Next Article in Journal
A Novel Early Warning Method for Handling Non-Homogeneous Information
Next Article in Special Issue
Multiple Degradation Skilled Network for Infrared and Visible Image Fusion Based on Multi-Resolution SVD Updation
Previous Article in Journal
Using Matlab/Simulink Software Package to Investigate Fault Behaviors in HVDC System
Previous Article in Special Issue
Dynamic Re-Weighting and Cross-Camera Learning for Unsupervised Person Re-Identification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization

by
Kilari Jyothsna Devi
1,
Priyanka Singh
1,
Jatindra Kumar Dash
1,
Hiren Kumar Thakkar
2,
José Santamaría
3,*,
Musalreddy Venkata Jayanth Krishna
1 and
Antonio Romero-Manchado
4
1
Department of Computer Science and Engineering, SRM University, Amaravati 522240, Andhra Pradesh, India
2
Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar 382007, Gujarat, India
3
Department of Computer Science, University of Jaén, 23001 Jaén, Spain
4
Department of Cartographic Engineering, Geodesy, and Photogrammetry, University of Jaén, 23001 Jaén, Spain
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(16), 3015; https://doi.org/10.3390/math10163015
Submission received: 10 July 2022 / Revised: 12 August 2022 / Accepted: 13 August 2022 / Published: 21 August 2022
(This article belongs to the Special Issue Mathematical Methods in Image Processing and Computer Vision)

Abstract

:
This contribution applies tools from the information theory and soft computing (SC) paradigms to the embedding and extraction of watermarks in aerial remote sensing (RS) images to protect copyright. By the time 5G came along, Internet usage had already grown exponentially. Regarding copyright protection, the most important responsibility of the digital image watermarking (DIW) approach is to provide authentication and security for digital content. In this paper, our main goal is to provide authentication and security to aerial RS images transmitted over the Internet by the proposal of a hybrid approach using both the redundant discrete wavelet transform (RDWT) and the singular value decomposition (SVD) schemes for DIW. Specifically, SC is adopted in this work for the numerical optimization of critical parameters. Moreover, 1-level RDWT and SVD are applied on digital cover image and singular matrices of LH and HL sub-bands are selected for watermark embedding. Further selected singular matrices S L H and S H L are split into 3 × 3 non-overlapping blocks, and diagonal positions are used for watermark embedding. Three-level symmetric encryption with low computational cost is used to ensure higher watermark security. A hybrid grasshopper–BAT (G-BAT) SC-based optimization algorithm is also proposed in order to achieve high quality DIW outcomes, and a broad comparison against other methods in the state-of-the-art is provided. The experimental results have demonstrated that our proposal provides high levels of imperceptibility, robustness, embedding capacity and security when dealing with DIW of aerial RS images, even higher than the state-of-the-art methods.

1. Introduction

The widespread use of the Internet and ever-evolving telecommunications technologies has led to an increase in the sharing of multimedia content, such as audio, video and images. The revolution of social networks, electronic health care systems, electronic commerce and the IoT has further accelerated the exchange of multimedia content through the Internet. Moreover, specific remote sensing (RS) tasks involving aerial images are largely known of, e.g., the transmission of aerial RS images for tracking weather, volcanic eruptions, disaster management and growth of cities or forests, among others [1]. RS images contain sensitive data; therefore, it is necessary to ensure their authenticity and provide copyright protection. There is a high possibility that these contents can be easily hacked and manipulated by unauthorized users. Furthermore, illegal distribution of RS images should be prevented. Therefore, the authenticity, integrity and confidentiality of images is very important. This issue can be addressed by using the digital image watermark (DIW) approach [2]. DIW is the process where a watermark such as text or an image is embedded in a cover image to get a watermarked image. Features such as robustness and imperceptibility are important for efficient watermarking schemes. The term imperceptibility represents the visual quality of the image. If the original and embedded images are the same in terms of visual perception, then it is very unnoticeable. Robustness refers to similarity between the original and extracted watermark images [3].
However, it is very difficult to maintain all of these features (i.e., imperceptibility, robustness and embedding capacity) in a single watermark scheme, and there is always a trade-off between them. To face this, an optimal scaling factor ( Γ ) should be used in the embedding process in order to obtain quality DIW results. In the last decade, an approach called soft computing (SC) [4] has emerged to tackle with the latter issue by proposing near-optimal solutions to complex optimization problems. In particular, nature inspired optimization (NIO) algorithms have become a viable solution to tackle with this problem due to their successful results [5,6]. Our proposal makes use of SC paradigm to derive near-optimal solutions for the scaling factor. Watermark security is also one of the important features to look for in a DIW scheme. The watermark can be embedded in the spatial or spectral domain. During streaming, the security of the watermark is also crucial. To ensure high security, researchers have suggested hashing, compression, Arnold maps and chaotic maps techniques. However, these techniques are either less secure or have high computational costs for encryption and decryption tasks [7].
In the existing literature, limited research has been done to address issues related to the copyright protection, authentication and security problems of remote sensing images. The proposed scheme aims to address the latter limitations of the current DIW method for aerial RS images by providing high imperceptibility, robustness and security with the optimal computational cost. Here, a 3-level watermark security scheme is proposed to achieve high watermark security with a low computational cost. Furthermore, a grasshopper–BAT (G-BAT) hybrid NIO algorithm is proposed for the optimal computation of the scaling factor to balance the trade-off between watermarking characteristics.
The structure of the paper is as follows. Section 2 provides a brief review of the state-of-the-art of DIW, describing several of the contributions and limitations of the current methods in the field. This discussion is followed by the motivation and contribution of the proposed scheme. The proposed scheme is described in detail in Section 3, and Section 4 is focused on its experimental evaluation. Finally, Section 5 provides relevant comments on the results reported as a conclusion and outlines work that may be carried out in the future.

2. Literature Review

As stated, the DIW scheme came into being and has been widely used to secure the copyright of one’s content, such as images, text, audio and video. The initial DIW schemes that exist focused primarily on imperceptibility and robustness by incorporating watermarking in the spatial and spectral domains. In particular, the schemes proposed in [8,9,10] used the spatial domain in order to embed the watermark in the image. In the spatial domain, embedding can be done directly by using pixel values of the image. This gives us high imperceptibility and less robustness. The majority of the researchers proposed methods dealing with DIW from the frequency domain for the watermark embedding [10,11,12,13] to ensure higher robustness and imperceptibility. Furthermore, to increase the imperceptibility and robustness of the watermark scheme, hybrid transformations are suggested [14,15,16,17,18]. For the secure transmission of aerial images in remote sensing applications, some researchers proposed the DIW schemes [19,20,21,22,23]. In order to incorporate a watermark in satellite images, the DIW approach suggested in [19] used a degradation and restoration model and a chaotic map for watermark security.
Furthermore, [20] describes a DWT transform scheme for watermarking remote sensing images. To secure the watermark in this scheme, Arnold cat maps are used. For secure transmission of compressive remote sensing images, a hybrid LWT–Hadamard–ternary watermark sequence DIW scheme is suggested in [21].
A DIW scheme propped in [22] employs a hybrid DWT–HD–SVD transform to safeguard the copyright of landside images. The ideal embedding factor is discovered using particle swarm optimization (PSO) and the firefly optimization approach. Additionally, the step space filling curve-based approach is used to achieve security. The DIW approach suggested in [23] used the scale-invariant feature and wavelet transform to include aerial images for copyright protection.
To balance the trade-offs in the watermark features, a scaling factor (i.e., Γ ) is used for the watermark embedding process. Some of the researchers used a constant scaling factor to optimize all the images [10], which may not work effectively for all kinds of imaging modalities. Therefore, optimization of scaling factor plays a crucial role in the entire DIW process. Specifically, the DIW algorithms proposed in [14,15,16,18] adopted the use of NIO algorithms for scale factor optimization. Nevertheless, despite the good performances of these methods, the results in terms of imperceptibility and robustness can be improved. On the other hand, NIO algorithms alone are not very effective at balancing the exploration and exploitation of algorithm search behavior. Thus, there is a need to develop hybrid optimization algorithms to properly balance the search behavior. Additionally, the security of the watermark has not been given much importance by the field. The methods proposed in [10,15,17,23] have less focus on watermark security, and the schemes proposed in [14,16,19,20,21] used chaotic maps and Arnold maps for watermark security. However, these methods are less secure methods. It is suggested to use a pseudo-random key for watermark encryption in [18], but the computational cost of the key generation process is high. Therefore, developing high security approaches with lower computational costs is both a challenging and needed task.
Motivation and Contributions:
A review of these watermark schemes revealed that the majority of existing DIW schemes have less efficacious embedding scaling factors and overlooked watermark security. To address the security issue, a 3-level watermark security scheme is proposed in this paper to achieve high watermark security with low computational cost, tackling aerial RS images. Furthermore, our proposal is based on the design of a hybrid optimization algorithm for the optimal computation of the scaling factor by using a NIO algorithm, i.e., G-BAT. An outline of the main contribution of our work is as follows:
I. Higher security with low computational cost: Three levels of watermark security, i.e., shuffling, substitution and partitioning, are suggested in the proposed scheme to ensure high watermark security with low computational cost. At the 1st level, row-column-zigzag (RCZ) shuffling is applied to obtain a shuffled watermark. Then, using the Lehmer Random Number Generator (LRNG), substitution is performed on the RCZ random watermark to obtain an encrypted watermark. An additional encrypted watermark is divided into odd and even position pixels for embedding.
II. Scaling factor optimization using hybrid G-BAT: Scale factor optimization using a hybrid NIO-based G-BAT algorithm to balance trade-offs in watermark features and to balance exploration and exploitation search behavior of watermarks.
III. High imperceptibility and robustness: Employment of a hybrid RDWT–SVD transformation for high imperceptibility and robustness. Due to its change-invariant nature, RDWT is resistant to geometric attacks. SVD, on the other hand, is resistant to filtering and noise attacks.
IV. Application area: The proposed DIW scheme is used to address security concerns in the transmission of digital images of aerial RS images over the Internet. Furthermore, it combats various threats in the transmission of RS images, such as copyright protection, copy control and unauthorized access.

3. Materials and Methods

A hybrid RDWT–SVD based DIW scheme is proposed for secure transmission of aerial RS images through digital communications channels. The proposed scheme ensures high robustness, imperceptibility, security and embedding capacity. Section 3.1, Section 3.2, Section 3.3 and Section 3.4 are devoted to elucidate the proposed scheme.The flowchart of the proposed scheme is provided in Figure 1.

3.1. Watermark Embedding

A cover image (C) of size X × Y and a binary watermark (W) of size A × B are considered in the suggested scheme. First, 1-level RDWT is applied on C to decompose it into four sub-bands: LL, LH, HL and HH. Sub-bands LH and HL are chosen for watermark embedding, as they undergo less distortions due to embedding than LL and HH. Since RDWT is shift invariant and avoids downsampling in its sub-bands, each sub-band is of the same size as C. RDWT is more reliable in conveying watermarks with a high embedding capacity by this property. However, it is more vulnerable to noise and filtering attacks. To mitigate this pitfall, the proposed scheme employs a hybrid RDWT-SVD algorithm. SVD is applied on LH and HL, which decomposes into U L H , S L H , V L H , U H L , S H L and V H L sub-matrices, respectively. U L H U H L V L H and V H L represent the column and row orthogonal matrices; and S L H S H L represents singular diagonal matrices. Since the tiny fluctuation in singular values is unlikely to impact the image’s visual perception, the watermark is embedded by altering these singular values that show high robustness. Therefore, S L H and S H L matrices are selected and partitioned into 3 × 3 non-overlapping blocks ( β L H , β H L ) for embedding. To ensure high imperceptibility and robustness, it uses an optimized scaling factor ( Γ ); an encrypted even ( W e ) and odd ( W o ) watermark are embedded using Equations (1) and (2) into diagonal positions of β L H and β H L , respectively. The process of watermark encryption as elucidated in Section 3.3 and scaling factor optimization using G-BAT is described in Section 3.4. Finally, inverse SVD and RDWT are applied to get watermarked image ( C ).
β L H ( k , k ) = β L H ( k , k ) + Γ W e
β H L ( k , k ) = β H L ( k , k ) + Γ W o
where k = 1, 2 and 3; and Γ is optimized scaling factor.
The proposed watermark embedding, encryption and scaling factor optimization are shown in Figure 2. The process of watermark extraction is explained in detail in the next Section 3.2.

3.2. Watermark Extraction

The proposed DIW scheme is blind, as the original image is not required for watermark extraction. The secret keys ( Γ , S L H , S H L , a, m, s) are used in the proposed scheme to extract the watermark from the watermarked image. The watermark extraction process is the reverse of the embedding process. For watermark extraction, RDWT is applied on the watermarked image ( C ) to obtain sub-bands L L , L H , H L and H H . On sub-bands L H and H L , the SVD transform is applied, and it further decomposes into U L H , S L H and V L H ; and U H L , S H L and V H L . Select S L H and S H L and S L H and S H L singular arrays and split them into 3 × 3 non-overlapping blocks ( β L H and β H L ; and β L H , β H L and respectively). The encrypted W e and W o are extracted from β L H and β H L using Equations (3) and (4).
W e = ( β L H ( k , k ) β L H ( k , k ) ) / Γ
W o = ( β H L ( k , k ) β H L ( k , k ) ) / Γ
where k = 1, 2 and 3; and Γ is the optimized scaling factor.
The block diagram for watermark extraction and decryption is shown in Figure 3. The extracted W o and W e are decrypted using a decryption approach, as explained in Section 3.3.2, to obtain the watermark image ( W ). The following subsections describe the watermark encryption and decryption process.

3.3. Watermark Encryption and Decryption

In the transmission of images over the Internet, ensuring the security of the watermark, is very important. In the proposed scheme, the security of the watermark is achieved by using a symmetric cryptographic approach. The proposed scheme ensures watermark security at 3 levels: (1) RCZ shuffle, (2) LRNG substitution and (3) odd-even partitioning.

3.3.1. Watermark Encryption

Shuffling is done along the rows and columns and in a zigzag pattern (RCZ). The Lehmer Random Number Generator (LRNG) is used for the substitution process. Finally, the resulting encrypted watermark is divided into two parts. To secure the watermark, the RCZ is used in conjunction with the LRNG. This provides the encrypted watermark image, which is split into odd and even pixels and embedded in the cover image. In the RCZ shuffling process, initially the shuffling is done along the rows, followed by the columns, and then in a zigzag fashion. The procedural steps for watermark encryption are explained in Algorithm 1, and the 3-level encryption process is explained next.
Algorithm 1: Algorithm for watermark encryption.
Require: Watermark image (W)
Ensure: Even ( W e ) and Odd ( W o ) watermarks
1:
Apply RCZ shuffling process on W to get 1st level encrypted watermark image ( W z ) using the steps from 2 to 4.
2:
Apply row shuffling: Even and odd rows in W is shuffled separately. The ith even row is shuffled to ( i + 2 ) th row and ith odd row is shuffled to ( i + 2 ) th row with a total of M / 2 even, odd rows. Where M is the total number of rows in W and i is in the range of [ 1 , M / 2 ] . The resulting W is W r
3:
Apply column shuffling: The jth even column in W r is shuffled to ( j + 2 ) th column and jth odd column is shuffled to ( j + 2 ) th column with a total of N/2 even, odd columns and j is in the range of [ 1 , N / 2 ] . Where N is the number of columns in W r . The resulting is W c .
4:
Apply zigzag shuffling: The pixels positions in the W c are shuffled in the zigzag manner. Then the final 1st level encrypted W is W z .
5:
Generate a LRNG decimal random series. Furthermore, convert each decimal value in random series with equivalent 8-bit binary format ( R b ).
6:
Then substitute each pixel value in W z with R b using Xor operation to generate final encrypted W ( W L ).
7:
Further partitioning the W L into even ( W e ) and odd ( W o ) pixel positions using Equations (5) and (6).
Initially, in row shuffling, even rows, i.e., row ith, are shuffled into row ( i + 2 ) th, as shown in Figure 4a. Furthermore, similarly, odd rows, i.e., row ith, are shuffled into row ( i + 2 ) th to get W r . Similarly, in column shuffling, odd and even columns are shuffled into W r ; i.e., column jth is shuffled into column ( j + 2 ) th, as shown in Figure 4b, to get W c . In zigzag shuffling, shuffling starts from the position pixel in the upper left corner of the image and traverses the zigzag path at W c , as shown in Figure 4c. The pixels that have been traversed are stored in the one-dimensional array, which is then converted to the 2D array for a mixed watermark ( W z ). Furthermore, W z is substituted using a binary random key ( R b ) generated from LRNG.
LRNG is a pseudo-random number generator used to generate decimal random numbers within a given range. The generation of random series uses LRNG as mentioned in [24]. After generation of the LRNG random string, each member of the string is converted to an equivalent 8-bit binary format to generate a binary random key ( R b ) of size equal to the size of W. Then, W z is combined with R b to get encrypted W ( W L ). Additionally, W L is divided into even ( W e ) and odd ( W o ) position pixels of size ( A × B )/2 using Equations (5) and (6).
k = 1 ( A × B ) / 2 W e ( k ) = i = 1 A j = 1 B W L ( i , j ) , i f m o d ( j , 2 ) = 0 i g n o r e d , O t h e r w i s e
k = 1 ( A × B ) / 2 W o ( k ) = i = 1 A j = 1 B W L ( i , j ) , i f m o d ( j , 2 ) 0 i g n o r e d , O t h e r w i s e
where A × B is the size of W L .
The process of watermark encryption is elucidated with an example in Figure 5a. The process of watermark decryption is explained in the next sub-section.

3.3.2. Watermark Decryption

Watermark decryption is a reverse process to watermark encryption. First, the extracted even ( W e ) and odd ( W o ) position pixels are merged to obtain an encrypted watermark ( W L ). The process of extracting W e and W o from C is explained in Section 3.2. More LRNG random strings are generated using secret keys (a, m, s) and convert them to the equivalent binary format ( R b ). Next, we XOR between W L and R b to get an encrypted watermark of level 1st ( W z ). Furthermore, we apply the RCZ process to get the original watermark ( W ). The watermark decryption process is clarified with an example in Figure 5b.

3.4. Scaling Factor Optimization Using Hybrid G-BAT

DIW characteristics such as imperceptibility, robustness and embedding capacity are always trade-offs in designing a DIW scheme. A good DIW scheme must achieve a balance between the latter three traits. The balancing of these three features is aided by the scaling factor (i.e., Γ ), and using a suitable scaling factor is critical for retrieving quality DIW outcomes. The majority of the researchers recommended using optimization algorithms to find the optimum scaling factor. Specifically, the NIO algorithms, such as evolutionary algorithms (i.e., GA, DE and JAYA) and swarm intelligence (PSO, ABC, grasshopper, Bat, firefly), have been suggested in the last few years. However, a good balance of exploration and exploitation of search behavior for NIO is also critical. In our proposed scheme, a hybrid grasshopper–BAT (G-BAT) optimization algorithm is adopted to reconcile the search behaviors of exploration (search agents are encouraged to move abruptly) and exploitation (search agents tend to move abruptly).
The grasshopper optimization (GO) algorithm is a simple and fast swarm intelligence-based NIO algorithm that mimics the behavior of grasshoppers [25]. In terms of search behavior, GO strikes a good balance between exploration and exploitation, and also avoids getting stuck in local optima. As well as its advantages, it also has some limitations: grasshoppers reach their comfort zones faster, but the swarm does not join a key point, which results in low search accuracy and premature convergence [26]. To address the shortcomings of the GO algorithm and improve convergence rates and search accuracy, the proposed scheme integrates GO with the BAT algorithm. BAT is also a swarm intelligence optimization algorithm based on NIO [27]. The unique feature of the BAT algorithm is that it balances exploration and exploitation behavior through echolocation frequency tuning control and auto-zoom capability. It also has the advantage of requiring parameter control rather than the fixed and preset algorithmic dependent parameters used by many NIO algorithms, allowing automatic switching from exploration to exploitation to reach the optimal solution. Table 1 shows the basic parameters for the optimization of the hybrid G-BAT [28], and Figure 6 shows the flowchart representation for the hybrid G-BAT.
The fitness function used for scaling factor ( Γ ) optimization, as shown in Equation (7).
FF = ( PSNR + SSIM ) / γ + i = 1 K NC ( c ) + i = 1 K BER ( c ) / γ
where PSNR and SSIM are the imperceptibility metrics; NC and BER are robustness metrics; and γ is the chosen population value. K is the number of attacks. In the proposed scheme, an average of K = 6 attacks are considered for FF evaluation. To start the hybrid G-BAT, the swarm (grasshopper) is randomly generated using the swarm generation formula, as shown in Table 1. Then, using Equation (7), fitness values are calculated for all entries in the swarm, and the best grasshopper (minimum fitness value) is chosen for further processing. The position of a grasshopper is updated each time the fitness values of the current and previous grasshopper are compared. If the current fitness value improves over time, the proposed scheme updates the new swarm using GO optimization. BAT optimization, on the other hand, helps in upgrading new swarms. To achieve the best scaling factor ( Γ ), GO and BAT are executed in parallel to encourage swarm information sharing, and as a result, improve search efficiency.

4. Experimental Results and Discussion

This section is devoted to reporting about the performance of the proposed DIW method. Specifically, our proposal is evaluated according to terms of imperceptibility, robustness and security. The experiments were carried out in the MATLAB 2014b environment. A cover image of size 256 × 256 and a binary watermark of size 64 × 64 were considered for the generation of experimental results. Aerial RS and general cover test images and watermark were taken from the USC-SIPI [29] and Kaggle [30] dataset, as shown in Figure 7 and Figure 8.

4.1. Imperceptibility Test

The visual quality of the original and embedded images is identical and is called imperceptibility. It is very important to maintain high imperceptibility for watermarked images. First, the imperceptibility performance of the proposed scheme for gray-scale cover images of different modalities is evaluated, as shown in Figure 7. Subjective analysis of the cover and the watermarked image in Figure 7 shows that both images are identical. Furthermore, the watermark extracted under zero attacks is clearly visible. In addition, the objective analysis of imperceptibility was performed using PSNR and SSIM. The relationships used for PSNR and SSIM are given in Equations (8) and (10), respectively.
PSNR = 10 l o g 10 255 2 MSE
MSE = 1 X × Y i = 1 X j = 1 Y C ( i , j ) C ( i , j ) 2
SSIM = l ( C , C ) . b ( C , C ) . s ( C , C )
l ( C , C ) = 2 μ C × μ C μ C 2 + μ C 2
b ( C , C ) = 2 σ C × σ C σ C 2 × σ C 2
s ( C , C ) = σ C C 1 σ C × σ C
where C and C are cover and watermarked images; X × Y are the sizes of cover and watermarked images. μ C and μ C are means of C and C : σ C 2 . σ C 2 is the variance of C and C . σ C C 1 is the covariance of C and C .
The imperceptibility performance of the proposed scheme was analyzed for general images with random scale factor ( Γ = 0.9); the scale factor was optimized using GO, BAT and the proposed hybrid G-BAT, and the corresponding PSNR and SSIM values are shown in Table 2. In Table 2, it can be seen that for all gray-scale and color cover images, the PSNR > exceeds the threshold value of 37 dB. Furthermore, SSIM is equal to the ideal value 1 using random Γ and optimized Γ using GO, BAT and hybrid G-BAT. The result presented in Table 2 indicates greater imperceptibility of the proposed scheme for general images.
In addition, the imperceptibility performance of our proposal was analyzed for 30 aerial images (gray-scale and color) with random Γ and Γ optimized by GO, BAT and G-BAT. The corresponding PSNR and SSIM values are presented in Table 3. In Table 3, it can be seen that PSNR and SSIM for the 30 aerial images using random Γ and with GO, BAT and G-BAT are higher than the threshold values. With random Γ , the proposed scheme shows the ideal value of PSNR for all the color images. The proposed DIW method also shows the ideal SSIM value for all the images with random Γ and with optimized Γ . Therefore, our proposal shows higher imperceptibility even if it uses random Γ , and an ever higher value of PSNR for optimized Γ , while keeping the SSIM value at 1 for all the images with different Γ . Therefore, our method demonstrated high imperceptibility for both aerial RS and conventional images.

4.2. Robustness Test

Robustness is another important requirement of the watermark scheme. Ideally, the original and extracted watermark should be identical. The robustness performance of the proposed scheme was analyzed using NC and BER metrics. The relationship between NC and BER is shown in Equations (11) and (12).
NC = i = 1 A j = 1 B W ( i , j ) W ( i , j ) 2 i = 1 A j = 1 B W ( i , j ) 2 × i = 1 A j = 1 B W ( i , j ) 2
where W and W are original and extracted watermarks.
BER = EB TB
EB = c o u n t e r + 1 i f i = 1 A j = 1 B W ( i , j ) W ( i , j ) 0 o t h e r w i s e
TB = A × B
where EB represents the number of incorrectly decoded bits in the extracted watermark, TB represents the total number of bits and the initial value of the counter = 0.
The robustness of our proposal was evaluated on 30 aerial RS images taken from the USC-SIPI [29] and Kaggle [30] datasets, as shown in Figure 8. The corresponding parameters NC, BER below zero random Γ attacks and optimized Γ (GA, BAT, G-BAT) are tabulated in Table 3. For the 30 aerial RS images, the proposed method shows a value of NC above the threshold and BER below the threshold with random Γ and optimized Γ . When compared to random Γ and optimized Γ , it can be observed that the robustness improves with optimized Γ . NC values are highest and BER is lowest with Γ optimized using the proposed G-BAT for all the aerial RS images. This observation demonstrates that greater robustness is achieved by using Γ optimized using G-BAT.
In addition, the robustness performance of the proposed scheme (under zero attack) was analyzed for the general images shown in Figure 7 and the corresponding NC. The BER is tabulated in Table 4 with random Γ , and with optimized Γ using GO, BAT and hybrid G-BAT. In Table 4 it can be seen that, with random Γ = 0.9 NC for all gray-scale and color images, the threshold value is above 0.7 [31], and the BER is less than the threshold value 0.5. To improve the robustness of the proposed scheme, the optimized Γ was built using GO, BAT and NC. The BER values are tabulated in Table 4. With the use of GO, the robustness of BAT was improved over the random Γ . For all gray-scale and color images, NC and BER with hybrid G-BAT are almost equal to the ideal value(s) of 1.0. As can be seen in Table 4, the proposed hybrid G-BAT improved the robustness performance (under zero attack) for gray-scale and color images from 0.92 to 0.99 and from 0.91 to 0.99, respectively. As can be seen in Table 2 and Table 3, using optimized Γ shows a lower value PSNR than using random Γ , and keeps PSNR higher than threshold value 37 dB and the corresponding NC. BER reached the ideal value (1.0), as shown in Table 3 and Table 4. Numerical comparisons of NC and BER for the 10 test aerial RS images with random Γ and optimized Γ are shown in Figure 9 and Figure 10, respectively. It can be seen that the hybrid G-BAT Γ demonstrates greater robustness than the other optimized Γ . Thus, as revealed in Table 2, Table 3 and Table 4 and Figure 9 and Figure 10, the hybrid G-BAT approach balances the trade-offs in the characteristics of DIW (i.e., imperceptibility and robustness).
The robustness performance of the proposed scheme under attacks was analyzed with random Γ and with optimized Γ using GO, BAT and G-BAT. The corresponding values of NC and BER are tabulated in Table 5 and Table 6. In Table 5 and Table 6 it can be seen that, under all attacks, G-BAT using optimized Γ shows a higher value of NC and BER than considering random Γ , or Γ optimized with GO or BAT.
In addition, the robustness of the proposed scheme was examined on three watermarked sampled aerial RS images against various image processing attacks, such as filtering attacks, sniffing attacks, compression and cut-off attacks with Γ optimized using G-BAT. Our proposal is robust against filtering, noise and some geometric attacks, since its NC and BER values (see Table 7) are higher than threshold values for all images (Img1, 2.1.01, 2.1.02). The proposed method revealed limited robustness performance on rotation, clipping and scaling attacks with random Γ . However, the robustness improves with Γ optimized using the proposed hybrid G-BAT. This observation demonstrates the effectiveness of using our proposal using the hybrid G-BAT to achieve higher robustness against most attacks, and higher stealth performance. Therefore, our design of G-BAT shows more imperceptibility and robustness.

4.3. Security Test

The security of the proposed encryption approach was tested using the correlation coefficient (CC) and entropy metrics [32] on five binary test images, and the experimental results are shown in Table 8. The value of CC between any two images is in the range from −1 to 1. If the value of CC is 1, it means that both images are identical, and if the value of CC is 0, it stands that both images are irrelevant. Otherwise, both images are negatively or positively correlated. In Table 8 it can be seen that, for all test images, the values of CC between the original encrypted images in the horizontal, vertical and diagonal directions are less than −0.6. The latter indicates that both the original and encrypted images are negatively correlated. When the value of CC between original and decrypted images is 1, it indicates that they are identical. Additionally, security performance is analyzed by entropy, as shown in Table 8. For all test images, the entropy value of the encrypted image is higher than that of the original image. This also indicates that the proposed method generates an encrypted image with different entropies. From the above discussion, it can be stated that the proposed 3-level encryption scheme generates stronger encryption images and decrypts successfully as well.

4.4. Computational Time

Computational time is the amount of time required to complete an embedding and extraction process. Computational times for the embedding and extraction in seconds for different test images are tabulated in Table 9. In Table 9, it can be seen that the embedding and extraction times for all gray-scale images were less than 0.16 and 0.07 s, and for the color images they were less than 0.26 and 0.09 s, respectively. The variation in gray-scale and color images was minimal. Therefore, the computational time of our DIW method can be considered minimal, since the watermark was embedded and extracted in less than 0.3 and 0.09 s, respectively.

4.5. Comparative Study

In this section, the performance of the proposed DIW method is compared against those considered state-of-the-art in terms of imperceptibility, robustness, embeddability and security: Ali and Nasab [14], Preethi and Kishore [15], Zhu et al. [16], Ali [17] and Singh et al. [18]. Ali and Nasab [14] proposed a SWT and SURF transformation method for robust image transmission. The Arnold map was suggested for security and BAT optimization for scaling factor optimization. An ABC optimization method was proposed by Preethi and Kishore [15] in the DWT+DCT domain for robust image transmission. The IWT+SVD hybrid was suggested by Zhu et al. [16]. In particular, GA is used to optimize the scaling factor and affine transformation for security. Ali [17] proposed the DWT+SVD DIW scheme for robust image transmission. Recently, Singh et al. [18] contributed a IWT+SVD method in the hybrid domain for robust image transmission. This latter scheme uses a pseudo-random key for encryption. A comparative overview against other state-of-the-art methods is explained in Table 10. In Table 10 it can be seen that the DIW scheme proposed in [15,17] has overlooked watermark security, and the schemes proposed in [14,16] uses the Arnold map and Affine transformations for safety. The Arnold map and affine transformations provide less security and can be easily cracked. The scheme proposed in [18] uses a pseudo-random key approach for encryption, and the key is generated with high computational cost. Our proposed scheme guarantees security at three levels, shuffling, substitution and partitioning, at a low computational cost. Compared to the state-of-the-art methods proposed in [14,15,16,17], our proposal of encryption scheme shows better watermark security. Compared to the scheme in [18], our scheme provides high security at a low computational cost. Moreover, the method proposed in this paper provides a higher incorporation capacity than all other next-generation schemes ([14,15,16,17,18]), as analyzed in Table 10.
Furthermore, the imperceptibility performance of our DIW method was tested with the comparison schemes for Lena and Baboon, as shown in Figure 11. The PSNR of the Lena and the Baboon images treated with the proposed method are higher than those of all tested schemes [14,15,16,17,18]. The robustness performance under zero attacks is shown in Figure 12. In Figure 12, it can be seen that the our DIW scheme has a higher NC than the scheme presented in [16], and it has an almost equal NC to the schemes of [14,15,16,18]. The additional robustness of our proposal was tested under different image processing attacks, such as Gaussian filter (GF), median filter (MF), sharpness (SHARP), salt and pepper noise (SP), histogram equivalent (HQ), gamma correction (GC) and JPEG compression (JPEG), as shown in Figure 13.
In Figure 13, it can be seen that the proposed method shows greater robustness when considering filter attacks (GF, MF, and SHARP) than the schemes in [16,17]. Additionally, it shows robustness performance almost equal to those of the schemes proposed in [14,15,18]. For JPEG attack, the proposed scheme had better performance than the schemes of [14], but lagged in comparison to the schemes presented in [15,16,17]. However, the proposed scheme had an NC ≈ 0.92, indicating higher robustness against JPEG attack. For noise attacks, the proposed scheme showed greater robustness than the schemes proposed in [16,18] and was almost equally robust as the schemes proposed in [14,15,17]. The proposed scheme showed limited performance against noise attacks, which can be seen as future work. For HQ and GC attacks, the proposed scheme is superior to the schemes in [14,15,16,18]. The comparative analysis revealed that the proposed scheme reports higher than or the same robustness as the other schemes. Furthermore, it revealed high imperceptibility, embedding ability and security compared to the other schemes ([14,15,16,17]).
The scheme of Singh et al. [18] showed higher imperceptibility, robustness and embedding capacity with an adaptively generated ISF scaling factor. Moreover, the authors suggested using NIO algorithms (GA, ABC and FO) to improve watermarking characteristics. The GA approach showed higher imperceptibility and robustness. For a fair comparison, in this paper, GA generated PSNR and NC values according to those in Singh et al. [18]. As shown in Figure 11 and Table 10, the PSNR and the embedding capacity of our proposed DIW method are higher than those of the scheme [18]. The computational times for the embedding and extraction process of Singh et al. [18] and our proposal for different images (Lena, Baboon and Koala) are analyzed next. The scheme of Singh et al. [18] achieved embedding times of (in seconds) 1.919606, 1.465614 and 1.378239 s for Lena, Baboon and Koala images, respectively, whereas our method took 0.150429, 0.269723, 0.240605 s. Likewise, the computational times by the method of Singh et al. [18] regarding extraction were 1.056093, 0.915152 and 0.98756 s, whereas our proposal achieved 0.055273, 0.095462 and 0.077382 s for the same images. From this, it can be seen that our proposal takes less time to embed and extract images for all those images. Therefore, the computational time reported by our hybrid G-BAT DIW method is lower than that of the GA-based method in [18]. Moreover, our method brings NC closer to the ideal value. From the above observations and discussions, it can be stated that the proposed scheme outperformed all the state-of-the-art methods in [14,15,16,17,18].

5. Conclusions and Future Work

In this article, a RDWT-SVD-based DIW scheme was proposed for secure transmission of aerial remote sensing images on the Internet. A hybrid G-BAT optimization algorithm was proposed for optimizing the scaling factor ( Γ ). An optimized scaling factor was used as an embedding advantage for watermark embedding to balance the watermarking characteristics trade-off. Further, to ensure high watermark security at with little computation, a 3-level encryption approach was proposed. The performance of the proposed DIW scheme was analyzed with random Γ , optimized Γ (using NIO algorithms, i.e., GO and BAT) and optimized Γ using the proposed hybrid G-BAT. Experimental results show that the proposed DIW scheme has superior imperceptibility and robustness with the Γ obtained by G-BAT optimization. Thus, the proposed scheme effectively balances watermarking characteristics. It was observed that original and encrypted watermarks were highly uncorrelated, whereas original and decrypted watermarks were highly correlated, indicating higher watermark security. Furthermore, the performance of the proposed scheme has been compared with those of recent state-of-the-art DIW schemes. The proposed DIW scheme reported comparatively higher performance in terms of imperceptibility, robustness, security and embedding capacity. Experimental results and a comparative study validated the effectiveness of the proposed DIW scheme. It can be successfully used for for copyright protection, ownership verification, image authentication and image security when remote sensing images are transferred over the Internet. The proposed scheme has limited robustness against geometric attacks such as rotation and clipping attacks. Improving the robustness of the proposed scheme against geometric attacks could be seen as future research work.

Author Contributions

Conceptualization and methodology, K.J.D., P.S., H.K.T., J.S. and J.K.D.; software, K.J.D. and P.S.; validation and formal analysis, H.K.T., J.S., J.K.D. and A.R.-M.; investigation and resources, P.S., K.J.D. and M.V.J.K.; writing original draft preparation, P.S. and K.J.D.; writing review and editing, J.S., H.K.T., J.K.D. and A.R-M.; supervision, P.S., H.K.T., J.S. and M.V.J.K.; project administration, P.S., K.J.D. and H.K.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jiang, H.; Peng, M.; Zhong, Y.; Xie, H.; Hao, Z.; Lin, J.; Ma, X.; Hu, X. A Survey on Deep Learning-Based Change Detection from High-Resolution Remote Sensing Images. Remote Sens. 2022, 14, 1552. [Google Scholar] [CrossRef]
  2. Evsutin, O.; Dzhanashia, K. Watermarking schemes for digital images: Robustness overview. Signal Process. Image Commun. 2022, 100, 116523. [Google Scholar] [CrossRef]
  3. Zainol, Z.; Teh, J.S.; Alawida, M. Alabdulatif A Hybrid SVD-based image watermarking schemes: A review. IEEE Access 2021, 9, 32931–32968. [Google Scholar]
  4. Gendreau, M.; Potvin, J.Y. (Eds.) Handbook of Metaheuristics; Springer: New York, NY, USA, 2010; Volume 2.9. [Google Scholar]
  5. Singh, O.P.; Singh, A.K.; Srivastava, G.; Kumar, N. Image watermarking using soft computing techniques: A comprehensive survey. Multimed. Tools Appl. 2021, 80, 30367–30398. [Google Scholar] [CrossRef]
  6. Khanduja, N.; Bhushan, B. Recent advances and application of metaheuristic algorithms: A survey (2014–2020). In Metaheuristic and Evolutionary Computation: Algorithms and Applications; Springer: Singapore, 2021; pp. 207–228. [Google Scholar]
  7. Shankar, R.; Vara Prasad, R.U.; Adiraju, R.V.; Krishna, R.V.; Nandan, D. A Review Paper Based on Image Security Using Watermarking. In Proceedings of the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, Hyderabad, India, 28–29 March 2021; Springer: Singapore, 2021; pp. 697–706. [Google Scholar]
  8. Su, Q.; Liu, D.; Yuan, Z.; Wang, G.; Zhang, X.; Chen, B.; Yao, T. New rapid and robust color image watermarking technique in spatial domain. IEEE Access 2019, 7, 30398–30409. [Google Scholar] [CrossRef]
  9. Abraham, J.; Paul, V. An imperceptible spatial domain color image watermarking scheme. J. King Saud. Univ.-Comput. Inf. Sci. 2019, 31, 125–133. [Google Scholar] [CrossRef]
  10. Kunhu, A.; Mansoori, S.A.; Al-Ahmad, H. A Novel Reversible Watermarking Scheme Based on SHA3 for Copyright Protection and Integrity of Satellite Imagery. Int. J. Comput. Sci. Netw. Secur. 2019, 19, 92–102. [Google Scholar]
  11. Mahmoud, K.; Datta, S.; Flint, J. Frequency Domain Watermarking: An Overview. Int. Arab J. Inf. Technol. 2005, 2, 33–47. [Google Scholar]
  12. Kang, X.; Chen, Y.; Zhao, F.; Lin, G. Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft Comput. 2020, 24, 10561–10584. [Google Scholar] [CrossRef]
  13. Tewari, T.K.; Saxena, V. An improved and robust DCT based digital image watermarking scheme. Int. J. Comput. Appl. 2020, 3, 28–32. [Google Scholar] [CrossRef]
  14. Pourhadi, A.; Mahdavi-Nasab, H. A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimed. Tools Appl. 2020, 79, 21653–21677. [Google Scholar] [CrossRef]
  15. Garg, P.; Kishore, R.R. An efficient and secured blind image watermarking using ABC optimization in DWT and DCT domain. Multimed. Tools Appl. 2021, 1–18. [Google Scholar]
  16. Zhu, T.; Qu, W.; Cao, W. An optimized image watermarking algorithm based on SVD and IWT. J. Supercomput. 2021, 78, 222–237. [Google Scholar] [CrossRef]
  17. Alzahrani, A. Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD. Appl. Bionics Biomech. 2022, 2022, 5271600. [Google Scholar] [CrossRef] [PubMed]
  18. Singh, P.; Devi, K.J.; Thakkar, H.K.; Santamaría, J. Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness. Entropy 2021, 23, 1650. [Google Scholar] [CrossRef]
  19. Zhu, P.; Jiang, Z.; Zhang, J.; Zhang, Y.; Peng, W. Remote sensing image watermarking based on motion blur degeneration and restoration model. Optik 2021, 248, 168018. [Google Scholar] [CrossRef]
  20. Yuan, G.; Hao, Q. Digital watermarking secure scheme for remote sensing image protection. China Commun. 2020, 17, 88–98. [Google Scholar] [CrossRef]
  21. Tong, D.; Ren, N.; Zhu, C. Secure and robust watermarking algorithm for remote sensing images based on compressive sensing. Multimed. Tools Appl. 2019, 78, 16053–16076. [Google Scholar] [CrossRef]
  22. Mohan, A.; Anand, A.; Singh, A.K.; Dwivedi, R.; Kumar, B. Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput. Electr. Eng. 2021, 95, 107385. [Google Scholar] [CrossRef]
  23. Hsu, P.H.; Chen, C.C. A robust digital watermarking algorithm for copyright protection of aerial photogrammetric images. Photogramm. Rec. 2016, 31, 51–70. [Google Scholar] [CrossRef]
  24. Mascagni, M.; Srinivasan, A. Algorithm 806: SPRNG: A scalable library for pseudorandom number generation. ACM Trans. Math. Softw. (TOMS) 2000, 26, 436–461. [Google Scholar] [CrossRef]
  25. Saremi, S.; Mirjalili, S.; Lewis, A. Grasshopper optimisation algorithm: Theory and application. Adv. Eng. Softw. 2017, 105, 30–47. [Google Scholar] [CrossRef] [Green Version]
  26. Ewees, A.A.; Elaziz, M.A.; Houssein, E.H. Improved grasshopper optimization algorithm using opposition-based learning. Expert Syst. Appl. 2018, 112, 156–172. [Google Scholar] [CrossRef]
  27. Yang, X.-S.; He, X. Bat algorithm: Literature review and applications. Int. J. Bio-Inspired Comput. 2013, 5, 141–149. [Google Scholar] [CrossRef] [Green Version]
  28. Yang, X.S. A New Metaheuristic Bat-Inspired Algorithm. In Nature-Inspired Cooperative Strategies for Optimization (NICSO 2010); Studies in Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2010; pp. 65–74. [Google Scholar]
  29. The USC-SIPI Image Database. Available online: https:/sipi.usc.edu/database/ (accessed on 20 January 2022).
  30. The Kaggle Image Database. Available online: https://www.kaggle.com/datasets (accessed on 20 January 2022).
  31. Rao, Y.R.; Prathapani, N.; Nagabhooshanam, E. Application of normalized cross correlation to image registration. Int. J. Res. Eng. Technol. 2014, 3, 12–16. [Google Scholar]
  32. Balaska, N.; Ahmida, Z.; Belmeguenai, A.; Boumerdassi, S. Image encryption using a combination of Grain-128a algorithm and Zaslavsky chaotic map. IET Image Process. 2020, 14, 1120–1131. [Google Scholar] [CrossRef]
Figure 1. Flowchart of the proposed scheme.
Figure 1. Flowchart of the proposed scheme.
Mathematics 10 03015 g001
Figure 2. Block diagram for watermark encryption and embedding.
Figure 2. Block diagram for watermark encryption and embedding.
Mathematics 10 03015 g002
Figure 3. Block diagram for watermark extraction and decryption.
Figure 3. Block diagram for watermark extraction and decryption.
Mathematics 10 03015 g003
Figure 4. RCZ shuffling.
Figure 4. RCZ shuffling.
Mathematics 10 03015 g004
Figure 5. Three-level watermark encryption and decryption process.
Figure 5. Three-level watermark encryption and decryption process.
Mathematics 10 03015 g005
Figure 6. Flowchart of scaling factor ( Γ ) optimization using G-BAT.
Figure 6. Flowchart of scaling factor ( Γ ) optimization using G-BAT.
Mathematics 10 03015 g006
Figure 7. Gray-scale cover images (16) with corresponding watermark images (af) and extracted watermark images (IVI). Color cover images (712) with corresponding watermark images (gl) and extracted watermark images (VIIXII) under zero attacks.
Figure 7. Gray-scale cover images (16) with corresponding watermark images (af) and extracted watermark images (IVI). Color cover images (712) with corresponding watermark images (gl) and extracted watermark images (VIIXII) under zero attacks.
Mathematics 10 03015 g007
Figure 8. Aerial images (gray-scale images (115), color images (1630)) with corresponding watermarked images (gray-scale watermarked images (ao), color watermarked images (a 1 o 1 )) and extracted watermark images (IXV,I 1 XV 1 ).
Figure 8. Aerial images (gray-scale images (115), color images (1630)) with corresponding watermarked images (gray-scale watermarked images (ao), color watermarked images (a 1 o 1 )) and extracted watermark images (IXV,I 1 XV 1 ).
Mathematics 10 03015 g008
Figure 9. NC for the 10 test aerial cover images with random Γ , with GO, with BAT and with G-BAT under zero attacks.
Figure 9. NC for the 10 test aerial cover images with random Γ , with GO, with BAT and with G-BAT under zero attacks.
Mathematics 10 03015 g009
Figure 10. BER for the 10 test aerial cover images with random Γ , with Go, with BAT and with G-BAT under zero attacks.
Figure 10. BER for the 10 test aerial cover images with random Γ , with Go, with BAT and with G-BAT under zero attacks.
Mathematics 10 03015 g010
Figure 11. PSNR comparison of our method against state-of-the-art methods for Lena and Baboon images.
Figure 11. PSNR comparison of our method against state-of-the-art methods for Lena and Baboon images.
Mathematics 10 03015 g011
Figure 12. NC comparison of our method against state-of-the-art methods for Lena and Baboon images under zero attacks.
Figure 12. NC comparison of our method against state-of-the-art methods for Lena and Baboon images under zero attacks.
Mathematics 10 03015 g012
Figure 13. Robustness comparison of our method against those in the state-of-the-art for the Lena image under attacks.
Figure 13. Robustness comparison of our method against those in the state-of-the-art for the Lena image under attacks.
Mathematics 10 03015 g013
Table 1. List of basic parameters for hybrid G-BAT.
Table 1. List of basic parameters for hybrid G-BAT.
ParameterInitial Value
Maximum Number of iterations (MNI)30
Swarm size (SZ)25
Swarm_minval (min)0.001
Swarm_maxval (max)MNI
Swarm generationSP = min + (max − min) × rand(SZ,1)
Termination conditionMNI
Loudness (l)1
Pulse rate (r0)1
Alpha0.97
Gamma0.1
Freq-min0
Freq-max2
Table 2. PSNR and SSIM for general images (gray-scale and color) with random Γ = 0.9 and optimized Γ using GO, BAT and G-BAT.
Table 2. PSNR and SSIM for general images (gray-scale and color) with random Γ = 0.9 and optimized Γ using GO, BAT and G-BAT.
Gray-Scale Images
ImageWith Random Γ = 0.9With GOWith BATWith G-BAT
PSNRSSIMPSNRSSIMPSNRSSIMPSNRSSIM
Baboon89.03180.87179.64159.741
Lena89.35175.67177.92159.611
Cameraman89.66181.47181.03160.821
Pirate89.21170.84166.37169.261
Living room88.98173.96175.82156.921
MRI Brain89.42174.29172.71162.851
Color Images
ImageWith Random Γ = 0.9With GOWith BATWith G-BAT
PSNRSSIMPSNRSSIMPSNRSSIMPSNRSSIM
BaboonInf188.43185.92164.271
LighthouseInf186.45187.27171.761
PeppersInf184.23179.26159.321
SplashInf181.59180.75165.281
KoalaInf189.65188.62174.241
SkinInf179.27176.29158.291
Table 3. PSNR, SSIM, NC and BER (under zero attack) with random Γ = 0.9 and Γ optimized using GO, BAT and G-BAT for 30 aerial RS (gray-scale and color) images taken from USC-SIPI [29] and Kaggle [30] datasets.
Table 3. PSNR, SSIM, NC and BER (under zero attack) with random Γ = 0.9 and Γ optimized using GO, BAT and G-BAT for 30 aerial RS (gray-scale and color) images taken from USC-SIPI [29] and Kaggle [30] datasets.
USC-SIPI [29] Dataset Images
ImageWith Random Γ With GOWith BATWith G-BAT
PSNRSSIMNCBERPSNRSSIMNCBERPSNRSSIMNCBERPSNRSSIMNCBER
Img187.5510.97890.033281.6310.99190.032775.2810.99310.008966.3710.99960.0006
Img287.2410.97970.037180.2910.99130.029876.1610.99420.009468.5010.99990.0002
Img387.3210.97960.037482.8210.98930.030177.1310.99320.008564.35110.0002
Img487.1410.97980.037181.4910.99030.028675.2010.99490.006566.1810.99980.0004
Img587.0410.97970.037479.9510.99110.020568.5110.99410.005762.1910.99980.0004
Img687.1710.97980.037181.6310.98530.030272.6110.99420.008563.2810.99990.0002
Img787.0610.97990.037182.6210.98680.031571.2810.99210.018759.9310.99990.0002
Img887.1910.97970.037178.7610.99030.025176.2510.99380.008360.1810.99990.0002
Img987.0810.97990.037180.6110.98620.025377.5110.99170.017667.9210.99990.0002
Img1087.1310.97980.037182.4910.98270.021777.6910.99290.012969.1610.99990.0002
Img1186.9110.98000.037179.9510.99180.020376.2710.99030.019364.2910.99990
Img1287.0910.97990.037180.6210.98940.029674.1810.99310.015358.9310.99980.0004
Img1387.0710.97990.037181.5910.99050.022972.1210.99410.013663.5910.99990.0002
Img1487.1410.97970.037178.2710.98930.030174.1810.99050.024161.7310.99970.0004
Img1587.0910.97980.037179.2710.97990.029874.1410.98480.025360.3710.99950.0012
Kaggle [30] Dataset Images
ImageWith Random Γ With GOWith BATWith G-BAT
PSNRSSIMNCBERPSNRSSIMNCBERPSNRSSIMNCBERPSNRSSIMNCBER
2.1.08Inf10.96920.050389.2810.98190.034179.1710.99250.019472.1810.99970.0008
2.1.09Inf10.96820.050387.1810.98250.036181.2810.99310.016278.9210.99950.0012
2.1.10Inf10.97030.050388.2110.98630.031483.2110.99260.012374.1910.99960.0012
2.1.11Inf10.97200.050389.7110.98270.031682.8410.99160.011370.1710.99950.0013
2.1.12Inf10.96990.050388.6110.98510.038182.8110.99260.020275.7210.99930.0018
2.2.01Inf10.97180.050387.1910.99020.030281.2710.99310.016772.1610.99940.0018
2.2.02Inf10.96550.050384.8110.98520.039579.7410.99180.020668.2810.99920.0011
2.2.03Inf10.96600.050389.7110.97930.042682.6510.98620.018476.1310.99920.0010
2.2.04Inf10.96990.050388.0110.97950.039781.5410.98940.018378.6310.99930.0014
2.2.05Inf10.97180.050388.9210.98040.039983.1810.98750.026775.7310.99930.0010
2.2.06Inf10.96710.050389.9010.98070.040384.2810.98830.020474.8210.99920.0012
2.2.07Inf10.96780.050385.1010.97890.029479.2710.98260.019671.3310.99930.0011
2.2.08Inf10.97170.050384.8210.98210.039175.1910.99040.027169.3710.99940.0008
2.2.09Inf10.96690.050382.6410.97490.039677.2610.98270.029268.6510.99930.0012
2.2.10Inf10.96520.050381.6210.97290.039279.8610.98260.0289272.4810.99920.0016
Table 4. NC and BER for normal (gray-scale and color images) images with random Γ = 0.9 and with optimized Γ using GO, BAT and G-BAT under zero attacks.
Table 4. NC and BER for normal (gray-scale and color images) images with random Γ = 0.9 and with optimized Γ using GO, BAT and G-BAT under zero attacks.
Gray-Scale IMAGES
ImageWith Random Γ = 0.9With GOWith BATWith G-BAT
NCBERNCBERNCBERNCBER
Baboon0.92080.10840.94820.10620.96810.00890.99930.0008
Lena0.92010.11160.99010.01970.99020.10920.99950.0012
Cameraman0.92750.10760.93500.10510.94050.10620.98940.0085
Pirate0.92050.10840.99680.10790.99740.09760.99940.0012
Living room0.92080.10870.97970.10740.96830.10640.99910.0010
MRI Brain0.92080.10810.98730.10760.99020.10620.99930.0006
Color Images
ImageWith Random Γ = 0.9With GOWith BATWith G-BAT
NCBERNCBERNCBERNCBER
Baboon0.91470.11820.94720.11030.95270.10950.99900.0042
Lighthouse0.91470.11630.93810.11540.92940.11830.99860.0088
Peppers0.92870.11940.93280.11190.95280.11040.99930.0014
Splash0.92610.11730.94810.11030.95170.11000.99920.0008
Koala0.91510.11600.92860.09530.93190.09150.99880.0086
Skin0.93180.11210.95280.11010.96280.10860.99970.0002
Table 5. NC and BER for aerial RS images Img3 (taken from USC-SIPI [29]) under attacks with random Γ and with optimized Γ using GO, BAT and G-BAT.
Table 5. NC and BER for aerial RS images Img3 (taken from USC-SIPI [29]) under attacks with random Γ and with optimized Γ using GO, BAT and G-BAT.
AttackWith Random Γ With GOWith BATWith G-BAT
NCBERNCBERNCBERNCBER
Sharpening0.88950.28030.92170.12810.97280.010710.98920.0794
Gaussian filter ( 3 × 3 )0.91010.21630.93820.12860.95180.10820.99930.0892
Median filter ( 3 × 3 )0.90280.25180.91270.21070.92190.11280.95090.0228
Average filter ( 3 × 3 )0.81820.32860.88180.17290.90180.13840.94930.0273
Weiner filter ( 3 × 3 )0.78250.39180.87190.30170.89210.20610.97850.0086
Butterworth filter (G = 2, F = 20)0.88280.28210.91560.21840.94180.04190.99920.0012
Salt & pepper (0.0002)0.66920.41820.69850.39950.79280.29870.91030.0698
Gaussian noise0.73820.29810.81290.19270.85280.16290.90280.0518
Speckle noise0.71850.32760.72190.29160.76210.19860.88280.0429
Compression (60%)0.80180.32810.82910.22810.84170.11920.91050.0102
Gamma correction (0.3)0.88820.17190.90180.09170.88270.02810.99450.0061
Histogram equivalent0.95920.27180.94010.24180.97020.10010.99910.0064
Shear0.65190.39980.70190.31530.76630.17180.84830.0615
Row cut (10)0.87160.36410.89410.30030.91420.13180.96510.0063
Column cut (10)0.88520.21640.89310.19530.91720.09630.95850.0084
Rotation ( 10 0 )0.63180.40710.65280.38210.66290.36280.70270.3017
Scaling (0.5, 2)0.67190.37150.69250.35140.70160.32170.71820.3012
Translate (0.25, 0.25)0.87180.26140.89640.19150.90120.12160.91260.1174
Cropping0.60560.51230.65150.34130.64140.35160.76250.3016
Table 6. NC and BER for Lena image under attacks with random Γ and with optimized Γ using GO, BAT and G-BAT.
Table 6. NC and BER for Lena image under attacks with random Γ and with optimized Γ using GO, BAT and G-BAT.
AttackWith Random Γ With GOWith BATWith G-BAT
NCBERNCBERNCBERNCBER
Sharpening0.88290.28170.91610.16170.96720.01760.98370.0881
Gaussian filter ( 3 × 3 )0.90260.21850.93290.20860.96290.17180.99910.0995
Median filter ( 3 × 3 )0.88270.30160.92860.28940.96530.12860.99310.0264
Average filter ( 3 × 3 )0.82420.31720.89310.18420.91610.12810.95190.0219
Weiner filter ( 3 × 3 )0.79620.42710.88710.27150.92270.18520.97280.0092
Butterworth filter (G = 2, F = 20)0.87310.29510.90420.26150.93180.06170.99910.0012
Salt & pepper (0.0002)0.63180.51780.69350.50710.74180.48210.90650.0762
Gaussian noise0.71940.37280.74180.26180.77260.19400.89860.0721
Speckle noise0.70410.37180.73180.30150.78210.25180.87310.0528
Compression (60%)0.79820.35170.81330.21850.83740.10270.90820.0124
Gamma correction (0.3)0.88320.18420.89510.13720.92260.02640.99210.0081
Histogram equivalent0.95210.27510.94270.25180.96710.10520.99900.0071
Shear0.64170.41780.66820.31940.73270.27180.83810.0861
Row cut (10)0.86180.38120.88170.30270.90260.17240.95280.0075
Column cut (10)0.88630.20180.90210.18620.92610.09810.96920.0029
Rotation ( 10 0 )0.62810.42810.63810.41860.65280.39190.75260.3672
Scaling (0.5, 2)0.66820.38190.68360.37290.69270.33170.70910.3281
Translate (0.25, 0.25)0.86620.27180.88260.18290.89280.12860.90710.1174
Cropping0.62190.42890.64870.37180.65180.25180.77290.2926
Table 7. NC and BER for aerial RS images (Img1, 2.1.01, and 2.1.02) taken from USC-SIPI [29] and Kaggle [30] datasets under attacks with optimized Γ using G-BAT.
Table 7. NC and BER for aerial RS images (Img1, 2.1.01, and 2.1.02) taken from USC-SIPI [29] and Kaggle [30] datasets under attacks with optimized Γ using G-BAT.
AttacksImg12.1.012.1.02
NCBERNCBERNCBER
Sharpening0.98670.14180.98420.08790.99210.0631
Gaussian filter ( 3 × 3 )0.99920.10780.99940.00850.99950.0064
Median filter ( 3 × 3 )0.94290.028190.99620.02210.97820.0185
Average filter ( 3 × 3 )0.95280.02210.95820.02210.96420.0201
Weiner filter ( 3 × 3 )0.98850.00650.97820.00690.97960.0059
Butterworth filter (G = 2, F = 20)0.99910.00190.99940.00100.99950.0008
Salt & pepper (0.0002)0.89070.088260.91050.07160.91080.0685
Gaussian noise0.89270.08180.90210.07020.92810.0521
Speckle noise0.88280.07960.89210.04910.89850.0384
Compression (60%)0.91920.01190.90870.01310.91050.01301
Gamma correction (0.3)0.99280.00690.99420.00860.99620.0076
Histogram equivalent0.99870.00750.99860.00830.99900.0075
Shear0.81640.08340.82910.08270.83920.0792
Row cut (10)0.96920.00630.96310.00620.96840.0058
Column cut (10)0.97190.00770.97280.00630.97850.0053
Rotation ( 10 0 )0.70720.29180.69510.30610.70510.2896
Scaling (0.5,2)0.71320.39410.70950.33860.71960.3172
Translate (0.25,0.25)0.92050.10620.90770.11730.91420.1023
Cropping0.75620.36130.77180.39130.78210.3872
Table 8. CC values between original watermark image (W) and encrypted images (EW). CC values between original image and decrypted images (DW) and entropies of original image and encrypted images (H—horizontal, V—vertical, D—diagonal).
Table 8. CC values between original watermark image (W) and encrypted images (EW). CC values between original image and decrypted images (DW) and entropies of original image and encrypted images (H—horizontal, V—vertical, D—diagonal).
ImageCC between W, EWCC between W, DWEntropy of WEntropy of EW
HVDHVD
Watermark−0.2838−0.2665−0.27151110.89301.0723
Cameraman−0.5248−0.4789−0.47501110.98800.9985
Lena−0.3430−0.2804−0.25421110.71940.9671
Baboon−0.5231−0.5669−0.54941110.99601.8954
MRI Brain−0.6319−0.5724−0.56331110.99791.0276
Table 9. Embedding and extraction time (in seconds) of different test cover images.
Table 9. Embedding and extraction time (in seconds) of different test cover images.
Gray-Scale
Image
Embedding
Time
Extraction
Time
Color
Image
Embedding
Time
Extraction
Time
Lena0.1504290.055273Baboon0.2697230.095462
Cameraman0.1501360.065511Peppers0.2406050.077382
Img10.1567760.0578962.1.080.2500330.087393
Img20.1517210.0568212.1.090.2397580.075609
Img30.1507080.0558212.1.100.2418620.082617
Table 10. Comparison analysis of our proposal against those considered the state-of-the-art.
Table 10. Comparison analysis of our proposal against those considered the state-of-the-art.
ParameterAli and NasabPreeti and KishoreZhu et al.AliSingh et al.Proposed
[14][15][16][17][18]
Transformation schemeSWT+SURFDWT+DCTIWT+SVDDWT+SVDIWT_ SVDRDWT+SVD
Cover image size 512 × 512 512 × 512 512 × 512 512 × 512 512 × 512 256 × 256
Watermark size 32 × 32 64 × 64 32 × 32 256 × 256 64 × 64 64 × 64
Optimization algorithmBATABCGANOGA, ABC, FOHybrid G-BAT
Security techniqueArnold mapNoAffine transformNOPseudo random key3 level security
Embedding capacity0.00390.015620.00390.250.015620.0625
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Devi, K.J.; Singh, P.; Dash, J.K.; Thakkar, H.K.; Santamaría, J.; Krishna, M.V.J.; Romero-Manchado, A. A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization. Mathematics 2022, 10, 3015. https://doi.org/10.3390/math10163015

AMA Style

Devi KJ, Singh P, Dash JK, Thakkar HK, Santamaría J, Krishna MVJ, Romero-Manchado A. A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization. Mathematics. 2022; 10(16):3015. https://doi.org/10.3390/math10163015

Chicago/Turabian Style

Devi, Kilari Jyothsna, Priyanka Singh, Jatindra Kumar Dash, Hiren Kumar Thakkar, José Santamaría, Musalreddy Venkata Jayanth Krishna, and Antonio Romero-Manchado. 2022. "A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization" Mathematics 10, no. 16: 3015. https://doi.org/10.3390/math10163015

APA Style

Devi, K. J., Singh, P., Dash, J. K., Thakkar, H. K., Santamaría, J., Krishna, M. V. J., & Romero-Manchado, A. (2022). A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization. Mathematics, 10(16), 3015. https://doi.org/10.3390/math10163015

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop