Keywords

1 Introduction

With the popularization and ripeness of the Internet, efficient storage management, rapid transmission and sharing, and real-time analysis and processing of digital multimedia data have gradually become an indispensable part of people’s daily life. Due to the openness and compatibility of Internet, it’s simple and convenient for people to access and obtain digital resources. However, under such circumstance, security of digital media has been greatly threatened and challenged for numerous digital products being copied, tampered and spread without the permission of copyrights’ owners. Through illegal copying, huge profits have been made by criminals, which heavily threaten the development of digital media industry.

Digital watermarking, as an efficient authentication approach for copyright protection, is an important brunch of information security. Digital image is a key part of digital multimedia resources, thus digital image watermarking has been the essential aspects of watermarking technology. Digital watermarking protects the copyright of digits images by embedding watermarks into host images. In the implement of copyright protection, the visual quality of watermarked image should not be significantly reduced; on the other hand, watermarking information should be robust of which most part can be detected and extracted after interference and attacking.

Since to deliver raw image greatly challenges storage and transmission bandwidth, it’s necessary to have digital images compressed. JPEG2000 is discrete wavelet based still-image compression standard proposed by Joint Photographic Expert Group (JPEG). Taking advantages of discrete wavelet transform (DWT) and EB2COT encoding, JPEG2000 supports multi-resolution progressive representation and outperforms JPEG standard in reconstruction quality and compression ratio. However, in most scenes, JPEG2000 is applied as lossy compression scheme which brings distortion to watermarked image. In this paper, we focus in designing an efficient watermarking scheme against JPEG2000 compression.

According to the embedding domain of host images, digital image watermarking can be roughly categorized into two aspects, namely the spatial domain watermarking and the transform domain watermarking. Generally, digital watermarking in spatial domain is implemented by directly altering pixels within host image, which is characterized by simplicity and low computational complexity. The least significant bit substitution (LSB) [1] is a classic spatial domain watermarking algorithm implement by replacing host images’ LSB with watermarking bits. Other typical spatial watermark includes pixel value differencing (PVD) [2], exploiting modification direction (EMD) [3] and reversible approaches such as histogram shifting (HS) [4] and difference expansion (DE) [5].

However, spatial watermark is not robust enough to resist attacks such as affine transformation or image compression in most scenes. Therefore research focusing on watermarking withstands compression has been continuously worked out for decades [6, 7]. The transform domain based watermarks is one of the efficient schemes resists to digital image compression. Compared with spatial domain watermarking, watermarks embedded in transform domain, such as discrete Fourier transform (DFT) [8, 9], discrete cosine transform (DCT) [10,11,12], discrete wavelet transform (DWT) [13, 14] and singular vale decomposition (SVD) [15,16,17] exploits better performance in both imperceptivity and robustness.

As mentioned, characteristics of mentioned transforms make them eligible for robust watermarking—most energy of natural signals (including images) is concentrated in low frequency coefficient and correlation between DCT coefficients is very low; DWT is a multi-resolution analysis in both spatial domain and frequency domain which characterizes the local properties in both domains; in addition, SVD is a powerful numeric tools for watermarking which effectively withstands attacks like geometric transform and noise. Therefore, research of robust watermarking [18,19,20,21] in hybrid domains involving DWT, DCT and SVD has been continually proposed in recent years which combines advantages of each transform. In Zear et al. [18], a back propagation Neural Network (BPNN) is applied in the watermark extraction phase to compensate the distortion induced by various attacks. In Fazli et al. [19], a watermarking scheme is proposed by combing DWT, DCT and SVD. The host image is firstly into four non-overlapping blocks and a 64 bit/128 bit binary watermark is embedded into each block four times respectively to enhance robustness. However, their approach is non-blind and its watermarking capacity is limited. In [21], Hu et al. embeds multiple watermarking bits into host images by adjusting feature parameters obtained from DWT-SVD-DCT domain via the progressive quantization index modulation technique, which effectively withstands JPEG2000 compression attack.

Despite the mentioned transforms—DWT, DCT and SVD, another transform called stationary wavelet transform (SWT) is induced in this paper to implement robust watermarking scheme. SWT is an improved wavelet transform version aimed at overcoming the shortage of translation-invariance of DWT by removing down-samplers and up-samplers in original DWT algorithm. The salient features of SWT are redundancy and translation invariance. In this article, host image is firstly decomposed by 1-level DWT to obtained four sub-bands \( \left[ {LL,LH,HL,HH} \right] \). Then \( LL \) is portioned into \( 4 \times 4 \) non-overlapping blocks, for each block a 1-level SWT is applied to obtain the low approximation coefficients \( LL_{SWT} \). DCT and SVD are successively executed in \( LL_{SWT} \), watermarking bits are embedded into the largest singular value via quantization.

The rest of this paper is organized as follows. In Sect. 2 describes the algorithm of both embedding and extraction algorithm. In Sect. 3, we gave out the experimental results and comparison between proposed Scheme and prior works. Eventually conclusion is presented in Sect. 4.

2 Proposed Blind Watermarking Scheme

2.1 Watermarking Embedding

The detailed embedding process of proposed scheme is given as follow:

  1. (1)

    Using Haar wavelets, one-level 2-dimension DWT is applied on host image \( I \). Therefore, four sub-bands are obtained namely LL, LH, HL and HH. Size of each sub-band will be \( M/2 \times N/2 \) Considering the demand of watermarking robustness, the embedding will be executed in sub-band \( LL \).

    $$ \left[ {LL,LH,HL,HH} \right] = \text{DWT} \left( I \right) $$
    (1)
  2. (2)

    Then the obtained LL is portioned into \( 4 \times 4 \) non-overlapping block \( LL\left( {m,n} \right) \) of which total amount is \( M/8 \times N/8 \). Each sub-block is decomposed by 2-dimension SWT; therefore a newly generated sub-band is obtained with size being the same as \( LL\left( {m,\text{n}} \right) \)

    $$ LL = \bigcup\limits_{m}^{M/8} {\bigcup\limits_{n}^{N/8} {LL\left( {m,n} \right)} } $$
    (2)
    $$ \left[ {A,H,V,D} \right] = {\text{SWT}}\left( {LL\left( {m,n} \right)} \right) $$
    (3)
  3. (3)

    Then each stationary wavelet approximation \( A \) is transformed by DCT to obtain new coefficients \( A^{DCT} \) then apply SVD to \( A^{DCT} \), therefore a singular value matrix \( {\mathbf{S}} \) is acquired.

    $$ A^{DCT} = \text{DCT} \left( A \right) $$
    (4)
    $$ \left[ {U,S,V} \right]\, = \,\text{SVD} \left( {A^{DCT} } \right) $$
    (5)
  4. (4)

    According to formulas (5) and (6), watermarking bits \( b \in \left\{ {0,1} \right\} \) is embedded into the maximum singular value \( S\left( {1,1} \right) \)

    $$ S_{W} \left( {1,1} \right) = round\left( {\frac{{S\left( {1,1} \right) - d\left( b \right)}}{\delta }} \right)\delta + d\left( b \right) $$
    (6)

    Where, \( \delta \) denotes quantization step, \( d\left( 0 \right) \) is the quantization dither which is a random value within interval \( \left[ {0,\delta } \right] \) and \( d\left( 1 \right) = d\left( 0 \right) + \delta /2 \).

  5. (5)

    Then calculate the watermarked \( A_{W}^{DCT} \) as follow:

    $$ A_{W}^{DCT} = U * S_{W} * V^{T} $$
    (7)
  6. (6)

    Inverse DCT and SWT operation is successively applied to \( 4 \times 4 \) non-overlapping blocks, therefore the watermarked \( LL_{W} \left( {m,n} \right) \) sub-band is obtained:

    $$ A_{W} = \text{Inverse} \_{\text{DCT}}\left( {A_{W}^{DCT} } \right) $$
    (8)
    $$ LL_{W} \left( {m,n} \right) = \text{Inverse} \_{\text{SWT}}\left( {A_{W} ,H,V,D} \right) $$
    (9)
  7. (7)

    These modified \( LL_{W} \left( {m,n} \right){\text{s}} \) are put back to relevant position; therefore the watermarked approximation coefficient \( LL_{W} \) is obtained. Then apply inverse DWT transform by using Haar filter to \( LL_{W} \) and the rest detailed sub-bands which remain unchanged to acquire watermarked image \( I_{W} \)

    $$ LL_{W} = \bigcup\limits_{m}^{M/8} {\bigcup\limits_{n}^{N/8} {LL_{W} \left( {m,n} \right)} } $$
    (10)
    $$ I_{W} = \text{Inverse} \_{\text{DWT}}\left( {LL_{W} ,LH,HL,HH} \right) $$
    (11)

2.2 Watermarking Extraction

The watermark extraction is basically the inverse operation against embedding process that contains similar operations, which are:

  1. (1)

    By using Haar wavelet, two dimension DWT transform is applied to the watermarked image \( I_{W} \), therefore a series of decomposed coefficients are obtained according to:

    $$ \left[ {LL_{W} ,LH_{W} ,HL_{W} ,HH_{W} } \right] = \text{DWT} \left( {I_{W} } \right) $$
    (12)
  2. (2)

    Divide acquired approximation sub-band \( LL_{W} \) into \( 4 \times 4 \) non-overlapping blocks \( LL_{W} \left( {m,n} \right){\text{s}} \) of which amount is \( M/8 \times N/8 \). Each sub-block is decomposed by 2-demsion SWT, therefore newly generated sub-bands are obtained with size being the same as \( LL_{W} \left( {m,\text{n}} \right) \). Similarly, DCT and SVD operation are also successively applied to obtained singular value

    $$ LL_{W} = \bigcup\limits_{m}^{M/8} {\bigcup\limits_{n}^{N/8} {LL_{W} \left( {m,n} \right)} } $$
    (13)
    $$ \left[ {A_{W} ,H_{W} ,V_{W} ,D_{W} } \right] = {\text{SWT}}\left( {LL\left( {m,n} \right)} \right) $$
    (14)
    $$ A_{W}^{DCT} = \text{DCT} \left( {A_{W} } \right) $$
    (15)
    $$ \left[ {U_{W} ,S_{W} ,V_{W} } \right] = \text{SVD} \left( {A_{W}^{DCT} } \right) $$
    (16)
  3. (3)

    To extract the watermark bit \( b \), firstly the modified maximum singular value \( S_{W} \left( {1,1} \right) \) is modulated by a pair of quantization dither \( d\left( i \right),i \in \left\{ {0,1} \right\} \) respectively:

    $$ e_{i} = round\left( {\frac{{S_{W} \left( {1,1} \right) - d\left( i \right)}}{\delta }} \right)\delta + d\left( i \right) $$
    (17)

Then \( b \) will be extracted according to the comparison of distance derived by demodulation in (17), which is

$$ b = \mathop {\arg \hbox{min} }\limits_{{i \in \left\{ {0,1} \right\}}} \left( {S_{W} \left( {1,1} \right) - e_{i} } \right)^{2} $$
(18)

Based on (18), the modulated \( e_{i} ,i \in \left\{ {0,1} \right\} \) of which distance is less will be judged as proper watermark bit as index \( i_{\hbox{min} } \) as \( b = i_{\hbox{min} } \).

3 Experimental Results

In this paper, five \( 512 \times 512 \) gray-scale image namely are served as host images, namely ‘Lena’, ‘Pepper’, ‘Boat’, ‘Jet’ and ‘Tiffany’. In addition, a binary logo with size \( 64 \times 64 \) is used as watermark. The watermarking logo is 20 times Arnold transformed before embedding. Host images and watermarking logo are displayed as follow:

3.1 Index of Quality Evaluation

In order to evaluate performance of proposed watermarking scheme, two metrics are induced namely peak signal to noise ratio (PSNR) and bit error rate (BER), among which PSNR indicates the imperceptivity of proposed scheme which is the variation between original host image and BER evaluates the robustness of extracted watermark under various attack types (Figs. 1 and 2).

Fig. 1.
figure 1

Host images: (a) Lena; (b) Pepper; (c) Boat; (d) Jet; (e) Tiffany

Fig. 2.
figure 2

Watermarking logo and its permutation by Arnold transform

PSNR between image \( I_{1} \) and \( I_{2} \) with size \( M \times N \) is defined as below:

$$ {\text{PSNR = }}10\log_{10} \left( {\frac{255}{\text{MSE}}} \right)\left( {dB} \right) $$
(19)

Where, MSE denotes the mean square error of which definition is as follow:

$$ \text{MSE} = \frac{1}{MN}\sum\limits_{x = 1}^{M} {\sum\limits_{y = 1}^{N} {\left( {I_{1} \left( {x,y} \right) - I_{2} \left( {x,y} \right)} \right)^{2} } } $$
(20)

Definition of BER between \( m \times n \) sized original watermark \( w \) and extracted \( w^{*} \) is shown as follow:

$$ \text{BER} = \sum\limits_{x = 1}^{m} {\sum\limits_{y = 1}^{n} {\frac{{\left( {w\left( {x,y} \right) \oplus w^{*} \left( {x,y} \right)} \right)}}{mn}} } $$
(21)

Where, \( \oplus \) is exclusive or operation.

3.2 Selection of Quantization Step \( \delta \)

As described in Sect. 2, it figures out that relation between imperceptivity of watermarked image and robustness of watermark is a compromise both affected by quantization step \( \delta \); which is greater \( \delta \) enhances the robustness of watermark, yet impacts the invisibility of watermarked host images negatively.

Figure 3 illustrates the trend how PSNR of watermarked images varies with different quantization steps. Figure 4 indicates the BERs of the extracted watermarks in case of JPEG2000 compression of which compression ratio (CR) is 4. From Fig. 4, it figures out that when quantization step \( \delta \ge 80 \) BERs of extracted watermarks of test images is very close to zero \( \left( { \le 0.1{\% }} \right) \). The improvement in BER is very slight when step \( \delta \) keeps increasing. However, performance of extracted watermarks’ BERs deteriorates when quantization step \( \delta \le 60 \). Moreover, from Fig. 3, it points out that when \( \delta \) equals 80 the average PSNR of watermarked images is approximately 46 dB, which according to Human Vision System (HVS) [22], is excellent in vision quality and extremely invisible. Therefore, we intensively set quantization step \( \delta \,{ = }\,80 \) to achieve a trade-off between imperceptivity and robustness of proposed watermarking scheme.

Fig. 3.
figure 3

Curves of watermarked images PSNR varying with different quantization steps

Fig. 4.
figure 4

Bit error rate of extracted watermark under JPEG 2000 compression with compression ratio set to 4

3.3 Experimental Results and Comparison with Prior Works

In order to evaluate proposed scheme, a series of prior watermarking scheme of which watermark scales are all 4096 bits is induced as comparative groups, including Su et al. [17], Patra et al. [12] and Hu et al. [21]. In [17], watermark bits are embedded into non-overlapping blocks of host image by modifying some elements within U component of SVD decomposition. In [12], Patra et al. employs a Chinese Remainder Theorem-based (CRT) technology to embed watermark bits into DCT domain of host images. Hu et al. [21] embeds multiple watermarking bits into host images by adjusting obtained feature parameters from DWT-SVD-DCT domain via the progressive quantization index modulation technique, which effectively withstands JPEG2000 compression attack.

Table 1 indicates PSNR resulting from various watermarking schemes. It’s obvious that PSNR achieved by proposed scheme is approximately 44.90 dB, which is significantly higher than other three approaches. Furthermore, unlike Su et al. PSNR achieved by different varies very slight for proposed scheme, which is, relevance of watermarked image quality to specific images is very little. Overall, imperceptivity of proposed algorithm stays in a relatively high level.

Table 1. Resulting PSNR (dB) of watermarked images for different schemes

Subsequently, in order to test the robustness of proposed scheme, some types of attacks are taken into consideration, which are displayed in Table 2:

Table 2. Attack types applied

Attacks applied in this article mainly focus on JPEG2000 compression with a range of different compression ratio. Besides, other types of attack including noise, filter, rotation, scaling and pixels intensity variation are also explored to test the robustness of proposed scheme. Comparison between our work and prior research is displayed in Table 3.

Table 3. Average BER (%) of extracted watermarks for various schemes

Table 3 displays the average BER of extracted watermarks for test images under various types of attack, from which we can tell, proposed scheme significantly outperforms the other three works against JPEG2000 standard with all compression ratio employed. Besides, robustness of proposed scheme also has superiority under Median filter, scaling and rotation attack. However, not all of BER obtained by proposed algorithm is statistically competitive, for example, performance against Gaussian filter and pixels intensity variation is just general among four schemes and proposed scheme underperforms among all four works against salt & pepper noise. Figure 5 presents the extracted watermark visually.

Fig. 5.
figure 5

Extracted watermark under various types of attack (a) None; (b–d) JPEG2000 compression with CR = 2, 4, 8; (e) Salt & pepper noise; (f) Median filter; (g) Gaussian filter; (h) Scaling; (i) Rotation; (j) Cropping; (k) Brighten; (h) Darken;

4 Conclusion

In this paper, we propose a novel robust blind watermarking scheme by jointly using DWT, SWT, DCT and SVD. The robustness is guaranteed by taking advantages of multi-resolution analysis offered by DWT, the translation invariance provided by SWT and the algebraic invariance furnished by SVD. Host images is firstly decomposed by DWT. Subsequently the approximation coefficient \( LL \) is portioned into non-overlapping blocks. For each block, SWT is applied to obtain the redundant low frequency coefficient \( LL_{SWT} \). After successively applying DCT and SVD, multiple watermarks are embedded into the obtained greatest singular value of \( LL_{SWT} \) blindly using quantization. Experimental results show that the watermarked image is visually invisible of which peak signal to noise ratio (PSNR) is above 44 dB. Besides, by comparing with other DWT-SVD robust watermarking approaches, proposed scheme significantly outperforms in robustness against JPEG2000 compression. Performance of proposed scheme is also superior or competitive against other attacks such as rotation, filter or scaling.