DOI QR코드

DOI QR Code

Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain

  • Liu, Jinhua (School of Mathematics and Computer Science, ShangRao Normal University) ;
  • Rao, Yunbo (School of Information and Software Engineering, University of Electronic Science and Technology of China)
  • Received : 2018.05.21
  • Accepted : 2018.09.22
  • Published : 2019.01.31

Abstract

Most existing wavelet-based multiplicative watermarking methods are affected by geometric attacks to a certain extent. A serious limitation of wavelet-based multiplicative watermarking is its sensitivity to rotation, scaling, and translation. In this study, we propose an image watermarking method by using dual-tree complex wavelet transform with a multi-objective optimization approach. We embed the watermark information into an image region with a high entropy value via a multiplicative strategy. The major contribution of this work is that the trade-off between imperceptibility and robustness is simply solved by using the multi-objective optimization approach, which applies the watermark error probability and an image quality metric to establish a multi-objective optimization function. In this manner, the optimal embedding factor obtained by solving the multi-objective function effectively controls watermark strength. For watermark decoding, we adopt a maximum likelihood decision criterion. Finally, we evaluate the performance of the proposed method by conducting simulations on benchmark test images. Experiment results demonstrate the imperceptibility of the proposed method and its robustness against various attacks, including additive white Gaussian noise, JPEG compression, scaling, rotation, and combined attacks.

Keywords

1. Introduction

Digital multimedia data, such as audio, image, and video data, can be easily accessed and distributed over the Internet due to the rapid development of information technology. Therefore, the copyright protection of multimedia products has become increasingly important. Digital watermarking technology, which is one of the key technologies used in the field of information hiding, has been widely investigated in recent years with regard to copyright protection, image authentication, and fingerprinting [1-3].

Robustness, invisibility, and capacity are indispensable for a watermarking system; however, they are contrasting requirements for a watermarking method. Consequently, any watermarking algorithm should ideally provide good balance among the three aspects. Robustness, imperceptibility, and capacity influence one another and must frequently be addressed together [4]. For example, the robustness of watermarking inevitably decreases as imperceptibility increases.

In general, watermarking methods can be categorized in different ways. For example, watermarking methods can be categorized into spatial-domain [5] and frequency-domain methods based on the embedding space of the watermark [6-10]. Watermark hiding methods can also be classified into additive [11], multiplicative [12-13], and quantization-based [14-15] methods. In terms of watermark decoding, watermarking methods can be categorized into blind [12] and non-blind [16]. As mentioned in the literature [7-8,17], frequency-domain watermarking algorithms have been widely developed in most current watermarking methods because these algorithms are robust, invisible, and stable, particularly for wavelet-based image watermarking. Moreover, multiplicative watermarking methods are more robust and provide higher watermark imperceptibility than additive watermarking methods. Accordingly, a frequency domain-based watermarking algorithm that uses multiplicative methods is considered in this study.

Wavelet transform (WT) can accurately represent 1D signal discontinuities due to its approximate compact support and alternating positive and negative fluctuations in the time domain. However, wavelets fail to represent singularities when dimension increases because WT lacks translation invariance. To overcome the limitation of WT, many multiscale geometric analysis methods that can capture intrinsic geometric structures in natural images, such as smooth curves and contours, have been utilized. Examples include ridgelets [18], wave atoms [19], contourlets [16, 20], and dual-tree complex WT (DT-CWT) [21].

In this work, we apply DT-CWT to embed watermarks into images. In general, DT-CWT can be regarded as an overcomplete transform that creates redundant coefficients that can be used to embed watermarks [22]. As stated in [22], shift invariance is one of the key features of complex wavelets. A watermark can be produced by applying this property.This watermark can be decoded further even after the watermarked image has undergone extensive geometric distortions, such as scaling and rotation. DT-CWT achieves good approximate shift invariance and directional selectivity in image processing when dealing with high-dimensional signals.

Motivated by [17], we propose a multi-objective optimization-based watermarking method by using DT-CWT in this study. First, we segment an original image into small blocks and use high-entropy blocks as embedding space. Second, in accordance with the value of the watermark bits, we embed the watermark into the real parts of the complex wavelet coefficients based on a multiplicative mechanism by using a watermark strength factor. A maximum likelihood (ML) detector is used for watermark extraction. Finally, the experimental results demonstrate the invisibility of the proposed watermarking method and its higher robustness to resist attacks compared with other watermarking methods based on simulations on test images.

A substantial difference exists between the proposed method and the method presented in [17]. Their difference consists of two aspects. On the one hand, the watermark embedding space of the two methods differs. Literature [17] embeds watermark information into the wavelet coefficients of the host image, whereas the proposed method embeds the watermark information into the complex wavelet coefficients of the host image. On the other hand, the current study adopts a complex wavelet structural similarity index (CW-SSIM) in the design of the multi-objective optimization method to describe image visibility when finding the optimal value of the watermark strength factor. The CW-SSIM metric is built based on local phase measurements in complex WT domain. Thus, this evaluation measurement can provide a good approximation of perceptual image quality. Meanwhile, the SSIM metric is highly sensitive to the translation, scaling, and rotation of images [17].

The contributions of the proposed method is summarized as follows. 1) The proposed modified watermarking approach embeds watermark data into a high-entropy region by using DT-CWT. The robustness of the watermark against geometric distortion attacks is improved by using this strategy. 2) The multi-objective function optimization model is built based on an error probability and image quality metric. In particular, an objective function, i.e., CW-SSIM, is utilized to describe the visual quality of an image. This evaluation measurement can provide a good approximation of perceptual image quality because it utilizes local phase information. Therefore, the trade-off between the imperceptibility and robustness of watermarking can be achieved by using the error probability and the CW-SSIM index as the objective function.

The remainder of this paper is organized as follows. Section 2 presents the proposed watermarking method that consists of watermark embedding and decoding. Section 3 describes the multi-objective optimization strategy. Section 4 provides the experimental results and discussions about the performance of the proposed watermarking method. Finally, Section 5 concludes this study.

2. Watermark Embedding and Detection

In accordance with the human visual system (HVS), strong edges are typically observed in high-entropy blocks, but the human eye is less sensitive to such blocks [16]. Inspired by the entropy masking model [23], we select high-entropy image blocks as watermark embedding space in this study. Our proposed watermarking method focus on two stages: embedding and detection. Figure 1 shows the flowchart of the proposed watermarking method, which is performed through the following steps.

2.1 Watermark Embedding

Fig. 1(a) presents the block diagram of the embedding method. The watermark embedding process consists of the following steps.

Step 1: The host image is segmented into L × L  blocks, N high-entropy blocks are selected, and the selection threshold is set to the average entropy of all the image blocks. The entropy can explicitly be expressed as

\(H=-\sum_\limits{i=1}^{n} p_{i} \log p_{i}\)       (1)

where pi indicates the probability that grayscale i appears in the image, and \(\sum_{i=1}^{n} p_{i}=1\) . n denotes the number of different pixel values. Entropy measures the amount of information in a signal. When the entropy of the host image is high, considerable watermark information can be embedded into the original image. Thus, entropy is applied to improve the robustness of watermarking.

Step 2: DT-CWT is adopted to decompose each selected image block, and a watermark bit of “0” or “1” is embedded into each block by scaling the real parts of the DT-CWT coefficients through the following approach:

\(\tilde{\boldsymbol{y}}=\lambda \times \boldsymbol{x}, \quad \text { for embedding } 1,\)       (2)

\(\tilde{y}=\frac{1}{\lambda} \times x, \quad \text { for embedding } 0,\)       (3)

where \(\lambda\) is the strength factor and is higher than 1.0. Its optimal value is discussed in Section 3. \(x\) represents the real parts of the DT-CWT coefficients, whereas \(\tilde{y}\) denotes the watermarked coefficients.

Step 3: Step 2 is repeated for each image block.

Step 4: Inverse DT-CWT is applied to the watermarked image and combined with the non-watermarked image to obtain the entire watermarked image.

Fig. 1. Flow chart of the proposed watermarking method. a) Embedding. b) Detection.

2.2 Watermark Detection

Fig. 1(b) shows the flowchart of watermark decoding. Two types of side information are included in watermark detection and are expressed as follows: 1) the positions of the image block that is qualified to embed the watermark based on their entropy level and 2) the watermark strength factor. Fig. 2 shows the statistical distribution for different blocks of the Barbara image. A Gaussian distribution function can accurately model the distribution of the real parts of the complex wavelet coefficients. A decoder in a watermarking system extracts the hidden binary sequence from a set of observed complex wavelet coefficients. In this work, the bits of the binary sequence are assumed to be equally probable, and the real parts of the DT-CWT coefficients with a low frequency are assumed to be independent and identically distributed (i.i.d.) via the Gaussian distribution.

From [17], the effect of attacks is simply modeled as additive white Gaussian noise (AWGN) at the receiver. Given that the DT-CWT coefficients and noise are independent of each other and are independent and identically Gaussian distributed, the distribution of y for “1” or “0” embedding can be expressed as

\(y_{i | l}=\lambda \cdot x_{i}+n_{i} \Rightarrow y_{i | l} \in N\left(\lambda \mu, \sigma_{y | l}^{2}\right)\)       (4)

\(y_{i | 0}=\lambda^{-l} \cdot x_{i}+n_{i} \Rightarrow y_{i | \theta} \in N\left(\lambda^{-l} \mu, \sigma_{y | \theta}^{2}\right)\)       (5)

where \(\sigma_{y | l}^{2}=\lambda^{2} \sigma^{2}+\sigma_{n}^{2}, \quad \sigma_{y / 0}^{2}=\lambda^{-2} \sigma^{2}+\sigma_{n}^{2}\) and \(\sigma_n^2\) denotes the variance of noise [17]. xi represents the DT-CWT coefficients with a low-frequency sub-band used for watermark embedding with mean µ and variance σ2 .

The DT-CWT coefficients are assumed to be i.i.d. in this study because they are decimated in each decomposition scale. Therefore, the distribution of the DT-CWT coefficients in each block with N coefficients \(y_{1}, y_{2}, \cdots, y_{N}\) for “1” embedding is [17]

\(f\left(y_{1}, y_{2}, \cdots, y_{N} | 1\right)=\prod_\limits{i=1}^{N} \frac{1}{\sqrt{2 \pi} \sigma_{y |1}} \exp \left(\frac{-\left(y_{i}-\lambda \mu\right)^{2}}{2 \cdot \sigma_{y |1}^{2}}\right)\)       (6)

Similarly, for “0” embedding, we have

\(f\left(y_{1}, y_{2}, \cdots, y_{N} | 0\right)=\prod_\limits{i=1}^{N} \frac{1}{\sqrt{2 \pi} \sigma_{y / 0}} \exp \left(\frac{-\left(y_{i}-\lambda^{-1} \mu\right)^{2}}{2 \cdot \sigma_{y / 0}^{2}}\right)\)       (7)

On the basis of the ML decision criterion [24], watermark detection can be presented as follows:

\(f\left(y_{1}, y_{2}, \cdots, y_{N} | 1\right)>f\left(y_{1}, y_{2}, \cdots, y_{N} | 0\right), \text { extracted } \hat{w}=1,\)       (8)

 

\(f\left(y_{1}, y_{2}, \cdots, y_{N} | 1\right)<f\left(y_{1}, y_{2}, \cdots, y_{N} | 0\right), \text { extracted } \hat{w}=0.\)       (9)

Thus, by substituting (6) and (7) into (8) and (9), we derive

\(\prod_\limits{i=1}^{N} \frac{1}{\sqrt{2 \pi} \sigma_{y |1}} \exp \left(\frac{-\left(y_{i}-\lambda \mu\right)^{2}}{2 \cdot \sigma_{y |1}^{2}}\right)>\prod_\limits{i=1}^{N} \frac{1}{\sqrt{2 \pi} \sigma_{y | 0}} \exp \left(\frac{-\left(y_{i}-\lambda^{-1} \mu\right)^{2}}{2 \cdot \sigma_{y | 0}^{2}}\right), \hat{w}=1,\)       (10)

\(\prod_\limits{i=1}^{N} \frac{1}{\sqrt{2 \pi} \sigma_{y | 1}} \exp \left(\frac{-\left(y_{i}-\lambda \mu\right)^{2}}{2 \cdot \sigma_{y |1}^{2}}\right)<\prod_\limits{i=1}^{N} \frac{1}{\sqrt{2 \pi} \sigma_{y | 0}} \exp \left(\frac{-\left(y_{i}-\lambda^{-1} \mu\right)^{2}}{2 \cdot \sigma_{y |0}^{2}}\right), \hat{w}=0.\)       (11)

We consider the logarithm of the two sides as follows:

\(\left(\frac{1}{\sigma_{y | 0}^{2}}-\frac{1}{\sigma_{y | 1}^{2}}\right) \sum_\limits{i=1}^{N} y_{i}^{2}-2 \lambda\left(\frac{\lambda^{-1}}{\sigma_{y | 0}^{2}}-\frac{\lambda}{\sigma_{y | 1}^{2}}\right) \sum_\limits{i=1}^{N} y_{i}>\tau, \hat{w}=1,\)       (12)

\(\left(\frac{1}{\sigma_{y | 0}^{2}}-\frac{1}{\sigma_{y | 1}^{2}}\right) \sum_\limits{i=1}^{N} y_{i}^{2}-2 \lambda\left(\frac{\lambda^{-1}}{\sigma_{y | 0}^{2}}-\frac{\lambda}{\sigma_{y | 1}^{2}}\right) \sum_\limits{i=1}^{N} y_{i}<\tau, \hat{w}=0,\)       (13)

where the watermark detection threshold τ can be expressed as

\(\tau=2 N \ln \left(\frac{\sigma_{y |1}}{\sigma_{y |0}}\right)-N \lambda^{2}\left(\frac{\lambda^{-2}}{\sigma_{y| 0}^{2}}-\frac{\lambda^{2}}{\sigma_{y |1}^{2}}\right)\)       (14)

 

Fig. 2. Histogram of real parts of DT-CWT coefficients for different blocks of Barbara, where the horizontal axis represents the mean and variance.

3. Multi-objective Optimization Method

To find the optimal value of the watermark embedding strength factor, a multi-objective optimization method is designed to determine an appropriate value for λ that ensures invisibility with acceptable robustness by using the image quality evaluation measure and the watermark error probability.

3.1 Image Quality Evaluation Function

Literature [25] presented an image quality assessment method based on SSIM. First, the local SSIM index is calculated by comparing the image patches, and then the global SSIM index is computed by applying a sliding window scheme followed by a spatial pooling stage [25]. In particular, the basic principle of the SSIM metric method states that the human eye perception system is highly adapted to extracting image structural information. Hence, the SSIM metric method can provide a good image quality evaluation mechanism. However, the major drawback of the SSIM metric method is that it is highly sensitive to translation, scaling, and rotation.

Literature [26] proposed a CW-SSIM metric method by considering the local phase measurements in DT-CWT domain. As reported in [26], the local phase pattern contains more structural information than the local magnitude. Furthermore, nonstructural image distortions, such as small translations, will lead to a consistent phase shift in a group of adjacent DT-CWT coefficients. Accordingly, CW-SSIM separates the phase pattern from the magnitude distortion measurement and imposes considerable penalties to inconsistent phase distortions in [26].

Given two sets of DT-CWT coefficients, i.e., \(\boldsymbol{C}_{x}=\left\{c_{x , i} | i=1,2, \dots, N\right\}\) and \(\boldsymbol{C}_{y}=\left\{c_{y, i} | i=1,2, \ldots, N\right\}\) , extracted at the same location in the same DT-CWT sub-bands of the host and distorted images, the local CW-SSIM index \(S_{L}(\cdot)\) can be expressed as

\(S_{L}\left(\boldsymbol{C}_{x}, \boldsymbol{C}_{y}\right)=\left(\frac{2 \sum_\limits{i=1}^{N}\left|C_{x, i} \| C_{y, i}^{*}\right|+C_{0}}{\sum_\limits{i=1}^{N}\left|C_{x, i}\right|^{2}+\sum_\limits{i=1}^{N}\left|C_{y, i}\right|^{2}+C_{0}}\right),\)       (15)

where C represents the complex conjugate of the DT-CWT coefficients C , and C0 is a positive constant. On the basis of [26], the global CW-SSIM index is calculated as the average of all local CW-SSIM values. The primary advantage of the CW-SSIM index is that it is simultaneously insensitive to contrast change, luminance change, and small geometric distortions, such as translation, scaling, and rotation [26].

Given that the watermark embedding method can be regarded as the scaling process of all the complex wavelet coefficients, the selected image blocks generally reflect most of the energy information of an image. Therefore, the watermark embedding scheme can be approximately represented as \(C_{y} \approx \lambda C_{x}\) . When \(C_{y} \approx \lambda C_{x}\) is substituted into (15), the local CW-SSIM index can be further expressed as

\(S_{L}\left(\boldsymbol{C}_{x}, \boldsymbol{C}_{y}\right)=\frac{2 \lambda \sum_\limits{i=1}^{N}\left|C_{x, i}\right|^{2}+C_{0}}{\sum_\limits{i=1}^{N}\left|C_{x, i}\right|^{2}+\lambda^{2} \sum_\limits{i=1}^{N}\left|C_{x, i}\right|^{2}+C_{0}}=\frac{2 \lambda+C_{0} / \sum_\limits{i=1}^{N}\left|C_{x, i}\right|^{2}}{1+\lambda^{2}+C_{0} / \sum_\limits{i=1}^{N}\left|C_{x, i}\right|^{2}}\)       (16)

On the basis of (16), the global CW-SSIM index between two images can be expressed as the average of all image sub-blocks as follows:

\(S(\lambda)=\frac{1}{K} \sum_\limits{i=1}^{K} S_{L}\left(\boldsymbol{C}_{x}, \boldsymbol{C}_{y}\right)\)       (17)

where K represents the number of image blocks.

From the preceding analysis, the image distortion function is defined as \(F_{CW-SSIM}(\lambda)=1-S(\lambda)\), which is the first objective function for exhibiting the effect of λ on the image distortion. Fig. 3(a) shows the relationship between the image distortion function and the embedding strength factor. As shown in the figure, the value of the objective function increases with an increase of the embedding strength factor intensity. Therefore, the distortion degree of an image increases with an increase of the embedding strength factor, which leads to considerable distortions of the watermarked image. Accordingly, the second objective function, which is called the error probability function, should be defined when controlling watermark robustness. On the basis of the two objective functions, the multi-objective optimization model can be defined to achieve balance between visual perception quality and robustness.

3.2 Error Probability of Watermark

In this work, we discuss the watermark error probability under the presence of AWGN as follows. The error occurs when watermark bit “1” is embedded into a host signal while “0” is decoded at the detection end, and vice versa. The watermark error probability contains two errors.

On the basis of (12), the error probability of the embedding watermark information “1” is

\(f_{e | 1}=f\left(\left(\frac{1}{\sigma_{y | 0}^{2}}-\frac{1}{\sigma_{y | 1}^{2}}\right) \sum_{i=1}^{N} y_{i}^{2}-2 \lambda\left(\frac{\lambda^{-1}}{\sigma_{y | 0}^{2}}-\frac{\lambda}{\sigma_{y | 1}^{2}}\right) \sum_{i=1}^{N} y_{i}<\tau | 1\right),\)       (18)

where \(\tau=2 N \ln \left(\frac{\sigma_{y |1}}{\sigma_{y | 0}}\right)-N \lambda^{2}\left(\frac{\lambda^{-2}}{\sigma_{y | 0}^{2}}-\frac{\lambda^{2}}{\sigma_{y | 1}^{2}}\right) \). Let  \( \omega_{1}=\left(\frac{1}{\sigma_{y | 0}^{2}}-\frac{1}{\sigma_{y | 1}^{2}}\right)\) and \(\omega_{2}=-2 \lambda\left(\frac{\lambda^{-1}}{\sigma_{y | 0}^{2}}-\frac{\lambda}{\sigma_{y | 1}^{2}}\right)\).

From the results of [17], \(f_{e | 1}\) can be written as

\(f_{e 1}=\frac{1}{\sqrt{2 \pi N \sigma_{y | 1}^{2}}} \cdot \frac{\kappa_{1}}{\kappa_{2}} \int_{0}^{\infty} \gamma\left(\frac{N}{2}, \frac{x}{2}\right) \cdot \exp \left(-\left(\tilde{\tau}-\kappa_{1} x / \kappa_{2}-N \lambda \mu\right) /\left(2 N \sigma_{y |1}^{2}\right)\right) d x\)       (19)

where \(\gamma\left(\frac{N}{2}, \frac{x}{2}\right)\) denotes the gamma function,

\(\kappa_{1}=\omega_{1} \sigma_{y | 1}^{2}, \quad \kappa_{2}=2 \lambda \mu \omega_{1}+\omega_{2}\), and  \(\tilde{\tau}=\tau+\omega_{1} N \lambda^{2} \mu^{2}\).

Furthermore, the error probability of the embedding watermark information “0” is

\(f_{e | 0}=f\left(\omega_{1} \sum_\limits{i=1}^{N} y_{i}^{2}+\omega_{2} \sum_\limits{i=1}^{N} y_{i}>\tau | 0\right)\)      (20)

From [17], \(f_{e | 0}\) can be written further as

\(f_{e[0}=1-\frac{c_{1}}{c_{2} \sqrt{2 \pi N \sigma_{y | 0}^{2}}} \cdot \int_{0}^{\infty} \gamma\left(\frac{N}{2}, \frac{x}{2}\right) \cdot \exp \left(-\left(\widehat{\tau}-c_{1} x / c_{2}-N \lambda^{-1} \mu\right) /\left(2 N \sigma_{y | 0}^{2}\right)\right) d x\)       (21)

where \(c_{1}=\omega_{1} \sigma_{y | 0}^{2}, \ \sigma_{y| 0}^{2}=\lambda^{-2} \sigma^{2}+\sigma_{n}^{2},\ c_{2}=2 \lambda^{-1} \mu \omega_{1}+\omega_{2}, \text { and } \hat{\tau}=\tau+\omega_{1} N \lambda^{-2} \mu^{2}\).

In summary, given that the watermark bits “0” or “1” are embedded into an image with the same probability, the total error probability can be written as (22) based on (19) and (21):

\(F_{e}(\lambda)=0.5 f_{e |1}+0.5 f_{e |0}\)       (22)

Fig. 3(b) illustrates the objective function \(F_{e}(\lambda)\) with different embedding strength factors for the Lena image with dimension 512×512. In this figure,\(F_{e}(\lambda)\)monotonically decreaes with an increase in the embedding strength factor.

This study aims to determine the optimal value of the watermark strength factor by minimizing the two objective functions. However, the two objective functions cannot be estimated because they have different properties. Therefore, we translate the two objective functions into a multi-objective optimization problem. We adopt the method presented in [27] to address this problem. In this method, a set of design goals and a set of weights are considered to optimize a set of objective functions with several trade-offs. Then, the multi-objective optimization problem can be expressed as

\(\min _\limits{\eta \in R} \eta, \text { s.t. } \varphi_{i}(x)-\vartheta_{i} \eta \leq \varphi_{i}^{*}, i=1,2, \cdots n, x \in \Omega\)       (23)

where \(\vartheta=\left[\vartheta_{1}, \vartheta_{2}, \cdots, \vartheta_{n}\right]\) denotes the weight vector , \(\varphi(x)=\left[\varphi_{1}(x), \varphi_{2}(x), \cdots, \varphi_{n}(x)\right]\) denotes a set of objective functions, and \(\varphi^{*}=\left[\varphi_{1}^{*}, \varphi_{2}^{*}, \cdots, \varphi_{n}^{*}\right]\) represents a set of design goals. Ω represents the feasible region in parameter space x , and η denotes an auxiliary variable. ϑ is the weight vector that enables the designer to select trade-offs among the objective functions.

In this experiment, we set the weights to 0.6 and 0.4 for\(F_{C W-S S IM}(\lambda) \text { and } F_{e}(\lambda)\), respectively, and we use the same method to find the optimum parameter for each image.

Fig. 3. Example of implementing the goal attainment optimization method to find the optimum embedding factor. (a) Objective function based on image quality evaluation measure (b) Objective function based on watermark error probability.

4. Experimental Results and Analysis

4.1 Imperceptibility of Watermarking

To evaluate the performance of the proposed watermarking method, several experiments are conducted on real images. In this section, eight natural images (Lena, Barbara, Boat, Peppers, Baboon, Couple, Goldhill, and Plane) with dimensions of 512 ×512 are used for testing. Fig. 4 shows the host images and their watermarked versions obtained using the proposed watermarking method with a block size of 32 × 32. A three-level DT-CWT with near-symmetric 13, 19 tap filters and Q-shift 14, 14 tap filters is utilized on each selected block throughout the experiments. In this work, we use 128 high-entropy blocks for the proposed method, and we set the length of the host vectors to 16. Therefore, the total watermark length is 2048 (128×16).

Fig. 4. Original ,watermarked and difference image between original and watermarked image (Lena, Barbara, Boat, Peppers, Baboon,Couple,Goldhill, and Plane).

As shown in Fig. 4, the top part is the original image, the middle part is the watermarked image, and the bottom part shows the difference between the original and watermarked images. As shown in the figure, watermark imperceptibility is satisfied because the proposed method provides an image-dependent watermark with strong components in the complex part of the image. In this manner, we can insert a strong watermark into the image region where texture information is abundant, and thus, maintains the image’s good fidelity. Furthermore, the peak signal-to-noise-ratio (PSNR) and SSIM [25] for the watermarked images are computed to objectively investigate the performance of the proposed watermarking method. The results are provided in Table 1. As shown in the table, the performance of the proposed method is verified.

Table 1. Result of image quality assessment

4.2 Performance under Attacks

In this section, various types of attacks are applied to the watermarked images to evaluate the robustness of the proposed method. Watermark robustness is evaluated based on bit error ratio (BER). To reduce space and report all the used parameters, the robustness of the proposed method under AWGN, JPEG compression, amplitude scaling, rotation, and combined attacks on eight well-known images, namely, Lena, Barbara, Boat, Peppers,Baboon,Couple,Goldhill,and Plane, is investigated. Each original image has dimensions of 512×512, and binary watermark data with 2048 bits are embedded into each original image.

1) AWGN attack

Fig. 5 illustrates the robustness against AWGN attack for various images. As shown in the figure, BER is nearly 0 when noise variance is less than 10. BER is nearly 0.1 when noise variance is less than 30. Therefore, the proposed watermarking method exhibits good robustness against AWGN attacks. 

Fig. 5. BER versus noise variance for AWGN attack.

2) JPEG compression attack

Fig. 6 presents the BER results for JPEG compression attack. As shown in the figure, the proposed method exhibits strong robustness against JPEG compression attacks, even though the compression quality factor is extremely low. When the strength of the JPEG compression attack is considerable, such as when the quality factor is 5, the BER result is less than 0.2. BER tends toward 0 when the JPEG quality factor is greater than 25.

Fig. 6. BER versus JPEG quality factor for JPEG compression attack.

3) Scaling attack

Fig. 7 presents the BER results for amplitude scaling attack. As shown in the figure, BER is high when the scaling factor is less than 0.4, and the function of amplitude scaling exhibits an up and down pattern with an increase in the scaling factor. This phenomenon will be investigated in our future work. Moreover, the watermark detector recognizes the original size of an image by using side information.Consequently, the attacked image can be resized to its original size and the watermark information can be decoded at the receiver end.

Fig. 7. BER versus amplitude scaling factor for scaling attack.

4) Rotation attack

Fig. 8 presents the BER resultsfor various images against rotation attack. As shown in the figure, the range of the rotation angle is [−10°, 10°]. When the range of the rotation angle is [− 2°, 2°], the range of BER ], the range of BER is [0.03,0.07]. The effect of BER is minimal with an angle increase. Therefore, the proposed embedding approach is robust against rotation attacks.

Fig. 8. BER versus rotation angle for rotation attack.

5) Combinational attack

To evaluate the robustness of the proposed method in combined attacks, the BER results for AWGN attack is combined with that for the JPEG compression (quality factor = 20%) attack, as illustrated in Fig. 9. This figure confirms the robustness of the proposed watermarking method against this type of combined attacks.

Fig. 9. Results for JPEG compression (quality factor = 20%) attack combined with AWGN attack for various images with different noise variances.

4.3 Comparison with Other Methods

We compare the proposed watermarking method with other methods, namely, the methods presented in [17], [18], [28], [29], and [30]. The algorithms in [17,18,28,29] are selected because of their similarity to the proposed method. The method in [30] is a logarithmic quantization-based watemarking. To make a fair comparison, we consider the same message length and PSNR values in our experiments as those used in the other studies. Table 2 presents the results.

Table 2. BER (%) results of extracted watermark under various attacks

As shown in Table 2, the experiments are conducted by embedding the same watermark length of 256 bits at a PSNR of approximately 45 dB after watermarking, similar to that in [17], [18], [28], and [29], into the Barbara, Boat, Peppers, Baboon, Couple, and Goldhill images. In this regard, the selected image block size is 8×8. As shown in Table 2, the proposed method outperforms the other methods in terms of AWGN, JPEG compression, scaling, and rotation attacks for the Barbara, Boat, Baboon, Couple, and Goldhill images. This result is attributed to DT-CWT exhibiting good approximate shift invariance for geometric transformation. Moreover, the results of the Baboon image are poorer than those of the other images against median filtering attack because the Baboon image has a textured area and can be easily degraded by median filtering.

However, the proposed method is slightly worse than the methods in [17], [18], [28], and [29] in terms of median filtering attack. In addition, the performance of the proposed method is slightly worse than the algorithms in [28] and [29] in terms of resistance to Gaussian low-pass filtering attack.We will investigate these problems in our future work.

Table 3 presents the BER values obtained using the proposed watermarking scheme and the schemes in [17], [18], [28], [29], and [30], in which the watermarked images (Lena, Peppers, Baboon, and Couple) contain a 256-bit message. The result of method [30] is obtained by using the vector logarithmic quantization index modulation approach shown in Table 3. As indicated in Table 3, the proposed method achieves better results than the methods in [17], [18], [28], [29], and [30]. However, our method is more sensitive to Gaussian noise attack for the Baboon and Couple images compared with the method in [28], particularly when the noise variance is greater than 25. This result will be investigated by evaluating the statistical properties of noise in our subsequent work.

Table 3. BER (%) comparison of recovered watermark for AWGN attack

Table 4 provides the BER results for JPEG compression attack using the proposed method and the methods in [17, 18, 28, 29, 30], where the watermark length is 256 bits. As shown in the table, the proposed method exhibits better results than the methods in [17, 18, 28, 29, 30] for JPEG compression attacks.

Table 4. BER (%) comparison of recovered watermark for JPEG compression attack

Table 5 presents the BER results for amplitude scaling attack with a watermark length of 128 bits and the PSNR of the watermarked images being approximately 43 dB. As shown in the table, the results of the proposed method are better than the results of the methods in [17], [18], and [28] for this kind of attack.

Table 5. BER (%) comparison of recovered watermark for Scaling attack

From the preceding comparative analysis, the proposed method does not perform well in some attacks, such as median filtering and Gaussian low-pass filtering attacks. In this work, however, a multi-objective optimization model based on CW-SSIM metric and the watermark error probability is utilized to achieve optimal control of the embedding strength factor by using DT-CWT and information entropy. Therefore, the trade-off between the invisibility and robustness of watermarking can be compromise. Furthermore, the optimization model enhances watermark robustness against certain geometric attacks.

5. Conclusion

In this study, we develop an image watermarking algorithm by utilizing DT-CWT and a multiplicative strategy. High-entropy image blocks are used to encode the complex wavelet coefficients during watermark embedding. Then, we detect the watermark information based on the ML decision criterion. Robustness depends on the use of an optimal watermark strength factor by applying multi-objective optimization functions. We evaluate the performance of the proposed method in terms of image quality and robustness. The experimental results show the effectiveness of the proposed watermarking method. Future work will focus on investigating novel image watermarking algorithms, such as deep learning [31-32], compressive sensing, and game theory.

References

  1. D.Bhowmik, C.Abhayaratne, "Quality scalability aware watermarking for visual content," IEEE Transactions on Image Processing, vol.25, no.11, pp.5158-5172, November, 2016. https://doi.org/10.1109/TIP.2016.2599785
  2. J.X Wang, J.Q Ni, X. Zhang, and Y.Q Shi, "Rate and distortion optimization for reversible data hiding using multiple histogram shifting," IEEE Transactions on Cybernetics, vol.47, no.2, pp.315-326, February, 2017. https://doi.org/10.1109/TCYB.2015.2514110
  3. J.T Zhou, W.W Sun, L. Dong, X.M Liu,Oscar C.Au,and Y.Y Tang, "Secure reversible image data hiding over encrypted domain via key modulation," IEEE Transactions on Circuits and Systems for Video Technology, vol.26, no.3, pp.441-451, March, 2016. https://doi.org/10.1109/TCSVT.2015.2416591
  4. G. C. Langelaar, I. Setyawan, R. L. Lagendijk, "Watermarking digital image and video data: A state-of-the-art overview,"IEEE Transactions on Signal Processing Magazine,vol.17, no.5, pp.20-46, September, 2000.
  5. C.J.Cheng, W.Hwang, H.Zeng,Y.Lin, "A fragile watermarking algorithm for hologram authentication,"Journal of Display Technology, vol.10, no.4, pp.263-271, April, 2014. https://doi.org/10.1109/JDT.2013.2295619
  6. Y.Bian, S.Liang, "Image watermark detection in the wavelet domain using Bessel K densities,"IET Image Processing, vol.7, no.4, pp.281-289, June, 2013. https://doi.org/10.1049/iet-ipr.2012.0345
  7. I.J.Cox, J.Kilian, T.Leighton,"Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol.6, no.12, pp. 1673-1687, December, 1997. https://doi.org/10.1109/83.650120
  8. N. Bi,Q.Y Sun,D. Huang, Z.H Yang, and J.W Huang, "Robust image watermarking based on multiband wavelets and empirical mode decomposition," IEEE Transactions on Image Processing, vol.16, no.8, pp.1956-1967, August, 2007. https://doi.org/10.1109/TIP.2007.901206
  9. S.Lee, C.D.Yoo, T.Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, vol.2, no.3, pp.321-330, September, 2007. https://doi.org/10.1109/TIFS.2007.905146
  10. C.Zhang, L.L.Cheng, Z.Qiu,L.M.Cheng, "Multipurpose watermarking based on multiscale curvelet transform," IEEE Transactions on Information Forensics and Security, vol.3, no.4, pp.611-619, December, 2008. https://doi.org/10.1109/TIFS.2008.2004288
  11. M.Rahman,M.O.Ahmad, M. N. S. Swamy, "A new statistical detector for DWT-based additive image watermarking using the Gauss-Hermite expansion," IEEE Transactions on Image Processing, vol.18, no.8, pp.1782-1796, August, 2009. https://doi.org/10.1109/TIP.2009.2021313
  12. H.Sadreazami,M. O. Ahmad, M. N. S. Swamy,"A study of multiplicative watermark detection in the contourlet domain using alpha stable distributions," IEEE Transactions on Image Processing, vol.23, no.10, pp.4348-4360, October, 2014. https://doi.org/10.1109/TIP.2014.2339633
  13. H.Sadreazami,M. O. Ahmad, M. N. S. Swamy,"A robust multiplicative watermark detector for color images in sparse domain," IEEE Transactions on Circuits and Systems-II :Express Briefs, vol.62, no.12, pp.1159-1163, December, 2015. https://doi.org/10.1109/TCSII.2015.2468995
  14. Q.Li, I.J.Cox, "Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking," IEEE Transactions on Information Forensics and Security, vol.2, no.2, pp.127-139, June, 2007. https://doi.org/10.1109/TIFS.2007.897266
  15. M.Zareian, H.R.Tohidypour, "A novel gain invariant quantization-based watermarking approach," IEEE Transactions on Information Forensics and Security, vol.9, no.11, pp.1804-1813, November, 2014. https://doi.org/10.1109/TIFS.2014.2355912
  16. M.A.Akhaee, S.M.E.Sahraeian, F.Marvasti, "Contourlet-based image watermarking using optimum detector in noisy environment," IEEE Transactions on Image Processing, vol.19, no.4, pp.967-980, April, 2010. https://doi.org/10.1109/TIP.2009.2038774
  17. M.A.Akhaee, S.M.E.Sahraeian, B.Sankur,etal., "Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor," IEEE Transactions on Multimedia, vol.11, no.5, pp.822-833, August, 2009. https://doi.org/10.1109/TMM.2009.2012922
  18. N.K.Kalantari, S.M.Ahadi, M.Vafadust, "A robust image watermarking in the ridgelet domain using universally optimum decoder,"IEEE Transactions on Circuits and Systems for Video Technology, vol.20, no.3, pp.396-406, March, 2010. https://doi.org/10.1109/TCSVT.2009.2035842
  19. L. Demanet, L.X Ying, "Wave atoms and time upscaling of wave equations," Numerische Mathematik, vol.113,no.1,pp.1-71,May, 2009. https://doi.org/10.1007/s00211-009-0226-6
  20. M.N.Do, M.Vetterli, "The contourlet transform: An efficient directional multiresolution image representation,"IEEE Transactions Image Processing, vol.14, no.12, pp.2091-2106, December, 2005. https://doi.org/10.1109/TIP.2005.859376
  21. I.W Selesnick, R.G. Baraniuk, N.G. Kingsbury, "The dual-tree complex wavelets transform- a coherent framework for multi-scale signal and image processing," IEEE Signal Processing Magazine, vol.22, no.6, pp.123-151, July, 2005. https://doi.org/10.1109/MSP.2005.1550194
  22. L.E.Coria, M.R. Pickering,P.Nasiopoulos, R.K.Ward, "A video watermarking scheme based on the dual-tree complex wavelet transform," IEEE Transactions on Information Forensics and Security, vol.3, no.3, pp.466-474, September, 2008. https://doi.org/10.1109/TIFS.2008.927421
  23. A.B. Watson, G.Y. Yang, J.A. Solomon, et al., "Visibility of wavelet quantization noise," IEEE Transactions on Image Processing, vol.6, no.8, pp.1164-1175, August, 1997. https://doi.org/10.1109/83.605413
  24. T. M. Ng, H. K. Garg, "Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling," IEEE Signal Processing Letters, vol.12, no.4, pp.345-348, April, 2005.
  25. Z. Wang, A. C. Bovik, H. R. Sheikh, et al., "Image quality assessment: from error visibility to structural similarity,"IEEE Transactions on Image Processing, vol.13, no.4, pp.600-612, April, 2004. https://doi.org/10.1109/TIP.2003.819861
  26. M. P. Sampat, Z. Wang, S. Gupta, A. C. Bovik,M. K. Markey, "Complex wavelet structural similarity: A new image similarity index," IEEE Transactions on Image Processing, vol.18, no.11, pp.2385-2401, November, 2009. https://doi.org/10.1109/TIP.2009.2025923
  27. F. Gembicki, Y. Haimes, "Approach to performance and sensitivity multi-objective optimization: The goal attainment method," IEEE Transactions on Automatic Control, vol.20, no.6, pp.769-771, December,1975. https://doi.org/10.1109/TAC.1975.1101105
  28. N.Yadav, K.Singh, "Robust image adaptive watermarking using an adjustable dynamic strength factor," Signal,Image and Video Processing, vol.9, no.7, pp. 1531-1542, October, 2015. https://doi.org/10.1007/s11760-013-0607-2
  29. H.Sadreazami, M. O. Ahmad, M. N. S. Swamy, "Multiplicative watermark decoder in contourlet domain using the normal inverse gaussian distribution," IEEE Transactions on Multimedia, vol.18, no.2, pp.196-207, February, 2016. https://doi.org/10.1109/TMM.2015.2508147
  30. N.K.Kalantari, S.M. Ahadi, "A logarithmic quantization index modulation for perceptually better data hiding," IEEE Transactions on Image Processing, vol.19, no.6, pp.1504-1518, June, 2010. https://doi.org/10.1109/TIP.2010.2042646
  31. H.Kandi,D.Mishra,S.R.S.Gorthi, "Exploring the learning capabilities of convolutional neural networks for robust image watermarking," Computer & Security, vol.65, pp.247-268, March,2017. https://doi.org/10.1016/j.cose.2016.11.016
  32. J.S.Zeng, S.Q.Tan, B.Li, J.W.Huang, "Large-scale JPEG image steganalysis using hybrid deep-learning framework," IEEE Transactions on Information Forensics and Security, vol.13, no.5, pp.1200-1214, May, 2018. https://doi.org/10.1109/TIFS.2017.2779446