watermarked image. The performance of these three encryption techniques is compared in terms of time to encrypt and decrypt the message. The experimental results established that the method is robust for different kinds of attacks, and the RC4 encryption technique performs better than the other two encryption techniques. Singh et al. [26] proposed a robust medical image watermarking method through DWT and SVD. The method is embedding the image and text watermark simultaneously into the DWT cover image for patient recognition purposes. Further, the bit error rate (BER) performance of the method is reduced by applying four different error correcting codes (ECCs) on the text watermark of size 20 characters before embedding into the medical cover image. The performance of the method is extensively evaluated for various attacks with and without using the ECCs. The experimental results demonstrated that the performance of hybrid ECCs consisting of Bose–Chaudhuri–Hocquenghem and repetition code is better than other ECCs. Singh et al. [24] proposed a secure spread spectrum based text watermarking technique, where four different medical text watermarks are embedded simultaneously at different DWT sub-bands of the medical cover image to solve the medical data management issues. Further, the security of the medical information is enhanced by using encryption technique before the information is embedded into the cover image. The method is robust for various signal processing attacks. The proposed method can embed 104 characters without degradation of the visual quality of the watermarked image. Chen and zhao [8] developed a robust and blind watermarking technique for 3D images using contourlet transform and depth-image-based rendering (DIBR). The watermark generated through spread spectrum method and each watermark bits is embedded into the selected coefficients of the cover contourlet sub-bands through proper quantization. In [10] authors present a JND (just noticeable distortion) DCT based visible watermarking technique, where JND is used to rectify the distortion made by the embedding process. For watermark embedding, grey scale cover image is divided into nonoverlapping blocks, and DCT is applied on the different blocks. To achieve the embedding strength, the mapping is performed on the watermarking intensity range and the cover image’s intensity range using JND technique. An improved spread transform dither modulation based robust and secure watermarking technique is proposed by Cao et al. [7]. The watermark is only embedded into the selected embedding subspace. The security and robustness performance of the method is extensively evaluated for estimation of projection vector and amplitude scaling attacks, respectively. Zolotavkin and Juhola [30] proposed a robust watermarking method using QIM. The performance of the method is measured by watermark to noise ratio (WNR) and document to watermark ratio (DWR). The method is found to be robust. It provides high robust for additive white Gaussian noise and gain attack. Wang and Allebach [28] proposed a halftone image watermarking in which watermark is embedded into the halftone by using synchronization pattern. The performance of the method is evaluated in terms of PSNR, normalized human visual system (HVS) mean square error, and watermark rate and found to be good visual quality and achieved high watermark capacity. Essaidani et al. [9] present a robust image watermarking method using Delaunay triangulation and the feature points of the cover image. The sobel edge detector is used to determine the feature points which are used to produce Delaunay triangulation. A region based robust and secure watermarking method is presented by Sharma et al. [20] for medical applications. The method initially uses DWT and DCT to embed multiple watermark information into the cover medical image. Further, the security of the image and text watermark information is enhanced by message digest (MD5) hash algorithm and Rivest-Shamir-Adleman (RSA), respectively, before embedding into the medical cover image. In order to enhance the robustness of the text watermark, Hamming error correction code is also applied on the encrypted watermark. The experimental results have shown that the method is robust for important signal processing attacks.

3 Current State-of-the-Art Watermarking

The current state-of-the-art in wavelet based image watermarking as available in the literature is given below.

  1. Various methods [1, 2, 4, 12, 14, 19, 24, 26] are using fusion of two or more transform domain techniques for improving the robustness of watermark(s).

  2. Some methods [2, 13, 21, 26] enhanced the security of the watermark by embedding multiple watermarks with the same cover image or applied encryption techniques [6, 13, 20] on watermark/cover.

  3. The methods proposed in [24, 26] use ECCs for addressing the channel noise distortion leading to faulty watermark and improving the robustness of the extracted watermark.

  4. Region [ROI and non-region of interest (NROI)] based watermarking method is presented in [2, 17, 20] for securing important medical information. According to the robustness requirement, a different region is selected for embedding the watermark(s).

  5. A GA based watermarking method is proposed in [3, 12, 19] for improving the robustness of the watermark and imperceptibility of the watermarked image.

  6. In [8], an author has developed a robust and blind watermarking technique for 3D images.

A summary of various state-of-the-art techniques is presented in Table 2.

Table 2:

Summary of State-of-the-art Techniques.

Reference numberObjectiveTechnique to achieve the objectiveResultsOther important points/issues
[20]Secure multiple watermarking technique using various ECCs for medical imagesDWT, DCT, RSA Hamming code, MD5PSNR (without processing attacks): 51.833272 dB

Max NC value for Gaussian LPF: 0.965043

BER for Gaussian LPF: 0.123c3
Medical image of size of 512×512 and watermark of size 256×256 is selected
DWT is being applied to LL of ROI and LL band of NROI of cover image
Low NC value against the rotation attack
NC value drops if the value of noise is increased in salt and pepper attack and speckle attack
Robustness is increased using Hamming code
PSNR value decreases if gain factor is increased
[17]Robust and secure watermarking technique for teleophthalmology applicationDWT, SVD, SHA-512, ROI, and NROIPSNR value=39.97 dB and BER=0 against at gain factor=0.2, where NC=0.99 at same gainRobust against various kinds of attacks including checkmark attacks
Cover and watermark image of size 1024×1024 and 512×512, respectively. The EPR text watermark of size=5145 bits
[24]Secure, robust spread spectrum based text watermarking technique for medical imageHarr wavelet transformGain factor: 15

PSNR: 31.23 dB with encryption of 104 BER(%)

Median filtering characters: 0.0480
Tested for test watermarks
Gray scale cover image is used
High BER value with JPEG compression attack (0.4326)
High multiresolution, superior HVS quality
Text watermarks are added to the third band HL3 and LH3 sub-bands
Patient records are added to the HL2 and LH2 sub-bands
Complexity is increased as the text watermark is encrypted
[1]Robust and imperceptible watermarking method for copyright protectionDWT, DCTMax NC for Gaussian attacks=0.9738

Max PSNR(with HL2 sub-bands)=97.072 dB
Combined techniques compensate the drawback of each other
Tested for different DWT sub-bands and three important attacks
Grey scales cover and watermark image of size 512×512 and 256×256, respectively
[14]Robust and secure watermarking methodDWT2, Arnold scramble, CDMAFor value k=0.5

PSNR (Lena): 78.01 dB

Max correlation (JPEG compression attack): 0.9999
Tested for small watermark sizes (27×27)
Cover image size is 512×512
Addition of more PN sequence alters the image transparency
High complexity due to the scrambling
[21]Using multiple watermarking to protect the information and integrity of mediaThree level DWT, pseudo random sequence based bit substitutionPSNR (mean shift ): 28.5274

Max NC for median filter attack:0.9999
Fragile watermark technique
Two watermarks are used (robust and fragile)
NC falls to 0.6062 when noise is increased 10%
[4]Secure, imperceptible, user adjustable watermarking schemeSVD, FRWPTPSNR: 41.0695 dB

Correlation coefficient: 0.7296 (sharpen attack)
Tested on gray scale images
High complexity
Cropping attack lead to cropping of the watermarked image
Quality of image is directly associated with the watermark
[3]Imperceptible and intelligent watermarking scheme for medical imagesBlock based embedding, GA, integer wavelet transformPSNR: (X-ray) 56.6

SSIM (Lena): 0.9982
Gray Scale images are used, both cover and watermark
If number of block size increased, then threshold matrix is increased for extraction
[6]Joint encryption and watermarking to ensure integrity and authenticity for medical imagesLSB substitution, QIM modulation, RC4PSNR: 49.366

Entropy of encrypted image: 7.995
Gray scale watermark is used
Less robust to attack like lossy image compression
Digital signatures are used to ensure the reliability of the image
Embedded messages are randomly generated
[16]Robust and blind watermarking schemes for binary cover imagesHarr wavelet transformNumber of black flappable

pixels:

Text: 2770

Picture: 2502

Number of white flappable pixels:

Text: 2620

Picture: 2567

Text: 3.4673

Picture: 2.4063
Increased salt and pepper noise alters the detection of the watermark
Probability of error increases if the mean value of Gaussian noise is increased
[19]Robust and non-blind image watermarking method for copyright protection of e-government documentsDCT, SVDCropping on right half with replacement:

PSNR: 36.6554

NC: 0.9882
Low PSNR value for rotation attacks
Low NC value for Gaussian noise
Can be implemented by adaptive watermarking scheme based on texture and edge masking
[5]Secure and robust watermarking technique based on image fusionDWTPSNR (Lena): 57.7460

Time efficency (extraction+embedding): 11.0994
Gray scale watermark is used
Watermark size is particularly smaller (32×32)
Gray scale cover image (256×256 is used)
Single watermark is used
Increase in noise; degrade the watermark (extracted watermark noisy)
[15]Robust, imperceptible, secure watermarking scheme for copyright protectionHyperchaos system, FRFTNC (salt and pepper noise): 0.94596Gray level image is used

(Cover) 512×512 and watermark size is 64×64 pixels
Binary image is used as the watermark
If the standard deviation is increased, the NC value drops for all attacks
[12]Robust and secure method for copyright protection of E-documentsDCT, SVD, GAGaussian noise for variance value 1.5

PSNR: 22.2400

NC: 0.5891
Increase in computational complexity after applying SVD to the DCT transformed image
Single watermark is used
Blind watermarking scheme
NC value drops if variance is increased
[18]Watermarking method for protecting verification documents for E-commerce applicationBlock based watermarking algorithmPSNR: 44.3324

Average error ratio (rotation 5°): 1.12%
Identification number is taken as a watermark
High average error ratio if cropping rate is increased 75%
[2]Secure, blind region based watermarking scheme for medical imagesDWT, LSB, SVDPSNR: 34.1107 (X-ray image)

Gaussian noise NC: 0.979
ROI is watermarked in the spatial domain and RONI is watermarked in frequency domain (fragile and robust watermarks)
Low robust to JPEG compression attack
Time for execution is high if smaller block is used for watermarking process
[13]Robust dual level security for the medical applicationsDiscrete non-tensor product wavelet transform, RSA, AES, RC4(Brightness attack)

PSNR: 91.70 dB

NC: 1

(RC4 encrypted)

CV: 0.09

SSIM:0.677
Tested on radiological images
Watermark is embedded on the LH sub-band by LSB substitution
Watermark processing complexity is increased as the watermarked image is encrypted with encryption algorithm
RC4 results in speed and performance are better than AES and RSA
[26]Robust, secure medical image watermarkingDWT, SVDHighest PSNR obtained with ECCs (140 text bits) is 37.22 dB

NC: 1

BER: 0 (all gain factors)
Gray level image is made as a cover image (512×512)
Two watermarks (text and image) were added
Four different types of ECCs were used
Image watermark is embedded using DWT and SVD and text watermark using ECCs
[8]Robust and blind watermarking technique for 3D imagesContourlet transform, (DIBR)For art image:

PSNR: 42.71

SSIM: 0.995

MOS: 4.7
Quality factor decreased if BER increased in the case of JPEG compression
Gaussian noise variance increased if BER increased in case of Gaussian noise
[10]Robust visible watermarking techniqueJND, DCTObtrusiveness controlling factor: 60Gray scale watermark image is used
Can be used with the JND estimation
To avoid blocking artifact JND b=0
Future scope involves finding the non-linearity between the watermark and texture
[7]Secure and robust (to amplitude scaling) technique for watermarkingSTDM, ISTDMWCR: 20 dB

Nv=400
ISTDM uses STDM to embed the watermark in embedding space
Only tested with text watermark
Comparative study is done and tested for Gaussian noise and amplitude scaling
[30]Robust watermarking method using scalar quantization to achieve higher amount of extracted informationGA, brute force optimization, RDM, DCQIMDWR: 28 dB

WNR: 12 dB
Tested for gray scale images
Not tested for the watermark tampering attacks
Optimization of the embedding procedure is computationally difficult
[28]Robust, imperceptible halftone image watermarking techniqueHalf toning, DBSFor host image (Lena)

PSNR: 30.3 dB

NMSE: 24.5 dB

BER: 0.73%

WMR: 4.62%

PER: 0.79%
Complexity is increased due to every step pixel-by-pixel scanning
Cover image of size 512×512 is chosen
Error decoding rate depends on the P&S recovery
[9]Robust, blind image watermarking method using Delaunay triangulationDelaunay triangulationNC

(Rot crop_0.5): 19.9123

PSNR: 42.62 dB
High complexity
Modified triangulation is immune to the geometric transformation
Tested on gray scale (665*586) cover image
Watermark size is particularly smaller (28×28)
  1. FRWPT, fractional wavelet packet transform; SVD, singular value decomposition; DWT, discrete wavelet transform; CDMA, code division multiple access; RSA, Rivest Shamir and Adleman; FRFT, fractional fourier transform; DIBR, depth-image-based rendering; DBS, direct binary search; DCT, discrete cosine transform; STDM, spread transform dither modulation; ISTDM, improved spread transform dither modulation; GA, genetic algorithm; LSB, least significant bit; EPR, electronic patient record; MOS, mean opinion score; RDM, rational dither modulation; DC-QIM, distortion compensated quantization index modulation; NMSE, normalized HVS mean squared value; WMR, watermark rate; PER, pixel error rate; P&S, printing and scanning; SSIM, the structural similarity index; AES, advanced encryption standard.

4 Proposed Technique

In this paper, a robust and imperceptible watermarking technique is proposed using fusion of DWT and KLT instead of applying DWT or KLT individually. The KLT for digital images has been discussed detail in [11]. Figure 2A and B show the watermark embedding and extraction process, respectively. The extraction algorithm is just the reverse process of the embedding algorithm. The cover image is decomposed by DWT, and KLT transform is applied on the selected sub-band of the cover. The watermark information transformed by DWT is embedded into the KLT coefficients of the DWT cover image. In order to enhance the visual quality of the watermarked image and reduce the bandwidth requirements, different de-noising dictionary based method is applied on the image. It is noticed that adaptive based dictionary method is better than DCT and global dictionary method. The method is also robust for different image processing attacks.

Figure 2: Watermark (A) Embedding and (B) Extraction Process.
Figure 2:

Watermark (A) Embedding and (B) Extraction Process.

5 Experimental Result and Analysis

In this section, the performance of the proposed watermarking technique in terms of PSNR and NC has been investigated. For testing the visual quality (determined by PSNR) of the watermarked image and robustness (determined by NC) of the possibly distorted watermark, image MATLAB is used. The weighted peak signal to noise ratio (WPSNR) [25] is a modified version of the PSNR. Further, WPSNR uses noise visibility function to determine how much texture exists in any area of an image. In the proposed technique cover image of size 512×512 [5], the image watermark of different sizes (512×512, 256×256, and 64×64) are used for testing. Figure 3A shows the cover image and Figure 3B–D shows watermark images different sizes. The performance of the proposed technique is extensively determined in Tables 35 . It is noticed that larger gain factor results in stronger robustness of the extracted watermark, whereas smaller gain factor provides better visual quality of the watermarked image. It is quite apparent that the size of the watermark affects the quality of the watermarked image. However, degradation in quality of the watermarked image will not be observable if the size of watermark is small. Table 3 shows the performance of the proposed technique that is evaluated at different gains along with three different de-noising techniques. It is noticed that the PSNR performance with adaptive dictionary based de-noising method is better than the other two. However, the NC values are always greater than 0.9710 at the selected gain factors ranging from 0.04 to 0.1. Due to better robustness performance of the proposed technique, we are selecting the gain=0.1. Table 4 shows the PSNR and NC performance of the proposed technique with different sizes of watermark images. It is observed that the PSNR and NC values are always greater than 31 dB and 0.9583, respectively. Table 5 shows the NC performance of the proposed technique for different attacks. Refereeing this table, it is observed that the NC value is always greater than 0.9437.

Table 3:

Performance at Different Gain.

GainPSNRNCPSNR with DCT dictionaryPSNR with global dictionaryPSNR with adaptive dictionary
0.131.290.992431.3231.5931.72
0.0931.310.990531.3431.5931.73
0.0831.310.988631.3831.6431.77
0.0731.310.985831.3731.6431.76
0.0631.310.982331.38331.6331.77
0.0531.300.977831.32831.5831.7
0.0431.310.971031.3331.6131.71
Table 4:

PSNR and NC Performance for Different Size of Watermark.

Watermark sizePSNR (in dB)NC
256*25631.31490.9731
128*12831.31760.9583
64*6431.321.00
Table 5:

NC Performance Against Attacks at Gain=0.1.

AttackNC value
Speckle noise at different intensity level
 0.010.9868
 0.020.9800
 0.030.9761
 0.040.9719
Salt and pepper noise at different intensity level
 0.010.9888
 0.020.9859
 0.030.9827
 0.040.9792
Poisson noise0.9871
Gaussian noise with mean=0 and different variance
 0.010.9594
 0.020.9437
Gaussian noise with mean=0.002 and different variance
 0.010.9582
 0.020.9457
Figure 3: (A) Cover Image and Watermark Image of Size (B) 512×512, (C) 128×128, and (D) 64×64.
Figure 3:

(A) Cover Image and Watermark Image of Size (B) 512×512, (C) 128×128, and (D) 64×64.

6 Conclusions and Future Directions

In this paper, we have presented a brief introduction of digital watermark, important applications, and a detailed literature review of different state-of-the-art watermarking methods. The summary of some existing techniques is presented in tabular format. In addition, a robust watermarking technique using fusion of discrete wavelet transform (DWT) and KLT for digital images is proposed. Further, visual quality of the watermarked image is enhanced by using different image de-noising techniques. The purpose of combined DWT-KLT is to improve the robustness of the watermark at acceptable visual quality of the watermarked image which is the prime objective of the research. However, it may have increased the computational complexity to some extent which needs to be investigated separately. The computational complexity of the proposed watermarking method can be minimized by selecting and exploring the other wavelet instead of DWT. In future, the performance of the method can also be improved with directional transform techniques, different error correction codes, and machine learning/GAs. In addition, the robustness performance of the method can also be determined with standard benchmark software.

We would like to further improve the performance, which will be reported in future communication.

Acknowledgments

The authors are sincerely thankful to the potential/anonymous reviewers for their critical comments and suggestions to improve the quality of the paper.

Bibliography

[1] A. Al-Haj, Combined DWT-DCT digital image watermarking, J. Comput. Sci. 3 (2007), 740–746.10.3844/jcssp.2007.740.746Suche in Google Scholar

[2] A. Al-Haj and A. Amer, Secured telemedicine using region-based watermarking with tamper localization, J. Digit. Imaging27 (2014), 737–750.10.1007/s10278-014-9709-9Suche in Google Scholar PubMed PubMed Central

[3] M. Arsalan, S. A. Malik and A. Khan, Intelligent reversible watermarking in integer wavelet domain for medical images, J. Syst. Software85 (2012), 883–894.10.1016/j.jss.2011.11.005Suche in Google Scholar

[4] G. Bhatnagar, Q. M. J. Wu and B. Raman, A new robust adjustable watermarking scheme, Comput. Secur.31 (2011), 40–58.10.1016/j.cose.2011.11.003Suche in Google Scholar

[5] G. Bhatnagar, Q. M. J. Wu and B. Raman, Robust gray scale watermarking in wavelet domain, Recent Adv. Secur. Privacy Dist. Commun. Image Proc.38 (2012), 1164–1176.10.1016/j.compeleceng.2012.02.002Suche in Google Scholar

[6] D. Bouslimi, G. Coatrieux and C. Roux, A joint encryption encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images, Comput. Meth. Prog. Bio.106 (2011), 47–54.10.1016/j.cmpb.2011.09.015Suche in Google Scholar PubMed

[7] J. Cao, H. Li, W. Luo and J. Huang, An improved spread transform dither modulation for robust and secure watermarking, IEEE24 (2016), 2718–2722.10.1109/ICIP.2016.7532853Suche in Google Scholar

[8] L. Chen and J. Zhao, Robust contourlet-based watermarking for depth-image-based rendering 3D images, in: IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), ISSN: 2155–5052, 2015.10.1109/BMSB.2016.7521956Suche in Google Scholar

[9] D. Essaidani, H. Seddik and E. Ben Braiek, Robust and blind watermarking approach based on modified delaunay triangulation, in: 2nd International Conference on Advanced Technologies for Signal and Image Processing - ATSIP’2016, IEEE, March 21–24, 2016.10.1109/ATSIP.2016.7523049Suche in Google Scholar

[10] E. Fragoso-Navarro, H. Santoyo-García, K. Rangel-Espinoza, M. Nakano-Miyatake and R. Reyes-Reyes, Visible watermarking technique in compressed domain based on JND, in: International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), pp. 1–6, IEEE, 2015, Mexico City, Mexico.10.1109/ICEEE.2015.7357921Suche in Google Scholar

[11] M. A. Hajjaji, E.-B. Bourennane, A. B. Abdelali and A. Mtibaa, Combining Haar wavelet and Karhunen Loeve transforms for medical images watermarking, BioMed Res. Int.2014 (2014), 1–15.10.1155/2014/313078Suche in Google Scholar PubMed PubMed Central

[12] S.-J. Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo and M. K. Khan, A blind image copyright protection scheme for e-government, J. Vis. Commun. Image R.24 (2013), 1099–1105.10.1016/j.jvcir.2013.07.008Suche in Google Scholar

[13] A. Kannammal and S. S. Rani, Two level security for medical images using watermarking/encryption algorithms, Int. J. Imag. Syst. Tech.24 (2014), 111–120.10.1002/ima.22086Suche in Google Scholar

[14] M. Khalili, A secure and robust CDMA digital image watermarking algorithm based on DWT, YIQ color space and arnold transform, Signal Image Proc. Int. J.2 (2011).10.5121/sipij.2011.2211Suche in Google Scholar

[15] J. Lang and J.-Y. Sun, Digital watermarking algorithm based on hyperchaos and fractional Fourier transform, in: IEEE 14th International Conference on Communication Technology (ICCT), pp. 691–694, 2012.10.1109/ICCT.2012.6511287Suche in Google Scholar

[16] J. Lei, S. Zhiyuanb, C. Yaping, F. Yong, A Haar wavelet transform based watermarking algorithm for binary images, Int. Conf. Comput. Elect. Eng.13 (2011), 2972–2978.Suche in Google Scholar

[17] R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, Multimed. Tools Appl.75 (2016), 14381–14397, DOI: 10.1007/s11042-016-3536-6.10.1007/s11042-016-3536-6Suche in Google Scholar

[18] P. Rahmati, A. Adler and T. Tran, Watermarking in e-commerce, Int. J. Adv. Comput. Sci. Appl.4 (2013), 252–265.10.14569/IJACSA.2013.040634Suche in Google Scholar

[19] D. Rosiyadi, S.-J. Horng, P. Fan, X. Wang, M. K. Khan and P. Yi, An efficient copyright protection scheme for e-government document images, in IEEE MultiMedia19 (2012), 62–73.10.1109/MMUL.2011.41Suche in Google Scholar

[20] A. Sharma, A. K. Singh and S. P. Ghrera, Robust and Secure Multiple Watermarking Technique for Medical Images, Wireless Pers. Commun.92 (2016), 1611–1624, Springer US, DOI: 10.1007/s11277-016-3625-x.10.1007/s11277-016-3625-x.Suche in Google Scholar

[21] H. Shen and B. Chen, From single watermark to dual watermark: a new approach for image watermarking, Recent Adv. Secur. Privacy Dist. Commun. Image Proc.38 (2012), 1310–1324.10.1016/j.compeleceng.2011.11.012Suche in Google Scholar

[22] A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl., Springer US, 2016, DOI: 10.1007/s11042-016-3514-z.10.1007/s11042-016-3514-z.Suche in Google Scholar

[23] A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl.75 (2015), 8381–8401, DOI: 10.1007/s11042-015-2754-7, Springer US.10.1007/s11042-015-2754-7Suche in Google Scholar

[24] A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133–2150, DOI: 10.1007/s11277-015-2505-0, Springer US.10.1007/s11277-015-2505-0Suche in Google Scholar

[25] A. K. Singh, B. Kumar, M. Dave, S. P. Ghrera and A. Mohan, Digital image watermarking: techniques and emerging applications, in: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, pp. 246–272, 2016, IGI Global, USA, DOI: 10.4018/978-1-5225-0105-3.ch011.10.4018/978-1-5225-0105-3.ch011Suche in Google Scholar

[26] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Robust and imperceptible dual watermarking for telemedicine applications. Wireless Pers. Commun.80 (2014), 1415–1433, Springer.10.1007/s11277-014-2091-6Suche in Google Scholar

[27] A. K. Singh, B. Kumar, S. K. Singh and A. Mohan, Multiple watermarking technique for securing online social network contents using back propagation neural network, Future Gener Comp Sy. 2016, In Press, DOI: 10.1016/j. future.2016.11.023.10.1016/j. future.2016.11.023.Suche in Google Scholar

[28] F. Wang and J. P. Allebach, Printed image watermarking using direct binary search halftoning, in: IEEE International Conference of Image Processing (ICIP), ISSN: 2381-8549, IEEE 2016.10.1109/ICIP.2016.7532855Suche in Google Scholar

[29] A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimed. Tools Appl. (2016), Springer US, DOI: 10.1007/s11042-016-3862-8.10.1007/s11042-016-3862-8Suche in Google Scholar

[30] Y. Zolotavkin and M. Juhola, A new scalar quantization method for digital image watermarking, J. Electr. Comput. Eng.2016 (2016) 1–16.10.1155/2016/9029745Suche in Google Scholar

Received: 2017-02-03
Published Online: 2017-05-25
Published in Print: 2018-01-26

©2018 Walter de Gruyter GmbH, Berlin/Boston

This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Heruntergeladen am 16.9.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jisys-2017-0032/html
Button zum nach oben scrollen