Next Article in Journal
Energy-Efficient Wireless Communication Strategy for Precision Agriculture Irrigation Control
Previous Article in Journal
Semi-Precise Analytical Method for Investigating the Liftoff Variation on the Hall Sensor in Metal Defect Sensing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains

1
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
2
Department of Software Engineering, Daffodil International University, Dhaka 1207, Bangladesh
3
Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
4
School of Computing, Mathematics and Engineering, Charles Sturt University, Bathurst, NSW 2795, Australia
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(16), 5540; https://doi.org/10.3390/s21165540
Submission received: 29 June 2021 / Revised: 3 August 2021 / Accepted: 10 August 2021 / Published: 17 August 2021
(This article belongs to the Section Sensing and Imaging)

Abstract

:
This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks.

1. Introduction

Sensors are used to capture different types of images for many practical applications such as clinical diagnosis, biometrics, and multimedia. The digital revolution has made it convenient to capture, store, and transmit images. However, with the rapid improvement of sensor technology, copyright violation, unapproved and illegal production, piracy, hacking and distribution, information theft, and several other statistical and differential attacks [1] have become important security concerns for the retrieval and distribution of digital images. The ever-increasing need for information security and intellectual property protection for digital images demands the development of robust watermarking techniques. Digital watermarking is the process of embedding information into a digital image (e.g., a digital image, video, etc.) to verify its ownership and authenticity by recovering the original information. There are many existing image watermarking techniques designed for various image security purposes. The trade-off between the robustness of the encrypted data and image quality is a significant challenge in digital watermarking research. The success of watermarking and de-watermarking processes depends on the successful retrieval of hidden data under different image processing attacks on the stego image [2,3]. Generally, the carrier image is not always enough to uphold the full length of the embedded data due to the degradation of image quality. Encrypting a watermark at a proper destination in an image can satisfy the main purpose of watermarking if it can endure different image processing attacks. A reliable digital watermarking technique should satisfy certain properties [4,5,6], e.g., imperceptibility of the watermark, robustness, security, and lower complexity with less error rate in the extraction phase.
Existing watermarking techniques can generally be divided into non-blind and blind techniques depending on the watermark extraction process. In the non-blind process, the original host image is required for watermark extraction, whereas, the blind watermarking process does not require the host image [7]. Non-blind watermarking techniques require more bandwidth for transmission, and sometimes, the carrier signal can be quite large for full extraction in partial transmission. Non-blind watermarking has limitations in real-time applications and is less effective relative to ensuring security [5,8] In contrast, the blind technique does not require the original signal for extraction, and it is more dynamic, convenient, and secure compared to the non-blind technique [9,10].
Blind watermarking can be performed in two different domains: (i) the spatial domain and (ii) the frequency domain. In the spatial domain, watermarks are embedded in the image pixels directly. Spatial domain methods are often simple but are less robust and fragile, and an image attack can easily destroy the watermark from the host image. In the frequency domain, the watermark is embedded into the transformed frequency channel, where the spatial pixel is not altered directly [9]. Frequency domain embedding techniques, (e.g., discrete wavelet transform (DWT) [11,12,13], discrete cosine transform (DCT) [14,15,16], singular value decomposition (SVD) [17,18], discrete Fourier transform (DFT) [10,19], and other decomposition methods [20,21]) are more robust and can utilize different characteristics of the signal to make the watermark more secure and imperceptible to the human eyes. The quality of a watermarking algorithm depends on the quality of imperceptibility and the recovery of the watermark signal. Generally, existing blind techniques often fail to extract 100% data on the retrieval phase from embedded data [22]. In most cases, the watermark data recovery is not cost-efficient due to the computational complexity of existing algorithms [23,24,25].
This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with blind watermark extraction. Low-pass filtering attacks can hardly distort the image quality in that region. DCT transform is then applied to detect proper image pixels, which are less affected during extreme compression attacks. Unlike the existing method [22], we have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. Since the seed is entangled for both the embedding location and the watermark sequence, full recovery of the watermark sequence is possible with authenticity in the extraction phase resulting in more secure watermarking. The proposed technique was tested under various types of attacks, and the results were verified with different measures, i.e., peak signal-to-noise ratio (PSNR), bit correction rate (BCR), and structural similarity index (SSIM). The main contributions of this work can be summarized as follows:
  • In the proposed scheme, the 2DWT is selected based on the analysis of the trade-off between the imperceptibility and embedding capacity at various levels of decomposition. A large enough embedding capacity for the acceptable security of the watermarked image is also ensured.
  • A technique is introduced to utilize the same random bit sequence as the cryptographic key and watermark for better security and convenience.
  • The bit correction rate outperforms those of existing methods under different types of image-processing attacks on watermarked images.
The remainder of this paper is organized as follows: Related work is described in Section 2. The proposed scheme is presented in Section 3. The experimental and evaluation process is described in Section 4. Section 5 presents the experimental results and a corresponding discussion. Finally, the paper is concluded in Section 6.

2. Related Work

Here, we review state-of-the-art watermarking techniques with a focus on techniques in the transfer domain. We discuss the effectiveness and limitations of existing techniques to identify gaps in this crucial research area.
In the DCT-based watermarking scheme [8], multiple bits are used to embed watermarks in the central band of the host image by the corresponding coefficients of zig-zig operations. A sequential process from the left to right corners and from the top to bottom of the image is used for embedding. Roy et al. [8] revealed that this algorithm was comparatively robust under Joint Photographic Experts Group (JPEG) compression and noise addition. They proposed high embedding capacity watermarking, but it resulted in higher distortion in terms of image quality when a large number of bits were embedded in each block. The DCT values were computed for complete images in a block-based manner in Su at el. [26], which provided a low cost for image operations and was useful for the transformation of two-dimensional data representations. These criteria had achieved better solutions relative to image perceptivity and robustness; however, limitations of this method included relatively higher computational complexity and higher vulnerability of the embedded watermarks. Loan et al. [27] proposed a chaotic encryption-based image watermarking technique using the Arnold transformation, which was applied to differencing coefficient bits for the watermark operation. The outcomes of this algorithm demonstrated good robustness for different image operations, primarily related to compression, sharpening, cropping, and filtering. Ahmed et al. [28] also presented a watermarking scheme based on a nonlinear chaotic map with the orthogonal matrix. The scheme had advantages in regard to JPEG compression as well as noise tolerance.
The DWT approach is an effective process and is probably superior when watermarking is applied to the entire image [29,30]. Determining a favorable watermarking zone for bit embedding is a complex process, and it must proceed through various calculative operations for setting up. The combined DWT–DCT approach [31] provides generally more advantages on the image spectrum for watermarking. Yap et al. [32] proposed a new watermarking technique comprising a set of Krawtchouk moments on the image to select a local embedding portion. With this method, the produced watermarked image had been improved in robustness, especially for cropping attacks. Radeaf et al. [33] introduced an orthogonal polynomials-based watermarking technique that accumulates lower energy moments of the image using Krawtchouk–Tchebichef polynomials to hide the watermark data. This approach reduces the distortion in the host image and provides acceptable PSNR values. Qi et al. [34] proposed an adaptive region selection-based visible watermark on the host image. Although this method is a good solution for visible watermarking, for a higher texture image, it is often hard to find a salient enough region for watermarking to take place.
A bio-inspired watermarking procedure had been implemented in host images [35] with three-level DWT frequency transformation to increase the robustness criteria to some extent. Here, one-quarter of the watermark bits were implanted in the LL3 band, and the other bits were implanted in the remaining components of the transformed image. The good quality of the watermarked image was an advantage of this operation; however, the slow rate of embedding was a significant limitation for real-time applications, and the payload capacity was also comparatively low in the embedded image. Mohananthini et al. [36] proposed a genetic-based algorithm using the DWT and SVD domains for watermarking in a host image. Dong et al. [37] used logistics maps for encryption, and this scheme was designed for medical images. This watermarking scheme was tested under various attacks but resulted in poor payload capacity. A watermarking algorithm in [38] was introduced for monochrome images that enabled better security provisions for watermarked images; however, the robustness of this algorithm was insufficient against various types of image attacks. In addition, the computational cost increased due to the hybrid implementations of various encryptions.
Fares et al. [39] and Zhang et al. [40] proposed watermarking techniques based on the Fourier transform on various color channels. Multi-channel transformations created a comparatively higher risk of filtering attacks, and the colorimetric value changes over the image increased in complexity, too. Zhang et al. [40] proposed a blind watermarking technique that used a ghost imaging protocol. However, this encryption technique requires a complex environment, e.g., a computer-controlled digital micro-mirror device. This decomposition in higher frequency sub-bands (HH) is often significantly affected by JPEG compression, and the imperceptibility is reduced as the payload capacity increases for the embedding bits. Singh et al. [41] proposed a combined DWT–SVD method that divided an image into the two least and most significant bits for embedding, and this strategy was tested under some common image attacks, e.g., histogram equalization operations, and the BCR results were comparatively lower for the corrected bit rate. Fan et al. [42] proposed an algorithm based on the Gabor transformation and discrete cosine transform. This algorithm used Gabor transformation due to its scaling, direction, and optimization capabilities in image adjustment. This algorithm was robust against some image attacks, e.g., compression and filtering; however, the PSNR was not significantly improved. Lou et al. [43] presented a multi-scale watermark scheme based on Integer Wavelet Transform (IWT) and SVD. This approach achieved high imperceptibility quality, but the embedding process had a higher computational cost due to several extraction stages for the de-watermarking process. The resistance against several image attacks was satisfactory except in regard to the JPEG compression attack.
It has been observed that the majority of the existing methods are incapable of the satisfactory recovery of the watermark while ensuring minimal image disturbance. For example, Fares et al. [31] achieved 91% recovery for a salt and pepper attack, and Fan et al. [42] obtained 99.69% recovery for a Gaussian noise attack. When it comes to peer-to-peer communication or precise data retrieval, a single bit failure can cause total authentication failure. Hence, full recovery of the watermark is critical to ensure success, especially in an image attack environment. Thus, an algorithm proposing significant improvement of the recovery rate against common image attacks could be considered a remarkable achievement in the field of watermark research.

3. Proposed Scheme

The encryption-based watermarking technique embeds a sequence of random bits into suitable locations in the host image, and the recommended minimum length of the sequence is 128 bits [44] for reliable security. The two main issues related to watermarking are (i) the visual quality of watermarked image and (ii) its robustness against possible attacks. Although a longer bit sequence would increase the security, the increase in length would degrade the visual quality of the image. Different types of attacks on the watermarked image may also destroy the watermark, undermining the security proposed by the process. Common attacks include JPEG compression, low-pass filtering, noise, and geometric attacks.
To ensure the highest visual quality and robustness against possible attacks, the watermark should be embedded in a suitable location in the host image. Generally, the location is selected by the frequency domain transformation of the image [22,31], and the embedding capacity (i.e., the length of binary sequence) depends on the selected location, as discussed in Section 3.1. The watermarking algorithm is discussed in Section 3.2. The blind extract phase of the watermark is discussed in Section 3.3. Finally, the computing complexity is analyzed in Section 3.4.

3.1. Selection of the Distinct Embedding Region

One of the most serious concerns about the security provided by watermarks is that JPEG compression and other low-pass filtering attacks could destroy the watermark. All of these attacks suppress the high-frequency component of the image and intervene slightly on the low-frequency band [45]. JPEG compression especially increasingly suppresses the higher-frequency components with a higher degree of compression. Hence, to be robust against all of these attacks, the watermark could be embedded on the low-frequency components. However, embedding the watermark in this region could cause imperceptibility, which increases with the increase of the length of the random bit sequence.
DWT is a popular method to decompose an image to obtain the low-frequency components for watermark embedding [22,31]. DWT divides an image based on a basis function for different frequency spectra [46,47]. An image could be recursively decomposed into multiple levels. For a particular level (j), the image is first filtered with a low-pass filter (LPF) and a high-pass filter (HPF), and the filtered images are subsampled by a factor of two. The subsampled images are again filtered and subsampled to obtain LLj+1, LHj+1, HLj+1, and HHj+1 sub-bands, as shown in Figure 1. The low-frequency band (LLj+1) of an image is a very close approximation to the host image (Ij), and it contains the basic frequency components of the host image. Several levels of DWT decomposition could be applied to the low-frequency band to obtain a relatively lower level frequency coefficient portion from the host image with the most significant energy compaction coefficients, which are less likely to be affected by low-pass filtering and geometric attacks.
With the increasing level of decomposition, the size of the LL band is reduced, which eventually decreases the embedding capacity. Hence, embedding a watermark to a particularly low-frequency band (LLj) introduces a trade-off between the imperceptibility and embedding capacity. While the increase in the length increases the security, at the same time, it decreases the perceptivity, which is measured as the peak signal-to-noise ratio (PSNR), as defined in Section 4.1. Figure 2 shows the average imperceptibility for different lengths of random bit sequences on different levels of the LL sub-band. This result was obtained by computing the average imperceptibility of several watermarked images (refer to Section 4) obtained by inserting the watermark into four different levels of the LL sub-band. The impact on imperceptibility for three different bit lengths was tested. It could be observed that LL1 and LL2 sub-bands pass the minimum threshold for imperceptibility (40 dB) and embedding capacity (128 bits). A compromise could be obtained by selecting a band that better preserves the energy of the signal to protect the watermark with the minimum thresholds for embedding capacity and imperceptibility.
In reality, the LL2 obtained by 2DWT provides better data preservation in low-pass filtering than that of the first level of DWT (i.e., 1DWT) [48]. The histogram (Figure 3) patterns of 1DWT and 2DWT reveal different effects in the low-pass filtering process. It should be noted that the magnitude fluctuation (y-axis) in 1DWT (500–5000 DWT coefficients) is greater than that of the 2DWT (300–1200 DWT coefficients). Thus, signal changes during the embedding process in 2DWT are comparatively small compared to 1DWT, which improves image quality. Additionally, the 1DWT signal yields less symmetrical and non-identical histograms compared to the host image histogram. In 2DWT, the embedding signal holds the symmetry to the host image histogram. The embedded zone in the lower frequency sub-band is less affected when a high level of compression is applied to the image [49], and the 2DWT watermark encoding minimizes distortion, edge effects, and discontinuity in the stego image.
To embed the watermark on the LL2 sub-band, the middle coefficient values are created (rather than changing the image coefficient directly), and discrete cosine transform (DCT) is applied to it. The DCT mainly calculates the weighted coefficient resulting from Fourier transform [50]. The DCT transform identifies the direct coefficient (DC) component of an image and the major definition of an image is originated from the DC component. As such, any changes in the DC coefficient cause a large distortion in the visual property. That is why the DC coefficient needs to remain unchanged during watermark embedding to maintain good visual quality. On other hand, the AC coefficients are the remaining coefficients with non-zero frequencies, and they carry lower magnitudes and represent spatial higher frequencies than those that have less of a visual effect in image quality. AC coefficients are less significant than DC in image reconstruction, and a small modification in these components can hardly be perceived by the human eye. In fact, a small perturbation in the AC coefficient is less likely to have any effect on the image properties. As such, the inclusion of watermark bits on AC coefficients in lower frequency sub-bands, on LL2 in particular, can achieve good imperceptibility quality and resist different attacks effectively. Hence, combining 2DWT–DCT transform yields possible optimal watermarking locations in the image by allowing minimal visual distortion and sufficient bit encryption, as shown in Figure 2.

3.2. Watermark Embedding Process

The host image for watermarking, denoted as I, is of the size m × m. The algorithm [22] embeds the watermarking bit into the lower sub-bands obtained by the 2DWT decomposition on the host image. Most of the image energy is concentrated at the lower frequency sub-bands [49]; thus, embedding watermark bits in that lower frequency sub-band is suitable for robust and steady watermarking. The embedding process is illustrated in Figure 4 and is described below.
Step 1
2DWT of the host image (I) could be obtained by two subsequent DWT decompositions. The first DWT is applied to I to create four different frequency sub-bands: LL1, LH1, HL1, and HH1. DWT is then applied again to the LL1 frequency coefficients matrix to obtain a lower frequency sub-band (LL2). The size of the LL2 sub-band is m/4 × m/4. The transformation is defined as follows:
LL 1 , LH 1 , HL 1 , HH 1 = DWT ( I ) ,
LL 2 , LH 2 , HL 2 , HH 2 = DWT ( LL 1 ) .
Step 2
The lowest frequency sub-band (LL2) is selected to carry the watermark bits. Here, a vector is generated from the sub-band coefficient by using the zig-zag scanning operation [51]. The resultant vector coefficient is denoted vn, where n ≤ m/4; n × n is the size of the LL2 sub-band.
Step 3
Vector vn is split into two parallel vectors v1 and v2 according to their positions on vector coefficients. Here, odd coefficients are stored in vector v1, and even coefficients are stored in vector v2:
v 1 ( j ) = v n ( k / 2 ) ,   v 2 ( j ) = v n ( k / 2 + 1 ) ,
where k = 1,..., n.
Step 4
DCT is applied to each split vector (v1, v2) to produce two corresponding vectors v1dct = DCT(v1) and v2dct = DCT(v2), respectively.
Step 5
A unified random bit sequence is created for watermarking and random position selection. The length of the sequence W = {1, −1}z is z, which is less than or equal to the size of the LL2 matrix (i.e., zm/4). To embed the i-th bit of the sequence, a random position j(1 ≤ jm/4) is selected using W as a seed. The watermark is embedded as follows:
v 1 w ( j ) = 1 / 2 [ v 1 dct ( j ) + v 2 dct ( j ) ] + α W ( i ) , v 2 w ( j ) = 1 / 2 [ v 1 dct ( j ) + v 2 dct ( j ) ] α W ( i )
Using Equation (3), we embed a bit in the same position of the two parallel vectors v1dct (j) and v2dct (j). The resultant vectors are denoted v1w and v2w, respectively, and α is the watermark gain index for inserting the watermark. We avoid embedding in the first position of both DCT vectors to ensure that the DC property remains unchanged because changing the DC component generates significant distortion in the resulting image.
Step 6
Inverse DCT is applied to vectors v1w and v2w to obtain v′1w = DCT−1 (v1w) and v′2w = DCT−1 (v2w), respectively. The two vectors are merged to a single vector, which is the inverse operation of Step 3 (i.e., embedding). Finally, the inverse zig-zig operation is applied to create a two-dimensional image matrix from a one-dimensional vector. This process is expressed as follows:
    v w ( k ) = v 1 w ( j ) ,   v w ( k + 1 ) = v 2 w ( j ) for   k = 1 ,   ,   n   = 1 ,   ,   n / 2 ,
LL 2 w   =   inverse   zigzig   of v w .
Step 7
To reconstruct the final watermarked image, two of the inverse DWT operations are applied using LL2w (in place of LL2) with other sub-band sets. The operations for the final watermarked image Iw are expressed as follows:
LL 2 w = DWT 1 ( LL 2 w ,   LH 2 ,   HL 2 ,   HH 2 ) , I w = DWT 1 ( LL 1 w ,   LH 1 ,   HL 1 ,   HH 1 )

3.3. Extraction Process

The extraction process is illustrated in Figure 5 and is described below.
Steps 1–4
These steps are the same as the embedding process (Steps 1–4). Here, sub-vectors v1w and v2w are obtained after completing Step 4.
Step 5
The two sub-vectors are subtracted from each other, and the difference is denoted Δv, where Δv = v1w(j) − v2w(j) = 2W. As seed (W) is known, we can calculate the random position (j) from the seed. Using a threshold on Δv, we can then extract the watermark bits W’ (Figure 6). Here, values less than 0 are extracted as −1, and the positive values are extracted as 1. Note that this extraction process is blind and does not require the original host image to recover the watermarked bits.

3.4. Computing Complexity

The algorithms for the embedding and extraction processes can be efficiently implemented in linear time. Table 1 shows the time complexity for different steps for the embedding and extraction of a key with length z in an image with the size n = m × m. Due to the use of a discrete convolutional kernel with a limited size, the DWT could be implemented in O(n) time. The watermark insertion/extraction process depends on the length of the key k. Generally, k is much smaller than n. All other steps take O(n) time.
Compared to the existing methods, the proposed method is simpler to implement. For example, the embedding process in [28] requires three steps (DCT, Gramm–Schmidt, and the nonlinear chaotic algorithm) in addition to a preprocessing step. For the nonlinear chaotic method, several levels of decomposition are performed that require additional computing time. Fares et al. [31] utilized DCT and 2DWT in addition to Schur decomposition during the encryption step and used three different bit insertion rules. The model proposed in [35] requires many steps, such as 2D permutation, 3DWT, the Just Noticeable Distortion (JND) mechanism, and the Genetic Algorithms. Sing et al. [41] used DWT–SVD and DCT algorithms together with the Arnold Cat Map.

4. Experiments

We have implemented the proposed algorithms in MATLAB, and the source code is available on GitHub (https://github.com/NayeemHasanT/Digital-Watermark, accessed on 3 August 2021). The proposed watermark embedding process was evaluated with different types of images. Here, the cover images used for testing were collected from the USC-SIPI Image Database (http://sipi.usc.edu/database/, accessed on 3 August 2021). Sample images of different sizes were used in these experiments. For example, the baboon, bridge, jet-plane, boat, sailboat, and pepper images are 512 × 512 pixels, the girl image is 256 × 256 pixels, and the pirate image is 1024 × 1024 pixels. The watermark used for encryption was a random sequence of 256 bits, a typical payload [24], which was produced using a pseudorandom generator. The MATLAB programs for the watermark embedding and extraction processes were executed in a Windows 10 (64-bit) environment by using a personal computer with AMD (Ryzen 3 3200G) 3.6 GHz processor and 5.95 GB of RAM. Table 2 shows the execution time for images of different sizes.

4.1. Performance Metrics

The peak signal-to-noise ratio (PSNR), bit correction ratio (BCR), and structural similarity metrics (SSIM) were used to evaluate the imperceptibility of the watermark and the robustness and quality of the watermarked image. These measurements are common metrics used in watermarking [52].
PSNR is often used as a quality measure between original and modified images [23], which is defined as follows:
P S N R = 10 lo g 10 M a x 2 M S E
where Max is the maximum pixel value in the original image, and MSE represents the error between two m × m sized images (i.e., the original and watermarked images), which is defined as follows:
M S E = 1 m 2 i = 1 m j = 1 m [ I 1 ( i , j ) I 2 ( i , j ) ] 2 .
For de-watermarking, a PSNR value greater than 40 dB is an indicator of good quality image reconstruction [52].
The SSIM is a perceptual metric (defined by Equation (9) that quantifies image quality degradation caused by processing, e.g., data reconstruction or compression. SSIM measures the perceptual difference between two similar images and gives a quality reference by comparing the original and modified images.
S S I M = ( 2 µ 1 µ 2 + C 1 ) ( 2 σ ( I 1 , I 2 ) + C 2 ( µ 1 2 + µ 2 2 + C 1 ) ( σ ( I 1 ) 2 + σ ( I 2 ) 2 + C 2 ) .
Here, C1 and C2 are constants that ensure stability when the denominator becomes 0, µ1, µ2 is the mean value, and σ is the variance value of images I1 and I2.
The BCR measures the accuracy of the extracted bits (Equation (10)). The BCR compares two binary sequences, i.e., the inserted (W) and extracted (W′) watermarks. BCR is the ratio of the correctly extracted bits over the total number of embedded bits in percentage.
B C R = 1 z k = 0 z 1 ( W ( k ) W ( k ¯ ) ) × 100 .
Here, z is the length of the bit sequence and ⊕ is the XOR operator. The BCR value is 100% if the watermark is extracted without any bit error.

4.2. Effect of Gain Factor

There is a trade-off between invisibility and robustness in image watermarking. To maintain a good balance between these qualities, a suitable gain index (α) value should be selected for embedding. We experimented with three gain index values (α = 0.1, 0.2, and 0.3), and the results are shown in Table 3. As it can be seen, for α = 0.1 and α = 0.2, the PSNR values are greater than the acceptable margin for image imperceptibility (i.e., 40 dB) for all images, which was not obtained for the value of α = 0.3. The PSNR values are comparatively lower for higher gain index values; however, the BCR of the restored watermark remains intact. Thus, to maintain visual quality and robustness in watermarking, a balanced value of α = 0.1 and α = 0.2 was used in all subsequent experiments.

4.3. Embedding Capacity

As the length of the random bit sequence W (used as the watermark) increases, the security of the encryption increases; however, the image quality degrades. We examined the embedding capacity (number of bits) of the proposed watermarking scheme to validate its effectiveness. Figure 7 shows the PSNR values for different bit lengths. We found that the benchmark value of 40 dB could be achieved for all images with a bit stream size of 256–512 bits and near 40 dB for 1024 for some images.

5. Results and Discussions

We evaluated the proposed method on different images for robustness, imperceptibility, and BCR against various types of image attacks (e.g., compression, filtering, and geometrical, cropping, and histogram attacks). We tested different watermarked images, as shown in Figure 8, along with their resultant PSNR values using gain factor α = 0.1 and a bit stream length of 256 bits. As shown in Table 3, the PSNR values of the tested images were greater than 40 dB, and the BCR was 100% for the tested images, which is a significant outcome. In addition, the SSIM values were greater than 99%, except for the girl image, which had the minimum resolution (256 × 256).

5.1. Resistance to JPEG Compression Attacks

Table 4 shows the BCR (%) values of the recovered bits under different JPEG compression attacks for different watermarked images. Here, the quality factor (Q) is the JPEG compression quality strength, which varies from 10 to 70 [25]. It could be observed that our watermarks resist deep compression attacks. For different values of the quality factor Q ≥ 30, the watermark bits were recovered completely (100%) under highly compressed JPEG attacks for all the images, except the pepper image. The pepper image has a texture difference that is more affected by JPEG compression [40,53]. The proposed scheme uses a higher frequency level (2DWT) for embedding, which makes it more robust against JPEG attacks than existing methods [22] that only use single-level transformation.

5.2. Robustness against Common Noise Attacks

Different common attacks, e.g., Gaussian, salt and pepper, and speckle noise addition attacks were examined (Figure 9), and we achieved successful watermark extraction (Table 5) while preserving high SSIM values (Figure 10). Gaussian, salt, pepper, and speckle noise attacks primarily affect a particular region in the spatial data. As the proposed method employs frequency domain embedding, the watermarks are protected under two transform layers, and encrypted bits are barely affected in the lower sub-band zone. Under such high-variance noise attacks, we obtained nearly 100% BCR for most of the tested images.
It can be observed from Figure 10 that the SSIM is relatively lower for the jet plane and peppers images. These two images are with a single-color priority that is widely spread across the photos. For example, the color white is dominant in the jet plane image, whereas green and red are dominant in the pepper images. Any changes to the matrix coefficient represent high-effect changes in variety in the SSIM equation relative to the composite image of different colors, such as in the baboon, pirate, and bridge images.

5.3. Robustness against Image Enhancement Processes

We examined different types of image enhancement processes and bit removal activity relative to BCR for the reconstructed images. Frequency enhancement operations primarily suppress the pixel value by shortening or enhancing image intensity. It should be noted that the edge and smoothing areas of the image are primarily affected by these operations. The proposed method employs the zig-zig scan, which characterizes edge coefficients in the tail portion of the vectors; thus, the filtering operation cannot change the watermarked data in the embedding region. The bit removal attack in the less significant bit does not change the major difference of the original pixel value significantly. Instead of a direct pixel coefficient, we inserted a watermark into middle coefficients obtained from the parallel vectors (Equation (3)). Table 6 shows the BCR results after enhancement attacks (bit removal, gamma correction, and sharpening). Extraction under the bit removal process achieved satisfying BCR results (achieving 100% for most of the test) compared to the existing methods [40], which validates the proposed scheme’s suitability for such types of intervening.

5.4. Robustness against Cropping and Geometrical Attacks

Cropping and geometrical transformation are common attacks in scan and print processes. The proposed method demonstrates resistance against bit plane removal, cropping, and geometrical attacks (Figure 11). Although the proposed scheme is limited against a greater rotational effect, it is very robust against rotational mechanisms. In rotational attacks, the image pixels are translated at an angle difference, and symmetric resizing (512 to 256 to 512) returns the original pixel value. The cropping process cannot easily omit the watermark because DCT spreads the watermark all over the image rather than to a particular region. Thus, data loss is lower in rotating and cropping operations. The symmetric resizing process (512 to 256 to 512) is fully robust with no bit error; however, asymmetric resizing (512 to 200 to 512) is less robust after regeneration processes. Table 7 shows the BCR for rotational, resizing, and cropping modifications.

5.5. Robustness against Different Filtering Operations

Different image filtering attacks are imposed into our watermark image, and the SSIM and BCR values obtained by the proposed method were examined (Table 8). Typically, filtering operations cause a linear modification on the image pixel. The embedding zones in the proposed method are split into two parallel vectors, and the linear change due to filtering is concurrently affected on two parallel vectors. As such, the subtraction of the corresponding vector coefficients (extraction phase) gives the same value before and after filtering attacks. This means that the attack is prevented by the proposed mechanism successfully, and the watermark is extracted from filtering attacks. The BCR values were 100% for most of the tested images under various filtering operations.
Additionally, we have tested the proposed scheme on different levels of DWT composition for different filtering attacks (Table 9) to justify our selection of a 2DWT sub-band. Figure 12 shows the differences between the existing 1DWT [22] method and the proposed 2DWT watermarking method for different image attacks. The proposed method achieved better results in most cases using 2DWT.

5.6. Comparison with Other Methods

The main concern of an encryption-based watermarking technique is the full extraction of the watermark by ensuring the optimal quality of the watermarked image. Hence, the proposed method outperforms the existing methods in terms of BCR, as shown in Table 10. The proposed method obtained better results (BCR) than the methods proposed by Ferda et al. [54], Feng et al. [55], and Jiang et al. [56] under salt and pepper and JPEG compression (quality factors of 20 to 60) attacks. With an extreme JPEG compression ratio (quality factor 20), the proposed method outperformed the existing methods. It could be noted that Lin’s scheme [57] obtained similar results; however, this scheme is non-blind, and the original host image is required to extract the watermark. The average PSNR (dB), values (Table 11) obtained by our method are higher than the minimum threshold (40 dB) and the method also outperformed the existing methods. The higher BCR and PSNR value obtained by the proposed method demonstrates its practical effectiveness and suitability for protecting image properties while preventing attacks.
It is observed that among the compared methods, Feng et al. [55] achieved higher SSIM than the proposed method, but it failed to obtain a good enough BCR value (e.g., 69.80 for JPEG compression) for credible image verification. In addition, Lin’s scheme [57] applies watermarking techniques with quantizing difference map values, and watermark bits are embedded into the block-based wavelet coefficient. Compared to Lin’s scheme, the proposed scheme achieved a higher BCR and can minimize computational complexity.

6. Conclusions

In this paper, a robust and secure watermarking scheme based on the encryption of a random binary sequence is discussed. The proposed method uses 2DWT–DCT, a combination of two frequency domain techniques, where the second level of wavelet transform enables higher protection capabilities and ensures large enough embedding capacity for acceptable security at the same time. The proposed scheme was tested under various image processing attacks. The experimental results indicate that the proposed method performs well under different types of image processing operations, e.g., image filtering, compression, sharpening, bit removal, and noise addition attacks. In addition, we have used a parallel vector, rather than using a single vector, to minimize the PSNR.
Attackers often try to impair watermarks by estimating susceptible watermark locations from coefficient correlation. To minimize the risk of this type of attack, the length of the watermark sequence can be increased as a future work. The error correction code can also be added to multiple frequency levels with watermark bits to maximize bit recovery in interrupted image transmission. This algorithm is also extendable for the watermarking of color images. If a color image is decomposed into three channels in RGB format, we can obtain a larger space for the watermarking, yielding the opportunity to embed a longer cryptographic key and achieving better imperceptibility as well. Furthermore, a biometric-based cryptography key [66,67] could be considered for the enhancement of watermark security. All of these could be considered as future works.
The main advantage of the proposed scheme is that the bit rate error of extracted watermark is extremely low compared to recently proposed watermarking schemes. The watermark cannot be easily omitted by tampering with any area of an image. In addition, the imperceptibility of the proposed scheme was satisfactory. Thus, we conclude that the proposed scheme is well suited for copyright protection, ownership verification, and different cybersecurity applications. The proposed scheme can be used to protect the integrity of medical images and to preserve biometric data. Finally, the proposed method can be incorporated in the digital signature, photography identification, and other internet security tasks.

Author Contributions

Conceptualization, N.H.; methodology, N.H.; software, M.S.I. and S.A.-A.; validation, M.S.I. and M.A.K.; formal analysis, M.S.I. and M.A.K.; investigation, M.S.I. and N.H.; resources, W.C.; data curation, M.S.I. and M.A.K.; writing—original draft preparation, N.H. and M.S.I.; writing—review and editing, N.H., M.S.I., and M.A.K.; visualization, M.A.K. and S.A.-A.; supervision, W.C.; project administration, M.S.I.; funding acquisition, M.S.I. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through research group no (RG-1441-394).

Informed Consent Statement

Not applicable.

Data Availability Statement

Databases used in this study are available online.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Giri, K.J.; Quadri SM, K.; Bashir, R.; Bhat, J.I. DWT Based Color Image Watermarking: A Review. Multimed. Tools Appl. 2020, 79, 32881–32895. [Google Scholar] [CrossRef]
  2. Soltani Panah, A.; Van Schyndel, R.; Sellis, T.; Bertino, E. On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques. IEEE Access 2016, 4, 2670–2704. [Google Scholar] [CrossRef]
  3. Tao, H.; Chongmin, L.; Mohamad Zain, J.; Abdalla, A.N. Robust Image Watermarking Theories and Techniques: A Review. J. Appl. Res. Technol. 2014, 12, 122–138. [Google Scholar] [CrossRef] [Green Version]
  4. Chetan, K.R.; Nirmala, S. An Efficient and Secure Robust Watermarking Scheme for Document Images Using Integer Wavelets and Block Coding of Binary Watermarks. J. Inf. Secur. Appl. 2015, 24–25, 13–24. [Google Scholar] [CrossRef]
  5. Hsu, L.-Y.; Hu, H.-T. Blind Image Watermarking via Exploitation of Inter-Block Prediction and Visibility Threshold in DCT Domain. J. Vis. Commun. Image Represent. 2015, 32, 130–143. [Google Scholar] [CrossRef]
  6. Hernandez, J.R.; Amado, M.; Perez-Gonzalez, F. DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure. IEEE Trans. Image Process. 2000, 9, 55–68. [Google Scholar] [CrossRef] [Green Version]
  7. Cox, I.J.; Miller, M.L.; Bloom, J.A.; Fridrich, J.; Kalker, T. Watermarking with Side Information. In Digital Watermarking and Steganography; Elsevier: Amsterdam, The Netherlands, 2008; pp. 137–182. ISBN 978-0-12-372585-1. [Google Scholar]
  8. Roy, S.; Pal, A.K. A Blind DCT Based Color Watermarking Algorithm for Embedding Multiple Watermarks. AEU Int. J. Electron. Commun. 2017, 72, 149–161. [Google Scholar] [CrossRef]
  9. Moosazadeha, M.; Ekbatanifard, G. An Improved Robust Image Watermarking Method Using DCT and YCoCg-R Color Space. Optik 2017, 140, 975–988. [Google Scholar] [CrossRef]
  10. Su, Q.; Niu, Y.; Wang, G.; Jia, S.; Yue, J. Color Image Blind Watermarking Scheme Based on QR Decomposition. Signal. Process. 2014, 94, 219–235. [Google Scholar] [CrossRef]
  11. Chen, S.T.; Huang, H.N.; Kung, W.M.; Hsu, C.Y. Optimization-Based Image Watermarking with Integrat-Edquantization Embedding in the Wavelet-Domain. Multimed. Tools Appl. 2016, 75, 5493–5511. [Google Scholar] [CrossRef]
  12. Hsieh, M.-S.; Tseng, D.-C.; Huang, Y.-H. Hiding Digital Watermarks Using Multiresolution Wavelettransform. IEEE Trans Indust. Electron. 2001, 48, 875–882. [Google Scholar] [CrossRef] [Green Version]
  13. Kalra, G.S.; Talwar, R.; Sadawarti, H. Adaptive Digital Image Watermarking for Color Images In-Frequency Domain. Multimed. Tools Appl. 2015, 74, 6849–6869. [Google Scholar] [CrossRef]
  14. Patra, J.C.; Phua, J.E.; Bornand, C. A Novel DCT Domain CRT-Based Watermarking Scheme for Image Authentication Surviving JPEG Compression. Digit. Signal. Process. 2010, 20, 1597–1611. [Google Scholar] [CrossRef]
  15. Lin, S.D.; Chen, C.-F. A Robust DCT-Based Watermarking for Copyright Protection. IEEE Trans. Consum. Electron. 2000, 46, 415–421. [Google Scholar] [CrossRef]
  16. Lin, S.D.; Shie, S.-C.; Guo, J.Y. Improving the Robustness of DCT-Based Image Watermarking against JPEG Compression. Comput. Stand. Interfaces 2010, 32, 54–60. [Google Scholar] [CrossRef]
  17. Bao, P.; Ma, X. Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition. IEEE Trans. Circuits Syst. Video Technol. 2005, 15, 96–102. [Google Scholar] [CrossRef]
  18. Chang, C.-C.; Hu, Y.-S.; Lin, C.-C. A Digital Watermarking Scheme Based on Singular Value Decomposition. In Combinatorics, Algorithms, Probabilistic and Experimental Methodologies; Chen, B., Paterson, M., Zhang, G., Eds.; Lecture Notes in Computer Science; Springer: Berlin, Heidelberg, Germany, 2007; Volume 4614, pp. 82–93. ISBN 978-3-540-74449-8. [Google Scholar]
  19. Tao, P.; Eskicioglu, A.M. An Adaptive Method for Image Recovery in the DFT Domain. JMM 2006, 1, 36–45. [Google Scholar] [CrossRef]
  20. Mohammad, A.A. A New Digital Image Watermarking Scheme Based on Schur Decomposition. Multimed. Tools Appl. 2012, 59, 851–883. [Google Scholar] [CrossRef]
  21. Naderahmadian, Y.; Hosseini-Khayat, S. Fast and Robust Watermarking in Still Images Based on QR Decomposition. Multimed. Tools Appl. 2014, 72, 2597–2618. [Google Scholar] [CrossRef]
  22. Benoraira, A.; Benmahammed, K.; Boucenna, N. Blind Image Watermarking Technique Based on Differential Embedding in DWT and DCT Domains. EURASIP J. Adv. Signal. Process. 2015, 2015, 55. [Google Scholar] [CrossRef] [Green Version]
  23. Zhao, Y.; Campisi, P.; Kundur, D. Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images. IEEE Trans. Image Process. 2004, 13, 430–448. [Google Scholar] [CrossRef]
  24. Yaghmaee, F.; Jamzad, M. Estimating Watermarking Capacity in Gray Scale Images Based on Image Complexity. EURASIP J. Adv. Signal. Process. 2010, 2010, 851920. [Google Scholar] [CrossRef] [Green Version]
  25. Qadir, G.; Zhao, X.; Ho, A.T.S. Estimating JPEG2000 Compression for Image Forensics Using Benford’s Law; Schelkens, P., Ebrahimi, T., Cristóbal, G., Truchetet, F., Saarikko, P., Eds.; International Society for Optics and Photonics: Brussels, Belgium, 2010; p. 77230J. [Google Scholar]
  26. Su, Q.; Niu, Y.; Wang, Q.; Sheng, G. A Blind Color Image Watermarking Based on DC Component in the Spatial Domain. Optik 2013, 124, 6255–6260. [Google Scholar] [CrossRef]
  27. Loan, N.A.; Hurrah, N.N.; Parah, S.A.; Lee, J.W.; Sheikh, J.A.; Bhat, G.M. Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 2018, 6, 19876–19897. [Google Scholar] [CrossRef]
  28. Ahmad, J.; Khan, M.A.; Hwang, S.O.; Khan, J.S. A Compression Sensing and Noise-Tolerant Image Encryption Scheme Based on Chaotic Maps and Orthogonal Matrices. Neural Comput Applic. 2017, 28, 953–967. [Google Scholar] [CrossRef]
  29. Dowling, J.; Planitz, B.M.; Maeder, A.J.; Du, J.; Pham, B.; Boyd, C.; Chen, S.; Bradley, A.P.; Crozier, S. A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality. In Digital Watermarking; Shi, Y.Q., Kim, H.-J., Katzenbeisser, S., Eds.; Lecture Notes in Computer Science; Springer: Berlin, Heidelberg, Germany, 2008; Volume 5041, pp. 454–466. ISBN 978-3-540-92237-7. [Google Scholar]
  30. Kahlessenane, F.; Khaldi, A.; Kafi, R.; Euschi, S. A DWT Based Watermarking Approach for Medical Image Protection. J. Ambient Intell. Hum. Comput 2021, 12, 2931–2938. [Google Scholar] [CrossRef]
  31. Fares, K.; Khaldi, A.; Redouane, K.; Salah, E. DCT & DWT Based Watermarking Scheme for Medical Information Security. Biomed. Signal. Process. Control. 2021, 66, 102403. [Google Scholar] [CrossRef]
  32. Yap, P.-T.; Paramesran, R. Local Watermarks Based on Krawtchouk Moments. In Proceedings of the 2004 IEEE Region 10 Conference TENCON 2004, Chiang Mai, Thailand, 21–24 November 2004; IEEE: New York, NY, USA, 2004; Volume 2, pp. 73–76. [Google Scholar]
  33. Radeaf, H.S.; Mahmmod, B.M.; Abdulhussain, S.H.; Al-Jumaeily, D. A Steganography Based on Orthogonal Moments. In Proceedings of the International Conference on Information and Communication Technology, Baghdad, Iraq, 15–16 April 2019; ACM Press: New York, NY, USA, 2019; pp. 147–153. [Google Scholar]
  34. Qi, W.; Liu, Y.; Guo, S.; Wang, X.; Guo, Z. An Adaptive Visible Watermark Embedding Method Based on Region Selection. Secur. Commun. Netw. 2021, 2021, 1–11. [Google Scholar] [CrossRef]
  35. Vahedi, E.; Zoroofi, R.A.; Shiva, M. Toward a New Wavelet-Based Watermarking Approach for Color Images Using Bio-Inspired Optimization Principles. Digit. Signal. Process. 2012, 22, 153–162. [Google Scholar] [CrossRef]
  36. Mohananthini, N.; Yamuna, G. Comparison of Multiple Watermarking Techniques Using Genetic Algorithms. J. Electr. Syst. Inf. Technol. 2016, 3, 68–80. [Google Scholar] [CrossRef]
  37. Dong, C.; Li, J.; Huang, M.; Bai, Y. The Medical Image Watermarking Algorithm with Encryption by DCT and Logistic. In Proceedings of the 2012 Ninth Web Information Systems and Applications Conference, Haikou, China, 16–18 November 2012; IEEE: New York, NY, USA, 2012; pp. 119–124. [Google Scholar]
  38. Golabi, S.; Sadegh Helfroush, M.; Danyali, H.; Owjimehr, M. Robust Watermarking against Geometric Attacks Using Partial Calculation of Radial Moments and Interval Phase Modulation. Inf. Sci. 2014, 269, 94–105. [Google Scholar] [CrossRef]
  39. Fares, K.; Amine, K.; Salah, E. A Robust Blind Color Image Watermarking Based on Fourier Transform Domain. Optik 2020, 208, 164562. [Google Scholar] [CrossRef]
  40. Zhang, X.; Su, Q.; Yuan, Z.; Liu, D. An Efficient Blind Color Image Watermarking Algorithm in Spatial Domain Combining Discrete Fourier Transform. Optik 2020, 219, 165272. [Google Scholar] [CrossRef]
  41. Singh, D.; Singh, S.K. DWT-SVD and DCT Based Robust and Blind Watermarking Scheme for Copyright Protection. Multimed Tools Appl 2017, 76, 13001–13024. [Google Scholar] [CrossRef]
  42. Fan, D.; Li, Y.; Gao, S.; Chi, W.; Lv, C. A Novel Zero Watermark Optimization Algorithm Based on Gabor Transform and Discrete Cosine Transform. Concurr. Comput. Pr. Exper 2020, e5689. [Google Scholar] [CrossRef]
  43. Luo, Y.; Li, L.; Liu, J.; Tang, S.; Cao, L.; Zhang, S.; Qiu, S.; Cao, Y. A Multi-Scale Image Watermarking Based on Integer Wavelet Transform and Singular Value Decomposition. Expert Syst. Appl. 2021, 168, 114272. [Google Scholar] [CrossRef]
  44. Barker, E. Recommendation for Key Management: Part. 1—General; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [Google Scholar] [CrossRef]
  45. Abdulrahman, A.K.; Ozturk, S. A Novel Hybrid DCT and DWT Based Robust Watermarking Algorithm for Color Images. Multimed. Tools Appl. 2019, 78, 17027–17049. [Google Scholar] [CrossRef]
  46. Proakis, J.G.; Manolakis, D.G. Digital Signal. Processing: Principles, Algorithms, and Applications, 3rd ed.; Prentice Hall: Upper Saddle River, NJ, USA, 1996; ISBN 978-0-13-373762-2. [Google Scholar]
  47. Proakis, J.G.; Manolakis, D.G. Digital Signal. Processing, 4th ed.; Pearson Prentice Hall: Upper Saddle River, NJ, USA, 2007; ISBN 978-0-13-187374-2. [Google Scholar]
  48. Nikolaidis, A.; Pitas, I. Asymptotically Optimal Detection for Additive Watermarking in the DCT and DWT Domains. IEEE Trans. Image Process. 2003, 12, 563–571. [Google Scholar] [CrossRef]
  49. Parah, S.A.; Sheikh, J.A.; Loan, N.A.; Bhat, G.M. Robust and Blind Watermarking Technique in DCT Domain Using Inter-Block Coefficient Differencing. Digit. Signal. Process. 2016, 53, 11–24. [Google Scholar] [CrossRef]
  50. Chang, T.-J.; Pan, I.-H.; Huang, P.-S.; Hu, C.-H. A Robust DCT-2DLDA Watermark for Color Images. Multimed. Tools Appl. 2019, 78, 9169–9191. [Google Scholar] [CrossRef]
  51. Bhatnagar, G.; Wu, Q.M.J. A New Robust and Efficient Multiple Watermarking Scheme. Multimed. Tools Appl. 2015, 74, 8421–8444. [Google Scholar] [CrossRef]
  52. Huang, H.-C.; Chu, S.-C.; Pan, J.-S.; Huang, C.-Y.; Liao, B.-Y. Tabu Search Based Multi-Watermarks Embedding Algorithm with Multiple Description Coding. Inf. Sci. 2011, 181, 3379–3396. [Google Scholar] [CrossRef]
  53. Roimela, K.; Aarnio, T.; Itäranta, J. Efficient High Dynamic Range Texture Compression. In Proceedings of the 2008 Symposium on Interactive 3D Graphics and Games, Redwood City, CA, USA, 15–17 February 2008; ACM Press: New York, NY, USA, 2008; p. 207. [Google Scholar]
  54. Ernawan, F.; Kabir, M.N. A Robust Image Watermarking Technique with an Optimal DCT-Psychovisual Threshold. IEEE Access 2018, 6, 20464–20480. [Google Scholar] [CrossRef]
  55. Feng, L.P.; Zheng, L.B.; Cao, P. A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection. In Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 9–11 July 2010; IEEE: New York, NY, USA, 2010; pp. 455–458. [Google Scholar]
  56. Jiang, Y.; Zhang, Y.; Pei, W.; Wang, K. Adaptive Spread Transform QIM Watermarking Algorithm Based on Improved Perceptual Models. AEU Int. J. Electron. Commun. 2013, 67, 690–696. [Google Scholar] [CrossRef]
  57. Lin, W.-H.; Horng, S.-J.; Kao, T.-W.; Fan, P.; Lee, C.-L.; Pan, Y. An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization. IEEE Trans. Multimed. 2008, 10, 746–757. [Google Scholar] [CrossRef]
  58. Zermi, N.; Khaldi, A.; Kafi, R.; Kahlessenane, F.; Euschi, S. A DWT-SVD Based Robust Digital Watermarking for Medical Image Security. Forensic Sci. Int. 2021, 320, 110691. [Google Scholar] [CrossRef]
  59. Mardolkar, S.B.; Shenvi, N. A Blind Digital Watermarking Algorithm Based on DWT-DCT Transformation. Int. J. Innov. Res. Electr. Electron. Instrum. Control. Eng. 2016, 4, 212–216. [Google Scholar] [CrossRef]
  60. Zhang, Y.; Li, Y.; Sun, Y. Digital Watermarking Based on Joint DWT–DCT and OMP Reconstruction. Circuits Syst Signal. Process. 2019, 38, 5135–5148. [Google Scholar] [CrossRef]
  61. Lang, J.; Zhang, Z. Blind Digital Watermarking Method in the Fractional Fourier Transform Domain. Opt. Lasers Eng. 2014, 53, 112–121. [Google Scholar] [CrossRef]
  62. Guo, J.; Zheng, P.; Huang, J. Secure Watermarking Scheme against Watermark Attacks in the Encrypted Domain. J. Vis. Commun. Image Represent. 2015, 30, 125–135. [Google Scholar] [CrossRef]
  63. Moosazadeh, M.; Ekbatanifard, G. A New DCT-Based Robust Image Watermarking Method Using Teaching-Learning-Based Optimization. J. Inf. Secur. Appl. 2019, 47, 28–38. [Google Scholar] [CrossRef]
  64. Anand, A.; Singh, A.K. An Improved DWT-SVD Domain Watermarking for Medical Information Security. Comput. Commun. 2020, 152, 72–80. [Google Scholar] [CrossRef]
  65. Hu, H.-T.; Chang, J.-R.; Hsu, L.-Y. Robust Blind Image Watermarking by Modulating the Mean of Partly Sign-Altered DCT Coefficients Guided by Human Visual Perception. AEU Int. J. Electron. Commun. 2016, 70, 1374–1381. [Google Scholar] [CrossRef]
  66. Islam, M.S. Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices. Int. J. Distrib. Sens. Netw. 2015, 11, 549134. [Google Scholar] [CrossRef] [Green Version]
  67. Alharbi, S.; Islam, M.S.; Alahmadi, S. Time-Invariant Cryptographic Key Generation from Cardiac Signals. In Proceedings of the Future Technologies Conference (FTC), San Francisco, CA, USA, 24–25 October 2019; Arai, K., Bhatia, R., Kapoor, S., Eds.; Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2020; Volume 1070, pp. 338–352, ISBN 978-3-030-32522-0. [Google Scholar]
Figure 1. DWT of an image I from level j to j + 1 producing sub-bands LLj+1, LHj+1, HLj+1, and HHj+1.
Figure 1. DWT of an image I from level j to j + 1 producing sub-bands LLj+1, LHj+1, HLj+1, and HHj+1.
Sensors 21 05540 g001
Figure 2. Trade-off between imperceptibility and embedding capacity in various LL sub-bands.
Figure 2. Trade-off between imperceptibility and embedding capacity in various LL sub-bands.
Sensors 21 05540 g002
Figure 3. Histogram analysis before and after embedding baboon image in 1DWT and 2DWT: (a) 1DWT histogram before embedding, (b) 1DWT after embedding, (c) 2DWT histogram before embedding, and (d) 2DWT histogram after embedding.
Figure 3. Histogram analysis before and after embedding baboon image in 1DWT and 2DWT: (a) 1DWT histogram before embedding, (b) 1DWT after embedding, (c) 2DWT histogram before embedding, and (d) 2DWT histogram after embedding.
Sensors 21 05540 g003
Figure 4. Embedding procedure of 2DWT-DCT watermarking.
Figure 4. Embedding procedure of 2DWT-DCT watermarking.
Sensors 21 05540 g004
Figure 5. Extraction procedure.
Figure 5. Extraction procedure.
Sensors 21 05540 g005
Figure 6. Bit extraction from subtracted values of splitting vectors.
Figure 6. Bit extraction from subtracted values of splitting vectors.
Sensors 21 05540 g006
Figure 7. PSNR (dB) with different bit lengths as random bit sequences using α = 0.1.
Figure 7. PSNR (dB) with different bit lengths as random bit sequences using α = 0.1.
Sensors 21 05540 g007
Figure 8. Original images and corresponding watermarked images. The PSNR (dB) values of the resulting watermarked images are 46.8532, 45.6986, 52.7633, 46.7466, for the pepper, baboon, pirate and sailboat, respectively.
Figure 8. Original images and corresponding watermarked images. The PSNR (dB) values of the resulting watermarked images are 46.8532, 45.6986, 52.7633, 46.7466, for the pepper, baboon, pirate and sailboat, respectively.
Sensors 21 05540 g008
Figure 9. Watermarked images with common noise attacks (a) Gaussian filter (5 × 5) var = 1.5, (b) average filter (3 × 3), (c) salt and pepper noise (var = 0.01), (d) salt and pepper noise (var = 0.02), (e) speckle noise (var = 0.02).
Figure 9. Watermarked images with common noise attacks (a) Gaussian filter (5 × 5) var = 1.5, (b) average filter (3 × 3), (c) salt and pepper noise (var = 0.01), (d) salt and pepper noise (var = 0.02), (e) speckle noise (var = 0.02).
Sensors 21 05540 g009
Figure 10. SSIM Value for Different noise attacks.
Figure 10. SSIM Value for Different noise attacks.
Sensors 21 05540 g010
Figure 11. Watermarked images with geometrical attacks (a) bit plane removal, (b) rotation 0.25 degree, (c) surrounding crop 15%, (d) resizing 512 to 256, and (e) resizing 512 to 200.
Figure 11. Watermarked images with geometrical attacks (a) bit plane removal, (b) rotation 0.25 degree, (c) surrounding crop 15%, (d) resizing 512 to 256, and (e) resizing 512 to 200.
Sensors 21 05540 g011
Figure 12. BCR (%) comparison of 1DWT and 2DWT for different attacks.
Figure 12. BCR (%) comparison of 1DWT and 2DWT for different attacks.
Sensors 21 05540 g012
Table 1. Time complexity for an image with the size n = m × m image.
Table 1. Time complexity for an image with the size n = m × m image.
StepMain OperationEmbedding ProcessExtraction Process
1DWTO(n)O(n)
2Zig-zagO(n)O(n)
3Split vectorO(n)O(n)
4DCTO(n)O(n)
5Watermark embedding/extractionO(z)O(z)
6Inverse DCT & Zig-zagO(n)-
7Inverse DWTO(n)-
TotalO(n) + O(z)O(n) + O(z)
Table 2. Execution time for watermark embedding and extraction processes.
Table 2. Execution time for watermark embedding and extraction processes.
ImageImage SizeEmbedding Time (s)Extraction Time (s)
Girl256 × 2560.17160.1223
Peeper512 × 5120.22650.1448
Jet-plane512 × 5120.22670.1488
Baboon512 × 5120.23130.1479
Sailboat512 × 5120.22510.1471
Boat512 × 5120.23110.1471
Pirate1024 × 10240.44550.2457
Average 0.25110.1577
Table 3. PSNR (dB), SSIM, and BCR (%) measurements using different values of gain factor α using a 256-bit random sequence.
Table 3. PSNR (dB), SSIM, and BCR (%) measurements using different values of gain factor α using a 256-bit random sequence.
α = 0.1α = 0.2α = 0.3
ImagePSNRSSIMBCRPSNRSSIMBCRPSNRSSIMBCR
Peeper46.85320.990310041.07630.963710037.59910.9276100
Jet-plane44.99430.987710041.29360.960310037.47360.9153100
Baboon45.69860.996010040.06480.983410037.32890.9712100
Girl40.65850.958310035.25800.883410031.47150.7825100
Sailboat46.74660.991710040.97210.972310037.33620.9418100
Boat46.55940.992110041.11180.973110037.53010.9457100
Pirate52.76330.997810047.14270.992110043.56260.9829100
Table 4. Robustness against JPEG compression attacks in terms of BCR (%).
Table 4. Robustness against JPEG compression attacks in terms of BCR (%).
ImageQ 10Q 20Q 30Q 40Q 50Q 60Q 70
Girl77.45195.686100100100100100
Peeper89.12485.45899.986100100100100
Jet-plane84.25687.213100100100100100
Bridge90.945100100100100100100
Baboon87.254199.845100100100100100
Pirate88.457598.356100100100100100
Table 5. Robustness against various types of noise attacks in terms of BCR (%).
Table 5. Robustness against various types of noise attacks in terms of BCR (%).
ImageGaussian
Noise
(var = 0.0005)
Gaussian Noise
(var = 0.001)
Speckle Noise
(var = 0.01)
Speckle Noise
(var = 0.02)
Salt and Pepper
Noise
(var = 0.01)
Salt and Pepper
Noise
(var = 0.02)
Baboon99.6078100100100100100
Jet-plane99.507899.614210098.82100100
Bridge99.2157100100100100100
Pirate99.8876100100100100100
Peppers10099.6125100100100100
Table 6. Robustness against filtering and bit plane attacks in terms of BCR (%).
Table 6. Robustness against filtering and bit plane attacks in terms of BCR (%).
ImageBit-Plane
Removal (5 bits)
Bit-Plane
Removal (6 bits)
Gamma
Correction (0.5)
Gamma Correction (1.5)Histogram EqualizationLaplacian Sharpening
Baboon99.546497.1247100100100100
Jet-plane99.215495.2451100100100100
Bridge10093.1212100100100100
Pirate10096.6647100100100100
Peppers99.987100100100100100
Boat98.45199.4545100100100100
Table 7. Robustness against geometric attacks in terms of BCR (%).
Table 7. Robustness against geometric attacks in terms of BCR (%).
ImageRotation (0.25°)Rotation (0.5°)Resizing
(512 → 256 → 512)
Resizing (512 → 200 → 512)Surrounding
Crop (15%)
Baboon92.54970.58810072.156997.1201
Jet-plane99.60780.78410060.392297.0214
Bridge97.64775.68610069.372599.1041
Peppers10083.52910071.372598.5102
Boat97.25477.64710072.156998.8564
Tree10090.588210065.124596.6548
Table 8. Robustness against different filtering operations (SSIM and BCR%).
Table 8. Robustness against different filtering operations (SSIM and BCR%).
SSIMBCR
ImagesGaussian Filter (5 × 5)
var = 1.5
Gaussian Filter (5 × 5)
var = 1
Median Filter
(3 × 3)
Wiener Filter
(3 × 3)
Average Filter
(3 × 3)
Gaussian Filter (5 × 5)
var = 1.5
Gaussian Filter (5 × 5)
var = 1
Median Filter
(3 × 3)
Wiener Filter
(3 × 3)
Average Filter
(3 × 3)
Girl0.88480.88430.87850.88090.8769100100100100100
Baboon0.9880.98610.98730.98750.9875100100100100100
Jet0.96450.9570.95890.95670.9574100100100100100
Bridge0.98530.98280.9860.9840.9842100100100100100
Pirate0.99120.99060.99110.98980.9906100100100100100
Pepper0.96580.9660.96730.96810.9668100100100100100
Boat0.96980.96660.96830.97110.969599.216100100100100
Tree0.89650.96660.90340.89640.895299.21699.215710010099.608
Table 9. BCR (%) values of 1DWT and 2DWT for different filtering attacks.
Table 9. BCR (%) values of 1DWT and 2DWT for different filtering attacks.
Attack1DWT2DWTAttack1DWT2DWTAttack1DWT2DWT
Average filter [5 × 5]51.076399.6086Wiener filter [5 × 5]79.4521100Median Filter
[5 × 5]
57.142997.456
Average filter [7 × 7]17.221189.0196Wiener filter [6 × 6]73.189898.4344Median Filter
[6 × 6]
38.747691.9765
Average filter [6 × 6]31.506890.6067Wiener filter [7 × 7]70.645895.3033Median Filter
[7 × 7]
24.070582.5832
Table 10. Comparison of BCR (%) values of proposed with existing methods.
Table 10. Comparison of BCR (%) values of proposed with existing methods.
AttackZermi et al., 2021 [58]Fares et al., 2021 [31]Ferda et al., 2018 [54]Feng et al., 2010 [55]Lin et al., 2008 [57]Jiang et al., 2013 [56]Mardolkar et al., 2016 [59] Zhang et al., 2019 [60]Fan et al., 2020 [42]Proposed Method
JPEG compression 20 49.8069.8094.5050.8859.3799.8399.8799.85
JPEG compression 30 9871.9778.4098.40 99.87100
JPEG compression 4092 83.5089.2010076.9569.8599.9799.90100
Gamma Correction97 99.2076.10 100
Gaussian noise (0.01) 99.0687.5079.5070.4168.26 99.65100
Salt and Pepper (0.01)99 99.17 79.9881.7499.84 100
Salt and Pepper (0.02) 91 93.3093.3069.0467.1999.69 100
Median Filter (3 × 3) 99.0197.1099.20 99.87100
Table 11. Comparison of average PSNR (dB) values of the proposed with existing schemes.
Table 11. Comparison of average PSNR (dB) values of the proposed with existing schemes.
Feng et al. [55]Lang et el. [61]Lin et al. [16]Guo et al. [62]Abdulrahman et al. [45])Moosazadeh et al. [63]Anand et al. [64]Hu et al. [65]Proposed Method
37.7240.02136.42540.32137.003540.7644.1940.4846.85
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hasan, N.; Islam, M.S.; Chen, W.; Kabir, M.A.; Al-Ahmadi, S. Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains. Sensors 2021, 21, 5540. https://doi.org/10.3390/s21165540

AMA Style

Hasan N, Islam MS, Chen W, Kabir MA, Al-Ahmadi S. Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains. Sensors. 2021; 21(16):5540. https://doi.org/10.3390/s21165540

Chicago/Turabian Style

Hasan, Nayeem, Md Saiful Islam, Wenyu Chen, Muhammad Ashad Kabir, and Saad Al-Ahmadi. 2021. "Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains" Sensors 21, no. 16: 5540. https://doi.org/10.3390/s21165540

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop