Image Watermarking in Curvelet Domain Using Edge Surface Blocks
Abstract
:1. Introduction
2. Proposed Algorithm
2.1. Watermark Embedding
2.2. Watermark Extraction
2.3. Algorithm
- (1)
- Read grayscale image I of M*N sizes as the original image.
- (2)
- Read binary image W of m*n sizes as a watermark image.
- (3)
- The following steps have been used to identify the edge surfaces of the original image.
- Apply the filtering operation to the original image to obtain a filtered image.
- Convolute the filtered image and Gaussian filter.
- Initialize the values and .
- Calculate the slope (M) using following equation:
- Calculate direction (R) of edges uses following equation
- (4)
- From step 3 edge surface areas have been identified, now combine these edge surface areas of the original image. This combined edge surface image is named as image B.
- (5)
- Divide the original image and edge surface image (B) into 8*8 size of the non-overlapped block. Now calculate the edge points of each edge surface 8*8 blocks. Set the threshold (th) of edge points.
- (6)
- To convert into frequency domain discrete curvelet transform on edge surface image (B). Now in the frequency domain, the coarse level (Q) has been selected to hide the watermark.
- (7)
- In this step, the 2-D watermark image (W) is converted into a 1-D pixel array W = . α was calculated as the watermark strength factor from the pixel intensities of the original image by using Equation (5).
- (8)
- Curvelet domain Coarse level (Q) coefficients were reformed by multiply the values of the watermark image W, watermark strength factor α, and coarse level (Q) coefficients.
- (9)
- Now, this reformed values of curvelet domain coarse level (Q) coefficients was transformed into the time domain by applying inverse curvelet transform. Then, the revised 8*8 edge surface blocks were rearranged into their exact places. This new time-domain image is called a watermarked image .
- We read logotype watermarked image T, and obtained the edge surfaces form the watermarked image as discussed in step 3 and step 4 in phase 1. To identify the edge surface area of images, threshold Th was used and treated as a key.
- These edge surface areas were then combined to make the edge surface images from the watermarked image .
- Then, FDCT was applied to the edge surface images T and to convert them into the frequency domain.
- Now, the embedding domains—the coarse levels (Q) and ()—are the selected domains from the watermarked image (T) and edge surface image () respectively.
- The second key was the value of watermark strength factor α. The value α was obtained as discussed in step 7 in the phase 1 embedding procedure.
- Next we extracted the one by one bit of watermark form the coarse levels of watermarked image (T) and edge surface image () respectively using Equation (6).
- We then arranged the extracted bits into m*n dimensional pixel array, and read this as a 2-D image. The resulting image was an embedded logo-type watermark.
3. Results
- 1.
- Gaussian noise: The performance of the proposed watermarking technique is shown in Figure 4 where the watermarked images are tainted by Gaussian noise with the variance (V) set at {0.2, 0.4, 0.6, 0.8, and 1.0}. From the figure, it is observed that the robustness of the algorithm is high because the watermark is still able to detect even when the density of the noise is 1.0.
- 2.
- Median Filtering: Filtering is the most important operation of image processing. 3*3 mask is applied to the watermarked images. Figure 5 shows the BER of the extracted watermark from 3*3 filtered images. The values of BER of the extracted watermark with embedded ones are negligible to prove the robustness of embedded information against filtering.
- 3.
- Histogram equalization: Another important operation is histogram equalization which shows the robustness of the proposed algorithm. The watermark is extracted from the histogram equalized watermarked image. The values of BER of extracted and embedded watermarks are shown in Figure 5. The quality of extracted information from the histogram equalized watermarked image is comparable to the embedded one. The results of the proposed algorithm confirm the presence of an embedded watermark.
- 4.
- Cropping: The watermarked images are cropped 25% from the middle. Figure 5 also shows the BER of the extracted watermark from the cropped images.
- 5.
- Rotation: Rotation is another important image processing operation. The watermarked images are rotated by . The watermark can be detected even higher degrees of rotation. Figure 6 shows the BER of the extracted watermark image.
- 6.
- Gaussian Filtering: To demonstrate the robustness of embedded watermark, the information is extracted from the Gaussian filtered watermarked image. The BER of the extracted watermark from that image is shown and compared with the method proposed in (Fu, 2013) (Figure 7).
- 7.
- Salt and pepper noise: Figure 8 shows the BER of the extracted/processed watermark from the watermarked image “Lena”, which is corrupted by the Salt and pepper noise with {0.05, 0.10 to 0.55} density. The results are also compared with those in (Fu, 2013).
4. Discussion
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Congress, U.S. Digital millennium copyright act. Public Law 1998, 105, 112. [Google Scholar]
- Liu, Y.; Tang, S.; Liu, R.; Zhang, L.; Ma, Z. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 2018, 97, 95–105. [Google Scholar] [CrossRef]
- Gupta, R.; Mishra, A.; Jain, S. A semi-blind HVS based image watermarking scheme using elliptic curve cryptography. Multimed. Tools Appl. 2018, 77, 19235–19260. [Google Scholar] [CrossRef]
- Shih, F.Y. Digital Watermarking and Steganography: Fundamentals and Techniques; CRC Press: Boca Raton, FL, USA, 2017. [Google Scholar]
- Singh, A.K. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 2017, 76, 8881–8900. [Google Scholar] [CrossRef]
- Abdelhakim, A.M.; Abdelhakim, M. A time-efficient optimization for robust image watermarking using machine learning. Expert Syst. Appl. 2018, 100, 197–210. [Google Scholar] [CrossRef]
- Anwar, M.I.; Singh, G. A Robust Digital Image Watermarking Algorithm using Ridgelet Transform. Int. J. Res. Eng. Soc. Sci. 2017, 7, 29–35. [Google Scholar]
- Parekh, M.; Bidani, S.; Santhi, V. Spatial Domain Blind Watermarking for Digital Images. In Progress in Computing, Analytics and Networking; Springer: Singapore, 2018; pp. 519–527. [Google Scholar]
- Su, Q.; Chen, B. Robust color image watermarking technique in the spatial domain. Soft Comput. 2018, 22, 91–106. [Google Scholar] [CrossRef]
- Das, C.; Panigrahi, S.; Sharma, V.K.; Mahapatra, K.K. A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int. J. Electron. Commun. 2014, 68, 244–253. [Google Scholar] [CrossRef]
- Fu, Y. Robust oblivious image watermarking scheme based on coefficient relation. Opt. Int. J. Light Electron Opt. 2013, 124, 517–521. [Google Scholar] [CrossRef]
- Singh, R.K.; Shaw, D.K.; Sahoo, J. A secure and robust block based DWT-SVD image watermarking approach. J. Inf. Optim. Sci. 2017, 38, 911–925. [Google Scholar] [CrossRef]
- Zear, A.; Singh, A.K.; Kumar, P. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed. Tools Appl. 2018, 77, 4863–4882. [Google Scholar] [CrossRef]
- Lalani, S.; Doye, D.D. Discrete wavelet transform and a singular value decomposition technique for watermarking based on an adaptive fuzzy inference system. J. Inf. Process. Syst. 2017, 13, 340–347. [Google Scholar]
- Loukhaoukha, K.; Chouinard, J.Y.; Taieb, M.H. Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization. J. Inf. Hiding Multimed. Signal Process. 2011, 2, 303–319. [Google Scholar]
- Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
- Yu, X.; Wang, C.; Zhou, X. Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images. Future Internet 2017, 9, 56. [Google Scholar]
- Agilandeeswari, L.; Ganesan, K. RST invariant robust video watermarking algorithm using quaternion curvelet transform. Multimed. Tools Appl. 2018, 77, 25431–25474. [Google Scholar] [CrossRef]
- Kim, W.H.; Nam, S.H.; Lee, H.K. Blind curvelet watermarking method for high-quality images. Electron. Lett. 2017, 53, 1302–1304. [Google Scholar] [CrossRef]
- Sharma, S.G.; Raheja, L.R. Efficient Algorithms for Embedding Digital Watermark in Curvelet Domain. Ph.D. Thesis, Thapar University, Patiala, India, 2017. [Google Scholar]
- Tulapurkar, H.; Mohan, B.K.; Bharadi, V. Invisible watermarking algorithm for GIS data using Curvelet transform—Comparitive study with wavelet. In Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, 23–28 July 2017; pp. 3389–3392. [Google Scholar]
- Moosazadeh, M.; Ekbatanifard, G. An improved robust image watermarking method using DCT and YCoCg-R color space. Opt. Int. J. Light Electron Opt. 2017, 140, 975–988. [Google Scholar] [CrossRef]
- Roy, R.; Ahmed, T.; Changder, S. Watermarking through image geometry change tracking. Vis. Inform. 2018, 2, 125–135. [Google Scholar] [CrossRef]
- Terrasse, G.; Nicolas, J.M.; Trouvé, E.; Drouet, E. Application of the Curvelet Transform for Clutter and Noise Removal in GPR Data. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2017, 10, 4280–4294. [Google Scholar] [CrossRef]
- Candes, E.J.; Donoho, D.L. Curvelets: A Surprisingly Effective Nonadaptive Representation for Objects with Edges; Stanford Univ Ca Dept of Statistics: Stanford, CA, USA; Vanderbilt University Press: Nashville, TN, USA, 2000. [Google Scholar]
- Candes, E.J.; Donoho, D.L. Curvelets, multiresolution representation, and scaling laws. In Proceedings of the Wavelet Applications in Signal and Image Processing VIII, San Diego, CA, USA, 4 December 2000; Volume 4119, pp. 1–13. [Google Scholar]
- Candes, E.; Demanet, L.; Donoho, D.; Ying, L. Fast discrete curvelet transforms. Multiscale Model. Simul. 2006, 5, 861–899. [Google Scholar] [CrossRef]
- Choi, M.; Kim, R.Y.; Kim, M.G. The curvelet transform for image fusion. Int. Soc. Photogramm. Remote Sens. ISPRS 2004, 35, 59–64. [Google Scholar]
- Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Bianco, S.; Celona, L.; Napoletano, P.; Schettini, R. On the use of deep learning for blind image quality assessment. SignalImage Video Process. 2018, 12, 355–362. [Google Scholar] [CrossRef]
- Hemanth, D.J.; Umamaheswari, S.; Popescu, D.E.; Naaji, A. Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems. Open Phys. 2016, 14, 452–462. [Google Scholar] [CrossRef] [Green Version]
- Verma, A.; Gakhar, A. Design and Development of Algorithm Using Chemical Cryptography. Procedia Comput. Sci. 2015, 58, 643–648. [Google Scholar] [CrossRef] [Green Version]
- Chandramouli, R.; Memon, N. Analysis of LSB based image steganography techniques. In Proceedings of the 2001 International Conference on Image Processing (Cat. No.01CH37205), Thessaloniki, Greece, 7–10 October 2001; ISBN 0-7803-6725-1. [Google Scholar]
- Cachin, C. An information-theoretic model for steganography. In Proceedings of the 2nd Information Hiding Workshop, Portland, OR, USA, 14–17 April 1998; Springer-Verlag: Berlin/Heidelberg, Germany, 1998; Volume 1525, pp. 306–318. [Google Scholar]
- Mittal, M.; Verma, A.; Kaur, I.; Kaur, B.; Sharma, M.; Goyal, L.M.; Roy, S.; Kim, T. An Efficient Edge Detection Approach to Provide Better Edge Connectivity for Image Analysis. IEEE Access 2019, 7, 33240–33255. [Google Scholar] [CrossRef]
- Sene, I.; Ciss, A.A.; Niang, O. I2PA: An Efficient ABC for IoT. Cryptography 2019, 3, 16. [Google Scholar] [CrossRef] [Green Version]
- Ching, S.L.P.; Yunos, F. Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction. Cryptography 2019, 3, 15. [Google Scholar] [CrossRef] [Green Version]
- Helleseth, T.; Preneel, B. Special issue on recent trends in cryptography. Cryptogr. Commun. 2018, 10, 1–3. [Google Scholar] [CrossRef] [Green Version]
- Mittal, A.; Kumar, D.; Mital, M.; Saba, T.; Abunadi, I.; Rehman, A.; Roy, S. Detecting Pneumonia using Convolutions and Dynamic Capsule Routing for Chest X-ray Images. Sensors 2020, 20, 1068. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Yang, S.; Yue, Q.; Wu, Y.; Kong, X. Complete weight enumerators of a class of two-weight linear codes. Cryptogr. Commun. 2019, 11, 609. [Google Scholar] [CrossRef]
Image Name | Image | PSNR (in DB) | NC | BER | SSIM |
---|---|---|---|---|---|
Lena | 54.293 | 1.000 | 0.0016 | 0.9998 | |
Cameraman | 54.6927 | 1.000 | 0.0013 | 0.9995 | |
Men | 54.7119 | 1.000 | 0.0012 | 0.9995 | |
Boat | 54.8293 | 1.000 | 0.0013 | 0.9994 | |
Pepper | 54.7898 | 1.000 | 0.0010 | 0.9992 |
Image Name | Image | PSNR In dB | NC | Structure Similarity Index Measure |
---|---|---|---|---|
Lena | 51.756 | 1.000 | 0.9911 | |
Cameraman | 48.543 | 1.000 | 0.9905 | |
Men | 47.095 | 1.000 | 0.9901 | |
Boat | 50.213 | 1.000 | 0.9912 | |
Pepper | 51.234 | 1.000 | 0.9911 |
Image | Technique | PSNR(dB) | NC | SSIM |
---|---|---|---|---|
Lena | Proposed technique | 54.293 | 1.000 | 0.9899 |
MSF algorithm | 55.729 | 1.000 | *NA | |
LWT-SVD | 47.718 | 1.000 | *NA | |
DC component in the spatial domain | 38.12 | *NA | 0.9869 | |
Cameraman | Proposed technique | 54.6927 | 1.000 | 0.9885 |
MSF algorithm | 53.6549 | 1.000 | *NA | |
LWT-SVD | 48.902 | 1.000 | *NA | |
DC component in the spatial domain | 37.67 | *NA | 0.9812 | |
Men | Proposed technique | 54.7119 | 1.000 | 0.9917 |
MSF algorithm | 51.1733 | 1.000 | *NA | |
LWT-SVD | 50.181 | 1.000 | *NA | |
DC component in the spatial domain | 38.96 | *NA | 0.9812 | |
Boat | Proposed technique | 54.8293 | 1.000 | 0.9857 |
MSF algorithm | 51.4943 | 1.000 | *NA | |
LWT-SVD | 54.81 | 1.000 | *NA | |
DC component in the spatial domain | 40.23 | *NA | 0.9834 | |
Pepper | Proposed technique | 54.7898 | 1.000 | 0.9956 |
MSF algorithm | 52.1592 | 1.000 | *NA | |
LWT-SVD | 48.097 | 1.000 | *NA | |
DC component in the spatial domain | 38.75 | *NA | 0.9856 |
Process | Proposed Method | MSF | LWT-SVD | DCT-IBCC | DC-Spatial |
---|---|---|---|---|---|
Watermark Embedding time | 0.40716 | 0.4753 | 0.5465 | 0.56 | 0.5244 |
Watermark Extraction time | 0.2076 | 0.2456 | 0.2101 | 0.229 | 0.3701 |
Total time | 0.61476 | 0.7209 | 0.7566 | 0.789 | 0.8945 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mittal, M.; Kaushik, R.; Verma, A.; Kaur, I.; Goyal, L.M.; Roy, S.; Kim, T.-h. Image Watermarking in Curvelet Domain Using Edge Surface Blocks. Symmetry 2020, 12, 822. https://doi.org/10.3390/sym12050822
Mittal M, Kaushik R, Verma A, Kaur I, Goyal LM, Roy S, Kim T-h. Image Watermarking in Curvelet Domain Using Edge Surface Blocks. Symmetry. 2020; 12(5):822. https://doi.org/10.3390/sym12050822
Chicago/Turabian StyleMittal, Mamta, Ranjeeta Kaushik, Amit Verma, Iqbaldeep Kaur, Lalit Mohan Goyal, Sudipta Roy, and Tai-hoon Kim. 2020. "Image Watermarking in Curvelet Domain Using Edge Surface Blocks" Symmetry 12, no. 5: 822. https://doi.org/10.3390/sym12050822
APA StyleMittal, M., Kaushik, R., Verma, A., Kaur, I., Goyal, L. M., Roy, S., & Kim, T. -h. (2020). Image Watermarking in Curvelet Domain Using Edge Surface Blocks. Symmetry, 12(5), 822. https://doi.org/10.3390/sym12050822