You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

25 November 2021

Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments

,
,
and
1
Department of Information Technology, Faculty of Computers and Informatics, Zagazig University, Zagazig 44519, Egypt
2
Department of Electrical and Computer Engineering, Idaho State University, Pocatello, ID 83209, USA
*
Author to whom correspondence should be addressed.
This article belongs to the Section Sensing and Imaging

Abstract

This paper proposes a new blind, color image watermarking method using fast Walsh–Hadamard transformation (FWHT) and multi-channel fractional Legendre–Fourier moments (MFrLFMs). The input host color image is first split into 4 × 4 non-interfering blocks, and the MFrLFMs are computed for each block, where proper MFrLFMs coefficients are selected and FWHT is applied on the selected coefficients. The scrambled binary watermark has been inserted in the quantized selected MFrLFMs coefficients. The proposed method is a blind extraction, as the original host image is not required to extract the watermark. The proposed method is evaluated over many visual imperceptibility terms such as peak signal-to-noise ratio (PSNR), normalized correlation (NC), and bit error rate. The robustness of the proposed method is tested over several geometrical attacks such as scaling, rotation, cropping, and translation with different parameter values. The most widely recognized image processing attacks are also considered, e.g., compressing and adding noise attacks. A set of combination attacks are also tested to analyze the robustness of the proposed scheme versus several attacks. The proposed model’s experimental and numerical results for invisibility and robustness were superior to the results of similar watermarking methods.

1. Introduction

Copyright protection over the Internet has become a big challenge because it deals with securing the transmitted digital content through the transition medium over the internet. Therefore, the use of digital image watermarking systems has become a hot research area. It is widely used in the copyright protection of images and security from several unwanted modifications of digital content, such as tampering and forgery over these transitions [1]. Digital watermarking can conceal any data type, including images, audio, video, and text in chosen digital media such as color images [2]. Two essential domains are used with the applied watermarking domain: the spatial working domain [3] and the frequency working domain [4]. In the spatial domain method, embedding the watermark can be realized by explicitly modifying the image pixels. It has the benefits of accessible execution at low computing costs. The most prevalent techniques in the spatial domain are LSB, correlation-based methods, histogram shifting, and speed spectral methods.
Furthermore, the most common techniques are primarily used in the frequency domain such as discrete Fourier transformation, discrete cosine transformation, discrete wavelet transformation, and singular value decomposition. Compared with spatial domain methods, the transform domain methods are more robust to several attacks, with high invisibility [5]. The watermark is concealed in the transformed coefficients in the transform domain, resulting in a minor change in image pixel correlation, preserving image quality much more [6].
According to the extraction method, there are three common types of watermarking systems: blind, non-blind, and semi-blind watermarking [5]. In a blind watermarking [7] system, the host cover image is not required in the watermark extraction process; it just needs the watermarked image. In non-blind [8] watermarking, the host and the watermarked images are both required to extract the watermark image. In semi-blind watermarking [9], the watermarked image and security key are required to engage the extraction process fully.
Concerning the desired security purpose of the watermarking models, there are three common characteristics: robustness [10], semi-fragile [11], and fragile [12] watermarking models. The robustness of the watermark system is that it resists a specific set of transformations such as geometric attacks. It is extensively used in copyright protection. The semi-fragile watermark system resists benign transformations only and can be detected after slight changes. It is used to detect and locate malignant transformations. The fragile watermark system cannot be detected after slight modification. It can be destroyed because it is highly sensitive to any slight modification; it is extensively used in tamper detection for proving integrity.
In recent years, many authors have introduced many watermarking methods in using color images; therefore, color images play a significant role in real-life applications such as copyright provisions and image authenticity for medical applications and other similar fields.
Many researchers have presented realistic watermarking approaches in the spatial and frequency working domains. Parekh et al. [13] introduced a blind watermarking method in the spatial domain by modifying the luminosity component, Y, of the transformed YCbCr model. The host color image is split into 8 × 8 blocks, and a binary watermark has been embedded in a sorted correlation of values between corresponding blocks of sub-images. This scheme has been personalized, as it is low in robustness capabilities against various attacks. Su and Chen [14] introduced a watermarking scheme in the spatial domain to solve this problem. A binary logo image is embedded directly in distributed features in the direct current (DC) coefficients. This method proved to be a robust watermarking system against several geometric and standard signal attacks.
Owing to the robustness and indiscernibility of the watermarking systems in the frequency domain, many researchers proposed several watermarking strategies in this domain. Yuan et al. [15] proposed an image watermarking method for copyright protection. The color host image is divided into blocks, which are modified using (2D-DCT). The color logo image is embedded in the chosen intermediate coefficients of these selected blocks. The scheme is robust to most popular image processing attacks. Fares et al. [16] suggested a new image watermarking method based on discrete Fourier transform (DFT) of a fractional quaternion type. The watermark bits are concealed in the intermediate frequency band of the transformed RGB components by adjusting the least significant bits of the quantified magnitudes.
Many authors appealed to utilize the wavelet transformations in many watermarking schemes, in which it is a powerful tool that has been widely used in signal and image processing [17]. However, at the same time, it still has significant disadvantages such as (i) shift sensibility, any transitions in the input signal lead to unexpected changes in wavelet coefficients; (ii) inadequate directionality, since wavelet coefficients disclose only three spatial orientations; (iii) non-stationary signal, in view of the lake of phase information; (iv) computational complexity, especially for wavelet tree and numerous decomposition; and (v) complex accurate compilation of the mother wavelet and sub-bands mainly when applied in complicated fields. Our proposed method tried to overcome these significant problems using a hybrid technique by utilizing FWHT and MFrLFMs benefits to release a new, robust watermarking methodology.
Many researchers have touched upon the concept of perceiving the color image copyrights efficiently by using an advanced hybrid combination of the spatial and frequency domains techniques to achieve fast computation features of the spatial domain and at the same time take advantage of the durability of the frequency domain techniques. Yuan et al. [18] introduced a blind watermarking method based on a combination of spatial and frequency domains techniques. It was achieved by applying quantization steps on the DCT and discrete Hartley transformation (DHT) to embed a color logo image into the standard direct current frequencies blocks of the discrete cosine transform and DHT components. The watermark is extracted in a blind extraction manner by applying an inverse embedding process. The scheme is highly robust to many attacks.
The remnant of this paper is structured as follows. Section 2 handles diverse related works. Section 3 includes the essential preliminaries that have been used in the proposed method. Section 4 illustrates the proposed watermarking methodology in a detailed manner. Section 5 documents the experiment’s numerical results with discussion, followed by the conclusion in Section 6.

3. Preliminaries

3.1. Fast Walsh–Hadamard Transformation Technique

The Hadamard transform is also known as the Walsh–Hadamard transform, Hadamard–Rademacher–Walsh transform, fast Walsh–Hadamard transform, or Walsh–Fourier transform and it comes under a summed-up class of Fourier transformation. It has the benefits of simple computational complexity O ( n 2 ) among all similar existing transforms [48]. It is orthogonal, symmetric, and has only two values (−1, +1), which results in isomorphism with no data redundancy. The FWHT has been extensively utilized in many image processing algorithms, digital steganography, and compression because it provides fast coefficient computation and fast reconstruction advantages. The fast Walsh–Hadamard transform is represented as follows:
F ( U , V ) = 1 N ×   H N   ×   f ( x , y )
The F ( U , V ) refers to the FWHT of f ( x , y ) , while the H N refers to the Hadamard matrix of squares.
The 4 × 4 Hadamard matrix is represented in the form
[ H 4 ] = [ H 2         H 2 H 2 H 2 ] = [ 1     1       11 1   1       1       1 1       1     1     1 1   1     1       1   ]
The main formula of the FWHT transformation is represented as
H 2 P = [ H 2 P 1 H 2 P 1 H 2 P 1 H 2 P 1 ]   f o r   p = 1 , 2 , 3 , 4 , 5 ,
where p values are based on the values of N , where N = 2 P .
The inverse of the fast Walsh–Hadamard transform is represented as
f ( x , y ) =   H N   ×   F ( U , V )
where F ( U , V ) is the FWHT of the function, f ( x , y ) .

3.2. MFrLFM Representation for RGB Color Image

Fractional-order polynomials are not restricted to integer-order values compared with other similar orthogonal moments, which give it a high ability to represent the fine details in an image rather than their rivals’ orthogonal polynomials of integer order [49]. These descriptors are also invariant to geometrical transformations (rotation, scaling, and translation). It is defined over a unit circle as follows:
M F r M p q ( f c ) = 2 p + 1 2 π 0 2 π 0 1 f c ( r , θ ) [ W p q ( r , θ ) ] * r d r d θ
where   W p q represents the essential functions of the Legendre–Fourier moments of fractional orders.
The function f c ( r , θ )   denotes the RGB color images, the asterisk symbol “*” refers to the complex conjugate; p = | q | = 0 , 1 , 2 , 3 , 4 , 5 , 6 .
The multi-channel fractional-order moments for all RGB color channels of the input image are computed using
f C R ( r ,   θ ) , f C G   ( r ,   θ )   and   f C G ( r ,   θ )
Therefore, the original image is reconstructed by the reliance on the orthogonal property [50] of the fractional-order LFMs as follows:
f C r e c o n s ( r , θ ) = p = 0 p m a x q = q m a x q m a x M F r M p q ( f c ) W p q ( r , θ )
where f C r e c o n s ( r , θ ) refer to the reconstructed image elements R, G, B of
f C R r e c o n s ( r ,   θ ) ,   f C G r e c o n s ( r ,   θ )   and   f C B r e c o n s ( r ,   θ )

3.3. Geometrical Invariances of MFrLFMs

Robust watermarking algorithms are based on their invariance ability to RST geometric transformations. These RST invariants are derived and represented in a mathematical form in the following sub-sections.

3.3.1. Rotational Invariance

Suppose that f C ( r , θ ) denotes the original image and f C β ( r ,   θ ) denotes the rotated image with a rotational angle β where
f C β ( r ,   θ ) = f C ( r , θ β )
The MFrLFMs of f C β ( r ,   θ ) is computed as follows:
M F r M   p q R ( f c β ) = 2 p + 1 2 π   0 2 π 0 1 f c ( r , θ ) L p ( α , r ) e i q θ     e i q β     r d r d θ = M F r M   p q ( f c ) e i q β
Sparingly, it can be written as
M F r M   p q R ( f c β ) = e i q β M F r M   p q ( f c ) ,   C   { R , G , B }
Since, | e i q β | = 1 ; then
| M F r M   p q R ( f c β ) | = |   M F r M   p q ( f c ) |
Equation (10) proves the rotation invariance of MFrLFMs.

3.3.2. Scale Invariance

Let f C ( r , θ ) refer to the original image and f C S ( r ,   θ ) be the scaled image where
f C S ( r ,   θ ) = f C ( r a   ,   θ )
The MFrLFM of the scaled image f C S ( r ,   θ ) is computed as follows:
M F r M   p q ( f C S ) = 2 p + 1 2 π   0 2 π 0 1 f c S ( r , θ ) [ W p q ( r , θ ) ] r d r d θ = 2 p + 1 2 π   0 2 π 0 1 f C (   r ˆ , θ ) L p ( α , a r ˆ ) e i q θ     r ˆ d r ˆ d θ = a 2 2 p + 1 2 π   0 2 π 0 1 f C (   r ˆ , θ ) L p ( α , a r ˆ ) e i q θ     r ˆ d r ˆ d θ
The L p ( α , a r ^ )   is the scaled fractional order.
Finally, the MFrLFM of the scaled image is computed as
M F r M   p q ( f C S ) = k = 0 p 2 p + 1 2 k + 1 ( i = k p a 2 i + 2 C p i d i k M F r M k g ( f C ) )

3.3.3. Translation Invariance

Translation invariance is realized when repositioning the original coordinates to synchronize with the centric points ( x c , y c ) of the color image [51] and ( x c , y c ) are defined as
x c = m 10 ( f R ) + m 10 ( f G ) + m 10 ( f B ) ) / m 00 y c = m 01 ( f R ) + m 01 ( f G ) + m 01 ( f B ) ) / m 00 m 00 = m 00 ( f R ) + m 00 ( f G ) + m 00 ( f B )
The central MFrLFMs are represented mathematically as
M F r M p q = 0 2 π 0 1 f C ( r ¯ , θ ¯ ) [ W p q ( r ¯ , θ ¯ ) ] r ¯ d r ¯ d θ ¯ = 0 2 π 0 1 f C ( r ¯ , θ ¯ )   L p q ( α , r ¯ ) ] e i q θ ¯ r ¯ d r ¯ d θ ¯

3.4. Accurate MFrLFM Computation

The selection of the accurate computation of MFrLFMs is one of the basic foundation rules of the proposed watermarking method. Any geometric distortion directly affects the robustness of the watermarking system over different geometric attacks, especially in medical images due to its high sensitivity to any distortion, which in turn leads to misdiagnosis. The computing of an accurate, kernel-based approach was introduced in [52]. MFrLFMs can be represented in polar coordinates (see Figure 1a) since they are symbolized in a unit circle. Each red point possesses eight point similarities, whereas each blue point possesses four similarities (see Figure 1b). The coefficient matrix of the MFrLFMs is calculated utilizing the equations:
M F r M p q = 2 p + 1 2 π i j k p q ( r i , θ i j )   f ^ C ( r i , θ i j )
where
k p q ( r i , θ i j ) = I p ( r i ) J q ( θ i j )
Figure 1. (a) Cartesian coordinates; (b) polar coordinates.
The kernels functions [53] are defined as
J q ( θ i j ) = v i j v i , j + 1 e i ^ q θ   d θ
l p ( r i ) = U i U i + 1 L p   ( α , r )   r d r = U i U i + 1 R ( r ) d r
where
R ( r ) = L p ( α , r ) r
The upper and lower limits are
V i , j + 1 = θ i , j + Δ θ i , j / 2 ;   V i , j = θ i , j Δ θ i , j / 2
U i + 1 = R i + Δ R i / 2 ; U i = R i Δ R i / 2  
Compute J q ( θ i , j ) in the exact form
J q ( θ i j ) = { 1 ^ q ( e i ^   q   V i . j + 1 e i ^   q   V i . j ) , q 0 V i , j + 1 V i , j ,       ,   q = 0
Then, calculate the radial kernel l p ( r i ) using suitable, accurate computation in [54] using the following equation:
l p ( r i ) = U i U i + 1 R ( r ) d r   ( U i + 1 U i ) 2 T   i = 1 2 T w R ( U i + ( U i + 1 U i ) ( l 0.5 ) 2 T t )
Symbols “ w ” and “t” indicate the weights, where T = 2 l and l = 0 , 1 , 2 , c l , the value of t can be explained in respect of the integrity of U i and U i + 1 is the order of numeral integration, and the value of w is restricted where l = 0 c 1 w = 2 .

4. Proposed Blind Watermarking

In this paper, we propose a robust blind color image watermarking model. In the watermark extraction phase, the embedded binary watermark bits can be extracted from the selected MFrLFM coefficient magnitudes in a blind extraction manner. The scrambled watermark bit information is concealed in the accurate RST invariants’ selection of MFrLFM magnitudes of the host color image, transformed by fast Walsh–Hadamard transform to generate a robust watermarking system. The host image is not required; there is only a need for the color watermarked image to carry out the entire extraction procedures, preserving image quality as much as possible.
Blind watermark introduced a crucial function, especially in medical images. It is known for its ability to preserve image quality to guarantee an exact diagnosis of the disease and to protect patient data from unwanted malicious attacks.
The idea behind deploying blind watermarking in our proposed method is to increase security, robustness, and imperceptibility. Furthermore, identity authentication must be provided for medical images, since every pixel in these images plays an essential role and represents essential patient data. Any distortion in these images’ pixels leads to disease misdiagnosis. It also has the advantage of a simple extraction; the watermark image can be extracted without needing the original host cover image, which reduces the time consumed during the extraction process and preserves image quality.
Sequentially, the detailed watermarking method for embedding and extraction processes is listed with illustrative diagrams as shown in Figure 2 and Figure 3, sequentially.
Figure 2. Proposed watermark embedding.
Figure 3. Proposed watermark extraction.

4.1. Watermarking Embedding Process

Assume that the input color host image is f , where
f = { f ( m , n ) , 0 m , n < N }
and the input watermark image is W of size P × Q, where
W = { w ( x , y ) { 0 , 1 } , 0 x < P , 0 y < Q }
which is to be concealed in the host color image. The embedding steps are discussed as follows:
Step 1: Scramble the binary watermark to banish the correlation between image pixels to add more reliability to the proposed method by using Arnold transformation [55] with arbitrarily chosen key (k), the watermark image is shuffled from W to W1, W 1 = { W ( x , y ) { 0 , 1 } , 0 x < P , 0 y < Q } . Transform it into a one-dimensional bit sequence as follows:
W 2 = { W 2 ( k ) = w 1   ( x ,   y ) , 0 x < P , 0 y < Q   , k = x × Q + y , w 2   ( k ) { 0 , 1 } }
Step 2: Split the input color image, f, into 4 × 4 non-interfering blocks, B k ,
B k = { B k ( m , n ) , 0 m , n < 3 } , K = 1 , 2 , N 2 / 16
Step 3: Compute MFrLFMs for each block, B k ( K = 1 , 2 , N 2 / 16 ) using the maximum moment order P × Q as shown in (Section 3) in detail.
Step 4: Select robust and accurate MFrLFMs to carry the watermark; this is done by computing the magnitude values of MFrLFMs to ensure RST invariances. In the proposed method, we selected MFrLFMs with positive reiterations q 4 m , m Z to avoid redundancy as follows:
S = {   | F r M p q | ,   q 4 m , m Z }
By utilizing the key k 2 , P × Q coefficients of MFrLFMs, which denote the positions of the selected pixels in the image blocks, are selected randomly from the delicate set depending on the watermark bits to get the feature vector magnitude.
Step 5: Apply fast Walsh–Hadamard transform (FWHT) on selected MFrLFM coefficients using Equation (1).
Step 6: Embed the scrambled binary watermark, W 1 bit information in the transformed MFrLFM magnitudes using dither modulation [56] using the following equation:
m F r L F M ( M ) = [ m F r L F M ( x ) d x ( W 1 ( x ) ) Δ ] Δ + d x ( W 1 ( x ) ) , 0 x < P × Q d x ( 1 ) = Δ 2 + d x ( 0 ) , d x ( 0 )   [ 0 , 1 ]
The m F r L F M ( M ) denotes the modulated blocks. The mathematical symbols, [   . ]   ,   Δ and d i ( . ) refer to the rounding factor, quantization step, and dither modulation.
Step 7: Apply inverse fast Walsh–Hadamard transform (IFWHT) using Equation (4).
Step 8: Reconstruct the color watermarked image f w ( r , θ ) as
f w ( r , θ ) = f c ( r , θ ) f c M ( r , θ ) + f c M ( r , θ )
where f c ( r , θ ) is the host color image, f c M ( r , θ ) is the modified part, and f c M ( r , θ ) is the unmodified part.
Step 9: Merge all 4 × 4 sub-blocks to get the color watermarked image finally f w ( m , n ) .

4.2. Blind Watermarking Extraction

The watermark extraction is done on a fully blind process. There is no need for the cover image; only the watermarked image is needed to generate an entirely successful extraction process by applying inverse operations of the embedding process. The extraction procedures are listed in the following steps in detail:
Step 1: Split the input watermarked image f w ( m , n ) into 4 × 4 non-interfering blocks, B k ,
  B k = { B k ( m , n ) , 0 m , n < 3 }     ,   K = 1 , 2 , N 2 / 16
Step 2: Compute MFrLFMs for each block by using the method in Section 3.
Step 3: Select the MFrLFM coefficients’ feature vector,
M F r L F M * = { m F r L F M * ( i ) , 0 i < p × Q }
As shown in the embedding process.
Step 4: Apply the fast Walsh–Hadamard transform (FWHT) on the selected MFrLFM magnitudes using Equation (1).
Step 5: Extract the watermark binary data bit information from the MFrLFM magnitudes by applying the inverse operation of Arnold transformation using the secret key, K, where the 1D binary bit series is extracted.
Step 6: Reconstruct the binary watermark image from the extracted one-dimensional binary bit sequence, W 1 * , by rearranging it into a two-dimensional binary image as
    W = { W * ( x , y ) , { 0 , 1 } , 0 x < p , 0 y < Q }
Step 7: Finally, obtain the binary extracted watermark image, W .

5. Experimental Results

In this part, various numeral simulations are enacted to assess the effectiveness of the proposed method according to the visual quality perception. PSNR and robustness evaluation has assessed these to several typical geometric, image filtering, and combination attacks conducted using NC and BER to measure the degree changes among pixels in the extracted binary watermark. The proposed method is tested over color host images of size 256 × 256 (shown in Figure 4) and color medical images selected from datasets [57,58,59] (shown in Figure 5). Binary watermark images are shown in Figure 6.
Figure 4. The host standard color images (a) Lena; (b) Peppers; (c) Baboon; (d) F16; (e) San Diego miramar; (f) San Diego north island; (g) Man; (h) Elephant; (i) Monarch; (j) Museum.
Figure 5. Selected host color medical images from datasets [57,58,59].
Figure 6. Selected binary watermark images (aj).
The attained numerical results are compared with other similar moment-based watermarking methods [28,29,41,60,61].
Additional comparisons with statistical watermarking methods [6,9,16,18,33] are also conducted to ensure the robustness and visual invisibility of the proposed methodology.
We document our experimental results according to the best and correct choice of   α , where   0 < α > 3 and   α R + .
Correspondingly, we tested different parameters values at α = 0.7 ,   1.1 ,   2.3 ,   and 2.6 ; from different experimental results, we noticed that the value of   α at   α = 1.1 is the optimum choice, where there are no readjustments while using the optimum value Δ = 0.2 .
Experimental results documented using different image sizes (128 × 128 and 256 × 256) are depicted in the following sub-sections. The watermark logo images are of sizes 32 × 32 and 10 × 10.

5.1. Visual Imperceptibility

We utilized peak signal-to-noise ratio to measure and evaluate the proposed watermarking’s imperceptibility. Increasing the PSNR values leads to the high invisibility of the watermarking model. The PSNR is defined as
P S N R ( f , f w ) = 10 l o g 10 ( M A X f 2 M S E )
where f is the host color image and f w is the color watermarked image;   M S E is the mean square error, and it is represented as
M s e = 1 N 2 i = 1 N j = 1 N [ f w ( i , j ) f ( i , j ) ] 2
The invisibility of the proposed methodology was evaluated at the value of   α = 1.1 and Δ   values ranged from 0.2 to 1.0 in comparison with other existing moment-based methods [28,29,41,60,61], which in turn embedded binary watermarks of size 32 × 32 into the standard color images. The average PSNR values are indicated in Figure 7. As we notice, there is a reverse operation between the PSNR values, and PSNR values increased as Δ values decreased. The average PSNR values of the proposed watermarking method and other similar methods are shown in Table 1. From these values, we note the proposed method’s success in attaining high PSNR values up to ~68 dB compared with other similar methods, which ensures the high imperceptibility of our method compared to other similar methods.
Figure 7. Average PSNR values using varying values of ∆.
Table 1. PSNR values using varying values of ∆.
The PSNR values for a chosen color medical image (named IMG 1–5) are also indicated in an illustrative example (Figure 8) with high PSNR values, ensuring that our proposed method is suitable for application on medical images in a reasonable manner.
Figure 8. The PSNR values for selected color medical images at ∆ = 0.2.

5.2. Robustness Evaluation

The robustness of our method was evaluated over the bit error rate (BER) and normalized correlation (NC), which are formulated as
B E R = 1 P × Q ( x = 1 P y = 1 Q [ W ( x , y ) W * ( x , y ) ] 2 )
N C = x = 1 P y = 1 Q [ W ( x , y ) × W * ( x , y ) ]     x = 1 P y = 1 Q [ W ( x , y ) ] 2
The robustness was evaluated over several categories of attacks, the first category comprised geometrics attacks such as rotation, scaling, cropping, magnification, and shearing attacks, with different parameter factors.
The second category included signal processing attacks such as jpeg, jpeg 2000, noising, salt and peppers, Gaussian, Gaussian low-pass, speckle noise attack, median filter attack, average filter attack, sharpen attack, histogram equalization, and motion blur attack. The third category included many common combination attacks.
The watermark logo was first resized to 10 × 10 and then embedded in the host color image by using and applying various geometric attacks on the watermarked image. Results for geometric attacks are shown in Table 2; several image processing attacks are also shown in Table 3, respectively.
Table 2. Robustness results of the extracted watermark from the attacked image “Lena” using geometrics attacks, ∆ = 0.2.
Table 3. Robustness results of the extracted watermark from the attacked image “Lena” using processing attacks ∆ = 0.2.
The proposed method attained the highest robustness level against various geometrical and signal processing attacks.
To assess the robustness of the proposed method and other mentioned methods, the average BER and NC values are represented in Figure 9 and Figure 10 for easy comparison. From these simulation results, (in the referred Figure 9 and Figure 10), we note that our method successfully scored the minimum average value (BER = 0.0032) among the compared methods. Moreover, our method scored the maximum average value of NC = 0.9974. From these compared values, we deduce that our method surpassed other existing methods.
Figure 9. Average BER values of the proposed and compared methods for common attacks.
Figure 10. Average NC values of the proposed and compared methods for common attacks.
The additional numerical experimental test was performed on a chosen binary watermark image called “cup” of size 32 × 32, which was embedded in the standard host image “Lena” and attacked using different common types of attacks, resulting in a fair comparison between the proposed method and moment-based methods [28,29,41,60,61]. The extracted watermark within the corresponding values of BER and NC is notated in Table 4.
Table 4. Robustness evaluation for the proposed method and other exiting moment-based methods under common attacks.
The simulation results of the proposed method and compared methods [28,29,41,60,61] of different NC values under various common attacks are also presented in a graphical simulation in Figure 11, Figure 12 and Figure 13. These results denote that the proposed method exceeded other existing methods and was robust to the various tested attacks.
Figure 11. Graphical comparative of NC values under a scaling attack with different parameters.
Figure 12. Graphical comparison of NC values using combination attacks with different parameters.
Figure 13. Graphical comparison of NC values under common noise and filtering attacks.
From these results, we conclude that our method outperformed other existing methods. The watermark could be realized under various attacks suitably, and it seemed close to its original. In addition, the numerical values of BER and NC proved that the robustness of the proposed model surpassed other similar models.
We compared our method with more exiting statistical watermarking methods [6,9,16,18,33] in a comparison of maximum PSNR values of the watermarked images and the robustness of the extracted watermark over NC values under common attacks as shown in Table 5, from these values we can note that our proposed method succeeded in achieving a high robustness level and visual imperceptibility compared with others methods.
Table 5. Robustness evaluation of the proposed method and other exiting watermarking methods under common attacks.

5.3. Capacity Evaluation

As there is a reverse operation between the payload capacity and visual image quality, increasing capacity degrades image quality (PSNR), so we considered this in our proposed method. The payload capacity of the proposed method was analyzed by the number of embedded bits per pixel (bpp). The maximum payload capacity for a chosen color host image of size 256 × 256 and watermark image of size 32 × 32 computed as (32 × 32)/(256 × 256 × 3) = 0.00520833 (bpp). It was obvious that our method scored satisfying results among the compared method as shown in Table 6, and at the same time preserved image quality as much as possible.
Table 6. Capacity analysis for different methods.

6. Conclusions

In this paper, a robust and efficient blind watermark method was proposed by utilizing FWHT and MFrLFMs on color images. The input binary watermark was scrambled using Arnold transformation to add more security and reliability to the proposed method. The accurate magnitude of MFrLFMs was selected to attain the goal of the watermarking system, which resulted in improved robustness and visual imperceptibility. The watermark bits were embedded in the modified magnitudes of the MFrLFMs based on the quantization step with optimum selected values. The proposed method successfully countered common geometric attacks, processing attacks, and combination complex attacks. The numerical results clearly show that our method surpassed existing similar methods with higher watermark invisibility, efficiency, and security, and it was suitable for medical images applications. In future work, we are looking to extend improvement to apply this method in a complete color image watermarking system to conceal color watermark logo images into color host cover images in a holistic way.

Author Contributions

Conceptualization, K.M.H. and M.M.A.-A.; methodology, K.M.H. and M.M.A.-A.; software, K.M.H. and M.M.A.-A.; validation, M.M.A.-A., K.M.H., N.A.L. and M.M.F.; formal analysis, K.M.H. and N.A.L.; investigation, K.M.H. and M.M.A.-A.; resources, K.M.H. and M.M.A.-A.; data curation, M.M.A.-A.; writing—original draft preparation, M.M.A.-A. and M.M.F.; writing—review and editing, K.M.H., N.A.L., M.M.A.-A. and M.M.F.; visualization, M.M.A.-A. and K.M.H.; supervision, K.M.H. and N.A.L.; project administration, K.M.H.; funding acquisition, M.M.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Qi, X.; Qi, J. A robust content-based digital image watermarking scheme. Signal Process. 2007, 87, 1264–1280. [Google Scholar] [CrossRef]
  2. Roy, S.S.; Basu, A.; Chattopadhyay, A. On the implementation of a copyright protection scheme using digital image watermarking. Multimed. Tools Appl. 2020, 79, 13125–13138. [Google Scholar] [CrossRef]
  3. Al-khafaji, A.; Nur, N.; Sjarif, N.N.A.; Mahdi, M.; Shafry, M.; Rahim, M. A review and open issues of diverse text watermarking techniques in spatial domain. J. Theor. Appl. Inf. Technol. 2018, 96, 5819–5840. [Google Scholar]
  4. Jibrin, B.; Tekanyi, A.; Sani, S. Image Watermarking Algorithm in Frequency Domain: A Review of Technical Literature. ATBU J. Sci. Technol. Educ. 2019, 7, 257–263. [Google Scholar]
  5. Agarwal, N.; Singh, A.K.; Singh, P.K. Survey of robust and imperceptible watermarking. Multimed. Tools Appl. 2019, 78, 8603–8633. [Google Scholar] [CrossRef]
  6. Prabha, K.; Sam, I.S. An effective robust and imperceptible blind color image watermarking using WHT. J. King Saud Univ. Comput. Inf. Sci. 2020, in press. [Google Scholar] [CrossRef]
  7. Naidu, S.; Upadhyay, G. A Review on Blind Watermarking Technique for Copyright Protection of Image-based on DCT, DWT, and SVD Domain. Int. Res. J. Eng. Technol. 2020, 7, 364–366. [Google Scholar]
  8. Anbarjafari, G.; Ozcinar, C. Imperceptible non-blind watermarking and robustness against tone mapping operation attacks for high dynamic range images. Multimed. Tools Appl. 2018, 77, 24521–24535. [Google Scholar] [CrossRef]
  9. Izhar, M.N. A Semi Blind Watermarking Technique for Copyright Protection of Image-Based on DCT and SVD Domain. Glob. J. Res. Eng. 2017, 16, 364–366. [Google Scholar]
  10. Valandar, M.Y.; Barani, M.J.; Ayubi, P. A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional Hénon map. Soft Comput. 2020, 24, 771–794. [Google Scholar] [CrossRef]
  11. Feng, B.; Li, X.; Jie, Y.; Guo, C.; Fu, H. A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration. Mob. Netw. Appl. 2020, 25, 82–94. [Google Scholar] [CrossRef]
  12. Molina-Garcia, J.; Garcia-Salgado, B.P.; Ponomaryov, V.; Reyes-Reyes, R.; Sadovnychiy, S.; Cruz-Ramos, C. An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process. Image Commun. 2020, 81, 115725. [Google Scholar] [CrossRef]
  13. Varma, P.R.K.; Kumari, V.V.; Kumar, S.S. Spatial Domain Blind Watermarking for Digital Images. In Progress in Computing, Analytics and Networking; Springer: Singapore, 2018; Volume 710. [Google Scholar] [CrossRef]
  14. Su, Q.; Chen, B. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018, 22, 91–106. [Google Scholar] [CrossRef]
  15. Yuan, Z.; Liu, D.; Zhang, X.; Su, Q. New image blind watermarking method based on two-dimensional discrete cosine transform. Optik 2020, 204, 164152. [Google Scholar] [CrossRef]
  16. Fares, K.; Amine, K.; Salah, E. A robust blind color image watermarking based on Fourier transform domain. Optik 2020, 208, 164562. [Google Scholar] [CrossRef]
  17. Shukla, M. A Comparative Study of Wavelet and Curvelet Transform for Image Denoising. IOSR J. Electron. Commun. Eng. 2013, 7, 63–68. [Google Scholar] [CrossRef]
  18. Yuan, Z.; Su, Q.; Liu, D.; Zhang, X. A blind image watermarking scheme combining spatial domain and frequency domain. Vis. Comput. 2020, 37, 1867–1881. [Google Scholar] [CrossRef]
  19. Ma, B.; Chang, L.; Wang, C.; Li, J.; Wang, X.; Shi, Y.Q. Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Signal Process. 2020, 172, 107544. [Google Scholar] [CrossRef]
  20. Yamni, M.; Daoui, A.; El Ogri, O.; Karmouni, H.; Sayyouri, M.; Qjidaa, H.; Flusser, J. Fractional Charlier moments for image reconstruction and image watermarking. Signal Process. 2020, 171, 107509. [Google Scholar] [CrossRef]
  21. Wang, C.; Wang, X.; Xia, Z.; Zhang, C. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf. Sci. 2019, 470, 109–120. [Google Scholar] [CrossRef]
  22. Ernawan, F. Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection. Int. J. Electr. Comput. Eng. 2019, 9, 1850–1860. [Google Scholar] [CrossRef]
  23. Singh, M.K.; Kumar, S.; Ali, M.; Saini, D. Application of a novel image moment computation in X-ray and M.R.I. image watermarking. IET Image Process. 2021, 15, 666–682. [Google Scholar] [CrossRef]
  24. Yamni, M.; Karmouni, H.; Daoui, A.; el ogri, O.; Sayyouri, M.; Qjidaa, H. Blind Image Zero-Watermarking Algorithm Based on Radial Krawtchouk Moments and Chaotic System. In Proceedings of the 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, 9–11 June 2020; pp. 1–7. [Google Scholar] [CrossRef]
  25. Ernawan, F.; Kabir, M.N. An Improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments. IEEE Access 2019, 7, 151985–152003. [Google Scholar] [CrossRef]
  26. Chen, B.; Shu, H.; Coatrieux, G.; Chen, G.; Sun, X.; Coatrieux, J. Color Image Analysis by Quaternion-Type Moments. J. Math. Imaging Vis. 2014, 51, 124–144. [Google Scholar] [CrossRef]
  27. Darwish, M.; Hosny, K.; Kamal, S. Improved Color Image Watermarking Using Logistic Maps and Quaternion Legendre-Fourier Moments. In Multimedia Security Using Chaotic Maps: Principles and Methodologies; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar] [CrossRef]
  28. Hosny, K.; Darwish, M. Resilient Color Image Watermarking Using Accurate Quaternion Radial Substituted Chebyshev Moments. ACM Trans. Multimed. Comput. Commun. Appl. 2019, 15, 46. [Google Scholar] [CrossRef]
  29. Hosny, K.M.; Darwish, M.M. Robust color image watermarking using invariant quaternion Legendre-Fourier moments. Multimed. Tools Appl. 2018, 77, 24727–24750. [Google Scholar] [CrossRef]
  30. Li, J.; Yu, C.; Gupta, B.B.; Ren, X. Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed. Tools Appl. 2018, 77, 4545–4561. [Google Scholar] [CrossRef]
  31. Liu, Y.; Zhang, S.; Yang, J. Color image watermark decoder by modeling quaternion polar harmonic transform with B.K.F. distribution. Signal Process. Image Commun. 2020, 88, 115946. [Google Scholar] [CrossRef]
  32. Xia, Z.; Wang, X.; Li, X.; Wang, C.; Unar, S.; Wang, M.; Zhao, T. Efficient copyright protection for three C.T. images based on quaternion polar harmonic Fourier moments. Signal Process. 2019, 164, 368–379. [Google Scholar] [CrossRef]
  33. Huynh-The, T.; Hua, C.H.; Tu, N.A.; Hur, T.; Bang, J.; Kim, D.; Amin, M.B.; Kang, B.H.; Seung, H.; Lee, S. Selective bit embedding scheme for robust blind color image watermarking. Inf. Sci. 2018, 426, 1–18. [Google Scholar] [CrossRef]
  34. Xia, Z.; Wang, X.; Wang, C.; Ma, B.; Wang, M.; Shi, Y. Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images. Knowl.-Based Syst. 2021, 216, 106568. [Google Scholar] [CrossRef]
  35. Xia, Z.; Wang, X.; Wang, M.; Unar, S.; Wang, C.; Liu, Y.; Li, X. Geometrically Invariant Color Medical Image Null-Watermarking Based on Precise Quaternion Polar Harmonic Fourier Moments. IEEE Access 2019, 7, 122544–122560. [Google Scholar] [CrossRef]
  36. Yamni, M.; Karmouni, H.; Sayyouri, M.; Qjidaa, H. Image watermarking using separable fractional moments of Charlier–Meixner. J. Frankl. Inst. 2021, 358, 2535–2560. [Google Scholar] [CrossRef]
  37. Liu, X.; Han, G.; Wu, J.; Shao, Z.; Coatrieux, G.; Shu, H. Fractional Krawtchouk Transform with an Application to Image Watermarking. IEEE Trans. Signal Process. 2017, 65, 1894–1908. [Google Scholar] [CrossRef]
  38. Yang, H.; Qi, S.; Tian, J.; Niu, P.; Wang, X. Robust and discriminative image representation: Fractional-order Jacobi-Fourier moments. Pattern Recognit. 2021, 115, 107898. [Google Scholar] [CrossRef]
  39. Xiao, B.; Luo, J.; Bi, X.; Li, W.; Chen, B. Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf. Sci. 2020, 516, 545–559. [Google Scholar] [CrossRef]
  40. Hosny, K.M.; Darwish, M.M.; Fouda, M.M. New Color Image Zero-Watermarking Using Orthogonal Multi-Channel Fractional-Order Legendre-Fourier Moments. IEEE Access 2021, 9, 91209–91219. [Google Scholar] [CrossRef]
  41. Hosny, K.M.; Darwish, M.M.; Fouda, M.M. Robust Color Images Watermarking Using New Fractional-Order Exponent Moments. IEEE Access 2021, 9, 47425–47435. [Google Scholar] [CrossRef]
  42. Vaidya, P.; Pvssr, C.M. A robust semi-blind watermarking for color images based on multiple decompositions. Multimed. Tools Appl. 2017, 76, 25623–25656. [Google Scholar] [CrossRef]
  43. Elbaşı, E. M-SVD based Quality Measurement in Hybrid non-blind Watermarked Medical Images. In Proceedings of the 2020 43rd International Conference on Telecommunications and Signal Processing (TSP), Milan, Italy, 7–9 July 2020. [Google Scholar] [CrossRef]
  44. Huh, J.-H.; Kim, T.-J. A location-based mobile health care facility search system for senior citizens. J. Supercomput. 2019, 75, 1831–1848. [Google Scholar] [CrossRef]
  45. Hosny, K.M.; Darwish, M.M. New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed. Signal Process. Control. 2021, 70, 103007. [Google Scholar] [CrossRef]
  46. Soualmi, A.; Alti, A.; Laouamer, L. Multiple Blind Watermarking Framework for Security and Integrity of Medical Images in E-Health Applications. Int. J. Comput. Vis. Image Process. 2021, 11, 1–16. [Google Scholar] [CrossRef]
  47. Sun, X.; Bo, S. A blind digital watermarking for color medical images based on P.C.A. In Proceedings of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, Beijing, China, 25–27 June 2010; pp. 421–427. [Google Scholar] [CrossRef]
  48. Meenakshi, K.; Rao, C.S.; Prasad, K.S. A Robust Watermarking Scheme Based Walsh-Hadamard Transform and S.V.D. Using ZIG ZAG Scanning. In Proceedings of the 2014 International Conference on Information Technology, Bhubaneswar, India, 22–24 December 2014; pp. 167–172. [Google Scholar] [CrossRef]
  49. Erfani, S.; Babolian, E.; Javadi, S.; Shamsi, M. Stable evaluations of fractional derivative of the Müntz–Legendre polynomials and application to fractional differential equations. J. Comput. Appl. Math. 2019, 348, 70–88. [Google Scholar] [CrossRef]
  50. Hosny, K.M.; Darwish, M.M.; Aboelenen, T. New fractional-order Legendre-Fourier moments for pattern recognition applications. Pattern Recognit. 2020, 103, 107324. [Google Scholar] [CrossRef]
  51. Suk, T.; Flusser, J. Affine Moment Invariants of Color Images. In Computer Analysis of Images and Patterns; Jiang, X., Petkov, N., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5702. [Google Scholar] [CrossRef]
  52. Hosny, K.M.; Darwish, M.M. A kernel-based method for fast and accurate computation of PHT in polar coordinates. J. Real-Time Image Process. 2019, 16, 1235–1247. [Google Scholar] [CrossRef]
  53. Hosny, K.M.; Darwish, M.M. Highly accurate and numerically stable higher order QPCET moments for color image representation. Pattern Recognit. Lett. 2017, 97, 29–36. [Google Scholar] [CrossRef]
  54. Upneja, R.; Pawlak, M.; Sahan, A.M. An accurate approach for the computation of polar harmonic transforms. Optik 2018, 158, 623–633. [Google Scholar] [CrossRef]
  55. Yang, H.-Y.; Wang, X.-Y.; Wang, P.; Niu, P.-P. Geometrically resilient digital watermarking scheme based on radial harmonic Fourier moments magnitude. AEU Int. J. Electron. Commun. 2015, 69, 389–399. [Google Scholar] [CrossRef]
  56. Xin, Y.; Liao, S.; Pawlak, M. Circularly orthogonal moments for geometrically robust image watermarking. Pattern Recognit. 2007, 40, 3740–3752. [Google Scholar] [CrossRef]
  57. Color Melanoma Images. Available online: https://www.isic-archive.com (accessed on 1 May 2021).
  58. Color Retinal Images. Available online: https://www5.cs.fau.de (accessed on 1 May 2021).
  59. Color Anatomical Images. Available online: https://www.nlm.nih.gov (accessed on 1 May 2021).
  60. Wang, X.Y.; Yang, H.Y.; Niu, P.P.; Wang, C.P. Quaternion exponent moments based robust color image watermarking. J. Comput. Res. Dev. 2016, 53, 651–665. [Google Scholar]
  61. Xu, H.; Kang, X.; Chen, Y.; Wang, Y. Rotation and scale invariant image watermarking based on polar harmonic transforms. Optik 2019, 183, 401–414. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.