Next Article in Journal
Mixed Metal Oxide Systems Applied to Thermochemical Storage of Solar Energy: Benefits of Secondary Metal Addition in Co and Mn Oxides and Contribution of Thermodynamics
Previous Article in Journal
A Temperature Fiber Sensor Based on Tapered Fiber Bragg Grating Fabricated by Femtosecond Laser
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins

1
Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
School of Information Engineering, Beijing Institute of Graphic Communication, Beijing 102600, China
3
College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2018, 8(12), 2617; https://doi.org/10.3390/app8122617
Submission received: 20 November 2018 / Revised: 9 December 2018 / Accepted: 11 December 2018 / Published: 14 December 2018

Abstract

:
The histogram watermark, which performs watermark embedding by slightly modifying the histogram of the original image, has been a hot research topic in information hiding technology due to the superiority of its pixel modification during the watermark embedding process, which is independent of the pixel position. This property makes the histogram-based watermark strong resistant to geometric attacks, such as cropping attack, crossed attack, rotation attack, etc. In this paper, we propose a large capacity histogram-based robust watermarking algorithm based on three consecutive bins for the first time. In our scheme, we divide the shape of three consecutive bins into eight cases. According to these cases, we embed Information Number 0, 1, 2, 3, 4, 5, 6, or 7, respectively. The embedded information capacity reaches one bit per bin (bpb), and the amount of embedded information is equal to 200% of the previous existing algorithms. Experimental results show that the new algorithm not only has a large capacity of embedding information, but also has strong robustness to geometric attacks, as well as common image processing operations.

1. Introduction

With the rapid growth of popular and low-cost access to image editing applications, some intentional or unintentional manipulations of digital media during transmission are becoming available [1,2]. This will bring a troublesome issue for copyright protection and authentication since these illegally-manipulated copies of digital media may be easily redistributed and transmitted. Robust watermarking [3] is the technique that embeds information in the image to provide authentication, copyright protection, copy control, etc. The objective of earlier research works of robust watermarking was primarily to realize the capability to resist common image processing operations [4], while recent research works have been prone to emphasizing the functions of resisting geometric attacks [5,6,7,8,9,10,11,12]. Geometric attacks primarily introduce some synchronization errors between the encoder and the decoder. Under geometric attacks, the watermark is still present, whereas the detector is no longer able to extract it. Therefore, how to design a watermarking algorithm robust to geometric attacks has become indispensable and vital in the digital watermarking field.
A variety of watermarking-related methods has been proposed so far, and they can be classified into three categories: inverse transformation based [5,6,7], geometric invariance domain based [8,9,10], and feature area embedding based [11,12]. Inverse transformation-based methods mainly exploit exhaustive search [5] and the embedding template, in addition to the watermark [6] to resist geometric attacks. The implementations of geometric invariance domain-based methods need to use the mathematical transform on the input image before embedding and extracting procedures, like the image normalization method [9] and Zernike moments [10]. Feature area embedding-based methods extract feature points [11] or salient points such as the eyes and the mouth [12] firstly and then embed the watermark in them. Among various categories, geometric invariance domain-based methods are usually vulnerable to cropping attacks; in contrast, feature area-based methods can provide better robustness.
However, all the above schemes, both the earlier and recent schemes robust to geometric attacks, are not fully satisfied. On the one hand, these schemes suffer from computational efficiency problems in the watermark embedding and extracting procedure. On the other hand, these schemes cannot efficiently implement watermark robustness to some geometric attacks, such as random bending attacks (RBAs) and random cropping. It is well known that in an image that has undergone geometric attacks, there may occur three different changes: pixel position, pixel value, and pixel number. In this case, the positions or values of some pixels may be modified; even the number of pixels may be decreased or increased linearly (scaling the size of the image). Based on the analysis, Xiang et al. [13] developed an invariant watermarking solution to geometric attacks by using the histogram and the mean. In their method, the histogram shape was used to embed the watermark based on the property that the histogram shape is only related to the pixel count of each grayscale, not the position of pixels.
Nevertheless, there exist some issues in Xiang et al.’s method [13]: (1) randomly selecting pixels to modify may bring a relatively weak robustness to JPEG compression; (2) the visual quality of some smooth areas in an image will seriously reduce with the increase of the bins’ size; (3) bad bins may exist (the occurrence frequencies of pixels in these bins are zero or few). To solve the first problem, Hu et al. [14] used a novel pixel modification method, i.e., mean squared error (MSE), to choose some blocks to modify preferably. The second issue can be resolved by the methods of [14,15,16]. All of them are based on this strategy, which partitions every three consecutive bins into a group for embedding a one-bit watermark, which guarantees that if a larger bin size is chosen, the image quality of the smooth area will not decrease obviously. Meanwhile, the authors of [15] have proposed to use a predefined threshold to select a large population of pixels in the hope that this will suffice to eliminate possible bad bins. Besides, Zong et al. [17] proposed a histogram-shape-related index method to form and select the most suitable pixel groups for embedding. With their method, some possible bad bins can also be eliminated to some degree. Recently, other possible drawbacks, such as the lower embedding capacity existing in Xiang et al.’s method [13], were also resolved by Feng et al. [18]. Although these improved schemes [14,15,16,17,18] are effective to some extent, they pay no attention to a drawback existing in the original embedding procedure. That is, the embedding procedure of [13] failed to take the approximately equal number of adjacent histogram bins into account, and thus resulted in a direct decline of embedding capacity. Obviously, this restricts many applications, especially limited to those with a strict requirement for watermark capacity.
In this paper, we propose a large capacity histogram-based watermarking algorithm for three consecutive bins. To the best of our knowledge, this is the first scheme to expand from two bins to three bins. The improvement that we propose for watermark embedding differs from those proposed by recent state-of-the-art publications. This is because the proposed watermark embedding algorithm can remedy the drawback in the original design well, but other improved works remain almost invariant in the watermark embedding algorithm. A predefined threshold, together with a block-based pixel modification and new watermark embedding procedures, also makes the proposed scheme a viable alternative to the histogram-based methods. Experiments demonstrate that the maximum embedding capacity of using the proposed histogram-based watermarking algorithm outperforms all the existing histogram shape-based publications and can truly achieve one bit per bin (bpb). Meanwhile, the image quality of the stego-image, which is generated by modifying a part of the pixel values of the original image to carry the watermark information, together with the capability to resist some geometric attacks, can also be ensured.
The rest of this paper is organized as follows. Section 2 describes the invariance of the histogram shape and existing histogram-based watermark embedding. Detailed embedding and extraction processes of the proposed scheme are described in Section 3. Experimental results and related analyses are given in Section 4, followed by a conclusion in Section 5.

2. Preliminaries

2.1. Invariance of the Histogram Shape

In earlier works [13,14,15,16,17,18], a great number of researchers utilized the invariance of the histogram shape to design robust image watermarking. The motivation behind using this histogram-based property can be categorized into two points: (1) modifying a portion of the pixels to embed the watermark is only related to the modification count of each grayscale, not to the position of pixels; (2) the histogram of the host image that has suffered some attacks is immune to those changed pixels in this image, including pixel position, value, and count. Therefore, the robustness of these schemes actually originates from the histogram invariance. It is well known that a histogram is a display of statistical information, the grayscale occurrence frequency of which can be calculated by splitting the pixel values into equally-sized bins. Given an image I = { I ( x , y ) | x = 1 , , R , y = 1 , , C } (here, R and C are the number of rows and columns in the image, respectively), the histogram can be described by:
H = { h ( i ) | i = 1 , , L } ,
where H and L denote the grey-level histogram of the image and the total number of equally-sized bins, respectively, and h ( i ) means the number of pixels in the i-th bin, and it satisfies i = 1 L h ( i ) = R × C .

2.2. Existing Histogram-Based Watermark Embedding

In Xiang et al.’s method [13], the histogram-based watermarking method primarily utilized the histogram H and mean A ¯ to determine the embedding range B = [ ( 1 λ ) A ¯ , ( 1 + λ ) A ¯ ] ( 0 < λ < 1 ) firstly; then they divided these bins into a series of groups where each of them contained two neighboring bins; lastly, they embedded watermark bits into these groups. For clarity and the ease explanation, the concrete rule of watermark embedding can be formulated as follows:
a b T , W ( i ) = 1 b a T , W ( i ) = 0 ,
where a and b refer to the number of the two consecutive bins and T is a threshold controlling the number of modified pixels, the value of which has a direct influence on both robustness and image quality. If the numbers a and b in the adjacent bins satisfy the conditions in Equation (2), no operation is needed. Otherwise, some modifications will be made to let some pixels in one bin jump into the other. Here, a possible case is presented in Figure 1. When the watermark to be embedded is W ( i ) = 1 , no change is made to the two bins since the numbers a and b in the adjacent bins have already met Equation (2). When the watermark to be embedded is W ( i ) = 0 , the number of pixels in the two adjacent bins will be adjusted until satisfying the condition b a T , as shown in Figure 1.
However, the watermark embedding design of Xiang et al. [13] fails to take the approximately equal number of adjacent bins into consideration, i.e., W ( i ) = 2 , as shown in the marked part with red dashed line. This will have a direct influence on the watermark embedding capacity; in turn, the watermark capacity, lowered greatly, restricts many application scenarios. To solve this issue, we design a novel histogram shape-based watermark scheme in the next section.

3. The Proposed Method

In this section, a novel high-capacity octal histogram-based watermarking algorithm for three consecutive bins is proposed. The proposed watermarking algorithm comprises three parts: the selection of the embedding range, the position selection of the pixel to be modified, and the embedding and extraction processes of the watermark. Next, we will present them in detail.

3.1. Embedding Range Selection

In order to remove possible bad bins, a better histogram embedding range selection method presented by Deng et al. [15] is employed. In their method, the embedding range selection is determined by the following thresholds T 1 and T 2 , as shown in Equations (3) and (4).
T 1 = M 0 × N 0 n × n × α 1
T 2 = M 0 × N 0 n × n × α 2
where M 0 and N 0 are the height and width of an image, respectively, n represents the size of the block and α 1 and α 2 are a constant controlled by a secret key to adjust the embedding watermark, the values of which are in the range of [ 0 , 1 ] .
For clarity, Figure 2 illustrates the comparison of two different embedding range selection methods. Figure 2a shows the embedding range selection method presented by Xiang et al., and Figure 2b presents a better embedding range selection method initially proposed by Deng et al. [15]. Notably, some possible bad bins (the occurrence frequencies of pixels in these bins are zero or few) are removed successfully in Figure 2b. Based on this point, the robustness of the embedded watermark can be enhanced dramatically.

3.2. Block-Based Pixel Modification

Xiang et al. performed the modification of the pixel value by randomly selecting the pixel position, the defect of which easily causes very limited pixel modifications in certain smooth areas. This also makes the comparison between the modified block and the surrounding unmodified blocks quite obvious; in other words, the visual quality with their method will be decreased (block effect). In order to avoid this, Hu et al. [14] initially proposed the block-based method after learning the human visual system (HVS) [19] and applying Xiang et al.’s idea. In this method, the average variance of each sub-block is calculated to reflect its smoothness. When one current pixel is modified, it is sorted according to the mean squared error (MSE) of the block, and then, the non-smooth region will be preferentially modified according to the feature of the current block. Given an image I with the size of M 0 × N 0 , if the block size in the image is set as n × n , there will exist M 0 n × N 0 n blocks. The mean and mean squared error of these blocks are calculated, respectively, as shown in Equations (5) and (6).
m e a n ( p , q ) = 1 n × n i = 1 n j = 1 n I ( i , j )
M S E ( p , q ) = 1 n × n i = 1 n j = 1 n ( I ( i , j ) m e a n ( p , q ) ) 2
where m e a n ( p , q ) and M S E ( p , q ) are the two functions calculating the average value and mean squared error located at the block ( p , q ) , respectively, and both p and q satisfy the conditions p = 1 , 2 , , M 0 n , q = 1 , 2 , , N 0 n .

3.3. Embedding and Extraction of the Watermark

To resolve the watermark design drawbacks mentioned above, this paper takes the approximately equal number of adjacent bins into consideration without compromising the modification degree of each pixel. This section will present the watermark embedding rules, embedding steps, as well as extraction steps.

3.3.1. Watermark Embedding Rules

Given the octal watermark information W ( 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 ) with the length of L W , it can be converted into the binary watermark information W B ( 0 , 1 ) with the length of 3 × L W . The obtained binary watermark information was further transformed into a key-based PNsequence to enhance the security of the watermark. With respect to the private key utilized during watermark encryption, it can be shared with specific authorized receivers if one needs to detect the presence of the watermark [13]. For an easy explanation, Table 1 presents the various embedding rules under different watermark information.
First, we transform the original watermark into its binary type. For various watermark data, pixel modification rules are slightly different. Note that having eight types of situations is mainly attributed to two factors: one is that the approximately equal pixel number of adjacent bins is considered here. The other is that every three consecutive bins is partitioned into a group to perform watermark embedding. Unlike other histogram-based watermark methods [14,15,16], these methods do not consider this case in their watermark designs; thus, only one-bit watermark data can be embedded into each of the three consecutive bins. In the proposed methods, every 3 bits of watermark information can be simultaneously embedded into each of the three consecutive bins. This is also why pixel modification rules for various watermark data are required.
For clarity, we give a simple example to explain the relationship between binary watermark information and its corresponding formula. Suppose a, b, and c denote the original three consecutive bins before watermark embedding and a , b , and c denote the corresponding modified bins after watermark embedding, respectively. Let us define the proportional relationship of binary watermark information “0” and “1” as 1:2 to distinguish various types of watermark. For instance, given the watermark “000”, one should modify the original bins a, b, and c using the formula in the second line of Table 1, so that the pixel number of the modified bins a , b , and c closes to 1:1:1. In a similar modification/adjustment manner, the proportional relationship of the modified bins a , b , and c after watermark embedding will close to 1:1:2 if the given watermark is “001”. Others are all similar to the above, except for a special case, i.e., the watermark “111”. It can be distinguished by predefining the proportional relationship of the modified bins a , b , and c as 1:2:3 roughly. With the assistance of this predefinition, one can accomplish the corresponding modification/adjustment before and after watermark embedding by making use of the formula, as shown in the last line of Table 1. Based on the above analysis, the extraction accuracy of the embedded watermark can be ensured.
After that, we can embed the 3-bit watermark into each group containing three consecutive bins. To analyze the embedding rules explicitly, an illustration of embedding the 3-bit watermark in eight cases is also shown in Figure 3. Assume that there remains an original group containing three consecutive bins, as shown in Figure 3a; let us analyze the case W ( i ) = 2 . Obviously, the original group in Figure 3a does not satisfy the condition in Case 3, shown in the fourth line in Table 1; a part of the pixels in both bins a and c, shown in Figure 3a, will be modified to b, so that the modified result satisfies a = ( a + b + c ) / 4 + Δ 1 , b = ( a + b + c ) / 2 + Δ 2 , and c = ( a + b + c ) / 4 + Δ 3 ; here, represents a down integer function, Δ 1 , Δ 2 , Δ 3 [ 0 , 1 ] and a + b + c = a + b + c + Δ 1 + Δ 2 + Δ 3 , as shown in Figure 3d. For the watermark embedding process of other cases, the modification process is similar to the above.
It is worth noting that for the approximately equal adjacent bins, it may decrease the watermark extraction accuracy when the histogram is fully distorted, but a large number of embedded watermarks can still be extracted if the histogram is slightly changed. In the specific experimental operation, the default value (the case that does not satisfy certain proportional relationships is set as an approximately equal treatment) is used to weaken the fragile relationship for the adjacent bins, which are approximately equal.

3.3.2. Watermark Embedding Steps

Having described the rules of watermark embedding in detail in the previous part, we will present the watermark embedding steps in this subsection. The procedure of watermark embedding consists of the following steps.
Step 1: Divide the input image I 0 into non-overlapping blocks with the size of n × n , and calculate the M S E ( p , q ) of each block.
Step 2: Extract histogram H from the input image I 0 and generate the embedding range H T using Equations (3) and (4).
Step 3: In view of the histogram bin’s width M, determine the number of the bins from the selected embedding range firstly and then take each of three continuous bins to form a group. Suppose the height (pixel’s numbers) in Bin 1, Bin 2, and Bin 3 is a, b, and c, respectively; the embedding rules are as follows:
Case 1: If it satisfies the condition | a b | < ( a + b + c ) / 3 & | a c | < ( a + b + c ) / 3 & | b c | < ( a + b + c ) / 3 , no pixels will be adjusted; else, the other operations are as follows:
  • If it meets ( a b ) > ( a + b + c ) / 3 , the number of modified pixels is t r a n s f e r a b = ( a b ) / 2 ( t r a n s f e r a b refers to the selected pixels, which will be moved from Bin 1 to Bin 2), these selected pixels of Bin 1 will be added to M;
  • If it meets the condition ( a c ) > ( a + b + c ) / 3 , firstly, choose all t r a n s f e r a b = ( a c ) / 2 pixels which will be moved from Bin 1 to Bin 2 by adding to M, then all t r a n s f e r b c = ( a c ) / 2 pixels of Bin 2 are chosen to be modified so as to make them fall in Bin 3. To ensure the modification/adjustment degree M of each pixel, the order in the above steps cannot be changed because these pixels chosen from Bin 2 should not contain those that have been adjusted in Bin 1. The corresponding modification/adjustment degree of some pixels may be 2 × M if the order is exchanged.
  • The others are similar to the above.
Case 2: If it meets the condition b T × a & b T × c & | a c | < ( a + b + c ) / 4 , no operation is needed. Otherwise, if it meets the condition a > ( a + b + c ) / 4 , move all t r a n s f e r a b = a ( a + b + c ) / 4 pixels from Bin 1 to Bin 2 by adding to M; if c > ( a + b + c ) / 4 , move all t r a n s f e r c b = c ( a + b + c ) / 4 pixels from Bin 3 to Bin 2 by reducing M.
The other cases are similar to the two cases mentioned above.
Step 4: According to the above histogram modification/adjustment procedure, to modify the histogram shape of each group, when adjusting the pixel value, choose blocks with larger M S E .
Step 5: These above steps are repeated until the whole PN sequence is embedded. The final modified image is the watermarked image.
For the ease of understanding, we display the partial pseudo-code of the embedding algorithm. This is shown in Algorithm 1.
Algorithm 1. Watermark embedding.
1: Input:
2: I 0 = [ ] M 0 × N 0 , W L W , n , T , T 1 , T 2
3: Output:
4: I W
5: Process:
6: I 0 H , a l l b l o c k M S E [ m a x m i n ]
7: H H T ( T 2 , T 1 )
8: H T [ B i n 1 , B i n 2 , B i n 3 ] 3 × L W [ a , b , c ] 3 × L W
9: for i 1 t o L W do
10:       W L W ( i ) 010
11:       if b T × a & b T × c & | a c | < ( a + b + c ) / 4
12:            Do nothing;
13:      else
14:            if     a > ( a + b + c ) / 4
15:                   T r a n s f e r a b = a ( a + b + c ) / 4 ;
16:                   I W = I 0 ( i i T r a n s f e r a b ) a l l b l o c k M S E + M ;
17:            end
18:            if     c > ( a + b + c ) / 4
19:                   T r a n s f e r c b = c ( a + b + c ) / 4 ;
20:                   I W = I 0 ( i i T r a n s f e r c b ) a l l b l o c k M S E M ;
21:            end
22:      end
23:end
24:Other W L W ( i ) , do similarly to the above.
25: I 0 W L W I W

3.3.3. Watermark Extraction Steps

When the watermarked images are illegally manipulated during transmission, an effective way to protect the owner’s copyright is to examine the suspicious images with proper watermark extraction algorithms. At the watermark extraction phase, parameters α 1 , α 2 , and T should be known in advance. The detailed steps are as follows.
Step 1: Calculate the histogram H from the received watermarked image I W .
Step 2: Extract H T in the same way as was done in the embedding rule. In each of the detection ranges, each of the three consecutive equally-sized bins is divided as a group.
Step 3: Set the pixel numbers of Bin 1, Bin 2, and Bin 3 in the current group as a , b , and c , respectively; according to their proportional relationship, extract the watermark information W ( i ) .
Without loss of generality, if it meets the condition b T × a & b T × c & | a c | < ( a + b + c ) / 4 , we can extract watermark information as W ( i ) = 2 ; if it meets the relationship b T × a & c T × a & | b c | < ( a + b + c ) / 5 , the watermark information is extracted as W ( i ) = 3 . In a similar way, the proposed method can extract all of the other watermark information.
Step 4: Repeat Step 3 until all of the watermark is extracted.
Similarly, we also give a partial version of the pseudo-code of the watermark extraction process, as shown in Algorithm 2.
Algorithm 2. Watermark extraction.
1: Input:
2: I w = [ ] M 0 × N 0 , T , T 1 , T 2
3: Output:
4: W
5: Process:
6: I W H
7: H H T ( T 2 , T 1 )
8: H T [ B i n 1 , B i n 2 , B i n 3 ] 3 × L W [ a , b , c ] 3 × L W
9: for i 1 t o L W do
10:       if b T × a & b T × c & | a c | < ( a + b + c ) / 4
11:             W L W ( i ) 2 ;
12:      end
13:       if b T × a & c T × a & | b c | < ( a + b + c ) / 5
14:             W L W ( i ) 3 ;
15:      end
16:end
17:Other W L W ( i ) , do similarly to the above.
18: I w W

4. Experimental Results and Analysis

In this section, we offer experimental results to confirm the effectiveness of the improved watermarking scheme with a standard test database [20]. The most typical representatives with the size of 512 × 512 , including Baboon, Barbara, Lena, and Peppers, were tested with a series of experiments. The performances of the proposed method were also compared with the state-of-the-art methods [13,17,18].

4.1. Embedding Capacity and Perceptual Similarity

In Xiang et al.’s method [13], two consecutive bins were combined into a group, and the bin width was set as M = 2 ; thus each of four bins carried a one-bit watermark. The total capacity in their method was 256 / ( 2 × M ) . If M is larger ( M > 2 ), the capacity will decrease obviously. However, in the proposed method, each of three consecutive bins was combined into a group to embed a 3-bit watermark. For an image of 8 bit in depth, the maximum embedding capacity of the watermarking algorithm was mathematically calculated as 256 / M ; in other words, this method will implement a 256-bit watermark insertion if the bin width is set as M = 1 . Therefore, the proposed method is superior in terms of embedding capacity.

4.1.1. Embedding Capacity versus Perceptual Similarity

In order to further test the visual quality of watermarked images, the Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index Measure (SSIM) were used for judging the distortion degree between the original and watermarked images. In general, higher values of PSNR and SSIM lead to a better visual quality of the watermarked image.
For different test images, including Baboon, Barbara, Lena, and Peppers, we have shown the perceptual similarity (under different bin widths, thresholds, and capacities) in Table 2. As shown in Table 2, both PSNR and SSIM in all images were extremely high. For instance, the PSNR values in all images were still more than 50 dB when the embedding capacity was 63 bits. In terms of SSIM, the minimum of SSIM in all images could reach 0.9955. Furthermore, there was only a very small change in all of the SSIM values. Note that given the conditions T and M, the PSNR values of a given image will decrease with the increase of payload length. This is because there are many more pixels that need to be modified to embed more payload bits. If we only consider a concrete embedding capacity (termed as one column in Table 2), PSNR values will decrease when the parameter M increases. This can be explained by the analyses mentioned above (refer to the Introduction): in short, the bin size used has a direct influence on the visual quality of the resulting images. Based on the above analysis, the visual quality of the proposed scheme was superior.
Besides, Figure 4 also shows the original images, the watermarked images, and their embedding modifications for Barbara and Lena, in which the bin’s width M and the threshold T were both set as two, and the embedding capacity C reached 63 bits. As shown in Figure 4c,f, the modification of the original image caused by the payload embedding was acceptable. Compared with Figure 4a,b together with Figure 4d,e, the visual quality of watermarked images was satisfactory. In summary, the image quality of watermarked images obtained by the proposed algorithm could fully meet the requirements of practical application scenarios.

4.1.2. Comparison with the State-of-the-Art Methods

In this section, we further evaluate the effectiveness of the proposed method by comparing it with those suggested in [13,17,18]. All of the parameter settings for different algorithms are shown in Table 3. The corresponding PSNRs are compared in Table 4. It can be observed that our method provided a preferable visual quality of the watermarked image; meanwhile, it ensured more information could be embedded into the pixels located at the same bins. Our algorithm, with respect to the existing ones, improved the embedding capacity by at least 100%.

4.2. Watermark Robustness

Some common attacks, such as cropping, crossed attack, rotation distortions, AWGN (additive white Gaussian noise) attack, and JPEG compression attack, were used to examine the robustness of the watermark with our method. We compared this with those suggested in [13,14,15]. The main image editing and attacking tool used in our experiments was MATLAB. For the four test images, we set the experimental parameters as the following: (1) the bin’s width was set as two; (2) the threshold was set as five; (3) the capacity was set as 24 bits. Without loss of generality, we take Barbara as an example of the attacked image. Corresponding to the simulation results, we have the following observations:
  • Cropping: The cropping ranges from 5–50% with the interval of 5%. Figure 5 shows the watermarked image with the cropping of 5%, 25%, and 50%, respectively. Figure 6a,b presents the accuracy of watermark extraction when the watermarked image suffered from different levels of cropping attack.
  • Crossed attack: The number of lines increased from 1–8. This was set as 1, 4, and 8, respectively, as shown in Figure 7. The corresponding extraction results after crossed attack are given in Figure 6,d.
  • Rotation distortions: The rotation angles ranged from 3 30 with the interval of 3 . From Figure 8, one can understand the watermarked image with rotation angles of 3 , 18 , and 30 , respectively. Figure 6e,f presents the results after rotation attack.
  • AWGN attack: The standard deviation of AWGN was set from 1–10. Similarly, we can see from Figure 6g,h that the watermarked image could resist AWGN attack well.
  • JPEG compression: The quality factor of JPEG compression was changed from 80–100. Figure 6i,j provides a significant indication that the proposed watermark method was equipped with the capability of resisting JPEG compression. Here, it should be emphasized that the BER (bit error rate) of our method was a little higher than the other methods; this is because approximately equal adjacent bins were considered in our method, and thus, this may have increased the error rate of watermark extraction.
From the above observations, the proposed method was powerful in robustness against geometric attacks and common image processing operations. Because the histogram of the modified image incurred during the cropping and crossed attacks kept approximately the same as that of the original image without suffering from attack, the watermark algorithm had higher robustness to cropping and crossed attacks. When suffering from AWGN and JPEG compression attacks, the embedded watermark information could still be effectively extracted, indicating that the functionality of resisting AWGN and JPEG compression could be ensured. Finally, the embedding of watermark information mainly depended on the statistical property of the histogram and was independent of the size of the image; thus, this proposed watermark method could be applied to images of any size.

5. Conclusions

In this paper, a large capacity histogram-based watermark algorithm is proposed. The watermark design of the proposed method has satisfactory functionalities in terms of robustness to geometric attacks and common image processing operations. In the embedding range selection, possible bad bins will be eliminated successfully with the assistance of a predefined threshold. In the watermark embedding design, by taking the approximately equal number of adjacent histogram bins into account, the proposed method makes every three consecutive bins carry a 3-bit watermark; or rather, it realizes the maximum embedding rate (1 bpb) for the first time. The experiment results demonstrate that the proposed watermark algorithm can provide a preferable tradeoff between embedding capacity and robustness, especially suitable for applications where robustness and embedding capacity are essential, such as copyright protection requirement for enough watermark information and higher robustness. However, a possible limitation for the proposed histogram-based watermarking is the situation where certain operations may make the histogram shape distorted too much. In this case, the watermark extraction will be affected directly. In our future research, one consideration is to improve the newly-designed appropriately equal condition so that when the histogram shape is distorted seriously, the accuracy of watermark extraction is still acceptable.

Author Contributions

All authors contributed equally to this work.

Acknowledgments

We would like to take the opportunity to thank the reviewers for their thoughtful and meaningful comments. This work is supported by the Projects of the National Natural Science Foundation (61370188); the Scientific Research Common Program of the Beijing Municipal Commission of Education ( K M 201610015002 , K M 201510015009 ); the Beijing City Board of Education Science and the technology key project ( K Z 201510015015 , K Z 201710015010 ); the Project of Beijing Municipal College Improvement Plan ( P X M 2017 _ 014223 _ 000063 ); the cooperative education project between the Ministry of Education and Qualcomm Corp (201602034017).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Castiglione, A.; Pizzolante, R.; Palmieri, F.; Masucci, B.; Carpentieri, B.; Santis, A.; Castiglione, A. On-Board Format-Independent Security of Functional Magnetic Resonance Images. ACM Trans. Embed. Comput. Syst. 2017, 16, 56. [Google Scholar] [CrossRef]
  2. Li, M.; Ren, H.; Zhang, E.; Wang, W.; Sun, L.; Xiao, D. A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. Secur. Commun. Netw. 2018, 2018, 4313769. [Google Scholar] [CrossRef]
  3. Yang, C. Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment. Multimed. Tools Appl. 2017, 76, 1455–1477. [Google Scholar] [CrossRef]
  4. Kang, X.; Huang, J.; Shi, Y.; Lin, Y. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 776–786. [Google Scholar] [CrossRef] [Green Version]
  5. Barni, M. Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Process. Lett. 2005, 12, 158–161. [Google Scholar] [CrossRef]
  6. Pereira, S.; Pun, T. Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process. 2000, 9, 1123–1129. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  7. Dugelay, J.; Roche, S.; Rey, C.; Doerr, G. Still-image watermarking robust to local geometric distortions. IEEE Trans. Image Process. 2006, 15, 2831–2842. [Google Scholar] [CrossRef]
  8. Zheng, D.; Zhao, J.; Saddik, A.E. RST-invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 753–765. [Google Scholar] [CrossRef]
  9. Dong, P.; Brankov, J.; Galatsanos, N.; Yang, Y.; Davoine, F. Digital watermarking robust to geometric distortions. IEEE Trans. Image Process. 2005, 14, 2140–2150. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Yuan, C.; Pun, C.; Chen, C. Geometric invariant watermarking by local Zernike moments of binary image patches. Signal Process. 2013, 93, 2087–2095. [Google Scholar] [CrossRef]
  11. Bas, P.; Chassery, J.; Macq, B. Geometrically invariant watermarking using feature points. IEEE Trans. Image Process. 2002, 11, 1014–1028. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Nikolaidis, A.; Pitas, I. Robust watermarking of facial images based on salient geometric pattern matching. IEEE Trans. Multimed. 2000, 2, 172–184. [Google Scholar] [CrossRef] [Green Version]
  13. Xiang, S.; Kim, H.; Huang, J. Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain. IEEE Trans. Circuits Syst. Video Technol. 2008, 18, 777–790. [Google Scholar] [CrossRef]
  14. Hu, X.; Wang, D. A Histogram Based Watermarking Algorithm Robust to Geometric Distortions. In Proceedings of the International Conference on Electrical, Computer Engineering and Electronics, Jinan, China, 29–31 May 2015. [Google Scholar]
  15. Deng, C.; Gao, X.; Peng, H.; An, L.; Ji, F. Histogram modification based robust image watermarking approach. Int. J. Multimed. Intell. Secur. 2010, 1, 153–168. [Google Scholar] [CrossRef]
  16. He, X.; Zhu, T.; Yang, G. A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimens. Syst. Signal Process. 2015, 26, 291–306. [Google Scholar] [CrossRef]
  17. Zong, T.; Xiang, Y.; Natgunanathan, I.; Guo, S.; Zhou, W.; Beliakov, G. Robust histogram shape-based method for image watermarking. IEEE Trans. Circuits Syst. Video Technol. 2015, 25, 717–729. [Google Scholar] [CrossRef]
  18. Feng, B.; Weng, J.; Lu, W. Improved Algorithms for Robust Histogram Shape-Based Image Watermarking. Int. Workshop Digit. Watermark. 2017, 10431, 275–289. [Google Scholar]
  19. Qi, H.; Zheng, D.; Zhao, J. Human visual system based adaptive digital image watermarking. Signal Process. 2008, 88, 174–188. [Google Scholar] [CrossRef] [Green Version]
  20. Miscelaneous Gray Level Images. Available online: http://decsai.ugr.es/cvg/dbimagenes/g512.php (accessed on 13 March 2014).
Figure 1. The issue existing in the original watermark embedding design.
Figure 1. The issue existing in the original watermark embedding design.
Applsci 08 02617 g001
Figure 2. Comparison of two embedding range selection methods: (a) Xiang et al.’s method and (b) Deng et al.’s method.
Figure 2. Comparison of two embedding range selection methods: (a) Xiang et al.’s method and (b) Deng et al.’s method.
Applsci 08 02617 g002
Figure 3. Illustration of embedding the 3-bit watermark in eight cases. (a) The original histogram; (bi) the modified histograms for the cases W ( i ) = 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 , respectively.
Figure 3. Illustration of embedding the 3-bit watermark in eight cases. (a) The original histogram; (bi) the modified histograms for the cases W ( i ) = 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 , respectively.
Applsci 08 02617 g003
Figure 4. The original images, the watermarked images, and their difference for Barbara and Lena ( M = 2 , T = 2 , and C = 63 ). (a) Barbara (original); (b) Barbara (watermarked); (c) Barbara (residual); (d) Lena (original); (e) Lena (watermarked); (f) Lena (residual).
Figure 4. The original images, the watermarked images, and their difference for Barbara and Lena ( M = 2 , T = 2 , and C = 63 ). (a) Barbara (original); (b) Barbara (watermarked); (c) Barbara (residual); (d) Lena (original); (e) Lena (watermarked); (f) Lena (residual).
Applsci 08 02617 g004
Figure 5. Examples of local cropping with different percentages for Barbara.
Figure 5. Examples of local cropping with different percentages for Barbara.
Applsci 08 02617 g005
Figure 6. Robustness to cropping, crossed, and rotation attack for Baboon and Barbara (M = 2, T = 5, and C = 24). (a,b) The cropped watermarked images of Baboon and Barbara; (c,d) the crossed watermarked images of Baboon and Barbara; (e,f) the rotation watermarked images of Baboon and Barbara; (g,h) the AWGN watermarked images of Baboon and Barbara; (i,j) the JPEG watermarked images of Baboon and Barbara.
Figure 6. Robustness to cropping, crossed, and rotation attack for Baboon and Barbara (M = 2, T = 5, and C = 24). (a,b) The cropped watermarked images of Baboon and Barbara; (c,d) the crossed watermarked images of Baboon and Barbara; (e,f) the rotation watermarked images of Baboon and Barbara; (g,h) the AWGN watermarked images of Baboon and Barbara; (i,j) the JPEG watermarked images of Baboon and Barbara.
Applsci 08 02617 g006aApplsci 08 02617 g006b
Figure 7. Examples of crossed attack with different numbers of lines for Barbara.
Figure 7. Examples of crossed attack with different numbers of lines for Barbara.
Applsci 08 02617 g007
Figure 8. Examples of different rotation angles for Barbara.
Figure 8. Examples of different rotation angles for Barbara.
Applsci 08 02617 g008
Table 1. Pixel modification rules for various watermark information (where Δ 1 , Δ 2 , Δ 3 [ 0 , 1 ] ).
Table 1. Pixel modification rules for various watermark information (where Δ 1 , Δ 2 , Δ 3 [ 0 , 1 ] ).
CaseOriginalIts BinaryPixel Modification Rules
WatermarkType
10000a’= ( a + b + c ) / 3 + Δ 1 ,   b’= ( a + b + c ) / 3 + Δ 2 ,   c’= ( a + b + c ) / 3 + Δ 3
21001a’= ( a + b + c ) / 4 + Δ 1 ,   b’= ( a + b + c ) / 4 + Δ 2 ,   c’= ( a + b + c ) / 2 + Δ 3
32010a’= ( a + b + c ) / 4 + Δ 1 ,   b’= ( a + b + c ) / 2 + Δ 2 ,   c’= ( a + b + c ) / 4 + Δ 3
43011a’= ( a + b + c ) / 5 + Δ 1 ,   b’= 2 × ( a + b + c ) / 5 + Δ 2 ,   c’= 2 × ( a + b + c ) / 5 + Δ 3
54100a’= ( a + b + c ) / 2 + Δ 1 ,   b’= ( a + b + c ) / 4 + Δ 2 ,   c’= ( a + b + c ) / 4 + Δ 3
65101a’= 2 × ( a + b + c ) / 5 + Δ 1 ,   b’= ( a + b + c ) / 5 + Δ 2 ,   c’= 2 × ( a + b + c ) / 5 + Δ 3
76110a’= 2 × ( a + b + c ) / 5 + Δ 1 ,   b’= 2 × ( a + b + c ) / 5 + Δ 2 ,   c’= ( a + b + c ) / 5 + Δ 3
87111a’= ( a + b + c ) / 6 + Δ 1 ,   b’= ( a + b + c ) / 3 + Δ 2 ,   c’= ( a + b + c ) / 2 + Δ 3
Table 2. Perceptual similarity for different test images (including Baboon, Barbara, Lena, and Peppers) at different bin widths, thresholds, and capacities.
Table 2. Perceptual similarity for different test images (including Baboon, Barbara, Lena, and Peppers) at different bin widths, thresholds, and capacities.
Payload (bit)32485663
Perceptual SimilarityPSNRSSIMPSNRSSIMPSNRSSIMPSNRSSIM
(dB)(dB)(dB)(dB)
T = 2 , M = 1 69.091.000066.651.000065.551.000064.961.0000
Baboon T = 2 , M = 2 59.080.999955.850.999754.880.999654.390.9996
T = 2 , M = 3 51.580.999249.850.9986----
T = 2 , M = 1 66.440.999965.270.999964.690.999964.290.9999
Barbara T = 2 , M = 2 57.250.999355.530.999154.730.999054.390.9990
T = 2 , M = 3 51.720.998049.970.997349.440.9969--
T = 2 , M = 1 66.430.999965.260.999964.320.999963.730.9999
Lena T = 2 , M = 2 56.840.999255.040.998853.890.998453.510.9982
T = 2 , M = 3 51.160.997149.490.9955----
T = 2 , M = 1 67.520.999964.980.999963.490.999862.990.9998
Peppers T = 2 , M = 2 57.220.999356.050.999255.130.999054.590.9988
T = 2 , M = 3 52.620.998250.760.9970----
Table 3. Parameter settings for different algorithms.
Table 3. Parameter settings for different algorithms.
Payload (bit)32485663
embedding range[0.3A,1.7A][0.3A,1.7A]--
Xiang et al. [13]T26--
M22--
bins’ number6496--
embedding range[0,255][0,255]--
Zong et al. [17]T24--
M32--
bins’ number6496--
embedding range[15,244][15,244][15,244][15,244]
Scheme 1 [18]T21.51.251.5
M2222
bins’ number6496112126
embedding range[15,244][15,244][15,244][15,244]
Scheme 2 [18]T32+sqrt(0.5)2.537/16+sqrt(0.5)
M2484
bins’ number64646484
embedding range[0,255][0,255][0,255][0,255]
The proposedT2222
M2222
bins’ number32485663
Table 4. Comparison of PSNRs among different algorithms.
Table 4. Comparison of PSNRs among different algorithms.
Payload (bit)32485663
Xiang et al. [13]46.8543.97--
Zong et al. [17]46.1243.46--
Averaged PSNR (dB)Scheme 1 [18]46.9244.0738.9942.37
Scheme 2 [18]46.9243.6943.4041.67
The proposed56.8455.0453.8953.51

Share and Cite

MDPI and ACS Style

Yue, Z.; Li, Z.; Ren, H.; Yang, Y. A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins. Appl. Sci. 2018, 8, 2617. https://doi.org/10.3390/app8122617

AMA Style

Yue Z, Li Z, Ren H, Yang Y. A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins. Applied Sciences. 2018; 8(12):2617. https://doi.org/10.3390/app8122617

Chicago/Turabian Style

Yue, Zhen, Zichen Li, Hua Ren, and Yixian Yang. 2018. "A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins" Applied Sciences 8, no. 12: 2617. https://doi.org/10.3390/app8122617

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop