Next Article in Journal
Reasoning Method between Polynomial Error Assertions
Next Article in Special Issue
Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks
Previous Article in Journal
Optimization and Prediction Techniques for Self-Healing and Self-Learning Applications in a Trustworthy Cloud Continuum
Previous Article in Special Issue
Improving Physical Layer Security of Cooperative NOMA System with Wireless-Powered Full-Duplex Relaying
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis

1
School of Computer Science, University of Petroleum and Energy Studies, Dehradun 248007, India
2
Department of Computer Science, Tennessee Technological University, Cookeville, TN 38505, USA
3
School of Computing, DIT University, Dehradun 248007, India
4
Department of Management, Marketing and Information Systems, University of Alabama in Huntsville, Huntsville, AL 35899, USA
*
Author to whom correspondence should be addressed.
Information 2021, 12(8), 310; https://doi.org/10.3390/info12080310
Submission received: 1 July 2021 / Revised: 24 July 2021 / Accepted: 27 July 2021 / Published: 30 July 2021
(This article belongs to the Special Issue Secure and Trustworthy Cyber–Physical Systems)

Abstract

:
In today’s scenario, image watermarking has been an integral part in various multimedia applications. Watermarking is the approach for adding additional information to the existing image to protect the data from modification and to provide data integrity. Frequency transform domain techniques are complex and costly and degrade the quality of the image due to less embedding of bits. The proposed work utilize the original DCT method with some modifications and applies this method on frequency bands of DWT. Furthermore, the output is used in combination with a pixel modification method for embedding and extraction. The proposed outcome is the improvement of performance achieved in terms of time, imperceptibility, and robustness.

1. Introduction

Image processing is a part of signal processing that takes an input image, processes it, and then generates the required output image or generates an image that satisfies certain characteristics or features. The authenticity of content is also very much important. During the digital processing of an image, content should not be modified or copied. Different techniques are used for providing authenticity of content such as encryption, cryptography, digital signatures, and steganography [1]. However, each has its disadvantages. For example, if an image has been modified then a digital signature can detect that modification, but a digital signature cannot detect the region where it is modified. Encryption does not provide ownership of content.
One way of providing authentication, copyright protection, or ownership identification is to use an image watermarking technique [2]. The original image and desired watermark or logo are embedded using different algorithms. Extraction is a process that usually works in a reverse manner to embedding.
With the rapid growth of the Internet and digital multimedia techniques, digital content can be easily copied and can be modified [3,4]. So as to resolve the illegal use of content and for the protection of ownership of content [5], the security of a watermark can be used.
The watermarking procedure is shown in Figure 1. It comprises of four steps as watermark generation, embedding, attacks, and extraction. Even if an attacker rotates a host image by some degree, the watermark should not be extracted or visible to that person.
The basic process of Watermarking is shown in Figure 2. Due to different types of attacks such as rotation, translation, filtering, adding noise, compression [6] etc., security through watermarking is of prime concern. Techniques in the frequency transform domain are mainly used in copyrights [7]. However, more bits cannot be embedded, as the quality is degraded. Figure 3 shows a visible watermarked image. Techniques of frequency domains are combined with pixel modification techniques in parallel, but they are time-consuming, complex, are not resistant [8] to different types of attacks, and mainly capacity is reduced.
In watermarking, the most important feature is to provide strong robustness, security, and capacity [10]. Watermarking techniques in spatial and frequency transform domains [11] must be resistant to different types of attacks. For example, one image is used as important evidence in a legal or medical case [12]. If someone has made minor changes in that image that cannot be easily detected by human [13] eyes using software such as Photoshop, then this modification will create major changes in such cases. In the event of the images being affected by uncertainties and inaccuracies that affect the overall scenario, fuzzy preprocessing [14,15] is required. Figure 4 shows the classification of Watermarking Techniques based on the type of attacks [16].
This approach proposes a solution that makes modifications to the basic method, and combines that modified method with existing methods that generate an algorithm for embedding and extraction. Different attacks are then applied for measuring performance [9]. The main objective of this work is to propose a modification to basic methods, and to generate a new solution that creates a new algorithm for embedding and extraction by using a hybrid method with modification [17,18]. The results are then compared with the previous existing solutions to differentiate the performance of the proposed method and the existing solutions.
The scope of this study involves the complete implementation of modifications in basic DCT methods and combinations of DWT, modified techniques with pixel modification that eliminate the use of DCT for finding DC components directly in spatial domains, and analyses of the performance.

2. Literature Review

Literature related to various techniques on image watermarking for providing copyright control and ownership identification is discussed in this section.
The author in [19] proposed a hybrid watermarking technique by combining two methods of frequency transform domains i.e., DWT–DCT, which will provide high robustness, provide authentication [20], and compare the results with a cox additive algorithm [21]. This work uses a hybrid watermarking method (DWT–DCT) which per-forms two-level, three level, and four-level DWT followed by respective DCT on host images.
A CDMA digital image watermark is proposed [18], which uses wavelet trans-form, is tested in different color spaces, and detects that the RGB color space is more effective for watermark embedding and extraction.
According to [22], high robustness can be provided by using a technique that is based on a hybrid domain. The watermark is embedded in spatial and transform do-mains in parallel, which provides high robustness and resistance to both image processing and geometric attacks.
In [23], authors presented a method that split the data into two parts for frequency and spatial insertion, based on user preference and data importance, which enhances the performance and embeds the important part in the frequency domain and rest in the spatial domain. First, they have separated the watermark into two parts and insert them into the spatial domain to obtain their spatial coefficients [24]. Next, they have transformed the first part of watermark Hs by applying DCT to obtain DCT coefficients. They have inserted the second part of the watermark into DCT coefficients [23]. Lastly, they have applied IDCT to obtain marked images. The splitting of data doubles the protection, and for more security we can make splitting even more com-plex. The disadvantages of using DCT, are, however, there. A comparative analysis of some of the existing methodologies and their attacks is depicted in Table 1.

Comparison of Existing Methods

All of the methods described above have their advantages and disadvantages. The main aim of watermarking is to provide strong robustness. None of the above techniques provide a solution for finding DC components [20] without applying DCT. None of the techniques of both the domain and their combinational methods provide a complete solution that provides strong robustness against different types of attacks.

3. Proposed Methodology

Different types of methods are used in both domains for image watermarking: Different types of methods are used in both domains for image watermarking: modification of pixel values, LSB-based method, DWT-based watermarking, DCT based watermarking, SVD based watermarking, DWT-DCT-SVD based watermarking, parallel watermarking, etc. A common problem of all of these methods is that they are not resistant to all types of geometric and image processing attacks. Another problem is that these techniques require applying DCT to find DC components.
Hence, the solution to this is a mechanism which makes modifications in a basic method, and eliminates the use of DCT to find DC components. It then applies this modified method to existing methods of DWT, and then according to the new method, modifies DC and changes the pixel values in the watermark according to the modified DC; then, it replaces those watermark bits in the DC components of the host image. Figure 5 shows the workflow for the proposed methodology.
Step I: Modification in the basic method.
The modification in the basic DCT approach is conducted by applying the modification of the LH band of the DWT method. The frequency band is modified with the updated DC values, then further processing is done. The modification of DC components is shown in Figure 6. The embedding and extraction process of modified DC coefficients is depicted in Table 2 and Table 3 respectively.
Step II: Algorithm 1 shows the embeddign process of modified DC coeffiieients.
Algorithm 1: Embedding Algorithm
Step 1—Apply Arnold Transform on the watermarked image.
Step 2—Apply DWT up to two levels on the host image and take the LH band.
Step 3—Apply DWT up to two levels on the watermark image and take the LL band of the watermark image to embed into the LH band.
Step 4—Divide the LH band into 4 × 4 bands.
Step 5—Find the DC coefficient c (0,0) of each block by summing up the pixels values of a particular block.
Step 6—According to the watermark information, find the magnitudes as:
If w = 0
T1 = −0.5∆, T2 = 1.5∆
If w = 1
T1 = 0.5∆, T2 = 1.5∆ where ∆ = block size = 4
Step 7—Find the quantization step as C1 and C2 using T1 and T2 as:
   C1 = αk∆ + T1
   C2 = αk∆ + T2   where α = constant value
Step 8—Modify the DC coefficient c’s of each block for embedding in the DC coefficient as follows:
   c’ (0,0) = C2   if abs c(0,0) − c2 < abs c(0,0) − c1
   =C1   else
Step 9—Find difference M as:
   M = c’i, j (0, 0) − ci, j (0, 0)
Step 10—Add M/4 to each pixel block in the watermark and then replace the particular block’s DC’s value with these values for embedding.
Step 11—Repeat steps 5–10 until all blocks are processed and DC‘s are modified and embedded.
Step III: Algorithm 2 shows the extraction process of the modified DC coefficients embedded in the watermark.
Algorithm 2: Extraction Algorithm
Step 1—Apply DWT up to two levels on the watermarked image.
Step 2—Find the DC coefficient c (0, 0) of each block by summing up the pixels values of a particular block.
Step 3—Using quantization steps ∆, compute w’ (i, j):
     w’ (i, j) = mod (ceil((c(0,0))/∆),α)
Step 4—Extract the watermark by applying an Inverse Arnold Transform.
Step IV: Attacks and Result Comparison.
The attacks are performed on the host image, and then the original and modified values are calculated. Then, a comparative analysis is done. The complete methodology of embedding, extraction, attack and result comparison is shown in Figure 7.

4. Experimental Results

Here, the first modification in basic technique is conducted in the following way. The DC component is directly realized in the spatial domain, which eliminates the use of DCT and IDCT for embedding in the DC component. The MATLAB simulation of modified DC component is shown in Figure 8.
Table 2 and Table 3 shows the calculation of DC component for the Block Image and the final resultant image.

4.1. Embedding and Extraction of 512 × 512-Host Image and 64 × 64 Watermark

The following Figure 9 show the result of the embedding and extraction of the watermark.
Extraction of watermark after applying different types of attacks such as scaling, cropping, adaptive filtering, salt and pepper noise, Gaussian noise, sharpening, etc. is shown in the following figures.
In the Figure 10, the watermarked image is scaled and then the watermark is extracted for checking performance against scaling attacks.
The Figure 11 demonstrate the first watermarked image is cropped from four corners, and then using the proposed extraction algorithm the watermark is extracted after the cropping attack.
Here, the Figure 12 demonstrates the image-filtering attack is applied on the watermarked image, then the watermark is extracted using the proposed method with high NC.
In the Figure 13, the salt and pepper noise is added, and the watermark is extracted by using the proposed method. Comparison is conducted for original and extracted watermarks for measuring normalized correlation. The Table 4 below shows the comparison of extracted watermark from different attacks and the original watermark of size 64 × 64.

4.2. Embedding and Extraction for a Real-Time Host Image Size of 1200 × 1200

For measuring the capacity, different resolution images are used. Different attacks are applied on watermarked images, and then the watermark is extracted after applying the attacks. The different attacks are histogram equalization, Gaussian noise, sharpening, etc. The following Figure 14 show the embedding of a watermark in the real-time image using the proposed method.
Here, in the Figure 15 first histogram equalization attack is applied on a watermarked image and the watermark is extracted using the proposed method, as shown in the figure.
In the Figure 16, Gaussian noise is added and the watermark is extracted after adding noise.
In the Figure 17, the watermarked image is sharpened and then the watermark is extracted using the extraction method.
The following Table 5 compares the extracted watermark with the original watermark, for checking the similarity and for measuring normalized correlation.

5. Results Analysis

Performance of execution of the proposed work is one of the criteria that needs to be considered. In this implementation, an image with a size of 512 × 512 and a watermark with a size of 64 × 64 is considered, and in another case, real-time images of sizes 1200 × 1200 and 128 × 128 are taken as input images for embedding algorithms. The maximum size of the image that can be taken is up to 1200 × 1200, and the watermark size is goes up to 256 × 256 bits.
The first total execution time for embedding and extraction with attacks and without attacks is measured as shown in the following Table 6:
From Figure 18, it has been concluded that the proposed method can be executed in less time even with changing image size, with attacks and without attacks. The watermark is embedded and the mean square error is computed. Comparative analysis of Existing and Proposed methods is shown on the basis of PSNR and MSE in Table 7.
From Figure 19, it has been concluded that the PSNR is high. Acceptable Values of PSNR must be higher than 30 for better visibility. Therefore, in the proposed case, 69.77 is achieved.
Next, different types of attacks are applied such as scaling, cropping, adaptive filtering, salt and pepper noise, Gaussian noise, etc. on watermarked images, and the watermark is efficiently extracted. Normalized correlation is calculated for measuring the correlation. Comparison of existing and proposed method on the basis of NC value is done in Table 8.
Figure 20, shows the different NC values for existing and proposed approaches. The acceptable value of NC should be near to one. The value of one means that the algorithm is very robust against different types of attacks. From the graph, the proposed method is concluded to be the best for all types of attacks. As the size of the host and water-mark image increase, the value of NC decreases, and time of execution also increases.
A Comparative analysis of proposed method with the existing one based on PSNR, MSE, Execution Time and NC value is done in Figure 21. In watermarking, high robustness and resistance to distortion are highly required. In the previous approaches, DWT has been extensively used for watermarking. However, in the LL band frequency, coefficients have high robustness but have a low resistance to distortion, which results in improper watermarking. In the proposed method, the DC coefficients are modified and then the watermarking is conducted in the spatial do-main, which results in both high robustness and higher resistance to distortion that improves the watermarking approach. The proposed method provides higher flexibility and good time–frequency representation. The disadvantages of using DCT are overcome by eliminating the use of DCT for finding DC, which enhances execution time and the mean square error. The proposed method can be used for different resolution images. As the size of the base image and watermark increases, robustness decreases and execution time and mean square errors increase; the peak signal to noise ratio will also increase.

6. Conclusions and Future Enhancement

In this work, different techniques of watermarking are described. Different types of attacks that affect the robustness of images have also been discussed. The presence of a watermark should not distort the quality of the original image. Lots of research has been conducted to design solutions for providing high imperceptibility, strong robustness, more security, and high capacity. In this work, the focus is on providing strong robustness and high capacity. Hence, a modification is conducted to basic technique, and then embedding is performed based on a combination of modified techniques with existing DWT techniques; then, this combined method is used with pixel modification techniques, which enhances the capacity, robustness and imperceptibility, and reduces the total execution time.
Four parameters are analyzed (i.e., MSE, PSNR, NC, time) which show performance improvement of the proposed method. In this system, DWT is combined with a modified method instead of SVD, RDWT, etc. The method can be used and the same approach can also be implemented for video watermarking.

Author Contributions

Conceptualization, R.S. and R.T.; methodology, R.S.; software, R.T.; validation, R.S., R.T., M.G., A.K.Y. and J.P.; formal analysis, M.G.; investigation, R.S. and M.G.; resources, R.T. and A.K.Y.; data curation, R.S. and R.T.; writing—original draft preparation, R.S. and R.T.; writing—review and editing, R.T., M.G. and J.P.; visualization, A.K.Y.; supervision, M.G. and J.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research is partially supported by the NSF Grant 2025682 at Tennessee Tech University.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

DCTDiscrete Cosine Transform
IDCTInverse Discrete Cosine Transform
DWTDiscrete Wavelet Transform
RDWTRedundant Discrete Wavelet Transform
PSNRPeak Signal to Noise Ratio
MSEMean Square Error
NCNormalized Correlation
DC ComponentDirect Current (Average of Pixel Values)
CDMACode Division Multiple Access
RGBRed–Green–Blue
LSBLeast Significant Bit
SVDSingular Value Decomposition
LL BandApproximate image of the input image (Low-Frequency Sub band)
LHHorizontal features of Original Image
HLVertical features of Original Image
HHDiagonal features of Original Image

References

  1. Mane, G.V.; Chiddarwar, G.G. Review Paper on Video Watermarking Techniques. Int. J. Sci. Res. Publ. 2013, 3, 1–5. [Google Scholar]
  2. Chen, T.P.C.; Chen, T. Progressive image watermarking. In Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, New York, NY, USA, 30 July–2 August 2000; IEEE: Piscataway, NJ, USA, 2000; Volume 2, pp. 1025–1028. [Google Scholar]
  3. Lee, J.C. Analysis of attacks on common watermarking techniques. IEEE Electr. Comput. Eng. 2017, 1, 1–7. [Google Scholar]
  4. Khalili, M.; Asatryan, D. Color spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map. IET Signal Process. 2013, 7, 177–187. [Google Scholar] [CrossRef]
  5. Kumar, N.; Kalpana, V. Novel Reversible Steganography Method using Dynamic Key Generation for Medical Images. Indian J. Sci. Technol. 2015, 8, 61–74. [Google Scholar] [CrossRef] [Green Version]
  6. Islam, S.M.; Debnath, R.; Hossain, S.A. DWT Based Digital Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG compression, Cropping and Multiple Watermarking. In Proceedings of the 2007 International Conference on Information and Communication Technology, Dhaka, Bangladesh, 7–9 March 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 7–9. [Google Scholar]
  7. Liu, X. Fractional krawtchouk transforms with an application to image watermarking. IEEE Trans. Signal Process. 2017, 65, 1894–1908. [Google Scholar] [CrossRef]
  8. Srivastava, R.; Srivastava, P. A multimodal-based approach for face and unique mark based combination for confirmation of human. Int. J. Bus. Anal. 2019, 6, 16–28. [Google Scholar] [CrossRef]
  9. Agarwal, H.; Sen, D.; Raman, B.; Kankanhalli, M. Visible watermarking based on importance and just noticeable distortion of image regions. Multimed. Tools Appl. 2016, 75, 7605–7629. [Google Scholar] [CrossRef]
  10. Lin, S.D.; Chen, C.F. A Robust DCT-Based Watermarking for Copyright Protection. IEEE Trans. Consum. Electron. 2000, 8, 415–421. [Google Scholar] [CrossRef]
  11. Singh, A.K.; Sharma, N.; Dave, M.; Mohan, A. A novel technique for digital image watermarking in spatial domain. In Proceedings of the 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, Solan, India, 30 April 2012. [Google Scholar]
  12. Wang, S. A novel DIBR 3D image watermarking algorithm resist to geometrical attacks. Chin. J. Electron. 2017, 26, 1184–1193. [Google Scholar] [CrossRef]
  13. Srivastava, R. Score-Level Multimodal Biometric Authentication of Humans Using Retina, Fingerprint, and Finger vein. IJAEC 2020, 11, 1–16. [Google Scholar]
  14. Versaci, M.; Morabito, F.C.; Angiulli, G. Adaptive Image Contrast Enhancement by Computing Distances into a 4-Dimensional Fuzzy Unit Hypercube. IEEE Access 2017, 5, 26922–26931. [Google Scholar] [CrossRef]
  15. Simi, V.R.; Edla, D.R.; Joseph, J.; Kuppili, V. Parameter-free fuzzy histogram equalization with illumination preserving characteristics dedicated for contrast enhancement of magnetic resonance images. Appl. Soft Comput. 2020, 93, 106364. [Google Scholar] [CrossRef]
  16. Asikuzzaman, M.; Alam, M.; Lambert, A.; Pickering, M. Imperceptible and Robust Blind Video Watermarking using Chrominance Embedding: A Set of Approaches in the DT CWT Domain. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1502–1517. [Google Scholar] [CrossRef]
  17. Budiman, G.; Novamizanti, L.; Iwut, I. Genetics algorithm optimization of DWT-DCT based image Watermarking. J. Phys. 2017, 795, 012–039. [Google Scholar] [CrossRef] [Green Version]
  18. Khan, A.; Siddiqa, A.; Munib, S.; Malik, S.A. A recent survey of reversible watermarking techniques. Inf. Sci. 2014, 279, 251–272. [Google Scholar] [CrossRef]
  19. Qingtang, S. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018, 22, 91–106. [Google Scholar] [CrossRef]
  20. Surbhi, A.M.; Rajesh, K. A Survey on Image Watermarking Techniques. Int. J. Sci. Emerg. Technol. Latest Trends (IJSETT) 2014, 1, 22–26. [Google Scholar]
  21. Jia, S.L. A novel blind color images watermarking based on SVD. Elsevier Int. J. Light Electron Opt. 2014, 125, 2868–2874. [Google Scholar] [CrossRef]
  22. Anjum, S.R.; Verma, P. Performance evaluation of DWT based image watermarking using error correcting codes. Int. J. Advanc. Comput. Res. 2012, 2, 151–156. [Google Scholar]
  23. Devi, B.P.; Singh, K.M.; Roy, S. Dual Image Watermarking Scheme based on Singular Value Decomposition and Visual Cryptography in Discrete Wavelet Transform. Int. J. Comput. Appl. 2012, 50, 6–13. [Google Scholar]
  24. Ramalingam, M. A Steganography Approach over Video Images to Improve Security. Indian J. Sci. Technol. 2015, 8, 79–86. [Google Scholar] [CrossRef] [Green Version]
  25. Chopra, D.; Gupta, P.; Sanjay, G.; Gupta, A. LSB Based Digital Watermarking Technique. Int. J. Appl. 2014, 3, 2319–4847. [Google Scholar]
  26. Shen, X.F.; Ma, X.H. A Watermarking Algorithm for Digital Image Based on DCT and SVD. In Proceedings of the Congress on Image and Signal Processing, Sanya, China, 27–30 May 2008. [Google Scholar]
  27. Cerkezi, L.; Çetinel, G. RDWT and SVD based secure digital image watermarking using ACM. In Proceedings of the 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Turkey, 16–19 May 2016. [Google Scholar]
  28. Chang, C.C.; Tsai, P.; Lin, C.C. SVD-based digital image watermarking scheme. Pattern Recognit. Lett. 2005, 26, 1577–1586. [Google Scholar] [CrossRef]
  29. Arora, S.M. A DWT-SVD based Robust Digital Watermarking for Digital Images. Procedia Comput. Sci. 2018, 132, 1441–1448. [Google Scholar]
  30. Joseph, A.; Anusudha, K. Robust watermarking based on DWT SVD. Int. J. Signal Image Process. 2013, 1, 147–164. [Google Scholar]
  31. Rahman, M. A dwt, dct and svd based watermarking technique to protect the image piracy. Int. J. Manag. Public Sect. Inform. Commun. Techn. (IJMPICT) 2013, 4, 1–12. [Google Scholar] [CrossRef]
Figure 1. A basic model of a watermarking system.
Figure 1. A basic model of a watermarking system.
Information 12 00310 g001
Figure 2. Block diagram of the watermarking process.
Figure 2. Block diagram of the watermarking process.
Information 12 00310 g002
Figure 3. An example of a visible watermarked image [9].
Figure 3. An example of a visible watermarked image [9].
Information 12 00310 g003
Figure 4. Classification of watermarking techniques [16].
Figure 4. Classification of watermarking techniques [16].
Information 12 00310 g004
Figure 5. Proposed workflow.
Figure 5. Proposed workflow.
Information 12 00310 g005
Figure 6. Relation between DC and Spatial Domain.
Figure 6. Relation between DC and Spatial Domain.
Information 12 00310 g006
Figure 7. Proposed embedding, extraction algorithms, attacks, and result comparisons.
Figure 7. Proposed embedding, extraction algorithms, attacks, and result comparisons.
Information 12 00310 g007
Figure 8. Modification based on DCT.
Figure 8. Modification based on DCT.
Information 12 00310 g008
Figure 9. Embedding and extraction using the proposed method for a host image of size 512 × 512 and watermark of size 64 × 64.
Figure 9. Embedding and extraction using the proposed method for a host image of size 512 × 512 and watermark of size 64 × 64.
Information 12 00310 g009
Figure 10. Image scaling attack and extraction of watermark after scaling of watermarked image.
Figure 10. Image scaling attack and extraction of watermark after scaling of watermarked image.
Information 12 00310 g010
Figure 11. Cropping attack and extraction of watermark after cropping a watermarked image.
Figure 11. Cropping attack and extraction of watermark after cropping a watermarked image.
Information 12 00310 g011
Figure 12. Adaptive filtering attack and extraction of watermark after filtering the watermarked image.
Figure 12. Adaptive filtering attack and extraction of watermark after filtering the watermarked image.
Information 12 00310 g012
Figure 13. Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.
Figure 13. Salt and pepper noise on the watermarked image and extraction of the watermark after adding noise.
Information 12 00310 g013
Figure 14. Embedding and Extraction using the proposed method for a real-time host image of size 1200 × 1200.
Figure 14. Embedding and Extraction using the proposed method for a real-time host image of size 1200 × 1200.
Information 12 00310 g014
Figure 15. Applying histogram equalization on the watermarked image and extraction of it.
Figure 15. Applying histogram equalization on the watermarked image and extraction of it.
Information 12 00310 g015
Figure 16. Adding Gaussian noise, and extraction after adding noise.
Figure 16. Adding Gaussian noise, and extraction after adding noise.
Information 12 00310 g016
Figure 17. Sharpened watermarked image and extraction after sharpening of the watermarked image.
Figure 17. Sharpened watermarked image and extraction after sharpening of the watermarked image.
Information 12 00310 g017
Figure 18. Execution time comparison.
Figure 18. Execution time comparison.
Information 12 00310 g018
Figure 19. PSNR and MSE comparisons.
Figure 19. PSNR and MSE comparisons.
Information 12 00310 g019
Figure 20. Normalized correlation comparisons.
Figure 20. Normalized correlation comparisons.
Information 12 00310 g020
Figure 21. Overall performance comparison of the proposed method with existing methods.
Figure 21. Overall performance comparison of the proposed method with existing methods.
Information 12 00310 g021
Table 1. Comparison of existing methods with mathematical terms.
Table 1. Comparison of existing methods with mathematical terms.
NoMethodsInput Image SizeWater
Mark Image Size
AttacksPSNRNCMSE
1LSB [25] based method512 × 512256 × 256Speckle, Gaussian noise, Salt & Pepper noise193.720.59190.94
2DWT-DCT based method [17]512 × 51232 × 32Without attack36.52114.49
AWG noise30.21161.9
3COX [22] method512 × 51232 × 32AWG noise27.19Near to 124.27
4CDMA [20] based watermarking DWT in different color space512 × 512, Leena15 × 64Without attack671-
Salt & Pepper, Gaussian noise JPEG67 DB0.99
5Combined method [26]512 × 51264 × 64Low pass & high pass filtering, Rotation, Shearing, noise, JPEG-2000-1 except in case of scaling & rotation0%
6RDWT + SVD [27]512 × 512512 × 512Noise, filtering, scaling, translation-+1, 0, −1-
7SVD [28]Two 24 bit color images,
512 × 512
32 × 32Without attacks-Near to 1131.01
Filtering, Noise, Rotation, CompressionNear to 1151.87
8DWT [29]512 × 512128 × 128JPEG, Noise, Rotation, Re watermark, Cropping171.09Min-0.70-
Max-0.99
9SVD [30] +512 × 51264 × 64Noise, filtering, scaling, translation, Blurring64.570.96 (averaged)-
10DCT +
DWT + SVD [31]
512 × 512128 × 128JPEG, Noise, Rotation, Re-watermarking, Cropping45.770.9983-
Table 2. Calculation of DC Coefficient.
Table 2. Calculation of DC Coefficient.
Block Image{1,1}, 4 × 4 Double
Pixel1234
149494751
247505252
350495153
449545147
Table 3. Modified DC Coefficient.
Table 3. Modified DC Coefficient.
Resulted Image1, 512 × 512 uInt8
Pixel1234
153535155
251505252
354495153
453545147
Table 4. Comparison of extracted watermark with original watermark of size 64 × 64.
Table 4. Comparison of extracted watermark with original watermark of size 64 × 64.
Original WatermarkExtracted Watermark
ScalingCroppingAdaptive filteringSalt & Pepper noise
Information 12 00310 i001 Information 12 00310 i002 Information 12 00310 i003 Information 12 00310 i004 Information 12 00310 i005
Table 5. Comparison of extracted watermark with original watermark of size 128 × 128.
Table 5. Comparison of extracted watermark with original watermark of size 128 × 128.
Original WatermarkExtracted Watermark
Histogram EqualizationGaussian noiseSharpening
Information 12 00310 i006 Information 12 00310 i007 Information 12 00310 i008 Information 12 00310 i009
Table 6. Execution time comparison.
Table 6. Execution time comparison.
MethodsExecution Time (Sec)Execution Time (Sec) with Attacks
DWT [29]4.129.01
DWT + SVD [30]7.366.67
Proposed method for host image of 512 × 5120.971.03
Proposed method for host image of 1200 × 12004.075.6
Table 7. Results comparison of PSNR and MSE.
Table 7. Results comparison of PSNR and MSE.
MethodsPSNRMSE
DWT [29]45.811.65
DWT + SVD [30]10.051.62
RDWT + SVD [27]23.006-
New wavelet-based method using bio-inspired optimization principles30.122.66
Proposed method for host image of 512 × 51269.770.0066
Proposed method for host image of 1200 × 120069.770.0089
Table 8. Results comparison of NC for different types of attacks.
Table 8. Results comparison of NC for different types of attacks.
AttacksDWT [29]DWT +
SVD [30]
RDWT +
SVD [27]
New Wavelet-Based Method Using Bio-Inspired Optimization PrinciplesImage of 512 × 512Image of 1200 × 1200
Scaling × 0.50.5750.820.670.900.9924030.98
Scaling × 20.570.82030.670.920.9924080.985442
Cropping0.5710.801-0.850.9923940.985464
Adaptive Filtering0.57550.80120.870.900.9854520.946562
Histogram Equalization0.57650.8201-0.860.9855030.946555
Salt and Pepper Noise0.57570.820.890.900.9854730.946542
Gaussian Noise0.55120.8310.840.910.9854190.946542
Sharpening0.520.7910.930.890.9854730.946563
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Srivastava, R.; Tomar, R.; Gupta, M.; Yadav, A.K.; Park, J. Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Information 2021, 12, 310. https://doi.org/10.3390/info12080310

AMA Style

Srivastava R, Tomar R, Gupta M, Yadav AK, Park J. Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Information. 2021; 12(8):310. https://doi.org/10.3390/info12080310

Chicago/Turabian Style

Srivastava, Rohit, Ravi Tomar, Maanak Gupta, Anuj Kumar Yadav, and Jaehong Park. 2021. "Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis" Information 12, no. 8: 310. https://doi.org/10.3390/info12080310

APA Style

Srivastava, R., Tomar, R., Gupta, M., Yadav, A. K., & Park, J. (2021). Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Information, 12(8), 310. https://doi.org/10.3390/info12080310

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop