Abstract
Copyright protection for digital multimedia has become a research hotspot in recent years. As an efficient solution, the digital watermarking scheme has emerged at the right moment. In this article, a highly robust and hybrid watermarking method is proposed. The discrete wavelet transform (DWT) and all phase discrete cosine biorthogonal transform (APDCBT) presented in recent years as well as the singular value decomposition (SVD) are adopted in this method to insert and recover the watermark. To enhance the watermark imperceptibility, the direct current (DC) coefficients after block-based APDCBT in high frequency sub-bands (LH and HL) are modified by using the watermark. Compared with the conventional SVD-based watermarking method and another watermarking technique, the watermarked images obtained by the proposed method have higher image quality. In addition, the proposed method achieves high robustness in resisting various image processing attacks.
1. Introduction
With the widespread use of image processing tools, it becomes increasingly easy for ordinary people to obtain images and modify their contents. Copyright authentication for digital images has therefore become a challenging problem. To address this issue, digital watermarking theory has been proposed in recent decades. Generally speaking, digital watermarking schemes can fall into two broad categories according to different application scenarios: robust watermarking and fragile watermarking [1]. Robust watermarking techniques can resist most common attacks and consequently are widely used in copyright protection. By contrast, fragile watermarking methods are usually susceptible to any modification and thus are often employed in image tamper detection and restoration. For copyright protection, a robust watermarking scheme should satisfy two basic conditions, namely, robustness and imperceptibility [2]. Here, robustness means that the watermark in a watermarked image can be integrally extracted even when the watermarked image has been distorted by attacks. Imperceptibility means that the quality of the watermarked image cannot be strongly influenced. In other words, no traces of watermark embedding are visible to the naked eyes.
According to the working domain, the watermarking techniques can be further split into two categories. One is the watermarking methods performed in the spatial domain, in which the watermarking bits are inserted into carrier image by modifying its pixel values [3]. The second kind of watermarking methods are based on the transform domain [4,5,6,7]. Compared with the former, the watermarking schemes in the transform domain are more robust because the watermark is embedded by modulating the transform coefficients. Because of this property, many robust watermarking methods performed in the transform domain have been proposed for copyright protection. The most widely used transforms are the discrete cosine transform (DCT) [4], the discrete wavelet transform (DWT) [5], and the discrete Fourier transform (DFT) [6]. In recent years, singular value decomposition (SVD) has received considerable attention in watermarking theory due to its good stability in signal processing. In [7], Liu and Tan introduced a classical SVD-based robust watermarking method. In their method, the watermark is inserted into the carrier image by directly modulating the singular values of the image. However, this method is not secure enough, and the watermark has much influence on the image quality. To resolve this issue, many robust watermarking methods based on hybrid transforms have been proposed, which combine SVD with other transforms, such as DWT and DCT. Lai and Tsai [8] introduced a DWT-SVD-based watermarking algorithm, in which the watermark is inserted by modifying the singular values of high-frequency sub-bands. In [9], another DWT-SVD-based robust watermarking method was proposed by Gupta and Raval. In this scheme, the original image is first decomposed by DWT, and the principal component of the watermark is then superimposed on the singular values of the diagonal high-frequency sub-band (HH). However, experimental results indicate that the extracted watermark has poor image quality when the watermarked image has been attacked. In [10], Singh et al. proposed a hybrid dual watermarking scheme for telemedicine applications. Two watermarks (image and text) are embedded into a radiological image using a DWT-SVD-based watermarking method. During the embedding and extraction processes of the text watermark, four error correction codes (ECCs) are applied to improve the robustness of the watermark. Based on [10], Singh [11] designed an improved hybrid watermarking method. Unlike reference [10], the carrier image and the watermark image are both decomposed using the DWT, DCT, and SVD. Then, the singular value matrix of the watermark information is embedded into the carrier image using an SVD-based method. However, the quality of the watermarked images is greatly affected in these two methods because two watermarks are embedded in each image. In [12], Singh et al. designed another hybrid watermarking method performed in DWT-DCT-SVD domain. The carrier image is firstly decomposed by DWT transform, then the low frequency sub-band (LL) and the watermark image are both transformed by DCT transform. The singular values of the DCT coefficients in watermark image are embedded into the singular values of the DCT coefficients in LL sub-band. To select an appropriate wavelet basis for DWT-DCT-SVD-based robust watermarking, Singh and Tayal [13] studied different wavelet families in DWT transform and analyzed their effects on the performance of hybrid watermarking. The comparison experiments indicate that different wavelets have different impacts on the watermarking scheme, and “the best wavelet” choice is dependent on several factors. To protect the copyright of color images, Roy and Pal [14] proposed a hybrid robust watermarking scheme that combines SVD with the redundant discrete wavelet transform (RDWT). In [15], Laur et al. proposed a robust color image watermarking based on entropy and QR decomposition. The entropy is used to select the image blocks for watermark embedding. After chirp Z-transform, DWT transform, QR decomposition, and SVD transform, the watermark information is finally embedded into the singular values of carrier image.
It is generally known that the scaling factor has a significant effect on SVD-based watermarking algorithms. To select an optimal scaling factor for SVD-based watermarking, Mishra et al. [16] analyzed the effect of different scaling factors on watermark imperceptibility and robustness. Based on the analysis, they proposed an optimized SVD-based watermarking method, in which an optimal scaling factor is identified using an optimization algorithm called the firefly algorithm (FA) [17]. Although this scheme achieves a good balance between robustness and imperceptibility, it can also lead to false-positive problem during the watermark extraction process [18]. To solve this problem, Makbol and Khoo [19] presented a false-positive-free watermarking scheme that combines SVD with the integer wavelet transform (IWT). To prevent false-positive problem, a signature generated from two orthogonal matrices and is inserted into the carrier image along with the watermark. During watermark detection, this signature is firstly extracted, and a certification process is then performed before watermark extraction. To further improve watermark robustness and imperceptibility, Ansari et al. [20] presented an improved robust watermarking algorithm based on [19], in which an optimal scaling factor is selected through artificial bee colony (ABC) optimization. Compared with the previous method, this method achieves promising performance. A blind and robust watermarking method executed in the DWT, SVD, and DCT domains has been proposed in [21]. Two matrices generated from the four most significant bit-planes and the four least significant bit-planes of the watermark are transformed by DCT and inserted into the singular values of the carrier image using a DWT-SVD-based method. Fazli and Moeini [22] also proposed a hybrid DWT-DCT-SVD-based watermarking algorithm. In this method, the original carrier image is average split into four parts. For each part, the DWT and DCT transforms are successively applied, and the first two alternating current (AC) coefficients are used to form a new matrix. Finally, the watermark is embedded into this new matrix using an SVD-based watermarking method. Since these four parts are all embedded by the same watermark, this method has a high robustness to cropping operations.
In this article, a robust watermarking algorithm with high imperceptibility and robustness is proposed, which combines SVD with DWT and all phase discrete cosine biorthogonal transform (APDCBT). The carrier image is first decomposed by DWT, and the vertical and horizontal frequency sub-bands (LH and HL) are selected respectively to embed two identical watermarks. On each sub-band, the block-based APDCBT is performed. Compared with the DCT transform, the APDCBT transform has better energy concentration characteristic, which can provide better protection for the watermark. Because the direct current (DC) coefficients have much larger perceptual capacity than AC coefficients, the DC coefficient of each sub-block is extracted to form a new matrix. Finally, the watermark is embedded into the coefficient matrix by singular value modification in the SVD domain. On the receiving end, the two identical watermarks are extracted from LH and HL sub-bands respectively, and a watermark correction process is applied to further improve the quality of the extracted watermark.
The remainder of this article is organized as follows. In Section 2, APDCBT and SVD transforms are briefly described. The proposed method, including watermark insertion and watermark extraction, is developed in Section 3. Section 4 presents the experimental results and performance analysis. The conclusions and an outlook on possible future work are presented in Section 5.
2. APDCBT and SVD
2.1. APDCBT
It is widely shared that the DCT has good properties of energy concentration. For this reason, it has been broadly applied in image compression and watermarking techniques. However, as research continues, some negative effects have been revealed that the image compressed by DCT has serious block artifacts at low bit rates. To solve this problem, a new transform called APDCBT was presented in [23]. Compared with the conventional DCT transform, the APDCBT transform shows outstanding performance in high-frequency attenuation and low-frequency aggregation. Thanks to these features, the APDCBT gets extensive usage in image processing and watermarking techniques [24,25]. In [25], the APDCBT was first introduced into the field of information hiding, in which the APDCBT was just adopted to replace the DCT in conventional DCT-based robust watermarking method. To make better use of APDCBT, in this article, we introduce a hybrid watermarking method by combining APDCBT with DWT and SVD. In APDCBT transform, a transformation matrix with dimensions of is defined as:
For an image block with dimensions of , the APDCBT can be expressed as follows:
where denotes the transform coefficient matrix after APDCBT.
2.2. SVD
SVD is a common transform that is often used in numerical analysis and principal component analysis (PCA). Through SVD, a matrix can be decomposed into three parts denoted by , , and :
where and are two orthogonal matrices and is a diagonal matrix. The elements in matrix , which are also called singular values, have good stability in signal processing and can resist common attacks to a certain extent. In addition, SVD can be performed on any matrices with no limitation. The top few singular values contain the majority of the image information. Because of these properties, SVD has been widely used in watermarking schemes for copyright authentication.
3. The Proposed Scheme
We present the proposed method based on DWT, APDCBT, and SVD in this section. It involves two stages: watermark insertion and watermark extraction. The concrete steps are introduced in the following subsections.
3.1. Watermark Insertion
Figure 1 depicts the process of watermark insertion, and the detailed steps are presented below:
Figure 1.
Flow diagram of watermark insertion.
Step 1. One-level DWT decomposition with “Haar” wavelet is first performed on the carrier image, yielding four sub-bands: three high-frequency sub-bands (LH, HL, and HH) and a low-frequency sub-band (LL).
Step 2. To reduce the influence of watermark insertion, two high-frequency sub-bands, LH and HL, are selected for the insertion of two identical watermarks. Using the HL sub-band as an example, the block-based APDCBT is applied to each sub-block obtained by dividing the image into 8 × 8 blocks.
Step 3. The DC coefficient of each sub-block is used to generate a new coefficient matrix, denoted by . Then, the SVD is applied to this coefficient matrix, and the singular value matrix of the matrix is computed according to Equation (3).
Step 4. The first watermark is inserted into the coefficient matrix, which is shown as follows:
where is the watermark embedding intensity, Sw is a matrix containing the watermark information, and are newly generated orthogonal matrices, and is the modified singular value matrix after watermark insertion.
Step 5. The inverse SVD is applied to , then we get a modified coefficient matrix . After the inverse APDCBT, the HL sub-band embedded by watermark is obtained.
Step 6. To embed the second watermark , the same process is performed on the LH sub-band.
Step 7. The inverse DWT (IDWT) is applied to obtain the watermarked carrier image.
3.2. Watermark Extraction
The flow diagram of watermark extraction is shown in Figure 2. The extraction process consists of the following steps:
Figure 2.
Flow diagram of watermark extraction.
Step 1. The received image, which might have been distorted by various attacks, is transformed by one-level DWT with “Haar” wavelet. Then, the high-frequency sub-bands, LHw and HLw, are obtained.
Step 2. To extract the watermark in HLw sub-band, the sub-band image is first divided into 8 × 8 non-overlapping sub-blocks. Then, the APDCBT is performed on each sub-block. Subsequently, the DC coefficients in the APDCBT coefficient matrices are used to produce a new matrix .
Step 3. The newly generated matrix is transformed by SVD to obtain three new matrices, , , and , as given in Equation (5):
Step 4. The watermark is computed by applying the inverse process of Step 4 in watermark embedding procedure, which can be expressed as follows:
To obtain another watermark, , the same process is applied to the LHw sub-band. Finally, the watermark is computed by averaging these two watermarks, i.e., . To further improve the quality of the extracted watermark, a sign function used in [22] is employed to correct the watermark:
where is a threshold between 0 and 1, is the extracted watermark after correction, and represents the coordinates of a pixel in watermark image. In the experiments reported below, is set to 0.5.
To better understand the proposed watermarking scheme, the pseudocode forms of the watermark insertion and extraction processes are presented in Algorithms 1 and 2, respectively:
| Algorithm 1 Watermark Insertion |
| Variable Declaration: Lena: carrier image SDUW: watermark image I: read the carrier image : read the watermark images : scaling factor DWT, APDCBT, and SVD: transforms used in the algorithm Wavelet filter: Haar LL, LH, HL, and HH: sub-bands after the first-level DWT decomposition : coefficient matrix formed by DC coefficients in LH or HL sub-band : diagonal matrix for and : orthogonal matrices for : watermarked diagonal matrix : diagonal matrix for and : orthogonal matrices for : watermarked DC coefficient matrix LHw and HLw: the watermarked LH and HL sub-bands : watermarked image Watermark Embedding Procedure: 1. Read the Images and Perform DWT on Carrier Image ILena.bmp (carrier image with size of 512 × 512) SDUW.bmp (watermark image with size of 32 × 32) [LL, LH, HL, HH]DWT (I, ‘Haar’) 2. Perform Block-based APDCBT on HL Sub-band DC coefficientsAPDCBT (HL) 3. Get DC Coefficient Matrix and Perform SVD on // Form a new coefficient matrix using the DC coefficients obtained in Step 2, and perform SVD on coefficient matrix DC coefficients SVD () 4. Watermark Insertion SVD () Watermarked DC coefficients HLwinverse (Watermarked DC coefficients) // Apply Steps 1–4 to LH sub-band to embed the same watermark and obtain the watermarked LHw sub-band 5. Perform IDWT to Get the Watermarked Image inverse DWT (LL, LHw, HLw, HH) |
| Algorithm 2 Watermark Extraction |
| Variable Declaration: : attacked image obtained on the receiving end DWT, APDCBT, and SVD: transforms used in the algorithm Wavelet filter: Haar LL, LHw, HLw, and HH: new sub-bands after the first-level DWT decomposition : coefficient matrix formed by DC coefficients in LHw or HLw sub-band : scaling factor : diagonal matrix for and : orthogonal matrices for : watermarked diagonal matrix and : orthogonal matrices for T: threshold for watermark correction : extracted watermark images : extracted watermark without correction : extracted watermark after correction Watermark Extraction Procedure: 1. Read the Attacked Image and Perform DWT on It Received image.bmp [LL, LHw, HLw, HH]DWT (, ‘Haar’) 2. Perform Block-based APDCBT on HLw Sub-band and Get DC Coefficient Matrix Watermarked DC coefficientsAPDCBT (HLw) Watermarked DC coefficients 3. Perform SVD on SVD () 4. Watermark Extraction // Apply Steps 1-4 to LHw sub-band to extract the second watermark 5. Watermark Correction for i = 1:32 and j = 1:32 if then else end if end for // The extracted watermark after correction is obtained |
4. Performance Analysis
In this section, several experiments are conducted to evaluate the imperceptibility and robustness of the proposed watermarking method. Since the proposed method is implemented in the frequency domain, the watermark information is distributed on the whole image. In this paper, we use the standard test images with size of 512 × 512 as the example to show the algorithm performance. The gray-scale image Lena with dimensions of 512 × 512 is adopted as the carrier image. A binary logo image (SDUW, the abbreviation for Shandong University at Weihai) with dimensions of 32 × 32 is used as the watermark. In watermarking schemes based on SVD, the watermarking intensity plays an important role for the performance of the algorithm. To make better experimental comparisons, the embedding intensity used in these experiments is the same as that used in reference [22], which is equal to 0.05.
4.1. Imperceptibility
The peak signal-to-noise ratio (PSNR) is a common image quality evaluation index used in the field of image processing [26]. For an image with dimensions of 512 × 512, the PSNR is defined as:
where and are the original carrier image and the watermarked image, respectively.
Generally, a higher PSNR implies that the watermark in the watermarked image has better imperceptibility. To evaluate the quality of an extracted watermark, the similarity between the original watermark and the extracted watermark is calculated as the normalized correlation coefficient (NCC). For the experiments reported in this paper, the NCC can be represented as follows:
Figure 3 shows the carrier images and watermarks without performing any attack. It can be observed that there is no subjective visual difference between the original image and its watermarked counterpart. To compare with other watermarking algorithms, Table 1 lists the watermark capacity, PSNR, and NCC of two robust watermarking methods. It should be noted that for comparison, the watermark in [7] is embedded into the top left corner of carrier image. From Table 1, it can be observed that the proposed scheme and the method in reference [22] have higher PSNR values than the method proposed by Liu and Tan [7]. The NCC value of the proposed scheme is slightly lower than reference [7], but it is higher than the recently proposed method in reference [22]. Though there are not too many advantages for the proposed scheme in watermark imperceptibility, the proposed scheme achieves better robustness than references [7] and [22], which could be confirmed by the experiments in next subsection.
Figure 3.
The carrier images and watermarks without performing any attack: (a) original Lena image; (b) binary watermark; (c) watermarked Lena image; (d) extracted watermark.
Table 1.
Comparisons among different robust watermarking methods in terms of watermark capacity, peak signal-to-noise ratio (PSNR), and normalized correlation coefficient (NCC).
4.2. Robustness
To test the robustness of the proposed algorithm, various common signal processing attacks are applied to the watermarked images, such as salt and pepper noise, Gaussian noise, and JPEG compression. Figure 4 shows the attacked images and their corresponding watermarks extracted from them. The results demonstrate that the extracted watermarks obtained using the presented method show good robustness to various attacks. To objectively evaluate the robustness of the proposed method, Table 2 lists the NCC values of the extracted watermarks under different attacks. In addition, we compare the proposed method with a conventional SVD-based watermarking method [7] and a hybrid watermarking method presented in [22]. Considering the randomness of the noise, the NCC values of the extracted watermarks after noise attacks are the average values from multiple experiments. From Table 2, we can see that the NCC values obtained using the proposed method are approximately equal to or even greater than those achieved by other methods under the same attacks. Furthermore, the NCC results are extremely stable under different attack intensities. These results suggest that the proposed method is highly robust compared with the scheme proposed in reference [22].

Figure 4.
Attacked images and the corresponding watermarks extracted from them: (a) salt and pepper noise (0.005); (b) Gaussian noise (0, 0.01); (c) median filtering (5 × 5); (d) average filtering (3 × 3); (e) rotation (15°); (f) JPEG compression with quality factor (QF) equal to 20; (g) cropping (25%); (h) scaling (2, 0.5); (i) contrast enhancement (1.5); (j) brightness adjustment (+50).
Table 2.
NCC values of the extracted watermarks under different attacks.
JPEG compression is widely adopted in image transmission and storage. To test the properties of the proposed algorithm under JPEG compression, the watermarked images are compressed by JPEG compression with different QFs. Figure 5 presents the curves of the NCC values under JPEG compression with different QFs. The experimental results show that the proposed scheme has higher NCC values than the other two methods. Besides, it can also be noticed from the figure that the NCC values obtained by the proposed scheme and reference [22] are more stable than those of Liu and Tan’s method [7]. The reason is that the reference [7] is a pure SVD-based watermarking scheme, while the proposed scheme and reference [22] are based on hybrid transforms. Compared to the former, the hybrid transform based watermarking schemes have better robustness for JPEG compression with different QFs. When the watermarked images in [7] are highly compressed by JPEG compression (with low QFs), the watermark information will be destroyed more easily than the other two methods. In conclusion, the data in Figure 5 prove that our proposed algorithm exhibits better robustness against JPEG compression than the other methods.
Figure 5.
NCC values under JPEG compression with different QFs.
However, in practical applications, images are always vulnerable to more than one kind of attack. Moreover, digital images need to be preprocessed to reduce the bandwidth and memory required for the transmission and storage. To test the robustness of the proposed method under hybrid attacks, Figure 6 shows watermarked images subjected to hybrid signal processing attacks and their corresponding extracted watermarks. Table 3 gives the NCC values of the watermarks extracted under different conditions. It is observed that our proposed scheme achieves promising results compared with those of Fazli and Moeini’s method [22]. The watermarks could be extracted without much degradation. Based on the above comparisons and analysis, we conclude that the proposed watermarking algorithm shows superior robustness in resisting various signal processing attacks.

Figure 6.
Images subjected to hybrid attacks and their corresponding watermarks: (a) Gaussian noise (0, 0.01) + median filtering (3 × 3); (b) Gaussian noise (0, 0.01) + average filtering (3 × 3); (c) salt and pepper noise (0.01) + median filtering (3 × 3); (d) salt and pepper noise (0.01) + average filtering (3 × 3); (e) scaling (2, 0.5) + JPEG compression (QF = 50); (f) scaling (0.5, 2) + JPEG compression (QF = 50); (g) JPEG compression (QF = 50) + cropping (25%); (h) median filtering (3 × 3) + JPEG compression (QF = 50); (i) average filtering (3 × 3) + JPEG compression (QF = 50); (j) salt and pepper noise (0.01) + Gaussian noise (0, 0.01).
Table 3.
NCC values of the watermarks extracted after hybrid attacks.
5. Conclusions
In this article, we have presented a highly robust watermarking algorithm, in which the APDCBT is introduced into the hybrid watermarking technique by combining with DWT and SVD. To make a good use of the low-frequency aggregation property of APDCBT and reduce the influence of watermark embedding, the DC coefficients of each sub-block in HL and LH sub-bands are used as the embedding locations. Experimental comparisons suggest that the proposed scheme has little perceptible effect on the original image, and it exhibits better robustness against typical signal processing attacks than other algorithms. However, the proposed scheme is subjected to the false-positive problem, which remains unsolved in this paper. In the future work, we will address this issue and apply the proposed method to color images.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 61702303, No. 61201371); the Natural Science Foundation of Shandong Province, China (No. ZR2017MF020, No. ZR2015PF004); and the Research Award Fund for Outstanding Young and Middle-Aged Scientists of Shandong Province, China (No. BS2013DX022).
Author Contributions
Xiao Zhou and Heng Zhang conceived the algorithm and designed the experiments; Heng Zhang and Chengyou Wang performed the experiments; Chengyou Wang and Xiao Zhou analyzed the results; Heng Zhang drafted the manuscript; Xiao Zhou and Heng Zhang revised the manuscript. All authors read and approved the final manuscript.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Verma, V.; Singh, M.J. Digital image watermarking techniques: A comparative study. Int. J. Adv. Electr. Electron. Eng. 2013, 2, 173–184. [Google Scholar]
- Hai, T.; Li, C.M.; Zain, J.M.; Abdalla, A.N. Robust image watermarking theories and techniques: A review. J. Appl. Res. Technol. 2014, 12, 122–138. [Google Scholar]
- Qin, C.; Ji, P.; Wang, J.W.; Chang, C.C. Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed. Tools Appl. 2017, 76, 2267–2287. [Google Scholar] [CrossRef]
- Das, C.; Panigrahi, S.; Sharma, V.K.; Mahapatra, K.K. A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int. J. Electron. Commun. 2014, 68, 244–253. [Google Scholar] [CrossRef]
- He, Z.F.; Zhang, Y.H. Fusion on the wavelet coefficients scale-related for double encryption holographic halftone watermark hidden technology. IEICE Trans. Inf. Syst. 2015, E98-D, 1391–1395. [Google Scholar] [CrossRef]
- Hu, Y.P.; Wang, Z.J.; Liu, H.; Guo, G.J. A geometric distortion resilient image watermark algorithm based on DWT-DFT. J. Softw. 2011, 6, 1805–1812. [Google Scholar] [CrossRef]
- Liu, R.Z.; Tan, T.N. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 2002, 4, 121–128. [Google Scholar]
- Lai, C.C.; Tsai, C.C. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 2010, 59, 3060–3063. [Google Scholar] [CrossRef]
- Gupta, A.K.; Raval, M.S. A robust and secure watermarking scheme based on singular values replacement. Sadhana 2012, 37, 425–440. [Google Scholar] [CrossRef]
- Singh, A.K.; Kumar, B.; Dave, M.; Mohan, A. Robust and imperceptible dual watermarking for telemedicine applications. Wirel. Pers. Commun. 2015, 80, 1415–1433. [Google Scholar] [CrossRef]
- Singh, A.K. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 2017, 76, 8881–8900. [Google Scholar] [CrossRef]
- Singh, A.K.; Dave, M.; Mohan, A. Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain. Natl. Acad. Sci. Lett. 2014, 37, 351–358. [Google Scholar] [CrossRef]
- Singh, A.; Tayal, A. Choice of wavelet from wavelet families for DWT-DCT-SVD image watermarking. Int. J. Comput. Appl. 2012, 48, 9–14. [Google Scholar] [CrossRef]
- Roy, S.; Pal, A.K. An SVD based location specific robust color image watermarking scheme using RDWT and Arnold Scrambling. Wirel. Pers. Commun. 2018, 98, 2223–2250. [Google Scholar] [CrossRef]
- Laur, L.; Rasti, P.; Agoyi, M.; Anbarjafari, G. A robust color image watermarking scheme using entropy and QR decomposition. Radioengineering 2015, 24, 1025–1032. [Google Scholar] [CrossRef]
- Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
- Yang, X.S. Multiobjective firefly algorithm for continuous optimization. Eng. Comput. 2013, 29, 175–184. [Google Scholar] [CrossRef]
- Ali, M.; Ahn, C.W. Comments on “Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm”. Expert Syst. Appl. 2015, 42, 2392–2394. [Google Scholar] [CrossRef]
- Makbol, N.M.; Khoo, B.E. A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit. Signal Process. 2014, 33, 134–147. [Google Scholar] [CrossRef]
- Ansari, I.A.; Pant, M.; Ahn, C.W. Robust and false positive free watermarking in IWT domain using SVD and ABC. Eng. Appl. Artif. Intell. 2016, 49, 114–125. [Google Scholar] [CrossRef]
- Singh, D.; Singh, S.K. DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed. Tools Appl. 2017, 76, 13001–13024. [Google Scholar] [CrossRef]
- Fazli, S.; Moeini, M. A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 2016, 127, 964–972. [Google Scholar] [CrossRef]
- Hou, Z.X.; Wang, C.Y.; Yang, A.P. All phase biorthogonal transform and its application in JPEG-like image compression. Signal Process. Image Commun. 2009, 24, 791–802. [Google Scholar] [CrossRef]
- Wang, C.Y.; Jiang, B.C.; Xie, S.Z. Properties of all phase biorthogonal transform matrix and its application in color image compression. J. Comput. Inf. Syst. 2013, 9, 7227–7234. [Google Scholar]
- Yang, F.F.; Wang, C.Y.; Huang, W.; Zhou, X. Embedding binary image watermark in DC components of all phase discrete cosine biorthogonal transform. Int. J. Secur. Appl. 2015, 9, 125–136. [Google Scholar] [CrossRef]
- Khalifa, O.O.; Yusof, Y.B.; Olanrewaju, R.F. Performance evaluations of digital watermarking systems. In Proceedings of the 8th IEEE Conference on Information Science and Digital Content Technology, Jeju Island, Korea, 26–28 June 2012; pp. 533–536. [Google Scholar]
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).