RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform
Abstract
:1. Introduction
2. SIFT Algorithm
2.1. Scale-Space Peak Selection
2.2. Keypoints Location
2.3. Direction Matching
2.4. Keypoint Description
- Step 1
- The scale and orientation are computed in the 16 × 16 neighbor of keypoints.
- Step 2
- The 16 × 16 neighborhood is divided into 4 × 4 blocks. Thus, there are 16 blocks in the neighbor of every keypoint as well as eight orientations in the central point of every 4 × 4 block.
- Step 3
- 128 orientations can be obtained as the keypoint feature in the vector with size of 1 × 128. To simplify the analysis, suppose the 8 × 8 neighbor of the keypoint is divided into 4 × 4 blocks, and there will be four sub-blocks. The diagram of keypoints directions are shown in Figure 1.
3. The Proposed Scheme
3.1. Watermark Embedding Process
- Step 1
- The original image is transformed with DWT three times, and each level of DWT is performed sequentially on the original image, LL1, and LL2. Finally, LL3 is obtained for the SVD transform in Step 3. Due to the fact that the LL sub-band has sufficient information, the capacity of watermark embedding is large in the LL sub-band, which can ensure the good imperceptibility of the proposed method.
- Step 2
- The watermark information is encrypted with the Arnold transform, and the scrambling time is saved as key .
- Step 3
- According to Equations (5) and (6), SVD is performed on the LL3 sub-band to get three matrices: both and are orthogonal matrices, and is the diagonal matrix of singular values. After that, singular values of the LL3 sub-band are altered:
- Step 4
- Owing to the fact that the watermark for embedding is an image matrix, is not a diagonal matrix after Equation (6), which can result in distortion in inverse SVD transform. Thus, SVD is performed on the again to obtain the watermarked diagonal matrix, which is illustrated by:
- Step 5
- The watermarked sub-band is generated by , , and , as shown in Equation (8):
- Step 6
- According to the concrete process in Step 1, three-level inverse DWT (IDWT) is performed with other sub-bands to generate the watermarked image .
- Step 7
- After Step 6, SIFT is performed on the watermarked image , and feature points are extracted. Meanwhile, descriptors of the watermarked image are recorded as keys for the feature matching in the extraction process. To be more concrete, the coordinates, scales, and orientations of the feature points in the watermarked image are obtained, which are used for RST attack correction.
3.2. Watermark Extraction Process
- Step 1
- The attacked image is performed with SIFT, and the feature points in the attacked image can be obtained accordingly.
- Step 2
- In the embedding process, the feature points in watermarked image are recorded as keys . In this step, keys should be stored in a matrix and transmitted along with the watermarked image for feature matching with the feature points .As can be seen in Figure 4, two sets of feature points in two images are selected as matching keypoints, and lines are drawn between two keypoints in two images separately.
- Step 3
- After the feature matching process finished, RST attacks can be corrected with the angle, coordinates, and scales, which is illustrated concretely in Section 3.3. Then, the RST corrected image is obtained for watermark extraction.
- Step 4
- Three-level DWT is performed on the corrected image , and then LL3, LH3, HL3, and HH3 bands are obtained. Similar to the embedding process, the LL3 sub-band is selected for the SVD transform in the next step.
- Step 5
- SVD is performed on the corrected sub-band using Equation (9), and is recorded for the next step.
- Step 6
- is retrieved back by Equation (10):
- Step 7
- The extracted watermark is generated for the LL3 sub-band, which is shown in Equation (11):
- Step 8
- The extracted watermark is decrypted by the Arnold transform with key recorded in the embedding process.
3.3. RST Attack Correction Based on SIFT
3.3.1. Rotation Attack Correction
3.3.2. Scaling Attack Correction
3.3.3. Translation Attack Correction
4. Experimental Results and Analysis
4.1. Evaluation of Imperceptibility
4.2. Evaluation of Robustness
4.2.1. Common Attacks
- (1)
- (2)
- Salt and pepper noise (0.01 and 0.05).Figure 12. Watermarked images and extracted watermarks under salt and pepper noise: (a) watermarked Lena under salt and pepper noise (0.01); (b) extracted watermark ; (c) watermarked Barbara under salt and pepper noise (0.01); (d) extracted watermark ; (e) watermarked Lena under salt and pepper noise (0.05); (f) extracted watermark ; (g) watermarked Barbara under salt and pepper noise (0.05); (h) extracted watermark .
- (3)
- Gaussian noise ((0, 0.01) and (0, 0.05)).Figure 13. Watermarked images and extracted watermarks under Gaussian noise: (a) watermarked Lena under Gaussian noise (0, 0.01); (b) extracted watermark ; (c) watermarked Barbara under Gaussian noise (0, 0.01); (d) extracted watermark ; (e) watermarked Lena under Gaussian noise (0, 0.05); (f) extracted watermark ; (g) watermarked Barbara under Gaussian noise (0, 0.05); (h) extracted watermark .
- (4)
- (5)
4.2.2. RST Attacks
- (1)
- Rotation.Figure 16. Watermarked images and extracted watermarks under rotation: (a) rotated Lena (2°); (b) extracted watermark ; (c) rotated Barbara (2°); (d) extracted watermark ; (e) rotated Lena (5°); (f) extracted watermark ; (g) rotated Barbara (5°); (h) extracted watermark ; (i) rotated Lena (10°); (j) extracted watermark ; (k) rotated Barbara (10°); (l) extracted watermark ; (m) rotated Lena (30°); (n) extracted watermark ; (o) rotated Barbara (30°); (p) extracted watermark ; (q) rotated Lena (45°); (r) extracted watermark ; (s) rotated Barbara (45°); (t) extracted watermark .
- (2)
- Scaling.Figure 17. Watermarked images and extracted watermarks under scaling attacks: (a) scaled Lena (0.25); (b) extracted watermark ; (c) scaled Barbara (0.25); (d) extracted watermark ; (e) scaled Lena (0.5); (f) extracted watermark ; (g) scaled Barbara (0.5); (h) extracted watermark ; (i) scaled Lena (0.9); (j) extracted watermark ; (k) scaled Barbara (0.9); (l) extracted watermark ; (m) scaled Lena (1.2); (n) extracted watermark ; (o) scaled Barbara (1.2); (p) extracted watermark .
- (3)
- Translation.Figure 18. Watermarked images and extracted watermarks under translation attacks: (a) horizontally translated Lena (128 pixels); (b) extracted watermark ; (c) horizontally translated Barbara (128 pixels); (d) extracted watermark ; (e) vertically translated Lena (128 pixels); (f) extracted watermark ; (g) vertically translated Barbara (128 pixels); (h) extracted watermark .
4.3. Performance Comparison with Previous Schemes
5. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Dittmann, J.; Steinmetz, A.; Steinmetz, R. Content-based digital signature for motion pictures authentication and content-fragile watermarking. In Proceedings of the 6th IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 7–11 June 1999; pp. 209–213. [Google Scholar]
- Lou, D.C.; Liu, J.L. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consum. Electron. 2000, 46, 31–39. [Google Scholar]
- Langelaar, G.C.; Setywan, I.; Lagendijk, R.L. Watermarking digital image and video data. IEEE Signal Process. Mag. 2000, 17, 20–46. [Google Scholar] [CrossRef]
- Barni, M.; Bartolini, F.; Cappellini, V. A DCT-domain system for robust image watermarking. Signal Process. 1998, 66, 357–372. [Google Scholar] [CrossRef]
- Qi, X.J.; Xin, X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J. Vis. Commun. Image Represent. 2015, 30, 312–327. [Google Scholar] [CrossRef]
- Liu, R.Z.; Tan, T.N. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 2002, 4, 121–128. [Google Scholar]
- Chang, C.C.; Tsai, P.; Lin, C.C. SVD-based digital image watermarking scheme. Pattern Recognit. Lett. 2005, 26, 1577–1586. [Google Scholar] [CrossRef]
- Su, Q.T.; Niu, Y.G.; Zou, H.L.; Liu, X.X. A blind dual color images watermarking based on singular value decomposition. Appl. Math. Comput. 2013, 219, 8455–8466. [Google Scholar] [CrossRef]
- Liu, F.; Feng, H.; Lu, C. Blind watermarking scheme based on U matrix through QSVD transformation. Int. J. Secur. Appl. 2015, 9, 203–216. [Google Scholar] [CrossRef]
- Li, Z.; Yap, K.H.; Lei, B.Y. A new blind robust image watermarking scheme in SVD-DCT composite domain. In Proceedings of the 18th IEEE International Conference on Image Processing, Brussels, Belgium, 11–14 September 2011; pp. 2757–2760. [Google Scholar]
- Sverdlov, A.; Dexter, S.; Eskicioglu, A.M. Robust DCT-SVD domain image watermarking for copyright protection: Embedding data in all frequencies. In Proceedings of the 13th European Signal Processing Conference, Antalya, Turkey, 4–8 September 2005; pp. 29–32. [Google Scholar]
- Lai, C.C.; Tsai, C.C. Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 2010, 59, 3060–3063. [Google Scholar] [CrossRef]
- Bhatnagar, G.; Raman, B. A new robust reference watermarking scheme based on DWT-SVD. Comput. Stand. Interfaces 2009, 31, 1002–1013. [Google Scholar] [CrossRef]
- Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT-SVD and Firefly algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
- Narula, N.; Sethi, D.; Bhattacharya, P.P. Comparative analysis of DWT and DWT-SVD watermarking techniques in RGB images. Int. J. Signal Process. Image Process. Pattern Recognit. 2015, 8, 339–348. [Google Scholar] [CrossRef]
- Singh, D.; Singh, S.K. DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed. Tools Appl. 2016. [Google Scholar] [CrossRef]
- Ansari, I.A.; Pant, M.; Ahn, C.W. Robust and false positive free watermarking in IWT domain using SVD and ABC. Eng. Appl. Artif. Intell. 2016, 49, 114–125. [Google Scholar] [CrossRef]
- Zheng, D.; Zhao, J.Y.; Saddik, A.E. RST-invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 753–765. [Google Scholar] [CrossRef]
- Ye, X.Y.; Chen, X.T.; Deng, M.; Wang, Y.L. A SIFT-based DWT-SVD blind watermark method against geometrical attacks. In Proceedings of the 7th International Congress on Image and Signal Processing, Dalian, China, 14–16 October 2014; pp. 323–329. [Google Scholar]
- Lowe, D.G. Object recognition from local scale-invariant features. In Proceedings of the 7th IEEE International Conference on Computer Vision, Kerkyra, Greece, 20–27 September 1999; pp. 1150–1157. [Google Scholar]
- Mikolajczyk, K.; Schmid, C. A performance evaluation of local descriptors. IEEE Trans. Pattern Anal. Mach. Intell. 2005, 27, 1615–1630. [Google Scholar] [CrossRef] [PubMed]
- Lee, H.K.; Kim, H.; Lee, H.Y. Robust image watermarking using local invariant features. Opt. Eng. 2006, 45, 535–545. [Google Scholar]
- Luo, H.J.; Sun, X.M.; Yang, H.F.; Xia, Z.H. A robust image watermarking based on image restoration using SIFT. Radio Eng. 2011, 20, 525–532. [Google Scholar]
- Lyu, W.L.; Chang, C.C.; Nguyen, T.S.; Lin, C.C. Image watermarking scheme based on scale-invariant feature transform. KSII Trans. Internet Inf. Syst. 2014, 8, 3591–3606. [Google Scholar]
- Thorat, C.G.; Jadhav, B.D. A blind digital watermark technique for color image based on integer wavelet transform and SIFT. Procedia Comput. Sci. 2010, 2, 236–241. [Google Scholar] [CrossRef]
- Pham, V.Q.; Miyaki, T.; Yamasaki, T.; Aizawa, K. Geometrically invariant object-based watermarking using SIFT feature. In Proceedings of the 14th IEEE International Conference on Image Processing, San Antonio, TX, USA, 16–19 September 2007; pp. 473–476. [Google Scholar]
- Zhang, L.; Tang, B. A combination of feature-points-based and SVD-based image watermarking algorithm. In Proceedings of the International Conference on Industrial Control and Electronics Engineering, Xi’an, China, 23–25 August 2012; pp. 1092–1095. [Google Scholar]
- Yuan, X.C.; Pun, C.M. Feature extraction and local Zernike moments based geometric invariant watermarking. Multimed. Tools Appl. 2014, 72, 777–799. [Google Scholar] [CrossRef]
- Wang, C.P.; Wang, X.Y.; Xia, Z.Q. Geometrically invariant image watermarking based on fast radial harmonic Fourier moments. Signal Process. Image Commun. 2016, 45, 10–23. [Google Scholar]
- Tsougenis, E.D.; Papakostas, G.A.; Koulouriotis, D.E.; Tourassis, V.D. Performance evaluation of moment-based watermarking methods: A review. J. Syst. Softw. 2012, 85, 1864–1884. [Google Scholar] [CrossRef]
- Koenderink, J.J. The structure of image. Biol. Cybern. 1984, 50, 363–370. [Google Scholar] [CrossRef] [PubMed]
- Babaud, J.; Witkin, A.P.; Baudin, M.; Duda, R.O. Uniqueness of the Gaussian kernel for scale-space filtering. IEEE Trans. Pattern Anal. Mach. Intell. 1986, 8, 26–33. [Google Scholar] [CrossRef] [PubMed]
Images | Number of Keypoints | NC |
---|---|---|
Airplane | 2037 | 0.9970 |
Lena | 1233 | 0.9964 |
Barbara | 1590 | 0.9969 |
Bank | 948 | 0.9973 |
Announcer | 973 | 0.9975 |
Fishing Boat | 1943 | 0.9978 |
Milkdrop | 272 | 0.9972 |
Baboon | 3264 | 0.9976 |
Boat | 2881 | 0.9971 |
Bridge | 3813 | 0.9974 |
Einstein | 812 | 0.9977 |
Peppers | 780 | 0.9967 |
Goldhill | 1947 | 0.9973 |
Model | 593 | 0.9965 |
Mountain | 2442 | 0.9964 |
Zelda | 880 | 0.9969 |
Different Attacks | Lena and w1 | Barbara and w2 |
---|---|---|
Scaling (0.25) | 0.9744 | 0.9713 |
Scaling (0.5) | 0.9919 | 0.9910 |
Scaling (0.9) | 0.9931 | 0.9731 |
Scaling (1.2) | 0.9906 | 0.9726 |
Rotation (2°) | 0.9741 | 0.9703 |
Rotation (5°) | 0.9813 | 0.9659 |
Rotation (10°) | 0.9861 | 0.9738 |
Rotation (30°) | 0.9861 | 0.9822 |
Rotation (45°) | 0.9828 | 0.9839 |
Horizontal cycling translation (128 pixels) | 0.9964 | 0.9962 |
Vertical cycling translation (128 pixels) | 0.9964 | 0.9962 |
JPEG (100) | 0.9966 | 0.9964 |
Median filter (3 × 3) | 0.9913 | 0.9848 |
Center cropping (25%) | 0.9179 | 0.8859 |
Gaussian noise (0, 0.01) | 0.9788 | 0.9799 |
Gaussian noise (0, 0.05) | 0.9509 | 0.9206 |
Salt and pepper noise (0.01) | 0.9758 | 0.9759 |
Salt and pepper noise (0.05) | 0.9644 | 0.9476 |
Different Combination of Attacks | Lena and w1 | Barbara and w2 |
---|---|---|
Rotation (10°) and JPEG (100) | 0.9964 | 0.9738 |
Rotation (10°) and Gaussian noise (0, 0.05) | 0.9644 | 0.9437 |
Rotation (10°) and Salt and pepper noise (0.05) | 0.9779 | 0.9592 |
Rotation (10°) and Center cropping (25%) | 0.9098 | 0.9165 |
Rotation (10°) and Median filter (3 × 3) | 0.9862 | 0.9729 |
Scaling (0.5) and JPEG (100) | 0.9920 | 0.9616 |
Scaling (0.5) and Gaussian noise (0, 0.05) | 0.9239 | 0.9165 |
Scaling (0.5) and Salt and pepper noise (0.05) | 0.9331 | 0.9348 |
Scaling (0.5) and Center cropping (25%) | 0.8170 | 0.8807 |
Scaling (0.5) and Median filter (3 × 3) | 0.9861 | 0.9578 |
Horizontal translation and JPEG (100) | 0.9966 | 0.9964 |
Horizontal translation and Gaussian noise (0, 0.05) | 0.9068 | 0.9190 |
Horizontal translation and Salt and pepper noise (0.05) | 0.9400 | 0.9455 |
Horizontal translation and Center cropping (25%) | 0.8981 | 0.8724 |
Horizontal translation and Median filter (3 × 3) | 0.9917 | 0.9846 |
Rotation (10°) and Scaling (0.5) | 0.9857 | 0.9669 |
Scaling (0.5) and Horizontal translation | 0.9912 | 0.9646 |
Horizontal translation and Rotation (10°) | 0.9851 | 0.9677 |
Different Attacks | Liu et al.’s Scheme [6] | Lyu et al.’s Scheme [24] | Proposed Scheme |
---|---|---|---|
Median filter (3 × 3) | 0.5170 | 0.6450 | 0.9913 |
Center cropping (25%) | 0.9822 | 0.9800 | 0.9179 |
JPEG (100) | 0.9941 | 0.9820 | 0.9966 |
Rotation (2°) | 0.9687 | 0.9400 | 0.9741 |
Rotation (5°) | 0.9197 | 0.9310 | 0.9813 |
Rotation (10°) | 0.7825 | 0.8860 | 0.9861 |
Scaling (0.9) | 0.9710 | 0.9560 | 0.9931 |
Scaling (1.2) | 0.8709 | 0.9820 | 0.9906 |
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, Y.; Wang, C.; Zhou, X. RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform. Algorithms 2017, 10, 41. https://doi.org/10.3390/a10020041
Zhang Y, Wang C, Zhou X. RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform. Algorithms. 2017; 10(2):41. https://doi.org/10.3390/a10020041
Chicago/Turabian StyleZhang, Yunpeng, Chengyou Wang, and Xiao Zhou. 2017. "RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform" Algorithms 10, no. 2: 41. https://doi.org/10.3390/a10020041
APA StyleZhang, Y., Wang, C., & Zhou, X. (2017). RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform. Algorithms, 10(2), 41. https://doi.org/10.3390/a10020041