Next Article in Journal
Inter-Level Feature Balanced Fusion Network for Street Scene Segmentation
Previous Article in Journal
Detection and Segmentation of Mature Green Tomatoes Based on Mask R-CNN with Automatic Image Acquisition Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments

by
Mostafa M. Abdel-Aziz
1,
Khalid M. Hosny
1,*,
Nabil A. Lashin
1 and
Mostafa M. Fouda
2
1
Department of Information Technology, Faculty of Computers and Informatics, Zagazig University, Zagazig 44519, Egypt
2
Department of Electrical and Computer Engineering, Idaho State University, Pocatello, ID 83209, USA
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(23), 7845; https://doi.org/10.3390/s21237845
Submission received: 3 October 2021 / Revised: 18 November 2021 / Accepted: 21 November 2021 / Published: 25 November 2021
(This article belongs to the Section Sensing and Imaging)

Abstract

:
This paper proposes a new blind, color image watermarking method using fast Walsh–Hadamard transformation (FWHT) and multi-channel fractional Legendre–Fourier moments (MFrLFMs). The input host color image is first split into 4 × 4 non-interfering blocks, and the MFrLFMs are computed for each block, where proper MFrLFMs coefficients are selected and FWHT is applied on the selected coefficients. The scrambled binary watermark has been inserted in the quantized selected MFrLFMs coefficients. The proposed method is a blind extraction, as the original host image is not required to extract the watermark. The proposed method is evaluated over many visual imperceptibility terms such as peak signal-to-noise ratio (PSNR), normalized correlation (NC), and bit error rate. The robustness of the proposed method is tested over several geometrical attacks such as scaling, rotation, cropping, and translation with different parameter values. The most widely recognized image processing attacks are also considered, e.g., compressing and adding noise attacks. A set of combination attacks are also tested to analyze the robustness of the proposed scheme versus several attacks. The proposed model’s experimental and numerical results for invisibility and robustness were superior to the results of similar watermarking methods.

1. Introduction

Copyright protection over the Internet has become a big challenge because it deals with securing the transmitted digital content through the transition medium over the internet. Therefore, the use of digital image watermarking systems has become a hot research area. It is widely used in the copyright protection of images and security from several unwanted modifications of digital content, such as tampering and forgery over these transitions [1]. Digital watermarking can conceal any data type, including images, audio, video, and text in chosen digital media such as color images [2]. Two essential domains are used with the applied watermarking domain: the spatial working domain [3] and the frequency working domain [4]. In the spatial domain method, embedding the watermark can be realized by explicitly modifying the image pixels. It has the benefits of accessible execution at low computing costs. The most prevalent techniques in the spatial domain are LSB, correlation-based methods, histogram shifting, and speed spectral methods.
Furthermore, the most common techniques are primarily used in the frequency domain such as discrete Fourier transformation, discrete cosine transformation, discrete wavelet transformation, and singular value decomposition. Compared with spatial domain methods, the transform domain methods are more robust to several attacks, with high invisibility [5]. The watermark is concealed in the transformed coefficients in the transform domain, resulting in a minor change in image pixel correlation, preserving image quality much more [6].
According to the extraction method, there are three common types of watermarking systems: blind, non-blind, and semi-blind watermarking [5]. In a blind watermarking [7] system, the host cover image is not required in the watermark extraction process; it just needs the watermarked image. In non-blind [8] watermarking, the host and the watermarked images are both required to extract the watermark image. In semi-blind watermarking [9], the watermarked image and security key are required to engage the extraction process fully.
Concerning the desired security purpose of the watermarking models, there are three common characteristics: robustness [10], semi-fragile [11], and fragile [12] watermarking models. The robustness of the watermark system is that it resists a specific set of transformations such as geometric attacks. It is extensively used in copyright protection. The semi-fragile watermark system resists benign transformations only and can be detected after slight changes. It is used to detect and locate malignant transformations. The fragile watermark system cannot be detected after slight modification. It can be destroyed because it is highly sensitive to any slight modification; it is extensively used in tamper detection for proving integrity.
In recent years, many authors have introduced many watermarking methods in using color images; therefore, color images play a significant role in real-life applications such as copyright provisions and image authenticity for medical applications and other similar fields.
Many researchers have presented realistic watermarking approaches in the spatial and frequency working domains. Parekh et al. [13] introduced a blind watermarking method in the spatial domain by modifying the luminosity component, Y, of the transformed YCbCr model. The host color image is split into 8 × 8 blocks, and a binary watermark has been embedded in a sorted correlation of values between corresponding blocks of sub-images. This scheme has been personalized, as it is low in robustness capabilities against various attacks. Su and Chen [14] introduced a watermarking scheme in the spatial domain to solve this problem. A binary logo image is embedded directly in distributed features in the direct current (DC) coefficients. This method proved to be a robust watermarking system against several geometric and standard signal attacks.
Owing to the robustness and indiscernibility of the watermarking systems in the frequency domain, many researchers proposed several watermarking strategies in this domain. Yuan et al. [15] proposed an image watermarking method for copyright protection. The color host image is divided into blocks, which are modified using (2D-DCT). The color logo image is embedded in the chosen intermediate coefficients of these selected blocks. The scheme is robust to most popular image processing attacks. Fares et al. [16] suggested a new image watermarking method based on discrete Fourier transform (DFT) of a fractional quaternion type. The watermark bits are concealed in the intermediate frequency band of the transformed RGB components by adjusting the least significant bits of the quantified magnitudes.
Many authors appealed to utilize the wavelet transformations in many watermarking schemes, in which it is a powerful tool that has been widely used in signal and image processing [17]. However, at the same time, it still has significant disadvantages such as (i) shift sensibility, any transitions in the input signal lead to unexpected changes in wavelet coefficients; (ii) inadequate directionality, since wavelet coefficients disclose only three spatial orientations; (iii) non-stationary signal, in view of the lake of phase information; (iv) computational complexity, especially for wavelet tree and numerous decomposition; and (v) complex accurate compilation of the mother wavelet and sub-bands mainly when applied in complicated fields. Our proposed method tried to overcome these significant problems using a hybrid technique by utilizing FWHT and MFrLFMs benefits to release a new, robust watermarking methodology.
Many researchers have touched upon the concept of perceiving the color image copyrights efficiently by using an advanced hybrid combination of the spatial and frequency domains techniques to achieve fast computation features of the spatial domain and at the same time take advantage of the durability of the frequency domain techniques. Yuan et al. [18] introduced a blind watermarking method based on a combination of spatial and frequency domains techniques. It was achieved by applying quantization steps on the DCT and discrete Hartley transformation (DHT) to embed a color logo image into the standard direct current frequencies blocks of the discrete cosine transform and DHT components. The watermark is extracted in a blind extraction manner by applying an inverse embedding process. The scheme is highly robust to many attacks.
The remnant of this paper is structured as follows. Section 2 handles diverse related works. Section 3 includes the essential preliminaries that have been used in the proposed method. Section 4 illustrates the proposed watermarking methodology in a detailed manner. Section 5 documents the experiment’s numerical results with discussion, followed by the conclusion in Section 6.

2. Related Work

Color medical images are the result of medical imaging of the interior of the human body for clinical analysis and medical intervention to reveal internal structures hidden by the skin and bones for diagnosing and treating disease. Medical images have also been established as a public database for medical purposes.
Due to the rapid increase in different types of attacks on color image watermarking systems, the successful extraction of the embedded watermark has become a common challenge in any current watermarking system because of higher sensitivity for different geometric, signal processing, and combination attacks. Any slight change in image pixel geometry leads to a false extraction process.
For this, many researchers have enhanced their efforts toward realizing many watermarking systems based on different invariant moments to attain the highest robustness and invisibility of watermarking systems. Ma et al. [19] introduced a robust watermarking method according to polar harmonic Fourier moments (PHFMs) and chaotic maps; accurate and robust PHFMs of the original cover image are computed and chosen depending on Gaussian numerical integration (GNI). The watermark was shuffled using a tent map and then concealed in the amplitudes of the selected PHFMs. The watermark extraction was done by applying PHFMs on watermarked images and the inverse of the embedding process in a blind extraction; this scheme is robust to different common geometric attacks. Yamni et al. [20] suggested a digital watermark algorithm based on fractional Charlier moments (FCMs) and singular value decomposition (SVD). In this method, the host cover images are split into 8 × 8 blocks. Then, the FCMs are computed for every block to obtain the FCM matrix, which SVD has decomposed by using adaptive pixel embedding with a quantization step. The method introduced the best superior fineness to reconstruct the watermarked images reasonably.
Wang et al. [21] introduced a watermarking algorithm depending on the TRHFMs’ computation of the input image. The selection of TRHFMs is randomly made using logistic maps to generate a zero-watermarked image by applying XOR between a binary watermark image and a binary feature image. This algorithm is robust to diverse types of attacks compared to similar methods. Ernawan [22] introduced a method using the Tchebichef-moments-based watermarking concept. The binary watermark is first shuffled using Arnold transformation and then concealed in the randomly selected Tchebichef moments matrix. This scheme is resistant to different classes of attacks, especially processing attacks. Singh et al. [23] introduced a watermarking system for medical images using PHFT, where the accurate computation of the chosen moment leads to a robust extraction process. Yamni et al. [24] introduced a blind watermarking method using radial Krawtchouk moments and an MLNCML chaotic system. The scheme was tested over standard signal processing and geometric attacks. Ernawan and Kabir [25] introduced a scheme using Tchebichef moments. The watermark logo is shuffled using an Arnold cat map and then embedded in the modified part of the selected moments over the chosen embedding blocks. Finally, the scheme is assessed for robustness versus widespread attacks.
Many researchers have revealed the use of quaternion-type moments (QTMs) in most current watermarking methods due to the ability and the advantages of dealing with cover images in a holistic manner [26]. It is more invariant to different image amendments such as rotation, translation, and scaling, since it can eliminate the transmutation parameters due to its invariance properties. It is also more efficient for computational analysis. As a result, Darwish et al. [27] introduced a scheme based on QLFMs and logistic maps. Logistic maps were employed on random selections of QLFM coefficients. The extraction process is the inverse operation of the embedding process. This method is successful in decreasing the computational time compared with other similar classical quaternion methods. This method achieves a high robustness level against more common attacks.
Hosny and Darwish [28] proposed a watermarking method of the quaternion type using radial substituted Chebyshev moments (QRSCMs) in a holistic way to deal with color images. This method successfully overcame the limitations of other similar methods, such as low-level accuracy, low-speed computation, and instability changes over the coefficient matrix. Hosny and Darwish [29] introduced an image watermarking method based on fast and accurate QLFMs that first scrambled the binary watermark using Arnold transformation and then embedded this scrambled watermark in the quantized version of selected QLFMs using dither modulation. Li et al. [30] introduced a watermarking method on color images using Hadamard transformation and Zernike moments of a quaternion-type; quaternion Hadamard transform (QHT) is holistically mutated. Then the transformed components were divided into 8 × 8 non-overlapping blocks to apply Schur decomposition, with the watermark embedded on a selected block. The scheme proved its ability to overcome many counterattacks and its robustness against most common geometric attacks. In addition, the scheme lacks evaluation over combined attacks. Liu et al. [31] introduced a scheme on color images using QPHT block magnitudes and Bessel Key form distribution (BKF); the binary watermark was embedded in the amplitudes of the selected precise moment of the cover images blocks. This scheme introduced high imperceptibility compared with similar methods; however, it is still sensitive to most common geometric attacks. Xia et al. [32] introduced a method for copyrights provisions on medical images using QPHFMs. Computing QPHFMs generate the key image to the input CT images to reconstruct the features image, shuffling binary bit pixels using a chaotic system and then applying XOR between the generated feature image and the binary sequence image. Huynh-The et al. [33] proposed a blind color image watermarking scheme depending on optimal selective color channel bits embedding in two middle-frequency bands of quantized coefficients. Xia et al. [34] introduced a robust method on medical images based on QPHFMs using a sped-up robust feature (SURF) to generate multiple zero-watermarking systems. The method is superior in robustness to different complex attacks. Z. Xia et al. [35] introduced a Null-watermarking method on color medical images based on precise quaternion polar harmonic Fourier moments (PQPHFMs) and chaotic maps principles.
Similarly, Yamni et al. [36] introduced an image watermarking scheme based on FrCMMs and SVD for copyrights provisions. Liu et al. [37] introduced a fractional-order Krawtchouk watermark scheme depending on the decomposition of eigenvalues. This scheme is successful at achieving high robustness compared with other classical integer-order Krawtchouk moments. Yang et al. [38] derived a new fractional order of Jacobi–Fourier moments using mixed low-order moment attributes to increase image descriptor representation and robustness. Xiao et al. [39] derived FrDCMs by using the decomposition eigenvalues of the kernel matrix and applied it to a proposed watermarking scheme. Hosny et al. [40] proposed a new zero-watermarking method for color images based on accurate computation of multi-channel fractional Legendre-Fourier moments (MFrLFMs) and Arnold encryption to generate a robust watermarking system. Hosny et al. [41] proposed a new multi-channel fractional exponent moment order (MFrEM) to construct a robust color image watermarking method. In [42], the authors proposed a semi-blind watermarking method based on combined DWT-CT and Schur SVD decompositions; the method attained a high visual imperceptibility and robustness.
In the field of medical image authentication, many authors suggested many watermarking systems to achieve data privacy and at the same time preserve image quality as possible to manage disease diagnostics. Elbası [43] proposed a watermarking method on medical images based on M-SVD utilizing DWT to embed binary watermarks into medical images. The author succeeds in scoring accurate quality measurements of the watermarked images utilizing the proposed M-SVD technique. Huh and Kim [44] introduced a location-based mobile system that provides a healthcare structure for users to find patients’ location and disease diagnostic easily. Hosny and Darwish [45] proposed multiple zero-watermarking methods based on FrMGMs and scrambled to embed multiple watermarks into color medical images to present a high securing and robust watermarking system. Soualmi et al. [46] introduced multiple blind watermarking schemes based on LWT and QR decomposition for medical images authentication. Sun and Bo [47] proposed a blind watermarking model to embed a binary watermark image into a color medical image utilizing the benefits of wavelet PCA, low-frequency sub-bands, and HSV wavelet coefficients.
Based on this review of major revisions for most related methods, the proposed method’s contributions are as follows:
  • Our method contributes to this evidence by using MFrLFMs. It is known for its stability and invariance to many geometric attacks, which keep robust capability over many attacks such as scaling, rotation, translation, etc.
  • In addition, MFrLFMs are not restricted to integer-order values, which give them a high ability to represent the finest details in the image rather than their rival’s orthogonal polynomials of integer order.
  • The use of Walsh–Hadamard transform comes under generalized Fourier transforms, known as low-computations compilations. Hadamard transform is a perpendicular function, which is composed of (−1 and +1) values only. Therefore, there is no data redundancy, which makes it widely used in many image processing analyses. FWHT is elastic to low-quality compression compared with other transformations such as traditional DCT and DWT, making it robust to most common image processing attacks.
  • The proposed method introduced a new combination method of these multi-channel fractional Legendre–Fourier moments (MFrLFMs) and Hadamard transformation in a holistic way to achieve the main target of the proposed method, which represents robustness to both geometric and image processing attacks.
  • The evaluation of our proposed method has been assessed for many common types of attacks and visual imperceptibility measurements.

3. Preliminaries

3.1. Fast Walsh–Hadamard Transformation Technique

The Hadamard transform is also known as the Walsh–Hadamard transform, Hadamard–Rademacher–Walsh transform, fast Walsh–Hadamard transform, or Walsh–Fourier transform and it comes under a summed-up class of Fourier transformation. It has the benefits of simple computational complexity O ( n 2 ) among all similar existing transforms [48]. It is orthogonal, symmetric, and has only two values (−1, +1), which results in isomorphism with no data redundancy. The FWHT has been extensively utilized in many image processing algorithms, digital steganography, and compression because it provides fast coefficient computation and fast reconstruction advantages. The fast Walsh–Hadamard transform is represented as follows:
F ( U , V ) = 1 N ×   H N   ×   f ( x , y )
The F ( U , V ) refers to the FWHT of f ( x , y ) , while the H N refers to the Hadamard matrix of squares.
The 4 × 4 Hadamard matrix is represented in the form
[ H 4 ] = [ H 2         H 2 H 2 H 2 ] = [ 1     1       11 1   1       1       1 1       1     1     1 1   1     1       1   ]
The main formula of the FWHT transformation is represented as
H 2 P = [ H 2 P 1 H 2 P 1 H 2 P 1 H 2 P 1 ]   f o r   p = 1 , 2 , 3 , 4 , 5 ,
where p values are based on the values of N , where N = 2 P .
The inverse of the fast Walsh–Hadamard transform is represented as
f ( x , y ) =   H N   ×   F ( U , V )
where F ( U , V ) is the FWHT of the function, f ( x , y ) .

3.2. MFrLFM Representation for RGB Color Image

Fractional-order polynomials are not restricted to integer-order values compared with other similar orthogonal moments, which give it a high ability to represent the fine details in an image rather than their rivals’ orthogonal polynomials of integer order [49]. These descriptors are also invariant to geometrical transformations (rotation, scaling, and translation). It is defined over a unit circle as follows:
M F r M p q ( f c ) = 2 p + 1 2 π 0 2 π 0 1 f c ( r , θ ) [ W p q ( r , θ ) ] * r d r d θ
where   W p q represents the essential functions of the Legendre–Fourier moments of fractional orders.
The function f c ( r , θ )   denotes the RGB color images, the asterisk symbol “*” refers to the complex conjugate; p = | q | = 0 , 1 , 2 , 3 , 4 , 5 , 6 .
The multi-channel fractional-order moments for all RGB color channels of the input image are computed using
f C R ( r ,   θ ) , f C G   ( r ,   θ )   and   f C G ( r ,   θ )
Therefore, the original image is reconstructed by the reliance on the orthogonal property [50] of the fractional-order LFMs as follows:
f C r e c o n s ( r , θ ) = p = 0 p m a x q = q m a x q m a x M F r M p q ( f c ) W p q ( r , θ )
where f C r e c o n s ( r , θ ) refer to the reconstructed image elements R, G, B of
f C R r e c o n s ( r ,   θ ) ,   f C G r e c o n s ( r ,   θ )   and   f C B r e c o n s ( r ,   θ )

3.3. Geometrical Invariances of MFrLFMs

Robust watermarking algorithms are based on their invariance ability to RST geometric transformations. These RST invariants are derived and represented in a mathematical form in the following sub-sections.

3.3.1. Rotational Invariance

Suppose that f C ( r , θ ) denotes the original image and f C β ( r ,   θ ) denotes the rotated image with a rotational angle β where
f C β ( r ,   θ ) = f C ( r , θ β )
The MFrLFMs of f C β ( r ,   θ ) is computed as follows:
M F r M   p q R ( f c β ) = 2 p + 1 2 π   0 2 π 0 1 f c ( r , θ ) L p ( α , r ) e i q θ     e i q β     r d r d θ = M F r M   p q ( f c ) e i q β
Sparingly, it can be written as
M F r M   p q R ( f c β ) = e i q β M F r M   p q ( f c ) ,   C   { R , G , B }
Since, | e i q β | = 1 ; then
| M F r M   p q R ( f c β ) | = |   M F r M   p q ( f c ) |
Equation (10) proves the rotation invariance of MFrLFMs.

3.3.2. Scale Invariance

Let f C ( r , θ ) refer to the original image and f C S ( r ,   θ ) be the scaled image where
f C S ( r ,   θ ) = f C ( r a   ,   θ )
The MFrLFM of the scaled image f C S ( r ,   θ ) is computed as follows:
M F r M   p q ( f C S ) = 2 p + 1 2 π   0 2 π 0 1 f c S ( r , θ ) [ W p q ( r , θ ) ] r d r d θ = 2 p + 1 2 π   0 2 π 0 1 f C (   r ˆ , θ ) L p ( α , a r ˆ ) e i q θ     r ˆ d r ˆ d θ = a 2 2 p + 1 2 π   0 2 π 0 1 f C (   r ˆ , θ ) L p ( α , a r ˆ ) e i q θ     r ˆ d r ˆ d θ
The L p ( α , a r ^ )   is the scaled fractional order.
Finally, the MFrLFM of the scaled image is computed as
M F r M   p q ( f C S ) = k = 0 p 2 p + 1 2 k + 1 ( i = k p a 2 i + 2 C p i d i k M F r M k g ( f C ) )

3.3.3. Translation Invariance

Translation invariance is realized when repositioning the original coordinates to synchronize with the centric points ( x c , y c ) of the color image [51] and ( x c , y c ) are defined as
x c = m 10 ( f R ) + m 10 ( f G ) + m 10 ( f B ) ) / m 00 y c = m 01 ( f R ) + m 01 ( f G ) + m 01 ( f B ) ) / m 00 m 00 = m 00 ( f R ) + m 00 ( f G ) + m 00 ( f B )
The central MFrLFMs are represented mathematically as
M F r M p q = 0 2 π 0 1 f C ( r ¯ , θ ¯ ) [ W p q ( r ¯ , θ ¯ ) ] r ¯ d r ¯ d θ ¯ = 0 2 π 0 1 f C ( r ¯ , θ ¯ )   L p q ( α , r ¯ ) ] e i q θ ¯ r ¯ d r ¯ d θ ¯

3.4. Accurate MFrLFM Computation

The selection of the accurate computation of MFrLFMs is one of the basic foundation rules of the proposed watermarking method. Any geometric distortion directly affects the robustness of the watermarking system over different geometric attacks, especially in medical images due to its high sensitivity to any distortion, which in turn leads to misdiagnosis. The computing of an accurate, kernel-based approach was introduced in [52]. MFrLFMs can be represented in polar coordinates (see Figure 1a) since they are symbolized in a unit circle. Each red point possesses eight point similarities, whereas each blue point possesses four similarities (see Figure 1b). The coefficient matrix of the MFrLFMs is calculated utilizing the equations:
M F r M p q = 2 p + 1 2 π i j k p q ( r i , θ i j )   f ^ C ( r i , θ i j )
where
k p q ( r i , θ i j ) = I p ( r i ) J q ( θ i j )
The kernels functions [53] are defined as
J q ( θ i j ) = v i j v i , j + 1 e i ^ q θ   d θ
l p ( r i ) = U i U i + 1 L p   ( α , r )   r d r = U i U i + 1 R ( r ) d r
where
R ( r ) = L p ( α , r ) r
The upper and lower limits are
V i , j + 1 = θ i , j + Δ θ i , j / 2 ;   V i , j = θ i , j Δ θ i , j / 2
U i + 1 = R i + Δ R i / 2 ; U i = R i Δ R i / 2  
Compute J q ( θ i , j ) in the exact form
J q ( θ i j ) = { 1 ^ q ( e i ^   q   V i . j + 1 e i ^   q   V i . j ) , q 0 V i , j + 1 V i , j ,       ,   q = 0
Then, calculate the radial kernel l p ( r i ) using suitable, accurate computation in [54] using the following equation:
l p ( r i ) = U i U i + 1 R ( r ) d r   ( U i + 1 U i ) 2 T   i = 1 2 T w R ( U i + ( U i + 1 U i ) ( l 0.5 ) 2 T t )
Symbols “ w ” and “t” indicate the weights, where T = 2 l and l = 0 , 1 , 2 , c l , the value of t can be explained in respect of the integrity of U i and U i + 1 is the order of numeral integration, and the value of w is restricted where l = 0 c 1 w = 2 .

4. Proposed Blind Watermarking

In this paper, we propose a robust blind color image watermarking model. In the watermark extraction phase, the embedded binary watermark bits can be extracted from the selected MFrLFM coefficient magnitudes in a blind extraction manner. The scrambled watermark bit information is concealed in the accurate RST invariants’ selection of MFrLFM magnitudes of the host color image, transformed by fast Walsh–Hadamard transform to generate a robust watermarking system. The host image is not required; there is only a need for the color watermarked image to carry out the entire extraction procedures, preserving image quality as much as possible.
Blind watermark introduced a crucial function, especially in medical images. It is known for its ability to preserve image quality to guarantee an exact diagnosis of the disease and to protect patient data from unwanted malicious attacks.
The idea behind deploying blind watermarking in our proposed method is to increase security, robustness, and imperceptibility. Furthermore, identity authentication must be provided for medical images, since every pixel in these images plays an essential role and represents essential patient data. Any distortion in these images’ pixels leads to disease misdiagnosis. It also has the advantage of a simple extraction; the watermark image can be extracted without needing the original host cover image, which reduces the time consumed during the extraction process and preserves image quality.
Sequentially, the detailed watermarking method for embedding and extraction processes is listed with illustrative diagrams as shown in Figure 2 and Figure 3, sequentially.

4.1. Watermarking Embedding Process

Assume that the input color host image is f , where
f = { f ( m , n ) , 0 m , n < N }
and the input watermark image is W of size P × Q, where
W = { w ( x , y ) { 0 , 1 } , 0 x < P , 0 y < Q }
which is to be concealed in the host color image. The embedding steps are discussed as follows:
Step 1: Scramble the binary watermark to banish the correlation between image pixels to add more reliability to the proposed method by using Arnold transformation [55] with arbitrarily chosen key (k), the watermark image is shuffled from W to W1, W 1 = { W ( x , y ) { 0 , 1 } , 0 x < P , 0 y < Q } . Transform it into a one-dimensional bit sequence as follows:
W 2 = { W 2 ( k ) = w 1   ( x ,   y ) , 0 x < P , 0 y < Q   , k = x × Q + y , w 2   ( k ) { 0 , 1 } }
Step 2: Split the input color image, f, into 4 × 4 non-interfering blocks, B k ,
B k = { B k ( m , n ) , 0 m , n < 3 } , K = 1 , 2 , N 2 / 16
Step 3: Compute MFrLFMs for each block, B k ( K = 1 , 2 , N 2 / 16 ) using the maximum moment order P × Q as shown in (Section 3) in detail.
Step 4: Select robust and accurate MFrLFMs to carry the watermark; this is done by computing the magnitude values of MFrLFMs to ensure RST invariances. In the proposed method, we selected MFrLFMs with positive reiterations q 4 m , m Z to avoid redundancy as follows:
S = {   | F r M p q | ,   q 4 m , m Z }
By utilizing the key k 2 , P × Q coefficients of MFrLFMs, which denote the positions of the selected pixels in the image blocks, are selected randomly from the delicate set depending on the watermark bits to get the feature vector magnitude.
Step 5: Apply fast Walsh–Hadamard transform (FWHT) on selected MFrLFM coefficients using Equation (1).
Step 6: Embed the scrambled binary watermark, W 1 bit information in the transformed MFrLFM magnitudes using dither modulation [56] using the following equation:
m F r L F M ( M ) = [ m F r L F M ( x ) d x ( W 1 ( x ) ) Δ ] Δ + d x ( W 1 ( x ) ) , 0 x < P × Q d x ( 1 ) = Δ 2 + d x ( 0 ) , d x ( 0 )   [ 0 , 1 ]
The m F r L F M ( M ) denotes the modulated blocks. The mathematical symbols, [   . ]   ,   Δ and d i ( . ) refer to the rounding factor, quantization step, and dither modulation.
Step 7: Apply inverse fast Walsh–Hadamard transform (IFWHT) using Equation (4).
Step 8: Reconstruct the color watermarked image f w ( r , θ ) as
f w ( r , θ ) = f c ( r , θ ) f c M ( r , θ ) + f c M ( r , θ )
where f c ( r , θ ) is the host color image, f c M ( r , θ ) is the modified part, and f c M ( r , θ ) is the unmodified part.
Step 9: Merge all 4 × 4 sub-blocks to get the color watermarked image finally f w ( m , n ) .

4.2. Blind Watermarking Extraction

The watermark extraction is done on a fully blind process. There is no need for the cover image; only the watermarked image is needed to generate an entirely successful extraction process by applying inverse operations of the embedding process. The extraction procedures are listed in the following steps in detail:
Step 1: Split the input watermarked image f w ( m , n ) into 4 × 4 non-interfering blocks, B k ,
  B k = { B k ( m , n ) , 0 m , n < 3 }     ,   K = 1 , 2 , N 2 / 16
Step 2: Compute MFrLFMs for each block by using the method in Section 3.
Step 3: Select the MFrLFM coefficients’ feature vector,
M F r L F M * = { m F r L F M * ( i ) , 0 i < p × Q }
As shown in the embedding process.
Step 4: Apply the fast Walsh–Hadamard transform (FWHT) on the selected MFrLFM magnitudes using Equation (1).
Step 5: Extract the watermark binary data bit information from the MFrLFM magnitudes by applying the inverse operation of Arnold transformation using the secret key, K, where the 1D binary bit series is extracted.
Step 6: Reconstruct the binary watermark image from the extracted one-dimensional binary bit sequence, W 1 * , by rearranging it into a two-dimensional binary image as
    W = { W * ( x , y ) , { 0 , 1 } , 0 x < p , 0 y < Q }
Step 7: Finally, obtain the binary extracted watermark image, W .

5. Experimental Results

In this part, various numeral simulations are enacted to assess the effectiveness of the proposed method according to the visual quality perception. PSNR and robustness evaluation has assessed these to several typical geometric, image filtering, and combination attacks conducted using NC and BER to measure the degree changes among pixels in the extracted binary watermark. The proposed method is tested over color host images of size 256 × 256 (shown in Figure 4) and color medical images selected from datasets [57,58,59] (shown in Figure 5). Binary watermark images are shown in Figure 6.
The attained numerical results are compared with other similar moment-based watermarking methods [28,29,41,60,61].
Additional comparisons with statistical watermarking methods [6,9,16,18,33] are also conducted to ensure the robustness and visual invisibility of the proposed methodology.
We document our experimental results according to the best and correct choice of   α , where   0 < α > 3 and   α R + .
Correspondingly, we tested different parameters values at α = 0.7 ,   1.1 ,   2.3 ,   and 2.6 ; from different experimental results, we noticed that the value of   α at   α = 1.1 is the optimum choice, where there are no readjustments while using the optimum value Δ = 0.2 .
Experimental results documented using different image sizes (128 × 128 and 256 × 256) are depicted in the following sub-sections. The watermark logo images are of sizes 32 × 32 and 10 × 10.

5.1. Visual Imperceptibility

We utilized peak signal-to-noise ratio to measure and evaluate the proposed watermarking’s imperceptibility. Increasing the PSNR values leads to the high invisibility of the watermarking model. The PSNR is defined as
P S N R ( f , f w ) = 10 l o g 10 ( M A X f 2 M S E )
where f is the host color image and f w is the color watermarked image;   M S E is the mean square error, and it is represented as
M s e = 1 N 2 i = 1 N j = 1 N [ f w ( i , j ) f ( i , j ) ] 2
The invisibility of the proposed methodology was evaluated at the value of   α = 1.1 and Δ   values ranged from 0.2 to 1.0 in comparison with other existing moment-based methods [28,29,41,60,61], which in turn embedded binary watermarks of size 32 × 32 into the standard color images. The average PSNR values are indicated in Figure 7. As we notice, there is a reverse operation between the PSNR values, and PSNR values increased as Δ values decreased. The average PSNR values of the proposed watermarking method and other similar methods are shown in Table 1. From these values, we note the proposed method’s success in attaining high PSNR values up to ~68 dB compared with other similar methods, which ensures the high imperceptibility of our method compared to other similar methods.
The PSNR values for a chosen color medical image (named IMG 1–5) are also indicated in an illustrative example (Figure 8) with high PSNR values, ensuring that our proposed method is suitable for application on medical images in a reasonable manner.

5.2. Robustness Evaluation

The robustness of our method was evaluated over the bit error rate (BER) and normalized correlation (NC), which are formulated as
B E R = 1 P × Q ( x = 1 P y = 1 Q [ W ( x , y ) W * ( x , y ) ] 2 )
N C = x = 1 P y = 1 Q [ W ( x , y ) × W * ( x , y ) ]     x = 1 P y = 1 Q [ W ( x , y ) ] 2
The robustness was evaluated over several categories of attacks, the first category comprised geometrics attacks such as rotation, scaling, cropping, magnification, and shearing attacks, with different parameter factors.
The second category included signal processing attacks such as jpeg, jpeg 2000, noising, salt and peppers, Gaussian, Gaussian low-pass, speckle noise attack, median filter attack, average filter attack, sharpen attack, histogram equalization, and motion blur attack. The third category included many common combination attacks.
The watermark logo was first resized to 10 × 10 and then embedded in the host color image by using and applying various geometric attacks on the watermarked image. Results for geometric attacks are shown in Table 2; several image processing attacks are also shown in Table 3, respectively.
The proposed method attained the highest robustness level against various geometrical and signal processing attacks.
To assess the robustness of the proposed method and other mentioned methods, the average BER and NC values are represented in Figure 9 and Figure 10 for easy comparison. From these simulation results, (in the referred Figure 9 and Figure 10), we note that our method successfully scored the minimum average value (BER = 0.0032) among the compared methods. Moreover, our method scored the maximum average value of NC = 0.9974. From these compared values, we deduce that our method surpassed other existing methods.
The additional numerical experimental test was performed on a chosen binary watermark image called “cup” of size 32 × 32, which was embedded in the standard host image “Lena” and attacked using different common types of attacks, resulting in a fair comparison between the proposed method and moment-based methods [28,29,41,60,61]. The extracted watermark within the corresponding values of BER and NC is notated in Table 4.
The simulation results of the proposed method and compared methods [28,29,41,60,61] of different NC values under various common attacks are also presented in a graphical simulation in Figure 11, Figure 12 and Figure 13. These results denote that the proposed method exceeded other existing methods and was robust to the various tested attacks.
From these results, we conclude that our method outperformed other existing methods. The watermark could be realized under various attacks suitably, and it seemed close to its original. In addition, the numerical values of BER and NC proved that the robustness of the proposed model surpassed other similar models.
We compared our method with more exiting statistical watermarking methods [6,9,16,18,33] in a comparison of maximum PSNR values of the watermarked images and the robustness of the extracted watermark over NC values under common attacks as shown in Table 5, from these values we can note that our proposed method succeeded in achieving a high robustness level and visual imperceptibility compared with others methods.

5.3. Capacity Evaluation

As there is a reverse operation between the payload capacity and visual image quality, increasing capacity degrades image quality (PSNR), so we considered this in our proposed method. The payload capacity of the proposed method was analyzed by the number of embedded bits per pixel (bpp). The maximum payload capacity for a chosen color host image of size 256 × 256 and watermark image of size 32 × 32 computed as (32 × 32)/(256 × 256 × 3) = 0.00520833 (bpp). It was obvious that our method scored satisfying results among the compared method as shown in Table 6, and at the same time preserved image quality as much as possible.

6. Conclusions

In this paper, a robust and efficient blind watermark method was proposed by utilizing FWHT and MFrLFMs on color images. The input binary watermark was scrambled using Arnold transformation to add more security and reliability to the proposed method. The accurate magnitude of MFrLFMs was selected to attain the goal of the watermarking system, which resulted in improved robustness and visual imperceptibility. The watermark bits were embedded in the modified magnitudes of the MFrLFMs based on the quantization step with optimum selected values. The proposed method successfully countered common geometric attacks, processing attacks, and combination complex attacks. The numerical results clearly show that our method surpassed existing similar methods with higher watermark invisibility, efficiency, and security, and it was suitable for medical images applications. In future work, we are looking to extend improvement to apply this method in a complete color image watermarking system to conceal color watermark logo images into color host cover images in a holistic way.

Author Contributions

Conceptualization, K.M.H. and M.M.A.-A.; methodology, K.M.H. and M.M.A.-A.; software, K.M.H. and M.M.A.-A.; validation, M.M.A.-A., K.M.H., N.A.L. and M.M.F.; formal analysis, K.M.H. and N.A.L.; investigation, K.M.H. and M.M.A.-A.; resources, K.M.H. and M.M.A.-A.; data curation, M.M.A.-A.; writing—original draft preparation, M.M.A.-A. and M.M.F.; writing—review and editing, K.M.H., N.A.L., M.M.A.-A. and M.M.F.; visualization, M.M.A.-A. and K.M.H.; supervision, K.M.H. and N.A.L.; project administration, K.M.H.; funding acquisition, M.M.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Qi, X.; Qi, J. A robust content-based digital image watermarking scheme. Signal Process. 2007, 87, 1264–1280. [Google Scholar] [CrossRef]
  2. Roy, S.S.; Basu, A.; Chattopadhyay, A. On the implementation of a copyright protection scheme using digital image watermarking. Multimed. Tools Appl. 2020, 79, 13125–13138. [Google Scholar] [CrossRef]
  3. Al-khafaji, A.; Nur, N.; Sjarif, N.N.A.; Mahdi, M.; Shafry, M.; Rahim, M. A review and open issues of diverse text watermarking techniques in spatial domain. J. Theor. Appl. Inf. Technol. 2018, 96, 5819–5840. [Google Scholar]
  4. Jibrin, B.; Tekanyi, A.; Sani, S. Image Watermarking Algorithm in Frequency Domain: A Review of Technical Literature. ATBU J. Sci. Technol. Educ. 2019, 7, 257–263. [Google Scholar]
  5. Agarwal, N.; Singh, A.K.; Singh, P.K. Survey of robust and imperceptible watermarking. Multimed. Tools Appl. 2019, 78, 8603–8633. [Google Scholar] [CrossRef]
  6. Prabha, K.; Sam, I.S. An effective robust and imperceptible blind color image watermarking using WHT. J. King Saud Univ. Comput. Inf. Sci. 2020, in press. [Google Scholar] [CrossRef]
  7. Naidu, S.; Upadhyay, G. A Review on Blind Watermarking Technique for Copyright Protection of Image-based on DCT, DWT, and SVD Domain. Int. Res. J. Eng. Technol. 2020, 7, 364–366. [Google Scholar]
  8. Anbarjafari, G.; Ozcinar, C. Imperceptible non-blind watermarking and robustness against tone mapping operation attacks for high dynamic range images. Multimed. Tools Appl. 2018, 77, 24521–24535. [Google Scholar] [CrossRef]
  9. Izhar, M.N. A Semi Blind Watermarking Technique for Copyright Protection of Image-Based on DCT and SVD Domain. Glob. J. Res. Eng. 2017, 16, 364–366. [Google Scholar]
  10. Valandar, M.Y.; Barani, M.J.; Ayubi, P. A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional Hénon map. Soft Comput. 2020, 24, 771–794. [Google Scholar] [CrossRef]
  11. Feng, B.; Li, X.; Jie, Y.; Guo, C.; Fu, H. A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration. Mob. Netw. Appl. 2020, 25, 82–94. [Google Scholar] [CrossRef]
  12. Molina-Garcia, J.; Garcia-Salgado, B.P.; Ponomaryov, V.; Reyes-Reyes, R.; Sadovnychiy, S.; Cruz-Ramos, C. An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process. Image Commun. 2020, 81, 115725. [Google Scholar] [CrossRef]
  13. Varma, P.R.K.; Kumari, V.V.; Kumar, S.S. Spatial Domain Blind Watermarking for Digital Images. In Progress in Computing, Analytics and Networking; Springer: Singapore, 2018; Volume 710. [Google Scholar] [CrossRef]
  14. Su, Q.; Chen, B. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018, 22, 91–106. [Google Scholar] [CrossRef]
  15. Yuan, Z.; Liu, D.; Zhang, X.; Su, Q. New image blind watermarking method based on two-dimensional discrete cosine transform. Optik 2020, 204, 164152. [Google Scholar] [CrossRef]
  16. Fares, K.; Amine, K.; Salah, E. A robust blind color image watermarking based on Fourier transform domain. Optik 2020, 208, 164562. [Google Scholar] [CrossRef]
  17. Shukla, M. A Comparative Study of Wavelet and Curvelet Transform for Image Denoising. IOSR J. Electron. Commun. Eng. 2013, 7, 63–68. [Google Scholar] [CrossRef]
  18. Yuan, Z.; Su, Q.; Liu, D.; Zhang, X. A blind image watermarking scheme combining spatial domain and frequency domain. Vis. Comput. 2020, 37, 1867–1881. [Google Scholar] [CrossRef]
  19. Ma, B.; Chang, L.; Wang, C.; Li, J.; Wang, X.; Shi, Y.Q. Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Signal Process. 2020, 172, 107544. [Google Scholar] [CrossRef]
  20. Yamni, M.; Daoui, A.; El Ogri, O.; Karmouni, H.; Sayyouri, M.; Qjidaa, H.; Flusser, J. Fractional Charlier moments for image reconstruction and image watermarking. Signal Process. 2020, 171, 107509. [Google Scholar] [CrossRef]
  21. Wang, C.; Wang, X.; Xia, Z.; Zhang, C. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf. Sci. 2019, 470, 109–120. [Google Scholar] [CrossRef]
  22. Ernawan, F. Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection. Int. J. Electr. Comput. Eng. 2019, 9, 1850–1860. [Google Scholar] [CrossRef]
  23. Singh, M.K.; Kumar, S.; Ali, M.; Saini, D. Application of a novel image moment computation in X-ray and M.R.I. image watermarking. IET Image Process. 2021, 15, 666–682. [Google Scholar] [CrossRef]
  24. Yamni, M.; Karmouni, H.; Daoui, A.; el ogri, O.; Sayyouri, M.; Qjidaa, H. Blind Image Zero-Watermarking Algorithm Based on Radial Krawtchouk Moments and Chaotic System. In Proceedings of the 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, 9–11 June 2020; pp. 1–7. [Google Scholar] [CrossRef]
  25. Ernawan, F.; Kabir, M.N. An Improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments. IEEE Access 2019, 7, 151985–152003. [Google Scholar] [CrossRef]
  26. Chen, B.; Shu, H.; Coatrieux, G.; Chen, G.; Sun, X.; Coatrieux, J. Color Image Analysis by Quaternion-Type Moments. J. Math. Imaging Vis. 2014, 51, 124–144. [Google Scholar] [CrossRef]
  27. Darwish, M.; Hosny, K.; Kamal, S. Improved Color Image Watermarking Using Logistic Maps and Quaternion Legendre-Fourier Moments. In Multimedia Security Using Chaotic Maps: Principles and Methodologies; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar] [CrossRef]
  28. Hosny, K.; Darwish, M. Resilient Color Image Watermarking Using Accurate Quaternion Radial Substituted Chebyshev Moments. ACM Trans. Multimed. Comput. Commun. Appl. 2019, 15, 46. [Google Scholar] [CrossRef]
  29. Hosny, K.M.; Darwish, M.M. Robust color image watermarking using invariant quaternion Legendre-Fourier moments. Multimed. Tools Appl. 2018, 77, 24727–24750. [Google Scholar] [CrossRef]
  30. Li, J.; Yu, C.; Gupta, B.B.; Ren, X. Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed. Tools Appl. 2018, 77, 4545–4561. [Google Scholar] [CrossRef]
  31. Liu, Y.; Zhang, S.; Yang, J. Color image watermark decoder by modeling quaternion polar harmonic transform with B.K.F. distribution. Signal Process. Image Commun. 2020, 88, 115946. [Google Scholar] [CrossRef]
  32. Xia, Z.; Wang, X.; Li, X.; Wang, C.; Unar, S.; Wang, M.; Zhao, T. Efficient copyright protection for three C.T. images based on quaternion polar harmonic Fourier moments. Signal Process. 2019, 164, 368–379. [Google Scholar] [CrossRef]
  33. Huynh-The, T.; Hua, C.H.; Tu, N.A.; Hur, T.; Bang, J.; Kim, D.; Amin, M.B.; Kang, B.H.; Seung, H.; Lee, S. Selective bit embedding scheme for robust blind color image watermarking. Inf. Sci. 2018, 426, 1–18. [Google Scholar] [CrossRef]
  34. Xia, Z.; Wang, X.; Wang, C.; Ma, B.; Wang, M.; Shi, Y. Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images. Knowl.-Based Syst. 2021, 216, 106568. [Google Scholar] [CrossRef]
  35. Xia, Z.; Wang, X.; Wang, M.; Unar, S.; Wang, C.; Liu, Y.; Li, X. Geometrically Invariant Color Medical Image Null-Watermarking Based on Precise Quaternion Polar Harmonic Fourier Moments. IEEE Access 2019, 7, 122544–122560. [Google Scholar] [CrossRef]
  36. Yamni, M.; Karmouni, H.; Sayyouri, M.; Qjidaa, H. Image watermarking using separable fractional moments of Charlier–Meixner. J. Frankl. Inst. 2021, 358, 2535–2560. [Google Scholar] [CrossRef]
  37. Liu, X.; Han, G.; Wu, J.; Shao, Z.; Coatrieux, G.; Shu, H. Fractional Krawtchouk Transform with an Application to Image Watermarking. IEEE Trans. Signal Process. 2017, 65, 1894–1908. [Google Scholar] [CrossRef]
  38. Yang, H.; Qi, S.; Tian, J.; Niu, P.; Wang, X. Robust and discriminative image representation: Fractional-order Jacobi-Fourier moments. Pattern Recognit. 2021, 115, 107898. [Google Scholar] [CrossRef]
  39. Xiao, B.; Luo, J.; Bi, X.; Li, W.; Chen, B. Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf. Sci. 2020, 516, 545–559. [Google Scholar] [CrossRef]
  40. Hosny, K.M.; Darwish, M.M.; Fouda, M.M. New Color Image Zero-Watermarking Using Orthogonal Multi-Channel Fractional-Order Legendre-Fourier Moments. IEEE Access 2021, 9, 91209–91219. [Google Scholar] [CrossRef]
  41. Hosny, K.M.; Darwish, M.M.; Fouda, M.M. Robust Color Images Watermarking Using New Fractional-Order Exponent Moments. IEEE Access 2021, 9, 47425–47435. [Google Scholar] [CrossRef]
  42. Vaidya, P.; Pvssr, C.M. A robust semi-blind watermarking for color images based on multiple decompositions. Multimed. Tools Appl. 2017, 76, 25623–25656. [Google Scholar] [CrossRef]
  43. Elbaşı, E. M-SVD based Quality Measurement in Hybrid non-blind Watermarked Medical Images. In Proceedings of the 2020 43rd International Conference on Telecommunications and Signal Processing (TSP), Milan, Italy, 7–9 July 2020. [Google Scholar] [CrossRef]
  44. Huh, J.-H.; Kim, T.-J. A location-based mobile health care facility search system for senior citizens. J. Supercomput. 2019, 75, 1831–1848. [Google Scholar] [CrossRef]
  45. Hosny, K.M.; Darwish, M.M. New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed. Signal Process. Control. 2021, 70, 103007. [Google Scholar] [CrossRef]
  46. Soualmi, A.; Alti, A.; Laouamer, L. Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications. Int. J. Comput. Vis. Image Process. 2021, 11, 1–16. [Google Scholar] [CrossRef]
  47. Sun, X.; Bo, S. A blind digital watermarking for color medical images based on P.C.A. In Proceedings of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, Beijing, China, 25–27 June 2010; pp. 421–427. [Google Scholar] [CrossRef]
  48. Meenakshi, K.; Rao, C.S.; Prasad, K.S. A Robust Watermarking Scheme Based Walsh-Hadamard Transform and S.V.D. Using ZIG ZAG Scanning. In Proceedings of the 2014 International Conference on Information Technology, Bhubaneswar, India, 22–24 December 2014; pp. 167–172. [Google Scholar] [CrossRef]
  49. Erfani, S.; Babolian, E.; Javadi, S.; Shamsi, M. Stable evaluations of fractional derivative of the Müntz–Legendre polynomials and application to fractional differential equations. J. Comput. Appl. Math. 2019, 348, 70–88. [Google Scholar] [CrossRef]
  50. Hosny, K.M.; Darwish, M.M.; Aboelenen, T. New fractional-order Legendre-Fourier moments for pattern recognition applications. Pattern Recognit. 2020, 103, 107324. [Google Scholar] [CrossRef]
  51. Suk, T.; Flusser, J. Affine Moment Invariants of Color Images. In Computer Analysis of Images and Patterns; Jiang, X., Petkov, N., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5702. [Google Scholar] [CrossRef]
  52. Hosny, K.M.; Darwish, M.M. A kernel-based method for fast and accurate computation of PHT in polar coordinates. J. Real-Time Image Process. 2019, 16, 1235–1247. [Google Scholar] [CrossRef]
  53. Hosny, K.M.; Darwish, M.M. Highly accurate and numerically stable higher order QPCET moments for color image representation. Pattern Recognit. Lett. 2017, 97, 29–36. [Google Scholar] [CrossRef]
  54. Upneja, R.; Pawlak, M.; Sahan, A.M. An accurate approach for the computation of polar harmonic transforms. Optik 2018, 158, 623–633. [Google Scholar] [CrossRef]
  55. Yang, H.-Y.; Wang, X.-Y.; Wang, P.; Niu, P.-P. Geometrically resilient digital watermarking scheme based on radial harmonic Fourier moments magnitude. AEU Int. J. Electron. Commun. 2015, 69, 389–399. [Google Scholar] [CrossRef]
  56. Xin, Y.; Liao, S.; Pawlak, M. Circularly orthogonal moments for geometrically robust image watermarking. Pattern Recognit. 2007, 40, 3740–3752. [Google Scholar] [CrossRef]
  57. Color Melanoma Images. Available online: https://www.isic-archive.com (accessed on 1 May 2021).
  58. Color Retinal Images. Available online: https://www5.cs.fau.de (accessed on 1 May 2021).
  59. Color Anatomical Images. Available online: https://www.nlm.nih.gov (accessed on 1 May 2021).
  60. Wang, X.Y.; Yang, H.Y.; Niu, P.P.; Wang, C.P. Quaternion exponent moments based robust color image watermarking. J. Comput. Res. Dev. 2016, 53, 651–665. [Google Scholar]
  61. Xu, H.; Kang, X.; Chen, Y.; Wang, Y. Rotation and scale invariant image watermarking based on polar harmonic transforms. Optik 2019, 183, 401–414. [Google Scholar] [CrossRef]
Figure 1. (a) Cartesian coordinates; (b) polar coordinates.
Figure 1. (a) Cartesian coordinates; (b) polar coordinates.
Sensors 21 07845 g001
Figure 2. Proposed watermark embedding.
Figure 2. Proposed watermark embedding.
Sensors 21 07845 g002
Figure 3. Proposed watermark extraction.
Figure 3. Proposed watermark extraction.
Sensors 21 07845 g003
Figure 4. The host standard color images (a) Lena; (b) Peppers; (c) Baboon; (d) F16; (e) San Diego miramar; (f) San Diego north island; (g) Man; (h) Elephant; (i) Monarch; (j) Museum.
Figure 4. The host standard color images (a) Lena; (b) Peppers; (c) Baboon; (d) F16; (e) San Diego miramar; (f) San Diego north island; (g) Man; (h) Elephant; (i) Monarch; (j) Museum.
Sensors 21 07845 g004aSensors 21 07845 g004b
Figure 5. Selected host color medical images from datasets [57,58,59].
Figure 5. Selected host color medical images from datasets [57,58,59].
Sensors 21 07845 g005
Figure 6. Selected binary watermark images (aj).
Figure 6. Selected binary watermark images (aj).
Sensors 21 07845 g006
Figure 7. Average PSNR values using varying values of ∆.
Figure 7. Average PSNR values using varying values of ∆.
Sensors 21 07845 g007
Figure 8. The PSNR values for selected color medical images at ∆ = 0.2.
Figure 8. The PSNR values for selected color medical images at ∆ = 0.2.
Sensors 21 07845 g008
Figure 9. Average BER values of the proposed and compared methods for common attacks.
Figure 9. Average BER values of the proposed and compared methods for common attacks.
Sensors 21 07845 g009
Figure 10. Average NC values of the proposed and compared methods for common attacks.
Figure 10. Average NC values of the proposed and compared methods for common attacks.
Sensors 21 07845 g010
Figure 11. Graphical comparative of NC values under a scaling attack with different parameters.
Figure 11. Graphical comparative of NC values under a scaling attack with different parameters.
Sensors 21 07845 g011
Figure 12. Graphical comparison of NC values using combination attacks with different parameters.
Figure 12. Graphical comparison of NC values using combination attacks with different parameters.
Sensors 21 07845 g012
Figure 13. Graphical comparison of NC values under common noise and filtering attacks.
Figure 13. Graphical comparison of NC values under common noise and filtering attacks.
Sensors 21 07845 g013
Table 1. PSNR values using varying values of ∆.
Table 1. PSNR values using varying values of ∆.
Quantization Step ∆QEMs [60]QPHTs [61]QRSCMs [28]QLFMs [29]MfrEMs [41]Proposed Method
0.244.2050.0354.0358.2559.2768.84
0.437.7844.1250.6753.2154.2466.42
0.634.3141.0847.4648.8650.2161.03
0.831.5138.2544.6745.0547.0557.32
1.029.8136.7843.9744.9146.4154.21
Table 2. Robustness results of the extracted watermark from the attacked image “Lena” using geometrics attacks, ∆ = 0.2.
Table 2. Robustness results of the extracted watermark from the attacked image “Lena” using geometrics attacks, ∆ = 0.2.
AttacksBERNCExtracted Watermark
No Attack01 Sensors 21 07845 i001
Rotation Attack01 Sensors 21 07845 i002
15°01 Sensors 21 07845 i003
25°01 Sensors 21 07845 i004
65°01 Sensors 21 07845 i005
Scaling Attack0.50.00230.9962 Sensors 21 07845 i006
0.7501 Sensors 21 07845 i007
1.2501 Sensors 21 07845 i008
1.501 Sensors 21 07845 i009
201 Sensors 21 07845 i010
Translation Attack(15,2)01 Sensors 21 07845 i011
(20,20)01 Sensors 21 07845 i012
(2,15)01 Sensors 21 07845 i013
(0,50)0.00010.9998 Sensors 21 07845 i014
(50,0)0.00010.9998 Sensors 21 07845 i015
Shearing Attack(0–1%)0.00750.9932 Sensors 21 07845 i016
Magnification (1.75)01 Sensors 21 07845 i017
Cropping, Right(25%)0.01460.9820 Sensors 21 07845 i018
Cropping, Top(25%)0.00680.9916 Sensors 21 07845 i019
Cropping, Middle(25%)01 Sensors 21 07845 i020
Table 3. Robustness results of the extracted watermark from the attacked image “Lena” using processing attacks ∆ = 0.2.
Table 3. Robustness results of the extracted watermark from the attacked image “Lena” using processing attacks ∆ = 0.2.
AttacksBERNCExtracted Watermark
JPEG Compression3001 Sensors 21 07845 i021
4001 Sensors 21 07845 i022
5001 Sensors 21 07845 i023
6001 Sensors 21 07845 i024
7001 Sensors 21 07845 i025
9001 Sensors 21 07845 i026
Motion Blur(3,3)01 Sensors 21 07845 i027
(4,8)01 Sensors 21 07845 i028
Lossy Compression (80)01 Sensors 21 07845 i029
Salt and Pepper (0.03)01 Sensors 21 07845 i030
Gaussian (0.03)01 Sensors 21 07845 i031
Gaussian Low-Pass (3,3)01 Sensors 21 07845 i032
Poisson Noise01 Sensors 21 07845 i033
Speckle Noise Attack01 Sensors 21 07845 i034
Median Filter Attack0.00020.9972 Sensors 21 07845 i035
Average Filter Attack (3,3)0.00030.9961 Sensors 21 07845 i036
Sharpen Attack0.00010.9998 Sensors 21 07845 i037
Histogram Equalization01 Sensors 21 07845 i038
Table 4. Robustness evaluation for the proposed method and other exiting moment-based methods under common attacks.
Table 4. Robustness evaluation for the proposed method and other exiting moment-based methods under common attacks.
AttacksQEMs [60]QPHTs [61]QLFMs [29]QRSCMs [28]MFrEMs [41]Proposed Method
Rotation Angle 15 ° Sensors 21 07845 i039Ber = 0.0703
Nc = 0.9143
Sensors 21 07845 i040Ber = 0.1582
Nc = 0.7850
Sensors 21 07845 i041Ber = 0.0479
Nc = 0.9409
Sensors 21 07845 i042Ber = 0.0479
Nc = 0.9408
Sensors 21 07845 i043Ber = 0.0195
Nc = 0.9759
Sensors 21 07845 i044Ber = 0.0022
Nc = 0.9989
35 ° Sensors 21 07845 i045Ber = 0.0557
Nc = 0.9316
Sensors 21 07845 i046Ber = 0.1533
Nc = 0.7941
Sensors 21 07845 i047Ber = 0.0361
Nc = 0.9551
Sensors 21 07845 i048Ber = 0.0449
Nc = 0.9445
Sensors 21 07845 i049Ber = 0.0176
Nc = 0.9782
Sensors 21 07845 i050Ber = 0.0050
Nc = 0.9953
45 ° Sensors 21 07845 i051Ber = 0.0547
Nc = 0.9322
Sensors 21 07845 i052Ber = 0.1514
Nc = 0.7945
Sensors 21 07845 i053Ber = 0.0459
Nc = 0.9439
Sensors 21 07845 i054Ber = 0.0459
Nc = 0.9434
Sensors 21 07845 i055Ber = 0.0195
Nc = 0.9758
Sensors 21 07845 i056Ber = 0.0025
Nc = 0.9984
Scaling Factor0.75 Sensors 21 07845 i057Ber = 0.0781
Nc = 0.9048
Sensors 21 07845 i058Ber = 0.1377
Nc = 0.8146
Sensors 21 07845 i059Ber = 0.0469
Nc = 0.9424
Sensors 21 07845 i060Ber = 0.0518
Nc = 0.9374
Sensors 21 07845 i061Ber = 0.0166
Nc = 0.9794
Sensors 21 07845 i062Ber = 0.0084
Nc = 0.9922
1.5 Sensors 21 07845 i063Ber = 0.0283
Nc = 0.9652
Sensors 21 07845 i064Ber = 0.0898
Nc = 0.8825
Sensors 21 07845 i065Ber = 0.0098
Nc = 0.9880
Sensors 21 07845 i066Ber = 0.0127
Nc = 0.9843
Sensors 21 07845 i067Ber = 0.0049
Nc = 0.9940
Sensors 21 07845 i068Ber = 0.0035
Nc = 0.9954
2 Sensors 21 07845 i069Ber = 0.0322
Nc = 0.9605
Sensors 21 07845 i070Ber = 0.0586
Nc = 0.9251
Sensors 21 07845 i071Ber = 0.0078
Nc = 0.9904
Sensors 21 07845 i072Ber = 0.0205
Nc = 0.9745
Sensors 21 07845 i073Ber = 0.0039
Nc = 0.9952
Sensors 21 07845 i074Ber = 0.0023
Nc = 0.9968
Translation (H3,V3) Sensors 21 07845 i075Ber = 0.0186
Nc = 0.9770
Sensors 21 07845 i076Ber = 0.0625
Nc = 0.9237
Sensors 21 07845 i077Ber = 0.0205
Nc = 0.9745
Sensors 21 07845 i078Ber = 0.0107
Nc = 0.9867
Sensors 21 07845 i079Ber = 0.0039
Nc = 0.9952
Sensors 21 07845 i080Ber = 0.0012
Nc = 0.9974
(H6,V6) Sensors 21 07845 i081Ber = 0.0479
Nc = 0.9412
Sensors 21 07845 i082Ber = 0.0635
Nc = 0.9226
Sensors 21 07845 i083Ber = 0.0215
Nc = 0.9736
Sensors 21 07845 i084Ber = 0.0205
Nc = 0.9747
Sensors 21 07845 i085Ber = 0.0049
Nc = 0.9940
Sensors 21 07845 i086Ber = 0.0014
Nc = 0.9979
CompressionJPEG(80) Sensors 21 07845 i087Ber = 0.0205
Nc = 0.9745
Sensors 21 07845 i088Ber = 0.0859
Nc = 0.8839
Sensors 21 07845 i089Ber = 0.0127
Nc = 0.9843
Sensors 21 07845 i090Ber = 0.0186
Nc = 0.9769
Sensors 21 07845 i091Ber = 0.0059
Nc = 0.9928
Sensors 21 07845 i092Ber = 0.0025
Nc = 0.9986
JPEG(90) Sensors 21 07845 i093Ber = 0.0107
Nc = 0.9867
Sensors 21 07845 i094Ber = 0.0693
Nc = 0.9107
Sensors 21 07845 i095Ber = 0.0029
Nc = 0.9964
Sensors 21 07845 i096Ber = 0.0049
Nc = 0.9940
Sensors 21 07845 i097Ber = 0.0039
Nc = 0.9952
Sensors 21 07845 i098Ber = 0.0005
Nc = 0.9998
Magnification (1.5) + (JPEG, 90%) Sensors 21 07845 i099Ber = 0.0889
Nc = 0.8880
Sensors 21 07845 i100Ber = 0.0293
Nc = 0.9643
Sensors 21 07845 i101Ber = 0.0107
Nc = 0.9867
Sensors 21 07845 i102Ber = 0.0127
Nc = 0.9843
Sensors 21 07845 i103Ber = 0.0049
Nc = 0.9940
Sensors 21 07845 i104Ber = 0.0025
Nc = 0.9984
Magnification(1.75) + Rotation (25o) Sensors 21 07845 i105Ber = 0.1699
Nc = 0.7677
Sensors 21 07845 i106Ber = 0.0342
Nc = 0.9582
Sensors 21 07845 i107Ber = 0.0215
Nc = 0.9737
Sensors 21 07845 i108Ber = 0.0244
Nc = 0.9697
Sensors 21 07845 i109Ber = 0.0049
Nc = 0.9940
Sensors 21 07845 i110Ber = 0.0028
Nc = 0.9956
Reduction(0.75) + JPEG (90%) Sensors 21 07845 i111Ber = 0.1064
Nc = 0.8591
Sensors 21 07845 i112Ber = 0.0557
Nc = 0.9319
Sensors 21 07845 i113Ber = 0.0205
Nc = 0.9745
Sensors 21 07845 i114Ber = 0.0215
Nc = 0.9736
Sensors 21 07845 i115Ber = 0.0107
Nc = 0.9867
Sensors 21 07845 i116Ber = 0.0072
Nc = 0.9972
Noise Salt and Pepper (0.03) Sensors 21 07845 i117Ber = 0.084
Nc = 0.8907
Sensors 21 07845 i118Ber = 0.0166
Nc = 0.9794
Sensors 21 07845 i119Ber = 0.0146
Nc = 0.9820
Sensors 21 07845 i120Ber = 0.0156
Nc = 0.9806
Sensors 21 07845 i121Ber = 0.0068
Nc = 0.9916
Sensors 21 07845 i122Ber = 0.0036
Nc = 0.9989
Gaussian
Noise (0.03)
Sensors 21 07845 i123Ber = 0.0723
Nc = 0.9067
Sensors 21 07845 i124Ber = 0.0293
Nc = 0.9643
Sensors 21 07845 i125Ber = 0.0107
Nc = 0.9867
Sensors 21 07845 i126Ber = 0.0186
Nc = 0.9769
Sensors 21 07845 i127Ber = 0.0039
Nc = 0.9952
Sensors 21 07845 i128Ber = 0.0036
Nc = 0.9989
Gaussian Filter (3 × 3) Sensors 21 07845 i129Ber = 0.1006
Nc = 0.8674
Sensors 21 07845 i130Ber = 0.0166
Nc = 0.9794
Sensors 21 07845 i131Ber = 0.0127
Nc = 0.9843
Sensors 21 07845 i132Ber = 0.0146
Nc = 0.9820
Sensors 21 07845 i133Ber = 0.0049
Nc = 0.9940
Sensors 21 07845 i134Ber = 0.0027
Nc = 0.9992
Median
Filter (3 × 3)
Sensors 21 07845 i135Ber = 0.0859
Nc = 0.8953
Sensors 21 07845 i136Ber = 0.0342
Nc = 0.9582
Sensors 21 07845 i137Ber = 0.0137
Nc = 0.9831
Sensors 21 07845 i138Ber = 0.0283
Nc = 0.9650
Sensors 21 07845 i139Ber = 0.0068
Nc = 0.9916
Sensors 21 07845 i140Ber = 0.0039
Nc = 0.9984
Table 5. Robustness evaluation of the proposed method and other exiting watermarking methods under common attacks.
Table 5. Robustness evaluation of the proposed method and other exiting watermarking methods under common attacks.
MethodPrabha and Sam [6]Rahman et al. [9]Fares et al.
[16]
Yuan et al.
[18]
Huynh-The et al. [33]Proposed
Method
Max PSNR (dB)64.383035.040642.4244.499450.17568.84
Rotation attack0.85600.35670.9873---0.85340.9984
Scaling attack0.90140.19280.96131---0.9990.9968
JPEG 2000 attack0.85770.95090.976390.99440.8521
JPEG compression---0.99760.99980.9943---0.9998
Salt and peppers 0.99710.25690.87390.98490.9960.9989
Gaussian ---0.21860.94325---0.9150.9989
Median filter0.83700.92330.90110.94600.9240.9984
Average filtering---0.8428------0.9380.9961
Gaussian low-pass 0.9075------------1
Gaussian filtering---0.98450.92237---0.9970.9992
Blurring attack0.9965 0.98814---0.9651
Histogram Equalization---0.94490.96082---0.7551
Zooming attack---0.9640---0.9995---1
Sharpen attack0.91230.91790.98521------0.9998
Poisson noise---0.7168---------1
Table 6. Capacity analysis for different methods.
Table 6. Capacity analysis for different methods.
MethodWatermark Image (Bits)Cover Image (Pixels)Bits/Pixels
Method [8]32 × 32512 × 512 × 30.00130208
Method [24]64 × 64512 × 512 × 30.00520833
Method [25]64 × 64512 × 512 × 30.00520833
QEMs [60]16 × 16256 × 256 × 30.00130208
QPHTs [61]32 × 32512 × 512 × 30.00130208
Proposed32 × 32256 × 256 × 30.00520833
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Abdel-Aziz, M.M.; Hosny, K.M.; Lashin, N.A.; Fouda, M.M. Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments. Sensors 2021, 21, 7845. https://doi.org/10.3390/s21237845

AMA Style

Abdel-Aziz MM, Hosny KM, Lashin NA, Fouda MM. Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments. Sensors. 2021; 21(23):7845. https://doi.org/10.3390/s21237845

Chicago/Turabian Style

Abdel-Aziz, Mostafa M., Khalid M. Hosny, Nabil A. Lashin, and Mostafa M. Fouda. 2021. "Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments" Sensors 21, no. 23: 7845. https://doi.org/10.3390/s21237845

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop