1. Introduction
Currently, digital watermarking has become a way to embed information into an image and protect it from unauthorized access and manipulation. Depending on digital content such as video, image, audio, and text and the application, algorithms can be developed for authentication, material security, trademark protection, and the tracking of digital content. The objective is to insert a watermark (digital image or text) into the digital content. There are important requirements to take into account when a watermarking algorithm is designed: imperceptibility, robustness, security, capacity, and computational cost. It is difficult to have an algorithm that embraces all requirements due to robustness, which refers to the ability to withstand image distortions that may compromise the imperceptibility of the watermark. Because of that, different techniques have been developed in order to improve robustness without compromising the original content. The state-of-the-art suggests that these algorithms can be designed in the spatial, transform, or hybrid domain. Thus, the algorithms alter the marked pixels to embed the watermark in the intensity domain of the image. The advantage of this is low computational complexity; however, the image suffers visible alterations, and the algorithm does not possess robustness against geometric transformations. In the transform domain, the watermark is embedded within specific elements to ensure enhanced resilience. Furthermore, the transforms can be combined to have hybrid domain watermarking. These kinds of methods increase the performance of the watermarking technique.
Therefore, in a watermarking image method, the watermark must be robust and imperceptible or perceptible, depending on the application. In this paper, we propose a hybrid, robust, and imperceptibility watermarking approach using the Hermite Transform (HT), Singular-Value Decomposition (SVD), the Human Vision System (HVS), and the Discrete Cosine Transform (DCT) to protect digital images. As watermarks, we used a digital image LOGO and image MetaData (with information about the original image or the owner), so we inserted two different digital contents into a digital image. The Hermite transform is based on the Gaussian function derivatives, and it incorporates human visual system properties, so it allows a perfect reconstruction of the image. To have more security, the LOGO is encrypted using the Jigsaw Transform (JST) before inserting. In addition, the indexes to decrypt the LOGO are secured using the Elementary Cellular Automaton (ECA), increasing the security of the proposal. In addition, the image MetaData are secured using a random sequence generator and the XOR operation. Finally, the Hamming error correcting code was applied to the image MetaData to reduce channel distortion.
The rest of the paper is divided as follows:
Section 2 presents the related work describing the image watermarking methods using the DCT and SVD techniques and other space–frequency decomposition methods similar to the HT. We describe all the elements used to design the watermark algorithm such as the public dataset, JST, SVD, HT, DCT, HVS, and Elementary Cellular Automata (ECA) in
Section 3.
Section 4 details the proposed watermarking algorithm for the insertion/extraction of the watermarks. In
Section 5, we report the experiments and results obtained in the insertion and extraction stages of the watermarks, including the computational complexity of the algorithm. In addition, we report the robustness analysis of the proposed method against the most-common processing and geometric attacks using the public image datasets, and we compare the algorithm with other methods of the state-of-the-art.
Section 6 includes an analysis of the achieved results in this study, along with a comparison to other related works. Finally,
Section 7 presents the conclusions and future work.
2. Related Work
There are many methods for watermarking images presented in the literature, and depending on the application, the requirements of the methodologies vary. The algorithms designed for watermarking have advantages and disadvantages. The most-representative work is in the transformation domain. For example, in Mokashi et al. [
1], a strategy for watermarking images was introduced, which combines the Discrete Wavelet Transform (DWT), Discrete Cosine Transform, and Singular-Value Decomposition. The watermarks utilized in this approach are the users’ biometrics and their signature. During the embedding process, the biometrics acts as the host image, while the signature serves as the watermark. In contrast, for a second embedding process, the resulting watermark of the first process is embedded into the primary host image. In both embedding processes, the host image undergoes decomposition using the DWT, and the watermark is inserted inside the low-frequency coefficient by means of SVD.
In [
2], Dharmika et al. preserved medical records by incorporating them into Magnetic Resonance Imaging (MRI) patient scans. The authors used the Advanced Encryption Standard (AES) to secure the medical records and SVD to compress the MRI scan reports. Then, the DCT was applied to embed the encrypted medical health record over the compressed MRI scan.
Sharma et al. [
3] presented a combined approach for watermarking images using a resilient watermark (frequency domain) through the DWT and DCT and a fragile watermark (spatial domain). In the robust watermark, the Fisher–Yates shuffle method was used to scramble the watermark, and the LH and HL sub-bands were used to embed the watermark. On the other hand, a bitwise approach was used for the fragile watermark, including a halftoning operation in conjugation with the XOR and concatenation operations. In addition, a fragile watermarking method was used to perceive and locate the manipulated regions through the XOR operator in the extraction stage.
Nguyen [
4] proposed a fragile-watermarking-based approach using the DWT, DCT, and SVD techniques. The watermark was inserted into the low-frequency coefficient of the DWT using the Quantization Index Modulation (QIM) technique, and the feature coefficients were adjusted using the Gram–Schmidt procedure. Besides, a tamper detection process under different attacks was incorporated.
In [
5], Li et al. introduced an encryption/watermarking algorithm using the Fractional Fourier Transform (FRFT) in a hybrid domain. The Redistributed Invariant Wavelet Transform (RIDWT) and Discrete Cosine Transform (DCT) were applied to the enlarged host image. The resulting low-frequency and high-frequency components underwent SVD, and the watermark image was subjected to double-encryption using the Arnold Transform (AT). To achieve adaptive embedding, multi-parameter Particle Swarm Optimization (PSO) was utilized.
Alam et al. [
6] reported a frequency-domain-based approach using the DWT and DCT and applying a two-level singular-value decomposition and a three-dimensional discrete hyper-chaotic map. The HH sub-band of the DWT was used to incorporate the watermark, which contains some image parameters, and it was encrypted through the Rivest–Shamir–Adleman (RSA), AT, and SHA-1 techniques.
Sharma and Chandrasekaran [
7] investigated the robustness of popular image watermarking schemes using combinations of the DCT, DWT, and SVD, as well as their hybrid variations. These approaches were evaluated against traditional image-processing attacks and an adversarial attack utilizing a Deep Convolutional Neural Network (CNN) and an Autoencoder (CAE) technique.
In [
8], Garg and Kishore analyzed various watermarking techniques to test robustness, imperceptibility, security, capacity, transparency, computational cost, and the false positive rate. The methods studied were classified into multiple categorizations of watermarking: perceptibility (visible and invisible watermark), accessibility (private and public), document type (text, audio, image, video), application (copyright protection, image authentication, fingerprinting, copy and device control, fraud and temper detection), domain-based (spatial domain, transform/frequency domain), type of schema (blind and non-blind), and cover image. The techniques analyzed were tested against several attacks: image-processing, geometric, cryptographic, and protocol attacks, using the more-representative evaluation measures, for example the PSNR, NCC, BER, and SSIM.
Zheng and Zhang [
9] proposed a DWT-, DCT-, and SVD-based watermarking method to address common watermarking and rotation attacks. The scrambled watermark was inserted into the LL sub-band. In addition, the authors signed the
U and
V matrices to avoid the false positive problem.
In [
10], Kang et al. reported a hybrid watermarking method of grayscale images based on DWT, DCT, and SVD for later embedding the watermark into the LH and HL sub-bands. Multi-dimensional PSO and an intertwining logistic map were used as the optimization algorithms and encryption models for watermarking robustness enhancement.
Taha et al. [
11] evaluated two watermarking methods, a DWT based and an approach using the Lifting Wavelet Transform (LWT) under the same watermark and embedding it into the middle-frequency band. The results showed that, in terms of objective image quality, the LWT method outperformed the DWT method, whereas the DWT watermarking technique exhibited superior resilience against various attacks compared to the LWT approach.
Thanki and Kothari [
12] proposed a watermarking technique using human speech signals as the watermark. For this, the watermark’s hybrid coefficients were derived using the DCT and subsequently subjected to SVD. Then, these coefficients were inserted into the coefficients of the host image, which were generated by a DWT followed by a Fast Discrete Curvelet Transform (FDCuT).
In [
13], Kumar et al. presented a DWT-, DCT-, and SVD-based watermarking method. In addition, security was accomplished through a Set Partitioning in a Hierarchical Tree (SPIHT) and by the AT.
Zheng et al. [
14] proposed a zero-watermarking approach applied to color images using the DWT, DCT, and SVD, taking advantage of the multi-level decomposition of the DWT, the concentration of the energy of the DCT, and the robustness of the SVD. Due to three color channels being used to embed the watermark, it was extracted by a voting strategy.
In [
15], Yadav and Goel presented a composed watermarking proposal that involved DWT ad DCT analysis and an SVD approach to insert binary watermarks. The approach was image-adaptive, which identified blocks with high entropy to determine where the watermark should be embedded.
Takore et al. [
16] reported a watermarking hybrid approach for digital images using LWT and DCT analysis and an SVD technique. Their proposal applied the Canny filter to identify regions with a higher number of edges, which were used to create two sub-images. These sub-images served as the reference points for both the embedding and extracting stages. Moreover, during the marking stage, the method used Multiple Scaling Factors (MSFs) to adjust various ranges of the singular-value coefficients. Kang et al. [
17] reported a watermarking schema in digital images through a composed method applying DCT and DWT analysis and an SVD approach. In addition, the method used a logistic chaotic map.
Sridhar [
18] proposed a scheme that protected the information with an adjustable balance between image quality and watermark resilience against image-processing and geometric attacks. The method was based on the DWT, DCT, and SVD techniques and provided an adaptive PSNR for the imperceptibility of the watermarks.
Madhavi et al. [
19] investigated different digital watermarking schemes, comparing the protection and sensible limit. Moreover, the authors introduced a combined watermarking technique that leveraged the advantages of multiple spatial–frequency decomposition approaches such as the DWT and DCT, robust insertion analysis such as SVD, and security such as the AT.
Gupta et al. [
20] used a cryptographic technique called Elliptic Curve Cryptography (ECC) in a semi-blind strategy of digital image watermarking. The proposed watermarking method was implemented within the DWT and SVD domain. Furthermore, the parameters of the entropy based on the HVS were calculated on a blockwise basis to determine the most-appropriate spatial locations.
Rosales et al. [
21] presented a spectral domain watermarking technique that utilized QR codes and QIM in the YCbCr color domain, and the luminance channel underwent processing through SVD, the DWT, and the DCT to insert a binary watermark using QIM.
In [
22], El-Shafai et al. presented two hybrid watermarking schemes for securing 3D video transmission. The first one was based on the SVD in the DWT domain, and the second scheme was based on the three-level discrete stationary wavelet transform in the DCT domain. In addition, El-Shafai et al. [
23] proposed a fusion technique utilizing wavelets to combine two depth watermark frames into a unified one. The resulting fused watermark was subsequently secured using a chaotic Bakermap before being embedded in the color frames of 3D-High-Efficiency Video Coding (HEVC).
Xu et al. [
24] introduced a robust and imperceptible watermarking technique for RGB images in the combined DWT-DCT-SVD domain. Initially, the luminance component undergoes decomposition using DWT and DCT. The feature matrix is generated by extracting the low and middle frequencies of the DCT from each region, which is subsequently subjected to SVD for watermark embedding.
In [
25], Ravi Kumar et al. reported an image watermarking algorithm using hybrid transforms. In this approach, using SVD analysis, the decomposition of the image watermark was embedded in the decomposition of the cover image using the Normalized Block Processing (NBP) to obtain the invariant features. Then, the integer wavelet transform was applied, followed by the DCT and SVD.
In [
26], Magdy et al. provided an overview of the watermarking techniques used in medical image security. The authors described the elements to design a watermarking algorithm. Furthermore, they presented a brief explanation of cryptography, steganography, and watermarking. Regarding watermarking, they took as an example different algorithms such as that in [
27], where Kahlessenane et al. presented a watermarking algorithm to ensure the copyright protection of medical images. They used as the watermark patient information and used the DWT. The results showed high PSNR values (147 dB), demonstrating the imperceptibility of the watermark and the robustness of the method against attacks. However, they did not present any results about the extraction process.
In the paper [
28], Dixit et al. described a watermarking algorithm using thirty different images and used two watermarks: one of them to authenticate (fragile), and the other one focused on robustness (information watermark). To insert the authentication watermark, they used the DCT, and for the information watermark, the process included the DWT and SVD. The results showed robustness for Salt and Pepper (SP) noise, rotation, translation, and cropping (even though the PSNR of the recovered watermark was low). The same authors proposed another watermark algorithm in [
29]. This algorithm was non-blind and used the LWT on the cover image to decompose the image into four coefficient matrices; with this transform, the image had better reconstruction. Furthermore, the authors employed the DCT and SVD. The authors reported better robustness and mentioned that they reduced the time complexity of traditional watermarking techniques. The results showed high PSNR values (about 200 dB) without attacks. They applied different attacks, compared their technique with other techniques, and demonstrated that their technique had better robustness. They did not include the watermarks extracted. Therefore, to evaluate different techniques and compare them, some papers focused on describing different watermarking algorithms. For example, Gupta et al. [
30] explained that, to achieve the security of digital data, it is necessary to improve the watermarking techniques and to provide better robustness. The authors clarified that several algorithms utilize SVD to enhance the quality aspect of the embedded image, aiming to increase its resilience against various signal-processing attacks. The authors presented different metrics that are possible to use to evaluate different techniques and different transformations that researchers use commonly.
In [
31], Mahbuba Begum et al. presented a combined bling digital image watermarking method using the DCT and DWT as spatial–frequency decomposition and SVD analysis to ensure all requirements, according to the authors, that a watermarking algorithm must satisfy, for example imperceptibility, safety, resilience, and capacity of the payload. As a watermark, they used a digital image and encrypted it with the Arnold map. They presented results using only one image and only one watermark.
D. Rajani et al. [
32] proposed a new technique called the Porcellio Scaber Algorithm (PSA). They explained that, with this algorithm, the visual perception of the extracted watermark was good and, at the same time, maintained robustness. Their proposal was a bling watermarking and used a redundant version of the DWT (RDWT), DCT, and SVD. In addition, they embedded a LOGO into the host image. They reported a high PSNR value of
dB in the watermarked image (
Lena).
Other hybrid algorithms were developed by Wu, J.Y. et al. [
33,
34]. On the one hand, in [
33], they presented a scheme using SVD (to improve robustness), the DWT, and the DCT. Their proposal included a process to encrypt the watermark by an SVD ghost imaging system. As a watermark, they used a digital image with a size of
. The authors did not indicate the parameters of the attacks that they employed to evaluate their method. On the other hand, in [
34], a watermarking method using a decomposition by the DWT of four levels in conjunction with an SVD analysis was presented. They proposed four levels of the DWT to significantly enhance the imperceptibility and the robustness of the method. The evaluation of the algorithm showed good results using the PSNR, NCC, and SSIM. As a watermark, they used a digital image with a size of
.
Seif Eddine Naffou et al. described in [
35] a hybrid SVD-DWT. They explained that the Human Visual System (HVS) is less sensitive to high-frequency coefficients, so they chose them to insert the watermark and to avoid poor results when extracting the watermark, they aggregated SVD.
As we can see, different watermarking algorithms for digital images have been developed for copyright protection, and the majority are focused on the principal problem, which is robustness. In this paper, a watermarking method including imperceptibility, robustness, watermark capacity, and computational cost for copyright protection is presented.
6. Discussion
The experiments and results demonstrated that the image watermarking method based on SVD, the HVS, the HT, and the DCT is a robust and secure technique with the capacity to insert two different watermarks, the image LOGO and the image MetaData, in plaintext format containing information about the cover image or the image’s owner. Compared with the majority of the state-of-the-art proposals, we had an advantage because they only used one watermark.
The evaluation of the algorithm was presented by applying different attacks (processing and geometric operations), using two watermarks, inserting both at the same time, and 49 digital images. We used four different metrics to demonstrate that the watermarked images did not suffer visual alterations and that the watermark extracted, in the majority of cases, was recovered perfectly.
To have an imperceptible and robust algorithm, our proposal is a hybrid approach because we used the Hermite Transform (HT), Singular-Value Decomposition (SVD), the Human Vision System (HVS), and the Discrete Cosine Transform (DCT), and to have major security, we encrypted the watermark. On the one hand, we encrypted the watermark (LOGO) by combining the Jigsaw transform and ECA. On the other hand, we applied a Hamming error-correcting code to the MetaData, to reduce channel distortion.
The insertion process (
Figure 10) shows all the elements we considered. First, we applied the HT to the original image, because this transform guarantees imperceptibility. We chose the low-frequency coefficient and divided it into blocks of size 4 × 4. Then, to determine the best regions (with more redundant information) to insert the watermark, we used a combination of entropy and edge entropy (HVS analysis).
Figure 11b shows an example highlighting the most-suitable regions to insert the watermark. This HVS analysis was applied to each block, and then, we used the DCT (this transformation demonstrated greater effectiveness when applied to smaller block sizes). To insert the watermark, we used SVD because, as we explained, the SVD of a digital image in the majority of cases is rarely affected by various attacks. We inserted the watermark into
S coefficients. Finally, we applied the IDCT, and the blocks were joined to calculate the inverse HT. An important element to take into account is the scaling factor
because it defines the imperceptibility and robustness of the watermarking method. Both insertion and extraction processes were similar. Therefore, the proposed method is symmetric, and the extraction stage applied the inverse operations to those used in the insertion.
To probe the effectiveness of this method, we applied the insertion and extraction process to 49 different digital images, evaluated its robustness against attacks, and compared it with other methods. To probe the quality of our algorithm, we used typical metrics employed in this kind of application (MSE, PSNR, SSIM, MSSIM, NCC, and BER). For the original image, the watermarked image, the original watermark (LOGO), and the extracted watermark, we employed the metrics that indicated if an image had suffered visual alterations or if two images were equal, and in the case of the MetaData, we calculated the BER to measure how many bits were modified in the recovered watermark. The metrics’ values of
Table 2 demonstrated that the watermarked images did not have visual modifications and the extracted watermarks (LOGO and MetaData) were the same as the originals. Furthermore, we presented the results of six representative images (
Table 3). In all cases, the extracted watermark (LOGO) and MetaData were equal to the original. The watermarked image did not have visual modifications, although the worst MSE was obtained with the
Cameraman image (MSE = 9.9479). Therefore, this algorithm guarantees imperceptibility and perfect extraction.
To evaluate the algorithm regarding the robustness, we probed it with the majority of attacks that are common in watermark applications. In total, we applied 11 attacks (common processing and geometrics). From
Table 4, we can see that, for four attacks,
Gaussian noise,
SP noise,
scaling, and
contrast enhancement, the watermark could be recovered perfectly without errors, while for the rest of the attacks, the metrics’ values indicated that the extracted watermark could have some difference in comparison with the watermarked original. However, this difference did not prevent the identification of the LOGO; however, it was clear that the modification of the bits in the MetaData did change its meaning. However, if one of the two watermarks is clear, we can validate the method. The worst cases to recover the watermark were when we applied the
cropping and
rotation attacks.
Finally, in comparison with other similar algorithms, it is clear that our proposal presented equal or higher values for all metrics (
Table 6). It is important to note that it was difficult to compare with other proposals because, in some cases, we used stronger attacks. Therefore, we presented the outcomes of the algorithms employing identical parameters to ours (
Table 8,
Table 9,
Table 10,
Table 11,
Table 12,
Table 13 and
Table 14). Is clear that our method had better robustness and watermark capacity. Another difficulty was comparing with other methods, but using different images, because this depended on the published results for each research work. Therefore, from the state-of-the-art evaluation, we could select some of them that presented tests using different images from the
Lena image.
7. Conclusions and Future Work
We presented a robust and invisible hybrid watermark algorithm for digital images in the transformed domain. We proposed a combination of the HT, DCT, and SVD techniques to have more robustness and imperceptibility for the watermarked images. With our proposal, it was possible to use as a watermark both the digital image information (LOGO) and information about the owner (MetaData) and insert them at the same time. In the state-of-the-art, we reported algorithms that use as a watermark only digital images or information about the owner, and their robustness is better because the watermark has less information. Therefore, we integrate different mathematical tools to insert two different watermarks without compromising imperceptibility and robustness. In addition, we included an encryption process to have more security, which could have a thorough performance analysis in future work.
With tests and results, we demonstrated that our technique is robust to the majority of attacks used to prove it. The parameters that we considered to apply the attacks, in some cases, were stronger than the parameters employed by other proposals. In
Table 4, we present each attack that we applied and its parameters, indicating the value of each metric obtained after applying the algorithm. The results showed that, on the one hand, with
Gaussian and
SP noises, the
scale attack, and
contrast enhancement, our proposal had excellent performance because, in all cases, the watermark extracted did not have errors and the watermarked image did not present visual modifications. On the other hand, the worst results were obtained when we applied the
rotation and
cropping attacks, because it was not possible to extract the watermark in some cases.
In terms of the comparison with other proposals, as we explained in
Section 5.6, our results were better in all cases (
Table 6). It is important to note that, despite the fact that some papers [
6,
29,
32] reported PSNR values above 60 dB, this factor does not ensure robustness. In our case, all metrics showed that our method was robust, secure, and ensured high imperceptibility, making it suitable for effective copyright protection.
As future work, we believe that is necessary to improve the algorithm for the rotation and cropping attacks, because, of all the attacks, only these were the ones that it did not overcome. In addition, we will carry out a thorough analysis of the JST with the ECA for the encryption of the image watermarking, and we will explore a combined watermarking/encryption approach to insert information into a host image and encrypt it in the frequency domain.