Next Article in Journal
Automatic Fact Checking Using an Interpretable Bert-Based Architecture on COVID-19 Claims
Next Article in Special Issue
XtoE: A Novel Constructive and Camouflaged Adaptive Data Hiding and Image Encryption Scheme for High Dynamic Range Images
Previous Article in Journal
The Effect of Turmeric Rhizome on the Inhibition of Lipid Oxidation and the Quality of Vacuum-Packed Pork Meatloaf
Previous Article in Special Issue
A Reversible Data-Hiding Method with Prediction-Error Expansion in Compressible Encrypted Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Advanced Dipper-Throated Meta-Heuristic Optimization Algorithm for Digital Image Watermarking

by
El-Sayed M. El-Kenawy
1,*,
Nima Khodadadi
2,
Ashin Khoshnaw
3,
Seyedali Mirjalili
4,5,*,
Amel Ali Alhussan
6,
Doaa Sami Khafaga
6,
Abdelhameed Ibrahim
7 and
Abdelaziz A. Abdelhamid
8,*
1
Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura 35111, Egypt
2
Department of Civil and Environmental Engineering, Florida International University, Miami, FL 33199, USA
3
Department of Public Health, College of Medicine, Florida International University, Miami, FL 33199, USA
4
Centre for Artificial Intelligence Research and Optimization, Torrens University Australia, Fortitude Valley, QLD 4006, Australia
5
Yonsei Frontier Lab, Yonsei University, Seoul 03722, Korea
6
Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
7
Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura 35516, Egypt
8
Department of Computer Science, Faculty of Computer and Information Sciences, Ain Shams University, Cairo 11566, Egypt
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2022, 12(20), 10642; https://doi.org/10.3390/app122010642
Submission received: 20 September 2022 / Revised: 18 October 2022 / Accepted: 18 October 2022 / Published: 21 October 2022

Abstract

:
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach to digital image watermarking that makes use of the discrete cosine transform (DCT), discrete wavelet transform (DWT), dipper-throated optimization (DTO), and stochastic fractal search (SFS) algorithms. The proposed approach involves computing the discrete wavelet transform (DWT) on the cover image to extract its sub-components, followed by the performance of a discrete cosine transform (DCT) to convert these sub-components into the frequency domain. Finding the best scale factor for watermarking is a significant challenge in most watermarking methods. The authors used an advanced optimization algorithm, which is referred to as DTOSFS, to determine the best two parameters—namely, the scaling factor and embedding coefficient—to be used while inserting a watermark into a cover image. Using the optimal values of these parameters, a watermark image can be inserted into a cover image more efficiently. The suggested approach is evaluated in comparison with the current gold standard. The normalized cross-correlation (NCC), peak-signal-to-noise ratio (PSNR), and image fidelity (IF) are used to measure the success of the proposed approach. In addition, a statistical analysis is performed to evaluate the significance and superiority of the proposed approach. The experimental results confirm the effectiveness of the proposed approach in improving upon standard watermarking methods based on the DWT and DCT. Moreover, a set of attacks is considered to study the robustness of the proposed approach, and the results confirm the expected outcomes. It is shown by the achieved results that the proposed approach can be utilized for practical digital image watermarking, and that it significantly outperforms other digital image watermarking methods.

1. Introduction

The progression in digital communication supports the exchange of large amounts of data through networks in real time [1]. As a result of this progression, smart healthcare companies provide remote medical services to patients [2]. These services include transmitting medical data and images of patients to faraway specialists to save time and achieve rapid medical diagnoses [3]. Security and privacy issues appear when these data is transmitted over open communication networks [4]. Different instructions and rules are used to preserve patients’ privacy when sending and receiving their medical data for diagnosis or research [5,6]. Regardless of the several advantages in this, medical data and images may reach unlicensed people, thus threatening privacy. During the COVID-19 pandemic, the need for data security increased [7,8,9].
During the transmission of medical images, a watermark is added to the original images. A watermark can be data, an image, or a logo indicating a patient’s identity or data about a hospital or clinic. An important point that must be taken into account is that the watermark should not cause significant degradation in the quality of the original image [10]. Watermarking algorithms are vastly used for biomedical images for efficient results. In watermarking, a logo or data are hidden in the cover or original image to detect ownership at any stage [11]. In watermarking, there are two main properties: robustness and invisibility. These should be balanced in order to provide high performance [12]. Nowadays, optimization algorithms are used in different fields, mainly to perform this task efficiently [13,14,15,16,17,18]. Optimization algorithms provide the optimal level of embedding of the message in the best regions in the cover image [19]. Figure 1 shows a block diagram of a basic watermarking system. In this figure, the dotted line indicates the possibility of accessing the original data in the decoding process, representing informed watermark detection. In the case of the absence of the original data, such a system is a blind watermark system.
Research on digital watermarking has increased dramatically in recent years. As a concept, watermarking was developed around 1990, and several implementations have been described in the literature [20]. Applications, source types (such as images, videos, or audio files), and watermarking methods all play a role in categorizing digital watermarking approaches. Many people favor discrete wavelet transform (DWT)- and discrete cosine transform (DCT)-based approaches because watermarks may be used in both the spatial and frequency domains. In the context of image watermarking, several techniques are ubiquitous. A watermark image and a cover image are used to watermark photographs. The goal is to seamlessly incorporate the watermark into the cover art without anybody being able to tell.
Using the DCT, the authors of [21] presented a new approach to digital image watermarking that is resistant to JPEG compression. For stealthy and long-lasting audio watermarking, a different technique using the SVD and DCT was applied in [22]. In [23], the pros and cons of a QIM-based digital watermarking system were weighed. By combining the DWT and DCT, the researchers improved watermarking approaches. An enhanced DCT–DWT approach based on a hybrid intelligent SVD model was suggested in [24]. In [25], one can see an alternative digital watermarking method for spotting and restoring altered photos. DCT (discrete cosine transform) watermarking was the basis for this technology. The watermarking of color photographs involved the combination of the DCT, DWT, and singular value decomposition (SVD). Watermarking methods for still images and moving ones may be found in the literature, with many employing the DCT and DWT in some way. Using a shift in the inter-block coefficients, the authors of [26] described a method for embedding a watermark into data that was both undetectable and extremely secure; this method was based on DCT blocks. Digital watermarks can be created by using these techniques, but their quality is severely restricted. To a large extent, the scaling factor determines the watermark’s quality. The scaling factor determines the combination of the cover and watermark images in a specific proportion. The method’s robustness, i.e., the quality of the recovered image, will suffer if the scaling factor is set to a low number. The quality of the watermarked image and, therefore, its imperceptibility will suffer, however, if the scaling factor is set to a large number. Accordingly, it is necessary to maximize the scaling factor. To optimize many different types of problems, meta-heuristic algorithms are frequently utilized [25].
This paper proposes a new algorithm for improving the watermarking approach based on the DWT and DCT. The proposed algorithm combines the dipper-throated optimization (DTO) algorithm with the stochastic fractal search (SFS) algorithm and is referred to as DTOSFS. The proposed algorithm’s advantage is that it can find the optimal regions in a cover image to implant a target message. The target message in our case is a medical image, which is sensitive for patients who wish to store it securely through transmission and communication with health agencies. The main contributions of this work can be summarized in the following points:
  • A new algorithm is proposed in order to improve the watermarking of sensitive images.
  • The proposed optimization algorithm is tested in terms of the DWT+DCT watermarking method to prove its effectiveness.
  • The proposed approach is compared with the original DWT+DCT and the original DTO and SFS, in addition to another watermarking method based on the discrete Fourier transform (DFT) + singular value decomposition, to prove the effectiveness and superiority of the proposed approach.
  • The proposed approach is tested in terms of various methods of attack, including the average filtering, Gaussian filtering, median filtering, and Wiener filtering methods, to show its robustness.
  • The proposed approach is tested in terms of various cover images.
The structure of this paper is as follows. A review of previous studies addressing recent watermarking approaches is presented in Section 2. The materials and methods employed in the proposed methodology are described in Section 3. The proposed methodology is then illustrated in Section 4. The achieved results and the corresponding analysis are explained in Section 5. Finally, the conclusion and future perspectives are presented in Section 6.

2. Literature Review

Digital image watermarking has been targeted by many researchers in recent years [27,28,29,30,31]. As a platform, the Internet of Things (IoT) has enhanced the development of many types of research in the medical field. A medical image algorithm based on IoT was proposed in which the doctor’s signature was embedded into different images to provide robustness and security [32]. The drawbacks of this method were its low robustness in the case of geometric attacks and that the capacity of the data payload was not recognized. So, a different optimization method would provide a trade-off between robustness and size. An idea for saving time consumption was presented by using ant colony optimization and the light gradient boosting algorithm. The embedding was performed by using the discrete cosine transform, and the optimizer was used to obtain the optimal embedding parameters [33]. A different deep learning algorithm was used in watermarking systems to allow automation of the process. The available deep learning algorithms did not guarantee robust and blind embedding simultaneously. A new technique based on deep learning was proposed in which the functions of both embedding and extraction were performed by using automation [34]. The use of particle swarm optimization with a watermarking system depended on the discrete wavelet transform and the discrete cosine transform in [35], and this provided efficient results. The results of this method were satisfying compared to those of existing methods.
An optimized blind watermarking technique for protecting copyright data used principal component analysis; it operated on a redundant discrete wavelet domain and used an improved gray wolf optimizer [36]. The proposed technique achieved efficient imperceptibility and robustness. Now, neural networks are being used to develop the efficiency of watermarking techniques. An efficient blind image watermarking technique based on thirteen layers of a convolutional neural network was proposed in [37]. The new method increased the image resolution by increasing the invisibility of the watermark image. The trade-off was carried out according to user desire. The results indicate satisfactory robustness in the cases of both geometric and pixel value change attacks. A new protocol for watermarking systems called a buyer and seller protocol has appeared in recent years to ensure security for systems depending on the blockchain technology [38]. A proposed watermarking framework based on a neural network in which the watermark logo was embedded into the edge of the host image was presented in [39]. This method used an optimizer with a genetic algorithm to insert the logo data and used a multilayer perceptron to extract the logo with high performance. Another secure watermarking algorithm used a particle swarm optimizer in which a color logo was embedded into the three primary colors in color images (red, green, and blue) of the original image by using the discrete cosine transform [40]. The three primary colors were arranged according to the fuzzy entropy value, and a particle swarm optimizer determined the performance of the embedding in order to achieve a balance between invisibility and robustness.
A hybrid method was used to perform watermarking with the discrete cosine transform, and the discrete wavelet transform was proposed by the authors of [41]. In this method, the watermark was extracted from the original image without using the host image, but this depended on a two-stage neural network. The system achieved better invisibility with high robustness. Another hybrid system aimed to protect copyright data and was based on the discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), and hologram presented in [42]. The steps of this method were as follows: First, the watermark logo was embedded into the three-color components of the required original image. Second, a blind algorithm was used to extract the watermark image; third, the hologram was used to improve the invisibility of the watermark, provide the best performance against noise attacks, and perform encryption. A proposed watermarking system that ensured all the requirements simultaneously was proposed in [43]. Different researchers that were dependent on blockchain for digital image watermarking to prove ownership [44,45,46] could not rely on a relational database because it was different from another database format, such as the image format. Another algorithm that used blockchain to detect tampering in the database was presented in [47]. Another algorithm that used blockchain for the digital watermarking of big data was presented in [48].
Particle swarm optimization, gray wolf optimization, genetic algorithms, firefly algorithms, bat optimization, the artificial bee colony, and ant colony optimization are a few examples of nature-inspired algorithms that employ swarm intelligence ideas to achieve optimal outcomes. To get the best possible results, several authors have turned to these methods. In [49], a novel and optimal function was introduced that was secure against a wide range of attacks while retaining the desired level of quality. In this method, the embedding factor was determined by using the PSNR and bit correction rate (BCR), and optimization algorithms were utilized to perform the calculations. Numerous hybrid methods, including the use of various algorithms inspired by nature, have been employed by researchers to successfully embed watermarks. The watermarking of color photographs with a combination of the bat method and the firefly algorithm was presented in [50]. A second DCT-based watermarking system was described in [51], which employed the PSO algorithm to find the optimal strength factor value. In [52], the author proposed a watermarking system that used a special variant of the Whale algorithm. To determine the multiscale factor, this approach employed DWT–SVD-based watermarking with a twist: modified whale optimization. In [53], the watermark embedding position is determined by using the firefly method. In [54], an optimization strategy based on the ABC algorithm was used to incorporate the watermark using the IWT and SVD. In [55], the notion of an artificial bee colony was proposed; this system was based on the intelligence of real honey bees. The dipper-throated optimization (DTO) and stochastic fractal search (SFS) optimization methods were proven to perform better than many other optimization algorithms. Still, these algorithms have not been addressed for the problem of watermarking [56,57]. Therefore, these methods were adopted in developing the new algorithm proposed in this paper in order to improve the performance of a standard watermarking method to preserve the security and privacy of medical images while being transmitted over networks.

3. Background

In this section, the basic materials and methods employed in the proposed methodology are briefly presented. The proposed methodology is based on a standard watermarking approach that combines the DWT and DCT methods in order to implant messages in a cover image. Therefore, this section briefly introduces these methods. On the other hand, the proposed approach is based on a new optimization algorithm that was developed to improve the standard DWT+DCT. This new optimization algorithm is based on the original DTO and SFS optimization methods. Therefore, these underlying optimization algorithms are briefly introduced in this section.

3.1. Discrete Cosine Transform (DCT)

To illustrate an image as the sum of data points, the discrete cosine transform (DCT) is frequently used. The variable magnitudes and frequencies of sinusoids are shown here [58]. Separating an image into its component sub-bands or spectral sub-bands allows for more control over the image’s overall visual quality. If one wants to move a signal or image from the spatial domain to the frequency domain, one can use the discrete cosine transform (DCT). The image can be separated into its high- and low-frequency components. Reflectance is reflected in the low-energy, high-frequency component. The image’s brightness is conveyed via the low-frequency component, which is also quite energetic. Images may be compressed and watermarked using DCTs, just to name a couple of their many uses. The function of the DCT is shown in Figure 2. With the DCT, an image in the spatial domain is transformed into one in the frequency domain. Aside from its low mistake rate, it also features a high compression ratio and computational complexity. The following equation is used to get the DCT of an N × M image.
F ( i , j ) = 2 M 2 N G i . G j i = 0 M 1 j 0 N 1 I ( m , n ) c o s π u 2 M ( 2 m + 1 ) c o s π u 2 N ( 2 n + 1 )
where
G i = 1 2 if i = 0 1 o t h e r w i s e , G j = 1 2 if j = 0 1 o t h e r w i s e ,
The reconstruction of the image is achieved by applying the following equation:
I ( m , n ) = 2 M 2 N i = 0 M 1 j 0 N 1 G i . G j . F ( i , j ) c o s π u 2 M ( 2 m + 1 ) c o s π u 2 N ( 2 n + 1 )
It is common practice to apply the DCT to each non-overlapping block of an image when using the popular block-based DCT transform. There are, therefore, three distinct frequency ranges resulting from this process: the low-frequency range, the intermediate-frequency range, and the high-frequency range. The foundation for DCT-based watermarking comprises a couple of simple facts. In the first place, an image’s most crucial visual aspects are located in the low-frequency sub-band, where much of the signal energy is. The second reality is that compression and noise attacks typically get rid of the high-frequency components of an image. Therefore, the watermark is encoded by altering the coefficients of the middle-frequency sub-band, guaranteeing that it will remain in place through decompression and viewing.

3.2. Discrete Wavelet Transform (DWT)

Multi-resolution analysis (MRA) of images is a very recent technique, and it relies on the mathematical framework provided by the relatively new theory of wavelets [59]. The concept is a wavelet- and transform-based image processing method. These are helpful, since they tell us about the frequency and timescale of an image. When a 2D wavelet transform is applied, the resulting representation of the image is a four-component sum across all resolutions. The analysis and representation of images and information at several resolutions are the goals of multi-resolution theory. It draws from a wide variety of disciplines to create a new method. Sub-band encoding is a technique from digital signal processing, and quadrature mirror filtering originates in the field of pyramidal imaging. Multi-resolution analysis is the popular name for a theoretical framework supporting many resolutions (MRA). MRA’s main benefit is that it can often identify previously invisible details at lower magnifications. An iterative succession of scaled-down versions of the input image is generated mathematically. At each tier, the resolution is multiplied by 2. For an image f ( x , y ) of size M × N , the discrete wavelet transform is calculated as follows:
W φ ( j o , m , n ) = 1 M N x = 0 M 1 y = 0 N 1 f ( x , y ) φ j o , m , n ( x , y )
W ψ i ( j o , m , n ) = 1 M N x = 0 M 1 y = 0 N 1 f ( x , y ) ψ i j o , m , n ( x , y )
where
φ j , m , n ( x , y ) = 2 1 2 φ ( 2 j x m , 2 j y n )
ψ j , m , n i ( x , y ) = 2 1 2 ψ i ( 2 j x m , 2 j y n )
where i = {Diagonal, Vertical, Horizontal}, and j o is used to denote the scale, which is initially selected arbitrarily. The approximate value of f ( x , y ) at scale j o has approximate coefficient values that are denoted by W ψ ( j o , m , n ) . Coefficients of the form W ψ i ( j , m , n ) are appended for scales above j o , allowing for higher diagonal, vertical, and horizontal specificity. If m = n = 0 , 1 , 2 , , 2 j 1 and j = 0 , 1 , 2 , , j 1 , then N = M = 2 j and j o = 0 are chosen. The inverse discrete wavelet transform yields f ( x , y ) when given W ψ i and W φ . To illustrate the two-level DFT that is used to decompose the input, Figure 3 shows this process.
To calculate wavelet components, the Haar wavelet transform is utilized. The Haar transform is used to calculate wavelets, and this transformation is the most basic kind of wavelet. It is the basis for all subsequent refined wavelet types [60]. The mathematical expression for the mother wavelet function ψ ( a ) of the Haar wavelet is provided by the following equation:
ψ ( a ) = 1 0 a < 1 2 1 1 2 a < 1 0 O t h e r w i s e ,
The scaling function of the Haar function is denoted by φ ( a ) , which is defined as follows:
φ ( a ) = 1 0 a < 1 0 O t h e r w i s e ,
The transform calculates the data points by summing and subtracting neighboring points. The horizontal and vertical components of the discrete wavelet transform are calculated by using these equations.

3.3. Dipper-Throated Optimization (DTO)

Meta-heuristic optimization is considered one of the best approaches that can be used to find the best parameters of artificial intelligence tasks [57,61,62,63,64]. The distinctive hunting technique, swift bowing movements, and the dipper-throated bird’s white breast inspired this optimization procedure. No matter how choppy or swift the current, it plunges headfirst into the sea to catch its victim. It can also dive into the water and stay submerged for long periods, using its wings as fins to drive itself through the water. The birds in the dipper-throated optimization (DTO) approach are presumed to be swimming about in search of food. The following matrices represent the birds’ positions (P) and speeds (S).
P = P 1 , 1 P 1 , 2 P 1 , 3 P 1 , d P 2 , 1 P 2 , 2 P 2 , 3 P 2 , d P 3 , 1 P 3 , 2 P 3 , 3 P 3 , d P m , 1 P m , 2 P m , 3 P m , d
S = S 1 , 1 S 1 , 2 S 1 , 3 S 1 , d S 2 , 1 S 2 , 2 S 2 , 3 S 2 , d S 3 , 1 S 3 , 2 S 3 , 3 S 3 , d S m , 1 S m , 2 S m , 3 S m , d
where i 1 , 2 , 3 , , m and j 1 , 2 , 3 , , d represent the bird in dimension i, and  P ( i , j ) represents the bird in dimension j. For each pair i , j where i 1 , 2 , 3 , , m and j 1 , 2 , 3 , , d , the speed of the bird in the jth dimension is denoted by S ( i , j ) . The values of P ( i , j ) are distributed normally at the outset. The fitness function values denoted by h = h 1 , h 2 , h 3 , , h n are calculated for each bird in the following array.
h = h 1 ( P 1 , 1 , P 1 , 2 , P 1 , 3 , , P 1 , d ) h 2 ( P 2 , 1 , P 2 , 2 , P 2 , 3 , , P 2 , d ) h 3 ( P 3 , 1 , P 3 , 2 , P 3 , 3 , , P 3 , d ) h m ( P m , 1 , P m , 2 , P m , 3 , , P m , d )
The fitness score of the mother bird is higher than those of her offspring because it has a greater advantage in the struggle for survival. The values are sorted upwards. The best solution, which is denoted P b e s t , is declared. Birds with a regular appearance ( P n d ) are most suited for the role of followers. The best solution in the world is P G b e s t . The optimizer uses the following equations as the basis for the first DTO approach used to update the position of the swimming bird:
P ( i + 1 ) = X if R < 0.5 Y o t h e r w i s e ,
X = P b e s t ( i ) K 1 . | K 2 . P b e s t ( i ) P ( i ) |
Y = P ( i ) + S ( i + 1 )
S ( i + 1 ) = K 3 V ( i ) + K 4 r 1 ( P b e s t ( i ) P ( i ) ) + K 5 r 2 ( P G b e s t P ( i ) )
For each iteration i, we get the average position of the birds P ( i ) , the position of the best birds P b e s t ( i ) , and the speed of the birds S ( i + 1 ) . Weight values are denoted by K 1 , K 2 , and  K 3 , whereas K 4 and K 5 are constants. Both r 1 and r 2 can take on any value between 0 and 1 at random.
The DTO algorithm is employed in the proposed optimization algorithm to find the optimal values of the scaling factor and the embedding coefficient to improve the performance of the standard DWT+DCT watermarking method.

3.4. Stochastic Fractal Search (SFS)

An algorithm that uses random fractals to inspire meta-heuristic algorithms can be as efficient and accurate as the original fractal technique. The fractal search (FS) technique follows three basic rules to find a solution to a given problem.
  • The best particles are kept, while the others are removed with each new generation.
  • There are several ways to make and disperse new particles. In the new particles, the original particle energy is shared.
  • A particle can have electrical potential energy.
Finding fractals in any given object is possible using the stochastic fractal search (SFS), as explained in detail in [65]. The fractal-shaped objects are built using the diffusion-limited aggregation (DLA) process. Compared to the original FS approach, the SFS method uses diffusion and two distinct types of update processes. This solution BP might be surrounded by the solutions BP1–BP5 to arrive at the best potential outcome. The Gaussian distribution approach is used in the DLA growth process to produce new particles based on the diffusion procedure of SFS. A list of walks created by the best solution P may be determined in the diffusion process.
P = G a u s s i a n ( μ P , σ + β × P ) β × V
where P denotes the updated best solution. The values of β and β are selected randomly from the range [0, 1]. The point in the group is denoted by V, whereas the position of the best point is referred to as P. In addition, μ P is equal to | P | and σ is equal to | V P | . A better solution can be found by applying SFS to the DTO process, which is an exploration method based on the algorithm’s diffusion process.
In the proposed optimization algorithm, the SFS is harnessed with the DTO algorithm to improve the exploration of the search space to efficiently find the best set of parameters. The steps of the proposed optimization algorithm are presented in the next section.

4. The Proposed Methodology

In images that are created digitally by using watermarking, an image is secretly implanted into a carrier image, and it is difficult to remove. Two processes make up watermarking: embedding and detection. The watermark image is embedded into the cover image to create a watermarked image. The scaling factor is crucial in creating a reliable and effective watermark. An optimal scaling factor is calculated to improve the algorithm’s reliability and performance. The suggested technique utilizes DTOSFS to calculate the scaling factor. The DCT coefficients of both the cover and watermark images are modified by a scaling factor for embedding purposes. Extracting them means getting the watermark with as little damage as possible. The inverse DWT and inverse DCT are used to extract the information. Figure 4 shows the flow of the steps included in the proposed methodology. These steps are described in the following.
  • The cover image ( I c ) and watermark images ( I w ) are initially used for the watermarking process.
  • The Haar wavelet transform is used to calculate the cover image’s wavelet transform [20]. The approximate result is the application of the Haar wavelet transform in two dimensions, with further computations for the horizontal, vertical, and diagonal components. Therefore, the  M × N discrete wavelet transform of the cover image ( I c ) is:
    W Θ ( j 0 , m , n ) = 1 M N x = 0 M 1 y = 0 N 1 f ( x , y ) Θ j 0 , m , n ( x , y )
  • Applying the DCT transform to the wavelet transform results in a transformation from the time domain to the frequency domain. The formula for this step is as follows:
    F ( u , v ) = σ ( u ) σ ( v ) i = 0 m 1 j = 0 n 1 g ( i , j ) . c o s ( 2 i + 1 ) u π 2 m c o s ( 2 j + 1 ) v π 2 n
    The computation of the inverse of the DCT can be applied as follows:
    G ( m , n ) = σ ( u ) σ ( v ) i = 0 M 1 j = 0 N 1 f ( u , v ) . c o s ( 2 i + 1 ) u π 2 m c o s ( 2 j + 1 ) v π 2 n
    where
    σ ( u ) = 1 2 u = 0 1 u = 1 , 2 , 3 , m 1 ,
    σ ( v ) = 1 2 v = 0 1 u = 1 , 2 , 3 , n 1 ,
    The proposed algorithm is presented in Algorithm 1.
  • The DTOSFS algorithm is applied to search for the optimal scaling factor and the coefficient for embedding the watermark. The result of using DTOSFS is the computation of the optimal value of α , which is the invisibility or weighting coefficient.
  • The watermark W ( i , j ) is inserted into the cover image I ( i , j ) by using an additive technique that is applied using the following formula.
    I ( i , j ) = I ( i , j ) + ( α × W ( i , j ) )
    For the original image, the DWT coefficient is denoted by I. In contrast, I refers to the DWT coefficient for the watermarked image, and for the watermark image, the DWT coefficient is denoted by W.
  • The inverse DCT and inverse DWT of I are applied to obtain the watermarked image.
  • The inverse of the additive formula is applied to extract the watermark.
    W = I ( i , j ) I ( i , j ) α
    Finally, the inverse DWT of W is applied to compute the raw watermark image I w .
Algorithm 1 The Proposed DTOSFS Algorithm
1:
Initialize birds’ positions P i ( i = 1 , 2 , . . . , n ) with n birds, the birds’ speed S i ( i = 1 , 2 , , n ) , the objective function f n , iterations T m a x , the parameters of t = 1 , r 1 , r 2 , R, K 1 , K 2 , K 3 , K 4 , K 5
2:
Calculate f n for each bird P i
3:
Find the best bird position P b e s t
4:
while t T m a x do
5:
   for ( i = 1 : i < n + 1 ) do
6:
     if ( R < 0.5 ) then
7:
        Update the current swimming bird’s position as:
  •      P ( i + 1 ) = P b e s t ( i ) K 1 . | K 2 . P b e s t ( i ) P ( i ) |
8:
     else
9:
        Update the current flying bird’s velocity as:
  •      S ( i + 1 ) = K 3 V ( i ) + K 4 r 1 ( P b e s t ( i ) P ( i ) ) + K 5 r 2 ( P G b e s t P ( i ) )
10:
        Update the current flying bird’s position as:
  •      P ( i + 1 ) = P ( i ) + S ( i + 1 )
11:
     end if
12:
     Apply the stochastic fractal search diffusion as:
  •   P = G a u s s i a n ( μ P , σ + β × P ) β × S
13:
   end for
14:
   Calculate  f n for each bird P i
15:
   Set  t = t + 1
16:
   Update R, K 2 , K 1
17:
   Find the best position P b e s t
18:
   Set  P G b e s t = P b e s t
19:
end while
20:
Return the best solution P G b e s t

5. Results and Discussion

The proposed optimization algorithm is evaluated in terms of the digital image watermarking task to prove its superiority in finding the best parameters to help better embed the image in a cover image. The experiments were carried out on the three different cover images shown in Figure 5. The message embedded in the cover image was a sample Monkeypox image, which is shown in Figure 6.

5.1. Evaluation Criteria

To measure the performance of the proposed approach, a set of evaluation criteria was employed to assess the achieved results. These criteria included the normalized correlation coefficient (NCC), image fidelity (IF), and peak-signal-to-noise ratio (PSNR). The formulas used to calculate these criteria are presented in the following:
N C C = u = w w v = w w [ I u v I ¯ ] [ I u v I ¯ ] ( 2 w + 1 ) 2 σ ( I ) σ ( I )
where I u v is the first image, I u v is the second image, I ¯ and I ¯ are the means of the images, and σ ( I ) and σ ( I ) are the standard deviations of all of the points in I and I , respectively.
I F = 1 u , v ( I u v I u v ) 2 u , v I u v × I u v
where I u v is the pixel at position ( u , v ) , and I ( u , v ) is the stego image at the same position.
P S N R = 10 . l o g 10 S i g n a l N o i s e

5.2. Experimental Results

The evaluation results of the proposed approach in comparison with four other watermarking methods in terms of the adopted criteria, which are presented in the previous section, are listed in Table 1. It can be noted in this table that the proposed approach (DWT+DCT+DTOSFS) was able to achieve the best values for the three cover images from Figure 5 when compared to the four other watermarking approaches. The other watermarking approaches included in the conducted experiment were the original DFT+SVD, the original DWT+DCT, the optimized DWT+DCT using the original SFS, and the optimized DWT+DCT optimized using the original DTO. The presented results show the effectiveness and superiority of the proposed approach. In the table, the PSNR value achieved by the proposed approach was 68.87, which was higher than the corresponding values achieved by the other approaches. Similarly, the values achieved using the proposed approach outperformed those of the competing approaches included in the experiment.
On the other hand, a set of experiments were conducted to analyze the proposed approach’s statistical significance. The statistical analysis was performed based on the results achieved by the proposed method and the four other competing approaches. Table 2 presents the results of the statistical analysis. In this table, the number of samples included in the statistical analysis was 10. The standard error of the mean was 0.07676, and the standard deviation was 0.2427 when using the proposed approach; these were better than the values achieved by the other approaches. The measured values in this table demonstrate the stability of the proposed approach.
In addition, two tests were applied to study the significance of the proposed approach. These tests were the one-way analysis of variance (ANOVA) test and the Wilcoxon test. The results of these tests are presented in Table 3 and Table 4, respectively. The difference between the proposed watermarking approach and each method of the competing watermarking methods was measured using the Wilcoxon test. The results of this test are shown in Table 4. In this table, the p-value is 0.002, which confirms the statistical difference in each watermarking method. As shown in Table 3, the measured p-value was less than 0.0001, which means that the proposed approach was statistically different from the other four watermarking methods.
In addition, another experiment was conducted to focus on the study of the significance of the proposed approach using the linear regression test. The results of this experiment are presented in Table 5. In this test, if the p-value was smaller than 0.05, then the null hypothesis was rejected and it was concluded that the relationship between the proposed approach and the approach presented in the test was significant. The results presented in the table show that the p-values for all methods included in the experiment were less than 0.05, and thus, there was a significant relationship between these methods and the proposed method. Moreover, an additional experiment was conducted to study the stability of the proposed watermarking approach. This experiment was based on the regression test. The results of this test are presented in Table 5. In this test, the results achieved by the proposed watermarking approach were analyzed with respect to the results achieved by the four other competing methods. The results shown in this table emphasize the stability of the proposed approach when compared to the other methods. The analysis of the area under the curve (AUC) was another experiment conducted to study the proposed approach’s effectiveness. The results of this experiment are presented in Table 6. In this table, it can be noted that the %Area was 100%, reflecting the proposed approach’s effectiveness.
Moreover, the plots shown in Figure 7 illustrate the behavior of the residual, homoscedasticity, and quartile–quartile (QQ) of the results achieved by using the proposed DTOSFS approach. In these plots, it can be seen that the residual values were minor, reflecting the high accuracy of the proposed approach in efficiently recovering the watermark image compared to the other methods. Similarly, the behavior of the homoscedasticity and QQ was promising and showed the effectiveness of the proposed watermarking approach.
A residual plot of the comparitive results between the proposed method and the competing approaches is depicted in Figure 8. In addition, the receiver operating characteristic (ROC) is shown in Figure 9, and a histogram of the PSNR values is illustrated in Figure 10. As shown in these figures, the proposed approach outperformed the other methods, which confirmed the superiority of the proposed watermarking approach.
To emphasize the promising performance of the proposed approach, Figure 11 depicts the range of the PSNR values achieved with the proposed approach compared to those of the other four watermarking methods. In this figure, it is obvious that the proposed (DWT+DCT+DTOSFS) watermarking approach achieved the highest PSNR value, which strongly emphasized the proposed approach’s promising performance in digital watermarking.
From the perspective of attacks on watermarked images, another experiment was conducted to study the effects of various types of attacks on the performance of the proposed approach when the Monkeypox was recovered. In this experiment, four types of attacks were considered: Gaussian filtering, median filtering, Wiener filtering, and average filtering. Table 7 presents the effect of each type of attack on the image recovered by the proposed watermarking approach in terms of the NCC and structural similarity index matrix (SSIM), along with their standard deviation (SD). As shown in the table, the quality of the recovered Monkeypox image was slightly affected by these attacks, especially when the Gaussian filtering attack was tested. In addition, the filter that significantly affected the recovered image was the average filter, for which the NCC value was 0.886 and the SSIM was 0.813. These results prove that the proposed watermarking approach was robust against certain types of attacks, such as Gaussian and median filtering attacks. Figure 12 shows the recovered Monkeypox image for each type of attack. On the other hand, the recovery time of the Monkeypox image using the proposed approach and the other four methods is listed in Table 8. In this table, it is shown that the proposed approach was able to recover/extract the Monkeypox image from the cover image faster than the other methods for the three cover images. These results clearly emphasize the superiority of the proposed watermarking approach. More comparison results are shown in Table A1 in Appendix A.

6. Conclusions

In this paper, a new meta-heuristic optimization approach was proposed for the improvement of the performance of watermarking methods. The proposed optimization method was based on the DTO and SFS optimization algorithms, and DWT+DCT denotes the adopted watermarking method. Due to the increasing demand for hiding private health information, the proposed optimization algorithm was tested on the watermarking of a medical image in a cover image. The proposed optimization algorithm was used to optimize the watermark scaling factor. Because of the appropriate scaling factor provided by DTOSFS, the proposed approach was both reliable and efficient. To gauge how well the proposed approach worked, it was compared with four other watermarking approaches, and the results were recorded and analyzed. A set of statistical tests were conducted to study the proposed approach’s effectiveness, significance, and robustness. On the other hand, the proposed approach was evaluated in terms of various attack types. The experimental results confirmed the robustness and superiority of the proposed approach when compared with other optimization algorithms and different watermarking approaches. The potential future perspectives include improving the proposed optimization algorithm to boost the NCC and SSIM values of the recovered images when embedded in a cover image by using the proposed approach.

Author Contributions

Conceptualization, E.-S.M.E.-K. and A.A.A. (Amel Ali Alhussan); methodology, N.K.; software, E.-S.M.E.-K.; validation, S.M., A.A.A. (Abdelaziz A. Abdelhamid) and D.S.K.; formal analysis, A.I.; investigation, E.-S.M.E.-K.; resources, A.K.; data curation, S.M.; writing—original draft preparation, A.A.A. (Amel Ali Alhussan); writing—review and editing, A.A.A. (Amel Ali Alhussan); visualization, E.-S.M.E.-K.; supervision, S.M.; project administration, A.I.; funding acquisition, A.A.A. (Abdelaziz A. Abdelhamid), D.S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Princess Nourah bint Abdulrahman University Researcher Supporting Project (number PNURSP2022R308), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

In this appendix, we present additional results to highlight the effectiveness and robustness of the proposed watermarking approach. The additional results were achieved by running the proposed approach on more cover images. Table A1 presents the PSNR values achieved with the proposed approach in comparison with methods that have recently been published in the literature. Each method in the previously published methods was proposed by using a different optimization algorithm. The results presented in this table emphasize the superiority of the proposed approach, as the PSNR value achieved by the proposed approach outperformed those of the other methods when tested on six other cover images.
Table A1. Comparison of watermarking quality, measured using the PSNR.
Table A1. Comparison of watermarking quality, measured using the PSNR.
Abdelhakim et al. [66]Abdelhakim et al. [67]Vipul [33]Proposed Approach
BeesABCK-NNACOLGBADWT+DCT+DTOSFS
Elaine52.44352.64552.71957.86157.97866.858
House151.43151.99351.97355.66756.06264.942
Pirate51.47752.52352.68357.16557.27166.151
Boat51.43452.16352.10955.89856.27865.158
House253.00756.74956.80560.99261.30270.182
Zelda52.81554.76254.82759.13159.37868.258

References

  1. Mathivanan, P.; Balaji Ganesh, A. QR code based color image cryptography for the secured transmission of ECG signal. Multimed. Tools Appl. 2019, 78, 6763–6786. [Google Scholar] [CrossRef]
  2. Anand, A.; Singh, A.K.; Lv, Z.; Bhatnagar, G. Compression-Then-Encryption-Based Secure Watermarking Technique for Smart Healthcare System. IEEE MultiMedia 2020, 27, 133–143. [Google Scholar] [CrossRef]
  3. Abuadbba, A.; Khalil, I. Walsh–Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care. IEEE Trans. Biomed. Eng. 2017, 64, 2186–2195. [Google Scholar] [CrossRef]
  4. Anand, A.; Singh, A.K. An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 2020, 152, 72–80. [Google Scholar] [CrossRef]
  5. Banerjee, S.; Singh, G.K. A new approach of ECG steganography and prediction using deep learning. Biomed. Signal Process. Control 2021, 64, 102151. [Google Scholar] [CrossRef]
  6. Mathivanan, P.; Balaji Ganesh, A. ECG steganography based on tunable Q-factor wavelet transform and singular value decomposition. Int. J. Imaging Syst. Technol. 2021, 31, 270–287. [Google Scholar] [CrossRef]
  7. Almeida, B.d.A.; Doneda, D.; Ichihara, M.Y.; Barral-Netto, M.; Matta, G.C.; Rabello, E.T.; Gouveia, F.C.; Barreto, M. Personal data usage and privacy considerations in the COVID-19 global pandemic. Cienc. Saude Coletiva 2020, 25, 2487–2492. [Google Scholar] [CrossRef] [PubMed]
  8. Bose, B.; Dey, D.; Sengupta, A.; Mulchandani, N.; Patra, A. A Novel Medical Image Encryption using Cyclic Coding in COVID-19 Pandemic Situation. J. Phys. Conf. Ser. 2021, 1797, 012035. [Google Scholar] [CrossRef]
  9. Reyad, O.; Karar, M.E. Secure CT-Image Encryption for COVID-19 Infections Using HBBS-Based Multiple Key-Streams. Arab. J. Sci. Eng. 2021, 46, 3581–3593. [Google Scholar] [CrossRef] [PubMed]
  10. Sanivarapu, P.V.; Rajesh, K.N.V.P.S.; Reddy, N.V.R.; Reddy, N.C.S. Patient data hiding into ECG signal using watermarking in transform domain. Phys. Eng. Sci. Med. 2020, 43, 213–226. [Google Scholar] [CrossRef]
  11. Anand, A.; Singh, A.K. Watermarking techniques for medical data authentication: A survey. Multimed. Tools Appl. 2021, 80, 30165–30197. [Google Scholar] [CrossRef]
  12. Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
  13. El-Kenawy, E.S.M.; Mirjalili, S.; Abdelhamid, A.A.; Ibrahim, A.; Khodadadi, N.; Eid, M.M. Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users. Mathematics 2022, 10, 2912. [Google Scholar] [CrossRef]
  14. Khodadadi, N.; Snasel, V.; Mirjalili, S. Dynamic arithmetic optimization algorithm for truss optimization under natural frequency constraints. IEEE Access 2022, 10, 16188–16208. [Google Scholar] [CrossRef]
  15. Mirjalili, S.M.; Davar, S.; Khodadadi, N.; Mirjalili, S. Design Optimization of Photonic Crystal Filter Using Moth-Flame Optimization Algorithm. In Handbook of Moth-Flame Optimization Algorithm; CRC Press: Boca Raton, FL, USA, 2022; pp. 313–322. [Google Scholar]
  16. Khodadadi, N.; Soleimanian Gharehchopogh, F.; Mirjalili, S. MOAVOA: A new multi-objective artificial vultures optimization algorithm. Neural Comput. Appl. 2022, 1–39. [Google Scholar] [CrossRef]
  17. Abualigah, L.; Elaziz, M.A.; Khodadadi, N.; Forestiero, A.; Jia, H.; Gandomi, A.H. Aquila Optimizer Based PSO Swarm Intelligence for IoT Task Scheduling Application in Cloud Computing. In Integrating Meta-Heuristics and Machine Learning for Real-World Optimization Problems; Springer: Berlin/Heidelberg, Germany, 2022; pp. 481–497. [Google Scholar]
  18. Alotaibi, S.S. Optimization insisted watermarking model: Hybrid firefly and Jaya algorithm for video copyright protection. Soft Comput. 2020, 24, 14809–14823. [Google Scholar] [CrossRef]
  19. S, E.J.; Ramu, P.; Swaminathan, R. Imperceptibility—Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization. Expert Syst. Appl. 2016, 49, 123–135. [Google Scholar] [CrossRef]
  20. Sharma, S.; Chauhan, U.; Khanam, R.; Singh, K.K. Digital Watermarking using Grasshopper Optimization Algorithm. Open Comput. Sci. 2021, 11, 330–336. [Google Scholar] [CrossRef]
  21. Savelyev, A. Copyright in the blockchain era: Promises and challenges. Comput. Law Secur. Rev. 2018, 34, 550–561. [Google Scholar] [CrossRef] [Green Version]
  22. Fujimura, S.; Watanabe, H.; Nakadaira, A.; Yamada, T.; Akutsu, A.; Kishigami, J.J. BRIGHT: A concept for a decentralized rights management system based on blockchain. In Proceedings of the 2015 IEEE 5th International Conference on Consumer Electronics—Berlin (ICCE-Berlin), Berlin, Germany, 6–9 September 2015; pp. 345–346. [Google Scholar] [CrossRef]
  23. Xu, R.; Zhang, L.; Zhao, H.; Peng, Y. Design of Network Media’s Digital Rights Management Scheme Based on Blockchain Technology. In Proceedings of the 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS), Bangkok, Thailand, 22–24 March 2017; pp. 128–133. [Google Scholar] [CrossRef]
  24. Divecha, N.; Jani, N.N. Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images. In Proceedings of the 2013 International Conference on Intelligent Systems and Signal Processing (ISSP), Anand, India, 1–2 March 2013; pp. 204–208. [Google Scholar] [CrossRef]
  25. Soltani Panah, A.; Van Schyndel, R.; Sellis, T.; Bertino, E. On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques. IEEE Access 2016, 4, 2670–2704. [Google Scholar] [CrossRef]
  26. Parah, S.A.; Sheikh, J.A.; Loan, N.A.; Bhat, G.M. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process. 2016, 53, 11–24. [Google Scholar] [CrossRef]
  27. Feng, L.P.; Zheng, L.B.; Cao, P. A DWT-DCT based blind watermarking algorithm for copyright protection. In Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 9–11 July 2010; Volume 7, pp. 455–458. [Google Scholar] [CrossRef]
  28. Rahman, A.U.; Sultan, K.; Musleh, D.; Aldhafferi, N.; Alqahtani, A.; Mahmud, M. Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories. J. Healthc. Eng. 2018, 2018, e8137436. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  29. Begum, M.; Uddin, M.S. Analysis of Digital Image Watermarking Techniques through Hybrid Methods. Adv. Multimed. 2020, 2020, e7912690. [Google Scholar] [CrossRef]
  30. Hu, H.T.; Hsu, L.Y. Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimed. Tools Appl. 2017, 76, 6575–6594. [Google Scholar] [CrossRef]
  31. Natu, S.; Natu, P.; Sarode, T. Improved robust digital image watermarking with SVD and hybrid transform. In Proceedings of the 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT), Jaipur, India, 22–23 December 2017; pp. 177–181. [Google Scholar] [CrossRef]
  32. Al-Shayea, T.K.; Batalla, J.M.; Mavromoustakis, C.X.; Mastorakis, G. Embedded Dynamic Modification for Efficient Watermarking Using Different Medical Inputs in IoT. In Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
  33. Sharma, V.; Mir, R.N. An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 615–626. [Google Scholar] [CrossRef]
  34. Zhong, X.; Huang, P.C.; Mastorakis, S.; Shih, F.Y. An Automated and Robust Image Watermarking Scheme Based on Deep Neural Networks. IEEE Trans. Multimed. 2021, 23, 1951–1961. [Google Scholar] [CrossRef]
  35. Yadav, N.; Rajpoot, D.; Dhakad, S.K. Optimization of Watermarking in Image by Using Particle Swarm Optimization Algorithm. In Proceedings of the 2020 6th International Conference on Signal Processing and Communication (ICSC), Noida, India, 5–7 March 2020; pp. 85–90. [Google Scholar] [CrossRef]
  36. Rajani, D.; Kumar, P.R. An optimized blind watermarking scheme based on principal component analysis in redundant discrete wavelet domain. Signal Process. 2020, 172, 107556. [Google Scholar] [CrossRef]
  37. Lee, J.E.; Seo, Y.H.; Kim, D.W. Convolutional Neural Network-Based Digital Image Watermarking Adaptive to the Resolution of Image and Watermark. Appl. Sci. 2020, 10, 6854. [Google Scholar] [CrossRef]
  38. Frattolillo, F. A Watermarking Protocol Based on Blockchain. Appl. Sci. 2020, 10, 7746. [Google Scholar] [CrossRef]
  39. Kazemi, M.F.; Pourmina, M.A.; Mazinan, A.H. Analysis of watermarking framework for color image through a neural network-based approach. Complex Intell. Syst. 2020, 6, 213–220. [Google Scholar] [CrossRef] [Green Version]
  40. Garg, P.; Kishore, R.R. Optimized color image watermarking through watermark strength optimization using particle swarm optimization technique. J. Inf. Optim. Sci. 2020, 41, 1499–1512. [Google Scholar] [CrossRef]
  41. Kavitha, R.S.; Eranna, U.; Giriprasad, M.N. DCT-DWT Based Digital Watermarking and Extraction using Neural Networks. In Proceedings of the 2020 International Conference on Artificial Intelligence and Signal Processing (AISP), Amaravati, India, 10–12 January 2020; pp. 1–5. [Google Scholar] [CrossRef]
  42. Song, M.; Wang, H.; Wu, J.; Yan, X.; Yuan, L.; Tu, Y. A robust watermarking hybrid algorithm for color image. MATEC Web Conf. 2021, 336, 07012. [Google Scholar] [CrossRef]
  43. Begum, M.; Uddin, M.S. Multiple Image Watermarking with Discrete Cosine Transform. J. Comput. Commun. 2021, 9, 88–94. [Google Scholar] [CrossRef]
  44. Evsutin, O.; Meshcheryakov, Y. The Use of the Blockchain Technology and Digital Watermarking to Provide Data Authenticity on a Mining Enterprise. Sensors 2020, 20, 3443. [Google Scholar] [CrossRef]
  45. Ma, Z.; Jiang, M.; Gao, H.; Wang, Z. Blockchain for digital rights management. Future Gener. Comput. Syst. 2018, 89, 746–764. [Google Scholar] [CrossRef]
  46. Pérez Gort, M.L.; Feregrino-Uribe, C.; Cortesi, A.; Fernández-Peña, F. HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data. Expert Syst. Appl. 2019, 138, 112770. [Google Scholar] [CrossRef] [Green Version]
  47. Rani, K.; Sharma, C. Tampering Detection of Distributed Databases using Blockchain Technology. In Proceedings of the 2019 Twelfth International Conference on Contemporary Computing (IC3), Noida, India, 8–10 August 2019; pp. 1–4. [Google Scholar] [CrossRef]
  48. Sahoo, S.; Roshan, R.; Singh, V.; Halder, R. BDmark: A Blockchain-Driven Approach to Big Data Watermarking. In Proceedings of the Intelligent Information and Database Systems, Phuket, Thailand, 23–26 March 2020; Sitek, P., Pietranik, M., Krótkiewicz, M., Srinilta, C., Eds.; Communications in Computer and Information Science. Springer: Singapore, 2020; pp. 71–84. [Google Scholar] [CrossRef]
  49. Abdelhakim, A.M.; Saleh, H.I.; Nassar, A.M. A quality guaranteed robust image watermarking optimization with Artificial Bee Colony. Expert Syst. Appl. 2017, 72, 317–326. [Google Scholar] [CrossRef]
  50. Sejpal, S.; Shah, N. A novel multiple objective optimized color watermarking scheme based on LWT-SVD domain using nature based Bat Algorithm and Firefly algorithm. In Proceedings of the 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), Pune, India, 2–3 December 2016; pp. 38–44. [Google Scholar] [CrossRef]
  51. Sisaudia, V.; Vishwakarma, V.P. Copyright protection using KELM-PSO based multi-spectral image watermarking in DCT domain with local texture information based selection. Multimed. Tools Appl. 2021, 80, 8667–8688. [Google Scholar] [CrossRef]
  52. Maloo, S.; Kumar, M.; Lakshmi, N. A Modified Whale Optimization Algorithm Based Digital Image Watermarking Approach. Sens. Imaging 2020, 21, 26. [Google Scholar] [CrossRef]
  53. Kazemivash, B.; Moghaddam, M.E. A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed. Tools Appl. 2017, 76, 20499–20524. [Google Scholar] [CrossRef]
  54. Ansari, I.A.; Pant, M.; Ahn, C.W. Artificial bee colony optimized robust-reversible image watermarking. Multimed. Tools Appl. 2017, 76, 18001–18025. [Google Scholar] [CrossRef]
  55. Moeinaddini, E. Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm. Soft Comput. 2019, 23, 9685–9699. [Google Scholar] [CrossRef]
  56. Takieldeen, A.E.; El-kenawy, E.-S.M.; Hadwan, M.; Zaki, R.M. Dipper Throated Optimization Algorithm for Unconstrained Function and Feature Selection. Comput. Mater. Contin. 2022, 72, 1465–1481. [Google Scholar] [CrossRef]
  57. Abdelhamid, A.A.; El-Kenawy, E.S.M.; Alotaibi, B.; Amer, G.M.; Abdelkader, M.Y.; Ibrahim, A.; Eid, M.M. Robust Speech Emotion Recognition Using CNN+LSTM Based on Stochastic Fractal Search Optimization Algorithm. IEEE Access 2022, 10, 49265–49284. [Google Scholar] [CrossRef]
  58. Strang, G. The Discrete Cosine Transform. SIAM Rev. 1999, 41, 135–147. [Google Scholar] [CrossRef] [Green Version]
  59. Bruce, L.; Koger, C.; Li, J. Dimensionality reduction of hyperspectral data using discrete wavelet transform feature extraction. IEEE Trans. Geosci. Remote Sens. 2002, 40, 2331–2338. [Google Scholar] [CrossRef]
  60. Reisenhofer, R.; Bosse, S.; Kutyniok, G.; Wiegand, T. A Haar wavelet-based perceptual similarity index for image quality assessment. Signal Process. Image Commun. 2018, 61, 33–43. [Google Scholar] [CrossRef] [Green Version]
  61. El-Kenawy, E.S.M.; Mirjalili, S.; Alassery, F.; Zhang, Y.D.; Eid, M.M.; El-Mashad, S.Y.; Aloyaydi, B.A.; Ibrahim, A.; Abdelhamid, A.A. Novel Meta-Heuristic Algorithm for Feature Selection, Unconstrained Functions and Engineering Problems. IEEE Access 2022, 10, 40536–40555. [Google Scholar] [CrossRef]
  62. Khafaga, D.S.; Alhussan, A.A.; El-Kenawy, E.S.M.; Ibrahim, A.; Eid, M.M.; Abdelhamid, A.A. Solving Optimization Problems of Metamaterial and Double T-Shape Antennas Using Advanced Meta-Heuristics Algorithms. IEEE Access 2022, 10, 74449–74471. [Google Scholar] [CrossRef]
  63. Khafaga, D.S.; El-kenawy, E.-S.M.; Karim, F.K.; Alshetewi, S.; Ibrahim, A.; Abdelhamid, A.A. Optimized Weighted Ensemble Using Dipper Throated Optimization Algorithm in Metamaterial Antenna. Comput. Mater. Contin. 2022, 73, 5771–5788. [Google Scholar] [CrossRef]
  64. Alhussan, A.A.; Khafaga, D.S.; El-Kenawy, E.S.M.; Ibrahim, A.; Eid, M.M.; Abdelhamid, A.A. Pothole and Plain Road Classification Using Adaptive Mutation Dipper Throated Optimization and Transfer Learning for Self Driving Cars. IEEE Access 2022, 10, 84188–84211. [Google Scholar] [CrossRef]
  65. El-Kenawy, E.S.M.; Eid, M.M.; Saber, M.; Ibrahim, A. MbGWO-SFS: Modified Binary Grey Wolf Optimizer Based on Stochastic Fractal Search for Feature Selection. IEEE Access 2020, 8, 107635–107649. [Google Scholar] [CrossRef]
  66. Abdelhakim, A.M.; Saleh, H.I.; Nassar, A.M. Quality metric-based fitness function for robust watermarking optimisation with Bees algorithm. IET Image Process. 2016, 10, 247–252. [Google Scholar] [CrossRef]
  67. Abdelhakim, A.M.; Abdelhakim, M. A time-efficient optimization for robust image watermarking using machine learning. Expert Syst. Appl. 2018, 100, 197–210. [Google Scholar] [CrossRef]
Figure 1. The typical process of watermarking systems.
Figure 1. The typical process of watermarking systems.
Applsci 12 10642 g001
Figure 2. The process of the discrete cosine transform.
Figure 2. The process of the discrete cosine transform.
Applsci 12 10642 g002
Figure 3. The process of two-level decomposition using the discrete wavelet transform.
Figure 3. The process of two-level decomposition using the discrete wavelet transform.
Applsci 12 10642 g003
Figure 4. The detailed steps of the proposed approach.
Figure 4. The detailed steps of the proposed approach.
Applsci 12 10642 g004
Figure 5. The cover images used in the conducted experiments. (a) Lena. (b) Cameraman. (c) Baboon.
Figure 5. The cover images used in the conducted experiments. (a) Lena. (b) Cameraman. (c) Baboon.
Applsci 12 10642 g005
Figure 6. A Monkeypox image was employed as a message to be embedded in the cover image.
Figure 6. A Monkeypox image was employed as a message to be embedded in the cover image.
Applsci 12 10642 g006
Figure 7. The residual, homoscedasticity, and QQ plots of the results achieved by using the pro- posed approach.
Figure 7. The residual, homoscedasticity, and QQ plots of the results achieved by using the pro- posed approach.
Applsci 12 10642 g007
Figure 8. The residual plot of the competing approaches compared to the proposed DWT+ DCT+DTOSFS.
Figure 8. The residual plot of the competing approaches compared to the proposed DWT+ DCT+DTOSFS.
Applsci 12 10642 g008
Figure 9. The ROC curve of the results achieved with the proposed approach.
Figure 9. The ROC curve of the results achieved with the proposed approach.
Applsci 12 10642 g009
Figure 10. Histogram of the PSNR values achieved with the proposed approach.
Figure 10. Histogram of the PSNR values achieved with the proposed approach.
Applsci 12 10642 g010
Figure 11. The PSNR values achieved by the proposed approach in comparison with the other approaches.
Figure 11. The PSNR values achieved by the proposed approach in comparison with the other approaches.
Applsci 12 10642 g011
Figure 12. The watermarking results achieved by the proposed approach when applied to the Lena image.
Figure 12. The watermarking results achieved by the proposed approach when applied to the Lena image.
Applsci 12 10642 g012
Table 1. Assessment of the results achieved by the proposed approach in comparison with those of the other competing approaches.
Table 1. Assessment of the results achieved by the proposed approach in comparison with those of the other competing approaches.
Lena ImageDFT+SVDDWT+DCTDWT+DCT+SFSDWT+DCT+DTODWT+DCT+DTOSFS
PSNR36.1844.6749.6653.7863.87
NCC0.00480.00370.00370.00250.002
IF−1.51233 × 10 3 −1.3554 × 10 4 −7.7164 × 10 5 −9.9887 × 10 7 −8.6357 × 10 9
Cameraman ImageDFT+SVDDWT+DCTDWT+DCT+SFSDWT+DCT+DTODWT+DCT+DTOSFS
PSNR38.3741.1151.6457.864.68
NCC0.00480.00370.00370.00280.0023
IF−1.99187 × 10 2 −1.8836 × 10 4 −1.249 × 10 5 −2.5738 × 10 7 −9.12257 × 10 10
Baboon ImageDFT+SVDDWT+DCTDWT+DCT+SFSDWT+DCT+DTODWT+DCT+DTOSFS
PSNR31.9733.36642.22551.1765.11
NCC0.00410.00370.00310.00250.0019
IF−0.0071−0.0059−5.9966 × 10 4 −2.7456 × 10 6 −7.2137 × 10 11
Table 2. Statistical analysis of the proposed approach compared to other approaches.
Table 2. Statistical analysis of the proposed approach compared to other approaches.
DFT+SVDDWT+DCTDWT+DCT+SFSDWT+DCT+DTODWT+DCT+DTOSFS
Number of values1010101010
Std. Error of Mean0.21750.61550.21340.23330.07676
Std. Deviation0.68771.9470.67490.73790.2427
25% Percentile36.1844.4249.4153.7866.88
75% Percentile36.4345.4249.6653.7866.88
Minimum35.9841.6747.6651.7866.13
Maximum38.1848.6749.6654.7866.98
Mean36.4644.9749.3653.6866.82
Median36.1844.6749.6653.7866.88
Range2.27230.85
Sum364.6449.7493.6536.8668.2
Table 3. Evaluation of the ANOVA test based on the recorded results.
Table 3. Evaluation of the ANOVA test based on the recorded results.
ANOVASSDFMSF (DFn, DFd)p Value
Treatment (between columns)414441036F (4, 45) = 984.5p < 0.0001
Residual (within columns)47.36451.052
Total419249
Table 4. Evaluation of the Wilcoxon signed rank test based on the recorded results.
Table 4. Evaluation of the Wilcoxon signed rank test based on the recorded results.
DFT+SVDDWT+DCTDWT+DCT+SFSDWT+DCT+DTODWT+DCT+DTOSFS
Theoretical median00000
Actual median36.1844.6749.6653.7863.87
Number of values1010101010
Wilcoxon Signed Rank Test
Sum of signed ranks (W)5555555555
Sum of positive ranks5555555555
Sum of negative ranks00000
P value (two-tailed)0.0020.0020.0020.0020.002
Exact or estimate?ExactExactExactExactExact
P-value summary-----
Significant (alpha = 0.05)?YesYesYesYesYes
How big is the discrepancy?
Discrepancy36.1844.6749.6653.7863.87
Table 5. The regression test between the proposed watermarking method and each one of the other competing watermarking methods.
Table 5. The regression test between the proposed watermarking method and each one of the other competing watermarking methods.
DFT+SVDDWT+DCTDWT+DCT+SFSDWT+DCT+DTO
Best-fit values
Slope80−144.4−77.78−211.1
X-intercept63.4264.1864.5164.13
Y-intercept−50739271501713,538
1/slope0.0125−0.006923−0.01286−0.004737
Slope71.49211.570.2735.14
Std. Error
Y-intercept456613,51244882244
95% Confidence Intervals
X-intercept−infinity to 63.7263.94 to +infinity64.08 to +infinity64.05 to 64.28
Y-intercept−15,603 to 5457−21,888 to 40,429−5333 to 15,3678362 to 18,713
Goodness of Fit
R square0.13530.055070.13280.8186
Sy.x0.67822.0070.66670.3333
Is the slope significantly non-zero?
F1.2520.46621.22536.1
DFn, DFd1, 81, 81, 81, 8
P value0.0029560.005140.0030050.0003
Deviation from zero?SignificantSignificantSignificantSignificant
EquationY = 80.00*X − 5073Y = −144.4*X + 9271Y = −77.78*X + 5017Y = −211.1*X + 13,538
Data
Number of X values10101010
Maximum number of Y replicates1111
Total number of values10101010
Number of missing values0000
Table 6. Analysis of the area under the curve (AUC) of the results achieved with the proposed approach in comparison with the other approaches.
Table 6. Analysis of the area under the curve (AUC) of the results achieved with the proposed approach in comparison with the other approaches.
AUCDFT+SVDDWT+DCTDWT+DCT+SFSDWT+DCT+DTO
Baseline0000
Total Area0.36780.44390.49050.5284
Total Peak Area0.36780.44390.49050.5284
Number of Peaks1111
Peak 1
Peak X63.8863.8763.8763.87
Peak Y37.1845.1149.4453.89
First X63.8763.8763.8763.87
Last X63.8863.8863.8863.88
Area0.36780.44390.49050.5284
%Area100100100100
Table 7. Comparison of the NC and SSIM values under various attacks.
Table 7. Comparison of the NC and SSIM values under various attacks.
AttacksNC (SD)SSIM (SD)
Gaussian Filtering (5 × 5)0.989 (0.002)0.9816 (0.003)
Median Filtering (5 × 5)0.949 (0.013)0.916 (0.0342)
Wiener Filtering (5 × 5)0.921 (0.032)0.899 (0.0513)
Average Filtering (5 × 5)0.886 (0.059)0.813 (0.227)
Table 8. The recovery time of the Monkeypox image in seconds.
Table 8. The recovery time of the Monkeypox image in seconds.
Time (s)Lena ImageCameraman ImageBaboon Image
DFT+SVD456.89499.81375.35
DWT+DCT312.56321.55281.85
DWT+DCT+SFS213.31222.33198.84
DWT+DCT+DTO118.45127.44113.45
DWT+DCT+DTOSFS78.3387.3268.81
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

El-Kenawy, E.-S.M.; Khodadadi, N.; Khoshnaw, A.; Mirjalili, S.; Alhussan, A.A.; Khafaga, D.S.; Ibrahim, A.; Abdelhamid, A.A. Advanced Dipper-Throated Meta-Heuristic Optimization Algorithm for Digital Image Watermarking. Appl. Sci. 2022, 12, 10642. https://doi.org/10.3390/app122010642

AMA Style

El-Kenawy E-SM, Khodadadi N, Khoshnaw A, Mirjalili S, Alhussan AA, Khafaga DS, Ibrahim A, Abdelhamid AA. Advanced Dipper-Throated Meta-Heuristic Optimization Algorithm for Digital Image Watermarking. Applied Sciences. 2022; 12(20):10642. https://doi.org/10.3390/app122010642

Chicago/Turabian Style

El-Kenawy, El-Sayed M., Nima Khodadadi, Ashin Khoshnaw, Seyedali Mirjalili, Amel Ali Alhussan, Doaa Sami Khafaga, Abdelhameed Ibrahim, and Abdelaziz A. Abdelhamid. 2022. "Advanced Dipper-Throated Meta-Heuristic Optimization Algorithm for Digital Image Watermarking" Applied Sciences 12, no. 20: 10642. https://doi.org/10.3390/app122010642

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop