A Watermarking Scheme for Color Image Using Quaternion Discrete Fourier Transform and Tensor Decomposition

: To protect the copyright of the color image, a color image watermarking scheme based on quaternion discrete Fourier transform (QDFT) and tensor decomposition (TD) is presented. Speciﬁcally, the cover image is partitioned into non-overlapping blocks, and then QDFT is performed on each image block. Then, the three imaginary frequency components of QDFT are used to construct a third-order tensor. The third-order tensor is decomposed by Tucker decomposition and generates a core tensor. Finally, an improved odd–even quantization technique is employed to embed a watermark in the core tensor. Moreover, pseudo-Zernike moments and multiple output least squares support vector regression (MLS–SVR) network model are used for geometric distortion correction in the watermark extraction stage. The scheme utilizes the inherent correlations among the three RGB channels of a color image, and spreads the watermark into the three channels. The experimental results indicate that the proposed scheme has better ﬁdelity and stronger robustness for common image-processing and geometric attacks, can effectively resist each color channel exchange attack. Compared with the existing schemes, the presented scheme achieves better performance.


Introduction
The modification of digital multimedia content has become easier, especially in terms of images, and thus the issue of image copyright protection has attracted more attention. Accordingly, image watermarking technology aims at providing a reliable way to alleviate this problem related to the intellectual management. The robust watermarking method can protect copyright of the image, and have two basic characteristics, namely, robustness and fidelity. Since these two characteristics are contradictory, a good robust watermarking method can balance the relationship between robustness and fidelity.
The robust watermarking technology is divided into the spatial and the frequency domain. Compared with the spatial domain, the frequency domain watermarking-based watermarking method can obtain much more watermarking robustness without a great amount of image distortion. Therefore, the present study focuses on the image watermarking schemes in the frequency domain.
Guan et al. [10] proposed a watermarking method that embedded a watermark into the two-level DCT coefficients using a specified technology. Li et al. [11] developed a robust watermarking scheme based on the wavelet domain. Due to the fact that the above two methods are single transform that have deficiencies without using inherent correlations in the frequency domain, hybrid transform watermarking schemes achieve better robustness and fidelity-many image-watermarking techniques combining several transform methods have been proposed [12][13][14]. In [12], a new method was presented, to hybrid SVD and integer wavelet transform to embed a watermark. Rastegar et al. [13] proposed a mixed watermarking method based on SVD and FRAT. Lai and Tsai [14] suggested a new image-watermarking method that blended a discrete wavelet transform and singular value decomposition. The method embedded a watermark on singular value of the host image's DWT sub-bands.
From the above discussion, most image watermarking methods have been proposed to embed a watermark in a gray image or a channel. With the wide application of color images, the watermarking schemes for color images can be proposed [2,6,8,[15][16][17][18][19][20][21]. Chou and Liu [2] proposed a new color-image watermarking algorithm based on wavelet transform and significant difference, and embedded the maximum watermark information under imperceptible distortion. Chen et al. [6] modulated at least one component of QDFT coefficients, and propagated the watermark to two or three RGB color channels. They used the characteristics of QDFT to avoid watermark energy loss. A color image-watermarking algorithm mingling with QDFT, LS-SVM and pseudo-Zernike moments has been proposed by Wang et al. [8]. In [8], quaternion Fourier transform allows watermark information energy to be propagated to all channels simultaneously to improve the robustness. Ma et al. [15] developed a local quaternion Fourier transform for the color image-watermarking method. The method used deeds of quaternion Fourier transform to improve watermark invisibility, and considered an invariant feature transform to resist the geometric attacks of the image. Kais Rouis et al. [16] proposed a method for image tampering detection, that has an underlying hashing process based on estimation of image gradient, and the performance of the method was compared to the use of QDFT method. Yang et al. [17] introduced a robust digital watermarking algorithm for geometric correction using quaternion Exponential moments. Li et al. [18] developed a color image-watermarking method based on QDFT and quaternion QR. The host image was decomposed by QDFT and quaternion QR, and a high-entropy block of the scalar part of the quaternion QR matrix was selected to embed the watermark.
Over the last decade, various image-watermarking schemes based on tensor decomposition have been proposed [19][20][21]. Tensor decomposition can maintain the internal structure of the digital image and avoids the loss of important image information. Xu et al. [19] pointed out a new blind watermarking scheme for color images based on the tensor domain. The scheme effectively considers the overall characteristics of color images, and propagates the watermark information to the three channels of the color image through tensor decomposition. Feng et al. [20] used Tucker decomposition to decompose the luminance component, and then used adaptive dot matrix quantization index modulation to embed the watermark in the tensor domain. Fang et al. [21] offered a watermarking scheme based on Tucker decomposition, and this method transformed the multi-spectral image and embedded the watermark into the element of the last frontal slice of the core tensor.
From the above methods, some embed a watermark in single transform domain [6,8,15,17,19,20]. Besides, in [2], the methods did not take efficient account of the correlation of frequency components. In [18], the scheme chose the high entropy block to embed a watermark, the block is unstable, which makes the watermark more vulnerable to attack. In a word, none of these methods takes full advantage of the three-dimensional (3D) imaginary components of QDFT and the above methods suffer from watermark energy loss [6].
Based on [18,19], the present paper proposes a hybrid transform color image watermarking scheme based on QDFT and tensor decomposition. The scheme considers the overall color image channels to improve attack resistance and decentralizes the distribution of the watermark further, and then enhances robustness. Furthermore, an appropriate strength is used to embed the watermark that satisfies the two conflicting factors, robustness and fidelity. The main contributions of the paper are as follows: • This paper blends QDFT with tensor decomposition (TD) and implements overall processing for a color image to embed a watermark. • The scheme proposed in this paper synchronously spreads the watermark to three RGB channels and enhances robustness performance. • This paper proves the correlation of three imaginary components of QDFT, using the QDFT's components to structure a tensor.
The rest of this paper is arranged below. The relevant techniques are described in Section 2. The embedding and extraction processes of watermarking are provided in Section 3. The experimental part is provided in Section 4. Finally, the paper is summarized in Section 5.

Relevant Techniques
In this section, tensor decomposition, quaternion discrete Fourier transform, pseudo-Zernike moments, and multiple output LS-SVR are introduced.

Tensor Decomposition (TD)
Due to application requirements of high-order data, tensor decomposition (TD) is used as a tool to analyse high-order data. TD is a high-order extension of matrix decomposition in multi-linear algebra, and is an efficient technique used in many fields [22,23]. CANDECOMP/PARAFAC (CP) and Tucker decomposition are two particular ways to implement tensor decomposition; the well-known Tucker decomposition is always selected to implement TD.
Tucker decomposition can be considered to be higher-order extensions of the matrix singular value decomposition (SVD). The Tucker decomposition was introduced by Tucker [24] and has been successfully applied to data dimensional reduction, feature extraction, tensor subspace learning, face image recognition [25], data compression, image quality evaluation [26], noise reduction [27], and data analysis [28]. In the present paper, Tucker decomposition is used to construct a watermark embedding domain.
A third-order tensor T ∈ R M×N×O is decomposed by Tucker decomposition, there will be obtained three orthogonal factor matrices U 1 ∈ R M×P , U 2 ∈ R N×Q , U 3 ∈ R O×R , and a core tensor K ∈ R P×Q×R [24]. Figure 1 shows Tucker decomposition of a third-order tensor T. Each element in the core tensor K represents the degree of interaction between different slices. The Tucker decomposition [22] is defined in Equation (1). (1) For each element of the original tensor T, the Tucker decomposition [22] is expressed in Equation (2).
where P, Q, and R correspond to the number of column vectors of the factor matrices U 1 , U 2 , and U 3 , respectively. P, Q, and R are generally less than or equal to M, N, and O, respectively. The symbol '•' represents outer product between two vectors. where the symbol '[[ ]]' is a concise representation of Tucker decomposition given in [22]. The core tensor K has the same dimension as tensor T, and it is expressed in Equation (3).
K has full orthogonality, that is, any two slices of the core tensor K are orthogonal to each other, and the inner product between the two slices are zero.

Quaternion Discrete Fourier Transform (QDFT)
Quaternion was introduced by Hamilton [29], and was a generalization of a complex number. Quaternion [30] was regarded as a kind of hyper-complex, which can be represented by a four-dimensional complex number with one real part and three imaginary parts, and is defined as follows: where α, β, γ, and δ are real numbers, i, j, and k are imaginary operators with the following properties: where the '·' is the cross product, i · j = k, j · k = i, k · i = j, j · i = −k, k · j = −i, i · k = −j. Sangwine [30] was the first to demonstrate formulations of quaternion discrete Fourier transform (QDFT). Considering that QDFT does not satisfy the commutative law, QDFT is divided into three types, namely, left-way transform F L , right-way transform F R [8], and hybrid transform F LR [30]. The form of the left-way transform F L (λ, υ) is as follows: where f (x, y) is a color image of size X × Y represented in the quaternion form as Equation (8).
The inverse QDFT (IQDFT) [8] is defined by, In these definitions, the quaternion operator was generalized, and θ is any unit of pure quaternion, where θ 2 = −1. The operators i, j, and k are special cases of θ; in this paper, Color image pixels have three components, R, G, and B. Thus, they can be represented in quaternion form using a pure quaternion. For example, the coordinates of a pixel is (x, y) in a color-image can be represented as follows: f (x, y) = R(x, y)i + G(x, y)j + B(x, y)k.
where R(x, y) is the red component, and G(x, y) and B(x, y) are the green and blue components of a color image, respectively.
the inverse QDFT (IQDFT) can be represented as follows: where P IQDFT is the real inverse quaternion discrete Fourier transform of array P, and F −L is the IQDFT.

Pseudo-Zernike Moment
Pseudo-Zernike moments [31] are very effective orthogonal rotation invariant moments and pseudo-Zernike moments are robust image feature descriptors. The moments have several characteristics: (1) Redundancy of information expression is small. Since the basis of the Zernike moment is orthogonal polynomial, the extracted features can be guaranteed to have small correlation and redundancy. (2) Effectiveness of information expression. It has been proven that the set of pseudo-Zernike moments can provide a compact, fixed-length and computation effective representation of the image content, and only a small fixed number of compact pseudo-Zernike moments need to be stored to effectively characterize the image content. (3) Multilevel representation of information. Pseudo-Zernike Moments effectively represent the contour of an image. The low-order moments and middle-order moments of pseudo-Zernike moments describe the overall shape of an image, while the high-order moments describe the details of an image. The pseudo-Zernike moments [32] of order n with repetition m for a 2-d continuous function f (x, y) are expressed as follows: where V * nm (x, y) is a complex conjugate of V nm (x, y) and n is any positive, m is any positive and negative integer such that |m| < n. The variables x and y are such that x 2 + y 2 ≤ 1, p = x 2 + y 2 , µ = tan −1 ( y x ). Pseudo-Zernike polynomials [32] V nm (x, y) of order n with repetitions m are expressed as follows: where j = √ −1. The pseudo-Zernike radial polynomial [32] R nm (x, y) is defined as follows: When f (x, y) is an image size of N × N, the pseudo-Zernike moments [33] are defined as follows: where λ is the number of pixels in an image that are mapped into the unit circle. Figure 2 shows the information expression of pseudo-Zernike moments for an image. It can be seen from the figure that the low-order moments of pseudo-Zernike moments can be used to construct the contour of the image. Considering global geometric distortions, we select six low-order pseudo-Zernike moments Z n,m , including Z 0,0 , Z 2,2 , Z 4,4 , Z 8,8 , Z 9,9 , and Z 11,11 to reflect the global information of a digital image. The pseudo-Zernike moments are calculated as parameters to correct the geometric attack in the process of watermark extraction.

Multiple Output LS-SVR
Xu et al. [34] proposed the MLS-SVR network. Multiple output regression aims to learn the mapping from a multiple input feature space to a multiple output space. Although the standard formula of least squares support vector regression (LS-SVR) has potential practicality, it cannot handle multiple output situations. Multiple independent LS-SVRs are usually trained, thereby ignoring the potential (potentially nonlinear) crosscorrelation between different outputs. To solve this problem, Xu et al. [34] used the multi-task learning method to propose a new machine learning network. The multiple outputs function Ψ(χ) is where χ is the sample, τ is Lagrange multiplier, K(χ, χ j ) is the kernel function, b is parameter of the model, and b ∈ R, m is the number of output parameters, l is the number of b, λ is positive real regularized parameter, λ ∈ R + , Φ( * ) is the replicate matrix function (repmat), B = repmat (A,n) returns an array containing n copies of A in the row and column dimensions. The size of B is size(A)*n when A is a matrix. In our paper, the above-mentioned machine learning model is used for geometric correction. The inputs of this model are six low-order features of Zernike moments [31], and the outputs of this model are parameters of geometric distortion.

Watermarking in Tensor Domain
To enhance the robustness for the color image watermarking scheme, this paper blends QDFT and TD to embed a watermark. QDFT considers the correlation among color image channels. Tensor decomposition fully utilizes the correlation among frequency components, and watermark is scattering on frequency components further by the decomposition, so tensor decomposition improves the robustness of the watermarking scheme. The scheme utilizes the overall characteristics of RGB three channels that provides better embedding performance than single-channel or each channel of a color image, the scheme is more appropriate for color image watermarking.
QDFT can process the three channels of the color image as a whole instead of processing them individually, thus avoiding unnecessary distortion and utilizing the inherent correlations among the three channels of the color image. The three imaginary components C, D, and E also have a strong correlation. Hence, three components can be used to construct a tensor T. Figure 9 shows three imaginary components C, D, and E.
Tucker decomposition can maintain the internal structural relationship of an image. The core tensor obtained by Tucker decomposition represents the main properties of each slice of the original tensor and reflects the correlation among the slices. The core tensor K is a compressed version of the original tensor T. Figure 3 shows the Tucker decomposition flowchart. We can use the method in the article [19] to embed the watermark in the core tensor K, the maximum value of the core tensor is located in the upper-left corner, in the K(1, 1, 1) position, as shown in Figure 3. The position is robust when the image has experienced various attacks. Therefore, we modify the K(1, 1, 1) coefficient to embed the watermark. Then, we show the three slices of the core tensor K, which is shown in Figure 4. The brighter part in Figure 4 corresponds to a larger value of magnitude. It can be clearly seen that K(1, 1, 1) is larger than the other position.
The above content briefly introduces the proposed watermarking scheme in this paper. The rest of this section is arranged as below. This section introduces three contents, including correlation analysis among three imaginary components of QDFT, procedures of watermark embedding, and procedures of watermark extraction.  The part proves the correlation among the imaginary three-dimensional frequency 185 components of QDFT.

186
Based on the analysis of its theory, the relationship of the three-dimensional frequency components is proved. Most images have close correlation among the three channels in RGB color space. The color channels are derived from the same physical model, which determines that images not only have similarity among adjacent pixels, but also have close correlation among the color channels of each pixel [33,34]. Then any channels of the color image, red, green, and blue replaces another channel, such as red, green, and green. We find the reconstructed image is still clear, and no blur distortion occurs. Thus, the research fully shows that color image similarities among adjacent pixels, and the three channels of each pixel have a close correlation. Furthermore, the difference between the two color-channels are almost the same or very close, the results are shown in Figure 5. C, D, and E all have red, green, and blue channels, these are

Correlation Analysis among Components of QDFT
A color-image is decomposed by QDFT to obtain four-dimensional frequency components, including a real component A and three imaginary components C, D, and E. The imaginary three-dimensional frequency components have a strong correlation. The part proves the correlation among the imaginary three-dimensional frequency components of QDFT.
Based on the analysis of its theory, the relationship of the three-dimensional frequency components is proved. Most images have close correlation among the three channels in the RGB color space. The color channels are derived from the same physical model, which determines that images not only have similarity among adjacent pixels, but also have close correlation among the color channels of each pixel [35,36]. Then, any channels of the color image, red, green, and blue, replaces another channel, such as red, green, and green. We find the reconstructed image is still clear, and no blur distortion occurs. Thus, the research fully shows that color image similarities among adjacent pixels, and the three channels of each pixel have a close correlation. Furthermore, the difference between the two color-channels are almost the same or very close, the results are shown in Figure 5. C, D, and E all have red, green, and blue channels, these are combined by different coefficients. We substitute Equation (8) into Equation (6) as follows: where Θ(a + bi) = a, I(a + bi) = b, and i, j, and k are all orthogonal to each other. On the other hand, the correlation of the three-dimensional imaginary components is proved by data distribution characteristics. We randomly select image block I r of size 16 × 16 in Lena, Table 1 shows the statistical characteristics of the RGB color space and QDFT frequency space for I r . Then, QDFT transformation operates on the image block I r .
The distribution of C, D, and E are similar, the results are shown in Figure 6. The C(:, r) is the r column value of C component, D(:, r) is r column value of D component, and E(:, r) is r column value of E component, where 1 ≤ r ≤ 16. It can be found from Table 1 that the max value of C is 57,738, as shown in Figure 6a, the max value of first column is also 57,738. So similarly, we can analyse D, and E from Table 1. Furthermore, the results point that the correlation among C, D, and E does not change with the different sizes of the image.
From all the above proof, it appears that the three imaginary components C, D, and E have a strong correlation. So, we can construct a tensor using C, D, and E.

Procedures of Watermark Embedding
This part mainly introduces the specific process of embedding. Figure 7 shows a flowchart of watermark embedding. The embedding process of watermark information is as follows.  Figure 7. Flowchart for watermark embedding.
Step1 : Obtain a color-image I o with dimensions of X × Y × 3, and divide the I o into non-overlapping blocks of size 8 × 8 × 3. The numbers of the blocks are X×Y 8×8 . Step2 : Construct a pure quaternion Fourier f (x, y) = R(x, y)i + G(x, y)j + B(x, y)k using RGB channels of the color image block size of 8 × 8 × 3, and perform QDFT on the each block to obtain A(λ, υ), C(λ, υ), D(λ, υ), and E(λ, υ) by Equation (6).
Step6 : Perform inverse logistic mapping on all the core tensor K blocks with the watermark, and then obtain tensor T using Equation (1).
Step8 : Perform inverse QDFT transformation on F (λ, υ) by using Equation (7) to obtain f (x, y) = R (x, y)i + G (x, y)j + B (x, y)k. Finally, construct a watermarked color image using R (x, y), G (x, y), and B (x, y), that is, the three RGB channels with the watermark.

Procedures of Watermark Extraction
This part mainly introduces the specific procedures of watermark extraction, as shown in Figure 8. The extracting process of the watermark is as follows. The watermarked image is geometrically rectified before the watermark is extracted. The technique of geometric correction can improve the watermark correct extraction rate, as shown in Table 8.
Step1 : Obtain the Zernike moment of the watermarked image I w with size X × Y × 3, the six-order features of Zernike moments as the input of trained machine learning network MLS-SVR to correct geometric distortion, and the corrected watermarked image I w is obtained.
Step2 : Divide the corrected watermarking image I w into blocks, with a block size of 8 × 8 × 3, the numbers of the blocks are X×Y 8×8 . Step3 : Construct a pure quaternion f w (x, y) = R w (x, y)i + G w (x, y)j + B w (x, y)k using the three RGB channels of the color image block. We can obtain a real component A w (λ, υ) and three imaginary components C w (λ, υ), D w (λ, υ), and E w (λ, υ) of each color block by QDFT. Step4 : Construct a third-order tensor T w with dimensions of 8 × 8 × 3 using C w (λ, υ), D w (λ, υ), and E w (λ, υ) of each color block.
Step5 : Operate Tucker decomposition on T w and then the core tensor K w is obtained.
Step7 : Obtain complete watermark w e through the odd-even quantization rule.

Experimental Results and Discussions
This paper uses the peak signal to noise ratio (PSNR) [37], normalized correlation coefficient (NC) [9], and bit error rate (BER) [19] to evaluate the visibility and robustness of the watermarking scheme. PSNR is used to describe the fidelity performance, and NC is used to describe the watermarking robustness. MSE [19] is the mean square error of the data, which is expressed below: The PSNR is defined as follows: where I o (x, y) is the host image, I w (x, y) is the watermarked image. In addition, the bit error rate (BER) and normalized correlation (NC) are used to evaluate the performance in terms of the watermark's robustness, BER and NC are defined as follows: where w 0 (h, g) is the original watermark, w e (h, g) is the extraction watermark. w(h, g) is a watermark of size H × G. This section illustrates the performance of the scheme through a series of experiments, and only representative experimental results are given herein. The five parts include the QDFT transform and inverse QDFT transform, the geometric expression of pseudo-Zernike, optimal watermark strength, comparing the scheme with the existing schemes, and the forecasting performance of the MLS-SVR network.

QDFT Analysis
A color image can be transformed into four real numbers A, C, D, and E using a QDFT real transform. Figure 9 shows the 24 bit color image and its red, green, and blue channels. The results of the 24 bit color image that was operated by quanternion discrete Fourier transform are shown in Figure 10.

Original image
Red channel Green channel Blue channel After inverse QDFT transform using Equation (7), A IQDFT is negligible and can be approximately regarded as 0, this result also conforms to Equation (8). When the input is a pure quaternion, the result of IQDFT can also be approximately regarded as a pure quaternion. When reconstructing the image, C IQDFT , D IQDFT , and E IQDFT are as red R , green G , and blue B channels, respectively. The experiment verifies that the difference between the reconstructed image and original image is approximately 10 −10 . The difference is very small, thus allowing the image to be almost completely restored. The reconstituting red channel R , green channel G , and blue channel B are shown in Figure 11.
A IQDFT R G B Figure 11. The IQDFT results of the real component A IQDFT , red channel R , green channel G , and blue channel B .

Geometric Characteristics of Pseudo-Zernike Moments
An image I with size 512 × 512 is selected to obtain the Zernike moment feature [31]. The two parameters n and m of pseudo-Zernike moments, are in the order of an orthogonal polynomial. The values of (n, m) are (0, 0), (2,2), (4,4), (8,8), (9,9), and (11,11). Three kinds of attacks are performed on the image I, including translation, scaling, and rotation. Specifically, five pseudo-Zernike moment features of images are shown in Figure 12, including the original image I o , the image shift twenty pixels to the left I 20 , a two-times magnified image I 2 , rotating the image thirty degrees counter-clockwise I −30 , and rotating the image thirty degrees clockwise I 30 .
When the image is subjected to different geometric attacks, the differences in pseudo-Zernike moments are relatively obvious. Hence, pseudo-Zernike moments can remarkably represent the global geometric features of the image. After inverse QDFT transform using Equation (7) reconstituting red channel R , green channel G , and blue channel B are shown in Figure   275 11. Test image Distribution of pseudo-Zernike moments  To balance the robustness and fidelity, the part discusses the embedding strength Q. 290 We set the watermark embedding strength Q ∈ (10, 1, 500).

Choose Watermark Embedding Strength
To balance the robustness and fidelity, the part discusses the embedding strength Q. We set the watermark embedding strength Q ∈ (10, 1, 500). Figure 13 shows that the value of Q is increasing, PSNR is decreasing, and NC is increasing, indicating that the robustness of the watermark is improved, whereas the image quality is deteriorated. When the value of Q reaches 410, NC is close to 1, and the watermark can be completely extracted without being attacked. To balance robustness and fidelity, Q = 1160 and PSNR = 40.413. Figure 14 shows the PSNR of the eight watermarked images, consisting of "Lena", "Castle", "Baboon", "Barbara", "Boats", "Fruit", "Airplane", "Houses", and a watermark w 0 .
It can be seen from the Figure 14 that PSNR is larger than 40, which indicates our scheme has better fidelity.   Figure 14. PSNR of watermarked images.

Comparison with Existing Schemes
To further describe the performance of the proposed color image watermarking scheme, we compare the proposed with exiting schemes [2,6,8,18,19]. The results are shown in Tables 2-4. Considering that the QDFT and TD hybrid transform allow the watermark energy to propagate synchronously in the three color image channels, when a channel is replaced by another channel of a color image, the watermark can still be extracted. Hence, we test the effect of re-composition for RGB channels, which is regarded as a special attack in this paper. The specific experimental results are shown in Table 5. Beyond that, this part also conducts an attack experiment, attack types including noise, filter, geometric, compression processing, and blur attack. Our scheme has many types of anti-attack and has strong anti-attack ability. The proposed scheme is very robust against noise, filtering, compression processing, blurring, and geometric attacks, and effectively resists each color channel exchange attack. Table 2. Comparison of proposed scheme with existing schemes in the field of imperceptibility.

Forecasting Performance of MLS-SVR
To train the MLS-SVR model, we use the six-order features of pseudo-Zernike moments as the input parameters [38,39], and the scaling, rotation, and translation parameters of the image subjected to geometric attack as output parameters. This experiment includes 114 training and 30 test samples. The training prediction errors of scaling, rotation, and translation are 0.0069, 0.0052, and 0.0066, respectively. Table 6 shows pseudo-Zernike moments of five random images from training samples. The forecasting results of MLS-SVR are shown in Table 7. The experimental results show that the prediction accuracy of the MLS-SVR network remains relatively high. The corrected watermark image can improve the accuracy of watermark extraction. When the watermarked image is subjected to rotation, translation, and scaling attacks with correction, the watermark extraction bit error rate is shown in Table 8. It can be seen from Table 8 that BER is very small, which indicates the watermark can be be almost completely extracted after correction.

Conclusions
In this paper, we propose a color image watermarking scheme based on QDFT and TD. In our scheme, the watermark is not embedded directly on the QDFT coefficients but rather on the element of the TD domain. The scheme fully considers the overall characteristics of a color image, and fully utilizes the correlation of QDFT components to the structure tensor. The hybrid QDFT and TD transform provides better performance than a single transform, has better fidelity, and is more appropriate for color images. The hybrid transform allows the watermark energy to propagate synchronously to the three RGB channels rather than one channel. Hence, the robustness of the watermarking scheme can be greatly improved, and higher-precision color image information can be maintained. Beyond that, this paper uses the MLS-SVR network and pesudo-Zernike moment features to rectify geometric attacks for improving the accuracy of extraction. Moreover, after analyzing the characteristics of the rounding operation, this paper provides an improved odd-even quantization embedding rule, which improves the accuracy of watermark extraction. Our scheme is resistant to a specific attack-when a channel is substituted by other channels, the watermark can be almost completely extracted. However, the paper divides RGB channels into 8 × 8 × 3 blocks, which cannot resist a cropping attack. Image processing [40,41] could affect the accuracy of watermark extraction.
In future work, we hope that the scheme can be resistant to cropping attack and use fuzzy image preproccessing to further improve accuracy.  Acknowledgments: Thank you to the reviewers who reviewed this paper and the MDPI editor who edited it professionally.

Conflicts of Interest:
The authors declare no conflict of interest.

Abbreviations
The following abbreviations are used in this manuscript: