Next Article in Journal
On the General Divergent Arithmetic Sums over the Primes and the Symmetries of Riemann’s Zeta Function
Previous Article in Journal
Directional Invariants of Doubly Periodic Tangles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Chebyshev Chaotic Mapping and DWT-SVD-Based Dual Watermarking Scheme for Copyright and Integrity Authentication of Remote Sensing Images

College of Geography Science and Geomatics Engineering, Suzhou University of Science and Technology, Suzhou 215009, China
*
Authors to whom correspondence should be addressed.
Symmetry 2024, 16(8), 969; https://doi.org/10.3390/sym16080969 (registering DOI)
Submission received: 22 June 2024 / Revised: 15 July 2024 / Accepted: 18 July 2024 / Published: 30 July 2024
(This article belongs to the Special Issue Symmetries and Symmetry-Breaking in Data Security)

Abstract

:
Symmetries and symmetry-breaking play significant roles in data security. While remote sensing images, being extremely sensitive geospatial data, require protection against tampering or destruction, as well as assurance of the reliability of the data source during application. In view of the increasing complexity of data security of remote sensing images, a single watermark algorithm is no longer adequate to meet the demand of sophisticated applications. Therefore, this study proposes a dual watermarking algorithm that considers both integrity authentication and copyright protection of remote sensing images. The algorithm utilizes Discrete Wavelet Transform (DWT) to decompose remote sensing images, then constructs integrity watermark information by applying Chebyshev mapping to the mean of horizontal and vertical components. This semi-fragile watermark information is embedded into the high-frequency region of DWT using Quantization Index Modulation (QIM). On the other hand, the robust watermarking uses entropy to determine the embedding position within the DWT domain. It combines the stability of Singular Value Decomposition (SVD) and embeds the watermark according to the relationship between the singular values of horizontal, vertical, and high-frequency components. The experiment showed that the proposed watermarking successfully maintains a high level of invisibility even if embedded with dual watermarks. The semi-fragile watermark can accurately identify tampered regions in remote sensing images under conventional image processing. Moreover, the robust watermark exhibits excellent resistance to various attacks such as noise, filtering, compression, panning, rotating, and scaling.

1. Introduction

Due to the exponential growth of online services, the dissemination and acquisition of digital data have become increasingly convenient. Conversely, the likelihood of illegal copying, distribution, and malicious alteration of data has risen proportionally, and the problem of data abuse has become progressively more severe [1]. Remote sensing images, as typical geospatial data, are frequently employed to detect various geographical features of a region. They have important applications in environmental detection, risk assessment, urban planning, and military security [2,3]. Given the importance and sensitivity of remote sensing images, it is imperative to not only ensure the reliability of the data but also be mindful of their integrity during the use process. Consequently, there is a pressing requirement for a suitable security mechanism to enhance the protection of data copyright and authentication of its authenticity.
As a cutting-edge technology in the field of information security, digital watermarking can embed watermark information into host data through specific algorithms without affecting its usability. In the event of copyright disputes or data tampering issues, the corresponding watermark information can be obtained according to the extraction algorithms to identify the copyright or tampered area, thereby effectively protecting the data [4,5,6]. Digital watermarking technology has been widely used in images, videos, audio, vector graphics, and 3D models due to its unique mechanism of action. As society’s concern regarding the security of remote sensing images has grown in recent years, this technology has been applied progressively to remote sensing images as well [7,8].
Remote sensing image watermarking algorithms can be divided into three distinct categories according to their characteristics: robust watermarking, fragile watermarking, and semi-fragile watermarking [9,10]. In contrast to alternative watermarking, robust watermarking exhibits the strongest ability to resist attacks; notwithstanding the carrier enduring a certain degree of attack, it remains capable of sustaining the watermark extraction and restoration process. Therefore, robust watermarking is often used in various domains such as copyright protection and copy control [11,12]. In most cases, robust watermarking alters the local features of the carrier image. An excessively strong embedding strength may result in carrier image distortion, while an inadequate embedding strength makes it difficult to ensure the robustness of the algorithm. Therefore, achieving a balance between invisibility and robustness in robust watermarking algorithms has been a significant direction of research.
In contrast to robust watermarking, fragile watermarking is designed exclusively for data integrity authentication. The embedded watermark information is exceptionally vulnerable to various attacks and is sensitive to changes in image details. If any content of the image is modified or changed, the corresponding watermark will also be destroyed, thereby revealing the tampering of the content. Therefore, fragile watermarking is used for authenticity or integrity authentication of images [13]. When applied practically, remote sensing images undergo operations such as JPEG compression and decompression, and the transmission process introduces a certain degree of noise. While these operations do not affect the data’s authenticity and integrity, they may cause disruptions to watermark information, thereby impeding the ability of fragile watermarking to meet the practical application requirements of remote sensing images.
Semi-fragile watermarking combines robust and fragile watermarking traits. It can tolerate a certain degree of image processing (compression, noise and filtering, etc.), while effectively detecting maliciously tampered areas in the image [14]. Given the sensitivity of the application of remote sensing images, it is essential to guarantee their integrity and reliability during usage. The current remote sensing image watermarking algorithms generally only address single security issues. For example, Hua et al. [15] embedded a robust watermark in the DWT transform domain by selecting the region with the maximum entropy value. This algorithm only addresses the issue of copyright verification but does not consider the impact of tampering on the image. Zhang et al. [16] used Zernike moments to extract global texture features and employed Accelerated Segment Test feature points for local feature construction. Finally, they combined multiple features to identify tampered areas. However, this algorithm only achieves tamper detection. Heidari et al. [12] embedded the watermark into the host image using a combination of DWT and SVD, similarly focusing solely on copyright issues and neglecting tamper detection. These algorithms can no longer meet practical application requirements. Therefore, this study proposes a novel dual watermarking algorithm that effectively integrates both robustness and semi-fragility. The robust watermark withstands complex image operations and verifies copyright, while the semi-fragile watermark precisely identifies tampering operations for integrity verification.
The main contributions of this study are as follows:
(1)
Traditional block-based watermarking algorithms make it difficult to resist desynchronization attacks (such as translation, rotation, and scaling). This study employed image moments and affine transformations to normalize remote sensing images, thus enhancing the desynchronization attack resistance of the watermarking algorithm;
(2)
The DWT local transformation accurately delineates the tampered and unaffected portions of remote sensing images, ensuring the accurate detection of the semi-fragile watermarking algorithm. To tackle the problem of false alarms often encountered in integrity watermarking, the verification results were optimized through a 3 × 3 window, resulting in a reduction of the false alarm rate caused by Quantization Index Modulation (QIM) extraction errors;
(3)
Entropy was utilized to determine the embedding positions of robust watermarks in the DWT transform domain. The singular value matrix of the horizontal and vertical components of the DWT was used as the embedding template, and the robust watermark embedding algorithm was redesigned, which well solves the false-positive problem that often exists in the SVD and ensures the invisibility and robustness of the robust watermark.
The subsequent sections of this article are structured as follows: Section 2 provides an introduction to the current research status of algorithms linked to remote sensing image watermarking. Section 3 introduces the relevant algorithms used in this study and explains the reasons for their selection. The embedding and extraction process of the proposed dual watermarking algorithm in this article is introduced in Section 4. The corresponding empirical findings will be presented in Section 5, and finally, the conclusion of the study is given in Section 6.

2. Related Works

Due to the ongoing development of information technology, the issues of piracy and tampering with digital material have escalated significantly. This also promotes the continuous improvement and perfection of digital watermarking technology, resulting in the emergence of various types of watermarks. This section provides a concise overview of pertinent studies on robust watermarks, semi-fragile watermarks, and dual watermarks that are related to this article.
The primary application of robust watermarking is to authenticate copyright in images; algorithms for this purpose typically compromise the watermark’s invisibility and robustness. Since the transform domain provides superior data concealment and stability, it is the foundation for numerous robust watermarks. For example, Wang et al. [17] preprocess the watermark information by compressing it to obtain feature watermarks before embedding, then use block Discrete Cosine Transform (DCT) to concentrate the main information of the remote sensing image into the low-frequency coefficients of each block. Finally, they embed watermark information individually through quantization. Based on Redundant Wavelet Transform (RDWT) and SVD, Devl et al. [18] presented a hybrid domain algorithm. This algorithm uses RDWT to decompose remote sensing images into four sub-bands and constructed the embedding domain using SVD, therefore combining the high capacity of RDWT with the stability of SVD matrices. Yuan et al. [19] transformed the RGB channels of remote sensing images into the YCbCr color space based on human visual characteristics, then combined DWT with HSV texture features to perform multilevel decomposition on the luminance space Y. Finally, they embedded watermark information by modifying the low-frequency coefficients of DWT. Heidari et al. [12] addressed the limitations of the DWT algorithm by integrating SVD with a three-level DWT decomposition of images. They employed singular values to embed watermark information, ensuring the algorithm’s resistance to minor rotations. These robust watermarking methods embed watermark information into the transform domain based on fixed templates, exhibiting decent invisibility and demonstrating good robustness against various types of noise, filtering, and compression. However, the susceptibility of these watermark embedding templates to translation, rotation, and scaling poses a significant challenge in safeguarding them against desynchronization attacks.
Semi-fragile watermarks are more used for data integrity and authenticity verification. To distinguish between standard image processing and malicious tampering distinction, Hanen et al. [20] employed perceptual hash values of images as watermarks during JPEG compression. They directly replaced wavelet transform coefficients of the image using QIM, enabling the semi-fragile watermarks to achieve high detection accuracy. However, because the algorithm solely focuses on compression effects, it is not resistant to other forms of image processing. Senol et al. [21] proposed a semi-fragile watermarking scheme based on inner and outer block partitioning. This algorithm divides images into three parts: the central, potentially important, and outer regions based on their significance. Subsequently, the central and outer blocks were subjected to block pairing and processing. During this process, watermark information is embedded into the central blocks, and their binary images are calculated. These binary images were then embedded into the corresponding peripheral blocks, thereby achieving integrity authentication. This algorithm demonstrates excellent resistance against JPEG compression and filtering. However, it does not consider the impact of noise on the verification results. Behrouz et al. [22] proposed a semi-fragile watermarking scheme based on lifting wavelet transform (LWT) and feed-forward neural network (FNN). This algorithm utilizes LWT to decompose images and extract diagonal details for block-wise DCT. Then, it modifies the DC coefficients of each block to embed the watermark. Before watermark extraction, the speeded-up robust features (SURF) algorithm was employed to identify feature points in the images, facilitating the pairing and correction of geometric transformations of the carrier. Finally, FNN was used to extract the watermark and detect tampered regions. This scheme introduces feature point correction and FNN in the wavelet domain to greatly improve the accuracy of integrity verification. However, it is important to note that the algorithm relies on the feature points of the original image before watermark extraction, rending it a semi-blind watermark.
There has been a lot of study on both robust and semi-fragile watermarking recently. However, as the usage scenarios for images become increasingly complex, a single watermarking algorithm is inadequate to fulfill the diverse application requirements. Therefore, many scholars have advocated for dual watermarking. Dual watermarking achieves multiple protections for the carrier data by embedding different types of watermarks into it. However, the integration of multiple watermarks into a single carrier may result in conflicts between the watermarks; hence, it is also challenging to guarantee the invisibility of the watermark algorithm. To avoid any interference between dual watermarks, Liu et al. [23] transformed the host image from the RGB color space to the YCbCr color space and extracted its luminance Y for DWT decomposition. They then embeded robust watermark information in the low-frequency components through block-based quantization. After completing the abovementioned process, they converted YCbCr back to RGB and embedded fragile watermarks separately in RGB using an improved Least Significant Bit (LSB) method. AHMADI et al. [24] utilized the characteristics of DWT multi-scale decomposition to decompose the RGB three bands of the image simultaneously. The low-frequency coefficients of the blue channel for SVD and robust watermarks were embedded based on the relationship between the left and right matrices of singular values. For fragile watermarks, they performed block-wise SVD on the high-frequency coefficients of all channels, and finally embed semi-fragile watermarks by modifying the first and second singular values of the singular value matrix. Although the aforementioned algorithms address the issue of mutual interference between different watermarks, the embedding of multiple watermarks has led to a significant decrease in the quality of the host image, making it difficult to meet the precision requirements of high-quality remote sensing images.

3. Construction of Dual Watermarking

3.1. Remote Sensing Image Normalization

Remote sensing images have geometric distortions throughout the imaging process. Therefore, it is necessary to perform geometric correction and registration before using them. If the remote sensing image contains watermark information, performing this operation may cause the embedded watermark to shift to some degree. If the magnitude of the shift is excessively large, it can seriously impair the efficiency of watermark extraction. Template-based watermarking algorithms rely on the resistance of the transformation domain algorithm itself to various attacks [15,16,17]. However, their resistance to geometric attacks is often unsatisfactory. Therefore, this study fixes the embedding domain of remote sensing images with the idea of normalization, which ensures the robustness of the watermarking algorithm. The basic strategy is to determine the orientation of the remote sensing image based on the image moments and subsequently apply an affine transformation to modify the image’s angular and scale. Image moments have invariance properties to translation, rotation, and scaling, and they also exhibit a certain resistance to image noise [25]. The geometric moment M α β of a remote sensing image R can be calculated as follows:
M α β = x = 0 m 1 1 y = 0 n 1 1 x α y β R x , y
where α and β are constant, m 1 and n 1 are the length and width of the remote sensing image, respectively. x , y denotes the image’s coordinate position. With the geometric moments, the central moment U α β of the image can be calculated:
U α β = x = 0 m 1 1 y = 0 n 1 1 x X c α y Y c β R x , y
X c = M 10 M 00 ,   Y c = M 01 M 00
where X c and Y c denote the horizontal and vertical coordinates of the center of mass of the remote sensing image, respectively.
According to (2), the image’s main axis direction θ can be calculated using the specifical equation:
θ = 1 2 a r c t a n 2 U 11 U 20 U 02
This study utilized the main axis direction of the remote sensing image as the reference for angle normalization. The remote sensing image was then normalized using an affine transformation matrix. For the original remote sensing image R and the transformed remote sensing image R , there exists the following relationship:
R x , y = A · R x , y B
A = a 1 a 2 a 3 a 4 , B = b 1 b 2
Normalization of remote sensing images is essentially the cumulative transformation of remote sensing images using affine transformation. The specific steps are as follows:
(1)
Angle normalization: Firstly, the remote sensing image is rotated according to the center of mass. In (5), the transformation matrix A 1 = 1 0 0 1 and B 1 = X c Y c , resulting in the centrally processed remote sensing image R 1 x , y = A 1 · R x , y B 1 .
Then the angular difference θ d between the initial angle θ 1 of the remote sensing image and the angle θ 2 of the processed image is calculated by (4). Set A 2 = c o s θ d s i n θ d s i n θ d c o s θ d , B 1 = 0 to rotate the centrally processed remote sensing image R 1 x , y , and then the expression of the image is as follows: R 2 x , y = A 2 · R 1 x , y + B 1 .
  • Scaling normalization: Apart from the rotation, scaling transformation also greatly affects the extraction results, so it is necessary to re-determine the scaling scales s 1 and s 2 for the horizontal and vertical axes based on the dimensional relationship between the original remote sensing images R and R 2 x , y :
s 1 = m 1 m 2 , s 2 = n 1 n 2
where m 2 and n 2 are the length and width of the image, respectively. Set A 3 = s 1 0 0 s 2 , B = 0 . According to (5), perform scaling transformation again on R 2 x , y : R 3 x , y = A 3 · R 2 x , y , thus the remote sensing image has been fully normalized.

3.2. Semi-Fragile Watermarking Based on DWT and Chebyshev Chaotic Mapping

Compared to the RGB color space, the YCbCr color space allows separate processing of luminance Y and chrominance CbCr, without interfering with each other [23]. This study utilizes the Y to conceal a semi-fragile watermark, while the Cr is used as a robust watermark embedding domain. This approach aims to maintain the independence of the two watermarks while preserving the visual quality of the remote sensing image as much as possible. The equation for converting from RGB to YCbCr color space is as follows:
Y C b C r = 0.2990 0.5870 0.1140 0.169 0.3312 0.5000 0.50000 0.4186 0.0813 R G B + 0 128 128

3.2.1. DWT Decomposition

The wavelet transform is a common image processing algorithm, and its basic idea is to use the wavelet function as a basis function to decompose the input image into wavelet components with different scale positions and different components [26]. Compared to the continuous wavelet transform, DWT operates in discrete time and space. Taking the remote sensing image R x , y as an example, DWT decomposes the image into multiple levels of resolution by applying various filters along the rows and columns of the image. This process generates four frequency sub-bands: LL, HL, LH, and HH. One of the most significant characteristics of DWT is its ability to independently analyze each frequency sub-band according to their distinct characteristics. Due to the fact that the DWT algorithm is a local transformation in both the spatial and transform domains, it is possible to accurately distinguish between the altered and unaltered regions of a remote sensing image despite cropping and substitution. It meets the requirements of integrity verification applications. Therefore, this study employed the DWT as its watermarking base algorithm so as to meet the different embedding requirements of dual watermarking algorithms. The decomposition of the remote sensing image R x , y using DWT is as follows:
L L x 2 , y 2 = k 1 = 0 m 1 1 k 2 = 0 n 1 1 g k 1 g k 2 R x k 1 y k 2 L H x 2 , y 2 = k 1 = 0 m 1 1 k 2 = 0 n 1 1 g k 1 h k 2 R x k 1 y k 2 H L x 2 , y 2 = k 1 = 0 m 1 1 k 2 = 0 n 1 1 h k 1 g k 2 R x k 1 y k 2 H H x 2 , y 2 = k 1 = 0 m 1 1 k 2 = 0 n 1 1 g k 1 g k 2 R x k 1 y k 2
where g(k) is the low-pass filter, h(k) is the high-pass filter, k 1 , k 2 are constants, and LL, LH, HL, and HH are the results of the DWT decomposition.

3.2.2. Validation Coefficient Construction Based on Chebyshev Chaos Mapping

Common semi-fragile watermark integrity verification schemes mostly use an external watermark image as a template. During the process of integrity verification, tampered regions are determined by comparing the extracted information with the external watermark and identifying any discrepancies. However, when remote sensing images undergo deformation, the extracted integrity information also experiences alterations, making it difficult for watermarks to correspond to each other and significantly impacting the accuracy of verification. This study is based on the characteristics of DWT local transformation and its multi-scale features. The method uses horizontal and vertical components as templates and employs Chebyshev chaos mapping to construct integrity verification information, which is then embedded into the high-frequency components of DWT, achieving correspondence between the extracted information and the integrity information.
The Chebyshev chaotic mapping is highly sensitive to the initial conditions of the input. No matter how similar the initial values of the inputs are, the iterative output sequences are uncorrelated with each other [27,28]. Therefore, this algorithm is widely used in data encryption. Chebyshev chaotic mapping is given by (10):
V n + 1 1 = cos t · a r c c o s V n 1 , V n 1 ϵ 1 ,   1
where V n 1 is the input value, n is the number of iterations and t is the order. In this case, t is 4.
This study utilizes the mean coefficient matrix of the horizontal and vertical components obtained by DWT decomposition to generate a watermark sequence for authentication purposes. To filter out the parts of each coefficient that are less affected by noise and to meet the input value requirements of the Chebyshev mapping, the mean coefficient matrix needs to be processed. The specific processing rules are as follows:
V n 1 = f l o o r m o d a b s A v e r a g e , 100 / 10 10
where f l o o r ( . ) is a downward rounding function, m o d ( . ) is a modulo operation and a b s ( . ) is the absolute value.
By applying (10) to map V n 1 , the resulting sequence V n + 1 1 is not a binary sequence. The positive values are assigned a value of “1”, while the rest values are assigned a value of “0”, thereby constructing the validation matrix M a t v .

3.2.3. Mapping Semi-Fragile Watermark Embedding Method

QIM has been demonstrated that the method is not only robust to a certain degree of image processing but also has little resistance to malicious tampering such as cutting, pasting, and substituting [29]. This satisfies the basic requirements for semi-fragile watermarking of remote sensing images. Therefore, QIM is chosen as the embedding method for semi-fragile watermarking in this study. The main idea of QIM is to quantize the carrier data into different intervals according to different integrity verification information. Then quantize it again when extracting the watermark, so that the interval it belongs to represents the watermarking information [30]. The specific embedding rules are as follows:
H H = H H p 1 , p 2 2 ;   M a t v p 1 , p 2 = 0 ,   m o d H H p 1 , p 2 , > 2 H H p 1 , p 2 + 2 ;   M a t v p 1 , p 2 = 1 ,   m o d H H p 1 , p 2 , 2 H H p 1 , p 2 ;   o t h e r s
where is the quantization step, H H is the matrix of modified high-frequency coefficients, and H H p 1 , p 2 is the high-frequency coefficients at position p 1 , p 2 .
The QIM extracting equation is as follows:
M a t v = M a t v p 1 , p 2 = 1 ;   m o d H H p 1 , p 2 , 2 M a t v p 1 , p 2 = 0 ;   m o d H H p 1 , p 2 , < 2
where M a t v denotes the extracted integrity verification information.

3.2.4. False Alarm Optimization Method

In this study, the tempered positions in remote sensing images are determined by comparing the differences between the validation watermark M a t v and embedded watermark M a t v . That is, when the corresponding position values of M a t v and M a t v are the same, it means that the position of the point is not modified, and the validation result here is set to “0”. Conversely, if the two values are different, the validation result of the point is set to “1”.
In the above-shown process, since the DWT algorithm may cause some errors during the back-and-forth transformation process, the accuracy of the QIM will also be affected. Therefore, the final validation results have some false alarm problems. To address this problem, this study extracts the 3 × 3 neighborhood around a single verification result, and when the total number of “1” in the region is greater than 4, the verification result at the center is set to 1. Otherwise, the verification result is set to 0, thus reducing the false alarm rate of the verification result. The specific optimization process is illustrated in Figure 1.

3.3. Robust Watermarking Method Based on Entropy and SVD

The inability to extricate a semi-fragile watermark following substantial image modification may necessitate the use of robust watermarking for copyright prosecution. In the remote sensing image robust watermarking algorithms, ensuring the resistance of the watermark embedding domain to various desynchronization attacks has always been a challenge. The previously proposed remote sensing image normalization process based on image moments still has certain angular errors, which significantly impact the remote sensing image watermarking algorithm that relies on template embedding. Therefore, this study introduces the concept of information entropy applied to a fixed image template. The entropy value is then used to determine the appropriate domain for embedding the watermark. This approach aims to enhance the robustness and transparency of the watermark algorithm.
Information entropy is often used to quantify the degree of uniformity of image pixel distribution. A lower information entropy means that the region of the pixel distribution is relatively centralized, implying a relatively basic structure. Conversely, when the pixel distribution in a region is more uniform, the information entropy is greater. This means that the region carries more information, in which that embedded in the watermark can also obtain better transparency [24].
The information entropy V e n t r o p y of the high-frequency region HH after DWT transform is calculated as follows:
V e n t r o p y = i = 1 H H m a x H H i l o g 2 H H i
where H H m a x denotes the maximum value in the high-frequency region of the input computation, and H H i denotes the probability of occurrence of coefficient value i .
When embedding robust watermark information directly in the DWT domain, it is difficult to ensure the robustness of the watermark algorithm. However, the SVD algorithm does not exhibit significant sensitivity to small perturbations in input coefficients, thus demonstrating superior data stability [31,32]. In order to further improve the resistance of the watermarking algorithm to various image processing, this study combines SVD on the basis of DWT transform to decompose the region with the largest entropy value and use the singular value matrix as the watermark embedding domain. For an m r × m r DWT coefficient matrix ( R e g i o n ), the singular value decomposition formula is as follows:
R e g i o n = U r S r V r T = u 1 , u 2 , , u m r Σ S r 0 0 0 v 1 , v 2 , , v m r
where S r is the singular value matrix, U r and V r are orthogonal matrices composed of the left and right singular vectors, respectively. V r T denotes the transpose matrix of V r . u 1 , u 2 , , u m r and v 1 , v 2 , , v m r denote the column vectors in the matrix, and Σ S r = d i a g λ 1 , λ 2 , , λ m is a diagonal matrix.

3.4. Watermark Scrambling

Before embedding the watermark, it is generally essential to employ encryption techniques to transform the watermark information into a chaotic state, thus enhancing the security of the watermark. The Arnold transform is a classic image scrambling encryption method based on the characteristics of the watermark digital matrix, it involves nonlinear mapping of pixel points within the watermark matrix to disrupt the watermark information, so as to disturb the information of the watermark, achieving an effect of encryption [33]. This method is widely used in watermarking research due to its simplicity, ease of implementation, and its ability to render the energy distribution of the watermarked image more uniform. For a watermark of m w × m w , the Arnold scrambling Equation is as follows:
X a Y b = 1 k e y a k e y b 1 + k e y a k e y b X a Y b m o d ( m w )
where k e y a and k e y b are positive integers, which are used as recovery keys after scrambling. ( X a , Y b ) and ( X a , Y b ) represent the original position of the watermark pixel value in the matrix and the position after mapping, respectively. The recovery equation for Arnold scrambling is as follows:
X a Y b = k e y a k e y b + 1 k e y b k e y a 1 X a Y b m o d m w

4. Embedding and Extraction Processes of the Proposed Dual Watermarking

4.1. Watermark Embedding Process

Prior to the dual watermark embedding, it is necessary to calculate the initial angle θ 1 of the main axis of the original remote sensing image according to the image moments outlined in Section 3, Additionally, the length m 1 and width n 1 of the axis should be recorded. Next, extract the RGB bands and convert them into the YCbCr color space. The dual watermark embedding process is shown in Figure 2, and the pseudo-code is shown in Algorithm 1 and consists of the following steps:

4.1.1. Robust Watermark Embedding

Step 1. The chromaticity Cr of YCbCr color space is extracted and a 4 × 4 DWT is performed, four frequency components of LL, HL, LH, and HH are obtained.
Step 2. Extract the high-frequency component HH and compute its entropy. Select the part with the maximum entropy value as the watermark information embedding region. Then perform the SVD to obtain the left and right singular values U r and V r , as well as the singular value matrix S r .
Step 3. Extract the vertical component HL and horizontal component LH. Select the coefficients at the corresponding positions in Step 2 and perform SVD on them separately to obtain the singular value matrices S H L and S L H . Then, calculate S a according to (18).
S a = S H L + S L H 2
Step 4. Convert the original watermark sequence “0, 1” to the “0, 255” sequence, then perform Arnold scrambling and SVD to obtain U w , S w , and V w .
Step 5. The singular-valued left and right matrices U w and V w are served as the key, S w is used as the embedding information. Apply (19) to embed the watermark information and obtain S r . Substitute S r with S r for the inverse SVD transformation to obtain the embedding domain Region’.
S r = S a + δ × S w
where δ is the embedding strength.
Step 6. Replace the maximum entropy of the high-frequency component HH with the watermarked embedded domain and get the watermarked high-frequency component HH’. Finally, the chrominance Cr’ with a robust watermark is obtained by inverse DWT.

4.1.2. Semi-Fragile Watermark Embedding

Step 1. The luminance Y of the YCbCr color space is extracted for DWT transformation to obtain the four frequency components LL2, HL2, LH2, and HH2.
Step 2. The components HL2 and LH2 are extracted to find the mean value, and in order to satisfy the input value size requirement of the Chebyshev mapping, the mean value is processed according to (11) to obtain the input coefficient V n 1 .
Step 3. V n 1 is chaotically mapped according to (10), resulting in the generation of the mapped matrix coefficients V n + 1 1 . Subsequently, the matrix is binarized, with positive numbers assigned a value of “1” and the other numbers assigned a value of “0”. This step yields the integrity watermark matrix M a t v .
Step 4. The high-frequency coefficient HH2 is extracted, and the watermark value in M a t v is indexed sequentially. Then the embedding process is performed according to (12) to obtain the high-frequency coefficient H H 2 containing the integrity watermark. Finally, the luminance Y is obtained by executing the inverse DWT.
Step 5. Finally, the original C r and Y are replaced with the watermarked chromaticity C r and luminance Y . Subsequently, the YCbCr color space is transferred back to the RGB color space to complete the process of embedding dual watermarks in the remote sensing image, resulting in the acquisition of a watermarked remote sensing image.
Algorithm 1 Watermark embedding process
Input :   Embedding   strength ,   δ ; quantization step, ∆; remote sensing image; Watermark.
Output: Watermarked image;
 1: Convert RGB to YCbCr;
 2: Extract Cr and perform a 4 × 4 DWT; // Robust watermark embedding
 3: Obtain LL, HL, LH and HH;
 4: Compute HH’s entropy to determine embedding position;
 5: Gain embedding region ( R e g i o n );
 6: Convert the watermark, and perform Arnold scrambling and SVD;
 7: Obtain U w ,   S w ,   and   V w ;
 8: Perform SVD on H L ,   L H ,   R e g i o n ;
 9: Gain S H L ,   S L H ,   S r ,   U r and V r ;
10 :   Extract   S H L ,   S L H   and   calculate   S a according to (18);
 11: Embed S w   into   S a according to (19);
12 :   Gain   S r ;
13 :   Perform   inverse   SVD   on   S r and then inverse DWT;
 14: Gain Cr’;
 15: Extract Y and perform DWT; // Semi-fragile watermark embedding
 16: Obtain LL2, HL2, LH2 and HH2;
 17: Extract HL2 and LH2 to calculate the mean value, then process it according to (11);
 18: Obtain the input coefficient V n 1 ;
 19: V n 1 is chaotically mapped according to (10).
 20: Gain V n + 1 1 ;
 21: if V n + 1 1 > 0 then // Perform binary processing to V n + 1 1
22 : M a t v = 1
 23: else
24 : M a t v = 0
 25: end if
 26: Extract H H 2 and embed M a t v in it;
 27: Obtain HH2’;
 28: Perform inverse DWT on HH2’,
 29: Obtain Y ;
 30: Convert Y’CbCr’ to RGB;
 31: Return: Watermarked image;

4.2. Watermark Extraction Process

The initial angle θ 2 of the principal axis of the watermarked image is calculated according to the image moment, and the angle difference θ d between the watermarked image and the original image is obtained. Correct the watermarked remote sensing image according to the remote sensing image normalization method described in Section 3.1. Then extract the RGB bands and convert them to the YCbCr color space. Since cropping attacks may remove some areas of the remote sensing image, it is known from (1) and (2) that the geometric moments and central moments of the remote sensing image are no longer reliable. Therefore, the proposed correction strategy is not applicable to remote sensing images with obvious missing parts. The watermark extraction process of the dual watermarking algorithm is shown in Figure 3, the pseudo-code is shown in Algorithm 2 and the specific steps are as follows.

4.2.1. Extract Robust Watermark

Step 1. Extract the chrominance C r and perform a 4 × 4 block DWT on it to extract four frequency components: LL, HL, LH, and HH’.
Step 2. Select the high-frequency component HH’ and calculate its entropy. Extract the part with the maximum entropy value to obtain the embedding region. Then, perform SVD on it, yielding the left and right singular vectors U r , V r , and the singular value matrix S r .
Step 3. Extract the vertical component HL and the horizontal component LH. Select the coefficients at corresponding positions as determined in step 2 and perform SVD on them to obtain the singular value matrices S H L and S L H . Then, calculate S a according to (18).
Step 4. Calculate the singular value S w of the watermark by computing the singular value matrix S r and the mean value matrix S a according to (20).
S w = S r S a δ
Step 5. Merge the left and right matrices U w and V w with S w . Then, perform an inverse SVD and reverse the scrambling process. Finally, convert the “0, 255” back to the “0, 1” sequence to complete the extraction of the robust watermark.

4.2.2. Extract Semi-Fragile Watermark

Step 1. Extract the luminance Y from the YCbCr color space and perform a DWT on it, obtaining four frequency components: LL2, HL2, LH2, and HH2’.
Step 2. The components HL2 and LH2 are extracted to obtain the mean value. In order to meet the requirement of the input value of the Chebyshev map, the average value is processed according to the (10) to obtain the input coefficient V n 1 .
Step 3. Perform chaotic mapping on V n 1 according to (10) to obtain the mapped matrix coefficients V n + 1 1 . Then, perform binary processing to the data by assigning a value of “1” to a positive number and “0” to all other values, resulting in the integrity watermark matrix M a t v .
Step 4. Extract the high-frequency coefficients HH2’ and use the QIM extraction algorithm defined by (13) to obtain the verification matrix information M a t v .
Step 5. Perform the XOR operation between M a t v and M a t v . Then, optimize the verification results for false alarms according to Section 3.2.3, thereby completing the integrity verification of the remote sensing image.
Algorithm 2 Watermark extraction process
Input :   Embedding   strength ,   δ ;   quantization   step ,   ;   watermarked   image ;   left   and   right   matrices ,   U w   and   V w ;
Output: Extracted watermark, optimized verification results;
 1: Convert RGB to YCbCr;
 2: Obtain Y’CbCr’;
 3: Extract Cr’ and perform a 4 × 4 DWT; // Copyright verification
 4: Obtain LL, HL, LH and HH’;
 5: Compute HH’s entropy to determine embedding position;
6 :   Gain   embedding   region   ( R e g i o n );
7 :   Perform   SVD   on   H L ,   L H ,   and   R e g i o n ;
8 :   Gain   S H L ,   S L H , S r ,   U r ,   and   V r ;
9 :   Extract   S H L ,   S L H   and   calculate   S a according to (18);
10 :   Extract   S r   and   calculate   S w according to (20);
11 :   Gain   S w ;
11 :   Perform   inverse   SVD   on   U w ,   S w   and   V w , then reverse the scrambling, and convert back to the “0, 1”;
 12: Gain robust watermark;
 13: Extract Y’ and perform DWT; // Integrity authentication
 14: Obtain LL2, HL2, LH2 and HH2’;
 15: Extract HL2 and LH2 to calculate the mean value, then process it according to (11);
 16: Obtain the input coefficient V n 1 ;
 17: V n 1 is chaotically mapped according to (10).
 18: Gain V n + 1 1 ;
 19: if V n + 1 1 > 0 then // Perform binary processing to V n + 1 1
20 : M a t v = 1
 21: else
22 : M a t v = 0
 23: end if
24 :   Extract   H H 2   and   use   QIM   extraction   algorithm   to   extract   M a t v ;
25 :   Obtain   M a t v ;
 26: Perform   the   XOR   operation   between   M a t v   and   M a t v
 27: Obtain verification results;
 28: Fale alarm optimization;
 29: Obtain optimized verification results
 30: Return: Extracted watermark, optimized verification results;

5. Experimental Results and Analysis

5.1. Evaluation Methods

In this study, the peak signal-to-noise ratio (PSNR) and structural similarity (SSIM) were used to assess the invisibility of the watermark and the quality of the watermarked remote sensing image. The normalized correlation coefficient (NC) was used to evaluate the similarity between the extracted watermark image and the original watermark image under different attacks to judge the robustness of the algorithm [5,11,34]. The Equation for calculating the PSNR is as follows:
P S N R = 10 × l o g 10 m a x R 2 M S E
M S E = 1 m 1 n 1 x = 0 m 1 1 y = 0 n 1 1 R x , y R w x , y 2
where R represents the original image, R w denotes the watermarked image, and m a x R is the maximum pixel value in the original image. The larger the value of PSNR, the smaller the difference between the watermarked image and the original image.
The primary comparison of SSIM is based on the structural, luminance, and contrast information of the images. The specific calculation Equation is as follows:
S S I M = L R , R w C R , R w S R , R w
L R , R w = 2 u R u R w + ε 1 u R 2 + u R w 2 + ε 1
C R , R w = 2 σ R 2 σ R w 2 + ε 2 σ R 2 + σ R w 2 + ε 2
S R , R w = 2 σ R R w + ε 3 σ R σ R w + ε 3
where L R , R w is the luminance contrast between images, C R , R w is the contrast of two images, S R , R w is the structural contrast, u R and u R w are the mean gray values of the original image and the watermarked image, respectively. σ R 2 and σ R w 2 are the variances of the two images, σ R R w is the covariance between the images, and ε 1 , ε 2 , and ε 3 are constants. The value of SSIM is in the range of 0 to 1, and a larger value indicates a smaller distortion of the image.
The equation for calculating the NC value is as follows:
N C = m w n w W m w , n w W m w , n w m w n w W m w , n w 2 i w j w W m w , n w 2
where W m w , n w and W m w , n w denote the pixel values of the original watermark and the extracted watermark at position m w , n w , respectively. m w and n w are the length and width of the watermarks, respectively. When the value of NC is closer to 1, it means that the similarity between the original and the extracted watermarks is higher, and the algorithm is more robust.

5.2. Experimental Data Sets

To assess the adaptability of the watermarking algorithm to remote sensing image data of varied resolutions and types, this study selected six remote sensing images with varying accuracy, band numbers, data types, and regions as watermark carriers. A 32 × 32 binary image was chosen as the copyright watermark. The information on the remote sensing images is shown in Table 1, and the specific regions are illustrated in Figure 4. Figure 5 displays both the watermark image and the result after scrambling.

5.3. Invisibility Analysis

To verify the invisibility of the watermarking algorithm, the PSNR and SSIM values of all watermarked images are respectively calculated. During the watermark embedding phase, this study set the robust watermark embedding strength δ as 0.1. The embedding step ∆ for semi-fragile watermarks is set at 8 for 8-bit images and 80 for 16-bit images. Additionally, the watermarking algorithms from references [15,35,36] are chosen for comparison. The specific statistical results are displayed in Table 2.
The results showed that even in the case of embedding dual watermarks, the proposed watermarking algorithm achieved the highest PSNR and SSIM values for datasets such as Anhui, Xinjiang, and Suzhou. For Jilin, Nanning, and Huaian, which have an 8-bit depth, the imperceptibility of the proposed algorithm was slightly lower compared to [15]. This is because the proposed algorithm embeds not only a robust watermark but also a semi-fragile watermark into the images. Nevertheless, both the PSNR and SSIM values exceeded 45 and 0.99, respectively. This suggests that the proposed watermarking algorithm has minimal structural impact on remote sensing images, demonstrating excellent invisibility and applicability to various high-precision remote sensing images.

5.4. Efficiency Analysis

Remote sensing images contain massive surface information, and the data size is much larger than ordinary images. Therefore, the impact of algorithm complexity on efficiency must be considered during the use of watermarking algorithms. This study records the embedding and extracting time of each algorithm, as shown in Figure 6. It can be seen that the algorithm in [35] takes the longest time for both embedding and extraction. This is because the algorithm not only embeds robust watermarks in the R and G bands but also embeds fragile watermarks in the B band. In contrast, the watermarking algorithms in references [15,36] only embed a single robust watermark, making their algorithm efficiency significantly better than that of the proposed algorithm and that in reference [35]. The proposed algorithm embeds a dual watermark, and although its time efficiency is not as good as that of the single watermark algorithms, the invisibility experiment in Section 5.3 shows that the proposed algorithm has excellent invisibility, so the time consumption is worthwhile.

5.5. False Positive Test

The watermarking algorithms based on SVD often encounter the problem of false positive results [37,38]. The test results for false positives are shown in Table 3. We applied the watermark extraction algorithm to the original remote sensing images and did not extract any watermark images, thus eliminating the false positive problem.
In this study, the traditional “0, 1” watermark is transformed into an 8-bit depth “0, 255” watermark sequence to increase the size of the watermark’s singular value S w . Additionally, the watermark embedding method is also redesigned based on the singular value relationship of the horizontal component LH, vertical component HL, and high-frequency component HH. The watermark information is embedded by calculating the mean of the singular values of LH and HL and replacing the singular values of HH. This approach prevents the singular value matrix from appearing to be similar in size, thereby resolving the problem of false positives.

5.6. Robustness Analysis

5.6.1. Noise Attacks

Introducing noise into remote sensing images will seriously degrade their quality and clarity, causing substantial alterations in the pixels within the watermark embedding. Attackers often simulate noise based on this mechanism to deliberately disrupt the watermark. Therefore, robust watermarks must exhibit a certain level of resistance to noise. The common noise in remote sensing images includes salt and pepper noise, gaussian noise, and speckle noise. In order to assess the noise resistance of the proposed watermarking algorithm, the watermark information is extracted from the remote sensing image after adding a certain degree of noise, as shown in Figure 7.
It is evident that the watermarking algorithm in [35] can only resist salt and pepper noise. In [35], the algorithm embeds the watermark in the DWT low-frequency coefficients of the R and G bands of the image. However, since noise can significantly alter these coefficients, the extraction performance is poor. The algorithm in [36] undergoes a significant decrease in NC after the noise intensity exceeds 0.005 in the salt and pepper noise attack experiments, indicating that the watermark embedding domain of the algorithm is highly vulnerable to salt and pepper noise. In contrast, this study selects the high-frequency coefficients of DWT as the watermark embedding domain and utilizes the left and right singular matrices to carry a portion of the image noise information. Therefore, the proposed watermarking algorithm can resist all three types of noise, with NC values all above 0.9.

5.6.2. Geometric Attacks

Typical geometric attacks mainly include translation, rotation, and scaling. These attacks mainly affect the watermark extraction by destroying the synchronization relationship both before and after embedding in the domain. Resisting geometric attacks has always been a challenge in remote sensing image watermarking algorithms. To test the resistance of each algorithm to these attacks, this study carries out a certain degree of translation, rotation, and scaling before extracting the watermark. The specific statistical results are depicted in Figure 8. It can be seen that the proposed watermarking algorithm demonstrates strong resistance to all kinds of attacks, and the NC values of the extracted watermarks are all closest to 1. This is due to the fact that this study uses the image moment and affine transformation to correct the remote sensing images, and adopts the entropy to determine the location of the embedding domain. Consequently, the extraction effectiveness of the watermark can be well maintained. Ref. [35] also adopts entropy to determine the embedding domain, which is validated in the figure to have a certain resistance to geometric attacks. However, both [35] and [36] do not provide any ways to counter desynchronization. Consequently, translation and rotation can disrupt the synchronization between the embedding domain and the extraction domain, hence having a significant impact on the efficiency of watermark extraction.

5.6.3. Cropping Attacks

Cropping attacks mainly affect the extraction results of watermarks by removing the areas containing watermark information. Region cropping and feature extraction are frequently performed in practical applications of remote sensing images. Therefore, it is essential to consider the impact of cropping on the watermark during the watermarking algorithm design phase. This study examines the resistance of the proposed watermarking to cropping attacks by testing it on different remote sensing images that have been cropped at various scales. The specific cropping modes are depicted in Table 4.
The results indicate that the proposed algorithm achieved the most stable watermark extraction results. The 4 × 4 blocking strategy used in this study allows for the extraction of complete watermark information, as long as the cropping attack does not destroy all the blocking regions. In contrast, refs. [35,36] transform the entire image and use it as the embedding domain. Therefore, if the cropping ratio is too large or if the cropping includes regions containing the watermark, the extraction effectiveness of the watermark is compromised.

5.6.4. Filtering Attacks

Filtering is a prevalent method used in remote sensing image processing to modify the overall characteristics of an image by applying weightings, averaging, or other operations to the pixels in the image. Filtering plays a crucial role in local enhancement, smoothing, extraction, texture reconstruction, and noise reduction of remote sensing images. Therefore, watermarking algorithms need to be resistant to various filters. In this study, Gaussian, mean, and median filtering were performed on watermarked remote sensing images to test the impact of filtering on the watermarking algorithm. The specific results are shown in Figure 9. The results showed that the proposed algorithm has good resistance to all kinds of filtering. In the mean and median filtering attack experiments, the NC value of the extracted watermark was more than 0.99. In the Gaussian filtering attack experiment, the NC values changed sharply only when the attack strength was more than 2. In contrast, only the algorithm in [36] achieved similar results. For the watermarking algorithm in [35], the watermark extraction was greatly affected because the filtering process smooths the DWT coefficients.

5.6.5. Compression

In many application scenarios, remote sensing images only need to be displayed as images, so data compression is often involved. As a typical lossy compression method, JPEG transfers the remote sensing image into the transform domain and removes the high-frequency information. In this process, the main information is not affected, and the compressed remote sensing image still maintains a sufficient visual quality. Therefore, this compression method is widely used in remote sensing image compression, and its influence must be taken into account in the watermarking algorithm. Figure 10 demonstrates that, among various compression quality factors, only the proposed algorithm and [35] can extract the watermarks in their entirety. This is due to the inherent properties of SVD, which is not prone to data error accumulation and exhibits good data stability. These characteristics ensure that the proposed algorithm can effectively resist various intensities of compression attacks. In contrast, the algorithm in [36] can only extract the complete watermark when the quality factor is less than 60. While [15] achieved the worst watermark extraction results, all of the resulting watermark NC values were above 0.9, indicating good stability.

5.6.6. Affine Transformation

During the processing of remote sensing images, operations such as image registration, map projection transformation, and geometric correction are often performed, all of which involve affine transformations. Therefore, watermark algorithms also need to exhibit a certain level of resistance to affine transformations. In this study, we set B = 0 in the (5), and the specific transformation matrix A is shown in Table 5. The proposed algorithm achieves watermark NC values all above 0.99, which is second only to the extraction effect of [36]. Ref. [15] uses entropy to determine the watermark embedding domain. Although the extracted watermark NC values exceed 0.9, the algorithm’s robustness is constrained by embedding the watermark directly in the DWT low-frequency coefficients. Unlike the approach given in reference [15], this study combines the stability of SVD with DWT, resulting in overall better extraction effectiveness. Ref. [35] exhibited the worst extraction effectiveness in the affine transformation attack experiments. This is because the affine transformation changes the position of the watermark embedding domain, rendering its extraction template ineffective.

5.7. Integrity Authentication

5.7.1. Local Tampering

Common modifications in remote sensing images mainly include content replacement, cropping, pasting, and adding ground elements, which can seriously affect the authenticity and credibility of the image. Therefore, in this study, various sets of remote sensing images were subjected to local area replacement, cropping, pasting, and adding ground elements. Subsequently, the integrity verification capability of the semi-fragile watermark algorithm was tested. The specific tampering locations and detection results are presented in Table 6. The results showed that the integrity authentication watermarking algorithm proposed in this study can not only meet the needs of images with varying bit depths but also accurately identify obvious tampering such as cutting, pasting, and adding ground elements. Furthermore, it demonstrates good fragility towards subtle tampering like local replacement, which is difficult to perceive by the naked eye. This is mainly due to the fact that during these attacks, the integrity information of the corresponding location is also corrupted, and the verification matrix generated by the algorithm no longer matches the extracted integrity watermarking information, thus enabling accurate identification of the tampered region.

5.7.2. Combined Attacks

Remote sensing images undergo a certain degree of data loss or introduce minimal noise during compression and decompression. Additionally, filtering is commonly used to denoise and enhance local image features during usage. These unintentional modifications to the image can potentially affect the recognition of semi-fragile watermarks to varying degrees. Semi-fragile watermarks not only need to exhibit good fragility against malicious tampering but also require a certain level of robustness against unintentional modifications. To verify this point, this study combined various attacks, including noise addition, filtering, and compression, to simulate the image modifications encountered in practical usage scenarios of remote sensing images. The specific attack methods and integrity verification results are presented in the Table 7. The proposed semi-fragile watermarking algorithm performs well under various combined attack conditions. It not only identifies conventional cropping and pasting regions but also accurately detects locally replaced areas that are difficult for the human eye to recognize. This is attributed to the DWT’s excellent local transformation characteristics, enabling accurate differentiation between unaltered and altered regions. QIM represents integrity information using quantized intervals during extraction, allowing the algorithm to accurately extract the watermark even in environments with noise, filtering, and compression.

6. Conclusions

This study proposes a dual watermarking algorithm for remote sensing images that can facilitate both data integrity authentication and copyright protection. The algorithm transforms the remote sensing images from the RGB color space to the YCbCr color space and embeds semi-fragile watermarks and robust watermarks separately in the luminance Y and chrominance Cr components, preventing mutual interference between the dual watermarks and ensuring the invisibility of the watermark algorithm. The algorithm leverages the properties of DWT multi-scale decomposition and localized variations. For the semi-fragile watermark, the algorithm constructs integrity verification watermarks by using Chebyshev chaotic mapping to obtain the mean values of DWT horizontal and vertical components and embeds integrity information into high-frequency areas using QIM. For the robust watermark, the algorithm redesigns the watermark embedding method based on the singular value matrix relationships of horizontal, vertical, and high-frequency components in DWT. Furthermore, it converts the watermark from a “0, 1” sequence to a “0, 255” sequence, amplifying the watermark singular values to avoid false positives in SVD, ensuring resistance to conventional image processing. The experimental results confirmed that this dual watermarking algorithm accurately identifies tampered regions under typical combination attacks and successfully extracts robust watermarks in various image processing scenarios, effectively meeting the practical requirements of remote sensing image usage. However, this study did not resolve the trade-off between the robustness and invisibility of watermarking algorithms. In future research, we will incorporate deep learning and adaptive algorithms to address this issue.

Author Contributions

Conceptualization, J.Z. and X.X.; methodology, J.D.; validation, J.Z., X.X., J.D. and Z.Y.; formal analysis, J.Z., X.X., J.D. and Z.Y.; writing—original draft preparation, J.Z. and X.X.; writing—review and editing, J.Z., X.X., J.D. and Z.Y.; funding acquisition, X.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (Grants NO.42101420).

Data Availability Statement

All of the remote sensing images used in this research are available at “https://www.gscloud.cn/” and https://eocat.esa.int/ (accessed on 22 June 2024). The source code used for this experiment can be found at “https://github.com/Mr7536/Dual-watermarking-of-remote-sensing-images-for-copyright-protection-and-integrity-authentication”.

Acknowledgments

The authors sincerely thank the anonymous reviewers for their insightful critiques, which greatly improved the quality of the paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chen, W.; Zhu, C.; Ren, N.; Seppänen, T.; Keskinarkaus, A. Screen-cam robust and blind watermarking for tile satellite images. IEEE Access 2020, 8, 125274–125294. [Google Scholar] [CrossRef]
  2. Tuia, D.; Ratle, F.; Pacifici, F.; Kanevski, M.F.; Emery, W.J. Active learning methods for remote sensing image classification. IEEE Trans. Geosci. Remote Sens. 2009, 47, 2218–2232. [Google Scholar] [CrossRef]
  3. Comber, A.; Fisher, P.; Brunsdon, C.; Khmag, A. Spatial analysis of remote sensing image classification accuracy. Remote Sens. Environ. 2012, 127, 237–246. [Google Scholar] [CrossRef]
  4. Zhong, X.; Huang, P.-C.; Mastorakis, S.; Shih, F.Y. An automated and robust image watermarking scheme based on deep neural networks. IEEE Trans. Multimed. 2020, 23, 1951–1961. [Google Scholar] [CrossRef]
  5. Wan, W.; Wang, J.; Zhang, Y.; Li, J.; Yu, H.; Sun, J. A comprehensive survey on robust image watermarking. Neurocomputing 2022, 488, 226–247. [Google Scholar] [CrossRef]
  6. Faheem, Z.B.; Ishaq, A.; Rustam, F.; de la Torre Díez, I.; Gavilanes, D.; Vergara, M.M.; Ashraf, I. Image watermarking using least significant bit and canny edge detection. Sensors 2023, 23, 1210. [Google Scholar] [CrossRef]
  7. Xu, D.; Ren, N.; Zhu, C. High-Resolution Remote Sensing Image Zero-Watermarking Algorithm Based on Blockchain and SDAE. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2023, 17, 323–339. [Google Scholar] [CrossRef]
  8. Zhang, J.; Chen, D.; Liao, J.; Ma, Z.; Fang, H.; Zhang, W.; Feng, H.; Hua, G.; Yu, N. Robust Model Watermarking for Image Processing Networks via Structure Consistency. IEEE Trans. Pattern Anal. Mach. Intell. 2024, 1–8. [Google Scholar] [CrossRef]
  9. Azizoglu, G.; Toprak, A.N. A novel reversible fragile watermarking method in DWT domain for tamper localization and digital image authentication. Biomed. Signal Process. Control 2023, 84, 105015. [Google Scholar] [CrossRef]
  10. Shehab, A.; Elhoseny, M.; Muhammad, K.; Sangaiah, A.K.; Yang, P.; Huang, H.; Hou, G. Secure and robust fragile watermarking scheme for medical images. IEEE Access 2018, 6, 10269–10278. [Google Scholar] [CrossRef]
  11. Zhu, P.; Jiang, Z.; Zhang, J.; Zhang, Y.; Wu, P. Remote sensing image watermarking based on motion blur degeneration and restoration model. Optik 2021, 248, 168018. [Google Scholar] [CrossRef]
  12. Heidari, M.; Karimi, S. A novel robust and more secure blind image watermarking for optical remote sensing using dwt-svd and chaotic maps. Opt. Quantum Electron. 2023, 55, 535. [Google Scholar] [CrossRef]
  13. Shivani, S.; Sharma, S.; Saxena, N. An efficient fragile watermarking scheme for tamper localization in satellite images. Comput. Electr. Eng. 2023, 109, 108783. [Google Scholar]
  14. Maeno, K.; Sun, Q.; Chang, S.-F.; Suto, M. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans. Multimed. 2006, 8, 32–45. [Google Scholar] [CrossRef]
  15. Hua, Y.; Xi, X.; Qu, C.; Du, J.; Weng, M.; Ye, B. An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformatio. KSII Trans. Internet Inf. Syst. 2024, 18, 192–210. [Google Scholar]
  16. Zhang, X.; Yan, H.; Zhang, L.; Wang, H. High-resolution remote sensing image integrity authentication method considering both global and local features. ISPRS Int. J. Geo-Inf. 2020, 9, 254. [Google Scholar] [CrossRef]
  17. Wang, X.; Ren, N.; Zhu, C.; Yu, Y. A digital watermarking algorithm based on QR code and quantization DCT for remote sensing image. Geogr. Geo-Inf. Sci. 2017, 33, 19–24. [Google Scholar]
  18. Devi, K.J.; Singh, P.; Dash, J.K.; Thakkar, H.K.; Santamaría, J.; Krishna, M.V.J.; Romero-Manchado, A. A new robust and secure 3-level digital image watermarking method based on G-BAT hybrid Optimization. Mathematics 2022, 10, 3015. [Google Scholar] [CrossRef]
  19. Yuan, G.; Hao, Q. Digital watermarking secure scheme for remote sensing image protection. China Commun. 2020, 17, 88–98. [Google Scholar] [CrossRef]
  20. Rhayma, H.; Makhloufi, A.; Hamam, H.; Hamida, A.B. Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection. Multimed. Tools Appl. 2021, 80, 26813–26832. [Google Scholar] [CrossRef]
  21. Senol, A.; Elbasi, E.; Topcu, A.E.; Mostafa, N. A Semi-Fragile, Inner-Outer Block-Based Watermarking Method Using Scrambling and Frequency Domain Algorithms. Electronics 2023, 12, 1065. [Google Scholar] [CrossRef]
  22. Bolourian Haghighi, B.; Taherinia, A.H.; Monsefi, R. An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network. Cogn. Comput. 2020, 12, 863–890. [Google Scholar] [CrossRef]
  23. Liu, X.-L.; Lin, C.-C.; Yuan, S.-M. Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 2016, 28, 1047–1055. [Google Scholar] [CrossRef]
  24. Ahmadi, S.B.B.; Zhang, G.; Rabbani, M.; Boukela, L.; Jelodar, H. An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl. Intell. 2021, 51, 1701–1732. [Google Scholar] [CrossRef]
  25. Tzouveli, P.; Ntalianis, K.; Kollias, S. Video object watermarking using Hu moments. In Proceedings of the 13th International Conference on Systems, Signals and Image Processing IWSSIP’06, Budapest, Hungary, 21–23 September 2006; p. 6. [Google Scholar]
  26. Mishra, A.; Agarwal, C.; Sharma, A.; Bedi, P. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 2014, 41, 7858–7867. [Google Scholar] [CrossRef]
  27. Zhang, H.; Li, Z.; Liu, X.; Wang, C.; Wang, X. Robust image watermarking algorithm based on QWT and QSVD using 2D Chebyshev-Logistic map. J. Frankl. Inst. 2022, 359, 1755–1781. [Google Scholar] [CrossRef]
  28. Khafaga, D.S.; Karim, F.K.; Darwish, M.M.; Hosny, K.M. Robust zero-watermarking of color medical images using multi-channel Gaussian-Hermite moments and 1D Chebyshev chaotic map. Sensors 2022, 22, 5612. [Google Scholar] [CrossRef]
  29. Qi, X.; Xin, X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J. Vis. Commun. Image Represent. 2015, 30, 312–327. [Google Scholar] [CrossRef]
  30. Qu, C.; Du, J.; Xi, X.; Tian, H.; Zhang, J. A hybrid domain-based watermarking for vector maps utilizing a complementary advantage of discrete fourier transform and singular value decomposition. Comput. Geosci. 2024, 183, 105515. [Google Scholar] [CrossRef]
  31. Su, Q.; Niu, Y.; Zou, H.; Liu, X. A blind dual color images watermarking based on singular value decomposition. Appl. Math. Comput. 2013, 219, 8455–8466. [Google Scholar] [CrossRef]
  32. Zainol, Z.; Teh, J.S.; Alawida, M.; Alabdulatif, A. Hybrid SVD-based image watermarking schemes: A review. IEEE Access 2021, 9, 32931–32968. [Google Scholar]
  33. Li, Y.-M.; Wei, D.; Zhang, L. Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain. Inf. Sci. 2021, 551, 205–227. [Google Scholar] [CrossRef]
  34. Zheng, D.; Liu, Y.; Zhao, J.; Saddik, A.E. A survey of RST invariant image watermarking algorithms. ACM Comput. Surv. (CSUR) 2007, 39, 5-es. [Google Scholar] [CrossRef]
  35. Duan, S.; Wang, H.; Liu, Y.; Huang, L.; Zhou, X. A novel comprehensive watermarking scheme for color images. Secur. Commun. Netw. 2020, 2020, 1–12. [Google Scholar] [CrossRef]
  36. Liu, J.; Huang, J.; Luo, Y.; Cao, L.; Yang, S.; Wei, D.; Zhou, R. An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 2019, 7, 80849–80860. [Google Scholar] [CrossRef]
  37. Run, R.-S.; Horng, S.-J.; Lai, J.-L.; Kao, T.-W.; Chen, R.-J. An improved SVD-based watermarking technique for copyright protection. Expert Syst. Appl. 2012, 39, 673–689. [Google Scholar] [CrossRef]
  38. Hu, H.-T.; Hsu, L.-Y.; Chou, H.-H. An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated. Inf. Sci. 2020, 519, 161–182. [Google Scholar] [CrossRef]
Figure 1. False alarm optimization.
Figure 1. False alarm optimization.
Symmetry 16 00969 g001
Figure 2. Watermark embedding process.
Figure 2. Watermark embedding process.
Symmetry 16 00969 g002
Figure 3. Watermark extraction process.
Figure 3. Watermark extraction process.
Symmetry 16 00969 g003
Figure 4. Experimental datasets. (a) Anhui; (b) Xinjiang; (c) Suzhou; (d) Jinlin; (e) Nanning; (f) Huaian.
Figure 4. Experimental datasets. (a) Anhui; (b) Xinjiang; (c) Suzhou; (d) Jinlin; (e) Nanning; (f) Huaian.
Symmetry 16 00969 g004
Figure 5. Original and scrambled watermarks. (a) Original watermark; (b) scrambled watermark.
Figure 5. Original and scrambled watermarks. (a) Original watermark; (b) scrambled watermark.
Symmetry 16 00969 g005
Figure 6. Efficiency analysis. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Figure 6. Efficiency analysis. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Symmetry 16 00969 g006
Figure 7. The results of noise attacks. (a) Salt and pepper; (b) Gaussian; (c) speckle. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Figure 7. The results of noise attacks. (a) Salt and pepper; (b) Gaussian; (c) speckle. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Symmetry 16 00969 g007
Figure 8. Geometric attack results. (a) Translation; (b) rotation; (c) scaling. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Figure 8. Geometric attack results. (a) Translation; (b) rotation; (c) scaling. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Symmetry 16 00969 g008
Figure 9. The results of a filtering attack. (a) Gaussian filtering; (b) mean filtering; (c) median filtering. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Figure 9. The results of a filtering attack. (a) Gaussian filtering; (b) mean filtering; (c) median filtering. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Symmetry 16 00969 g009
Figure 10. The results of compression attack. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Figure 10. The results of compression attack. Duan et al.+2022 is reference [35]; Liu et al.+2019 is reference [36]; Hua et al.+2024 is reference [15].
Symmetry 16 00969 g010
Table 1. Details of the datasets.
Table 1. Details of the datasets.
Data SetData TypePrecisionBit Depth Bands
AnhuiLandset830m16 Bit7
XinjiangWorldview20.5m16 Bit8
SuzhouGF20.8m16 Bit4
JilinLandset530m8 Bit6
NanningLandset360m8 Bit4
HuaianLandset730m8 Bit6
Table 2. Results of invisibility calculations.
Table 2. Results of invisibility calculations.
IndexDatasetsProposedRef. [35]Ref. [36]Ref. [15]
PSNRAnhui84.09470.53877.21176.594
Xinjiang87.72479.93777.56263.187
Suzhou84.68979.67777.20561.378
Jilin46.42742.02045.42051.043
Nanning45.26240.99843.21150.828
Huaian47.66151.36145.42047.513
SSIMAnhui1.0000.9991.0001.000
Xinjiang1.0001.0000.9991.000
Suzhou1.0001.0000.9991.000
Jilin0.9990.9880.9980.999
Nanning0.9970.9910.9980.999
Huaian0.9960.9860.9980.997
Table 3. False positive test.
Table 3. False positive test.
DatasetsOriginal ImageWatermarked ImageFalse Positive
Problem
AnhuiSymmetry 16 00969 i001
NC = 0.000
Symmetry 16 00969 i002
NC = 0.999
No
XinjiangSymmetry 16 00969 i003
NC = 0.000
Symmetry 16 00969 i004
NC = 0.999
No
SuzhouSymmetry 16 00969 i005
NC = 0.000
Symmetry 16 00969 i006
NC = 1.000
No
JilinSymmetry 16 00969 i007
NC = 0.000
Symmetry 16 00969 i008
NC = 0.999
No
NanningSymmetry 16 00969 i009
NC = 0.000
Symmetry 16 00969 i010
NC = 0.999
No
HaianSymmetry 16 00969 i011
NC = 0.000
Symmetry 16 00969 i012
NC = 0.999
No
Table 4. Crop attack results.
Table 4. Crop attack results.
Attack ModeProposedRef. [35]Ref. [36]Ref. [15]
Symmetry 16 00969 i013Symmetry 16 00969 i014
NC = 0.999
Symmetry 16 00969 i015
NC = 0.941
Symmetry 16 00969 i016
NC = 0.945
Symmetry 16 00969 i017
NC = 0.916
Symmetry 16 00969 i018Symmetry 16 00969 i019
NC = 0.999
Symmetry 16 00969 i020
NC = 0.895
Symmetry 16 00969 i021
NC = 1.000
Symmetry 16 00969 i022
NC = 0.942
Symmetry 16 00969 i023Symmetry 16 00969 i024
NC = 0.999
Symmetry 16 00969 i025
NC = 0.893
Symmetry 16 00969 i026
NC = 1.000
Symmetry 16 00969 i027
NC = 0.936
Symmetry 16 00969 i028Symmetry 16 00969 i029
NC = 0.999
Symmetry 16 00969 i030
NC = 0.761
Symmetry 16 00969 i031
NC = 1.000
Symmetry 16 00969 i032
NC = 0.955
Symmetry 16 00969 i033Symmetry 16 00969 i034
NC = 0.999
Symmetry 16 00969 i035
NC = 0.783
Symmetry 16 00969 i036
NC = 0.897
Symmetry 16 00969 i037
NC = 0.940
Table 5. The results of affine transformation.
Table 5. The results of affine transformation.
Transformation MatrixProposedRef. [35]Ref. [36]Ref. [15]
0.9 0 0 1.1 Symmetry 16 00969 i038Symmetry 16 00969 i039Symmetry 16 00969 i040Symmetry 16 00969 i041
NC = 0.999NC = 0.961NC = 0.966NC = 0.922
1 0.01 0.01 1 Symmetry 16 00969 i042Symmetry 16 00969 i043Symmetry 16 00969 i044Symmetry 16 00969 i045
NC = 0.998NC = 0.565NC = 0.997NC = 0.915
0.9 0.1 0 1 Symmetry 16 00969 i046Symmetry 16 00969 i047Symmetry 16 00969 i048Symmetry 16 00969 i049
NC = 0.995NC = 0.501NC = 1.000NC = 0.904
0.9 0.1 0.1 1.1 Symmetry 16 00969 i050Symmetry 16 00969 i051Symmetry 16 00969 i052Symmetry 16 00969 i053
NC = 0.995NC = 0.481NC = 1.000NC = 0.905
Table 6. Local tampering results.
Table 6. Local tampering results.
Watermarked
Image
Modified
Image
Authentication
Results
Watermarked
Image
Modified
Image
Authentication
Results
Local replacementAdd ground elements
Symmetry 16 00969 i054Symmetry 16 00969 i055Symmetry 16 00969 i056Symmetry 16 00969 i057Symmetry 16 00969 i058Symmetry 16 00969 i059
Symmetry 16 00969 i060Symmetry 16 00969 i061Symmetry 16 00969 i062Symmetry 16 00969 i063Symmetry 16 00969 i064Symmetry 16 00969 i065
Symmetry 16 00969 i066Symmetry 16 00969 i067Symmetry 16 00969 i068Symmetry 16 00969 i069Symmetry 16 00969 i070Symmetry 16 00969 i071
CropPaste
Symmetry 16 00969 i072Symmetry 16 00969 i073Symmetry 16 00969 i074Symmetry 16 00969 i075Symmetry 16 00969 i076Symmetry 16 00969 i077
Symmetry 16 00969 i078Symmetry 16 00969 i079Symmetry 16 00969 i080Symmetry 16 00969 i081Symmetry 16 00969 i082Symmetry 16 00969 i083
Symmetry 16 00969 i084Symmetry 16 00969 i085Symmetry 16 00969 i086Symmetry 16 00969 i087Symmetry 16 00969 i088Symmetry 16 00969 i089
Table 7. Combined attack results.
Table 7. Combined attack results.
Watermarked
Image
Modified
Image
Authentication
Results
Watermarked
Image
Modified
Image
Authentication
Results
0.00001 speckle + 0.1 Gaussian filtering + paste0.0001 salt and pepper + [1 1] mean filtering +add scenery
Symmetry 16 00969 i090Symmetry 16 00969 i091Symmetry 16 00969 i092Symmetry 16 00969 i093Symmetry 16 00969 i094Symmetry 16 00969 i095
[1 1] mean filtering + 0.1 Gaussian filtering + crop90JPEG compression + [1 1] median filtering + paste
Symmetry 16 00969 i096Symmetry 16 00969 i097Symmetry 16 00969 i098Symmetry 16 00969 i099Symmetry 16 00969 i100Symmetry 16 00969 i101
90JPEG + 0.2 Gaussian filtering + add scenery0.0001 salt and pepper noise + [1 1] median filtering + local replacement
Symmetry 16 00969 i102Symmetry 16 00969 i103Symmetry 16 00969 i104Symmetry 16 00969 i105Symmetry 16 00969 i106Symmetry 16 00969 i107
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, J.; Du, J.; Xi, X.; Yang, Z. Chebyshev Chaotic Mapping and DWT-SVD-Based Dual Watermarking Scheme for Copyright and Integrity Authentication of Remote Sensing Images. Symmetry 2024, 16, 969. https://doi.org/10.3390/sym16080969

AMA Style

Zhang J, Du J, Xi X, Yang Z. Chebyshev Chaotic Mapping and DWT-SVD-Based Dual Watermarking Scheme for Copyright and Integrity Authentication of Remote Sensing Images. Symmetry. 2024; 16(8):969. https://doi.org/10.3390/sym16080969

Chicago/Turabian Style

Zhang, Jie, Jinglong Du, Xu Xi, and Zihao Yang. 2024. "Chebyshev Chaotic Mapping and DWT-SVD-Based Dual Watermarking Scheme for Copyright and Integrity Authentication of Remote Sensing Images" Symmetry 16, no. 8: 969. https://doi.org/10.3390/sym16080969

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop