Next Article in Journal
Single Cell Center of Mass for the Analysis of BMP Receptor Heterodimers Distributions
Previous Article in Journal
A Review of Modern Thermal Imaging Sensor Technology and Applications for Autonomous Aerial Navigation
Previous Article in Special Issue
Deep Features for Training Support Vector Machines
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hybrid Robust Image Watermarking Method Based on DWT-DCT and SIFT for Copyright Protection

1
LIB EA 7534, Faculté des Sciences Mirande, 9 Avenue Alain Savary, BP 47870, 21078 Dijon, France
2
Higher School of Technology, Mohammed V University in Rabat, Rabat 1040, Morocco
3
Faculté des Lettres et des Sciences Humaines, Mohammed V University in Rabat, Rabat 1040, Morocco
*
Author to whom correspondence should be addressed.
J. Imaging 2021, 7(10), 218; https://doi.org/10.3390/jimaging7100218
Submission received: 13 July 2021 / Revised: 16 September 2021 / Accepted: 17 September 2021 / Published: 19 October 2021
(This article belongs to the Special Issue Deep Learning for Visual Contents Processing and Analysis)

Abstract

:
In this paper, a robust hybrid watermarking method based on discrete wavelet transform (DWT), discrete cosine transform (DCT), and scale-invariant feature transformation (SIFT) is proposed. Indeed, it is of prime interest to develop robust feature-based image watermarking schemes to withstand both image processing attacks and geometric distortions while preserving good imperceptibility. To this end, a robust watermark is embedded in the DWT-DCT domain to withstand image processing manipulations, while SIFT is used to protect the watermark from geometric attacks. First, the watermark is embedded in the middle band of the discrete cosine transform (DCT) coefficients of the HL1 band of the discrete wavelet transform (DWT). Then, the SIFT feature points are registered to be used in the extraction process to correct the geometric transformations. Extensive experiments have been conducted to assess the effectiveness of the proposed scheme. The results demonstrate its high robustness against standard image processing attacks and geometric manipulations while preserving a high imperceptibility. Furthermore, it compares favorably with alternative methods.

1. Introduction

The growth of digital information technologies makes their distribution and duplication much easier. Therefore, the necessity to design secure techniques has increased in the last few decades. Digital image watermarking has been found to be an effective solution for copyright protection of images [1]. Its basic procedure is to embed imperceptible information, termed watermark, in the original image. Thus, the copyright of the image can be provided by extracting the embedded secret watermark.
Three main properties are required in image watermarking systems [2]: imperceptibility, capacity, and robustness. Imperceptibility refers to the fact that the watermarked image should look identical to the original one. Capacity represents the maximum number of bits embedded in the original image. It is the primary constraint that should be ensured after imperceptibility [3] in high-capacity methods. Indeed, in this category of techniques, a considerable quantity of information should be embedded without losing image quality. In the copyright protection methods, this constraint is less critical, but it can influence the results in terms of robustness of imperceptibility, especially when the watermark size is too big. Robustness refers to the ability to detect the watermark even if the watermarked image suffered from several manipulations called attacks. A good watermarking scheme should ensure the best trade-off between these three properties. Indeed, generally, with the increase of capacity, the robustness of the image decreases while simultaneously decreasing its imperceptibility and vice versa. The main objective of the proposed method is copyright protection. Therefore, capacity is not a primal issue. Indeed, the main requirements for copyright protection applications are imperceptibility and robustness.
Watermarking schemes can be categorized according to embedding domain, extracting technique, watermark robustness. The embedding domain can be spatial or a transform domain. Spatial methods [4] embed the watermark by directly altering the pixels, while the transform domain methods embed the watermark after performing a transformation, such as DFT [5,6], DCT [7], DWT [8]. The extraction method can be a non-blind, or semi-blind, or a blind technique. The non-blind methods [9] require the original image in the extraction process. The semi-blind methods need the watermark and some side information. The blind techniques [10] need only the secret key to extract the watermark. In terms of robustness, the watermarking technique can be fragile [11], semi-fragile [12] or robust [13,14]. Fragile watermarking schemes are designed to be weak to attacks, including malicious tampering and common processing. They have been proposed specifically for integrity verification and image authentication [15]. Semi-fragile techniques are used with the aim of detecting any unauthorized modification while resisting some image-processing operations [16,17]. Robust watermarking methods designed for copyright protection should resist a wide variety of common attacks, especially malicious attacks, including filtering, noise, lossy compression, geometric attacks, etc.  [18,19]. In copyright protection applications, there is no need to share the side information (secret key, scale-invariant feature transformation (SIFT) descriptor, etc.) [20]. Indeed, the owner of the image is the only one who needs to possess this information. In case of dispute, he uses it to prove the ownership of the image [4,21].
In this paper, a SIFT-based robust watermarking method using DWT and DCT is proposed. The DWT is used due to its excellent spatial localization and multiresolution characteristics, which are similar to the human visual system (HVS) [22]. The reason behind using DCT is its strong energy compaction property [23] and good robustness against common image processing attacks. Thanks to the combination of these two techniques, the proposed method can withstand common signal processing attacks such as filtering, noise and JPEG compression, among others. Furthermore, the use of SIFT ensures robustness against geometric attacks. SIFT is used in the extraction stage to correct the geometric attacks, including rotation, translation, and scaling. The watermark is inserted in the DCT middle band of the HL first level DWT band of the original image. In fact, for each block 8 × 8 , it consists of modifying 22 middle band DCT coefficients of the LH first level of DWT band. The extraction process is quite simple. It is sufficient to calculate the SIFT features to synchronize the attacked image to correct geometric attacks. The scheme is semi-blind since the SIFT descriptor is needed in the extraction process. Thanks to its resistance against RST attacks, the SIFT descriptor has been used in order to resist geometric attacks. Afterward, the watermark bits are extracted using the inverse processing of embedding. We note that a securing step can be incorporated in the proposed watermarking scheme using Arnold transform [24] or a more sophisticated cryptographic technique [25]. We note that the method is blind if no-geometric distortions are performed because no extra side information is necessary for the extraction phase. Only the secret key is needed to extract the watermark.
The proposed method has been compared to the state-of-the-art methods. The main criteria guiding the choice of alternative methods is to perform a fair comparison with similar methods presenting a comparable level of complexity. Hybrid methods combining several transformations [26,27,28], as well as SIFT based methods [13,29], are used for comparative evaluation, while [21] has been used since it has the same application as the proposed method (copyright protection).
The rest of this paper is as follows. Section 2 presents the related works. In Section 3, SIFT, DCT, and DWT are briefly explained. Section 4 describes the proposed watermarking method in details. Section 5 discusses the experimental results. Finally, the conclusion is given in Section 6.

2. Previous Work

The state-of-the-art image watermarking methods discussed in this paper can be classified into three categories: single transform-based method, hybrid transform-based methods, and scale-invariant methods.
In [21], the authors proposed a digital image watermarking method based on singular value decomposition (SVD). Firstly, the SVD is applied to the original image to obtain the orthogonal matrices U and V and the diagonal matrix S. Then, the watermark is embedded into the diagonal matrix S additively. The watermarked image is reconstructed using the modified matrices Sw Uw and Vw. Experimental results show that the method gives good results in both security and robustness against several attacks, such as compression, filtering, noise, cropping, etc.
In [30], an image watermarking method using contourlet transform along with singular value decomposition is proposed. In the embedding, the contourlet transform is applied to the original image, and the coefficients are modified by combining singular values of the selected direction with singular values of the watermark. The technique gives good imperceptibility results and is robust against several attacks. The method proposed by Amini et al. [31], presented a robust multiplicative watermark decoder using vector-based hidden Markov model in the wavelet domain is proposed. The results show good resistance to attacks and ensure a good imperceptibility. Based on single transformations, several transforms can be used as watermarking primitives. In [32], the authors proposed a color image watermarking scheme using quaternion polar harmonic transform (QPHT) with a maximum likelihood decoder. The watermark is embedded into the QPHT magnitudes using a multiplicative approach. The method ensures both imperceptibility and robustness. In [33], a color image watermarking scheme in the sparse domain is presented. The method considers the inter-channel dependencies between RGB channels and inter-scale dependencies of the sparse coefficients of color images by employing the hidden Markov model.
The main objective of the majority of existing watermarking schemes is to provide good robustness against several attacks preserving at the same time a high imperceptibility. Hybrid methods generally perform better than single transform methods. As a consequence, the need to develop these methods that combine two transforms to achieve this aim has increased considerably. Several hybrid methods have been proposed in the literature [34,35,36,37,38].
In Lagzian’s method [26], singular values of the redundant discrete wavelet transform (RDWT) are modified to insert the watermark. Makbol et al. [27] proposed a hybrid method based on integer wavelet transform (IWT) and singular value decomposition (SVD). The authors embed the watermark in the singular values of the first level of IWT.
Singh et al. [28] proposed a hybrid semi-blind method in the redundant wavelet domain. The authors take advantage of the shift-invariance of “RDWT” and nonsubsampled contourlet transform (NSCT) to avoid the shift sensitivity of the classical wavelet transforms. The watermark is inserted by modifying the SVD coefficients in the RDWT-NSCT domain.
Hybrid schemes are generally very robust against a wide range of attacks, especially image processing operations, since they exploit the benefits of two or more transformations to achieve watermarking robustness. Nevertheless, the majority of these methods show weakness to geometric attacks. To overcome this issue, methods using invariant descriptors like SIFT [39] and SURF [40] have been widely used. SIFT has been extensively proposed for image watermarking against geometric attacks [13,41,42,43]. In [41], a robust scheme against resolution scaling has been proposed. First, a watermark zone selection algorithm is performed to get the candidate pixel locations that are to be modified. Afterward, SIFT features, which act as a watermark, are extracted and registered. Then, a patch is embedded in the image such that it gives robust SIFT features.
In [42], the watermark is embedded into the circular patches invariant to scaling and translation, generated by the SIFT descriptor. The authors take advantage of the polar-mapped circular patches to ensure rotation invariance.
A rotation, scale, and translation invariant watermarking scheme based on discrete Tchebichef transform (DTT), singular value decomposition (SVD), and scale-invariant feature transform (SIFT) is proposed [44]. The DTT coefficients of the image are arranged similarly to the sub-band scheme generating LL, HL, LH, and HH sub-bands. The principal components of the watermark are inserted into the diagonal components of each DTT sub-band. Next, Arnold transform and permutation applied to the watermark are used to enhance security. The scheme is robust to geometrical and combined attacks.
Chen et al. [45] proposed a robust watermarking scheme with a feature-based synchronization technique. The watermark is repeatedly embedded in each selected local square feature region (LSFR) by modulating the discrete Fourier transform (DFT) coefficients. The extraction is based on a local statistical feature, and the SURF orientation descriptor is used for watermark synchronization. The method is robust against common attacks and screen-cam attacks. The method is effective against screen-cam, as well as common desynchronization attacks.
In [29], a robust watermarking scheme using (SIFT) and (DWT) domain is proposed. The SIFT feature areas are extracted from the original image, and  one level DWT is applied on the selected SIFT feature areas. Differently to the proposed approach, which embeds the watermark in a single sub-band, they insert the mark in the two sub-bands HL1 AND LH1. To do so, the watermark is divided into two parts that are inserted by modifying the fractional portion of the horizontal or vertical, high-frequency DWT coefficients. The experimental results showed that the scheme can resist both signal processing and geometric attacks.
The authors of [43] proposed robust image watermarking based on scale-invariant feature transform (SIFT), singular value decomposition (SVD), and all phase biorthogonal transform (APBT). A series of SIFT keypoints are obtained after carrying out SIFT, which are selected to obtain the neighborhood that can be used in the watermark embedding process. A block-based APBT is performed on the neighborhoods of the selected feature points. To insert the watermark, a coefficients matrix of a set of APBT coefficients for SVD is generated.
In [13], a SIFT-based watermarking scheme in the DWT-SVD domain is proposed. First, a 3-level discrete wavelet transform (DWT) is performed to the original image. Next, the SVD is applied to the LL 3 , and the watermark is embedded additively. The rotation, scale, and translation (RST) attacks are corrected by matching the key points of the original image and the watermarked one.
Recently, a SURF-DCT based image watermarking has been proposed [46]. First, the watermark is encrypted using chaotic encryption technology in order to enhance its security. Next, the DCT coefficients are modified using the positive and negative quantization rules. The method proves to be resistant against geometric and non-geometric attacks.
In our previous work [24], we proposed a blind robust image watermarking method based on the discrete Fourier transform (DFT) and DCT for copyright protection. The watermark is inserted in the DCT middle band of the DFT magnitude. The watermark is encrypted with the Arnold transform to increase the security of the proposed method. The method shows high imperceptibility for textured and non-textured images. Regarding the robustness, the technique can withstand signal processing attacks, JPEG, JPEG2000 compressions, etc., but shows weakness to geometric attacks. To overcome this problem, we propose a novel method based on SIFT to avoid vulnerability to these attacks.

3. Background

This section describes three techniques relevant to the proposed method, namely, the DCT, DWT, and SIFT. The DWT and DCT techniques are used to embed the watermark bits, while SIFT is used to make the proposed method invariant to geometric attacks.

3.1. Discrete Cosine Transform

The discrete cosine transform (DCT) is a famous transformation techniquee that transforms an image from the spatial domain to the frequency domain [47]. It has been widely applied in image processing exploiting both the decorrelation and the energy compaction properties. The mathematical expressions of the 2D-DCT and inverse 2D-DCT are, respectively:
C ( u , v ) = 2 m n α ( u ) α ( v ) x = 0 M 1 y = 0 N 1 f ( x , y ) × c o s ( 2 x + 1 ) u π 2 m × c o s ( 2 y + 1 ) v π 2 n
f ( x , y ) = 2 m n u = 0 M 1 v = 0 N 1 α ( u ) α ( v ) C ( u , v ) × c o s ( 2 x + 1 ) u π 2 m × c o s ( 2 y + 1 ) v π 2 n
where f ( x , y ) and C ( u , v ) are the pixel values in the spatial domain and the DCT coefficients, respectively. m , n represent the block size. α ( u ) and α ( v ) are two coefficients defined as follows:
α ( u ) α ( v ) = 1 2 i f f ( u , v ) = 0 1 e l s e

3.2. Discrete Wavelet Transform

Discrete wavelet transform has been widely used in image processing and its applications. It consists of decomposing an image into four sub-bands, one corresponding to the low pass band (LL) and three others corresponding to horizontal (HL), vertical (LH), and diagonal (HH) high pass bands. The image can be decomposed iteratively by further decomposing the low pass band each time. It has been used extensively in image watermarking due to its excellent spatio-temporal localization as well as its correlation with the human visual system (HVS) [48]. Figure 1 depicts one-level decomposition of the 2D-DWT.

3.3. Scale Invariant Feature Transform (Sift)

The scale-invariant feature transform (SIFT) proposed by G. Lowe [39] is an image descriptor that extracts characteristic features. These features are invariant to image translation, rotation, scaling, and brightness change. Firstly, a search for peaks in the scale space of the difference-of-Gaussians (DoG) function is performed to select the candidate’s features. Second, the position of each feature is localized. Next, the orientations are assigned based on image gradient directions. The scale-space D ( x , y , σ ) is computed using a DoG function with the aim of extracting the locations of candidates’ features. The original images are smoothed successively using a variable-scale ( σ 1 , σ 2 , and  σ 3 ) Gaussian function and the scale-space images is calculated by subtracting two successive smoothed images (as shown in Figure 2). x and y represent the coordinates of the image, while σ is the scale of the Gaussian function.
Lowe’s algorithm has been used in several applications such as multi view matching [49], object tracking [50], etc. Similarly, SIFT has been extensively used within the context of robust image watermarking [41,42].

4. Proposed Scheme

In this paper, we propose a hybrid robust image watermarking scheme based on DWT-DCT and SIFT for copyright protection. The main contribution of the proposed method is that it ensures both robustness to signal processing and geometrical attacks using the DWT-DCT domain to embed the watermark and SIFT descriptor, respectively, while preserving the high imperceptibility of the watermarked image. The reason behind using DWT is its excellent spatial localization and multiresolution characteristics, which are similar to the human visual system (HVS) [22], while the choice of using DCT is its strong energy compaction property [23] and good robustness against common image processing attacks. Combining these two well-known transforms, the proposed method can withstand common signal processing manipulations, including filtering, noise, JPEG compression, among others, while ensuring high imperceptibility. Moreover, RST geometric correction using SIFT ensures robustness against geometric attacks.

4.1. Embedding Process

First, the original image is decomposed into four sub-bands LL 1 , HL 1 , LH 1 and HH 1 by performing the 1-level Haar 2D-DWT. Next, the HL 1 -sub-band is divided into non-overlapping 8 × 8  blocks and the 2D-DCT is applied to each block. The choice of HL 1 has been driven by the fact that this sub-band ensures a good tradeoff between robustness and imperceptibility compared to LL 1 and HH 1 . Afterward, two uncorrelated pseudo-random sequences are generated using a secret key. Each sequence is a vector composed by {−1,1} values with a normal distribution having zero mean and unity variance. The first sequence is for bit 0 (PN z e r o ) while the second one is for bit 1 (PN o n e ). The motivation behind this choice (normally distributed watermark) is the robustness to the attacks trying to produce an unwatermarked document by averaging multiple differently watermarked copies of it [51]. On the detection side, it is important that the PN sequences are statistically independent. This constraint is granted by the pseudo-random nature of the sequences. In addition, such sequences could be easily regenerated by providing the correct seed (key). The used watermark is a binary image. The inserted information is the PN-sequences, according to the watermark bits. If the watermark bits are 0 then the inserted information is (PN z e r o ), otherwise (PN o n e ) is inserted. Gray scale image could be used as watermark. However, the nature of the watermark (binary image, gray-scale image) is not the main concern since the application of the proposed watermarking image scheme is copyright protection. Then, for each block, the two pseudo-random sequences are embedded in the DCT mid-band of the HL 1 coefficients according to the watermark bit (shown in blue in Figure 3). The Equation (4) is used to insert the sequence PN z e r o if the watermark bit is 0 while Equation (5) is used in the case of bit 1.
Y = X + λ × P N z e r o
Y = X + λ × P N o n e
where X is the original DCT mid-band of the HL 1 of the DWT, and Y is the modified DCT mid-band of the HL 1 of the DWT. λ is the watermark strength that adjusts the tradeoff between imperceptibility and robustness requirements. This parameter is empirically chosen so that it ensures the best tradeoff between robustness and imperceptibility. Note that rather than tuning the parameter λ empirically, it could be statistically tuned based on some optimization criteria such as the error rate, the PSNR, the SSIM, or the normalized correlation. Next, the inverse DCT (2D-IDCT) is carried out for each modified block, and the inverse 2D-DWT (2D-IDWT) is performed to obtain the watermarked image. Finally, SIFT features are extracted and saved in order to correct the geometrical distortions in the extraction process. In most situations of copyright protection applications, the owner of the image is the only one to possess the secret key and the SIFT keypoints needed to extract the watermark. In case there is a need to share with someone else, for each image, the SIFT features and the secret key need to be shared with the extracting side. Therefore, the method is semi-blind since the key points are needed in the extracting process. The proposed watermark embedding is illustrated in Figure 4.
The steps of watermark insertion are described in detail in Algorithm 1.
Algorithm 1 Watermark embedding
Require: 
Original image, Watermark, key, PN z e r o , PN o n e .
Ensure: 
Watermarked image, SIFT features.
  • Perform 1-level Haar 2D-DWT to decompose the original image into four sub-bands LL 1 , HL 1 , LH 1 and HH 1 .
  • HL 1 -sub-band of level-1 is divided into non-overlapping 8 × 8 blocks.
  • Apply the 2D-DCT to each HL 1 block.
  • Generate two uncorrelated pseudo-random sequences using a secret key. One sequence for bit 0 (PN z e r o ) and the second sequence for bit 1 (PN o n e ).
  • For each block, insert the two pseudo-random sequences in the DCT mid-band of the HL 1 coefficients according to the watermark bit. If the watermark bit is 0 the Equation (4) is used. The Equation (5) is used otherwise.
  • Apply the inverse DCT (2D-IDCT) for each modified block.
  • Perform the inverse 2D-DWT (2D-IDWT) to obtain the watermarked image.
  • Extract SIFT features and save them.

4.2. Extraction Process

The extracting process is divided into two steps: geometrical distortions correction and watermark extraction. Before extracting the watermark, the first step is to correct the geometric manipulations that the attacked image has undergone. To this end, SIFT features are extracted first from the attacked image, and matching is performed between them and the recorded features saved in the insertion step. The idea behind using SIFT relies on the fact that it is RST invariant [52].
It is worth noticing that the proposed method doesn’t require the original image but SIFT features that make it semi-blind. However, the scheme can be blind if no geometric distortions are performed.
In order to correct image rotation attack, the attacked image should be rotated by R c . The mathematical formulation of the correction angle is calculated as follows:
R c = 1 N i = 1 N θ i
where θ i = a r c c o s V w 1 . V w 2 V w 1 V w 2 , V w 1 and V w 2 are two vectors composed of two keypoints taken from the watermarked image and the rotated image, respectively. N denotes the number of valid matching points. According to Equation (6), the rotation angle is calculated from every two pairs of matching points. Afterward, the angle is corrected by calculating the average sum of angles.
Similarly, to correct the scaling attack, the attacked image should be scaled by S c .
S c = 1 N i = 1 N S w i S s i
where S w i and S s i are the scale values of the matching point in watermarked image and scaled image, respectively. Thus, the scaled image can be corrected by scaling it with S c .
To correct the translation attack, C T x and C T y are used to correct the translated image on the horizontal and vertical location of coordinates.
C T x = T x W x + N T x < W x T x W x o t h e r w i s e
C T y = T y W y + N T y < W y T y W y o t h e r w i s e
Thus, after performing the correction of geometric attack step, the weakness against RST attacks can be avoided. The watermark can be extracted perfectly when the watermarked image suffers from this kind of attacks.
The second step is to extract the watermark. To do so, it is sufficient to carry out the 1-level HL 1 of the 2D-DWT and calculate the 2D-DCT of the HL 1 . Afterwards, two pseudo-random sequences using the same key of embedding are generated. Next, the  watermark is extracted by calculating the correlation between the PN sequences and the modified coefficients as shown in Equation (10).
W i = 0 i f C o r r ( 0 ) > C o r r ( 1 ) 1 i f C o r r ( 1 ) > C o r r ( 0 )
where C o r r ( 0 ) is the correlation between the DCT middle frequency of the HL 1 coefficients and P N z e r o , and  C o r r ( 1 ) is the correlation between the DCT middle frequency of the HL 1 coefficients and P N o n e . Finally, the watermark image is extracted.
Figure 5 sketches the watermark extracting process that is described in detail in Algorithm 2.
Algorithm 2 Watermark extracting
Require: 
Watermarked image, key, SIFT features.
Ensure: 
Watermark.
  • Extract SIFT features from the attacked watermarked image.
  • Feature matching between the extracted SIFT features and the recorded ones in the embedding process.
  • Geometric distortions correction of the image.
  • Perform 1-level HL 1 of the 2D-DWT.
  • Apply 2D-DCT to HL 1 .
  • Generate two pseudo-random sequences using the same key of embedding.
  • Extract the watermark using the correlation between the PN sequences and the altered coefficients as shown in Equation (10).

5. Experimental Results

5.1. Experimental Setup

The performance of the proposed technique is evaluated on thirty 512 × 512 standard gray-scale natural images. The images have been carefully selected in order to cover a wide range of images (indoor, outdoor, portrait, etc., texture). These images include the most commonly used images in the watermarking literature. (’Baboon’, ’Pepper’, ’Cameraman’, ’Lena’, ’Goldhill’, ’Walkbridge’, ’Womanblonde’, ’Livingroom’, ’Pirate’ and ’Lake’) and other gray-scale images taken from [53] (Figure A3) in the experiments to assess the imperceptibility and the robustness of the proposed work. A 64 × 64 binary image was taken as a watermark.
The parameter lambda, which denotes the embedding strength of the embedded watermark, affects the visual quality and robustness. This value is chosen in such a way that ensures the best tradeoff between imperceptibility and robustness. To this end, extensive experiments have been conducted using empirically several values, ranging from 0.01 to 5, to determine the value ensuring this tradeoff. This parameter is tuned experimentally, and we kept lambda = 0.4 (see Figure 6 and Figure 7). The same lambda value is used for all the test images. Figure 6 and Figure 7 illustrate the effect of lambda on the performance of the proposed method in terms of imperceptibility and robustness.

5.2. Evaluation Measures

5.2.1. Imperceptibility

Subjective evaluation experiments is the gold standard to measure the imperceptibility. However, such a process needs heavy technical and human resources to be conducted [54,55]. This is the reason why the objective metrics are used to assess visual quality of the watermarked images.
In order to evaluate the imperceptibility of the watermarking methods, several metrics have been proposed. Peak signal to noise ratio (PSNR) is the most widely used metric in the watermarking literature to measure the distance between the original image and the watermarked one. It is defined as follows:
P S N R = 10 log ( M A X 2 M S E )
where MAX is the maximum possible pixel value of the image, which is equal to 255 for an 8 bit per pixel representation, and MSE is given by:
M S E = 1 m n i = 0 m 1 j = 0 n 1 [ I ( i , j ) K ( i , j ) ] 2
where I ( i , j ) and K ( i , j ) refers to the original image and the watermarked image, respectively. m and n are the dimensions of the image.
The structural similarity (SSIM) index performs similarity measurement using a combination of three heuristic factors that is, luminance comparison, contrast comparison, and structure comparison. It is the most influential perceptual quality metric [56]. It is defined by (13).
S S I M ( I 0 , I w ) = ( 2 μ I 0 μ I w + c 1 ) ( 2 σ I 0 I W + c 2 ) ( μ I 0 2 + μ I w 2 + c 1 ) ( σ I 0 2 + σ I w 2 + c 2 )
where I 0 and I w are, respectively, the original image and the watermarked image, μ I 0 and μ I w are, respectively, the local means of I 0 and I w , σ I 0 2 is the variance of I 0 whereas σ I w 2 is the variance of I w , c 1 and c 2 are two variables used to stabilize the division with weak denominator.

5.2.2. Robustness

The robustness of our work is evaluated using normalized correlation (NC) and bit error rate (BER) between the original watermark and the extracted one.
The normalized correlation (NC) is a widely used attribute for quantifying the robustness of the underlying watermarking technique against various attacks. It measures the similarity between the extracted watermark and the original watermark. It is defined by:
N C = i = 1 M j = 1 N W ( i , j ) × W ( i , j ) 2 i = 1 P j = 1 Q W ( i , j ) 2 i = 1 P j = 1 Q W ( i , j ) 2
where W and W are the original and the extracted watermark, respectively.
To further evaluate the robustness of the proposed work, bit error rate (BER) is used to calculate the bit error rate between the original watermark and the extracted one. It is defined as follows:
B E R = i = 1 m j = 1 n W i , j W i , j ( m × n )
where W i , j and W i , j are original and extracted watermark with size of ( m × n ) and ⨁ refers to X or operation.

5.3. Evaluation of Imperceptibility

Table 1 exhibits the imperceptibility of the proposed technique measured by the two well-known metrics PSNR and SSIM for all test images and their average. One can notice that the proposed method can ensure good imperceptibility according to the obtained values of PSNR and SSIM in Table 1, Figure 6, Figure 8 and Figure 9. We believe that the main reason stands on the fact that the watermark is embedded in the middle DCT coefficients of the LH DWT sub-band that ensures high imperceptibility.
One can remark from Table 1 that the imperceptibility of the proposed scheme is insensitive to the image nature. Figure 8 and Figure A3 show the original images and their corresponding watermarked ones. Moreover, as depicted in Figure 8 there is no visual distortion between the original images and the watermarked ones.
The violin plot representation of PSNR and SSIM of the proposed scheme. The values of PSNR and SSIM shown in Table 1 are represented in black in Figure 9. In addition, according to Figure 9, the majority of SSIM values are concentrated between 0.995 and 0.9998 . PSNR values are between 45.28 and 49.97 , illustrating the good robustness of the proposed scheme regardless of the image nature.

5.4. Evaluation of Robustness

Since the application of the proposed scheme is copyright protection, robustness is the most important requirement. Image processing, JPEG compression and geometrical manipulations are the three categories of attacks that watermarked images have undergone. Image processing attacks include Gaussian noise (GN), salt and pepper noise (SPN), low-pass Gaussian filtering (LPGF), histogram equalization (HE), Gaussian smoothing (GS), median filtering (MF). JPEG compression and JPEG2000 represent the compression attacks. Rotation (ROT), scaling (SC), translation (TR), and cropping (CR) were selected as geometrical attacks. Figure 10 and Figure 11 show the robustness of the proposed method in terms of NC against rotation and scaling using four test images with several textures. Figure 12 depicts Lena image after performing several attacks. The false alarm probability is not discussed in the paper, and the robustness of our work is evaluated using normalized correlation (NC) and bit error rate (BER) between the original watermark and the extracted one.
The 30 test images used in the experiments were chosen according to their characteristics (texture, indoor, outdoor, etc). In addition, some typical images have been used in the experiments. The images used in Figure 8 and Figure 10 are selected in such a way that they represent differences in these characteristics.
Experiments were performed to evaluate the limitations of the proposed method. The parameter values of the attacks have been tuned such that the watermark is no longer recovered. We consider that with an NC value lower than 0.7 , distortions are sufficiently high such that the watermark cannot be recovered.
Figure 13 displays the extracted watermarks after different attacks, including histogram equalization, JPEG compression, salt and pepper noise, Gaussian noise, cropping, rotation, etc. It can be observed that although the watermarked images have been exposed to these attacks, the watermark is almost extracted perfectly.
Table 2 shows the robustness in terms of NC for several images against Gaussian noise using zero mean, 0.001 and 0.01 variances, respectively, and the NC average for 30 test images. Table 3 shows the obtained NC values after carrying out salt and pepper noise with zero mean and 0.001 and 0.01 variances and the NC average for 30 test images. According to Table 2 and Table 3, the NC values are above 0.99 for 30 images. However, for both Gaussian and salt and pepper noise, when the variance is 0.01 , the obtained NC values for Mandrill are below 0.99 (NC = 0.9865 and 0.9898 , respectively). In addition, the obtained average values of NC, shown in Table 2 and Table 3 for both attacks are above 0.99 for the 30 test images.
Gaussian smoothing is a very common operation in image processing [57]. It consists of removing detail and noise [58]. The Gaussian smoothing has been applied to the test images with different standard deviations and window sizes. As depicted in Table 4, the proposed technique is able to withstand Gaussian smoothing attack. Even with a standard deviation σ = 0.9 and 7 × 7 window size, the obtained NC values are greater than 0.96 . It can be noticed from Table A8 that the proposed technique can withstand Gaussian smoothing for all thirty test images.
The low-pass Gaussian filtering attack is also one of the common manipulations in image processing. It aims to remove high-frequency components from the image. The watermarked images are filtered with a low-pass Gaussian filter using several mask sizes ( 3 × 3 ), ( 5 × 5 ), and ( 7 × 7 ) and two standard deviation values ( σ = 0.5 , σ = 0.6 ). It can be concluded from Table 5 that high NC values are achieved under the low-pass Gaussian filtering with the different mask sizes. In addition, one can see from Table A8 that the proposed method can resist low-pass Gaussian filtering for the dataset, and the minimum average NC value is 0.9812 .
Robustness against lossy compression is crucial due to the wide diffusion of lossy compression tools and the huge use of this image format. To assess the performance from this point of view, JPEG compression is iteratively applied to the watermarked images, each time decreasing the quality factor, ranging from 90 to 5. Table 6 summarizes the results obtained in terms of NC after JPEG compression using several quality factors for the 30 test images. As can be seen, the proposed method exhibits good robustness against this attack. Furthermore, the robustness against JPEG2000 has been investigated using different compression ratios ( C R ) varying from 1 to 10. Table 7 depicts the results in terms of normalized correlation against JPEG2000 attack using 30 images. It can be seen from Table 6 that the proposed method can withstand JPEG attack when the quality factor is above 40. For quality factors below 40, the watermark can be well recognized since the NC values are above 0.7 . Regarding JPEG2000 compression, it can be seen from Table 7 that the proposed method can resist to JPEG2000 attack when the compression ratio (CR) is below 10. We consider that the obtained results are comparable since the minimum NC average of all test images is above 0.7 .
One can see from Table 7 that the proposed method is quite robust against JPEG2000. The proposed method shows its limitation when the compression ratio ( C R ) is larger than 6 but the results are still satisfactory (NC = 0.7031 , C R = 10 ).
Figure 10 and Figure 11 show the robustness in terms of NC of the proposed technique against rotation and scaling using four test images with several textures, respectively. The rotation attack is applied using several rotation angles ranging from 1 to 45. The obtained results presented in Table 8, show the good robustness of the proposed method against rotation attack. Similarly, the test images have undergone scaling attack with different scaling factors ranging from 0.1 to 2.5 . It can be seen from Figure 11 that the proposed technique is able to withstand scaling attack for all images. We note that the results for selected images under test are reported in Figure 10 and Figure 11. The remaining results for rotation and scaling attacks are reported in Figure A1 and Figure A2 and Table A8. It can be observed from Table A8 that the proposed method is robust to rotation and scaling attacks for all the thirty test images. The average NC values are below 0.9877 and 0.9872 for rotation and scaling, respectively.
To further test the robustness of the proposed method, different combinations of attacks have been carried out. Table 9 sketches a set of combinations of image processing attacks, while Table 10 exhibits a set of combinations of both geometric and image processing attacks. It can be concluded from these tables that the proposed method is robust to attack combination for the both types of attacks since all the obtained NC values are greater than 0.96 . In addition, one can see from Table A8 the resistance to combined attacks of the proposed method for all the thirty test images.
Moreover, as depicted in Figure 13, the extracted watermark is well recognizable even after applying several attacks to the watermarked image which indicates the good robustness of the proposed method.
Table A7 shows the robustness evaluation using bit error rate (BER) against a wide range of attacks. The presented results represent the average values of BER for 30 test images shown in Figure 8 and Figure A3. It can be seen from Table A7 that the proposed method can resist the majority of the attacks such as image processing (filtering, noise, etc.), JPEG compressions (JPEG and JPEG2000), geometric attacks (rotation, scaling, translation, and cropping) and combined attacks. The obtained values of BER calculated between the original watermark and the extracted one are near zero, which illustrates the robustness of the proposed technique.
One can see from Table A7 that the robustness performance in terms of BER decreases when the quality factor of JPEG decreases. However, even for high values of this parameter (5%), the watermark can still be recovered. Similarly, when the noise is applied with a high density (0.01 or higher), the BER increases. However, for Gaussian smoothing for 7 × 7 and σ = 9 , the obtained results are comparable.
It can be observed from Table A7 that the proposed method is robust against histogram equalization, cropping, and scaling. As shown in Table A7, the proposed technique can resist to rotation for the angles below 40°, Gaussian noise ( σ = 0.005 , salt and pepper noise ( σ = 0.001 ) ) , Low-pass Gaussian filtering for ( σ = 0.5 , ( 3 × 3 , 5 × 5 , 7 × 7 , 9 × 9 ) and σ = 0.6 ( 3 × 3 ) ) , Gaussian smoothing ( σ = 0.5 , 5 × 5 ) , JPEG when quality factor is above 50 % , and JPEG2000 for compression ratio below 8. According to Table A7, it can be seen that the robustness of the proposed method has its limitations for the following attacks parameters: Low-pass Gaussian filtering for ( σ = 0.6 , ( 5 × 5 , 7 × 7 , 9 × 9 ) ) , Gaussian smoothing ( σ = 0.5 , ( 5 × 5 , 7 × 7 , 9 × 9 ) ) , JPEG when quality factor is above 50 % , and JPEG2000 for compression ratio below 8.
Table A8 reports the robustness results in terms of NC with the aim of evaluating the limitations of the proposed method. For Gaussian noise until the density reaches the value 0.8 , one can still recover the watermark. For salt & pepper noise with density 0.7 , the watermark can be extracted. Regarding JPEG compression with quality factor below 4, the extracted watermark cannot be appropriately extracted. After applying the Gaussian smoothing with a window of 9 × 9 and σ = 10 ), the extracted watermark cannot be recognized. To summarize, one can see from Table A8 that the proposed method can’t resist these attacks. This is due to the high damage caused by these severe attacks which cause the huge decrease of robustness in terms of NC.

5.5. Comparison with Alternative Methods

To show the competitiveness of our approach, we compare it with our previous work [24] as well as schemes in [13,21,26,27,28,29,34,44,45] in terms of imperceptibility and robustness.
We note that all the test images are under the same attack in Table 2, Table 3, Table 8, Table A7 and Table A8.

Comparison of Imperceptibility and Robustness

In Table 11, is presented the comparison in terms of imperceptibility between the proposed scheme and the schemes in [26,27,28]. It is clear from Table 11 that the proposed method shows better imperceptibility compared with Lagzian et al. [26], Makbol et al. [27] and Singh et al. [28] methods in terms of PSNR.
It can be seen from Table 12 that the use of DWT-DCT only fails to provide robustness to geometric attacks, while using SIFT avoids weakness against this kind of attack.
We have compared our work with state-of-the-art methods based on the presented results of the latter. We have not implemented alternative methods. Thus, for the results presented in Table 13, Table 14, Table 15, Table 16 and Table 17, Table A1 and Table A2, we have compared the proposed work only for the attacks exhibited in the alternative techniques.
To further evaluate the robustness of the proposed method, it has been compared to [13,21,26,27,28,29] in terms of normalized correlation (NC). Additionally, the watermarked images have undergone several combined attacks. These combined attacks include image processing manipulations as well as geometric operations.
Table 13 and Table 14 show the comparison results in terms of robustness with [26,27] methods under several attacks including, rotation, Gaussian noise, salt and pepper noise, median filtering, JPEG compression, histogram equalization. It can be observed that our method outperforms the schemes in [26,27] in the majority of the attacks. Table 15 depicts the robustness results in terms of NC against different attacks compared to Singh et al. method [28]. One can see from Table 15 that the proposed method shows high robustness compared to [28] against different attacks including Gaussian noise, salt and pepper noise, median filtering, histogram equalization, JPEG compression, and rotation.
To further evaluate the robustness performance of the proposed method, we compare it with Zhang et al.’s method [13]. To this end, the watermarked image has undergone several geometric distortions as well as image processing attacks. The obtained results, shown in Table 16, indicate the superiority of the proposed scheme. The rotation and scaling attacks have been investigated in Table 14, Table 15, Table 16 and Table 17, respectively. It can be seen from these tables that the proposed method is quite robust to rotation and scaling attacks for several test images thanks to the SIFT operator. In addition, the proposed technique outperforms the schemes in [13,21,27,28].
Table 17 shows that one can distinguish three categories of attacks. In the first category, including Gaussian noise, salt and pepper noise, and cropping attacks, the proposed method clearly outperforms [13]. For JPEG, rotation and scaling attacks results are quite comparable, even if the proposed method performs slightly better. Finally, the third category contains a single attack (median filtering). In this case, [13] outperforms the proposed method.
As shown in Table 17 the proposed method is quite robust to cropping, median filtering, rotation, scaling and outperforms the methods in [13,21]. Table 9 shows the obtained results in terms of NC after carrying out several combined attacks. It can be concluded from Table 9 that the proposed method is able to withstand combined attacks (all NC values are above 0.9937 ). Moreover, our scheme shows high robustness compared to Zhang’s scheme [13]. Figure 14 displays the robustness comparison results in terms of normalized correlation between zhang’s scheme [13], Lyu’s scheme [29], Liu’s scheme [21] and the proposed scheme. Comparison with Luy et al. method [29], (blue curve in Figure 14) shows that the proposed method is more effective whatever the attack under test. Note that it uses a single transform with SIFT descriptor. This highlights the importance of using both transforms. A deeper look shows that it performs particularly less for small rotation (5° and 10°) and scaling. The differences between the two methods are less pronounced for JPEG, cropping, and very small rotation (2°).
Regarding the comparison with Liu et al. method [21] (green curve in Figure 14), it appears that the proposed technique is quite superior for median filtering attack. Indeed the NC values drop from 0.98 to 0.5. In addition, the proposed method shows superior robustness for small rotation (5° and 10°) and scaling. The results are comparable for JPEG, cropping, and minimal rotation (2°) attacks. This corroborates the reported properties of the SVD in cases where perturbations are small [12]. Figure 14 shows that the method presented in [13] (yellow curve) gives comparable results in terms of NC for JPEG, rotation, and scaling attacks compared to the proposed method.
For cropping, the proposed method exhibits higher robustness as compared to the scheme reported in [13], while this is the contrary for median filtering attack. These results are not surprising. Indeed, both methods use two transforms associated with SIFT descriptor.
One can see from Table 13 that the proposed method outperforms the technique proposed in [26] in all attacks except for JPEG compression with quality factor 50 and median filtering. For these two attacks even the method in [26] outperforms the proposed method, the robustness results in terms of NC are comparable. It can be seen from Table 14 that the proposed method is robust against the tested attacks except for JPEG compression in which the alternative method [27] shows its superiority in terms of robustness. Similarly, in Table 15, Table 16 and Table 17, it can be observed that the proposed method fails to show its superiority in terms of robustness in only one case (median filtering (in Table 15, Table 16 and Table 17), and rotation (in Table 17)).
It can be seen that the proposed technique outperforms the scheme in [29] for a wide range of attacks such as, rotation, JPEG, salt and pepper noise, median filtering, and cropping (25% and 50%). One can see from Table A2 that the proposed method can obtain comparable results in terms of robustness for centered cropping (75%).
The robustness of the proposed method is compared to our previous work [24] and the scheme in [34]. The attacks used for the comparison are applied to three images (Lena, Peppers, and Baboon) as shown in Table A5 and Table A6. For the three images (Lena, Peppers, and Baboon), the proposed method outperforms the scheme in [34] for JPEG, JPEG2000, histogram equalization, and cropping attacks. In addition, the proposed technique provides the highest robustness performance than the scheme in [24] for JPEG, JPEG2000, histogram equalization, and cropping attacks. In sum, the proposed method shows comparable results in terms of robustness against geometric attacks. At the same time, it can outperform our previous method [24] since the SIFT is used to correct geometric attacks.
Table A3 sketches the comparison of the robustness of the proposed technique with the scheme in [44] after applying several attacks, such as additive noise, median filtering, histogram equalization, JPEG, rotation, and scaling. It can be observed from Table A3 that the proposed algorithm shows high robustness for Gaussian noise, histogram equalization, rotation, and JPEG (when QF is great than 50) attacks. The proposed technique achieves comparable results for median filtering, jpeg when QF is below 40, and scaling (for zoom greater than 0.9) attacks.
Table A4 shows the results of robustness compared to the scheme of Chen et al. [45] in terms of BER. The comparison has been made for three different images Lena, Mandrill, and Peppers. According to Table A4, it can be seen that the proposed method provides high robustness for JPEG, scaling, and median filtering. For rotation and cropping attacks, the proposed method can achieve comparable results in terms of robustness.
To summarize, one can conclude from the experiments that combining a hybrid scheme with SIFT descriptor allows significant gains for several attacks while preserving good imperceptibility.

6. Conclusions

In this paper, a robust image watermarking method based on SIFT in the DWT-DCT domain is presented. Its goal is to ensure both robustness against geometric and image processing attacks while preserving high imperceptibility. The proposed method takes the advantages of combining the DWT and DCT transforms to ensure robustness in the face of common image processing attacks such as filtering, histogram equalization, JPEG compression, and noise attacks without degrading the image quality. At the same time, SIFT descriptor characteristics are used to obtain robustness against geometrical attacks, especially rotation, scaling, and translation. The experimental results and comparisons have demonstrated the high robustness of the proposed method for both common image processing attacks and geometrical attacks while preserving a good imperceptibility. Future work will focus on using a meta-heuristic algorithm to find the optimal watermark strength.

Author Contributions

Conceptualization, M.H.; Methodology, H.C.; Software, M.H.; Supervision, M.E.H. (Mohamed El Haziti), H.C. and M.E.H. (Mohammed El Hassouni); Writing—original draft, M.H.; Validation, H.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We thank the anonymous reviewers for critically reading the manuscript and suggesting substantial improvements.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Robustness comparison between Hu’s method [34] and the proposed scheme in terms of NC.
Table A1. Robustness comparison between Hu’s method [34] and the proposed scheme in terms of NC.
AttackHu’s Method [34]Proposed Method
Cropping ( 50 % )0.97550.9897
Rotation (45°)0.98610.9803
Gaussian noise ( 0 , 0.01 )0.99271.0
Histogram equalization0.98171.0
JPEG (70)0.99751.0
Table A2. Robustness comparison with [29] measured in terms of NC for Lena.
Table A2. Robustness comparison with [29] measured in terms of NC for Lena.
Attack[29]Proposed Method
Rotation (2°)0.93960.9998
Rotation (5°)0.93080.9998
Rotation (10°)0.88610.9995
JPEG (100)0.98181.0
Median filter ( 3 × 3 )0.64500.9802
Center cropping ( 25 % )0.97431.0
Center cropping ( 50 % )0.98031.0
Center cropping ( 75 % )0.98030.9998
Salt and pepper noise ( 0 , 0.001 )0.98031.0
Salt and pepper noise ( 0 , 0.005 )0.96981.0
Salt and pepper noise ( 0 , 0.01 )0.94941.0
Salt and pepper noise ( 0 , 0.02 )0.92820.9998
Table A3. Robustness comparison with [44] measured in terms of NC for Lena.
Table A3. Robustness comparison with [44] measured in terms of NC for Lena.
Attack[44]Proposed Method
Salt and pepper (0.001)0.99020.9907
Gaussian ( μ = 0 , σ = 0.3 )0.26310.8102
Median filtering ( 3 × 3 )0.99940.9802
Center Cropping (25%)0.27931.0
Histogram equalization0.19811.0
JPEG (Q = 100)0.96961.0
JPEG (Q = 50)0.99980.9999
JPEG (Q = 40)0.99760.9681
JPEG (Q = 30)1.00.9535
Rotation 2°0.99140.9998
Rotation 5°0.99320.9998
Rotation 10°0.98110.9995
Scaling (0.5)0.83500.9987
Scaling (0.9)0.99960.9990
Scaling (1.2)0.99970.9984
Table A4. Robustness comparison with [45] measured in terms of BER for Lena, Baboon and Peppers images.
Table A4. Robustness comparison with [45] measured in terms of BER for Lena, Baboon and Peppers images.
[45]Proposed Method
AttackLenaMandrillPeppersLenaMandrillPeppers
JPEG (Q = 40)00.06670.083300.01050.0154
JPEG (Q = 30)00.08330.116700.00480.0012
JPEG (Q = 20)00.06670.28330.01270.02100.0267
JPEG (Q = 10)0.06670.23330.41670.03540.02830.0391
scaling 0.600.05000.033300.02490
scaling 0.500.05000.050000.01080.0102
scaling 0.400.03330.216700.00450.0068
Cropping 30%000000
Cropping 40%000000
Cropping 50%000000
Rotation 15°000000
Rotation 30°000000
Rotation 45°00000.00110.0009
Median filtering ( 3 × 3 )00.0667000.00270
Table A5. Robustness comparison with [34] measured in terms of NC for Lena, Peppers, and Baboon images.
Table A5. Robustness comparison with [34] measured in terms of NC for Lena, Peppers, and Baboon images.
AttackMethod
[34]Proposed Method
LenaPeppersBaboonLenaPeppersBaboon
CR (50%)0.97550.97750.98051.01.01.0
ROT(45)0.98610.98140.96830.99030.98040.9817
GN (1%)0.99270.99450.98851.01.01.0
HE0.98170.99270.94991.01.01.0
JPEG (70)0.99750.99770.99761.01.01.0
JPEG2000 (70)0.99760.99760.99670.99991.00.9999
Table A6. Robustness comparison with [24] measured in terms of NC for Lena, Peppers, and Baboon images.
Table A6. Robustness comparison with [24] measured in terms of NC for Lena, Peppers, and Baboon images.
AttackMethod
[24]Proposed Method
LenaPeppersBaboonLenaPeppersBaboon
CR (50%)1.01.00.99991.01.01.0
ROT(45)0.28740.31200.19850.99030.98040.9817
GN (1%)1.01.01.01.01.01.0
HE1.01.01.01.01.01.0
JPEG (70)0.99980.99970.99981.01.01.0
JPEG2000 (70)0.97840.98020.97780.99991.00.9999
Figure A1. Robustness in terms of NC against rotation attack for several test images.
Figure A1. Robustness in terms of NC against rotation attack for several test images.
Jimaging 07 00218 g0a1
Figure A2. Robustness in terms of NC against scaling attack for several test images.
Figure A2. Robustness in terms of NC against scaling attack for several test images.
Jimaging 07 00218 g0a2
Table A7. Average BER values after several attacks applied to thirty test images.
Table A7. Average BER values after several attacks applied to thirty test images.
AttacksBER
Histogram equalization0
Gaussian noise ( μ = 0   , σ = 0.001 )0.0001
Gaussian noise ( μ = 0   , σ = 0.005 )0.0022
Salt & pepper noise ( μ = 0   , σ = 0.001 )0.0018
Low-pass Gaussian filtering
( σ = 0.5 , 3 × 3 )0.0009
( σ = 0.5 , 5 × 5 )0.0011
( σ = 0.5 , 7 × 7 )0.0022
( σ = 0.5 , 9 × 9 )0.0044
( σ = 0.6 , 3 × 3 )0.0075
( σ = 0.6 , 5 × 5 )0.0106
( σ = 0.6 , 7 × 7 )0.0169
( σ = 0.6 , 9 × 9 )0.0283
Gaussian smoothing
( σ = 0.5 , 3 × 3 )0.0014
( σ = 0.5 , 5 × 5 )0.0058
( σ = 0.5 , 7 × 7 )0.0157
( σ = 0.5 , 9 × 9 )0.0237
( σ = 0.6 , 3 × 3 )0.0281
( σ = 0.6 , 5 × 5 )0.0328
( σ = 0.6 , 7 × 7 )0.0382
( σ = 0.6 , 9 × 9 )0.0402
JPEG compression
90%0
80%0.0012
75%0.0023
70%0.0058
60%0.0087
50%0.0105
40%0.0204
30%0.0210
20%0.0321
10%0.0432
JPEG2000 compression
CR = 20
CR = 40
CR = 60.0023
CR = 80.0102
CR = 100.0289
Cropping
25%0
50%0.0001
Scaling
0.5%0.0003
1.5%0.0097
Rotation
10%0.0001
15%0.0004
25%0.0086
40%0.0104
Combination attacks
HE + GN ( σ = 0.001 )0.0092
HE + GN ( σ = 0.01 )0.0201
HE + SPN ( σ = 0.001 )0.0102
HE + SPN ( σ = 0.01 )0.0225
GN ( σ = 0.001 ) + JPEG compression (90%)0.0098
GN ( σ = 0.001 ) + JPEG compression (70%)0.0100
SPN ( σ = 0.001 ) + JPEG compression (90%)0.0140
SPN ( σ = 0.001 ) + JPEG compression (70%)0.0190
LPGF ( σ = 0.5 , window size ( 9 × 9 )) + SPN ( σ = 0.001 )0.0228
LPGF ( σ = 0.6 , window size ( 9 × 9 )) + SPN ( σ = 0.001 )0.0328
Figure A3. Twenty test images used in the experiments taken from [53] and their corresponding watermarked images. Odd lines represents the original images and the even lines refer to the corresponding watermarked images.
Figure A3. Twenty test images used in the experiments taken from [53] and their corresponding watermarked images. Odd lines represents the original images and the even lines refer to the corresponding watermarked images.
Jimaging 07 00218 g0a3
Table A8. Robustness after several attacks applied to thirty test images.
Table A8. Robustness after several attacks applied to thirty test images.
AttacksNC
Histogram equalization1
Gaussian noise ( μ = 0   , σ = 0.001 )0.9904
Gaussian noise ( μ = 0   , σ = 0.005 )0.9889
Gaussian noise ( μ = 0   , σ = 0.8 )0.7885
Salt & pepper noise ( μ = 0   , σ = 0.001 )0.9907
Salt & pepper noise ( μ = 0   , σ = 0.7 )0.7653
Low-pass Gaussian filtering
( σ = 0.5 , 3 × 3 )0.9975
( σ = 0.5 , 5 × 5 )0.9973
( σ = 0.5 , 7 × 7 )0.9958
( σ = 0.5 , 9 × 9 )0.9934
( σ = 0.6 , 3 × 3 )0.9879
( σ = 0.6 , 5 × 5 )0.9861
( σ = 0.6 , 7 × 7 )0.9836
( σ = 0.6 , 9 × 9 )0.9812
Gaussian smoothing
( σ = 0.5 , 3 × 3 )0.9982
( σ = 0.5 , 5 × 5 )0.9971
( σ = 0.5 , 7 × 7 )0.9958
( σ = 0.5 , 9 × 9 )0.9934
( σ = 0.6 , 3 × 3 )0.9891
( σ = 0.6 , 5 × 5 )0.9888
( σ = 0.6 , 7 × 7 )0.9883
( σ = 0.6 , 9 × 9 )0.9802
( σ = 10 , 9 × 9 )0.2184
JPEG compression
90%1
80%0.9997
70%0.9918
60%0.9825
50%0.9785
40%0.8981
30%0.7710
20%0.7674
10%0.7355
5%0.7182
3%0.4985
JPEG2000 compression
CR = 21.0
CR = 40.9913
CR = 60.9137
CR = 80.8752
CR = 100.7031
Cropping
25%1.0
50%0.9962
Scaling
0.5%0.9903
1.5%0.9872
Rotation
10%0.9999
15%0.9994
25%0.9896
40%0.9877
Combination attacks
HE + GN ( σ = 0.001 )0.9968
HE + GN ( σ = 0.01 )0.9895
HE + SPN ( σ = 0.001 )0.9888
HE + SPN ( σ = 0.01 )0.9862
GN ( σ = 0.001 ) + JPEG compression (90%)0.9998
GN ( σ = 0.001 ) + JPEG compression (70%)0.9891
SPN ( σ = 0.001 ) + JPEG compression (90%)0.9933
SPN ( σ = 0.001 ) + JPEG compression (70%)0.9910
LPGF ( σ = 0.5 , window size ( 9 × 9 )) + SPN ( σ = 0.001 )0.9834
LPGF ( σ = 0.6 , window size ( 9 × 9 )) + SPN ( σ = 0.001 )0.9801

References

  1. Hamidi, M.; Chetouani, A.; El Haziti, M.; El Hassouni, M.; Cherifi, H. A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection. In International Conference on Mobile, Secure, and Programmable Networking; Springer: Berlin/Heidelberg, Germany, 2019; pp. 211–228. [Google Scholar]
  2. Hamidi, M.; Chetouani, A.; El Haziti, M.; El Hassouni, M.; Cherifi, H. Blind robust 3D mesh watermarking based on mesh saliency and wavelet transform for copyright protection. Information 2019, 10, 67. [Google Scholar] [CrossRef] [Green Version]
  3. Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography; Morgan Kaufmann: Burlington, MA, USA, 2007. [Google Scholar]
  4. Su, Q.; Chen, B. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018, 22, 91–106. [Google Scholar] [CrossRef]
  5. Poljicak, A.; Mandic, L.; Agic, D. Discrete Fourier transform-based watermarking method with an optimal implementation radius. J. Electron. Imaging 2011, 20, 033008. [Google Scholar] [CrossRef]
  6. Hamidi, M.; El Haziti, M.; Cherifi, H.; Aboutajdine, D. A blind robust image watermarking approach exploiting the DFT magnitude. In Proceedings of the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), Marrakech, Morocco, 17–20 November 2015; pp. 1–6. [Google Scholar]
  7. Das, C.; Panigrahi, S.; Sharma, V.K.; Mahapatra, K. A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int. J. Electron. Commun. 2014, 68, 244–253. [Google Scholar] [CrossRef]
  8. Keshavarzian, R.; Aghagolzadeh, A. ROI based robust and secure image watermarking using DWT and Arnold map. AEU-Int. J. Electron. Commun. 2016, 70, 278–288. [Google Scholar] [CrossRef]
  9. Saha, B.J.; Kabi, K.K.; Pradhan, C. Non blind watermarking technique using enhanced one time pad in DWT domain. In Proceedings of the Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Hefei, China, 11–14 July 2014; pp. 1–6. [Google Scholar]
  10. Fazlali, H.R.; Samavi, S.; Karimi, N.; Shirani, S. Adaptive blind image watermarking using edge pixel concentration. Multimed. Tools Appl. 2017, 76, 3105–3120. [Google Scholar] [CrossRef]
  11. Qi, X.; Xin, X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J. Vis. Commun. Image Represent. 2015, 30, 312–327. [Google Scholar] [CrossRef]
  12. Ansari, I.A.; Pant, M.; Ahn, C.W. SVD based fragile watermarking scheme for tamper localization and self-recovery. Int. J. Mach. Learn. Cybern. 2016, 7, 1225–1239. [Google Scholar] [CrossRef]
  13. Zhang, Y.; Wang, C.; Zhou, X. RST resilient watermarking scheme based on DWT-SVD and scale-invariant feature transform. Algorithms 2017, 10, 41. [Google Scholar] [CrossRef] [Green Version]
  14. Hamidi, M.; Chetouani, A.; El Haziti, M.; El Hassouni, M.; Cherifi, H. Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection. In Iberian Conference on Pattern Recognition and Image Analysis; Springer: Berlin/Heidelberg, Germany, 2019; pp. 170–181. [Google Scholar]
  15. Liu, X.; Lou, J.; Fang, H.; Chen, Y.; Ouyang, P.; Wang, Y.; Zou, B.; Wang, L. A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access 2019, 7, 76580–76598. [Google Scholar] [CrossRef]
  16. Nam, S.H.; Kim, W.H.; Mun, S.M.; Hou, J.U.; Choi, S.; Lee, H.K. A SIFT features based blind watermarking for DIBR 3D images. Multimed. Tools Appl. 2018, 77, 7811–7850. [Google Scholar] [CrossRef]
  17. Cui, C.; Wang, S.; Niu, X. A novel watermarking for DIBR 3D images with geometric rectification based on feature points. Multimed. Tools Appl. 2017, 76, 649–677. [Google Scholar] [CrossRef]
  18. Liu, X.; Wang, Y.; Du, J.; Liao, S.; Lou, J.; Zou, B. Robust hybrid image watermarking scheme based on KAZE features and IWT-SVD. Multimed. Tools Appl. 2019, 78, 6355–6384. [Google Scholar] [CrossRef]
  19. Liu, X.; Zhang, Y.; Du, S.; Zhang, J.; Jiang, M.; Fang, H. Discriminative and Geometrically Robust Zero-Watermarking Scheme for Protecting DIBR 3D Videos. In Proceedings of the 2021 IEEE International Conference on Multimedia and Expo (ICME), Shenzhen, China, 5–9 July 2021; pp. 1–6. [Google Scholar]
  20. Kalker, T. Considerations on watermarking security. In Proceedings of the 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No. 01TH8564), Cannes, France, 3–5 October 2001; pp. 201–206. [Google Scholar]
  21. Liu, R.; Tan, T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 2002, 4, 121–128. [Google Scholar]
  22. Al-Haj, A. Combined DWT-DCT digital image watermarking. J. Comput. Sci. 2007, 3, 740–746. [Google Scholar] [CrossRef] [Green Version]
  23. Lin, S.D.; Shie, S.C.; Guo, J.Y. Improving the robustness of DCT-based image watermarking against JPEG compression. Comput. Stand. Interfaces 2010, 32, 54–60. [Google Scholar] [CrossRef]
  24. Hamidi, M.; El Haziti, M.; Cherifi, H.; El Hassouni, M. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimed. Tools Appl. 2018, 77, 27181–27214. [Google Scholar] [CrossRef] [Green Version]
  25. Preishuber, M.; Hütter, T.; Katzenbeisser, S.; Uhl, A. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2137–2150. [Google Scholar] [CrossRef]
  26. Lagzian, S.; Soryani, M.; Fathy, M. A new robust watermarking scheme based on RDWT-SVD. Int. J. Intell. Inf. Process. 2011, 2, 22–29. [Google Scholar]
  27. Makbol, N.M.; Khoo, B.E. A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit. Signal Process. 2014, 33, 134–147. [Google Scholar] [CrossRef]
  28. Singh, S.; Rathore, V.S.; Singh, R.; Singh, M.K. Hybrid semi-blind image watermarking in redundant wavelet domain. Multimed. Tools Appl. 2017, 76, 19113–19137. [Google Scholar] [CrossRef]
  29. Lyu, W.L.; Chang, C.C.; Nguyen, T.S.; Lin, C.C. Image watermarking scheme based on scale-invariant feature transform. KSII Trans. Internet Inf. Syst. (TIIS) 2014, 8, 3591–3606. [Google Scholar]
  30. Sadreazami, H.; Amini, M. Highly robust image watermarking in contourlet domain using singular value decomposition. In Proceedings of the 2012 IEEE 11th International Conference on Signal Processing, Beijing, China, 21–25 October 2012; Volume 1, pp. 628–631. [Google Scholar]
  31. Amini, M.; Ahmad, M.O.; Swamy, M. A robust multibit multiplicative watermark decoder using a vector-based hidden Markov model in wavelet domain. IEEE Trans. Circuits Syst. Video Technol. 2016, 28, 402–413. [Google Scholar] [CrossRef]
  32. Liu, Y.; Zhang, S.; Yang, J. Color image watermark decoder by modeling quaternion polar harmonic transform with BKF distribution. Signal Process. Image Commun. 2020, 88, 115946. [Google Scholar] [CrossRef]
  33. Amini, M.; Sadreazami, H.; Ahmad, M.O.; Swamy, M. A channel-dependent statistical watermark detector for color images. IEEE Trans. Multimed. 2018, 21, 65–73. [Google Scholar] [CrossRef]
  34. Hu, W.C.; Chen, W.H.; Yang, C.Y. Robust image watermarking based on discrete wavelet transform-discrete cosine transform-singular value decomposition. J. Electron. Imaging 2012, 21, 033005. [Google Scholar] [CrossRef]
  35. Ali, M.; Ahn, C.W.; Pant, M. A robust image watermarking technique using SVD and differential evolution in DCT domain. Opt. Int. J. Light Electron Opt. 2014, 125, 428–434. [Google Scholar] [CrossRef]
  36. Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
  37. Singh, D.; Singh, S.K. DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed. Tools Appl. 2017, 76, 13001–13024. [Google Scholar] [CrossRef]
  38. Roy, S.; Pal, A.K. A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimed. Tools Appl. 2017, 76, 3577–3616. [Google Scholar] [CrossRef]
  39. Lowe, D.G. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 2004, 60, 91–110. [Google Scholar] [CrossRef]
  40. Bay, H.; Ess, A.; Tuytelaars, T.; Van Gool, L. Speeded-up robust features (SURF). Comput. Vis. Image Underst. 2008, 110, 346–359. [Google Scholar] [CrossRef]
  41. Bollimpalli, P.; Sahu, N.; Sur, A. SIFT based robust image watermarking resistant to resolution scaling. In Proceedings of the 2014 IEEE International Conference on Image Processing (ICIP), Paris, France, 27–30 October 2014; pp. 5507–5511. [Google Scholar]
  42. Lee, H.Y.; Kim, H.; Lee, H.K. Robust image watermarking using local invariant features. Opt. Eng. 2006, 45, 037002. [Google Scholar]
  43. Zhang, Y.; Wang, C.; Wang, X.; Wang, M. Feature-based image watermarking algorithm using SVD and APBT for copyright protection. Future Internet 2017, 9, 13. [Google Scholar] [CrossRef] [Green Version]
  44. Senapati, R.K.; Srivastava, S.; Mankar, P. RST invariant blind image watermarking schemes based on discrete tchebichef transform and singular value decomposition. Arab. J. Sci. Eng. 2020, 45, 3331–3353. [Google Scholar] [CrossRef]
  45. Chen, W.; Ren, N.; Zhu, C.; Zhou, Q.; Seppänen, T.; Keskinarkaus, A. Screen-Cam robust image watermarking with feature-based synchronization. Appl. Sci. 2020, 10, 7494. [Google Scholar] [CrossRef]
  46. Nawaz, S.A.; Li, J.; Bhatti, U.A.; Mehmood, A.; Shoukat, M.U.; Bhatti, M.A. Advance hybrid medical watermarking algorithm using speeded up robust features and discrete cosine transform. PLoS ONE 2020, 15, e0232902. [Google Scholar] [CrossRef] [PubMed]
  47. Khayam, S.A. The discrete cosine transform (DCT): Theory and application. Mich. State Univ. 2003, 114, 1–31. [Google Scholar]
  48. Kang, X.b.; Zhao, F.; Lin, G.f.; Chen, Y.j. A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed. Tools Appl. 2018, 77, 13197–13224. [Google Scholar] [CrossRef]
  49. Lai, K.; Bo, L.; Ren, X.; Fox, D. A large-scale hierarchical multi-view rgb-d object dataset. In Proceedings of the 2011 IEEE International Conference on Robotics and Automation, Shanghai, China, 9–13 May 2011; pp. 1817–1824. [Google Scholar]
  50. Zhou, H.; Yuan, Y.; Shi, C. Object tracking using SIFT features and mean shift. Comput. Vis. Image Underst. 2009, 113, 345–352. [Google Scholar] [CrossRef]
  51. Press, W.H.; Flannery, B.P.; Teukolsky, S.A.; Vetterling, W.T. Numerical Recipes in Pascal: The Art of Scientific Computing [disc]; Cambridge University Press: Cambridge, UK, 1989. [Google Scholar]
  52. Li, J. Robust image watermarking scheme against geometric attacks using a computer-generated hologram. Appl. Opt. 2010, 49, 6302–6312. [Google Scholar] [CrossRef]
  53. Weber, A.G. The USC-SIPI image database version 5. USC-SIPI Rep. 1997, 315, 1–24. [Google Scholar]
  54. Petrović, V. Subjective tests for image fusion evaluation and objective metric validation. Inf. Fusion 2007, 8, 208–216. [Google Scholar] [CrossRef]
  55. Moorthy, A.K.; Su, C.C.; Mittal, A.; Bovik, A.C. Subjective evaluation of stereoscopic image quality. Signal Process. Image Commun. 2013, 28, 870–883. [Google Scholar] [CrossRef]
  56. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  57. Hassouni, M.; Cherifi, H.; Aboutajdine, D. HOS-based image sequence noise removal. IEEE Trans. Image Process. 2006, 15, 572–581. [Google Scholar] [CrossRef] [Green Version]
  58. Rital, S.; Bretto, A.; Cherifi, H.; Aboutajdine, D. A combinatorial edge detection algorithm on noisy images. In Proceedings of the International Symposium on VIPromCom Video/Image Processing and Multimedia Communications, Zadar, Croatia, 16–19 June 2002; pp. 351–355. [Google Scholar]
Figure 1. 1-level decomposition of the 2D-DWT.
Figure 1. 1-level decomposition of the 2D-DWT.
Jimaging 07 00218 g001
Figure 2. Difference-of-Gaussians (DoG) function and neighbors of a pixel [42].
Figure 2. Difference-of-Gaussians (DoG) function and neighbors of a pixel [42].
Jimaging 07 00218 g002
Figure 3. Demonstration of watermark embedding: the watermark is inserted in the 8 × 8 blocks of the DCT middle bands of the HL1 sub-bands of the DWT.
Figure 3. Demonstration of watermark embedding: the watermark is inserted in the 8 × 8 blocks of the DCT middle bands of the HL1 sub-bands of the DWT.
Jimaging 07 00218 g003
Figure 4. The proposed embedding scheme.
Figure 4. The proposed embedding scheme.
Jimaging 07 00218 g004
Figure 5. The proposed extracting scheme.
Figure 5. The proposed extracting scheme.
Jimaging 07 00218 g005
Figure 6. The obtained PSNR values using different embedding strength for several test images.
Figure 6. The obtained PSNR values using different embedding strength for several test images.
Jimaging 07 00218 g006
Figure 7. The obtained NC values using different embedding strength for several test images.
Figure 7. The obtained NC values using different embedding strength for several test images.
Jimaging 07 00218 g007
Figure 8. The original images and their corresponding watermarked one. Original images: (a) Mandril, (b) Peppers, (c) Cameraman, (d) Lena, (e) Goldhill, (k) Walkbridge, (l) Woman blonde (m) Livingroom, (n) Pirate, (o) Lake. Watermarked images: (f) Mandril, (g) Peppers, (h) Cameraman, (i) Lena, (j) Goldhill, (p) Walkbridge, (q) Woman blonde, (r) Livingroom, (s) Pirate, (t) Lake.
Figure 8. The original images and their corresponding watermarked one. Original images: (a) Mandril, (b) Peppers, (c) Cameraman, (d) Lena, (e) Goldhill, (k) Walkbridge, (l) Woman blonde (m) Livingroom, (n) Pirate, (o) Lake. Watermarked images: (f) Mandril, (g) Peppers, (h) Cameraman, (i) Lena, (j) Goldhill, (p) Walkbridge, (q) Woman blonde, (r) Livingroom, (s) Pirate, (t) Lake.
Jimaging 07 00218 g008
Figure 9. The violin plot of all 30 test images: (a) Violin plot of the PSNR calculated between original and watermarked images, (b) Violin plot of the SSIM calculated between original and watermarked images.
Figure 9. The violin plot of all 30 test images: (a) Violin plot of the PSNR calculated between original and watermarked images, (b) Violin plot of the SSIM calculated between original and watermarked images.
Jimaging 07 00218 g009
Figure 10. Robustness in terms of NC against rotation attack.
Figure 10. Robustness in terms of NC against rotation attack.
Jimaging 07 00218 g010
Figure 11. Robustness in terms of NC against scaling attack.
Figure 11. Robustness in terms of NC against scaling attack.
Jimaging 07 00218 g011
Figure 12. Sample of attacked watermarked images: (a) Gaussian noise addition with zero mean and standard deviation ( 0.01 ), (b) Salt and pepper noise with noise density 0.01 , (c) Low-pass Gaussian filtering ( σ = 0.5 , 7 × 7 ), (d) Low-pass Gaussian filtering ( σ = 0.6 , 7 × 7 ), (e) Rotation (10°), (f) Scaling ( 1.2 ), (g) Histogram equalization, (h) Cropping( 25 % ), (i) JPEG compression with quality factor 60, (j) JPEG compression with quality factor 5, (k) Gaussian smoothing ( σ = 0.7 , 7 × 7 ), (l) Gaussian smoothing ( σ = 0.9 , 7 × 7 ).
Figure 12. Sample of attacked watermarked images: (a) Gaussian noise addition with zero mean and standard deviation ( 0.01 ), (b) Salt and pepper noise with noise density 0.01 , (c) Low-pass Gaussian filtering ( σ = 0.5 , 7 × 7 ), (d) Low-pass Gaussian filtering ( σ = 0.6 , 7 × 7 ), (e) Rotation (10°), (f) Scaling ( 1.2 ), (g) Histogram equalization, (h) Cropping( 25 % ), (i) JPEG compression with quality factor 60, (j) JPEG compression with quality factor 5, (k) Gaussian smoothing ( σ = 0.7 , 7 × 7 ), (l) Gaussian smoothing ( σ = 0.9 , 7 × 7 ).
Jimaging 07 00218 g012
Figure 13. Extracted watermarks after: (a) Gaussian noise addition with zero mean and standard deviation ( 0.01 ), (b) Salt & pepper noise with noise density 0.01 , (c) Low-pass Gaussian filtering ( σ = 0.5 , 7 × 7 ), (d) Low-pass Gaussian filtering ( σ = 0.6 , 7 × 7 ), (e) Rotation (10°), (f) Scaling ( 1.2 ), (g) Histogram equalization, (h) Cropping( 25 % ), (i) JPEG compression with quality factor 60, (j) JPEG compression with quality factor 5, (k) Gaussian smoothing ( σ = 0.7 , 7 × 7 ), (l) Gaussian smoothing ( σ = 0.9 , 7 × 7 ).
Figure 13. Extracted watermarks after: (a) Gaussian noise addition with zero mean and standard deviation ( 0.01 ), (b) Salt & pepper noise with noise density 0.01 , (c) Low-pass Gaussian filtering ( σ = 0.5 , 7 × 7 ), (d) Low-pass Gaussian filtering ( σ = 0.6 , 7 × 7 ), (e) Rotation (10°), (f) Scaling ( 1.2 ), (g) Histogram equalization, (h) Cropping( 25 % ), (i) JPEG compression with quality factor 60, (j) JPEG compression with quality factor 5, (k) Gaussian smoothing ( σ = 0.7 , 7 × 7 ), (l) Gaussian smoothing ( σ = 0.9 , 7 × 7 ).
Jimaging 07 00218 g013
Figure 14. Robustness comparison in terms of NC between Liu et al.’s scheme [21], Lyu et al.’s scheme [29], zhang et al.’s scheme [13] and the proposed scheme.
Figure 14. Robustness comparison in terms of NC between Liu et al.’s scheme [21], Lyu et al.’s scheme [29], zhang et al.’s scheme [13] and the proposed scheme.
Jimaging 07 00218 g014
Table 1. Watermark imperceptibility measured in terms of PSNR (dB) and SSIM.
Table 1. Watermark imperceptibility measured in terms of PSNR (dB) and SSIM.
Test ImagePSNRSSIM
Mandrill45.280.9865
Lena48.970.9998
Peppers49.970.9988
Cameraman47.540.9987
Goldhill49.370.9998
Walkbridge46.240.9983
Womanblonde46.570.9978
Livingroom48.640.9986
Pirate47.330.9980
Lake48.110.9982
Aerial146.310.9985
Aerial245.880.9877
Airplane_U_247.230.9978
Airplane146.750.9987
Airplane249.530.9998
Airport149.080.9990
APC48.910.9991
Car_and_APCs147.440.9989
Car_and_APCs248.170.9989
Chemical_plant48.620.9988
Clock49.140.9992
Fishing_Boat47.490.9989
house45.860.9876
Moon_surface46.770.9988
Tank146.330.9985
Tank247.310.9979
Tank348.950.9991
Truck48.280.9990
Truck_and_APCs49.550.9997
Truck_and_APCs248.720.9991
Average47.810.9976
Table 2. Watermark robustness measured in terms of NC against Gaussian noise for several test images.
Table 2. Watermark robustness measured in terms of NC against Gaussian noise for several test images.
Test Image ( μ = 0 , σ = 0.001 ) ( μ = 0 , σ = 0.01 )
Mandrill1.00.9865
Lena1.00.9998
Peppers0.99980.9987
Cameraman1.00.9996
Goldhill0.99990.9998
Walkbridge1.00.9982
Womanblonde0.99990.9978
Livingroom1.00.9986
Pirate0.99980.9980
Lake1.00.9982
Aerial10.99820.9975
Aerial20.99080.9878
Airplane_U_20.99950.9980
Airplane10.99920.9986
Airplane21.00.9998
Airport11.00.9991
APC0.99960.9992
Car_and_APCs10.99910.9983
Car_and_APCs20.99990.9985
Chemical_plant0.99990.9991
Clock1.00.9994
Fishing_Boat0.99900.9979
house0.99120.9882
Moon_surface0.99930.9984
Tank10.99930.9987
Tank20.99920.9985
Tank30.99980.9991
Truck1.00.9994
Truck_and_APCs1.00.9995
Truck_and_APCs20.99990.9992
Average0.99910.9976
Table 3. Watermark robustness measured in terms of NC against salt and pepper noise for several test images.
Table 3. Watermark robustness measured in terms of NC against salt and pepper noise for several test images.
Test Image ( μ = 0 , σ = 0.001 ) ( μ = 0 , σ = 0.01 )
Mandrill1.00.9898
Lena1.00.9998
Peppers1.00.9984
Cameraman1.00.9987
Goldhill1.00.9998
Walkbridge1.00.9983
Womanblonde0.99960.9985
Livingroom1.00.9989
Pirate0.99990.9996
Lake0.99990.9993
Aerial10.99860.9979
Aerial20.99180.9879
Airplane_U_20.99950.9982
Airplane10.99950.9984
Airplane21.00.9997
Airport11.00.9990
APC0.99950.9993
Car_and_APCs10.99930.9987
Car_and_APCs21.00.9985
Chemical_plant1.00.9992
Clock1.00.9993
Fishing_Boat0.99920.9983
house0.99230.9881
Moon_surface0.99940.9985
Tank10.99940.9986
Tank20.99930.9988
Tank30.99960.9990
Truck1.00.9994
Truck_and_APCs1.00.9996
Truck_and_APCs21.00.9994
Average0.99920.9975
Table 4. Robustness evaluation measured in terms of normalized correlation after Gaussian smoothing for Mandrill image.
Table 4. Robustness evaluation measured in terms of normalized correlation after Gaussian smoothing for Mandrill image.
Gaussian SmoothingNormalized Correlation
                   3 × 3 1.0
( σ = 0.5 )   5 × 5 1.0
                   7 × 7 1.0
                   3 × 3 1.0
( σ = 0.6 )   5 × 5 1.0
                   7 × 7 1.0
                   3 × 3 0.9984
( σ = 0.7 )   5 × 5 0.9962
                   7 × 7 0.9945
                   3 × 3 0.9939
( σ = 0.8 )   5 × 5 0.9917
                   7 × 7 0.9901
                   3 × 3 0.9894
( σ = 0.9 )   5 × 5 0.9788
                   7 × 7 0.9681
Table 5. Robustness evaluation measured in terms of normalized correlation after low-pass Gaussian filtering for Mandrill image.
Table 5. Robustness evaluation measured in terms of normalized correlation after low-pass Gaussian filtering for Mandrill image.
LPGFNormalized Correlation
                   3 × 3 1.0
( σ = 0.5 )   5 × 5 1.0
                   7 × 7 1.0
                   3 × 3 0.9992
( σ = 0.6 )   5 × 5 0.9986
                   7 × 7 0.9975
Table 6. Watermark robustness in terms of NC after JPEG compression for 30 test images.
Table 6. Watermark robustness in terms of NC after JPEG compression for 30 test images.
QualityNormalized Correlation
901.0
800.9997
700.9918
600.9825
500.9785
400.8981
300.7710
200.7674
100.7355
50.7182
Table 7. Watermark robustness against JPEG2000 attack in terms of NC for 30 test images.
Table 7. Watermark robustness against JPEG2000 attack in terms of NC for 30 test images.
Compression RatioNormalized Correlation
C R = 2 1.0
C R = 4 0.9913
C R = 6 0.9137
C R = 8 0.8752
C R = 10 0.7031
Table 8. Robustness after rotation attack applied to thirty test images.
Table 8. Robustness after rotation attack applied to thirty test images.
Rotation
Image10°20°30°45°
Mandrill0.99980.99440.98770.9816
Lena0.99950.99940.99870.9903
Peppers0.99970.99450.99280.9802
Cameraman0.99050.99080.99120.9864
Goldhill0.99760.99130.98770.9820
Walkbridge0.99990.99650.99580.9901
Womanblonde0.99910.99820.99050.9856
Livingroom0.99790.99560.99370.9869
Pirate0.99930.99910.99510.9906
Lake0.99730.99140.99110.9822
Aerial10.99920.99760.99270.9857
Aerial20.99950.99900.99540.9868
Airplane_U_20.99930.99870.99720.9861
Airplane10.99970.99830.99720.9842
Airplane20.99950.99840.99560.9905
Airport10.99980.99920.99310.9879
APC0.99970.99880.99280.9907
Car_and_APCs10.99960.99860.99370.9834
Car_and_APCs20.99950.99870.99360.9883
Clock0.99990.99830.99580.9861
Fishing_Boat0.99930.99810.99670.9905
House0.99950.99800.99760.9874
Moon_surface0.99910.99870.99450.9867
Tank10.99940.99850.99800.9904
Tank20.99920.99840.99750.9865
Tank30.99970.99860.99720.9906
Truck0.99960.99830.99760.9887
Truck_and_APCs0.99940.99870.99610.9905
Truck_and_APCs20.99930.99900.99680.9861
Table 9. Watermark robustness comparison in terms of NC against combined attacks.
Table 9. Watermark robustness comparison in terms of NC against combined attacks.
Attack[13]Proposed Method
Rotation (10 ° ) + JPEG(100)0.99640.9971
Rotation (10 ° ) + GN( 0 , 0.005 )0.96440.9952
Rotation (10 ° ) + SPN( 0 , 0.005 )0.97790.9951
Rotation (10 ° ) + center cropping( 25 % )0.90980.9963
Scaling ( 0.5 ) + JPEG(100)0.99200.9994
Scaling ( 0.5 ) + GN( 0 , 0.005 )0.92390.9993
Scaling ( 0.5 ) + SPN( 0 , 0.005 )0.93480.9992
Scaling ( 0.5 ) + center cropping( 25 % )0.88070.9993
Horizontal translation + JPEG (100)0.99660.9984
Horizontal translation + GN ( 0 , 0.005 )0.91900.9981
Horizontal translation + SPN ( 0 , 0.005 )0.94550.9979
Horizontal translation + center cropping ( 25 % )0.89810.9985
Rotation (10 ° ) + Scaling( 0.5 )0.98570.9945
Scaling ( 0.5 ) + Horizontal translation0.99120.9944
Rotation (10 ° ) + Horizontal translation0.98510.9937
Table 10. Watermark robustness in terms of NC against combined attacks for Lena.
Table 10. Watermark robustness in terms of NC against combined attacks for Lena.
AttackNC
HE + GN ( 0 , 0.001 )1.0
HE + GN ( 0 , 0.01 )1.0
HE + SPN ( 0 , 0.001 )1.0
HE + SPN ( 0 , 0.01 )0.9834
GN ( 0 , 0.001 ) + JPEG 900.9999
GN ( 0 , 0.001 ) + JPEG 700.9832
SPN ( 0 , 0.01 ) + JPEG 900.9999
SPN ( 0 , 0.01 ) + JPEG 700.9832
LPGF ( σ = 0.5 , 9 × 9 ) + GN ( 0 , 0.001 )0.9881
LPGF ( σ = 0.5 , 9 × 9 ) + GN ( 0 , 0.01 )0.9733
LPGF ( σ = 0.6 , 9 × 9 ) + GN ( 0 , 0.001 )0.9810
LPGF ( σ = 0.6 , 9 × 9 ) + GN ( 0 , 0.01 )0.9758
LPGF ( σ = 0.5 , 9 × 9 ) + SPN ( 0 , 0.001 )0.9732
LPGF ( σ = 0.5 , 9 × 9 ) + SPN ( 0 , 0.01 )0.9665
LPGF ( σ = 0.6 , 9 × 9 ) + SPN ( 0 , 0.001 )0.9644
LPGF ( σ = 0.6 , 9 × 9 ) + SPN ( 0 , 0.01 )0.9602
GN ( 0 , 0.001 ) + HE + JPEG 900.9999
SPN ( 0 , 0.01 ) + HE + JPEG 700.9991
GN ( 0 , 0.001 ) + ROT (15) + HE0.9996
SPN ( 0 , 0.01 ) + SC (0.8) + HE0.9993
JPEG 70 + ROT (30) + SC (1.2)0.9995
JPEG 50 + MF ( 3 × 3 ) + SC (1.2)0.9627
CR (50%) + ROT (45) + HE0.9732
JPEG 40 + ROT (30) + SC (0.8)0.9901
JPEG 60 + MF ( 3 × 3 ) + SC (1.2)0.9788
CR (50%) + ROT (45) + SC (0.5)0.9604
Table 11. Imperceptibility comparison values in terms of PSNR (db) and SSIM for Lena image of Lagzian et al. [26], Makbol et al. [27], Singh et al. [28], Chen et al. [45] and the proposed method using a watermark of size 256 × 256 .
Table 11. Imperceptibility comparison values in terms of PSNR (db) and SSIM for Lena image of Lagzian et al. [26], Makbol et al. [27], Singh et al. [28], Chen et al. [45] and the proposed method using a watermark of size 256 × 256 .
Lagzian et al. [26]Makbol et al. [27]Singh et al. [28]Proposed Scheme
PSNR37.5243.676944.4048.97
SSIM0.98650.98720.99350.9998
Table 12. Watermark robustness measured in terms of NC with and without SIFT for cameraman image.
Table 12. Watermark robustness measured in terms of NC with and without SIFT for cameraman image.
AttacksDWT-DCTDWT-DCT-SIFT
Rotation
20.31710.9711
50.28880.9888
100.23450.9905
300.08790.9912
Scaling
0.250.30730.9831
0.50.17650.9987
0.90.09130.9990
1.20.01880.9984
Horizontal translation (128 pixels)0.08630.9971
Vertical translation (128 pixels)0.06540.9970
Gaussian noise
μ = 0 , σ = 0.001 1.01.0
μ = 0 , σ = 0.01 0.99980.9998
Salt and pepper noise
μ = 0 , σ = 0.001 1.00.9998
μ = 0 , σ = 0.1 1.00.9998
JPEG
801.01.0
600.99980.9998
400.96810.9681
Low-pass Gaussian filtering
σ = 0.5 , 7 × 7 1.01.0
σ = 0.6 , 7 × 7 0.99750.9975
Table 13. Robustness comparison measured in terms of NC for Lena image.
Table 13. Robustness comparison measured in terms of NC for Lena image.
Attack[26]Proposed Method
Rotation (50°)0.86300.9891
Gaussian noise ( 0 , 0.001 )0.99711.0
Gaussian noise ( 0 , 0.005 )0.97921.0
JPEG (50)0.99380.9832
Salt and pepper noise ( 0 , 0.001 )0.99591.0
Salt and pepper noise ( 0 , 0.005 )0.99851.0
Median filter ( 3 × 3 )0.99420.9802
Histogram equalization0.85301.0
Table 14. Robustness comparison measured with [27] in terms of NC for Lena image.
Table 14. Robustness comparison measured with [27] in terms of NC for Lena image.
Attack[27]Proposed Method
Gaussian noise ( 0 , 0.005 )0.88221.0
Gaussian noise ( 0 , 0.3 )0.88940.9002
Salt and pepper noise ( 0 , 0.001 )0.97701.0
Rotation (20 ° )0.98030.9994
Rotation (50 ° )0.97190.9991
JPEG (40)0.97760.9681
JPEG (30)0.97010.9532
Median filter ( 3 × 3 )0.97580.9802
Histogram equalization0.98541.0
Table 15. Robustness comparison measured with [28] in terms of NC for Lena image.
Table 15. Robustness comparison measured with [28] in terms of NC for Lena image.
Attack[28]Proposed Method
Gaussian noise ( 0 , 0.001 )0.99881.0
Gaussian noise ( 0 , 0.01 )0.98300.9998
Salt and pepper noise ( 0 , 0.1 )0.98770.9903
Salt and pepper noise ( 0 , 0.5 )0.97700.9778
Rotation (10°)0.98580.9995
Rotation (20°)0.98510.9994
Rotation (30°)0.98530.9987
Rotation (40°)0.98720.9990
Rotation (50°)0.98810.9991
JPEG (90)0.99901.0
JPEG (60)0.99900.9999
Median filter ( 3 × 3 )0.99620.9802
Histogram equalization0.99721.0
Table 16. Robustness comparison with [13] measured in terms of NC for Lena.
Table 16. Robustness comparison with [13] measured in terms of NC for Lena.
Attack[13]Proposed Method
Scaling ( 0.25 )0.97740.9831
Scaling ( 0.5 )0.99190.9987
Scaling ( 0.9 )0.99310.9990
Scaling ( 1.2 )0.99060.9984
Rotation (2 ° )0.97410.9998
Rotation (5 ° )0.98130.9998
Rotation (10 ° )0.98610.9995
Rotation (30 ° )0.98610.9987
Rotation (45 ° )0.98280.9903
Horizontal cycling translation (128 pixels)0.99640.9971
Vertical cycling translation (128 pixels)0.99640.9970
JPEG (100)0.99661.0
Median filter ( 3 × 3 )0.99130.9802
Center cropping ( 25 % )0.91791.0
Gaussian noise ( 0 , 0.01 )0.97881.0
Gaussian noise ( 0 , 0.05 )0.95091.0
Salt and pepper noise ( 0 , 0.01 )0.97581.0
Salt and pepper noise ( 0 , 0.05 )0.96440.9998
Table 17. Comparison of the robustness of the proposed algorithm with different methods against several attacks for Lena image.
Table 17. Comparison of the robustness of the proposed algorithm with different methods against several attacks for Lena image.
Attack[21][13]Proposed Method
Median filter ( 3 × 3 )0.51700.99130.9802
Cropping 25%0.98220.91791.0
JPEG
1000.99410.99661.0
Rotation
2 ° 0.96870.97410.9711
5 ° 0.91970.98130.9888
10 ° 0.78250.98610.9905
Scaling
0.9 0.97100.99310.9990
1.2 0.87090.99060.9984
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hamidi, M.; El Haziti, M.; Cherifi, H.; El Hassouni, M. A Hybrid Robust Image Watermarking Method Based on DWT-DCT and SIFT for Copyright Protection. J. Imaging 2021, 7, 218. https://doi.org/10.3390/jimaging7100218

AMA Style

Hamidi M, El Haziti M, Cherifi H, El Hassouni M. A Hybrid Robust Image Watermarking Method Based on DWT-DCT and SIFT for Copyright Protection. Journal of Imaging. 2021; 7(10):218. https://doi.org/10.3390/jimaging7100218

Chicago/Turabian Style

Hamidi, Mohamed, Mohamed El Haziti, Hocine Cherifi, and Mohammed El Hassouni. 2021. "A Hybrid Robust Image Watermarking Method Based on DWT-DCT and SIFT for Copyright Protection" Journal of Imaging 7, no. 10: 218. https://doi.org/10.3390/jimaging7100218

APA Style

Hamidi, M., El Haziti, M., Cherifi, H., & El Hassouni, M. (2021). A Hybrid Robust Image Watermarking Method Based on DWT-DCT and SIFT for Copyright Protection. Journal of Imaging, 7(10), 218. https://doi.org/10.3390/jimaging7100218

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop