Next Article in Journal
Diagnostic Analytics for an Autoregressive Model under the Skew-Normal Distribution
Next Article in Special Issue
Visual Cryptography Scheme with Essential Participants
Previous Article in Journal
Double Fuzzy Sumudu Transform to Solve Partial Volterra Fuzzy Integro-Differential Equations
Previous Article in Special Issue
Near-Duplicate Image Detection System Using Coarse-to-Fine Matching Scheme Based on Global and Local CNN Features
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Adaptive Image Watermarking Method Combining SVD and Wang-Landau Sampling in DWT Domain

1
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
2
Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), NUIST, Nanjing 210044, China
3
Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Mathematics 2020, 8(5), 691; https://doi.org/10.3390/math8050691
Submission received: 8 April 2020 / Revised: 28 April 2020 / Accepted: 29 April 2020 / Published: 2 May 2020
(This article belongs to the Special Issue Computing Methods in Steganography and Multimedia Security)

Abstract

:
To keep a better trade-off between robustness and imperceptibility is difficult for traditional digital watermarks. Therefore, an adaptive image watermarking method combining singular value decomposition (SVD) and the Wang–Landau (WL) sampling method is proposed to solve the problem. In this method, the third-level approximate sub-band obtained by applying the three-level wavelet transform is decomposed by SVD to obtain the principal component, which is firstly selected as the embedded position. Then, the information is finally embedded into the host image by the scaling factor. The Wang–Landau sampling method is devoted to finding the best embedding coefficient through the proposed objective evaluation function, which is a global optimization algorithm. The embedding strength is adaptively adjusted by utilizing the historical experience, which overcomes the problem of falling into local optimization easily in many traditional optimization algorithms. To affirm the reliability of the proposed method, several image processing attacks are applied and the experimental results are given in detail. Compared with other existing related watermarking techniques based on both qualitative and quantitative evaluation parameters, such as peak signal to noise ratio (PSNR) and normalized cross-correlation (NC), this method has been proven to achieve a trade-off between robustness and invisibility.

1. Introduction

Digital watermarking [1,2,3] technology is an important scheme to protect the security of image, audio and video and even the data collected by the Internet of Things(IoT) technology. Through embed secret information into the target source, digital watermarking technology is widely applied in many fields, such as unauthorized copying and modification of digitized works [4,5,6]. Embedded secret information is generally obtained by some transformation of copyright information, which is generally invisible or undetectable and can only be extracted by a special reader or detector. Compared with encryption technology [7], digital watermarking technology can provide further protection for decrypted information.
Certain attacks on image watermarks compel to develop a digital watermarking algorithm that ensures the quality of the image, which denotes that the embedded watermark will not be visualized by human eyes and can still be extracted using the same pattern when the carrier has been modified. However, the robustness and imperceptibility of digital watermarking are contradictory, and the improvement of watermark robustness is often accompanied by the descending of the imperceptibility. Therefore, to obtain a trade-off between robustness and imperceptibility, many researchers introduce an intelligence optimization algorithm to obtain optimal embedding strength adaptively, such as Genetic algorithm (GA) [8,9], Particle Swarm Optimization algorithm (PSO) [10,11] and Artificial bee colony [12]. Meanwhile, these approaches have usually combined singular value decomposition (SVD) with transform algorithms over the past few years, such as DCT, DWT, DFT and RDWT [13,14,15,16,17,18,19]. Furthermore, DWT combined with the SVD algorithm has attracted extensive attention for its advantages of large embedding amount and better robustness. Therefore, to optimize the watermarking algorithm combining SVD decomposition and DWT transformation is a relatively common strategy. Zhou et al. [20] proposed a strongly robust hybrid watermarking method combining the discrete wavelet transform (DWT) with all phase discrete cosine biorthogonal transform (APDCBT) and singular value decomposition (SVD). The direct current (DC) coefficients of block-based APDCBT in high frequency subband (LH and HL) are modified to improve the imperceptibility of watermarking, compared with the traditional watermarking method, this method acquires higher image quality and strong robustness against various attacks. Wu and Wu [21] proposed an adaptive chaotic audio watermarking algorithm embedded in discrete cosine transform (DCT) and discrete wavelet transform (DWT) according to special rules, taking advantage of the insensitivity of the human ear to small changes in high-frequency components of the audio medium. Experimental results show that the algorithm can effectively improve the robustness and imperceptibility. Liu et al. [22] used the sorting strategy of wavelet coefficients to calculate quantization steps and select appropriate parameters in high-entropy image regions to embed the watermark, and the host image is not needed in watermark extraction. In the experiment, the false alarm probability and detection probability of watermarking are used to verify that the robustness of the proposed method is higher than the quantized watermarking algorithm. Liu et al. [23] proposed a method based on DWT, SVD, and Hessenberg decomposition (HD) to embed the watermark into the host image. The host image is decomposed into several sub-bands by multi-layer DWT, and the sub-band coefficient obtained is used as the input of HD. The fruit optimization algorithm [24,25] is used to obtain the scaling factor. Experimental results show that for some multi-size watermarks, the optimized watermarking method can strike a good balance between robustness and invisibility. Zheng et al. [26] proposed an algorithm Guided Dynamic-PSO (GDPSO) to solve the premature convergence problem for the PSO algorithm, in which it often gets stuck at a specific point. The new algorithm also targets the particle that an individual falls into best. On this basis, an optimal value replacement method based on Shared fitness is proposed to provide better diversity to avoid this problem. Experimental results show that this algorithm is superior to other algorithms in imperceptibility and robustness. To achieve this objective of the highest possible robustness without losing visual imperceptibility, Loukhaoukha et al. [27] proposed an optimal image watermarking method based on particle swarm optimization (MOPSO) to obtain the optimal embedding factor. Watermark embedding and extraction are based on wavelet transform and singular value decomposition. Experimental results prove significant improvement both in terms of imperceptibility and robustness under various attacks. Sharma and Mir [28] proposed a time-efficient optimization method to reduce the large time consumption in the time-sensitive applications. The watermarking is embedded in the domain of discrete cosine transform after acquiring an optimum strength value using ant colony optimization and light gradient boosting algorithm. It is found that compared with the existing optimization methods, this method takes less time to solve the optimal solution.
The optimization algorithm is essentially a meta-heuristic algorithm, making these algorithms highly common in the watermark embedding process. However, the best scaling factor is different because of the different ability to find a global optimal solution. However, most of the above optimization strategies lack sampling statistics of the previous results, which means that they easily fall into local optimization. Therefore, in this paper, we proposed a global optimization scheme based on the Wang–Landau (WL) sampling method to avoid the problem of premature convergence [29] and obtained a better embedding coefficient. In this method, the scaling factor is designed as an energy value, which reflects the current state of watermarking processing using this factor. Then, the energy state density function and histogram function are applied to census the changes in these states, and the better scaling factor can be found in subsequent searching. In addition, the three-level discrete wave transformation (DWT) is used to decompose the host image to seek for the embedding position, and then the watermark is embedded into the second-level approximate sub-band after singular value decomposition (SVD). Finally, the performances of invisibility and robustness are evaluated by comparison with different methods through noise ratio (PSNR), normalized cross-correlation (NC), structural similarity index measure (SSIM) and bit error ratio (BER). The experimental results denote the effects of this method to acquire a trade-off between robustness and imperceptibility.
The rest of this paper is designed as follows: Section 2 introduces the preliminaries in this work; in Section 3, an adaptive image watermarking method combining SVD and Wang–Landau Sampling in the DWT domain is proposed; in Section 4, the optimization of the embedding strength factor using WL is presented, and the experimental results are displayed and analyzed comparatively in Section 5; finally, Section 6 puts forward the conclusion of this paper and further research works.

2. Preliminaries

In this section, the related technologies, including DWT, SVD and WL methods, are introduced and used in the proposed scheme.

2.1. Discrete Wave Transformation

In the process of signal analysis and image processing, discrete wavelet transform (DWT) is very useful for the multi-resolution characteristics, and the embedded watermark is robust in compression, noise and other attacks [30,31]. In general, an image can be transformed into four subbands using DWT, which are low-high (LH), high-low (HL), high-high (HH), and low-low (LL). The LL sub-band is a low-pass filtered coefficient representing the detailed information of the image, and the remaining sub-bands, named horizontal detail sub-picture, vertical detail sub-picture and diagonal detail sub-picture, represent the edge and contour information of the image [32]. The selection of a higher-level detail sub-picture as embedding locations has better invisibility and robustness, and the approximate detail sub-picture of the host image contains more information than others. Therefore, in this paper, a three-level DWT is used to decompose the host image, and the LL sub-band is chosen to be the watermark embedding position. Figure 1 is a schematic diagram of the two-level wavelet decomposition.

2.2. Singular Value Decomposition

An image can be seen as a matrix composed of many non-negative vectors from a mathematical point of view, and the singular value decomposition technique [33] is a mathematical method for numerical extraction of feature points in pictures. In this method, the singular value decomposition (SVD) is first applied to the entire host picture or its small picture area, and then the singular value of which is modified for embedding the watermark. A represents a matrix with the size m × n , which can be decomposed into A = U S V T , where U expresses the left singular matrix, S expresses the singular matrix and V expresses the right singular matrix. Here, T is the transposed symbol. In addition, S = d i a g ( λ i ) is a matrix with a value of 0 on a non-diagonal line. The value of the diagonal is the singular value λ i (i = 1, …, m) and satisfies Equation (1),
λ 1 λ 2 λ r λ r + 1 = λ r + 2 = = λ m = 0 .
For the singular value decomposition (SVD) of matrix A, it can be expressed as
A = U S V T = i = 1 r λ i u i v i T ,
where r is the number of columns of matrix A ( r m ), u i and v i represent the left singular vector and right singular vector, respectively. In the research of digital watermarking, few works of literature use SVD decomposition to embed digital watermarks. The classical approach is to cooperate DWT decomposition with DCT decomposition, and such overlay algorithms are generally robust to most attacks [10,34]. In this paper, A DWT-SVD based digital image watermarking scheme is implemented.

2.3. Wang–Landau (WL) Sampling Method

The Wang–landau (WL) sampling algorithm is a kind of Monte Carlo (MC) algorithm, which is first presented by F. Wang and Landau based on a frequency histogram. The purpose of this algorithm is to get an estimate of the state density of the system characterized by the cost function, which utilizes a non-Markov stochastic process that progressively converges to a multi-regular ensemble [35]. The traditional MC method is limited to generate regular distribution under the scenario of constant temperature. Therefore, the algorithm must run multiple times under different temperatures to obtain high-quality solutions. However, the WL sampling walks freely through sampling distribution to the density of states. Therefore, any accessible state (both favorable and less favorable) can be accessed by the algorithm, and much faster than the Metropolis algorithm [36]. Then, this algorithm can obtain a flat energy histogram and the probability density function g ( E ) . Starting from a certain state in the system, the algorithm gradually calculates the energy of each state and then excavates the distribution of each state’s energy in the whole system.
Considering the robustness and invisibility of the watermark change dynamically with a different embedding strength, we assume that the trade-off between the robustness and invisibility is regarded as a state. The watermarking optimization problem that the scaling factor is difficult to find for the unknown distribution of the state of a watermark can be solved using the WL algorithm to conduct sampling statistics on the distribution. The detailed steps of the WL are outlined as Algorithm 1.
Algorithm 1 Wang–Landau (WL) Sampling Algorithm
Require: Q w
Ensure: the state with currentEnergy.
 1: Initialize the parameters in this algorithm.
 2: Choose the state with the highest fitness from Q w , and mark it as currentEnergy;
 3: Select a random state from Q w by the roulette method, and mark it as currentEnergy;
 4: if r a n d o m 0 , 1 < e x p P currentEnergy P targetEnergy then
 5:  Accept targetEnergy for the new currentEnergy; then
 6:  Let H[targetEnergy] += 1
 7:   G[targetEnergy] += f × G[targetEnergy]
 8: else
 9:  Do not accept targetEnergy, and keep currentEnergy unchanged; then
10:   H [currentEnergy] += 1
11:   G [currentEnergy] += f × G[currentEnergy]
12: end if
13: if isflat (H) then
14:  Let H[:] = 0
15:   f × = 0.5
16: end if
17: if f e x p 10 4 = 1.001 then
18:  Output the state with currentEnergy;
19: else
20:  Update Q w and go to step3;
21: end if
Here, Q w represents the initial set of states, and the optimal state could be eventually found based on the actual problem. Next, an example to find the minimum value of the state system is introduced.

2.4. An Example: Use the WL Algorithm to Find the Minimum Value in the State Space

Figure 2 shows the process of finding the minimum using the WL algorithm. In a dimensional potential energy surface, assume that the WL algorithm starts from the state S with high potential energy (or high state density) to find the state with the lowest global energy. When the penalty factor (frequency histogram function) is equal, the algorithm is more beneficial to search for states with low potential energy (or low density of states). The penalty term of the potential energy function (or state density function) of the visited low energy state increases with the calculation of the local optimal time (i.e., the number of iterative steps s), correspondingly, which is not conducive to sample the state again. For example, the potential energy surface is filled with repeated sampling of the state near state A in Figure 2, although the energy of state C is lower than that of state D. However, because of the effect of histogram penalty term near state C, its modification energy is higher than that of state D. Hence, the WL algorithm can accept state D (although it seems to be higher than that of state C), jump out of the state A and reach globally optimal state B.

3. Proposed Scheme

3.1. Watermark Embedding Scheme

In this section, the decomposition process of the host image via a three-level DWT transform is explained. The suitable watermark embedding positions are then selected based on features of the wavelet transform. In addition, the watermark image W is decomposed by DWT to obtain embedded information. Let the size of host image A and watermark image W be N × N and M × M , respectively. The steps of watermark information embedding are as follows:
(1)
The host image A is decomposed to acquire the components of low-high ( L H 3 ), high-low ( H L 3 ), high-high ( H H 3 ), and low-low ( L L 3 ), and then the watermarking W is also decomposed to L H w , H L w , H H w , and L L w , the d b 1 wavelet is used in the DWT. Meanwhile, the L L w has the same size as L L 3 .
(2)
Apply SVD to the approximate sub-band L L 3 and L L W of host image and watermark, respectively:
A L L 3 = U S V T
here, A L L 3 is the 3-level approximate sub-band of the host image A, U, S and V are the left singular matrix, singular matrix and the right singular matrix of A L L 3 , respectively. Here, T is the transposed symbol.
A L L W = U W S W V W T
here, A L L W is the three-level approximate sub-band of the watermark image W, U W , S W and V W are the left singular matrix, singular matrix and the right singular matrix of A L L W , respectively.
(3)
Embed the watermark information into the L L 3 using Equation (5).
λ i * = λ i + α · λ w i ,
here, λ w i * is singular value of S W * (see Equation (9)), λ i and λ w i (i = 1, 2..., N/4) are singular values of S and S W , respectively, and α is the embedding coefficient found by the WL optimization algorithm.
(4)
The diagonal matrix S * is obtained after the embedding procedure, and then the reconstructed approximate sub-band L L 3 is obtained by Equation (6).
A L L 3 * = U S * V T
Finally, the watermarked image A * is obtained by performing the inverse three-level DWT. Figure 3 shows the flow chart of the watermarking embedding.

3.2. Watermark Extraction Scheme

In the process of extraction, the input is the watermarked image A * , which has been under some attack. The output is the extracted watermarking W * . The steps of watermark extraction are as follows:
(1)
The watermarked image A * is decomposed to L H 3 * , H L 3 * , H H 3 * , and L L 3 * using 3-level DWT.
(2)
Apply SVD to decompose the L H 3 * :
A L L 3 * = U * S * ( V * ) T
(3)
The extracted singular value S w is gained by
λ w i * = ( λ i * λ i ) α ,
here, λ i and λ w i * (i =1, 2..., N/4) are singular values of S and S W * , respectively, and the embedding coefficient α is sent to the extractor as a key.
(4)
The approximate sub-band L H w * is obtained by Equation (9).
W L L 1 * = U W S W * V W T
Finally, the watermarked image W * is obtained by performing the inverse DWT. Figure 4 is the procedure of the watermark extraction.

4. Optimization of Embedding Strength Utilizing WL

In this part, we propose a technique to balance the robustness and transparency of watermarking, which is used in embedding watermarking. This algorithm performs the following tasks: (1) Census the state of the current system with the histogram and the probability density function. (2) Correct the direction for searching the scaling factor based on the acceptance condition. (3) Generation of temporary target state using roulette selection. (4) Update the population near the current optimal state. Figure 5 shows the flowchart of scaling factor optimization using WL. Next, combining the watermarking embedding and extraction scheme presented previously, the proposed method is explained in detail.

4.1. Construction of the Fitness Function

Balancing the invisibility and robustness in digital image watermarking is a research focus in this field [37]. As a meta-heuristic algorithm with global optimization ability, the WL algorithm can solve many optimization problems effectively. At present, the algorithm has successfully provided solutions for many optimization problems, such as protein structure prediction and satellite cabin layout [38,39,40]. Therefore, this algorithm is used to achieve a good trade-off between robustness and invisibility. First of all, the performance metrics to evaluate invisibility and robustness are introduced. Among them, invisibility is generally evaluated by the performance metrics such as peak signal to noise ratio (PSNR) and the structural similarity index measure (SSIM). Moreover, the robustness is measured by normalized cross-correlation (NC) and bit error ratio (BER). In this section, combined with the actual, the definition of these performance metrics is given, respectively.
P S N R ( A , A * ) = 10 log 10 M N A m a x 2 m = 1 M n = 1 N [ A ( m , n ) A * ( m , n ) ] 2 ,
here, A m a x is the maximum pixel value in the host image A, and A * denotes the watermarked image A * . A ( m , n ) and A * ( m , n ) are pixel values in A and A * , respectively. M and N represent the length and width of A and A * . SSIM is defined by
S S I M ( A , A * ) = ( u A u A * + c 1 ) ( 2 σ A A * + c 2 ) ( u A 2 + u A * 2 + c 1 ) ( σ A 2 + σ A * 2 + c 2 ) ,
here, u A and u A * are the average of image A and A * , respectively. σ A and σ A * are the variance of image A and A * , respectively. σ A and σ A * are the covariance of image A and A * , respectively, and c 1 and c 2 are used to keep the stabilization of the division with a weak denominator. NC is defined by
N C ( W , W * ) = m = 1 M n = 1 N A ( m , n ) A * ( m , n ) m = 1 M n = 1 N [ A ( m , n ) ] 2 m = 1 M n = 1 N [ A * ( m , n ) ] 2 ,
NC is an index used to evaluate the robustness of the watermarking algorithm. Here, assume that K kinds of attacks are used to attack the watermarked image, the fitness function f( r i ) is given by
f ( r i ) = 1 S S I M ( A , A * ) + 2 i = 1 K N C ( W , W * ) K
The details of the proposed fitness function are described as follows.
(a)
1 and 2 represent quantization coefficients for invisibility or robustness and are tunable.
(b)
Requirements for PSNR: Image quality is acceptable only if PSNR > 35 dB is satisfied [37].
(c)
Using PSNR and SSIM as the evaluation of invisibility, this function is used to compute the fitness value. Furthermore, the proposed fitness function employs a predefined quality level (Qth). Hence, the optimization method provides the maximum achievable robustness while ensuring that the image quality is higher than Qth.

4.2. Acquisition of Target State X 2

Roulette wheel selection (RWS) indicates that whether an individual can be selected mainly depends on the adaptability of the error [41]. The stronger the adaptability, the more it should be selected; on the contrary, it should be eliminated. Here, the adaptability of the individual (state) is defined by R(X) = H(E(X)) + 1, which means that individuals having been accepted by the WL algorithm many times are more likely to acquire optimal individuals around them. The main purpose of adding 1 is to prevent the case that the initial adaptability is all 0 and no individual can be produced. The details of this strategy are as below,
Step 1: Initialize the adaptability of each state in the population Q w (i = 1, 2 …, n), and n is the size of the population.
Step 2: Calculate the cumulative probability value of the link using Equations (14) and (15). Here, j = 1 M R ( X j ) represents the sum of the fitness of all states, and the R ( X j ) is the fitness of the j-th state. Q j is the cumulative probability value of the state X j (j = 1, 2, …, M), where Q j = P ( X j ) .
P ( X j ) = R ( X j ) j = 1 M R ( X j )
Step 3: Generate a random number r between [0,1]. If r Q 1 , accept the individual 1. Otherwise, the k-th state X k is selected if the condition ( Q k 1 < r Q k ) is satisfied.
Q j = P ( X j )
Step 4: Repeat Step 3 for M times until the end of voting. The state with the highest number of votes is target state X 2 .

4.3. Proposed Approach for Acquiring the Adaptive Embedding Strength

This section explains how to achieve the best embedding strength by the WL method. At the beginning of the WL algorithm, all the energy E in the state space and its corresponding state density function g(E) are unknown (the initial values are all set to 0). Once a new energy E is accessed, the state density g(E) and histogram function H(E) of this energy are initialized to 1. Since the energy values calculated in this paper are between 0 and 1. Therefore, the maximum energy is one, which is divided into 100 energy intervals, each energy interval is 0.01, i.e., [0, 0.01), [0.01, 0.02), …, [0.99, 1]. For the convenience of description, the energy interval [ E X , E X ] is marked as [E(X)], where E X is the downward rounding value of E(X) and E X is the upward value of E(X). For example, E(X) = 0.621 is in the energy interval [0.62, 0.63), which is recorded as [0.621]. In addition, the convergence rate of the algorithm is controlled by the flatness of the histogram, and the flat histogram means that the value of all H(E(X)) is not less than k ( 0 < k < 1 ) times the average value of the histogram H E X , and the value of k depends on the complexity of the system and the expected accuracy of g(E(X)). Actually, it is very difficult to get an absolute flat histogram. Therefore, the algorithm will check if the histogram is approximately flat after every 10 3 MC iterations. If H ( E ) becomes approximately flat, that is, if H ( [ E ] ) > = k · H ( [ E ( x ) ] ) for all [ E ] in S 0 , then the adjustment correction factor becomes a smaller value, i.e., f i = f i , i = i + 1 . Then, if the number of iterations is f e x p ( 10 4 ) = 1.001 , f m a x is output, and the iteration is terminated. Otherwise, set H([E(X)]) corresponding to all visited energy intervals [E(X)] to zero, preserve g(E) value, and start the next random walk. At this point, g(E(X)) will converge to the true value with a certain precision. In the actual application, lng(E( X i )) = ln f i + lng(E( X i )) is chosen to update the state density G([E(X)]), i = 1, 2. Meanwhile, the acceptance probability from X 1 to X 2 is calculated by using the formula containing exponentials, namely, p X 1 > X 2 = m i n e l n [ g E 1 g ( E 2 ) ] , 1 . Next, the steps of the proposed method to obtain a trade-off between robustness and imperceptibility are listed as bellow,
(1)
Initialize the parameters used in the algorithm (k = 0.8, i = 0, f 0 = e, L = 0), where T = 1000 means that the algorithm checks whether the histogram is flat every 1000 executions, f i (initial f i = f 0 ) is a monotonic decreasing function used to reduce the modification factor. Choose the state with the highest fitness value from Q w , so that X m a x = X 1 , E m a x = E 1 ; make the accessed energy interval set S 0 = [ E ( X 1 ) ] , that is, [ E ( X 1 ) ] is added in the temporary buffer S 0 , S 0 = S 0 + [ E ( X 1 ) ] . Make the histogram function H ( E ( X 1 ) ) = 1 and the probability density function g ( E ( X 1 ) ) = 1 .
(2)
Checks the number of iterations reaches the maximum maxG or not. If it reaches the maximum, output the results containing the best scaling factor E m a x and the maximum fitness value f m a x , otherwise, go to (3).
(3)
Select the target link X 2 using the RWS random generation strategy (see Section 4.2), and let g ( E ( X 2 ) ) = 1 , H ( E ( X 2 ) ) = 1 , L = L + 1 .
(4)
If [ E ( X 2 ) ] is not included in a target value interval of S 0 , the target value interval containing E ( X 2 ) is placed in S 0 , that is, S 0 = S 0 + [ E ( X 2 ) ] , go to (5).
(5)
Checks the target state X 2 is accepted or not, and the acceptance probability is
P ( x 1 x 2 ) = min ( e ln g ( E 1 ) ln g ( E 2 ) , 1 )
If r a n d o m ( 0 , 1 ) < p ( X 1 X 2 ), X 2 is accepted and removed from the population Q w . Then, let g ( E ( X 2 ) ) = f i · g ( E ( X 2 ) ) , H ( [ E ( X 2 ) ] ) = H ( [ E ( X 2 ) ] ) + 1 , make the current link point to X 2 , i.e., X 1 = X 2 , E 1 = E 2 . Otherwise, X 2 is not accepted, and g ( [ E ( X 1 ) ] ) = f i · g ( [ E ( X 1 ) ] ) , H ( [ E ( X 1 ) ] ) = H ( [ E ( X 1 ) ] ) ) + 1 .
(6)
Compute the fitness value of state X 2 using Equation (13), and then compare the value with the maximum fitness value f m a x . If f ( X 2 ) > f m a x , generate a random state X r a n d , E r a n d = l o w R +( u p R - l o w R ) × rand[0,1]. Here, l o w R and u p R are the upper and lower bounds of the histogram interval where E m a x is located, respectively, go to (8). Otherwise, go to (7).
(7)
If Q 2 > Q t h , generate a random state X r a n d , E r a n d = E m a x + ( 1 E m a x ) × rand[0,1], which denotes that the state with higher robustness is added to the population Q w . Otherwise, E r a n d = E m a x × rand[0,1], which denotes that the state with higher quality is added to the population Q w .
(8)
If L % T = = 0 , go to (9). Otherwise, go to (2).
(9)
If the histogram function H(E) is approximately flat, that is, if any of [E(X)] belongs to S 0 , and H E l n 2 / l n f i , then go to (8); Otherwise, go to (2).
(10)
Adjust the correction factor so that f i + 1 = f i + 1 .
(11)
If f i e x p 10 4 = 1.001 , the loop is jumped out and ends abnormally. Otherwise, for all [ E ( X ) ] in S 0 , restore H ( [ E ( X ) ] ) = 0, and the g ( [ E ( X ) ] ) value is retained, go to (2).

5. Results and Discussion

In this section, to evaluate the performance of the proposed image watermarking method based on the WL algorithm, the invisibility and robustness experiments are implemented. All simulation experiments are run on a PC with Intel Core(TM) I7-7700HQ, 2.80 GHz processor and 8.0 GB of RAM, and using MATLAB R2016a under Windows 10. Likewise, six standard 512 × 512 gray-scale images are shown in Figure 6 are used as the host images, and a 128 × 128 gray-scale logo image is used as a watermark image, as shown in Figure 6. The key parameters of the WL algorithm are set, as shown in Table 1 (See Section 4 for the remaining parameter settings), and the different attacks are shown in Table 2. Next, the proposed method is compared with the image watermarking methods given in [42,43,44,45], where these methods are based on the optimization algorithm, and the remaining methods used in [46,47] are not.

5.1. Imperceptibility Measurement

The watermark invisibility is an important metric to measure the performance. Figure 7 shows the watermarked host images suffered no attack and the NCs, SSIMs are also listed. It can be seen from Figure 7, all these metrics are greater than 40dB and 0.9993, respectively, which means the proposed method has good invisibility performance. Therefore, the results verify that the quality achieved exceeds the predetermined Qth, and the proposed watermarking method has good invisibility, whether from a subjective or objective point of view. Here, when Qth = 40 db, from Figure 7a–f, the optimal scaling factor computed by the proposed method are 0.05898, 0.06493, 0.05931, 0.06762, 0.05702 and 0.05905, respectively. The fitness value f m a x for these images are 0.94988, 0.94488, 0.93897, 0.95903, 0.95527 and 0.94397. The obtained scaling factors are between 0.058 and 0.068, which is corroborated with the analysis presented by [48].
The curves of P S N R ( A , A * ) and S S I M ( A , A * ) with the scaling factor are shown in Figure 8. Obviously, no matter which host image is used, the transparency of the image decreases as the scaling factor increases. Moreover, the reached highest PSNR value for each image are all greater than 40 db. Therefore, the most appropriate embedding factor should improve the robustness degree if possible when ensuring the PSNR value greater than Qth. It enables the extracted watermark to be correct to the maximum extent possible.
Table 3 shows the quality using the PSNR metric, compared to the other methods. It is observed that the proposed method has better quality and guarantees a quality higher than the predefined value.

5.2. Robustness Measurement

In this section, the robustness is evaluated by detecting the performance of the watermarking system under different attacks, which is a similarity between the embedded and the extracted watermark [42]. Table 4 shows the NC value of the watermark extracted from the host image under different attacks and the original watermark, respectively.
As shown in Table 4 and Table 5, after embedding the watermark, the mean value of NC metric for each watermarked image remained above 0.89, and the mean value of BER are all lower than 0.2. Therefore, this method also has good robustness. The BER values for different methods are shown in Table 5.
To further examine the effect of scaling factor on robust for attacked images. The effects of scaling factor on NC values, between the range of [0.01,0.2], are displayed in Figure 9. It can be seen that the NC value varies only between 0.01 and 0.2, except for (e). Subsequently, the NC value tends to be stable. For gamma correction and counterclockwise rotation attacks, the NC values concerning (d) are constant throughout. Therefore, the change in scaling factor has little effect on the two types of attacks, which is also reflected in the above results. Furthermore, the robustness of images under various attacks is also different. This also makes it difficult for the same algorithm to be fully applicable to all watermarking systems.
Table 6 shows the watermark extracted from these corrupted watermarked images after various kinds of attacks. It can be seen that the watermark can be better extracted in most cases except for gamma correction and rotation attack. Combined with Figure 9, we concluded that the low robust sensitivity for these two attacks resulted in the little contribution to the NC value when altering the embedding coefficients.
Finally, the proposed method is compared with other approaches. The comparison of robustness is shown in Table 7 and Table 8, which is examined by the BER and NC value. It can be seen from Table 7 that BCRs of the proposed method are more robust than [42,43,46] in most attacks. The average value of BCR is higher than other methods when Qth = 40 db, and it still has high robustness when PSNR reaches 45 db. In addition, after modifying the attack parameters, the proposed method is also compared with the methods given by [44,45,47] using Lena when Qth = 40 db and 45 db. At this time, the optimal coefficients are 0.06143 and 0.0337. It is clear that the NC value of the proposed method is better in most cases except for rotation attacks. Therefore, it can be deduced that the proposed method achieves better robustness while guaranteeing predetermined invisibility.

6. Conclusions

In this paper, an adaptive image watermarking method combining SVD and the Wang–Landau (WL) sampling method is proposed to achieve the trade-off between robustness and invisibility through sampling statistics of the energy state density function and histogram function to find the global optimal solution. In addition, the three-level discrete wave transformation (DWT) and singular value decomposition (SVD) are used to decompose the host image to seek for the embedding position, and then the watermark is embedded. Finally, the performances of invisibility and robustness are evaluated by some metrics, such as peak signal to noise ratio (PSNR), normalized cross-correlation (NC). Meanwhile, compared with other existing related methods, the experimental results of the proposed method are effective and meaningful to improve the trade-off between robustness and imperceptibility. However, for some attacks, such as gamma correction, the robustness of the watermark is decreased, which means that it is necessary to sacrifice some invisibility to ensure the robustness of the watermark. In the future, more experimental implementations will be performed to evaluate the performance of the algorithm. In addition, since some parameters in the algorithm have a great influence on the experimental results, some machine learning methods will be used to adjust these parameters in our future works automatically.

Author Contributions

Conceptualization, B.W. and P.Z.; writing—original draft preparation, P.Z.; validation, B.W.; writing—review and editing, B.W. and P.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under grant 61972207, U1836208, U1836110, 61672290; the Major Program of the National Social Science Fund of China under Grant No. 17ZDA092, by the National Key R&D Program of China under grant 2018YFB1003205; by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China; by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund.

Acknowledgments

The authors would like to sincerely thank the anonymous reviewers for their valued comments and constructive suggestions, which significantly improved the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yusof, Y.; Khalifa, O.O. Imperceptibility and robustness analysis of DWT-based digital image watermarking. In Proceedings of the 2008 International Conference on Computer and Communication Engineering, Kuala Lumpur, Malaysia, 13–15 May 2008; pp. 1325–1330. [Google Scholar]
  2. Wang, B.; Kong, W.; Li, W.; Xiong, N.N. A dual-chaining watermark scheme for data integrity protection in Internet of Things. CMC Comput. Mater. Contin. 2019, 58, 679–695. [Google Scholar] [CrossRef] [Green Version]
  3. Wang, B.; Kong, W.; Guan, H.; Xiong, N.N. Air Quality Forecasting Based on Gated Recurrent Long Short Term Memory Model in Internet of Things. IEEE Access 2019, 7, 69524–69534. [Google Scholar] [CrossRef]
  4. Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 1997, 6, 1673–1687. [Google Scholar] [CrossRef] [PubMed]
  5. Su, Q.; Niu, Y.; Zou, H.; Zhao, Y.; Yao, T. A blind double color image watermarking algorithm based on QR decomposition. Multimed. Tools Appl. 2014, 72, 987–1009. [Google Scholar] [CrossRef]
  6. Xiang, L.; Li, Y.; Hao, W.; Yang, P.; Shen, X. Reversible natural language watermarking using synonym substitution and arithmetic coding. Comput. Mater. Contin. 2018, 55, 541–559. [Google Scholar] [CrossRef]
  7. Wang, B.; Li, W.; Xiong, N.N. Time-Based Access Control for Multi-attribute Data in Internet of Things. Mob. Netw. Appl. 2019. [Google Scholar] [CrossRef]
  8. Kumsawat, P.; Attakitmongcol, K.; Srikaew, A. A new approach for optimization in image watermarking by using genetic algorithms. IEEE Trans. Signal Process. 2005, 53, 4707–4719. [Google Scholar] [CrossRef]
  9. Wei, Z.; Dai, J.; Li, J. Genetic watermarking based on DCT domain techniques. In Proceedings of the 2006 Canadian Conference on Electrical and Computer Engineering, Ottawa, ON Canada, 7–10 May 2006; pp. 2365–2368. [Google Scholar]
  10. Rao, V.S.; Shekhawat, R.S.; Srivastava, V. A DWT-DCT-SVD based digital image watermarking scheme using particle swarm optimization. In Proceedings of the 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science, Bhopal, India, 1–2 March 2012; pp. 1–4. [Google Scholar]
  11. Ouyang, C.; Yang, Q.; Liu, C. A blind DCT watermarking algorithm based on particle swarm optimization. J. Jinggangshan Univ. (Nat. Sci.) 2011, 32, 63–66. [Google Scholar]
  12. Sharma, S.; Sharma, H.; Sharma, J.B. An adaptive color image watermarking using RDWTSVD and artificial bee colony based quality metric strength factor optimization. Appl. Soft Comput. 2019, 84, 105696. [Google Scholar] [CrossRef]
  13. Kang, X.; Huang, J.; Zeng, W. Efficient general printscanning resilient data hiding based on uniform logpolar mapping. IEEE Trans. Inf. Forensics Secur. 2010, 5, 1–12. [Google Scholar] [CrossRef]
  14. Patra, J.C.; Phua, J.E.; Bornand, C. A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit. Signal Process. 2010, 20, 1597–1611. [Google Scholar] [CrossRef]
  15. Singh, D.; Singh, S.K. DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed. Tools Appl. 2017, 76, 953–977. [Google Scholar] [CrossRef]
  16. Liu, X.; Lin, C.; Yuan, S. Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 2016, 28, 1047–1055. [Google Scholar] [CrossRef]
  17. Makbol, N.M.; Khoo, B.E. Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int. J. Electron. Commun. 2013, 67, 102–112. [Google Scholar] [CrossRef]
  18. Roy, S.; Pal, A.K. An SVD based location specific robust color image watermarking scheme using RDWT and Arnold scrambling. Wirel. Pers. Commun. 2018, 98, 2223–2250. [Google Scholar] [CrossRef]
  19. Jayashree, N.; Bhuvaneswaran, R. A robust image watermarking scheme using Z-transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition. Comput. Mater. Contin. 2019, 58, 263–285. [Google Scholar] [CrossRef] [Green Version]
  20. Zhou, X.; Zhang, H.; Wang, C. A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 2018, 10, 77. [Google Scholar] [CrossRef] [Green Version]
  21. Wu, Q.; Wu, M. Adaptive and blind audio watermarking algorithm based on chaotic encryption in hybrid domain. Symmetry 2018, 10, 284. [Google Scholar] [CrossRef] [Green Version]
  22. Liu, J.; Tu, Q.; Xu, X. Quantization-based image watermarking by using a normalization scheme in the wavelet domain. Information 2018, 9, 194. [Google Scholar] [CrossRef] [Green Version]
  23. Liu, J.; Huang, J.; Luo, Y.; Cao, L.; Yang, S.; Wei, D.; Zhou, R. An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 2019, 7, 80849–80860. [Google Scholar] [CrossRef]
  24. Pan, W. A new fruit fly optimization algorithm: Taking the financial distress model as an example. Knowl. Based Syst. 2012, 26, 69–74. [Google Scholar] [CrossRef]
  25. Xiao, Z.; Sun, J.; Wang, Y. Wavelet domain digital watermarking method based on fruit fly optimization algorithm. J. Comput. Appl. 2015, 35, 2527–2530. [Google Scholar]
  26. Zheng, Z.; Saxena, N.; Mishra, K.; Sangaiah, A.K. Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Gener. Comput. Syst. 2018, 88, 92–106. [Google Scholar] [CrossRef]
  27. Loukhaoukha, K.; Nabti, M.; Zebbiche, K. A robust SVD-based image watermarking using a multi-objective particle swarm optimization. Opto Electron. Rev. 2014, 22, 45–54. [Google Scholar] [CrossRef]
  28. Sharma, V.; Mir, R.N. An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J. King Saud Univ. Comput. Inf. Sci. 2019. [Google Scholar] [CrossRef]
  29. Chen, W.; Zhang, J.; Lin, Y.; Chen, N.; Zhan, Z.H.; Chung, H.S.; Li, Y.; Shi, Y. Particle swarm optimization with an aging leader and challengers. IEEE Trans. Evol. Comput. 2012, 17, 241–258. [Google Scholar] [CrossRef]
  30. Ansari, I.A.; Pant, M.; Ahn, C.W. Robust and false positive free watermarking in IWT domain using SVD and ABC. Eng. Appl. Artif. Intell. 2016, 49, 114–125. [Google Scholar] [CrossRef]
  31. Liu, J.; Li, J.; Ma, J.; Sadiq, N.; Bhatti, U.; Ai, Y. A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map. Appl. Sci. 2019, 9, 700. [Google Scholar] [CrossRef] [Green Version]
  32. Jane, O.; Elbaşi, E. A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition. Turk. J. Electr. Eng. Comput. Sci. 2014, 22, 1354–1366. [Google Scholar] [CrossRef]
  33. Run, R.; Horng, S.; Lai, J.; Kao, T.; Chen, R. An improved SVD-based watermarking technique for copyright protection. Expert Syst. Appl. 2012, 39, 673–689. [Google Scholar] [CrossRef]
  34. Kang, X.; Zhao, F.; Lin, G.; Chen, Y. A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed. Tools Appl. 2018, 77, 13197–13224. [Google Scholar] [CrossRef]
  35. Wang, F.; Landau, D. Efficient, multiple-range random walk algorithm to calculate the density of states. Phys. Rev. Lett. 2001, 86, 2050. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  36. Berg, B.A.; Neuhaus, T. Multicanonical ensemble: A new approach to simulate first-order phase transitions. Phys. Rev. Lett. 1992, 68, 9. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  37. Guo, Y.; Li, B.; Goel, N. Optimised blind image watermarking method based on firefly algorithm in DWT-QR transform domain. IET Image Process. 2017, 11, 406–415. [Google Scholar] [CrossRef] [Green Version]
  38. Liu, J.; Song, B.; Yao, Y.; Xue, Y.; Liu, W.; Liu, Z. Wang-Landau sampling in face-centered-cubic hydrophobic-hydrophilic lattice model proteins. Phys. Rev. E 2014, 90, 042715. [Google Scholar] [CrossRef] [PubMed]
  39. Liu, J.; Li, G.; Geng, H. A new heuristic algorithm for the circular packing problem with equilibrium constraints. Sci. China Inf. Sci. 2011, 54, 1572. [Google Scholar] [CrossRef] [Green Version]
  40. Liu, J.; Hao, L.; Li, G.; Xue, Y.; Liu, Z.; Huang, J. Multi-objective layout optimization of a satellite module using the Wang-Landau sampling method with local search. Front. Inf. Technol. Electron. Eng. 2016, 17, 527–542. [Google Scholar] [CrossRef] [Green Version]
  41. Lipowski, A.; Lipowska, D. Roulette-wheel selection via stochastic acceptance. Phys. A Stat. Mech. Appl. 2012, 391, 2193–2196. [Google Scholar] [CrossRef] [Green Version]
  42. Wang, J.; Peng, H.; Shi, P. An optimal image watermarking approach based on a multi-objective genetic algorithm. Inf. Sci. 2011, 181, 5501–5514. [Google Scholar] [CrossRef]
  43. Abdelhakim, A.M.; Saleh, H.I.; Nassar, A.M. A quality guaranteed robust image watermarking optimization with Artificial Bee Colony. Expert Syst. Appl. 2017, 72, 317–326. [Google Scholar] [CrossRef]
  44. Naderahmadian, Y.; Hosseini-Khayat, S. Fast watermarking based on QR decomposition in wavelet domain. In Proceedings of the 2010 Sixth international conference on intelligent information hiding and multimedia signal processing, Darmstadt, Germany, 15–17 October 2010; pp. 127–130. [Google Scholar]
  45. Naderahmadian, Y.; Hosseini-Khayat, S. Fast and robust watermarking in still images based on QR decomposition. Multimed. Tools Appl. 2014, 72, 2597–2618. [Google Scholar] [CrossRef]
  46. Das, C.; Panigrahi, S.; Sharma, V.K.; Mahapatra, K. A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int. J. Electron. Commun. 2014, 68, 244–253. [Google Scholar] [CrossRef]
  47. Ali, M.; Ahn, C.W. Comments on “Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm”. Expert Syst. Appl. 2015, 42, 2392–2394. [Google Scholar] [CrossRef]
  48. Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
Figure 1. The decomposition of the host image using 2-level discrete wavelet transform (DWT).
Figure 1. The decomposition of the host image using 2-level discrete wavelet transform (DWT).
Mathematics 08 00691 g001
Figure 2. Initial potential surface and potential energy surface filled with Wang–Landau (WL) samples.
Figure 2. Initial potential surface and potential energy surface filled with Wang–Landau (WL) samples.
Mathematics 08 00691 g002
Figure 3. The flow chart of the watermarking embedding.
Figure 3. The flow chart of the watermarking embedding.
Mathematics 08 00691 g003
Figure 4. Steps for extracting a watermark from watermarked image.
Figure 4. Steps for extracting a watermark from watermarked image.
Mathematics 08 00691 g004
Figure 5. Scaling factor optimization using WL.
Figure 5. Scaling factor optimization using WL.
Mathematics 08 00691 g005
Figure 6. The host images and the watermark logo: (a) Lena, (b) Houses, (c) Peppers, (d) Kiel, (e) Light house, (f) Baboon, (g) Watermark logo.
Figure 6. The host images and the watermark logo: (a) Lena, (b) Houses, (c) Peppers, (d) Kiel, (e) Light house, (f) Baboon, (g) Watermark logo.
Mathematics 08 00691 g006
Figure 7. The normalized cross-correlation (NCs) and structural similarity index measure (SSIMs) in the watermarked host images which suffered no attack: (a) Lena (SSIM = 0.9996, PSNR = 40.74 dB); (b) Houses (SSIM = 0.9995, PSNR = 40.42 dB); (c) Peppers (SSIM = 0.9995, PSNR = 40.10 dB); (d) Kiel (SSIM = 0.9993, PSNR = 40.00dB); (e) Light house (SSIM = 0.9997, PSNR = 41.33 dB); (f) Baboon (SSIM = 0.9998, PSNR = 40.17 dB).
Figure 7. The normalized cross-correlation (NCs) and structural similarity index measure (SSIMs) in the watermarked host images which suffered no attack: (a) Lena (SSIM = 0.9996, PSNR = 40.74 dB); (b) Houses (SSIM = 0.9995, PSNR = 40.42 dB); (c) Peppers (SSIM = 0.9995, PSNR = 40.10 dB); (d) Kiel (SSIM = 0.9993, PSNR = 40.00dB); (e) Light house (SSIM = 0.9997, PSNR = 41.33 dB); (f) Baboon (SSIM = 0.9998, PSNR = 40.17 dB).
Mathematics 08 00691 g007
Figure 8. Peak signal to noise ratio (PSNR) and SSIM values using different host pictures shown in Figure 6: (a) the curve of PSNR; (b) the curve of SSIM.
Figure 8. Peak signal to noise ratio (PSNR) and SSIM values using different host pictures shown in Figure 6: (a) the curve of PSNR; (b) the curve of SSIM.
Mathematics 08 00691 g008
Figure 9. Effect of scaling factor on NC values for different attacked images: (a) effect on Lena, (b) effect on Houses, (c) effect on Peppers, (d) effect on Kiel, (e) effect on Light house, (f) effect on Baboon.
Figure 9. Effect of scaling factor on NC values for different attacked images: (a) effect on Lena, (b) effect on Houses, (c) effect on Peppers, (d) effect on Kiel, (e) effect on Light house, (f) effect on Baboon.
Mathematics 08 00691 g009
Table 1. Summary of key parameters.
Table 1. Summary of key parameters.
NumberKey Parameter Description
1The number of population Q w is 20
2The maximum iterator m a x G = 1000
3The quantization coefficients 1 and 2 are set to 0.5 and 0.5.
4Qth = 40,45
5Energy intervals number = 100
Table 2. Summary of different attacks.
Table 2. Summary of different attacks.
NumberAttack Description
1Median filter with window size 3 × 3
2Rescaling 512 → 256 → 512
3Salt and pepper noise with noise density 0.01
4Gaussian low-pass filter of size 3 × 3 with standard deviation
5JPEG compression with quality factor 30
6Counterclockwise rotation with 45
7Speckle noise with variance 0.01
8Gaussian noise with mean zero and standard deviation 0.001
9Gamma correction with gamma value 0.2
10Histogram equalization
11Sharpening attack
Table 3. Quality comparison between the proposed method and other watermarking techniques.
Table 3. Quality comparison between the proposed method and other watermarking techniques.
Host ImageGA [42]IBCC [46]ABC [43]Proposed Method (Qth = 40 db)Proposed Method (Qth = 45 db)
Lena38.6341.7941.9540.7446.74
Houses37.4338.3941.3340.4245.15
Peppers38.9641.6941.8540.1045.50
Kiel38.1640.5241.2140.0045.28
LightHouse38.2440.8441.3241.3345.27
Baboon37.439.1441.6240.1745.33
Average38.1540.4141.5540.4645.55
Table 4. Results of NC metrics for different host images.
Table 4. Results of NC metrics for different host images.
AttackLenaHousesPeppersKielLight HouseBaboon
Median filter with window size 3 × 30.99710.99060.9980.99220.9930.9696
Rescaling 512 → 256 → 5120.99770.99180.99420.98050.99440.9909
Salt and pepper noise with noise density 0.010.98680.98190.97820.99510.99130.9939
Gaussian low-pass filter of size 3 × 3 with standard deviation0.99590.99010.99550.99460.99420.9954
JPEG compression with quality factor 300.99820.99610.99890.9990.99930.9994
Counterclockwise rotation with 45 0.39280.39510.13650.54610.51960.3675
Speckle noise with variance 0.010.99550.94670.99640.99530.99690.9982
Gaussian noise with mean zero and standard deviation 0.0010.99830.99670.99860.99940.99910.9991
Gamma correction with gamma value 0.20.76370.76010.76470.76090.76410.7634
Histogram equalization0.81760.7990.85790.86780.83770.7528
Sharpening attack0.98910.97140.98770.98680.98460.9854
Average0.90300.89270.88240.91980.91580.8923
Table 5. Results of bit error ratio (BER) metrics for different host images.
Table 5. Results of bit error ratio (BER) metrics for different host images.
AttackLenaHousesPeppersKielLight HouseBaboon
Median filter with window size 3 × 30.00970.02060.00240.10850.03230.1931
Rescaling 512 → 256 → 5120.00680.04000.01340.15360.02140.0457
Salt and pepper noise with noise density 0.010.00930.01690.01800.00670.00890.0029
Gaussian low-pass filter of size 3 × 3 with standard deviation0.00870.03210.01280.01080.01500.0129
JPEG compression with quality factor 300.00070.00790.00010.00010.00020.0001
Counterclockwise rotation with 45 0.7780.74570.90950.70230.71940.7829
Speckle noise with variance 0.010.01310.08140.00640.01050.00240.0024
Gaussian noise with mean zero and standard deviation 0.0010.0010.00260.000300.00030.001
Gamma correction with gamma value 0.20.06810.07220.08560.04280.07020.0573
Histogram equalization0.35240.42910.34010.34570.14250.4796
Sharpening attack0.05810.13960.06710.07640.07530.0753
Average0.11870.14430.13230.13250.09890.1503
Table 6. Watermarked image, Lena, and the corresponding extracted watermarks versus various attacks.
Table 6. Watermarked image, Lena, and the corresponding extracted watermarks versus various attacks.
AttackWatermarked ImageExtracted Watermarks
No attack Mathematics 08 00691 i001 Mathematics 08 00691 i002
Median filter with window size 3 × 3 Mathematics 08 00691 i003 Mathematics 08 00691 i004
Rescaling 512 → 256 → 512 Mathematics 08 00691 i005 Mathematics 08 00691 i006
Salt and pepper noise with noise density 0.01 Mathematics 08 00691 i007 Mathematics 08 00691 i008
Gaussian low-pass filter of size 3 × 3 Mathematics 08 00691 i009 Mathematics 08 00691 i010
JPEG compression with quality factor 30 Mathematics 08 00691 i011 Mathematics 08 00691 i012
Counterclockwise rotation with 45 Mathematics 08 00691 i013 Mathematics 08 00691 i014
Speckle noise with variance 0.01 Mathematics 08 00691 i015 Mathematics 08 00691 i016
Gaussian noise with mean zero and standard deviation 0.001 Mathematics 08 00691 i017 Mathematics 08 00691 i018
Gamma correction with gamma value 0.2 Mathematics 08 00691 i019 Mathematics 08 00691 i020
Histogram equalization Mathematics 08 00691 i021 Mathematics 08 00691 i022
Sharpening attack Mathematics 08 00691 i023 Mathematics 08 00691 i024
Table 7. BCR comparison between the proposed method and other watermarking techniques.
Table 7. BCR comparison between the proposed method and other watermarking techniques.
AttackGA [42]IBCC [46]ABC [43]Proposed Method (Qth = 40 db)Proposed Method (Qth = 45 db)
Median filter with window size 3 × 30.7120.8290.9310.9390.884
Rescaling 512 → 256 → 5120.7550.7660.9630.9530.892
Salt and pepper noise with noise density 0.010.9380.8250.8050.990.941
Gaussian low-pass filter of size 3 × 3 with standard deviation0.9900.96710.9850.94
JPEG compression with quality factor 300.9200.95210.9980.989
Gaussian noise with mean zero and standard deviation 0.0010.8260.6360.7670.9990.982
Gamma correction with gamma value 0.20.9010.8570.9950.9340.934
Histogram equalization0.9840.8490.9110.6520.653
Sharpening attack0.9840.8480.9700.9180.837
Average0.890.8370.9270.930.895
Table 8. NC comparison between the proposed method and other watermarking techniques.
Table 8. NC comparison between the proposed method and other watermarking techniques.
AttackQRWA [44]SIQR [45]DSFA [47]Proposed Method (Qth = 40 db)Proposed Method (Qth = 45 db)
Median filter with window size 4 × 40.80330.83990.88160.98790.9618
Rescaling 512 256 5120.96730.855810.99790.9938
Salt and pepper noise with noise density 0.0010.98540.988710.99950.9978
Gaussian low-pass filter of size 3 × 3 with standard deviation0.91200.81790.98590.99610.9878
JPEG compression with quality factor 250.93440.87000.99790.99750.9934
Counterclockwise rotation with 45 0.8930.87180.68890.39490.3685
Speckle noise with variance 0.0050.90000.89620.99780.9980.9949
Gaussian noise with mean zero and standard deviation 0.0020.83030.81510.99050.99740.9904
Gamma correction with gamma value 0.10.72870.71260.34060.76380.7629
Histogram equalization0.69060.66560.92570.81860.8143
Average0.86450.83340.88090.8950.887

Share and Cite

MDPI and ACS Style

Wang, B.; Zhao, P. An Adaptive Image Watermarking Method Combining SVD and Wang-Landau Sampling in DWT Domain. Mathematics 2020, 8, 691. https://doi.org/10.3390/math8050691

AMA Style

Wang B, Zhao P. An Adaptive Image Watermarking Method Combining SVD and Wang-Landau Sampling in DWT Domain. Mathematics. 2020; 8(5):691. https://doi.org/10.3390/math8050691

Chicago/Turabian Style

Wang, Baowei, and Peng Zhao. 2020. "An Adaptive Image Watermarking Method Combining SVD and Wang-Landau Sampling in DWT Domain" Mathematics 8, no. 5: 691. https://doi.org/10.3390/math8050691

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop