Next Article in Journal
Multilevel Deep Feature Generation Framework for Automated Detection of Retinal Abnormalities Using OCT Images
Next Article in Special Issue
B-DP: Dynamic Collection and Publishing of Continuous Check-In Data with Best-Effort Differential Privacy
Previous Article in Journal
Robust Quantum Search with Uncertain Number of Target States
Previous Article in Special Issue
(Semi-)Automatically Parsing Private Protocols for In-Vehicle ECU Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness

by
Priyanka Singh
1,
Kilari Jyothsna Devi
1,
Hiren Kumar Thakkar
2,* and
José Santamaría
3,*
1
Department of Computer Science and Engineering, SRM University, Amaravati 522508, India
2
Department of Computer Engineering, Marwadi University, Rajkot 360006, India
3
Department of Computer Science, University of Jaén, 23071 Jaén, Spain
*
Authors to whom correspondence should be addressed.
Entropy 2021, 23(12), 1650; https://doi.org/10.3390/e23121650
Submission received: 25 October 2021 / Revised: 23 November 2021 / Accepted: 29 November 2021 / Published: 8 December 2021
(This article belongs to the Special Issue Adversarial Intelligence: Secrecy, Privacy, and Robustness)

Abstract

:
In the past decade, rapid development in digital communication has led to prevalent use of digital images. More importantly, confidentiality issues have also come up recently due to the increase in digital image transmission across the Internet. Therefore, it is necessary to provide high imperceptibility and security to digitally transmitted images. In this paper, a novel blind digital image watermarking scheme is introduced tackling secured transmission of digital images, which provides a higher quality regarding both imperceptibility and robustness parameters. A block based hybrid IWT- SVD transform is implemented for robust transmission of digital images. To ensure high watermark security, the watermark is encrypted using a Pseudo random key which is generated adaptively from cover and watermark images. An encrypted watermark is embedded in randomly selected low entropy blocks to increase the security as well as imperceptibility. Embedding positions within the block are identified adaptively using a Blum–Blum–Shub Pseudo random generator. To ensure higher visual quality, Initial Scaling Factor (ISF) is chosen adaptively from a cover image using image range characteristics. ISF can be optimized using Nature Inspired Optimization (NIO) techniques for higher imperceptibility and robustness. Specifically, the ISF parameter is optimized by using three well-known and novel NIO-based algorithms such as Genetic Algorithms (GA), Artificial Bee Colony (ABC), and Firefly Optimization algorithm. Experiments were conducted for the proposed scheme in terms of imperceptibility, robustness, security, embedding rate, and computational time. Experimental results support higher effectiveness of the proposed scheme. Furthermore, performance comparison has been done with some of the existing state-of-the-art schemes which substantiates the improved performance of the proposed scheme.

1. Introduction

Due to the pioneering of 5G technology in telecommunication, use of multimedia content, such as audio, images, and video, has increased many fold. Transmission of multimedia content through the Internet on public domains such as social networks, e-health, e-commerce and e-business applications have several barriers [1]. Digital images are more popular in carrying information through the Internet [2]. The immoderate usage of internet duplication, unauthorized access, and tampering of digital images has increased excessively. Therefore, it has become necessary to maintain the authenticity, confidentiality, and integrity of digital images. One of the most feasible solutions to safeguard the digital images is Digital Image Watermarking (DIW) [3]. DIW is the process of embedding a watermark in the form of text, image, or binary data in a cover image to produce a watermarked image. The watermark is embedded in a spatial or spectral domain. However, it is observed that spectral domain watermark embedding is more robust than the spatial domain watermarking [4,5]. Robust embedding can sustain malicious signal processing attacks, and they are more suitable for secured transmission [6]. In an efficient watermarking scheme, characteristics such as imperceptibility, robustness, and embedding rate play an instrumental role [7]. In particular, imperceptibility is defined as the visual quality of cover and watermarked images, and, ideally, both should be the same. A DIW scheme is considered robust, and provided original and extracted watermarks are almost similar even under attacks. Embedding rate is the ratio between the area of watermark (in bits) and the area of the cover image (in pixels) [8]. However, it is challenging to satisfy these characteristics at the same time and they are always a trade-off. In the last few years, researchers have suggested various schemes to balance this trade-off. One of the prominent solutions is to choose a strong scaling factor ( α ) for embedding the watermark. Nature Inspired Optimization (NIO) algorithms have become a very promising scheme to address this issue. Specifically, an effective fitness function can assist in generating a strong scaling factor [9]. However, it is still a challenge to achieve an optimal design for the objective function due to the inherent complex nature of the problem being involved. Watermark security is another important characteristic of watermarking. It is important to protect secret data during its transmission through the internet. To ensure the security of the information, the majority of the researchers have proposed Principle Component (PC) or Singular Value (SV) insertion, the use of hashing techniques, and encryption approaches, but they are less secure approaches. Nowadays, encryption is the most popular security approach [10]. Chaotic maps are often used for encryption, but it has limitations of hyper tuning issues. Therefore, there is a need to develop a strong encryption approach. To address the issues discussed above, a novel blind adaptive DIW scheme is proposed for secured watermark transmission with higher imperceptibility, robustness, and an embedding rate with an optimum computational cost.
The structure of the paper is as follows: Section 2 is devoted to reviewing the State-of-The-ART (SoTA) in the field. Next, a detailed description of the proposed scheme is introduced in Section 3. Section 4 provides a broad discussion on the results reported in the experimental section. Finally, some of those more relevant results and future investigations are accordingly summarized in Section 5.

2. Brief Overview

Existing DIW schemes mainly focus on achieving higher imperceptibility, robustness, and embedding rate by embedding the watermark in spatial and spectral domains. The DIW schemes proposed in [11,12,13,14] utilize spatial domain techniques. In general, spatial domain techniques are imperceptible but less robust. Therefore, researchers have also explored hybrid transform watermarking schemes for high imperceptibility and robustness, such as DWT-SVD [15,16,17,18], DWT-DCT [19,20], RDWT-SVD [21], and IWT-SVD [22,23]. The schemes proposed in [22,23] have high imperceptibility but lag behind in robustness, which can be attributed to the trade-off between watermarking characteristics. To balance this trade-off, the scaling factor for watermark embedding and extraction is suggested [11,12,13,16,18,20,23,24,25]. However, determining the scaling factor is challenging. In addition to that, using a constant scaling factor may not be effective for all images. Some researchers have offered scaling factor optimization strategies to overcome these problems. Schemes proposed in [15,17,21,22,26,27,28] use NIO algorithms such as MACO, GA, Firefly, ABC, GDPSO and ACO, respectively, for scaling factor optimization. Scaling factor is optimized using QIM in [19] and the fuzzy logic system in [12]. However, the schemes in [22,26] use optimized scaling factor but are less robust. Adaptive embedding techniques to ensure high imperceptibility and robustness are also suggested [16,29]. Watermark security is very important for watermark applications such as IoMT, Telemedicine, IoT, Big Data, cloud computing, and blockchain technology. However, watermark security is either overlooked or less focused on in most of the DIW schemes. However, the schemes presented in [12,15,17,21,22,26] optimize watermarking characteristics but ignore watermark security. For watermark security, schemes in [16,27,28,29,30,31,32] use entropy, histogram, pseudo random key, DDFA, d-sequence, and GBA, respectively, for adaptively locating embedding blocks, but provide lower security. Similarly, schemes proposed in [11,14,18,20,30,31] have high imperceptibility but are less secure. However, the techniques presented in [24,28,33] achieve great imperceptibility, robustness, and security at the expense of a large computational cost. Another way of ensuring watermark security is to use cryptographic techniques. An Arnold map is used for watermark security in [19,28], although the Arnold map has a low iteration value. A chaotic map is used in schemes [13,23,34], but a chaotic map has an issue with the hyper tuning parameter.
Motivation and contribution of the proposed scheme: A study of related watermarking schemes reveals that most of the DIW schemes underestimate watermark security, whereas some have used cryptographic techniques like chaotic and Arnold map, which suffer from the iteration parameter and hyper tuning issues, respectively. In addition to that, the embedding positions in cover image are predetermined in most of the existing schemes, which further dilutes the confidentiality of watermark. In addition, most of the watermarking schemes use a constant scaling factor for embedding. Few schemes suggest optimization of the scaling factor using NIO algorithms to achieve high watermarking characteristics. Choosing a constant initial scaling factor for all image modalities may degrade watermarking characteristics. To address these challenges, a novel DIW scheme is proposed in this paper. The proposed scheme is motivated by Ansari and Pant [18], Moeinaddini [31], Singh and Bhatnagar [32], Sharma and Mir [27], and Zainol et al. [23]. A contribution of the proposed scheme is as follows:
  • High Watermark Security: The proposed scheme ensures twofold watermark security by encrypting the watermark and then embedding it in randomly selected positions in transformed cover image blocks. The watermark is partitioned into odd and even position pixel vectors. These vectors are encrypted by using pseudo random keys generated adaptively from the mean of IWT transformed sub-bands (LL, LH, HL, HH) of the cover image and the sum of the watermark image and key generation algorithm. The encrypted watermark is embedded in randomly selected pixel positions within the adaptively selected block using a Blum–Blum–Shum pseudo random generator.
  • High Imperceptibility: In the proposed scheme, an Initial scaling factor (ISF) is adaptively generated from the cover image using a fuzzy based texture range filter to ensure higher imperceptibility. In addition, adaptive selection of low entropy blocks for embedding, increasing the imperceptibility.
  • High Robustness: A hybrid IWT–SVD transformation is used in the proposed scheme to ensure high robustness. Adaptive ISF generation and block selection for embedding also improve the robustness
  • Scaling Factor Optimization: To improve imperceptibility, robustness and balancing the trade-off in watermarking characteristics, optimization of ISF is proposed, if the computational cost is not the major concern in the application. NIO algorithms such as GA, ABC, and FO can be used for optimization.

3. Proposed Work

The proposed scheme is comprised of the following three main modules: (i) Watermark Embedding and Extraction; (ii)Watermark Encryption and Decryption; and (iii) ISF generation and optimization. Each module is accordingly described in the next subsections.

3.1. Watermark Embedding and Extraction

In the proposed scheme, IWT-SVD hybrid transform is applied on the cover image (C) of size M × N . A binary watermark (W) of size P × Q is encrypted and embedded randomly in the low entropy non-overlapping blocks of the cover image to achieve higher imperceptibility, robustness, and security. A block diagram of the proposed watermark embedding is shown in Figure 1. The steps for watermark embedding are provided in Algorithm 1 and explained as follows:
Watermark Embedding: Firstly, 1-IWT transform is applied on C to obtain LL, LH, HL and HH sub-bands. IWT is applied to achieve higher imperceptibility as well as higher robustness against compression algorithms and filtering. The LL sub-band contains approximate sub-images, whereas LH, HL and HH sub-bands have fringe information of the image. Therefore, LH and HL sub-bands are selected for watermark embedding. The selected LH and HL sub-bands are divided into 4 × 4 blocks, and block-wise entropy is calculated and stored in a vector V . Image entropy is the randomness measure, and it is used to characterize the texture of the image. The relation used for calculating the image entropy is as follows:
E n t r o p y = i = 1 256 P B i l o g 2 P B i
where PB is the normalized histogram count of an image.
Furthermore, LH and HL sub-bands are decomposed by applying SVD to U L H , S L H , V L H , and U H L , S H L , V H L sub-matrices, respectively [35]. SVD is applied to achieve robustness against filtering attack, addition of noise, histogram equalization, and geometric attacks. S L H and S H L are divided into 4 × 4 blocks. Watermark bits are embedded in selected blocks of S L H and S H L . Block selection is done according to vector V i.e., the 4 × 4 blocks in S L H and S H L having corresponding lower entropy in 4 × 4 blocks of LH and HL, respectively, are selected for embedding and called B L H and B H L . A low entropy block is selected for embedding to ensure higher imperceptibility. Watermark is partitioned into even and odd pixel vectors followed by encryption to obtain encrypted watermark vectors as explained in Section 3.2. Encrypted odd and even watermark pixels are embedded in B L H and B H L , respectively. Thus, the number of B L H and B H L blocks is equal to P × Q / 2 . Embedding positions ( P 1 , P 2 ) are determined randomly in the selected low entropy block based on a random sequence generated by a Blum–Blum–Shub (BBS) Pseudo random generator. BBS is deterministic in nature and has a one-way function; hence, it is difficult to break. BBS generates a Pseudo random number series by using initial seed value. For selection of seed value, the following conditions must be satisfied:
  • Select two prime numbers ‘a’ and ‘b’ and both are congruent to a(mod b).
  • Calculate the product of ‘a’ and ‘b’, say m. i.e., m = a × b .
  • Find integer as a co-prime for m, which is taken as the seed value ( Z n ).
The formula for generating BBS Pseudo random series as shown in Equation (2):
Z n = Z n 1 2 m o d m
where Z n is the nth term of BBS series and n is any positive integer. Z 1 is seed value and m = a × b .
The initial values required for BBS series generation are seed value (s) and m. The generation of BBS Pseudo random series is demonstrated in the following example:
Example of BBS approach:
  Let us consider that a = 11 and b = 19 are two large prime numbers.
m = 11 × 19 = 209 .
Selecting seed(s) as satisfying the condition as GCD of the s with the m is 1, i.e., GCD (3, 209) = 1
BBS series is 9, 81, 82, 36, 42, 92, 104, 157, 196, 169, 137, 168, …, nth term  
Determining the embedding position in selected blocks is shown in Figure 2. After determining the embedding position, the encrypted watermark vectors ( V o d d 1 and V e v e n 1 ) are embedded using adaptively generated ISF ( α ). Encrypted watermark vectors are generated by using the proposed encryption scheme, as explained in Section 3.2. α is generated by using the texture range filter elaborated in Section 3.3. Finally, SVD and IWT inverse transforms are applied to get a watermarked image.
Algorithm 1 Watermark embedding.
Require: 
Cover image (C), Watermark (W), m, s
Ensure: 
Watermarked image ( C 1 )
1:
Apply 1-IWT to C, to obtain LL, LH, HL and HH. Select LH and HL for embedding.
2:
Divide L H and H L into 4 × 4 non-overlapping blocks.
3:
Find entropy for 4 × 4 non-overlapping blocks and store it in vector V .
4:
Apply SVD transform on LH and HL, to obtain U L H , S L H , V L H , U H L , S H L , V H L . Select S L H and S H L for embedding.
5:
Select a block having a low entropy value ( B L H a n d B H L ) for embedding.
6:
Encrypt the watermark image using the proposed encryption scheme
7:
Determine random embedding position P 1 ( r o w ) and P 2 ( c o l ) , using a BBS generator in selected block for embedding.
8:
Generate α using the proposed intial scaling factor generation scheme
9:
For real time applications, skip Step 10 and move on to Step 11.
10:
Optimize α using GA or ABC or FO algorithm using a following fitness function:
F i t n e s s f u n c t i o n = ( P S N R × S S I M ) α + ( N C × B E R ) α
11:
Embed V o d d 1 in B L H and V e v e n 1 in B H L using the following relation:
B L H 1 ( P 1 , P 2 ) = B L H ( P 1 , P 2 ) + α V o d d 1
B H L 1 ( P 1 , P 2 ) = B H L ( P 1 , P 2 ) + α V e v e n 1
12:
Apply inverse SVD and IWT to get the watermarked image ( C 1 ).
Watermark Extraction: Watermark extraction is the reverse process of watermark embedding. In the proposed scheme, the watermark is extracted from the watermarked image using secret keys ( α , Random key, s and m) generated during the embedding process. The original cover image is not required for watermark extraction—therefore, the proposed scheme blind. The block diagram for the proposed watermark extraction is shown in Figure 3, and the algorithmic steps are provided in Algorithm 2. To extract the watermark, firstly, 1-IWT is applied on the received watermarked image to obtain L L 1 , L H 1 , H L 1 and H H 1 sub-bands. SVD transform is applied to L H 1 , H L 1 sub bands to obtain three matrices each: U L H 1 , S L H 1 , V L H 1 , and U H L 1 , S H L 1 , V H L 1 . Furthermore, S L H 1 , S H L 1 is divided into 4 × 4 non-overlapping blocks and low entropy blocks B L H 1 , B H L 1 are selected for watermark extraction. The BBS Pseudo random series is generated, using the side information s, m (secret keys). Using BBS series, random positions ( P 1 , P 2 ) within B L H 1 , B H L 1 blocks are determined for watermark extraction. Encrypted watermark vectors, V o d d 11 and V e v e n 11 , are extracted from B L H 1 and B H L 1 , respectively, as shown in step 6 of Algorithm 2. The pseudo random key ( P R k e y ) is generated using random key ( R k e y ) received as side information from the trusted third party. P R k e y is used to re-shuffle V o d d 11 and V e v e n 11 watermark vectors to obtain the decrypted odd and even watermark vectors ( E V e v e n a n d E V o d d ). Both odd and even watermark vectors are merged to get the extracted watermark ( E W ).
Algorithm 2 Watermark extraction.
Require: 
Watermarked image ( C 1 ), m, s, Random key ( R k e y ), α
Ensure: 
Extracted Watermark ( E W )
1:
Apply 1-IWT to C 1 , to obtain L L 1 , L H 1 , H L 1 and H H 1 sub-bands
2:
Apply SVD to L H 1 and H L 1 sub-bands to obtain U L H 1 , S L H 1 , V L H 1 , U H L 1 , S H L 1 , V H L 1
3:
Divide S L H 1 and S H L 1 into 4 × 4 non-overlapping blocks.
4:
Select low entropy blocks ( B L H 1 , B H L 1 ) .
5:
Determine watermark extraction positions ( P 1 a n d P 2 ) using BBS Pseudo random series generated by using m a n d s .
6:
Extract watermark vector from S L H 1 and S H L 1 using the steps below:
V o d d 11 ( B L H 1 ( P 1 , P 2 ) B L H ( P 1 , P 2 ) ) / α
V e v e n 11 ( B H L 1 ( P 1 , P 2 ) B H L ( P 1 , P 2 ) ) / α
7:
Generate a pseudo random key ( P R k e y ) using R k e y .
8:
Re-shuffle the extracted watermark vectors i.e., odd ( V o d d 11 ) and even ( V e v e n 11 ) vectors using P R k e y .
E V o d d P R k e y · V o d d 11
E V e v e n P R k e y · V e v e n 11
9:
Combine E V o d d and E V e v e n to get the extracted watermark.
E W E V o d d + E V e v e n

3.2. Watermark Encryption and Decryption

In the proposed scheme, a symmetric cryptographic approach is used for watermark encryption. To encrypt the binary watermark, its pixels are partitioned into even ( V e v e n ) and odd ( V o d d ) position pixel vectors which is further shuffled according to a pseudo random key ( P R K e y ). Steps for watermark encryption are provided in Algorithm 3. Watermark partitioning and shuffling are explained below in detail.
Algorithm 3 Watermark encryption.
Require: 
Watermark (W) of size P × Q
Ensure: 
Encrypted watermark vectors V o d d 1 a n d V e v e n 1 of size P × Q / 2 , R k e y , P R K e y ( P × Q /2)
1:
Partition W into even ( V e v e n ) and odd ( V o d d ) position pixel vectors.
2:
Generate 8-bit binary intermediate key ( I K B ) .
3:
Generate 128 bit R k e y by hashing ( I K B ) using MD-5.
4:
Generate P R K e y (( P × Q )/2) from R k e y using Algorithm 4.
5:
Shuffle V o d d a n d V e v e n using P R K e y to get the encrypted vectors V o d d 1 a n d V e v e n 1 .
Watermark Partition: A watermark image is partitioned into even and odd position pixel vectors ( V e v e n and V o d d ) by scanning from top to bottom and left to right order in a raster scan line fashion. All even and odd position pixel values are appended to V e v e n and V o d d , respectively, using Equation (3) and (4):
V o d d ( x ) = W ( r o w , c o l ) , i f m o d ( c o l , 2 ) 0 O t h e r w i s e , i g n o r e d ,
V e v e n ( y ) = W ( r o w , c o l ) , i f m o d ( c o l , 2 ) = 0 O t h e r w i s e , i g n o r e d ,
where W (row, col) is the original watermark image. V o d d ( x ) and V e v e n ( y ) are odd and even position pixels of the watermark image, respectively. Further illustrations of watermark partitioning are provided in Figure 4.
Watermark Shuffling: Vectors V e v e n and V o d d are shuffled by using a pseudo random key ( P R k e y ) which is generated from a 128 bit R k e y . To ensure that R K e y cannot be cracked, a unique binary intermediate key ( I K B ) is used as an initial parameter. I K B is generated by using the following relations:
S = c e i l ( s u m ( μ L L , μ L H , μ H L , μ H H , W ) )
I K = S , i f S 255 S % 255 , i f S > 255
I K B = B i n a r y ( I K )
where µLL, µLH, µHL and µHH are mean of the IWT sub-bands LL, LH, HL and HH, respectively. W is sum of binary watermark image bits.
Numerical explanation for I K B generation:  
Let us consider, µLL = 124.0369, µLH = −0.0337, µHL = 0.11666 and µHH = 0.0144 and W = 2312 S = ceil(124.0369 + −0.0337 + 0.1166 + 0.0144 + 2312 ) = 2437
IK = 2437 % 255 = 142
I K B = Binary equivalent of I K = Binary(142) = 10,001,110 (8bits)  
R k e y acts as the secret key for the watermark encryption and decryption process. It can be shared between the sender and receiver as a secret key. The R k e y is generated by hashing the unique intermediate key ( I K B ) . Hash functions are highly secured approaches for the generation of authentication codes for images. Researchers have used different hash functions like MD-5, SHA-1, SHA-256, and SHA-512 for generating secured authentication code. Owing to its low computational cost and high security, MD-5 is used in the proposed scheme. I K B is input to MD-5 for generating 128 bits R k e y as shown in Equation (6):
R a n d o m K e y ( R k e y ) = M D 5 ( I K B ) .
P R k e y of size (( P × Q )/2) is generated from R k e y using Sine and Logistic algorithm as explained in Algorithm 4. The process of Pseudo random key generation is illustrated with an example in Figure 5. For the generation of a cipher watermark, the vectors of odd ( V o d d ) and even ( V e v e n ) watermark pixels position are shuffled with respect to P R k e y . Watermark shuffling at the sender end is illustrated in Figure 6.
Algorithm 4 Pseudo random key generation from Random key.
Require: 
Random key (128 bits)
Ensure: 
Pseudo Random key ( ( P × Q )/2 )
1:
Initial conditions a 0 , b 0 , S 1 and S 2 are generated as follows:
a 0 = K = 1 20 R a n d o m k e y ( K ) 2 K
b 0 = ( K = 21 50 R a n d o m k e y ( K ) 2 K 52 ) m o d 1
S 1 = ( K = 1 8 R a n d o m k e y ( K ) × 2 K + K = 25 76 R a n d o m k e y ( K ) 2 K 24 + b 0 ) m o d 10 + 10
S 2 = ( K = 121 128 R a n d o m k e y ( 129 K ) × 2 K + K = 77 128 R a n d o m k e y ( K ) 2 K 76 × S 1 ) m o d 10 + 10
a 0 = ( a 0 + S 2 ) m o d 1
2:
The initial values a 0 , S 1 a n d b 0 , S 2 are used for the logistic and sine map, respectively. The maps are iterated P × Q times, whereby the random sequences are stored as matrices LF and SF of size P × Q as
L F = m o d ( ( p o w e r ( S 1 , 2 ) × a 0 × ( 1 S 1 a 0 ) + S 1 a 0 ) , 1 )
S F = m o d ( ( S 2 s i n ( 180 S 2 b 0 ) + S 2 b 0 , 1 )
3:
Based on these intermediary matrices, a final Pseudo random key P R K e y is then calculated as
P R k e y = k = 1 P l = 1 Q ( ( ( L F ( k , l ) + S F ( k , l ) ) ) m o d 10 )
where LF(k, l) and SF(k, l) are the elements of the LF and SF matrices, respectively, while k and l denote the row and column of LF. The resulting matrix P R k e y is Pseudo random key in the range of [ 1 , ( P × Q ) 2 ] , where P × Q is the size of the watermark image.
Watermark Decryption: For watermark decryption, the Sine and Logistic algorithm is applied on the 128 bit R K e y (received secretly from the sender) to generate P R K e y at the receiver end. The extracted watermark vectors V e v e n 11 and V o d d 11 are re-shuffled according to P R K e y to obtain E V e v e n and E V o d d . The values of E V e v e n and E V o d d are populated to the corresponding even and odd pixel positions in raster fashion to obtain the extracted watermark (decrypted). Watermark decryption at the receiver end is shown in Figure 7.
Security analysis: The proposed scheme ensures an efficient watermark encryption in two ways. Firstly, the watermark is partitioned into two vectors followed by the shuffling of vectors corresponding to the P R K e y . P R K e y is generated from the 128 bit R K e y , which is unique to each cover and watermark image. R K e y , Sine and Logistic algorithm together can only generate P R K e y for watermark encryption and decryption. Even though the random key is small (128 bits), if the attacker owns the random key without knowing the algorithm, it is not possible to decrypt the watermark. Due to the initial condition sensitivity of I K B , any changes to the intermediate key will lead to an entirely new R K e y . Hence, this provides two-fold security to the secret key.

3.3. Initial Scaling Factor Generation and Optimization

The visual quality and robustness of watermarking scheme largely depends on embedding strength parameter ( α ) . Until now, the majority of DIW schemes choose random ISF ( α ) for watermark embedding and the extraction process. Choosing the same random ISF for all image modalities may degrade visual quality. To ensure higher visual quality, the proposed scheme generates ISF adaptively from the cover image using image range texture characteristics. The algorithmic steps for adaptive ISF generation is presented in Algorithm 5. The fuzzy based image texture range filter characteristic is used for generation of ISF adaptively from the cover image. The image range filter defines a neighborhood around the pixel of interest and calculates the statistics for that neighborhood. If the intensities in the image range has more variability, this indicates that there is a distinguished foreground and background in the image. Adaptive generation of ISF is computationally inexpensive. In the proposed scheme, less variability regions are selected for embedding to achieve higher visual quality. For ISF generation, a 3 × 3 neighborhood filter function is used. The relation used for generation of range values is in Equation (7):
R a n g e = M a x v a l M i n v a l
where Maxval is the maximum intensity and Minival is the minimum intensity values of the selected 3 × 3 filter. The proposed scheme generates Maxval and Minval from the selected 3 × 3 filter using morphological operations called dilation and erosion, respectively. The dilation operator results in a maximum value and the erosion operator results in a minimum value in a selected filter based on their mask filter. Generation of range filter intensities of the 3 × 3 filter is illustrated with the help of an example in Figure 8 using dilation and erosion operators. Algorithmic steps for adaptive generation of ISF from the cover image are shown in Algorithm 5. Furthermore, the process of ISF generation is exhibited with an example in Figure 9.
Algorithm 5 Initial Scaling Factor ( α ) generation.
Require: 
Cover image (C)
Ensure: 
ISF ( α )
1:
Find range filter (R) values for C using 3 × 3 filter
2:
Partition R into 4 × 4 non-overlpping blocks.
3:
Find minimum value in each block and save it in MINVAL.
4:
Average of MINVAL is ( α ) for C.
If computational cost is not the major concern, then ISF can be further optimized for achieving higher watermarking characteristics. Nature Inspired Optimization (NIO) algorithms such as Genetic algorithm (GA), Artificial Bee Colony (ABC), or Firefly optimization (FO) are proposed for optimizing ISF. Optimization algorithms are used to find solutions that maximize or minimize some study parameter. NIO algorithms are stochastic metaheuristic based evolutionary algorithms developed by the inspiration of nature suitable for larger search space. Researchers have proposed a number of NIO optimization algorithms based on swarm intelligence (ABC, PSO, ACO, Firefly, etc.) and based on genetic behavior (GA, etc.). Among all these, GA, ABC and FO have good exploration and exploitation capabilities to reach the global optimum at lower time intervals. In the proposed scheme, GA, ABC and FO metaheuristic based evolutionary algorithms are adapted for ISF optimization. The fitness function used for obtaining optimized ISF ( α ) is shown in Equation (8):
F i t n e s s f u n c t i o n = ( P S N R × S S I M ) α + ( N C × B E R ) α

4. Experimental Results and Discussion

This section presents experimental results to demonstrate the performance of the proposed scheme in terms of various watermarking characteristics like imperceptibility, robustness, security, embedding rate and computational time using MATLAB 2014b with an Intel i5 processor, 2.00 GHz, 4 GB RAM. Test cover images have been taken from USC-SIPI [36] and the UCID [37] dataset as shown in Figure 10. For convenience of the representation, 12 images have been taken for visualization. The size of cover image (gray-scale and color) is 512 × 512 and watermark (binary) is 64 × 64 .

4.1. Imperceptibility Test

Imperceptibility is an important characteristic for all DIW applications. For a good watermarking scheme, the photographic quality of the cover and watermarked images should be almost the same. To evaluate the imperceptibility of the proposed scheme, subjective (qualitative) and objective (quantitative) analysis is carried out. Test cover images and corresponding watermarked images are shown in Figure 10 and Figure 11, respectively. Subjective analysis of the cover image and its corresponding watermarked images exhibit no significant change to HVS (Human Visual System). This observation can be affirmed from images in Figure 10 and Figure 11.
Furthermore, objective analysis for the imperceptibility performance is analyzed using Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM). MSE is a statistic measure to estimate the imperceptibility of watermarking scheme from the square of Euclidian distance. It estimates the error between the original and watermarked image. The mathematical relation for MSE shown in Equation (9):
M S E = 1 M × N r = 1 M c = 1 N C ( r , c ) C 1 ( c , r ) 2
where C is Cover image, and C 1 is a watermarked image. PSNR is a good measure of pixel difference between two images. It is calculated using relations in Equation (10):
P S N R = 10 l o g 10 255 2 M S E
SSIM is a measure of three image features as luminance (ll), brightness (bb), structure (ss), and it is in accordance with the HVS. The mathematical relation for SSIM is shown in Equation (11):
S S I M = l l ( C , C 1 ) . b b ( C , C 1 ) . s s ( C , C 1 )
l l ( C , C 1 ) = 2 C m e a n C 1 m e a n C 2 m e a n + C 1 2 m e a n
b b ( C , C 1 ) = 2 C v a r C 1 v a r C 2 v a r + C 1 2 v a r
s s ( C , C 1 ) = C C 1 c v a r C v a r + C 1 v a r
where C m e a n , C 1 m e a n as a mean of C , C 1 , respectively; C 2 v a r , C 1 2 v a r as variance of C , C 1 and C C 1 c v a r as co-variance of C   a n d   C 1 .
Experiments are performed on different cover images with adaptively generated ISF ( α ). PSNR, SSIM, MSE and ISF values for the images shown in Figure 10 are tabulated in Table 1. It can be observed from Table 1 that, for all grayscale images, PSNR is above 51 dB and the average is 52.16 dB. For color images, PSNR is above 56 dB and the average is 57.89 dB. For both grayscale and color images, PSNR is greater than the threshold value of 37 dB and the average error rate is minimal as the MSE value is low. SSIM for grayscale images are above 0.9600 and the average is 0.9754, whereas SSIM for color images is above 0.9991, and the average is 0.9988. For all test cover images, SSIM is approaching the ideal value of 1. The proposed scheme shows higher performance for “Tulips” image having PSNR = 60.85 dB with SSIM = 1. Further imperceptibility performance of the proposed scheme is evaluated for 50 images of different modalities taken from the USC- SIPI dataset [36], and the imperceptibility performance (PSNR, SSIM, MSE) is provided in Table 2. From the table, it can be observed that, for 50 images, PSNR varies between 51.42 dB (for the image Sail boat) to 58.47 dB (for the image Pixel ruler) and an average of 51.55 dB. MSE varies between 0.5907 (for the image Stream and Bridge) to 0.0899 (for the image Jelly bean) and an average of 0.3813. SSIM varies between 0.6337 (for the image Resolution chart) to 0.9999 (for the image Grass) and an average of 0.9767. It is observed that, for the image “Pixel Ruler”, the proposed scheme shows higher PSNR (58.47 dB) and low MSE (0.0924). Subjective and objective analysis of imperceptibility shows that the proposed scheme has high imperceptibility for various image modalities. It improves further by using optimized ISF.
The imperceptibility performance of the proposed scheme using optimized ISF is also analyzed using GA, ABC and FO algorithms and presented in Table 3. Comparing the result in Table 1 and Table 3, it can be observed that PSNR and SSIM for grayscale and color images increased after optimization. Using GA, the average value of PSNR for grayscale images increased from 52.16 dB to 52.95 dB and, for color, it is improved from 57.89 dB to 58.42 dB. In addition, SSIM increased from 0.9654 to 0.9989 and 0.9988 to 0.9989, for grayscale and color images, respectively. Improved performance is also observed by using ABC and FO, but GA exceeds in improving the imperceptibility performance. From the above discussion, it can be inferred that the proposed scheme has high imperceptibility for grayscale as well as color images of different modalities. Further imperceptibility improves by using optimized scaling factor.

4.2. Robustness

Robustness performance for the proposed watermarking scheme is evaluated under zero and various common attacks by using Normalized Correlation (NC) and Bit Error Rate (BER) as performance metrics. NC is a good measure for robustness that gives normalized correlation between original and extracted images in terms of direction and strength relationship. BER measures pixel level difference between original and extracted images. The relation for NC and BER is provided in Equations (12) and (13), respectively:
N C = r = 1 P c = 1 Q W ( r , c ) W 1 ( r , c ) 2 r = 1 P c = 1 Q W ( r , c ) 2 × r = 1 P c = 1 Q W 1 ( r , c ) 2
where W ( r , c ) t and W 1 ( r , c ) are original and extracted watermarks:
B E R = E B T B
E B = c o u n t e r + 1 i f r = 1 P c = 1 Q W ( r , c ) W 1 ( r , c ) 0 o t h e r w i s e
T B = P × Q
where E B represents the number of incorrectly decoded bits in extracted watermark, and T B represents total number of bits and initial value of counter = 0.

4.2.1. Adaptive ISF

Robustness of the proposed scheme using adaptive ISF for the test cover images Figure 10 under zero attacks is presented in Table 1, and the corresponding extracted watermark is shown in Figure 11. For all grayscale images, NC and BER are equal to ideal values 1 and 0, respectively, as observed from Table 1. Whereas, for all color images, average NC is 0.9940, and the average BER is 0.0115. Furthermore, it is observed from Table 2 that NC and BER, for 50 images of different modalities, under zero attacks are also equal to an ideal value. These observations implicate that the watermark is successfully extracted under zero attack. Further robustness performance of the proposed scheme is examined for different cover images (Lena, Baboon, MRI Chest, Tulips) and watermark (Cameraman, Pirate, Circle, Trishool) images under common image processing attacks. Attacked watermarked image and corresponding extracted watermark with NC and BER are presented in Figure 12 and Figure 13, where it can be observed that the proposed scheme successfully extracts the watermark under filtering, geometrical and compression attacks from all cover images. For noise attacks, the proposed scheme extracts watermarks with little distortion. The above sampled consequences indicate that the proposed scheme is robust against the majority of attacks.

4.2.2. Optimized ISF

ISF optimization using GA, ABC and FO is suggested for improved performance of the proposed scheme. The robustness performance of the proposed scheme using optimized ISF is also evaluated. NC and BER under zero attacks for different test cover images are shown in Table 4. NC and BER values are equal to ideal values for all grayscale images under zero attacks as can be studied from Table 4. For color images, from Table 4, it can be observed that the average NC value has increased from 0.9940 (with adaptive ISF) to 0.9998 (with optimized ISF) and BER decreased from 0.0115 to 0 using GA. By using ABC, NC increased from 0.9940 to 0.9995 and BER reduced from 0.0115 to 0. With FO, NC improved from 0.9940 to 0.9991 and BER reduced from 0.0115 to ideal value 0. After optimization of ISF, for the images “Penguins” and “Tulips”, NC increased from 0.9992, 0.0919 to 1. For the images “Koala”, “Flash” and “Skin”, BER reduced from 0.0022, 0.229, 0.0014 to ideal value 0. From this discussion, it can be observed that, for color images, robustness increased significantly after optimization. Further robustness of the proposed scheme is evaluated for “Lena” image under different attacks using adaptive and optimized ISF and compared in Table 5. From Table 5, it can be seen that NC values for the majority of attacks are higher for ISF optimized by using GA, hence making the watermark more robust against common attacks. Thus, optimization can be used to improve the robustness of the proposed scheme. In addition, ISF optimization using GA is more pertinent for the proposed scheme.

4.3. Security Test

Watermark security is one of the important requirements of DIW schemes. Encrypted and decrypted watermark images obtained by using the proposed scheme are shown in Figure 14. Subjective analysis from Figure 14 indicates that encrypted images are very different from the original image, whereas the decrypted images are similar to the original image.
To study the effectiveness of the proposed encryption and decryption scheme, Correlation Coefficient (CC) is used. CC is a commonly used statistical measure for assessing the degree of linear relation between two images. The mathematical relation for CC is shown in Equation (14):
C C = r = 1 P c = 1 Q ( W r , c μ ( W ) ) ( W r , c 1 μ ( W 1 ) ) r = 1 P c = 1 Q ( W r , c μ ( W ) ) × r = 1 P c = 1 Q ( W r , c 1 μ ( W 1 ) )
where W, W 1 are the two images. μ ( W ) and μ ( W 1 ) are the mean values of W, W 1 images. Two identical images have CC = 1, whereas two completely uncorrelated images have CC = 0. If the two images are completely anti-correlated, then CC = −1. The security of the proposed scheme is studied using CC in terms of Horizontal (row), Vertical (column), and Diagonal (Cross) directions. CC is examined for binary watermark images shown in Figure 14, and performance is tabulated in Table 6. CC between original-encrypted images and CC between original-decrypted images can be studied in Table 6. CC between original-encrypted images in horizontal, vertical and diagonal directions for all test images are close to zero, indicating that encrypted images are uncorrelated to the original image. From Table 6, it can be observed that CC of original-decrypted images in horizontal, vertical and diagonal are equal to 1, indicating that original and decrypted images are highly correlated and are completely the same. From this, it can be claimed that the proposed scheme generates a strong cipher image and successfully decrypts the original image.
Furthermore, sensitivity of the random key has been evaluated by changing its bits. Even one bit of difference in the pseudo random key leads to unsuccessful decryption of the extracted watermark. To evaluate the random key sensitivity, CC is calculated between two encrypted images by changing one bit in random key and tabulated in Table 7. For all cases, CC in horizontal, vertical and diagonal directions is negative as in Table 7. It shows that, with one bit of change, random key forms are completely different than cipher images. From this discussion, it is evident that the random key is highly secured.

4.4. Computational Time

The time required for watermark embedding and extractions process in the DIW scheme is termed as computational time. The computational time of the major algorithmic steps of the proposed scheme is provided in Table 8. Considering only major algorithmic steps and the most expensive operations, the proposed adaptive watermarking scheme has cubic time complexity as shown below:
C o m p u t a t i o n a l t i m e = O ( 2 M N ) + O ( 2 M N ) + O ( 2 M N 2 + 2 N 3 ) + O ( 2 M 2 N ) + O ( M N ) + O ( M N ) + O ( l o g ( l o g m ) ) = O ( N 3 )
Table 9 shows the computational time (in seconds) for the proposed scheme. From Table 9, it can be studied that the average embedding time for grayscale and color images is 1.527 s and 1.382 s, respectively, whereas the average extraction times for grayscale and color images are 0.995 s and 0.870 s, respectively. For all images, extraction time is less than the embedding time since pseudo random key generation is not done during extraction. There is no significant difference between embedding and extraction time for grayscale and color images. Computational time of the proposed scheme is optimum as the watermark is embedded and extracted in less than 2 s and 1 s, respectively.

4.5. Comparative Study

The performance of the proposed scheme is further validated by comparing it with recent state-of- the-art DIW schemes [18,23,27,28,31,32] in terms of imperceptibility, robustness, embedding rate, security, and fitness function. Performance comparison has been done with a non-blind scheme proposed by Ansari and Pant [18] and blind schemes proposed by Moeinaddini [31], Singh and Bhatnagar [32], Sharma and Mir [27], and Zainol et al. [23]. The scheme proposed in [18] uses PC for embedding watermark bits in the DWT-SVD domain. Arnold map is used for security, and scaling factor is optimized with ABC. This scheme suffers from low imperceptibility, robustness, and security. The Hadmaard transform based scheme is proposed in [31]. This scheme uses DDFA for scaling factor optimization. Watermark is embedded by adjusting Hadmaard coefficients, and it overlooked watermark security. The scheme proposed in [32] uses an LWT based adaptive embedding approach using a d-sequence. Arnold map is used for watermark security. This scheme has a lower embedding rate than other schemes [18,23,27]. A DCT based adaptive embedding scheme is proposed in [27], and it generates embedding blocks using an LGBA machine learning approach. This scheme also ignored watermark security. The scheme proposed in [23] uses IWT-SVD transform, and it shows lower NC values for rotation, JPEG compression, Gaussian filter, and Median filtering attacks. This scheme has high imperceptibility, security, and embedding rate at the cost of robustness. Table 10 shows a comparative study of watermarking parameters for the proposed scheme and schemes in comparison.
Imperceptibility Comparison: Imperceptibility performance of the proposed scheme is compared with schemes proposed in [18,23,27,31,32] using PSNR. For comparative study, two popular test images “Lena” and “Baboon” are considered. Figure 15 shows PSNR values of the proposed scheme and schemes in [18,23,27,31,32] for “Lena” and “Baboon”. The PSNR values in Figure 15 indicate that the proposed scheme has higher imperceptibility than schemes in [18,23,27,31,32] with a higher/equal embedding rate. From this, it can be claimed that the proposed scheme has higher imperceptibility than schemes in comparison.
Robustness Comparison: Robustness performance of the proposed scheme is compared with schemes in [18,23,27,31,32] using NC, under zero attacks as shown in Figure 16. The NC values of the proposed scheme are ideal/higher than other schemes [18,23,27,31,32] in comparison for “Lena” and “Baboon” images as can be seen in Figure 16. Further robustness performance is compared under image processing attacks and shown in Figure 17. The proposed scheme is more robust for rotation, sharpening, Gaussian filter, and median filter attacks against other schemes [18,23,27,31,32] in comparison. [18,23,27,31,32]. For JPEG compression, the proposed scheme is more robust than schemes in [18,23,31,32] and shows almost similar performance to the scheme in [27]. For a salt and pepper attack, the proposed scheme performs better than the schemes in [18,27,32] but lags behind in comparison to the scheme in [31]. The majority of the attacks in the proposed scheme are more robust and show almost equal performance to schemes in [23,27]. From this, it can be claimed that the proposed scheme is more robust than the state-of-the-art [18,23,27,31,32] schemes.
Embedding rate: The embedding rate of the proposed adaptive embedding scheme is analyzed in this section. The number of watermark bits embedded in the cover image is termed as the embedding rate of the watermarking scheme. The embedding rate of the proposed scheme is calculated using Equation (16) as shown below:
E m b e d d i n g r a t e = T o t a l n u m b e r o f w a t e r m a r k b i t s T o t a l n u m b e r o f c o v e r i m a g e p i x e l s b p p
While calculating the embedding rate, the size of cover and the watermark are considered. The proposed scheme embedding rate is calculated using Equation (16) shown below:
T o t a l n u m b e r o f c o v e r i m a g e p i x e l s = 512 × 512 = 262144 p i x e l s
T o t a l n u m b e r o f w a t e r m a r k b i t s = 64 × 64 = 4096 b i t s
E m b e d d i n g r a t e = 4096 262144 = 0.015625 b p p
The proposed scheme has an embedding rate of 0.015625 bpp. The embedding rate of the proposed scheme is higher than the scheme proposed in [32] and equal to schemes proposed in [18,27,31]. The proposed scheme providing high imperceptibility, robustness and security than the scheme proposed in [23] but under-performance in terms of embedding rate. The scheme proposed in [23] has a higher embedding rate at the cost of lower imperceptibility, robustness and security. Even though the embedding rate of the proposed scheme is lower than [23], still, in comparison to the state-of-the-art schemes, the proposed scheme shows higher imperceptibility, robustness and security for different image modalities.
Security comparison: Schemes proposed in [27,31] have paid less attention to watermark security, whereas schemes in [18,32] use Arnold maps for watermark security, which can be easily cracked and thus provide low security. Generating a chaotic map scheme [23] ensures security but suffers from hyper tuning issues. Using two-level adaptive embedding and symmetric cryptographic approaches security is achieved in the proposed scheme. First, the watermark is partitioned into two parts and then encrypted using a pseudo random key. By the use of mathematical theory and the algorithm, the proposed scheme generates a Pseudo random key. It is difficult to predict the Pseudo random key generated by the proposed scheme by an attacker. Secondly, encrypted watermark is embedded at a random position selected by using BBS in low entropy blocks. This further makes the fort strong and non-invadable. When compared to other schemes in [18,23,32], the proposed scheme has a highly secured encryption approach. From the above discussion, it can be claimed that the proposed scheme provides higher watermark security than all other comparative schemes [18,23,27,31,32].
Fitness function: Designing a proper fitness function for NIO algorithms is very important. To demonstrate the effectiveness of the proposed fitness function, imperceptibility and robustness performance comparison are done with the scheme proposed in [28] where scaling factor ( α ) is optimized by using ABC [18]. Minimized fitness function derived from watermarking characteristics (PSNR, SSIM, NC, and BER) is used in [28] as shown in Equation (17):
f = ( P S N R × S S I M ) α + ( N C × B E R ) α 1
where scaling factor ( α ) is an initial random value, whereas, in the proposed scheme, maximized fitness function is used as shown in the following equation:
f = ( P S N R × S S I M ) α + ( N C × B E R ) α
where scaling factor ( α ) is the initial seed value generated adaptively from the image. Since ( α ) is image dependent, the maximized fitness function is used. The maximum fitness value is used to achieve high watermarking characteristics.
Imperceptibility performance of the proposed scheme is compared with the scheme in [28] by optimizing scaling factor ( α ) using ABC and GA in Table 11. Here, it can be observed that, for all images, the proposed scheme has higher PSNR and SSIM than the scheme in [28] for ABC and GA. For all color images, remarkable improvement can be observed by the proposed scheme over [28] with ABC as well as GA from Table 11. Hence, it can be claimed that the proposed scheme has higher imperceptibility as compared to [28]. Robustness of the proposed scheme and the scheme in [28] with optimized scaling factor using ABC and GA is also compared and presented in Table 12 in terms of NC and BER under zero attack. From Table 12, it can be studied that, for grayscale images, the performance of both schemes are at par for ABC and GA. However, for the color images, the proposed scheme has a higher NC value and lower BER value than [28], indicating that the proposed scheme has higher robustness for color images. From this discussion, it can be concluded that the proposed fitness function has improved scaling factor optimization compared to [28].

5. Conclusions

The proposed hybrid IWT-SVD DIW scheme is blind, secure and adaptive. Hence, it is suitable for robust transmission of digital images in public channels. Embedding the encrypted watermark in a randomly selected position of the cover image provides high watermark security, which makes the proposed scheme suitable for applications such as scientific documents and courtroom proof transmission, military applications, fingerprinting, telecoms, etc. Adaptive generation of ISF provides higher imperceptibility and robustness. Using NIO algorithms for ISF optimization further improves performance of watermarking characteristics. The proposed scheme is also free from FPE due to Pseudo random key and two-level adaptive embedding. The simulation results show that the proposed scheme provides higher watermarking characteristics and is able to sustain the majority of image processing attacks. Furthermore, comparative study with state-of-the-art schemes exhibits that the proposed scheme shows higher imperceptibility, robustness, security and embedding rate than state-of-the-art schemes. The fitness function proposed in the scheme is also more fitting. The proposed scheme can be used for copyright security, ownership verification, image authentication, telemedicine, military applications, transmission of scientific or courtroom documents, fingerprinting, image forensics, etc. Improving the embedding rate and robustness can be seen as future work. Hybrid optimization approaches for high exploitation and exploration for higher imperceptibility and robustness is also prospective research.

Author Contributions

Conceptualization and methodology, P.S., K.J.D., H.K.T. and J.S.; software, P.S. and K.J.D.; validation and formal analysis, J.S. and H.K.T.; investigation and resources, P.S. and K.J.D.; writing original draft preparation, P.S. and K.J.D.; writing review and editing, J.S. and H.K.T.; supervision, H.K.T. and J.S.; project administration, P.S. and K.J.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kumar, C.; Singh, A.K.; Kumar, P. A recent survey on image watermarking techniques and its application in e-governance. Multimed. Tools Appl. 2018, 77, 3597–3622. [Google Scholar] [CrossRef]
  2. Ray, A.; Roy, S. Recent trends in image watermarking techniques for copyright protection: A survey. Int. J. Multimed. Inf. Retr. 2020, 9, 249–270. [Google Scholar] [CrossRef]
  3. Singh, L.; Singh, A.K.; Singh, P.K. Secure data hiding techniques: A survey. Multimed. Tools Appl. 2020, 79, 15901–15921. [Google Scholar] [CrossRef]
  4. Agarwal, N.; Singh, A.K.; Singh, P.K. Survey of robust and imperceptible watermarking. Multimed. Tools Appl. 2019, 78, 8603–8633. [Google Scholar] [CrossRef]
  5. Maheshkar, S. Region-based hybrid medical image watermarking for secure telemedicine applications. Multimed. Tools Appl. 2017, 76, 3617–3647. [Google Scholar]
  6. Zhang, H.; Wang, C.; Zhou, X. A robust image watermarking scheme based on SVD in the spatial domain. Future Internet 2017, 9, 45. [Google Scholar] [CrossRef] [Green Version]
  7. Roy, S.; Pal, A.K. An indirect watermark hiding in discrete cosine transform–singular value decomposition domain for copyright protection. R. Soc. Open Sci. 2017, 4, 170326. [Google Scholar] [CrossRef] [Green Version]
  8. Rakhmawati, L.; Wirawan, W.; Suwadi, S. A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019, 2019, 61. [Google Scholar] [CrossRef] [Green Version]
  9. Ramasamy, R.; Arumugam, V. Robust image watermarking using fractional Krawtchouk transform with optimization. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 7121–7132. [Google Scholar] [CrossRef]
  10. Salavi, R.R.; Math, M.M.; Kulkarni, U. A survey of various cryptographic techniques: From traditional cryptography to fully homomorphic encryption. In Innovations in Computer Science and Engineering; Springer: Berlin/Heidelberg, Germany, 2019; pp. 295–305. [Google Scholar]
  11. Su, Q.; Chen, B. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018, 22, 91–106. [Google Scholar] [CrossRef]
  12. Dhar, J.P.; Islam, M.S.; Ullah, M.A. A fuzzy logic based contrast and edge sensitive digital image watermarking technique. SN Appl. Sci. 2019, 1, 1–9. [Google Scholar] [CrossRef] [Green Version]
  13. Arora, M.; Khurana, M. Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking. Opt. Quantum. Electron. 2020, 52, 1–30. [Google Scholar] [CrossRef]
  14. Gao, H.; Gao, T. Double verifiable image encryption based on chaos and reversible watermarking algorithm. Multimed. Tools Appl. 2019, 78, 7267–7288. [Google Scholar] [CrossRef]
  15. Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
  16. Luo, A.W.; Gong, L.H.; Zhou, N.R.; Zou, W.P. Adaptive and blind watermarking scheme based on optimal SVD blocks selection. Multimed. Tools Appl. 2020, 79, 243–261. [Google Scholar] [CrossRef]
  17. Zheng, Z.; Saxena, N.; Mishra, K.; Sangaiah, A.K. Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Gener. Comput. Syst. 2018, 88, 92–106. [Google Scholar] [CrossRef]
  18. Ansari, I.A.; Pant, M. Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recognit. Lett. 2017, 94, 228–236. [Google Scholar] [CrossRef]
  19. Hu, H.T.; Hsu, L.Y. Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimed. Tools Appl. 2017, 76, 6575–6594. [Google Scholar] [CrossRef]
  20. Agarwal, C.; Mishra, A.; Sharma, A. A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture. Egypt. Informatics J. 2015, 16, 83–102. [Google Scholar] [CrossRef]
  21. Sharma, S.; Sharma, H.; Sharma, J.B. An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization. Appl. Soft Comput. 2019, 84, 105696. [Google Scholar] [CrossRef]
  22. Makbol, N.M.; Khoo, B.E.; Rassem, T.H.; Loukhaoukha, K. A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf. Sci. 2017, 417, 381–400. [Google Scholar] [CrossRef]
  23. Zainol, Z.; Teh, J.S.; Alawida, M. A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 2020, 8, 43391–43406. [Google Scholar]
  24. Xiao, B.; Luo, J.; Bi, X.; Li, W.; Chen, B. Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf. Sci. 2020, 516, 545–559. [Google Scholar] [CrossRef]
  25. Kumar, C.A.; Naik, B.R. A new encrypted image watermarking based on DTCWT and random pixel exchange. In Proceedings of the 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, 15–16 March 2019; pp. 567–570. [Google Scholar]
  26. Vahedi, E.; Zoroofi, R.A.; Shiva, M. Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digit. Signal Process. 2012, 22, 153–162. [Google Scholar] [CrossRef]
  27. Sharma, V.; Mir, R.N. An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J. King Saud-Univ.-Comput. Inf. Sci. 2019. [Google Scholar] [CrossRef]
  28. Devi, K.J.; Singh, P. Secured Cross Layered Watermark Embedding For Digital Image Authentication Using IWT-SVD. In Proceedings of the 2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS), Rupnagar, India, 26–28 November 2020; pp. 269–273. [Google Scholar]
  29. Hua, G.; Xiang, Y.; Zhang, L.Y. Informed histogram-based watermarking. IEEE Signal Process. Lett. 2020, 27, 236–240. [Google Scholar] [CrossRef]
  30. Gao, X.; Deng, C.; Li, X.; Tao, D. Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 2010, 40, 278–286. [Google Scholar] [CrossRef]
  31. Moeinaddini, E. Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm. Soft Comput. 2019, 23, 9685–9699. [Google Scholar] [CrossRef]
  32. Singh, S.P.; Bhatnagar, G. A simplified watermarking algorithm based on lifting wavelet transform. Multimed. Tools Appl. 2019, 78, 20765–20786. [Google Scholar] [CrossRef]
  33. Ahmadi, M.; Norouzi, A.; Karimi, N.; Samavi, S.; Emami, A. ReDMark: Framework for residual diffusion watermarking based on deep networks. Expert Syst. Appl. 2020, 146, 113157. [Google Scholar] [CrossRef]
  34. Shah, T.; Jamal, S.S. An improved chaotic cryptosystem for image encryption and digital watermarking. Wirel. Pers. Commun. 2020, 110, 1429–1442. [Google Scholar]
  35. Liu, R.; Tan, T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 2002, 4, 121–128. [Google Scholar]
  36. The USC-SIPI Image Database. Available online: https:/sipi.usc.edu/database/ (accessed on 27 May 2021).
  37. Uncompressed Colour Image Database (UCID). Available online: https://qualinet.github.io/databases/image/uncompressed_color_image_database_ucid/ (accessed on 27 May 2021).
Figure 1. Block diagram for the Watermark Embedding process.
Figure 1. Block diagram for the Watermark Embedding process.
Entropy 23 01650 g001
Figure 2. Determining the embedding position randomly in low entropy blocks.
Figure 2. Determining the embedding position randomly in low entropy blocks.
Entropy 23 01650 g002
Figure 3. Block diagram for the watermark extraction process.
Figure 3. Block diagram for the watermark extraction process.
Entropy 23 01650 g003
Figure 4. Partitioning even and odd position pixels of watermark image into V e v e n and V o d d .
Figure 4. Partitioning even and odd position pixels of watermark image into V e v e n and V o d d .
Entropy 23 01650 g004
Figure 5. Pseudo random key generation.
Figure 5. Pseudo random key generation.
Entropy 23 01650 g005
Figure 6. Watermark shuffling at the sender’s end.
Figure 6. Watermark shuffling at the sender’s end.
Entropy 23 01650 g006
Figure 7. Watermark decryption at the receiver end.
Figure 7. Watermark decryption at the receiver end.
Entropy 23 01650 g007
Figure 8. Range filter.
Figure 8. Range filter.
Entropy 23 01650 g008
Figure 9. ISF generation from the cover image.
Figure 9. ISF generation from the cover image.
Entropy 23 01650 g009
Figure 10. Grayscale cover images (16), color cover images (712) and binary watermark (13).
Figure 10. Grayscale cover images (16), color cover images (712) and binary watermark (13).
Entropy 23 01650 g010
Figure 11. Watermarked images: Grayscale (16), Color (712) and extracted watermark images (al).
Figure 11. Watermarked images: Grayscale (16), Color (712) and extracted watermark images (al).
Entropy 23 01650 g011
Figure 12. Attacked watermarked images and corresponding extracted watermark images with NC and BER values under different attacks.
Figure 12. Attacked watermarked images and corresponding extracted watermark images with NC and BER values under different attacks.
Entropy 23 01650 g012
Figure 13. Attacked watermarked images and corresponding extracted watermark images with NC and BER values under different attacks.
Figure 13. Attacked watermarked images and corresponding extracted watermark images with NC and BER values under different attacks.
Entropy 23 01650 g013
Figure 14. Original, Encrypted and Decrypted watermark images.
Figure 14. Original, Encrypted and Decrypted watermark images.
Entropy 23 01650 g014
Figure 15. PSNR of the proposed scheme and the schemes in comparison [18,23,27,31,32] for Lena and Baboon test cover images.
Figure 15. PSNR of the proposed scheme and the schemes in comparison [18,23,27,31,32] for Lena and Baboon test cover images.
Entropy 23 01650 g015
Figure 16. NC for the proposed scheme and watermarking schemes proposed in [18,23,27,31,32] (under zero attacks) for Lena and Baboon cover images.
Figure 16. NC for the proposed scheme and watermarking schemes proposed in [18,23,27,31,32] (under zero attacks) for Lena and Baboon cover images.
Entropy 23 01650 g016
Figure 17. lNC for the proposed scheme and state-of-the-art schemes [18,23,27,31,32] under attacks for Lena cover Image.
Figure 17. lNC for the proposed scheme and state-of-the-art schemes [18,23,27,31,32] under attacks for Lena cover Image.
Entropy 23 01650 g017
Table 1. MSE, PSNR, SSIM, NC and BER (under zero attacks) for different test cover images using adaptive ISF.
Table 1. MSE, PSNR, SSIM, NC and BER (under zero attacks) for different test cover images using adaptive ISF.
Grayscale
Image
MSEPSNR (dB)SSIMNCBERAlpha
Lena0.431551.670.9853101.03417
Baboon0.439551.580.9982103.93945
Lighthouse0.375552.410.9530100.59863
Desert0.366352.500.9657100.68652
Grain0.457351.520.9867102.93261
MRI0.300953.310.9035100.57421
Avearage0.395152.160.965410
Color
Image
MSEPSNRSSIMNCBERApha
Koala0.153856.310.99910.99910.00222.33984
Penguins0.131956.900.99900.99920.00150.48535
Tulips0.991960.851 0.00010.41992
Tiffany0.086558.760.99770.99010.03080.45898
Splash0.108057.790.99760.98990.02291.07324
Skin0.133656.750.99990.99920.00142.07812
Average0.011257.890.99880.99490.0115
Table 2. MSE, PSNR, SSIM, NC, BER (under zero attacks) and adaptive ISF for 50 test cover images taken from USC-SIPI.
Table 2. MSE, PSNR, SSIM, NC, BER (under zero attacks) and adaptive ISF for 50 test cover images taken from USC-SIPI.
ImageMSEPSNR (dB)SSIMNCBERAlpha
Grass (1.1.01)0.412952.030.9999106.7734
Bark (1.1.02)0.436251.740.9995107.7979
Straw (1.1.03)0.439951.710.9996109.7490
Herringbone weave (1.1.04)0.393452.180.99981013.9102
Woolen (1.1.05)0.421551.950.9992106.5332
Pressed calf leather (1.1.06)0.419451.890.99981011.9004
Beach sand (1.1.07)0.435651.790.9993106.9023
Water (1.1.08)0.347652.640.9969102.9189
Wood grain (1.1.09)0.410152.020.9983102.7051
Raffia (1.1.10)0.418651.950.9994107.6084
Grass (1.2.03)0.447252.780.9962102.3681
Brick wall (1.2.12)0.452252.540.9998101.9532
Tile roof (1.4.05)0.411951.980.9755103.1567
Wood fence (1.4.06)0.381052.320.9964102.4517
Metal grates (1.4.07)0.389752.240.9977103.8203
.Female (4.1.01)0.308553.190.9774101.3779
Couple (4.1.02)0.304153.280.9360100.6797
Female (4.1.03)0.207054.980.9424100.4785
Female (4.1.04)0.291253.520.9772100.7607
. House (4.1.05)0.289553.560.9681101.2666
Tree (4.1.06)0.362752.570.9731101.6543
Jelly bean (4.1.07)0.089958.590.9935100.0332
Airplane (4.2.05)0.405152.080.9697100.9648
Sail boat (4.2.06)0.466851.420.9909101.6055
Peppers (4.2.07)0.463251.490.9896101.4355
Moon surface (5.1.09)0.332152.920.9924102.0449
Aerial (5.1.10)0.421851.850.9961102.6289
Airplane (5.1.11)0.213454.810.9485100.5557
Clock (5.1.12)0.254154.070.9451100.4590
Resolution chart (5.1.13)0.106557.850.6537100.0010
Chemical paint (5.1.14)0.402152.070.9940102.4258
Couple (5.2.08)0.441551.680.9917101.3770
Aerial (5.2.09)0.452151.570.9936101.8740
Stream and Bridge (5.2.10)0.590750.430.9973103.5762
Male (5.3.01)0.440851.700.9909101.5879
Airport (5.3.02)0.461151.470.9925101.6172
Truck (7.1.01)0.450151.600.9925101.6709
Airplane (7.1.02)0.320453.020.9725100.4961
Car (7.1.03)0.444451.630.9948102.1592
Car and APCs (7.1.04)0.415551.890.9943102.3555
Truck and APCs (7.1.06)0.443051.660.9969103.6641
Tank (7.1.07)0.435151.790.9976103.7002
APC (7.1.08)0.464151.500.9891101.2744
Tank (7.1.09)0.436951.750.9972102.9941
Tank and APCs (7.1.10)0.418351,890.9958102.6553
Airplane (7.2 01)0.403152.030.9767100.8965
Fishing boat0.448651.570.9930103.8765
Level step wedge0.321652.870.9973102.3144
House0.414351.940.9677101.9874
Pixel ruler0.092458.470.8453101.7432
Average0.381351.550.976710
Table 3. PSNR, SSIM using optimized ISF with GA, ABC, FO.
Table 3. PSNR, SSIM using optimized ISF with GA, ABC, FO.
Grayscale
Images
With GAWith ABCWith FO
PSNR (dB)SSIMAlphaPSNR (dB)SSIMAlphaPSNR (dB)SSIMAlpha
Lena53.140.98949.1869252.320.98714.264752.290.98694.47517
Mandrill51.960.99848.8480951.600.99834.215751.600.99834.04169
Lighthouse53.440.95979.3473152.920.95704.135852.790.95603.63865
Desert53.340.97136.0682653.090.97074.201453.040.97063.82451
Grain51.520.98626.1898551.540.98664.022451.570.98455.04537
MRI54.270.90625.6992554.070.90593.887753.880.90552.70833
Average52.950.9685 52.590.9676 52.520.9669
Color
Images
PSNRSSIMAphaPSNRSSIMAphaPSNRSSIMApha
Koala57.110.99939.6269056.560.99914.732756.480.99914.1267
Penguins57.660.99909.8869257.210.99904.760657.170.99903.9985
Tulips61.5016.6754461.3715.153561.3514.9423
Tiffany57.460.99789.8004459.220.99784.724759.320.99724.2167
Splash58.140.99765.3208458.120.99776.574558.030.99765.9291
Skin58.680.99999.2663757.810.99994.877357.600.9999
Average58.420.9989 58.380.9989 58.320.9988
Table 4. NC, BER under zero attack using optimized ISF with GA, ABC and FO.
Table 4. NC, BER under zero attack using optimized ISF with GA, ABC and FO.
Greyscale
Imagee
With GAWith ABCWith FO
NCBERAphaNCBERAphaNCBERApha
Lena109.18692104.2647104.47517
Baboon108.8480910.00044.2157104.04169
Lighthouse109.3473110.00024.1358103.63865
Desert106.0682610.00024.2014103.82451
Grain106.18985104.0224105.04537
MRI105.69925103.8877102.70833
Average10 10.0001 10
Color
Images
NCBERAphaNCBERAphaNCBERApha
Koala0.999909.626900.99960.00044.73270.999604.1267
Penguins10.00049.886920.99970.00044.76060.99960.00043.9985
Tulips10.00026.67544105.1535104.9423
Tiffany0.99970.00029.800440.99900.00044.72470.999304.2167
Splash0.999505.320840.999706.57450.999005.9291
Skin0.999909.266370.999604.87730.999604.5178
Average0.99980.0001 0.99960.0002 0.99910
Table 5. NC, BER with adaptive ISF (alpha), GA, ABC and FO under common attacks for Lena Image.
Table 5. NC, BER with adaptive ISF (alpha), GA, ABC and FO under common attacks for Lena Image.
AttacksWith ISF
(Alpha = 1.0341)
With GA
(Alpha = 9.18619)
With ABC
(Alpha = 4.2647)
With FO
(Alpha = 4.4752)
NCBERNCBERNCBERNCBER
Original10.0004101010
Salt and Pepper (0.002)0.69540.57100.85920.56100.77010.57060.68590.5708
Gaussian Noise (0.0002)0.94720.57100.96710.55510.96010.56400.95380.5701
Speckle Noise (0.0002)0.94260.57100.9676056240.96020.56680.95390.5702
Poisson Noise0.94600.57100.96790.55900.95990.56230.95560.5689
Cropping (25 % )0.93780.51020.95660.49560.95000.50830.94390.4934
Rotate_ 45 (clockwise)0.97030.03320.99580.00120.98970.01460.99090.0104
Rotate _ 10 (clockwise)0.99930.00310.99970.00040.99940.00070.99940.0004
Translate (24.3, 10.1)0.99050.00780.99900.00070.99830.00120.99820.0012
Resize (256)0.94100.00780.97250.00070.95940.00120.95420.0010
Resize (320)0.98350.04000.99500.00480.99050.02660.99100.0263
Jpeg Compression (60%)0.98800.01830.99890.00040.99610.00650.99570.0041
Sharpening0.99730.12690.99910.10540.99870.12930.99900.1396
Gaussian Filter (3 by 3)10.00041010.000410
Median Filter (3 by 3)0.99520.00170.99760.00070.99730.00040.99700.0003
Average Filter (3 by 3)0.96080.39400.98530.44160.97640.41180.97250.3950
Average Filter (5 by 5)0.85550.42060.91190.37980.90270.39990.99220.0009
Weiner Filter (3 by 3)0.97450.01460.99860.00040.99660.00340.97830.0144
Butter worth Filter
(Threshold = 20, Grade = 1)
0.96020.57100.98950.45230.98540.46100.98760.4598
Gamma Correctoin (0.25)0.99830.00210.99930.00040.99900.00120.99920.0009
Gamma Correction (0.3)0.99830.00210.99940.00080.99910.00080.99900.0012
Shear (x = 1, y = 0.2)0.99720.00090.99830.00040.99810.00040.99800.0004
Table 6. CC between original, encrypted images and original, decrypted images.
Table 6. CC between original, encrypted images and original, decrypted images.
Test Images
(Binary)
Correlation of Original and Encrypted ImagesCorrelation of Original and Decrypted Images
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
Cameraman0.11850.12630.0721111
Trishool0.12380.16280.1828111
Koala0.14720.15770.0165111
Lena0.12940.13760.0938111
Penguins0.14350.12370.1171111
Table 7. CC between two encrypted images with one bit differ in Random key.
Table 7. CC between two encrypted images with one bit differ in Random key.
Original ImagesCorrelation between Two Encrypted Images
HorizontalVerticalDiagonal
Cameraman−0.0281−0.0173−0.0611
Trishool−0.0248−0.0167−0.0231
Koala−0.0173−0.01040.0057
Lena−0.00860.03030.0017
Penguins−0.0253−0.0778−0.0237
Table 8. Computational time of major algorithmic steps for the cover image of size M × N .
Table 8. Computational time of major algorithmic steps for the cover image of size M × N .
OperationsComputational Cost
1-level 2D IWT transform O ( 2 M N )
1-level 2D inverse IWT transform O ( 2 M N )
SVD decomposition O ( 2 M N 2 + 2 N 3 )
SVD re-composition O ( 2 m i n [ M , N ] M N )
ISF OptimizationO(MN)
Adaptive block selection O ( M N )
Determination of adaptive embedding position using BBS O ( l o g ( l o g m ) )
Table 9. Embedding and extraction time (seconds) of cameraman watermark image with different test cover images.
Table 9. Embedding and extraction time (seconds) of cameraman watermark image with different test cover images.
Grayscale
Image
Embedding Time
(s)
Extraction Time
(s)
Color
Image
Embedding Time
(s)
Extraction Time
(s)
Lena1.9194061.056093Koala1.3782390.987560
Baboon1.4656140.915152Penguins1.6867240.977352
Lighthouse1.5532551.025732Tulips1.4333710.831694
Desert1.3241480.985283Tiffany1.2772850.900063
Grain1.2646610.973439Splash1.2448650.907733
MRI1.4704740.715602Skin1.2738230.616617
Average1.5263880.995216Average1.3823840.870169
Table 10. Watermarking parameters of proposed scheme and state-of-the-art schemes [18,23,27,31,32].
Table 10. Watermarking parameters of proposed scheme and state-of-the-art schemes [18,23,27,31,32].
ParametersAnsari and Pant. [18]Moeinnaddini. [31]Singh and Bhatnagar. [32]Sharma and Mir. [27]Zainol et al. [23]Proposed
SchemeNon-blindBlindBlindBlindBlindBlind
Embedding domainDWT + SVDHadmardLWT + d-sequenceDCTIWT + SVDIWT + SVD
Cover image size512 by 512512 by 512512 by 512512 by 512512 by 512512 by 512
Watermark size64 by 6464 by 6416 by 1664 by 64256 by 25664 by 64
SecurityYesYesYesNoYesYes
Encryption approachArnoldNoArnoldNoChaotic mapPseudo random key
Optimization algorithmABCDDFANoACONoGA, ABC, FA
Handling FPENoYesYesYesYesYes
Embedding positionPrincipal
component
Coefficients
adjustments
Sub bandsDC componentPrincipal
component
Principal
component
Embedding typeStaticDynamicStaticDynamicStaticDynamic
Embedding rate0.0156250.0156250.000970.0156250.250.015625
Table 11. PSNR (dB) and SSIM for proposed and [28] using ABC and GA.
Table 11. PSNR (dB) and SSIM for proposed and [28] using ABC and GA.
ABC
Proposed
ABC
[28]
GA
Proposed
GA
[28]
PSNRSSIMPSNRSSIMPSNRSSIMPSNRSSIM
Grayscale Image
Lena52.320.997147.450.996453.140.989450.810.9825
Baboon51.600.998350.860.996151.960.998451.020.9931
Lighthouse52.920.957052.370.953453.440.959751.890.9532
Desert53.090.970752.610.968253.340.971351.950.9647
Grain51.540.986651.040.983651.520.986250.730.9806
MRI54.070.905953.060.902654.270.906253.010.9029
Color Images
Koala56.560.999149.110.992557.110.999356.020.999
Penguins57.210.99951.510.999857.660.99956.020.9982
Tulips61.37148.180.999761.50159.980.9999
Tiffany59.220.997858.090.997757.460.997858.040.9977
Splash58.120.997756.080.997658.140.997656.040.9976
Skin57.810.999956.830.999858.680.999955.830.9998
Table 12. NC and BER for the proposed scheme and [28] using ABC and GA under zero attack.
Table 12. NC and BER for the proposed scheme and [28] using ABC and GA under zero attack.
ABC
Proposed
ABC
[28]
GA
Proposed
GA
[28]
NCBERNCBERNCBERNCBER
Grayscale Image
Lena1010.00041010
Baboon10.000410.00041010
Lighthouse10.000210.00021010
Desert10.0002101010
Grain10101010
MRI10101010
Color Images
Koala0.99960.00040.99910.00190.999900.99770.0019
Penguins0.99970.00040.99800.001710.00040.99910.0008
Tulips100.99810.000910.00020.99610.0042
Tiffany0.99980.00040.99030.00960.99970.00020.9910.0351
Splash0.999700.98960.00940.999500.99030.0093
Skin0.999600.99500.00320.999900.99630.0059
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Singh, P.; Devi, K.J.; Thakkar, H.K.; Santamaría, J. Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness. Entropy 2021, 23, 1650. https://doi.org/10.3390/e23121650

AMA Style

Singh P, Devi KJ, Thakkar HK, Santamaría J. Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness. Entropy. 2021; 23(12):1650. https://doi.org/10.3390/e23121650

Chicago/Turabian Style

Singh, Priyanka, Kilari Jyothsna Devi, Hiren Kumar Thakkar, and José Santamaría. 2021. "Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness" Entropy 23, no. 12: 1650. https://doi.org/10.3390/e23121650

APA Style

Singh, P., Devi, K. J., Thakkar, H. K., & Santamaría, J. (2021). Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness. Entropy, 23(12), 1650. https://doi.org/10.3390/e23121650

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop