Next Article in Journal
Analytic Design of on-Chip Spiral Inductor with Variable Line Width
Next Article in Special Issue
Position Distribution Matters: A Graph-Based Binary Function Similarity Analysis Method
Previous Article in Journal
SV-FPN: Small Object Feature Enhancement and Variance-Guided RoI Fusion for Feature Pyramid Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images

1
College of Information and Control Engineering, Jilin Institute of Chemical Technology, Jilin 132012, China
2
School of Automation Engineering, Northeast Electric Power University, Jilin 132012, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(13), 2027; https://doi.org/10.3390/electronics11132027
Submission received: 24 May 2022 / Revised: 23 June 2022 / Accepted: 26 June 2022 / Published: 28 June 2022
(This article belongs to the Special Issue AI in Cybersecurity)

Abstract

:
Image watermarking is a key technology for copyright protection, and how to better balance the invisibility and robustness of algorithms is a challenge. To tackle this challenge, a watermarking optimization method based on matrix decomposition and discrete wavelet transform (DWT) for multi-size images is proposed. The DWT, Hessenberg matrix decomposition (HMD), singular value decomposition (SVD), particle swarm optimization (PSO), Arnold transform and logistic mapping are combined for the first time to achieve an image watermarking optimization algorithm. The multi-level decomposition of DWT is used to be adapted to multi-size host images, the Arnold transform, logistic mapping, HMD and SVD are used to enhance the security and robustness, and the PSO optimized scaling factor to balance invisibility and robustness. The simulation results of the proposed method show that the PSNRs are higher than 44.9 dB without attacks and the NCs are higher than 0.98 under various attacks. Compared with the existing works, the proposed method shows high robustness against various attacks, such as noise, filtering and JPEG compression and in particular, the NC values are at least 0.44% higher than that in noise attacks.

1. Introduction

Digital watermarking technology, as a widely used protection technology, has been applied to protect many areas of multimedia copyrights. The watermarking algorithm should have good invisibility and robustness, thus protecting the watermark from various attacks. Currently, image watermarking algorithms are mainly performed in the transform domain, such as discrete wavelet transform (DWT) [1,2,3] and discrete Fourier transform (DFT) [4,5], as well as discrete cosine transform (DCT) [6,7,8,9] and these are the most commonly used watermarking algorithms. Matrix decomposition is also used in watermarking algorithms due to its higher stability [10,11,12]. Watermarking algorithms of singular value decomposition (SVD) decomposition combined with DWT or DCT [13,14,15,16] are one of the widely used methods in image watermarking algorithms.
Digital watermarking is to embed certain information (watermark) that proves copyright into the protected object (host image). Among them, watermarks are pre-designed author information or company logos with fixed sizes, while the host image is more diverse in size. Image watermarking techniques for the watermark and fixed-size host images are usually discussed by scholars. Lai et al. [13] directly embedded the watermark into the singular values of the intermediate frequency band, which was obtained from the DWT decomposition of the host image. The simulation results showed that the method is resistant to various image processing attacks. However, the algorithm required that the size ratio of the host image to the watermark must be 2:1. Advith et al. [14] discussed the color image watermarking algorithm using DWT combined with DFT and SVD. However, the host image and the watermark must be equal in size. Hurrah et al. [17] proposed a double-blind watermarking framework based on DWT, DCT, the Arnold transform, and a new encryption algorithm for the protection of multimedia images. However, the ratio of the host image to the watermarked image in this algorithm must be 4:1. Wang et al. [18] proposed an adaptive image watermarking method based on wavelet transform, SVD, and Wang-Landau sampling method. The effectiveness and significance of the method are shown by the simulation results, although the ratio of the host image to the watermark must be 3:1.
The size of the host image is required to be fixed in these algorithms, which have achieved results in the terms of robustness and invisibility. The algorithm for watermark adaptation to multi-size host images still needs to be further investigated. The workload will be increased to some extent if the ratio of the host image to the watermark has to be changed. A method is proposed to adaptively select the level of decomposition for the host image by using the multi-scale property of DWT. The watermark is embedded in the host image, whose level of DWT is due to the ratio between the host image and the watermark.
The obvious diagonal traces are discovered in the extracted watermark under the attacks, which is due to the SVD used in the algorithms [19,20]. Moreover, the false positive problem (FPP) is easily found in the watermarking methods that used SVD [21,22,23]. Zhang et al. [21] introduced generalized Arnold transform in the algorithm to solve the diagonal problem and FPP problem due to SVD. In this paper, we perform the Arnold transform as well as logistic mapping to above the issue caused by SVD. The watermark image is encrypted by the dual-encryption. In the process, the matrix U and V T of the watermark are protected by keys of the encryption. Thus, attackers could only extract a noise-like watermark with counterfeit U and V T . Moreover, to further ensure the stability of the watermarking algorithm, the Hessenberg matrix decomposition (HMD) is applied to the singular values of the low-frequency sub-bands of the host image after DWT.
In addition, the scaling factor is used to control the embedding strength of the algorithm. The larger the scaling factor, the better the robustness and the weaker the invisibility, and vice versa [4,8,22]. To balance the invisibility and robustness of watermarking algorithms, many evolutionary and population intelligence optimization algorithms are used to solve the scaling factor of the watermarking algorithm. For example, particle swarm optimization (PSO) algorithms [21,24,25,26,27,28], and artificial bee colony optimization algorithms [29,30,31] have been used to optimize the scaling factor. The scaling factor is optimized by using the PSO on account of the advantages of low computational complexity and fast convergence.
A watermarking optimization method based on matrix decomposition and DWT for multi-size images is proposed. The host image is decomposed into four sub-bands by multi-level DWT, HMD and SVD are applied to the low-frequency band. The watermark image is encrypted by the Arnold transform and logistic mapping, and then the singular value of the encrypted watermark is modified by the scaling factor to embed the low-frequency band of the host image. In addition, the scaling factor is optimized by PSO. The main contributions of this paper are as follows:
(1)
The algorithm of watermarking can be adapted to multi-size host images and obtain better invisibility and robustness.
(2)
To the best of our knowledge, this is the first time that DWT, HMD, SVD, PSO, Arnold transform and logistic mapping combinations are applied to an image watermarking technique.
(3)
The invisibility and robustness of the proposed method are better than the existing works of [19,21,26], particularly the NC values, which are at least 0.44% higher than that of existing works in noise attacks.
The rest of the paper is organized as follows. Section 2 introduces a related work. Section 3 introduces the concepts of DWT, matrix decomposition, PSO algorithm, the Arnold transform, and logistic mapping. Section 4 details the multi-size image watermarking algorithm with dual encryption of DWT and matrix decomposition, the simulation results and performance comparison are given in Section 5, and conclusions are given in Section 6.

2. Related Work

Image watermarking algorithms are a hot research topic in image copyright protection technology. The various methods are used by scholars to improve the invisibility and robustness of the algorithms, such as the combination of DWT, DCT, SVD and so on. The research works on image watermarking techniques in recent years are introduced.
In 2017, Su et al. [32] proposed a blind color image watermarking scheme using HMD and Arnold transform.
In 2018, Vali et al. [33] presented a new blind image watermarking technique based on redundant DWT and SVD.
In 2019, Zhang et al. [21] proposed a DWT-DCT domain image watermarking algorithm based on PSO, the watermark image is encrypted by the generalized Arnold transform.
In 2020, Alshoura et al. [34] proposed a new watermarking scheme using a chaotic map based on SVD to overcome the FPP issue.
In 2021, Reem et al. [35] proposed a color video watermarking system based on SVD and dual-tree complex wavelet transform.
In 2021, Falgun et al. [26] proposed an improved DWT-SVD watermarking algorithm by using Arnold transform and PSO. The PSNRs for invisibility and the NCs for robustness are greater than 40 and 0.9, respectively.
In 2022, Alzahrani [36] proposed a digital watermark algorithm using DWT-SVD that analyzes various types of watermark attacks. The PSNRs for invisibility and the NCs for robustness are greater than 40 and 0.85, respectively.

3. Materials and Methods

3.1. Discrete Wavelet Transform (DWT)

The wavelet transform is a localized analysis of time (spatial) frequency, which can automatically adapt to the demands of analysis of the time-frequency signal and focus on any details of the signal. The low and high frequencies of the signal are performed time and frequency subdivision by wavelet transform through telescoping translation operation, respectively.
One must assume that ψ ( t ) is a fundamental wavelet or mother wavelet function. All wavelets are obtained by scaling and shifting the mother wavelet. The factors of scaling and translation are set to a and b, respectively. The following family of wavelet functions can be obtained by Equation (1).
φ ( t ) = 1 a ψ ( t b a ) ,     a 0
In continuous wavelet transform, calculating wavelet coefficients at every possible scale is an amount of work, and it generates a lot of data. The values a = 2 m , b = n 2 m , m , n Z are used to discretize function φ ( t ) ; the 1-D DWT of the signal f ( k ) is shown in the following Equation (2):
D W T ( m , n ) = 2 m 2 k = f ( k ) φ ( 2 m k n )
where φ is the complex conjugate of φ ( t ) .
As the scale and positions are chosen based on the power of two, the analysis becomes much more efficient and just as accurate. This is the DWT based on the multi-resolution analysis that is proposed by Mallat in 1989 [37]. The signal is obtained by using the wavelet expansion coefficients through a filter bank, which contains a high-pass filter and a low-pass filter [27,37,38], as shown in Figure 1. The high-frequency coefficient and low-frequency coefficient of the signal are output by the high-pass filter H and low-pass filter G , respectively. The c A i is the approximate component and c D i is the detail component [39].
Many different wavelet bases (Morlet, Daubechies, Haar) are used for wavelet decomposition and reconstruction of images. The Haar wavelet is a basis function used for the decomposition of the host image into diverse sub-bands in this paper. The Haar wavelet is defined as Equation (3) [38].
ψ ( t ) = 1 0 t < 1 2 1 1 2 t < 1 0 o t h e r ,
Haar wavelet can quickly solve features of multi-size images using integral calculations, due to its lower complexity than the others. It is suitable as a wavelet basis function for intelligent optimized watermarking algorithms.
Since the images in this paper are digital images, which are in the form of a 2-D matrix, the 2-D DWT is used to process such types of images. First, 1-D DWT is performed on the image by rows, and then 1-D DWT is performed on the obtained result by column, and vice versa. Therefore, Figure 2 is decomposed by the two-dimensional DWT, the four sub-bands are LH1, HL1, HH1 and LL1, respectively, and then the secondary decomposition is performed on LL1, which is decomposed into four sub-bands LL2, HL2, LH2, and HH2.

3.2. Matrix Decomposition

Matrix decomposition refers to the decomposition of a matrix into the product of several matrices by some algorithm based on certain principles. In this paper, HMD and SVD decomposition are used to improve the stability and robustness of the watermarking algorithm.

3.2.1. Hessenberg Matrix Decomposition

The proposed uses HMD [32] to decompose the images, and the HMD is a special square matrix with the following equation:
I = P H P T ,
where I is the general matrix corresponding to the image; P is the orthogonal matrix. The H is the upper Hessenberg matrix.
H = ( h i j ) n × n R n × n h i j = 0 ( j > i + 1 ) ,

3.2.2. SVD Decomposition

SVD [10,11,12,13] is a mathematical analysis method for an image I of size N × N , that can be expressed as follows:
I = U S V T ,
where U and V are two orthogonal matrices and S are a singular value matrix whose diagonal elements are the singular values of the image matrix I.
SVD has extremely important applications in image transformation, especially in digital watermarking. The singular values of an image characterize the distribution of the matrix data. The stability of the singular values is good and, in general, the singular values do not change significantly when the image is processed. In addition, SVD is a scaled invariant and there is no limit to the size of the image matrix. However, false positives are common in image watermarking algorithms using SVD.
To avoid the occurrence of false positives, this paper uses the Arnold transform combined with logistic mapping to double encrypt the watermarked image in the watermarked image pre-processing.

3.3. Watermarking Encryption

3.3.1. Arnold Transform

The Arnold transform [26] was proposed by the famous Russian mathematician Vladimir Arnold, known as the cat face transforms. The basic principle is to represent the matrix of a digital image as a binary function, which is encrypted by replacing the pixel coordinates of the original digital image with their positions. The process is as follows:
x y = 1 1 1 2 x y mod N ,
where N is the number of image dimensions and ( x , y ) is the coordinate of a point in the digital image, ( x , y ) 1 , 2 , N 1 ; ( x , y ) is the transformed coordinate ( x , y ) 1 , 2 , N 1 .
The inverse transformation formula of Arnold transform can be written as follows.
x y = 2 1 1 1 x y mod N ,

3.3.2. Logistic Mapping

Logistic mapping [33] is encrypted through a logistic chaotic sequence, where only the chaotic coefficients and the initial value (key) are set and the watermarked image is brought to a chaotic state by iteration. This is achieved through the following equation:
x k + 1 = μ x k ( 1 x k )
where the chaos coefficient μ [ 0 , 4 ] , x k ( 0 , 1 ) . The logistic mapping reaches a chaotic state when 3.56995 < μ 4 .
The algorithm is very sensitive to the number of Arnold permutations, logistic chaos coefficients, initial values, and other keys. If one or two of the keys are incorrect, the algorithm will fail to decrypt. The encryption algorithm in this paper can effectively ensure the security of the whole watermarking algorithm, as shown in Figure 3. In the process, U and V T of the watermark image are protected by keys of the encryption. Thus, attackers could only extract a noise-like watermark with counterfeit U and V T .

3.4. Particle Swarm Optimization Algorithm

PSO [21,29], also known as particle swarm optimization algorithm or bird flock foraging algorithm, is a new evolutionary algorithm developed by J. Kennedy and R. C. Eberhart et al. The particle swarm algorithm has simpler rules than the genetic algorithm and finds the global optimum by following the current searched optimum.
The scaling factor has an important impact on the watermarking algorithm, which is used to balance the invisibility and robustness of the algorithm. In this paper, we introduce PSO to optimize the scaling factor of the algorithm. The flow chart of PSO is shown in Figure 4. In addition, PSO updates the velocity vector of each individual using the Equations (10) and (11).
V i d = ω V i d + C 1 r a n d ( 0 , 1 ) ( P i d X i d )   + C 2 r a n d ( 0 , 1 ) ( P g d X i d ) ,
X i d = X i d + V i d ,
where ω [ 0 , 1 ] is the weighting factor, C 1 , C 2 [ 0 , 4 ] is the acceleration constant, denotes the P i d individual optimal solution, and P g d denotes the global optimal solution.

4. Proposed Scheme

This part introduces the proposed algorithm. Section 4.1 presents how to find the optimal scaling factor by PSO in the proposed algorithm. Section 4.2 and Section 4.3 introduce the watermarking embedding and extracting scheme.

4.1. Scaling Factor

Usually, PSNR and NC values are used as the evaluation index of the algorithm [21]. PSNR calculates the peak signal-to-noise ratio between the watermarked image and the original image, and NC calculates the correlation coefficient between the extracted watermarked image and the original watermarked image.
MSE = 1 M × N i = 0 M 1 j = 0 N 1 [ I ( i , j ) I w ( i , j ) ] 2 ,
where I ( i , j ) is the original image; I w ( i , j ) is the watermarked image.
PSNR = 10 log 10 ( 255 2 MSE ) ,
NC = i = 0 M 1 j = 0 N 1 W ( i , j ) W ˜ ( i , j ) i = 0 M 1 j = 0 N 1 W 2 ( i , j ) i = 0 M 1 j = 0 N 1 W ˜ 2 ( i , j ) ,
where W ( i , j ) is the watermarked image and W ˜ ( i , j ) is the watermarked image extracted from one of the attacks.
As shown in Figure 5, the scaling factor is proportional to the NC value and inversely proportional to the PSNR value. As is well known, the larger the NC value, the stronger the robustness, and the smaller the PSNR value, the weaker the invisibility. This paper optimized the scaling factor value through the NC values and PSNR values.
We defined the fitness function by applying NC and PSNR to maximize the robustness and invisibility of the algorithm.
f i t ( α ) = α PSNR β + ( 1 α ) 1 n i = 1 n NC i ,
where α is the scaling factor, β is a constant to adjust the size of the PSNR, which is taken as 37 dB in this paper, and n indicates the total number of attacks.
The pseudo-code for the PSO algorithm is shown in Algorithm 1.
Algorithm 1: Using PSO to calculate the best α
Input: Number of particles, N = 50, Weights, W = 0.5, Learning factor, C1 = 2, C2 = 2, Maximum number of iterations, T = 100.
    1. Randomly initialize the position and velocity of each particle
    2. Set p b e s t and g b e s t
    3. α = g b e s t
    4. While iter < = T
            Implement Algorithm 1 using α
            Perform attacks tests
            Implement Algorithm 2
            Calculate PSNRs using Equation (13), NCs using Equation (14), fitness value using Equation (15)
            Update p b e s t and g b e s t
            Update the position and velocity of each particle using Equations (10) and (11)
end
    5. α = g b e s t
Output: α.

4.2. Watermark Embedding Algorithm

In the embedding algorithm, the host image and the watermark image both are grayscale images. The host image is N × N, the watermarked image is M × M. Here, the dimensions of M and N satisfy the equation M / N = 2 k , k = 1 , 2 , 3 , 4 . In the algorithm, the host image is decomposed into four sub-bands by multi-level DWT; the HMD and SVD are applied to the low-frequency band. The watermark image is encrypted by the Arnold transform and logistic mapping, then the singular value of the encrypted watermark is modified by the scaling factor to embed the low-frequency band of the host image. The process is shown in Figure 6. Existing algorithms require a pre-set ratio of the host image to the watermarked image, which cannot be changed arbitrarily. In this paper, the proposed algorithm applies to many sizes of host images with the help of a multi-level transform of DWT. The pseudo-code for the embedding process of the watermark is shown in Algorithm 2.
Algorithm 2: Embedding algorithm
Input: Host image; watermark image; α calculated by PSO.
    1. Perform K-level DWT on the host image to obtain L L k , k = l b N / M
    2. Perform HMD on L L k , using Equation (4) to obtain H
    3. Perform SVD on H using Equation (6) to obtain S h
    4. Encrypt watermark using Equations (7) and (9) to obtain W ˜
    5. Perform SVD on W ˜ using Equation (6) to obtain U w , S w , V w
    6. Using α to embed watermark, S = S h + α S w
    7. Calculate the new Hessenberg matrix
    8. Calculate new low-frequency sub-band
    9. Using IDWT to obtain the watermarked image
Output: watermarked.

4.3. Watermark Exacting Algorithm

The watermarking extracting process is shown in Figure 6b. It is the inverse of the embedding algorithm and the pseudo-code is shown in Algorithm 3.
Algorithm 3: Exacting algorithm
Input: Watermarked image.
    1. Perform K-level DWT on watermarked to obtain L L k
    2. Perform HMD on L L k to obtain H
    3. Perform SVD on H using Equation (6) to obtain S
    4. Using α to exact S into S , S = ( S S h ) / α
    5. Calculate the watermark using U w and V w in step 5 of Algorithm 2, W ˜ = U w S V w T
    6. Decrypt W ˜
Output: exacted watermark image.

5. Results and Comparisons

We conducted some simulations to evaluate the invisibility and robustness of the algorithm. The simulations are performed on a laptop with Intel Core i5 CPU and 16 GB memory, the MATLAB version 9.5 (R2018b) of MathWorks is employed for the modeling and optimization. The images used for the tests are shown in Figure 7, which includes nine standard grayscale host images of different sizes and one binary watermarked image. The image Park is taken by the author, the image Logo is a watermark and the rest are standard MATLAB images.
The PSNR is a quality evaluation index used in the watermark algorithm. The bigger the PSNR value, the higher quality of the watermarked image. The robustness of the watermarking algorithm mainly examines whether the watermark could be extracted accurately after attacks. The bigger the NC value, the closer it is to the original watermarked image.

5.1. Simulation Results

5.1.1. Invisibility Analysis

Using Algorithm 2, different host images are selected and a fixed size watermarked image is embedded into the host image, and the invisibility of the algorithm is measured using PSNR. The simulation results are shown in Figure 8. The proposed use of the PSNR value to measure the invisibility of the watermarking algorithm. A general watermarking algorithm PSNR value of more than 30 dB can indicate that the watermark is transparent and invisible in the human eye visual system. The PSNR values of the algorithms in this paper are over 44.9 dB without attacks, and it is obvious that the algorithms in this paper meet the requirements of watermark invisibility.

5.1.2. Robustness Analysis

The robustness of the watermarking algorithm is usually measured by calculating the NCs value of the extracted watermark and the original watermark after the attack on the image containing the watermark. The larger the NC value, the stronger the ability of the algorithm to resist the attack; the better the robustness. In this paper, we choose different attacks, such as filtering and cropping, and the attack parameters are shown in Table 1.
A 1024 × 1024 grayscale image of Park is selected as the host image, and the watermark in Figure 7 is embedded into the host image for the attack test. The watermarked image after being attacked is shown in Figure 9. Figure 10 gives the watermark extracted from the watermarked Park image after the attack. From Figure 10, it can be observed that even though the watermarked image extracted in the motion blur attack has been degraded, it is still possible to extract a relatively clear watermark.
Various attacks are performed on the watermarked image, then the NCs of the extracted watermark and the original watermark are calculated by Equation (13) so that the robustness of the watermarking algorithm can be evaluated objectively. The computational results are shown in Table 2. The larger the ratio of the host image to the watermark, the larger the NC value of the extracted watermark after being attacked and vice versa. In particular, when the host image size is 1024 × 1024, the NC values are greater than 0.995, except for crop attack and motion blur, whose Nc values are higher than 0.98. The commendable robustness is shown in general by testing the attacks on different watermarked images.

5.1.3. Analysis of Attack Test Results

We further analyze the robustness of the algorithm by varying the intensity of the attack test. The host image in the analysis is a Lena image of size 512 × 512.
Firstly, the filtering attack is performed on the image containing the watermark, as shown in Figure 11a. The median filtering is performed on the image containing the watermark, and the filtering window sizes are 3 × 3, 4 × 4, 5 × 5, 6 × 6, and 7 × 7. Although the NC values of the watermark gradually decrease as the filtering window increases, the simulation results show that the NC values are still not lower than 0.99.
As shown in Figure 11b, the watermarked images are tested by cropping, and the cropping sizes are 16 × 16 pixels, 32 × 32 pixels, 64 × 64 pixels, 128 × 128 pixels, and 256 × 256 pixels in the upper left corner, respectively. The simulation results show that the visual quality of the extracted watermark decreases as the cropping size increases. Even so, when the cropping size is 256 × 256, which is equivalent to 1/4 of the clipped image, the NC values of the extracted watermark are not less than 0.98, indicating that the algorithm in this paper can resist the cropping attack well.
In Figure 11c, the Gaussian noise attack is performed on the image containing the watermark, and when the noise intensity is 0.01, the NC values of the extracted watermark is 0.9998, and the watermark information is not corrupted at all. When the noise intensity increases to 0.05, the watermark information is corrupted to some extent, but the watermark information can still be accurately identified with an NC value of 0.9731, which shows better robustness.
In Figure 11d, the NC values of the watermark gradually increase as the QF of JPEG compression increases. When the QF is taken as 10, the NC values of the extracted watermark are not less than 0.99, which indicates that the algorithm in this paper can resist JPEG compression attacks well.
For the NC values under different attacks as shown in Table 3, the NC values are not less than 0.98, except for the attack of cropping 25% of the image, which has an NC value of 0.9738. The commendable robustness is reflected in the simulation results.

5.2. Algorithm Comparisons

In this section, the invisibility and robustness of the algorithm are analyzed by comparing the proposed method with the existing optimization algorithms [19,21,26], when the size of the host image and watermark are 512 × 512 and 128 × 128, respectively. The simulation conditions of the literature [21] and the proposed method are the same; thus, the results can be compared directly. The watermark is embedded into the Lena image using the algorithm of [19,26], respectively. The PSNRs of the watermarked image and the original image are calculated as shown in Table 4. The attack test is performed on the watermarked image, and the PSNRs of the degraded image and the NCs of extracted watermark are obtained, as shown in Table 5 and Table 6.

5.2.1. Invisibility Comparison

PSNR is one of the main criteria to measure the image quality, and the larger the PSNR value between two images, the more similar the two images are. Firstly, we compare the PSNRs of the proposed algorithm and the algorithm [19,21,26] in the absence of attacks. The results are shown in Table 4.
The invisibility of the proposed algorithm under various attacks is compared with the existing algorithms [19,21,26] in Table 5. The host image uses the Lena image of size 512 × 512 and the watermarked image uses size 128 × 128.

5.2.2. Robustness Comparison

The robustness is compared with the existing algorithms as shown in Table 6; the NC values of the watermarks extracted by the proposed method are better than the existing algorithms [19,21,26] under different attacks. The NC values of the proposed are 4.53%, 2.88% and 0.86% higher in Gaussian noise, the NC values of the proposed are 0.78%, 1.18% and 0.51% higher in salt and pepper noise and the NC values of the proposed are 0.81%, 2.17% and 0.44% higher in speckle noise. According to the analysis of the above results, the robustness of the proposed optimization method is better under different noise attack conditions.

6. Conclusions

In this paper, a watermarking optimization method based on matrix decomposition and DWT for multi-size images is proposed. The DWT, HMD, SVD, PSO, Arnold transform and logistic mapping are combined to achieve watermark protection. The watermark is embedded into multi-size host images using the method in this paper; PSNRs are higher than 44.9 dB without attacks and the NCs are higher than 0.98 under various attacks. Compared with the existing works, the proposed method shows preferable robustness under various attacks, particularly the NC values of the proposed method, which are 4.53%, 2.88% and 0.86% higher than the studies [19,21,26] in Gaussian noise attack, with the analogous advantage in salt and pepper and speckle noise attack. Therefore, the robustness and invisibility of the watermarking algorithm are enhanced by using the proposed method. In the future, our research will focus on further extending the algorithm to watermarked images capable of adapting to color host images of arbitrary size.

Author Contributions

Conceptualization, methodology, software, validation, formal analysis, investigation, data curation, writing—original draft preparation, review and editing, visualization, supervision, L.W.; methodology, investigation, data curation, writing—review and editing, supervision, project administration, funding acquisition, H.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

All the related data are included in the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nikolaidis, A.; Pitas, I. Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. Image Process 2003, 12, 563–571. [Google Scholar] [CrossRef] [PubMed]
  2. Kwitt, R.; Meerwald, P.; Uhl, A. Lightweight detection of additive watermarking in the DWT-Domain. IEEE Trans. Image Process 2011, 20, 474–484. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Nezhadarya, E.; Wang, Z.J.; Ward, R.K. Robust image watermarking based on multiscale gradient direction quantization. IEEE Trans. Inf. Forensic Secur. 2011, 6, 1200–1213. [Google Scholar] [CrossRef]
  4. Urvoy, M.; Goudia, D.; Autrusseau, F. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Trans. Inf. Forensic Secur. 2014, 9, 1108–1119. [Google Scholar] [CrossRef] [Green Version]
  5. Solachidis, V.; Pitas, L. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans. Image Process 2001, 10, 1741–1753. [Google Scholar] [CrossRef] [Green Version]
  6. Shabir, A.P.; Javaid, A.S.; Nazir, A.L.; Ghulam, M.B. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process 2016, 53, 11–24. [Google Scholar] [CrossRef]
  7. Lei, B.Y.; Soon, I.Y.; Li, Z. Blind and robust audio watermarking scheme based on SVD–DCT. Signal Process. 2011, 91, 1973–1984. [Google Scholar] [CrossRef]
  8. Moosazadeh, M.; Ekbatanifard, G. A new DCT-based robust image watermarking method using teaching-learning-based optimization. J. Inf. Secur. Appl. 2019, 47, 28–38. [Google Scholar] [CrossRef]
  9. Ferad, E.; Muhammad, N.K. A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 2018, 6, 20464–20480. [Google Scholar] [CrossRef]
  10. Liu, R.Z.; Tan, T.N. An SVD-Based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 2002, 4, 121–128. [Google Scholar] [CrossRef] [Green Version]
  11. Fan, M.Q.; Wang, H.X.; Li, S.K. Restudy on SVD-based watermarking scheme. Appl. Math. Comput. 2008, 203, 926–930. [Google Scholar] [CrossRef]
  12. Anand, A.; Singh, A.K. Dual watermarking for security of COVID-19 patient record. IEEE Trans. Depend. Secur. 2022. [Google Scholar] [CrossRef]
  13. Lai, C.C.; Tsai, C.C. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 2010, 59, 3060–3063. [Google Scholar] [CrossRef]
  14. Ali, M.; Ahn, C.W. An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal Process. 2014, 94, 545–556. [Google Scholar] [CrossRef]
  15. Fares, K.; Khaldi, A.; Redouane, K.; Salah, E. DCT & DWT based watermarking scheme for medical information security. Biomed. Signal Process. 2021, 66, 102403. [Google Scholar] [CrossRef]
  16. Zermi, N.; Khaldi, A.; Redouane, K.; Fares, K.; Salah, E. A DWT-SVD based robust digital watermarking for medical image security. Forensic Sci. Int. 2021, 320, 110691. [Google Scholar] [CrossRef]
  17. Nasir, N.H.; Shabir, A.P.; Nazir, A.L.; Javaid, A.S.; Mohammad, E.; Khan, M. Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener. Comp. Syst. 2018, 94, 654–673. [Google Scholar] [CrossRef]
  18. Wang, B.W.; Zhao, P. An adaptive image watermarking method combining SVD and Wang-Landau sampling in DWT domain. Mathematics 2020, 8, 691. [Google Scholar] [CrossRef]
  19. Jane, O.; Elbaşi, E.; İlk, H.G. Hybrid non-blind watermarking based on DWT and SVD. Appl. Res. Technol. 2014, 12, 750–761. [Google Scholar] [CrossRef] [Green Version]
  20. Zhou, X.; Zhang, H.; Wang, C.Y. A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 2018, 10, 77. [Google Scholar] [CrossRef] [Green Version]
  21. Zhang, L.N.; Wei, D.Y. Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed. Tools Appl. 2019, 78, 28003–28023. [Google Scholar] [CrossRef]
  22. Singh, R.; Ashok, A. An optimized robust watermarking technique using CKGSA in frequency domain. J. Inf. Secur. Appl. 2021, 58, 102734. [Google Scholar] [CrossRef]
  23. Alshoura, W.H.; Zainol, Z.; Teh, J.S.; Alawida, M. An FPP-resistant SVD-based image watermarking scheme based on chaotic control. Alex. Eng. J. 2022, 61, 5713–5734. [Google Scholar] [CrossRef]
  24. Manuel, C.H.; Antonio, C.H.; Francisco, J.G. Improving DFT-based image watermarking using particle swarm optimization algorithm. Mathematics 2021, 9, 1795. [Google Scholar] [CrossRef]
  25. Adnan, M.C.; Syed, M.A.; Zahid, M. A novel optimized semi-blind scheme for color image watermarking. IEEE Access 2020, 8, 169525–169547. [Google Scholar] [CrossRef]
  26. Falgun, T.; Vinay, K.S. An adaptive, secure and imperceptive image watermarking using swarm intelligence, arnold transform, SVD and DWT. Multimed. Tools Appl. 2021, 80, 12275–12292. [Google Scholar] [CrossRef]
  27. Balasamy, K.; Ramakrishnan, S. An intelligent reversible watermarking system for authenticating medical images using wavelet and PSO. Clust. Comput. 2019, 22, 4431–4442. [Google Scholar] [CrossRef]
  28. Mona, M.S.; Aboul, E.H.; Hoda, M.O. An adaptive watermarking approach based on weighted quantum particle swarm optimization. Neural Comput. Appl. 2016, 27, 469–481. [Google Scholar] [CrossRef]
  29. Abdelhakim, A.M.; Saleh, H.I.; Nassar, A.M. A quality guaranteed robust image watermarking optimization with artificial bee colony. Expert Syst. Appl. 2017, 72, 317–326. [Google Scholar] [CrossRef]
  30. Gao, H.; Chen, Q. A robust and secure image watermarking scheme using SURF and improved artificial bee colony algorithm in DWT domain. Optik 2021, 242, 166954. [Google Scholar] [CrossRef]
  31. Zheng, Q.M.; Liu, N.; Wang, F.H. An adaptive embedding strength watermarking algorithm based on shearlets’ capture directional features. Mathematics 2020, 8, 1377. [Google Scholar] [CrossRef]
  32. Su, Q.T.; Chen, B.J. A novel blind color image watermarking using upper Hessenberg matrix. AEU-Int. J. Electron. Commun. 2017, 78, 64–71. [Google Scholar] [CrossRef]
  33. Vali, M.H.; Aghagolzadeh, A.; Baleghi, Y. Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition. Expert Syst. Appl. 2018, 114, 296–312. [Google Scholar] [CrossRef]
  34. Alshoura, W.H.; Zainol, Z.; Teh, J.S.; Alawida, M. A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 2020, 8, 43391–43406. [Google Scholar] [CrossRef]
  35. Reem, A.; Hanaa, A.A. Securing color video when transmitting through communication channels using DT-CWT-Based watermarking. Electronics 2022, 11, 1849. [Google Scholar] [CrossRef]
  36. Alzahrani, A. Enhanced invisibility and robustness of digital image watermarking based on DWT-SVD. Appl Bionics Biomech. 2022, 2022, 5271600. [Google Scholar] [CrossRef] [PubMed]
  37. Stephane, G.M. A theory for multiresolution signal decomposition: The wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 1989, 11, 674–693. [Google Scholar] [CrossRef] [Green Version]
  38. Varad, A.P.; Rutvik, P.; Ashwin, K.; Kishor, M.B.; Vipin, M.K. Digital image noise estimation using DWT coefficients. IEEE Trans. Image Process 2021, 30, 1962–1972. [Google Scholar] [CrossRef]
  39. Hasan, N.; Islam, M.S.; Chen, W.Y.; Kabir, M.A.; AL-Ahmadi, S. Encryption based image watermarking algorithm in 2DWT-DCT domains. Sensors 2021, 21, 5540. [Google Scholar] [CrossRef]
Figure 1. Three level decomposition of 1-D signal.
Figure 1. Three level decomposition of 1-D signal.
Electronics 11 02027 g001
Figure 2. The decomposition process of 2-D DWT. (a) Original image, (b) one-level decomposition image; (c) two-level decomposition image.
Figure 2. The decomposition process of 2-D DWT. (a) Original image, (b) one-level decomposition image; (c) two-level decomposition image.
Electronics 11 02027 g002
Figure 3. Duel-encrypted watermarked image. (a) Original watermark, (b) Arnold encrypted image, (c) logistic mapped image; (d) decrypted image.
Figure 3. Duel-encrypted watermarked image. (a) Original watermark, (b) Arnold encrypted image, (c) logistic mapped image; (d) decrypted image.
Electronics 11 02027 g003
Figure 4. The flow chart of PSO.
Figure 4. The flow chart of PSO.
Electronics 11 02027 g004
Figure 5. PSNRs and NCs under different scaling factors.
Figure 5. PSNRs and NCs under different scaling factors.
Electronics 11 02027 g005
Figure 6. Embedding and extraction process of proposed.
Figure 6. Embedding and extraction process of proposed.
Electronics 11 02027 g006
Figure 7. The host image and watermark image.
Figure 7. The host image and watermark image.
Electronics 11 02027 g007
Figure 8. The simulation results of invisibility.
Figure 8. The simulation results of invisibility.
Electronics 11 02027 g008
Figure 9. Watermarked images under various attacks.
Figure 9. Watermarked images under various attacks.
Electronics 11 02027 g009
Figure 10. Extracted watermark under various attacks.
Figure 10. Extracted watermark under various attacks.
Electronics 11 02027 g010
Figure 11. NC values under attacks with different parameters.
Figure 11. NC values under attacks with different parameters.
Electronics 11 02027 g011
Table 1. Parameters of attacks.
Table 1. Parameters of attacks.
AttacksParameters
Gaussian filter5 × 5
Median filter3 × 3
Average filter3 × 3
Wiener filter3 × 3
Gaussian noiseVariance = 0.01
Salt and pepper noiseDensity = 0.01
Speckle noiseVariance = 0.01
JPEG compressionQuality factor (QF) = 50
Sharpening0.7
CropLeft 12%
Rotate90°
Motion blurTheta = 4, Len = 7
Table 2. NC values after various attacks.
Table 2. NC values after various attacks.
Attacks.GirlParkManLenaGoldhillBaboonHouseWomanPepper
No111111111
Gaussian filter0.99990.99990.99980.99990.99990.99990.99960.99970.9996
Median filter0.99990.99850.99990.99990.99970.99990.99930.99990.9998
Average filter0.99990.99860.99990.99990.99980.99990.99660.99610.9958
Wiener filter0.99970.99870.99960.99940.99930.99940.99880.99840.9987
Gaussian noise0.99990.99980.99990.99990.99990.99990.99990.99990.9999
Salt and pepper noise0.99990.99990.99990.99990.99990.99990.99980.99990.9999
Speckle noise0.99990.99990.99990.99990.99990.99990.99990.99990.9999
JPEG0.99990.99990.99990.99980.99980.99960.99920.9990.9995
Crop0.99490.99460.99230.99170.99350.99190.99310.99090.9852
Sharpening0.99960.99880.99970.99810.99880.99810.99770.99680.9967
Rotating0.99950.99980.99960.99890.99840.99820.99830.9980.9978
Motion blur0.99870.99860.99970.99670.99690.99610.98740.98990.9862
Table 3. NC values after different attacks.
Table 3. NC values after different attacks.
AttacksParametersHost Image Size
1024 × 1024512 × 512256 × 256
Median Filter3 × 30.99940.99990.9985
5 × 50.99850.99780.9939
7 × 70.99670.98790.9882
Gaussian Noise0.0010.99950.99980.9993
0.0050.99900.99970.9896
0.010.99840.99920.9842
JPEG200.99950.99930.9992
500.999710.9996
70110.9999
CropLeft6%0.99950.99820.9875
Left 12%0.99640.99700.9828
Left 25%0.98710.98650.9738
Table 4. The comparison of the invisibility based on PSNR values without attack.
Table 4. The comparison of the invisibility based on PSNR values without attack.
Images[19][21][26]Proposed
Lena43.893444.512543.958348.8785
Woman43.962444.518243.950149.5695
Goldhill43.961943.902343.968748.9170
House43.826444.383543.987649.5075
Table 5. PSNR values of different algorithms under attacks.
Table 5. PSNR values of different algorithms under attacks.
Attacks[19][21][26]Proposed
Filter25.866328.822927.693735.4073
Salt and pepper noise28.962825.393129.82835.9293
JPEG (Q = 10) compression27.217233.833130.221837.1349
Crop 1/4 left up11.458411.703411.602711.7954
Sharpening28.768220.130431.058434.859
Rotating 45°10.152710.481310.374110.5114
Table 6. NC values of different algorithms under attacks.
Table 6. NC values of different algorithms under attacks.
Attacks[19][21][26]Proposed
Gaussian filter0.97860.99980.93770.9999
Median0.93280.99800.98720.9983
Average filter0.97840.99690.93690.9976
Wiener filter0.89330.99810.99030.9989
Gaussian noise0.95460.97110.99130.9999
Salt and pepper noise0.99210.98810.99480.9999
Speckle noise0.99170.97820.99550.9999
JPEG(Q = 10) compression0.99490.99970.99820.9996
Crop 1/4 left up0.69990.97020.94920.9865
Sharpening0.86370.96170.99230.9964
Rotating 45°0.70100.98050.90260.9509
Motion blur0.90320.99690.99210.9967
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, L.; Ji, H. A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images. Electronics 2022, 11, 2027. https://doi.org/10.3390/electronics11132027

AMA Style

Wang L, Ji H. A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images. Electronics. 2022; 11(13):2027. https://doi.org/10.3390/electronics11132027

Chicago/Turabian Style

Wang, Lei, and Huichao Ji. 2022. "A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images" Electronics 11, no. 13: 2027. https://doi.org/10.3390/electronics11132027

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop