Imperceptible digital watermarking scheme in multiple transform domains


A novel imperceptible digital watermarking scheme in multiple transform domains is presented, where the cover image is dealt with by discrete wavelet transform (DWT), discrete cosine transform (DCT) and discrete fractional random transform (DFRNT), while the watermark image is scrambled by Arnold transform and logistic map. First the watermark is scrambled by the Arnold transform, then the row and the column of the resulting watermark are scrambled by the Logistic map, respectively. In addition, four sub-band images are generated from the host image by the two-dimensional discrete wavelet transform. The low-frequency sub-band images are divided into 8 × 8 small matrices, and a coefficient matrix is produced by performing the discrete cosine transform on each matrix. An intermediate matrix with the same size as the watermark image is constructed by the intermediate frequency coefficients. Then the discrete fractional random transformation is performed on the intermediate frequency coefficient matrix and the scrambled watermark is embedded into the discrete fractional random transformation domain. Compared with the previous schemes, the proposed digital watermarking scheme has stronger imperceptibility and robustness.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11


  1. 1.

    Ali M, Chang WA (2014) An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain. Signal Process 94(1):545–556

    Article  Google Scholar 

  2. 2.

    Ali M, Chang WA, Siarry P (2014) Differential evolution algorithm for the selection of optimal scaling factors in image watermarking. Eng Appl Artif Intell 31(31):15–26

    Article  Google Scholar 

  3. 3.

    Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh, Y, Gupta, B (2018) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl, (4):1–40

  4. 4.

    Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):1–24

    Article  Google Scholar 

  5. 5.

    Chen X, Huang X, Li J, Ma J, Lou W, Wong DS (2014) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Info Forensics Sec 10(1):69–78

    Article  Google Scholar 

  6. 6.

    Choudhary R, Parmar G (2017) A robust image watermarking technique using 2-level discrete wavelet transform (DWT). International conference on communication control and intelligent systems, IEEE: 120–124

  7. 7.

    Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU - Int J Electron Commun 68(3):244–253.

    Article  Google Scholar 

  8. 8.

    Esgandari R, Student MS, Khalili M (2015) A robust image watermarking scheme based on discrete wavelet transforms. Int Conf Knowledge-Based Eng Innov, IEEE: 988–992

  9. 9.

    Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik - Int J Light Electron Optics 127(2):964–972.

    Article  Google Scholar 

  10. 10.

    Fridrich J, Kodovsky J (2012) Rich models for Steganalysis of digital images. IEEE Trans Info\ Forensics Sec 7(3):868–882.

    Article  Google Scholar 

  11. 11.

    Guo Q, Liu ZJ, Liu ST (2008) Robustness analysis of image watermarking based on discrete fractional random transform. Opt Eng 47(5):057003

    Article  Google Scholar 

  12. 12.

    Halima NB, Hosam O (2015) Embedding image ROI watermark into median DCT coefficients. Int Rev Comput Softw 10(6):643

    Google Scholar 

  13. 13.

    Hu HT, Hsu LY (2015) Robust, transparent and high-capacity audio watermarking in DCT domain. Signal Process 109(C:226–235

    Article  Google Scholar 

  14. 14.

    Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412–413:223–241

    Article  Google Scholar 

  15. 15.

    Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279(279):251–272

    Article  Google Scholar 

  16. 16.

    Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063.

    Article  Google Scholar 

  17. 17.

    Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437.

    MathSciNet  Article  MATH  Google Scholar 

  18. 18.

    Li J, Li YK, Chen X, Lee PPC, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. Parallel Distrib Syst IEEE Trans 26(5):1206–1216

    Article  Google Scholar 

  19. 19.

    Li P, Li J, Huang Z, Li T, Gao CZ, Yiu SM (2017) Multi-key privacy-preserving deep learning in cloud computing. Futur Gener Comput Syst 74(C:76–85

    Article  Google Scholar 

  20. 20.

    Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl: 1–15, DOI:

  21. 21.

    Liu ZJ, Ahmad MA, Liu ST (2008) A discrete fractional angular transform. Opt Commun 281(6):1424–1429.

    Article  Google Scholar 

  22. 22.

    Luo H, Yu FX, Huang ZL, Lu ZM (2011) Blind image watermarking based on discrete fractional random transform and subsampling. Optik - Int J Light Electron Optics 122(4):311–316.

    Article  Google Scholar 

  23. 23.

    Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34–52.

    Article  Google Scholar 

  24. 24.

    Mastan Vali SK, Naga Kishore KL, Prathibha G Robust image watermarking using Tetrolet transform. Int Conf Elect, Electron, Signals, Commun Optim 2015, 2015:1–5

  25. 25.

    Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76(8):10599–10633.

    Article  Google Scholar 

  26. 26.

    Rajawat M, Tomar DS (2015) A secure watermarking and tampering detection technique on RGB image using 2 level DWT. Fifth Int Conf Commun Syst Netw Technol, IEEE: 638–642

  27. 27.

    Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU - Int J Electron Commun 72:149–161.

    Article  Google Scholar 

  28. 28.

    Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76:1–18

    Article  Google Scholar 

  29. 29.

    Singh D, Singh SK (2015) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76:1–25

    Google Scholar 

  30. 30.

    Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT–DCT–SVD domain. Natl Acad Sci Lett 37(4):351–358.

    Article  Google Scholar 

  31. 31.

    Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Info 5(3):607–614(8).

    Article  Google Scholar 

  32. 32.

    Tang LL, Huang CT, Pan JS, Liu CY (2013) Dual watermarking algorithm based on the fractional Fourier transform. Multimed Tools Appl 74(12):1–17

    Google Scholar 

  33. 33.

    Thind DK, Jindal S (2015) A semi blind DWT-SVD video watermarking. Proc Comput Sci 46:1661–1667.

    Article  Google Scholar 

  34. 34.

    Wang B, Ding J, Wen Q, Liao X, Liu C (2009) An image watermarking algorithm based on DWT DCT and SVD. IEEE Int Conf Netw Infrastruct Digit Content, IC-NIDC IEEE: 1034–1038

  35. 35.

    Xie Y, Tan H, Wang K (2016) A novel color image hologram watermarking algorithm based on QDFT-DWT. Contrl Decision Conf IEEE: 4349–4354, DOI:

  36. 36.

    Ye X, Chen X, Deng M, Wang Y (2015) A SIFT-based DWT-SVD blind watermark method against geometrical attacks. International congress on image and signal processing, IEEE: 323–329

  37. 37.

    Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608.

    Article  Google Scholar 

  38. 38.

    Zear A, Singh AK, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl: 1–20

  39. 39.

    Zhang C, Wang J, Wang X (2008) Digital image watermarking algorithm with double encryption by Arnold transform and logistic. Int Conf Netw Comput Adv Info Manag, IEEE, pp 329–334, DOI:

  40. 40.

    Zhang X, Ren Y, Shen L, Qian Z, Feng G (2014) Compressing encrypted images with auxiliary information. IEEE Trans Multimed 16(5):1327–1336.

    Article  Google Scholar 

  41. 41.

    Zhou NR, Dong TJ, Wu JH (2010) Novel image encryption algorithm based on multiple-parameter discrete fractional random transform. Opt Commun 283(15):3037–3042.

    Article  Google Scholar 

Download references


This work is supported by the National Natural Science Foundation of China (Grant Nos. 61462061 and 61561033), the China Scholarship Council (Grant No. 201606825042), the Department of Human Resources and Social security of Jiangxi Province, the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant No. 20162BCB22011), and the Natural Science Foundation of Jiangxi Province (Grant No. 20171BAB202002).

Author information



Corresponding author

Correspondence to Nan Run Zhou.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Zhou, N.R., Hou, W.M.X., Wen, R.H. et al. Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77, 30251–30267 (2018).

Download citation


  • Digital watermarking
  • Transform domain
  • Watermark scrambling
  • Robustness
  • Imperceptibility