Optimized Digital Image Watermarking for Uncorrelated Color Space

Optimized Digital Image Watermarking for
Uncorrelated Color Space
A Thesis
submitted in partial fulfillment of the requirements for the award of
the degree of
Doctor of Philosophy
by
Manish Gupta
Enrolment No.: 11E7UCPEM4XP900
Supervisor(s):
Dr. Rajeev Gupta
Dr. Girish Parmar
Department of Electronics Engineering
Rajasthan Technical University, Kota
Rajasthan, India
December, 2015
c
RAJASTHAN
TECHNICAL UNIVERSITY, KOTA, 2015
ALL RIGHTS RESERVED
Dedicated to
Lord Shri Goverdhan M aharaj Ji,
Lord Shri Banke Bihari Lal Ji,
My F ather Shri Kalika P rasad Gupta,
Mother Smt. Rajkumari Gupta,
Brother N eeraj,
Wif e Ruchi
and
Daughter Khyati & Son Anant
Acknowledgements
I would like to express here my sincere gratitude to my supervisors, Dr.
Rajeev Gupta, Professor, RTU, Kota and Dr. Girish Parmar,
Associate Professor, RTU, Kota, whose precious advice and friendly
encouragement made this work go smoothly throughout the period of
research. They are the source of never-ending inspiration for me. I
have been extremely lucky to have them as my mentors. Their precise
and lucid thoughts have helped me to manage many responsibilities
comfortably. They not only encouraged me to work but also gave
his guidance, experience, constructive thoughts and took keen interest
throughout the course of work and preparation of manuscript which
had made me worth that I claim to be now. Working with them made
me more independent and liable, which I believe is the most important
aspect in anyone’s career. I am indebted to them more than they
recognizes.
No appropriate words could be traced in the presently available lexicon
to avouch the excellent guidance given by Prof. R. S. Meena, Head,
Electronics Engineering Department at RTU, Kota, Prof. Mithilesh
Kumar, Principal, GEC, Jhalawar (Raj.), Prof. Ranjan Maheshwari,
Prof. Lokesh Tharani, Prof. Jankiballabh Sharma, Prof. Pankaj
Shukla, and Prof. Praveen Kumar. It is my great privilege to mention
the entire official staff for helping me in the official documentation
work right from the time of my registration into Ph.D. Moreover, I
would like to thanks to my research committee members and faculty
members of the institute for their help and support.
I am extremely thankful to Dr. Mukesh Sarsawat who has given his
constant guidance, support and encouragement throughout this study.
His expertise, experience, vigorous efforts and co-operation had made
me to complete this work. Without his unfailing support and belief in
me, this thesis would not have been possible.
I am extremely grateful to Hindustan Institute of Technology and
Management, Agra administration, Dr. A. K. Gupta, Dr. Shailendra Singh, Dr. N. P. Singh, Mr. Jayash Kumar Sharma, Mr. Santosh
viii
Kumar Dwivedi, Mr. Kamal Karakoti, Mr. Viresh Chauhan and Mr.
Sudhir Verma for their cooperation during my stay at RTU, Kota.
I express my gratitude to Prof. Rajiv Saxena and Prof. Dinesh Chandra for their constructive suggestions offered to me for successful completion of my thesis.
I am sincerely thankful to my friends Mr. Jayash Sharma, Mr. Mahendra Kumar Pandey, Mr. Abhay Chaturvedi, Mr. Rajesh Kumar
Bathija, Mr. Pradeep Singh Bhati, Mr. Narbada Prasad Gupta, Mr.
Puneet Kumar Choudhary, Mr. Vikas Rai, Mr. Vijay Kumar Dixit,
Mr. Deepak Bhatia and Mr. Neeraj Jain for their scholastic guidance,
suggestions and encouragement throughout the study duration. Along
with them, I am also thankful to Mrs. Rita Saini and other Ph.D.
scholars for providing their kind helps and supports during the time of
research.
I owe special thanks to all my friends who encouraged and boosted
my morale during the difficult days particularly Mr. S C Gupta, Mr.
Lokendra Sharma, Mr. Shyam Sunder Agrawal, Mr. Sanjay Mishra,
Mr. Manish Agrawal, Mr. Hitendra Garg, Mr. Raj Kumar Verma,
Mr. Manish Oberoi, Mr. Amit Jaiswal, Mr. Anurag Saxena, Mr.
Suneet Parashar, Mr. Darpan Anand, Mr. Rahul Saraswat, Mr. B
N Gupta, Mrs. Nisha Agrawal, Mrs. Hemlata Yadav, Ms. Priyanka
Yadav, Mrs. Priyanka Agrawal, Mr. Gaurav Sharma, Mr. R N Singh,
Mr. P S Parihar, Mr. Santosh Sahu, Dr. A K Verma, Mr. Ajitesh
Kumar, Mr. Brajesh Sharma, Mr. Rahul Sighal, Mr. Nitin Sharma,
and Mrs. Neema Verma.
I would like to offer my most humble gratitude to my Late grandfather,
grand mother, and maternal grandmother.
I would like to offer my most humble gratitude to my maternal grandfather Shri Ramsewak Neekhara, parents, my uncle and aunty, my
Mausaji and Mausiji, my Mamaji and Mamiji, my brother in-laws
Mr. Vishal Gupta and Mr. Saurabh Gupta, my brothers Neeraj,
Anand, Vinay, Naveen, Ram, Shayam, and Vaibhav, my sisters Suruchi, Sonam, Kritika, Himanshi, and Chritanshi, my nephew Vikhyat,
my in-laws Shri S. L. Gupta, Mrs. Neelam Gupta, Mr. Santosh Gupta,
Mr. Manoj Gupta, Mr. Sachin Gupta and my wife Ruchi, my daughter
Khyati, my son Anant, and other family members for their unsurpassed
love, care, endless patience and countless sacrifices which they made
ix
for me. Indeed, a plethora of words would not suffice to say what I
owe to them.
Last but not the least I am highly tankful to Lord Shri Goverdhan Maharaj Ji and Lord Shri Banke Bihari Lal Ji for showing his blessings
and brings this bright day in my career.
(Manish Gupta)
x
Abstract
Digital image watermarking is a process of imperceptibly embedding
watermark in the form of signature, random sequence or some image
into an image (host) which may be used to verify the genuineness of its
owner. Watermarking could be used for various real-time applications
like, protection of intellectual property rights (IPR) of multimedia contents, forensics and piracy deterrence, content filtering, document and
image security, broadcast monitoring, etc. Robustness of digital image
watermarking methods are of paramount importance in the perspective of the protection of multimedia contents due to easily accessible
data manipulation tools and the strengthening of high data rate transfer over the internet. Therefore, there is a growing interest in developing a method to protect multimedia contents. However, no single
watermarking method can be used to all applications. Therefore, the
primary objective of this work is to design and develop the robust digital watermarking methods for the protection of color images from its
unauthorise utilization.
The proposed watermarking methods consist of five steps. First, host
and watermark images are pre-processed using uncorrelated color space.
Second, the watermark is embedded into the host image using four different embedding methods. Third, post-processing is done by embedding the coefficients into the watermarked image. Fourth, performance
of proposed watermarking methods is improved using various optimization methods namely; genetic algorithm (GA), artificial bee colony
(ABC), and differential evolution (DE). Finally, the extracted watermark is verified for the genuineness of its owner. The performance of
developed methods are measured under various signal processing and
geometric attacks.
Generally, researchers used RGB, Y Cb Cr , YIQ, HSI, or HSV, etc. color
space models for both watermarks and host images in their digital
watermarking methods which are correlated in nature and impose the
restriction to use any one color component at a time for embedding
the watermark. However, there exists some uncorrelated color models
xii
such as Lab, Lαβ, etc., which may be used in image watermarking
to increase the robustness and quality by using all the color image
components of host and watermark images. Therefore, in this thesis,
a recently developed uncorrelated color space (UCS) has been utilized
during the pre-processing step. Experimental results show that the
UCS method outperforms other existing methods.
Embedding the watermark image into host image is the second step
of proposed watermarking method. The selection of embedding domain is the most vital and difficult task of any watermarking methods.
In this thesis, two transform methods have been used for embedding
the watermark into the host image namely; discrete wavelet transform
(DWT) and steerable pyramid transform (SPT). Both the methods
transform the host image and utilize their transform coefficients for
hiding the pre-process watermark data. After hiding the watermark
data into transform coefficients, post-processing is done to generate
watermarked image. The experimental results show that steerable
pyramid transform (SPT)-based method is better than other existing
methods of digital watermarking.
There is one component during the embedding process namely strength
factor which effects the performance of watermarking methods. Therefore, there is a requirement to use its optimum value. For the same, the
proposed watermarking methods exploit optimization methods (GA,
ABC, and DE) to calculate the optimum strength factors. Among
other optimization methods, DE improves the performance as compared to other existing methods.
Finally, the performance of the proposed methods are tested after applying various signal processing and geometric attacks. In this thesis,
20 different attacks have been used for validation of the proposed methods.
The output of this research work is a robust digital image watermarking
method for the protection of color images against the various malicious
attacks.
Keywords: Image watermarking, Discrete wavelet transform, Steerable pyramid transform, Uncorrelated color model, Genetic algorithm,
Artificial bee colony, Differential evolution.
xiii
Table of Contents
Title
Page No.
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
. viii
List of Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
Chapter 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1 Motivation for Research . . . . . . . . . . . . . . . . . . . . . . . .
1
1
1.2
1.3
Applications of Watermarking . . . . . . . . . . . . . . . . . . . . .
Requirements and Design Issues of Digital Watermarking Method .
1.4
1.5
1.6
Taxonomy of Watermarking Attacks . . . . . . . . . . . . . . . . . 7
Classification of Watermarking Methods . . . . . . . . . . . . . . . 10
Literature Review of Image Watermarking . . . . . . . . . . . . . . 12
1.6.1
1.6.2
1.7
1.8
2
4
Spatial Domain-based Methods . . . . . . . . . . . . . . . . 13
Transform Domain-based Methods . . . . . . . . . . . . . . 14
1.6.3 Optimization Methods in Image Watermarking . . . . . . . 20
1.6.4 Color Spaces in Image Watermarking Method . . . . . . . . 22
Challenges in Image Watermarking . . . . . . . . . . . . . . . . . . 24
1.7.1
1.7.2
Use of Color Watermark . . . . . . . . . . . . . . . . . . . . 24
Color Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.7.3
1.7.4
1.7.5
Transform Method . . . . . . . . . . . . . . . . . . . . . . . 25
Optimization Method . . . . . . . . . . . . . . . . . . . . . . 25
3-D Watermarking . . . . . . . . . . . . . . . . . . . . . . . 25
Scope of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Chapter 2 Digital Image Watermarking using Discrete Wavelet
Transform on Gray-Scale Watermark Image . . . . . . . 29
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.2
Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
xiv
2.3
2.4
2.5
2.2.1
Discrete Wavelet Transform (DWT) . . . . . . . . . . . . . . 31
2.2.2
2.2.3
Uncorrelated Color Space (UCS) . . . . . . . . . . . . . . . 33
Genetic Algorithm (GA) . . . . . . . . . . . . . . . . . . . . 33
Proposed Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Results and Discussions . . . . . . . . . . . . . . . . . . . . . . . . 44
Chapter 3 Digital Image Watermarking using Steerable Pyramid
3.1
3.2
Transform on Gray-Scale Watermark Images . . . . . . 45
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Steerable Pyramid Transform (SPT) . . . . . . . . . . . . . . . . . 46
3.3
3.4
Proposed Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.5
Results and Discussions
. . . . . . . . . . . . . . . . . . . . . . . . 51
Chapter 4 Digital Image Watermarking using Discrete Wavelet
Transform on Color Watermark Images . . . . . . . . . . 57
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
4.2
4.3
Artificial Bee Colony (ABC) Method . . . . . . . . . . . . . . . . . 59
Differential Evolution (DE) Algorithm . . . . . . . . . . . . . . . . 61
4.4
4.5
4.6
Proposed Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Method Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.7
Results and Discussions
. . . . . . . . . . . . . . . . . . . . . . . . 73
Chapter 5 Digital Image Watermarking using Steerable Pyramid
Transform on Color Watermark Images . . . . . . . . . . 81
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
5.2
5.3
Proposed Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Method Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.4
5.5
Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Results and Discussions . . . . . . . . . . . . . . . . . . . . . . . . 97
Chapter 6 Conclusions and Scope for Future Work . . . . . . . . . 99
6.1 Contributions Made in the Thesis . . . . . . . . . . . . . . . . . . . 100
6.2
Scope for Future Work . . . . . . . . . . . . . . . . . . . . . . . . . 101
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
List of Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
xv
List of Figures
Figure No.
Title
Page No.
1.1
1.2
Mutual dependency between the design parameters. . . . . . . . . .
Three main conflicting issues of watermarking. . . . . . . . . . . . .
5
5
1.3
1.4
Classification of watermarking methods. . . . . . . . . . . . . . . . 10
General block diagram of transform domain-based image watermarking system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.1
2.2
Three level decomposition layout of an image. . . . . . . . . . . . . 32
Genetic Algorithm Flow Chart. . . . . . . . . . . . . . . . . . . . . 34
2.3
2.4
2.5
Structural design of proposed method. . . . . . . . . . . . . . . . . 36
(a)-(b). RGB host images and (c)-(d). Gray scale watermark images. 39
Extracted RTU logo watermarks by proposed method after applying
2.6
considered attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Extracted Aeroplane image watermarks by proposed method after
applying considered attacks. . . . . . . . . . . . . . . . . . . . . . . 43
3.1
3.2
Block diagram for steerable pyramid decomposition of an image. . . 47
Structural design of proposed method. . . . . . . . . . . . . . . . . 48
3.3
3.4
(a)-(b). RGB host images and (c)-(d). Gray scale watermark images. 50
Extracted RTU logo watermarks by proposed method after applying
3.5
considered attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Extracted Aeroplane image watermarks by proposed method after
applying considered attacks. . . . . . . . . . . . . . . . . . . . . . . 54
4.1
4.2
4.3
Structural design of proposed method. . . . . . . . . . . . . . . . . 65
Watermark division. . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Partitioning of 3-DWT coefficients. . . . . . . . . . . . . . . . . . . 66
4.4
4.5
RGB host images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
RGB watermark images. . . . . . . . . . . . . . . . . . . . . . . . . 70
4.7
4.6
Three level decomposed host lena image using DWT. . . . . . . . . 70
UCS host and watermark images (a). Lena, (b). Mandrill, (c).
Pepper, (d). Sailboat, (e). RTU Logo, and (f). Aeroplane. . . . . . 71
xvi
4.8
Representative scrambled UCS watermark images. . . . . . . . . . . 71
4.9
RGB watermarked images embedded by using DE-based proposed
method (a)-(d) RTU logo and (e)-(h) Aeroplane image . . . . . . . 72
4.10 Comparison of extracted watermarks by considered and proposed
methods along with their corresponding NC values. Columns shows
extracted watermarks from watermarked image namely (a). Lena,
(b). Mandrill, (c). Pepper, and (d). Sailboat using the considered
and proposed methods mentioned in first column. First five rows
shows the extraction of RTU logo while last five shows extraction
of aeroplane watermark image. . . . . . . . . . . . . . . . . . . . . 74
4.11 Extracted RTU logo watermarks by proposed method using DE
after applying considered attacks. . . . . . . . . . . . . . . . . . . . 78
4.12 Extracted Aeroplane watermarks by proposed method using DE
after applying considered attacks. . . . . . . . . . . . . . . . . . . . 79
5.1
5.2
Structural design of proposed method. . . . . . . . . . . . . . . . . 83
Watermark division. . . . . . . . . . . . . . . . . . . . . . . . . . . 84
5.3
5.4
5.5
RGB host images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
RGB watermark images. . . . . . . . . . . . . . . . . . . . . . . . . 87
UCS host and watermark images (a). Lena, (b). Mandrill, (c).
5.6
Pepper, (d). Sailboat, (e). RTU Logo, and (f). Aeroplane. . . . . . 88
Representative scrambled UCS watermark images. . . . . . . . . . . 88
5.7
5.8
RGB watermarked images embedded by (a)-(d) RTU logo and (e)(h) Aeroplane image . . . . . . . . . . . . . . . . . . . . . . . . . . 89
A comparison of before and after optimization of fitness values for
5.9
30 runs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Comparison of extracted watermarks by considered and proposed
methods along with their corresponding NC values. Columns shows
extracted watermarks from watermarked image namely (a). Lena,
(b). Mandrill, (c). Pepper, and (d). Sailboat using the considered
and proposed methods mentioned in first column. First four rows
shows the extraction of RTU logo while last four shows extraction
of aeroplane watermark image. . . . . . . . . . . . . . . . . . . . . 91
5.10 Extracted RTU logo watermarks by proposed method using UCS
and DE after applying considered attacks. . . . . . . . . . . . . . . 95
5.11 Extracted Aeroplane watermarks by proposed method using UCS
and DE after applying considered attacks. . . . . . . . . . . . . . . 96
xvii
List of Tables
Table No.
Title
Page No.
1.1
Applications of watermarking methods. . . . . . . . . . . . . . . . .
3
1.2
1.3
Requirements and design issues of watermarking methods. . . . . .
Taxonomy of watermarking attacks. . . . . . . . . . . . . . . . . . .
5
8
1.4
1.5
1.6
Categories of spatial domain-based image watermarking method. . . 14
Categories of transform domain-based image watermarking method. 17
Categories of optimization methods in image watermarking. . . . . 21
1.7
Categories of color spaces in image watermarking method. . . . . . 23
2.1
Comparison of CPSNR values of watermarked images resultant
2.2
from proposed and considered method. . . . . . . . . . . . . . . . . 40
Comparison of robustness in terms of NC values obtained after applying attacks on the watermarked images. . . . . . . . . . . . . . . 41
3.1
Comparison of CPSNR values of watermarked images resultant
from proposed and considered methods. . . . . . . . . . . . . . . . . 51
3.2
Comparison of robustness in terms of NC values obtained after applying attacks on the watermarked images. . . . . . . . . . . . . . . 52
4.1
Setting of the parameters of three optimization methods namely;
4.2
GA, ABC, and DE. . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Comparison of CPSNR and SSIM values of watermarked images
4.3
4.4
4.5
resultant from proposed and considered methods. . . . . . . . . . . 72
Average subjective quality comparison of original and watermarked
images by 10 human beings in the scale of 0 to 5. . . . . . . . . . . 72
Comparison of robustness in terms of NC values obtained after applying common signal processing attacks on the watermarked image
embedded with RTU logo . . . . . . . . . . . . . . . . . . . . . . . 75
Comparison of robustness in terms of NC values obtained after applying common signal processing attacks on the watermarked image
embedded with Aeroplane image. . . . . . . . . . . . . . . . . . . . 76
xviii
4.6
Comparison of robustness in terms of NC values obtained after applying geometric attacks on the watermarked images. . . . . . . . . 77
5.1
Comparison of CPSNR and SSIM values of watermarked images
5.2
resultant from proposed and considered methods. . . . . . . . . . . 90
Average subjective quality comparison of original and watermarked
images by 10 human beings in the scale of 0 to 5. . . . . . . . . . . 90
5.3
5.4
5.5
Comparison of robustness in terms of NC values obtained after applying common signal processing attacks on the watermarked image
embedded with RTU logo . . . . . . . . . . . . . . . . . . . . . . . 92
Comparison of robustness in terms of NC values obtained after applying common signal processing attacks on the watermarked image
embedded with Aeroplane image. . . . . . . . . . . . . . . . . . . . 93
Comparison of robustness in terms of NC values obtained after applying geometric attacks on the watermarked images. . . . . . . . . 94
xix
List of Abbreviations
ABC
ACO
Artificial Bee Colony
Ant Colony Optimization
CPSNR
DCT
DE
Composite Peak Signal-to-Noise Ratio
Discrete Cosine Transform
Differential Evolution
DFT
DWT
Discrete Fourier Transform
Discrete Wavelet Transform
EA
GA
HSI
Evolutionary Algorithm
Genetic Algorithms
Hue Saturation Intensity
HSV
HVS
ICA
Hue Saturation Value
Human Visual System
Independent Component Analysis
IDCT
IDFT
Inverse Discrete Cosine Transform
Inverse Discrete Fourier Transform
IDWT
IPR
ISPT
Inverse Discrete Wavelet Transform
Intellectual Property Rights
Inverse Steerable Pyramid Transform
JPEG
LSB
Joint Photographic Expert Group
Least Significant Bit
MPEG
NC
PCA
Moving Picture Expert Group
Normalized Correlation
Principal Component Analysis
PSO
QS
Particle Swarm Optimization
Quantization Step
RGB
SA
SPIHT
Red Green Blue
Simulated Annealing
Set Partitioning In Hierarchical Trees
SPT
SSIM
Steerable Pyramid Transform
Structural Similarity
xx
SV
Singular Value
SVD
UCS
Singular Value Decomposition
Uncorrelated Color Space
Y Cb Cr
YIQ
YUV
Luminance Chroma: Blue Chroma: Red
Luminance In-phase Quadrature
Luminance Blueluminance Redluminance
xxi
Chapter 1
Introduction
The digital image watermarking method is capable to resolve the issue of ownership
and hence, this area of research has a wider set of applications such as copyright
protection, content authentication, ownership identification, etc. Bender et al. [1],
Fotopoulos et al. [2], Potdar et al. [3], and Liu et al. [4] presented a state-of-theart survey of image watermarking methods which have been applied in various
applications. This thesis is an attempt to develop a digital image watermarking
method for copyright protection. This chapter presents the motivation of the
research, application areas, requirement and design issues, taxonomy of attacks,
and classification of watermarking methods. Further, some of the challenges in the
field of image watermarking are identified. Moreover, a detailed survey of relevant
research in digital image watermarking is presented.
1.1
Motivation for Research
In current digital era, the orderly growth of easily capturable multimedia data
devices (such as digital cameras, camcorders, and scanners), efficient compression algorithms for multimedia data, and digital data transmission speed over the
internet have enable widespread applications, which rely on digital data. Digital
multimedia data offers many advantages over its analog counterpart like high quality, easy editing, easily stored and copying without loss of fidelity, etc. Though,
the digital data possesses many inherent advantages over its analog version, the
genuineness or ownership is the biggest challenge. The digital multimedia data can
be easily duplicated and/ or manipulated which results the real threat for content
owner from the misuse of their work or data. To keep on with the transmission
of multimedia data over the high speed internet the reliability and originality of
the transmitted multimedia data should be verifiable. In view of these deleterious
findings, it is necessary and need of current digital era that the multimedia data
must be protected and secured against the illegal utilization.
Today, multimedia content owners are eagerly seeking technologies that promise
to protect their rights and secure their content from piracy, unauthorized usage,
and enable the tracking and conviction of media pirates. During the past decades,
various solutions were proposed by the researchers in order to protect the multimedia data against the unauthorized utilization. One of the solutions of this problem
is to embed an invisible data into the original multimedia data to proof the ownership of the data. This type of method is named as information hiding which can
be further classified into various sub-classes such as cryptography, steganography,
and watermarking [5, 6]. Cryptography is the most common method of protecting
digital multimedia data, where the multimedia content is encrypted preceding to
release and a decryption key is provided to those who have purchased genuine or
legal copies [7, 8, 9]. However, cryptography cannot assist the content providers
monitor their contents after the decryption process; a buccaneer could easily purchase a genuine or legal copy and then resell it or distribute it for free over a
public network. Further, steganography is about preventing the detection of an
encrypted data, which has been protected by cryptography algorithms. However,
the message hide by steganography is not robust. Watermarking has an extra
requirement of robustness compared to steganography algorithms against various
signal processing and geometric attacks. It is therefore vital to find a path to protect these digital multimedia contents with a more precise method, which would
enable the content owners to get confidence in placing and distributing their material over the internet. Watermarking could be such a vehicle. Therefore, this thesis
plans to design and develop an efficient and robust digital image watermarking
method for protecting the color images against various attacks.
Following section illustrates the various applications of watermarking methods.
1.2
Applications of Watermarking
Digital watermarking methods have many applications namely; copyright protection, content authentication, fingerprinting, broadcasting monitoring, secret
communication, medical safety, etc. [10, 11, 12, 13] as discussed in the following
sections and summarized in Table 1.1.
• Copyright Protection: One of the motivations of developing the watermarking methods is copyright protection. In this application, a copyright
data/ information is embedded into host object without loss of quality [14].
The embedded data prevents other parties from claiming the ownership of
2
Table 1.1: Applications of watermarking methods.
S.No.
Application
Description
1.
Copyright Protection
The watermark must be known only to the author and also most
importantly it must be robust against the various attacks.
2.
Covert Communication
Since various offices or governments put a ceiling on the use
of encryption. In this scenario people may send their secret
messages by using the watermarking method.
3.
Copy Control
This application restrict the illegally copying of copyrighted materials by embedding a never-copy watermark or limiting the
number of times of copying.
4.
Content Authentication
Fragile watermark could be embedded into the host image to
check the authenticity of the data.
5.
Fingerprinting
Fingerprinting method used by the owner is to trace the source
of illegal copies.
6.
Broadcast Monitoring
Owners of copyrighted programs needs to know about illegal
broadcast, aired by the broadcasters, at the time and location
that they want according to the contracts terms and conditions.
7.
Medical Safety
Embedding the date and the patients name in medical images
could be a useful safety measure.
8.
Indexing
Indexing of multimedia contents like movies, news items, video
mail, images, etc., to help search engines to search those contents
over the internet.
that data. Moreover, the watermark must be known only to the author and
must be robust against the various attacks.
• Covert Communication: Watermarking methods can also be used for
the covert information transmission, as various offices or governments put
a ceiling on the use of encryption. In this scenario people may send their
secret messages by using the watermarking methods.
• Copy Control: This application restricts the illegal copying of copyrighted
materials by embedding a never-copy watermark or limiting the number of
times of copying. For example, today many documents are available on the
internet which could not be saved and printed to control the illegal copying.
• Content Authentication: Fragile watermark could be embedded into the
host image to check the authenticity of the data. A fragile watermark indicates whether the data has been altered and also delivers the information as
to where the data was altered. Therefore, this application does not demand
the robust watermark, since we have to detect the changes only.
• Fingerprinting: Fingerprinting method, used by the owner, is to trace the
source of illegal copies. To achieve this, owner can embed different watermarks into each copy that distributed to a different customer. For example,
3
unique serial numbers are assigned to customers and used to identify the
customer.
• Broadcast Monitoring: Owners of copyrighted programs needs to know
about illegal broadcast or the commercials, aired by the broadcasters, at
the time and location that they want according to the contracts terms and
conditions. Watermarks can be embed in any type of data to broadcast on
the network by automated systems, which are able to monitor distribution
channels to track the content in the time and the place that they appear.
• Medical Safety: Recently, telemedicine facilitates medical diagnosis by
sending patient medical data/ report over the public network for further
analysis where the modern medical equipments are available. These equipments produce large amount of data every day. Hence, it is necessary to
protect these crucial data. Medical image watermarking is a suitable method
used for enhancing security and authentication of medical data, which is used
for further diagnosis and reference. Embedding the date and the patients
name in medical images could be a useful safety measure.
• Indexing: One of the well-known application of the watermarking is indexing of multimedia contents like movies, news items, video mail, images, etc.
In which a comments or any tag/ level is embedded on the contents, so that
these comments or tags are utilized by any search engine to search those
contents over the internet.
The following section listed various requirements and design parameters related
to watermarking methods.
1.3
Requirements and Design Issues of Digital
Watermarking Method
There are various design issues and requirements associated with any watermarking method like transparency, robustness, capacity, security, etc. as summarized
in Table 1.2. The objectives of researchers in the field of watermarking is to maximize all these parameters for a particular method. Furthermore, these parameters
are mutually dependant on each other as shown in Figure 1.1. Three parameters
namely; transparency, robustness, and capacity are inversely related to each other
i.e. the transparency of a watermarking method increases then its robustness
suffers and vice-versa. This relationship has been depicted in Figure 1.2.
4
Table 1.2: Requirements and design issues of watermarking methods.
S.No.
Requirements and Design
Issues
Description
1.
Transparency
No visual or audio effect should be noticed by the user.
2.
Robustness
Watermark can be robust against one operation on host data
and may be fragile against another operation.
3.
Capacity
If the capacity is higher than the better robustness is achieved
and at the same time transparency suffers or vice-versa.
4.
Security
The watermark must resist against the attacks on the host
data.
5.
Complexity
The computational cost must be as low as possible to make
the applications real time.
6.
Reliability
Watermark data embedded into the host, must be recoverable
with the acceptable errors.
Figure 1.1: Mutual dependency between the design parameters.
Figure 1.2: Three main conflicting issues of watermarking.
Hence, the relative importance of these parameters depends on the applicationto-application as listed in the previous section. Moreover, certain applications
demand for more robustness compared to the transparency of the method viz.
copyright protection. Therefore, watermarking method design process involves
trade-off between the conflicting requirements parameters. The most important
requirement for digital watermarking are summarized below:
• Transparency: Transparency or imperceptibility refers to the correlation/
similarity between the watermarked data and the original data. The wa5
termark should be invisible. In other words, there is no visual or audio
effect should be noticed by the user. The watermark should not be disgrace
the quality of the host data. However, for a particular application minute
degradation in the host data is permissible to achieve better robustness or
to optimize the cost.
• Robustness: If a watermark can stay alive after common signal processing
operations (such as compression, filtering, translation, rotation operations,
analog-to-digital conversion, scaling, etc.) on host data, then such type of
watermark is called the robust. Moreover, watermark can be robust against
one operation on host data and may be fragile against another operation. For
certain applications, there is a need to embed a robust watermark into the
host data, while some applications demand the fragile watermark. Hence,
it also depends on the application. If the watermark data is embedded in
significant area of a host image then the better robustness is achieved. This
is because those area do not alter so much after common image processing
operations [15]. Contrary to robust watermark, a fragile watermark is not
designed to be robust.
• Capacity: A capacity or payload refers the amount of watermark data that
can be embedded into host. For example, the capacity in case of image
watermarking means the number of bits embedded within the host image.
If the payload is higher than the better robustness is achieved and at the
same time transparency suffers or vice-versa. Therefore, the payload of the
embedded watermark must be in sufficient amount to enable the envisioned
application.
• Security: The watermark must resist against the attacks on the host data.
It must be impossible for an attacker to delete or modify the watermark
without rendering the multimedia data unusable. From this point of view, a
secret watermark key is also used in watermarking, so that it is not possible
to retrieve or even modify the watermark without knowledge of the key.
• Complexity: Depending on the application, the watermark detection is to
be done at different speeds and complexity. For example in broadcast monitoring application, the detection of the watermarking is done in real time.
The computational cost must be as low as possible to make the applications
real time. To keep above facts, the complexity of the watermarking methods
should be low.
6
• Reliability: Watermark data, embedded into the host, must be recoverable
with the acceptable errors.
The performance of watermarking methods for achieving above mentioned requirements are tested after applying various attacks. Therefore, the following
section describes the classification of attacks applicable to image watermarking.
1.4
Taxonomy of Watermarking Attacks
Any procedure that can decrease the performance of watermarking method may be
termed as attack. Testing the robustness and security of a watermarking method
against attacks is as important as the design process. The attacks do not always
remove or destroy the watermark but, also disable its detection. The distortions
done by any attacks degrade the performance of the watermarking method.
In general, different attacks on watermarking can be divided into two classes
namely; unintentional and intentional attacks. To achieve the high reliability
of watermark detection, the watermark detection process has to be robust to the
modifications in the host data caused from both unintentional and intentional
attacks. Unintentional attacks take place using signal processing operations on
watermarked data namely; compression, printing, scanning, filtering, noise, geometric transforms, cropping, etc. For example, multimedia data is generally stored
in lossy compressed format in order to use less storage capacities. These compression algorithms discard the unimportant parts of data. This distortion may cause
damage of inserted watermark data too. This means that a simple attack is compressing multimedia data in a lossy way. In addition, a rotation or scaling can
change pixel values and destroy the watermark data. Signal processing operations
such as quantization, decompression, re-sampling, and color reduction can damage the watermark. For intentional attacks, a person on purpose can attack on
inserted watermark data in order to copy the multimedia data. In both cases,
any watermarking method should be able to detect and extract the watermark
after attacks. The taxonomy of various intentional and unintentional attacks in
watermarking methods [16, 17, 18], are presented in Table 1.3 and their details
are summarized below:
• Noise: Any random unwanted signal with a given distribution namely; Gaussian, salt & pepper, Poisson, etc., is added to the image unintentionally.
This type of noise may be added during the Analog-to-Digital conversion
and vice-versa, or as a result of transmission errors. However, an attacker
may introduce perceptually shaped noise with the maximum un-noticeable
7
Table 1.3: Taxonomy of watermarking attacks.
S.No.
Attack
Details
1.
Noise
Any random unwanted signal with a given distribution namely; Gaussian, salt & pepper, Poisson, etc., is added to the image unintentionally.
2.
Filtering
Filtering attacks are linear filtering namely; low pass/ mean filtering,
Gaussian, and sharpening filtering, etc.
3.
Compression
If the watermark is required to resist different levels of compression, it
is usually advisable to perform the watermark embedding in the same
domain where the compression takes places.
4.
Multiple Watermarking
The one of the solution of such type of problem is to embedding the
time information by a certification authority.
5.
Geometrical Attacks
Geometrical attacks distort the watermark through spatial alterations
of the watermarked image. Common geometrical attacks are rotation,
scaling, etc.
6.
Cropping
This is a very common attack which crops the region of interest from
the watermarked object.
7.
Watermark
Removal
and Interference Attacks
The objective of such attacks is to forecast or estimate the watermark.
8.
Statistical Averaging
The objective of such attacks is to recover the host image and/or
watermark data by statistical investigation of multiple marked data
sets.
power. This will characteristically force to increase the threshold at which
the correlation detector operates.
• Filtering: Filtering attacks are linear filtering namely; low pass/ mean filtering, Gaussian, and sharpening filtering, etc. Mean or average filtering does
not introduce considerable degradation in watermarked images but, can dramatically affect the performance. Therefore, to design a watermark, robust
to a known group of filters that might be applied to the watermarked image,
the watermark data should be designed in such a way that it have most of
its energy in the frequencies which filter transfer functions changes the least.
• Compression: Compression belongs to an unintentional attack class, which
appears very often in various multimedia applications. In practice, most of
the images, audio, and video are being transmitted/ distributed via internet
after the compression in order to reduce the time and data usage. If the
watermark is required to resist different levels of compression, it is usually
advisable to perform the watermark embedding in the same domain where
the compression takes places.
• Multiple Watermarking: An attacker may watermark an already watermarked data and later claims of ownership. One solution to such type of
8
problem is to embed the time information by a certification authority.
• Geometrical Attacks: Geometrical attacks do not pretend to remove the watermark by itself, but to distort it through spatial alterations of the watermarked image. With such attacks watermarking detector loses the synchronization with the embedded information. These attacks can be subdivided
into attacks applying general affine transformations and attacks based on
projective transformation. Common geometrical attacks are rotation, scaling, change of aspect ratio, translation and shearing, etc.
• Cropping: This is a very common attack since in many cases the attacker is
interested in a small portion of the watermarked object, such as parts of a
certain picture or frames of video sequence. With this in mind, in order to
survive, the watermark needs to be spread over the dimensions where this
attack takes place.
• Watermark Removal and Interference Attacks: The objective of such attacks
is to forecast or estimate the watermark and then use the predicted watermark either to eradicate watermark or to damage its unique extraction at the
destination side. Some known efficient removal attacks are; the median watermark prediction followed by subtraction [19], the Wiener prediction and
subtraction [18] and perceptual re-modulation [20], which combines both
removal and interference attacks.
• Statistical Averaging: The objective of such attacks is to recover the host
image and/or watermark data by statistical investigation of multiple marked
data sets. An attacker may attempt to predict the watermark and then to
remove the watermark by subtracting the estimate. This is very hazardous
if the watermark does not rely significantly on data. That is why the perceptual masks are used to create a watermark. Averaging or smoothing attack
is belonging to this class of attack. Averaging attack consists of averaging
many instances of a given data set (e.g. N) each time marked with a different
watermark. In this pattern a prediction of host data is calculated and each
of the watermarks is weakened by a factor N.
In the above section, various classification of watermarking attacks have been
presented. The following section gives the brief details of classification of the
different watermarking methods.
9
1.5
Classification of Watermarking Methods
Mohanty [21] presented a state-of-the-art categorization of digital watermarking
methods. Digital watermarking methods may be categorized on the basis of host
multimedia data, human perception, embedding domain, robustness, data extraction, application area, etc. [13]. Figure 1.3 shows the classifications of digital
watermarking methods. There are different way of classification of digital water-
Figure 1.3: Classification of watermarking methods.
mark methods [22].
• First, watermarking methods may be divided into four groups according to
the type of host multimedia data to be watermarked;
– Image watermarking method
– Audio watermarking method
– Video watermarking method
– 3-dimension (3-D) watermarking method
• Second, watermarking methods may be grouped on the basis of the data for
extraction;
– Private or non-blind watermarking method: This class of method required the original data (watermark or/ and host) during the extraction
of watermark from the watermarked data.
10
– Semi-private or semi-blind watermarking method : This group of method
needs extra information other than the original data during the detection.
– Public or blind watermarking method : In public or blind watermarking
method the detection of watermark from the watermarked data needs
only the watermark.
• Third, watermarking methods may be categorized on the basis of human
perception;
– Visible watermarking method : If the watermark data is noticeable to
the user, then such class of watermarking is known as visible watermarking method. Examples of visible watermarks are logos that are
used in papers and video.
– In-visible watermarking method : If the watermark data is imperceptible
to the user, then such class of watermarking is known as invisible watermarking method. For example, images distribute over the internet
and watermarked invisible for copy protection.
• Fourth, watermarking methods may also be classified on the basis of robustness;
– Fragile: A fragile watermark will be changed if the host data is modified.
– Semi-fragile: Semi-fragile watermark is sensitive to some degree of the
change to a watermarked image.
– Robust: Watermark in robust method cannot be removed by common
signal processing operations.
• Fifth, watermarking methods may also be classified on the basis of embedding watermark data;
– Text: If the embed watermark data is in the nature of text.
– Image format: If the embedded watermark belongs to any image shape
like logo, binary image, gray scale image, color image or logo, stamp,
etc.
– Noise sequence: In this class of method the embedding watermark is
in terms of random noise sequence like pseudo random or Gaussian
random sequence etc.
11
• Sixth, watermarking methods may be categorized on the basis of application
of method;
– Source-based watermarking method : In source based, all copies of a
particular data have a unique watermark, which identifies the owner of
that data.
– Destination-based watermarking method : In this method, each distributed copy is embedded using a unique watermark data, which identifies a particular destination.
• Finally, watermarking methods may be classified into two major classes according to the embedding domain;
– Spatial domain
– Transform domain;
∗ Discrete Fourier Transform (DFT) domain-based watermarking method
∗ Discrete Cosine Transform (DCT) domain-based watermarking method
∗ Discrete Wavelet Transform (DWT) domain-based watermarking
method
∗ Steerable Pyramid Transform (SPT) domain-based watermarking
method
∗ etc.
Following section reviews various image watermarking methods along with their
constraints.
1.6
Literature Review of Image Watermarking
In the previous Sections 1.2 – 1.5 the various application areas, requirements and
key design issues, classification and need of different watermarking attacks, and
classification related to digital watermarking methods have been discussed. In
the area of watermarking, image watermarking particularly attracted the research
community a lot because of following reasons;
• Easily availability of the test image databases.
• It contains adequate superfluous information to give an opportunity for embedding the watermark data easily.
• Any successful image watermarking method may be upgraded for the video
also.
12
• Wider set of applications.
Therefore, most of the research work in the field of watermarking is dedicated to
image as compared to audio, video, and other multimedia formats [23]. Therefore,
in this thesis the emphasis has been given only on the literature review of image
watermarking methods.
Digital image may be represented/ stored either in spatial/ time domain or
in transform domain. The spatial/ time domain image is characterize by pixels, whereas the transform domain image is described in terms of its transform
coefficients. In other words, transform domain representation of an image segregates the transform coefficients into multiple frequency bands. To convert an
image to its transform domain representation, we can use various available reversible transform methods namely; Discrete Fourier Transform (DFT), Discrete
Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Steerable Pyramid Transform (SPT), etc. Each of these transform method has its own specific
characteristics and representation of an image.
Digital image watermarking is a process of imperceptibly hiding a watermark
(in the form of signature, random sequence, or some image) into an image (host
or cover) which may be used to verify the genuineness of its owner. The resultant
image of this process is termed as watermarked image. The watermarking methods can be performed either in spatial domain or in the transform domain. In
spatial domain-based watermarking method, watermark may be embedded within
an image by modifying the pixel values [9] or the Least Significant Bit (LSB) values. While, in transform domain-based watermarking method, watermark may be
embedded by modifying the transform domain coefficients. However, more robust
watermark could be embedded in the transform domain of images by modifying
the transform domain coefficients as compared with the spatial domain-based image watermarking method. In the following section, the state-of-the-art review of
digital image watermarking methods have been presented based on spatial domain
and transform domain [1, 2, 3, 22, 24, 25, 26].
1.6.1
Spatial Domain-based Methods
A watermarking method based on the spatial domain approach, hides watermark
data in the pixel values of the host image. Such class of methods make minor
changes in the intensity of pixel value of host image [1, 27, 28, 29, 30, 31, 32, 33, 34].
One of the most common examples of this method is to embed the watermark in
the LSB’s of image pixels [28, 30, 35]. In other words, significant portions of
low frequency components of images should be modified in order to insert the
13
watermark data in a reliable and robust way. As another example, an image is
divided into the same size of blocks and a certain watermark data is added with
the sub-blocks [28]. The imperceptibility of the watermark data is achieved on the
postulation that the LSB bits are visually insignificant. Although, spatial domainbased watermarking method can be easily implemented and very fast, they have
the many disadvantages. These methods are highly susceptible to common signal
processing operations and can be easily impaired and tempered. For example,
lossy compression could completely crush the watermark data. In summary, watermarking method based on spatial is very easy to destroy using some attacks like
low-pass filtering, additive noise, etc. In other words, the spatial domain-based
image watermarking methods are not robust against the common signal processing operation on the host image. The brief summary of spatial domain-based
methods presented in Table 1.4. Researchers [15] suggested that the transform
domain-based image watermarking methods are more robust as compared to spatial domain-based image watermarking methods against the various watermarking
attacks as mentioned in the Section 1.4. Therefore, further in this thesis our focus
is only on the transform domain-based image watermarking methods.
Table 1.4: Categories of spatial domain-based image watermarking method.
S.No.
Category
Property
Description
1.
Pixel-based
[27, 28, 33]
Such class of methods makes minor changes in the intensity of
pixel value of host image to embeds a watermark. One of the
most common example of this
method is to embed the watermark in the LSB’s of image pixels.
Spatial domain-based watermarking method can be easily
implemented and very fast.
2.
Block-based
[28, 29, 30]
In this class of watermarking
method an image is divided into
the same size of blocks and a
certain watermark data is added
with the sub-blocks.
These methods are highly susceptible to common signal processing operations and can
be easily impaired and tempered. For example, compression could completely crush the
watermark data.
1.6.2
Transform Domain-based Methods
The transform of an image is just another form of representation. It does not
change the content present in the image. Transform domain-based image watermarking methods have many advantages over spatial domain-based methods
[15]. As presented in literature, transformed domain-based image watermarking
methods are more robust against the various watermarking attacks and signal
processing operations because the transform domain does not utilize the original
14
host image for casting the watermark data. In addition, the transform domainbased image watermarking distributes the watermark data over all part of the
host image. Moreover, transform domain-based methods are capable enough to
embed more watermark bits into the host image and are more robust to attack.
However, they are difficult to implement and are computationally more expensive
as compared with the methods given in Section 1.6.1. In literature, various reversible transform methods namely; DFT, DCT, DWT, SPT, etc. are used by the
researcher to improve the robustness of the image watermarking methods. This
class of watermarking methods insert the watermark data into the host image by
manipulating the corresponding transform coefficients [36, 37, 38, 39, 40, 41, 42,
43, 44, 45, 46, 47, 48].
Figure 1.4 shows the general block diagram of transform domain-based digital watermarking system. Summary of the transform domain-based methods are given
in Tables 1.5. A detailed sate-of-the-art survey of transform domain-based image
watermarking methods has been presented by Potdar et al. [3].
Discrete Fourier Transform (DFT)-based Method
Ruanaidh et al. [49] presented a DFT-based image watermarking method in which
the watermark data is inserted into the host image by manipulating the phase
information. Wolfgang et al. [30] later concluded in their work that image watermarking using the phase manipulation is robust against image contrast operation.
Further, Ruanaidh and Pun [50] presented a method of image watermarking using
the Fourier transform and concluded that method is robust against the geometric
attacks. Lin at al. [51] presented a novel image watermarking method which is robust against the rotation, scaling, and translation attacks. However, this method
is not robust enough against the cropping and compression attacks. In literature, few methods are available where the watermark is casted by modifying the
mid frequency band of DFT magnitude component [52, 53]. They concluded that
the proposed methods are robust against the Joint Photographic Expert Group
(JPEG) and Set Partitioning In Hierarchical Trees (SPIHT) compression attacks.
Moreover, Solachidis and Pitas [54] presented a novel method of image watermarking in which a circularly symmetric watermark is embedded in the DFT domain.
In addition, the proposed method is robust against the geometric rotation attacks
because the watermark is circular in shape with its center at image center.
15
(a) Embedder
(b) Extraction
Figure 1.4: General block diagram of transform domain-based image
watermarking system.
Discrete Cosine Transform (DCT)-based Method
Transform domain-based image watermarking methods possess a number of desirable properties as compared to spatial domain-based methods. Moreover, these
methods make it difficult for any intruder or unauthorized user to read or change
the watermark data. Since in the transform domain, embedded watermark is distributed over the area of the image after the inverse transformation. The DCT
domain-based method is divided into two groups namely; global-based and blockbased DCT image watermarking methods. The image watermarking methods that
rely on the global DCT approach, spread the watermark over the entire image.
On the other hand, block-based approach embeds the watermark as follows:
1. Divide the host image into non-overlapping blocks of 8 × 8.
2. Take the DCT to each of the block as mentioned in step 1.
3. Choose a specific block for watermark embedding by using certain criteria
like Human Visual System (HVS).
4. Choose coefficients for watermark embedding by using certain selection criteria like highest or lowest magnitude.
5. Cast the watermark data by modifying the selected coefficients; and
16
Table 1.5: Categories of transform domain-based image watermarking method.
S.No.
Category
Description
1.
DFT-based
Robust against image contrast operation. [49]
Robust against the geometric attacks. [50]
Robust against the rotation, scaling, and translation attacks.
However, this method is not robust enough against the cropping and compression attacks. [51]
Watermark embedded by modifying the mid frequency band of
DFT coefficients. Furthermore this method is robust against
JPEG and SPIHT compression attacks. [52], [53]
Circularly symmetric watermark is embed in the DFT domain
and concluded that method is robust against the geometric
rotation attacks. [54]
2.
DCT-based
Global DCT approach by exploiting the HVS and shows that
the method is robust against the geometric attacks like rotation, scaling, etc. [8], [15]
Block-based DCT method. DCT-based methods missing the
time and frequency information at the same time. [55], [56]
3.
DWT-based
Based on principle of “toral automorphism”. [31]
Known as “cocktail watermarking”and concluded that the
method is robust against the all possible watermarking attacks.
[57]
Presented a novel method for any size of images, which hides
watermark into the high-frequency sub-bands of DWT coefficients. [58]
Uses Daubechies-2 filter bank for transformation of host image
and show that the proposed method is robust to geometric,
filtering, and StirMark attacks. [59]
Uses Symlet-8 filter bank and shows that the method is robust
against various attacks. [60]
Uses Har wavelet for host image transformation. [61]
Uses Symlet-4 filter bank. [42]
4.
SPT-based
Robust against the various geometric attacks in comparison
with DWT-based method. [46]
Hybrid watermarking method using the SPT and SVD, this
method have good visual quality and resistance against several
attacks. [62]
Robust against the common signal processing and geometric
attacks like rotation. [63]
6. Take inverse DCT (IDCT) transform on each block.
In the DCT-based image watermarking method, most of the research is dedicated
to design the specific criteria for selecting the particular block and coefficients.
Cox et al. [15] proposed a robust image watermarking method using the global
DCT approach, which embeds the imperceptible watermark data into the host
image by exploiting the HVS. Koch et al. [8] reported a method for watermark
embedding having following steps:
1. Divide the host image into non-overlapping blocks of 8 × 8.
2. Take the DCT to each of the block as mentioned in step 1.
17
3. Choose the specific block by using the pseudo-random subset criteria.
4. A triplet of frequencies is selected from 1 of 18 predetermined triplets.
5. Cast the watermark data by modifying the selected coefficients, so that their
relative strengths encode a 1 or 0 value.
6. Take inverse DCT transform on each block.
In literature, various image watermarking methods have been proposed by using
DCT [55, 56, 64, 65, 66, 67, 68, 69]. Out of the existing DCT-based watermarking
methods, the block-based DCT method is widely used by researchers in the area of
watermarking. Lin et al. [69] find that the DCT-based methods are robust against
JPEG compression, but as robustness increases the quality of watermarked image
decreases. Moreover, DCT-based methods are not robust against the geometric
attacks like rotation, scaling, etc.
Discrete Wavelet Transform (DWT)-based Method
To achieve the robustness of image watermarking methods, discrete wavelet transform utilizes the spatial and frequency information of the transform data in multiple resolution. Recently, many image watermarking methods have been reported
which exploit the advantage of DWT over the DFT and DCT [40, 41, 42, 58, 59,
60, 70, 71, 72, 73, 74]. However, the performance of DWT-based method can be
further enhanced by exploiting the characteristics of HVS during the watermark
embedding stage. If a watermarking method can utilize the characteristics of the
HVS, then it is possible to embed watermark with more energy in a host image,
which makes watermark more robust. Although, the HVS model enhances the
imperceptibility and robustness of watermarking method, it suffers with the computational cost and complexity point of view. According to the HVS, the human
eye is less sensitive to noise in high resolution DWT bands having an orientation
of 450 . From this point of view, the DWT is a very useful transform as compared
to DFT and DCT, since it can be used as a computationally efficient version of
the frequency model for the HVS [70]. One of the reasons for the popularity of
DWT-based image watermarking method is that various multimedia standards
like JPEG2000, MPEG-4, etc. are based on the DWT. Hence, DWT decomposition can be exploited to make a real-time watermark application. DWT-based
image watermarking methods are capable to embed a fairly good quality of watermark and it can recover the watermark from watermarked image effectively.
The quality and robustness of DWT-based methods depend on the selection of
18
particular filter bank and decomposition level [61]. Voyatzis and Pitas [31] developed a robust method on the principle of “toral automorphism”, in which they
embed the binary logo watermark. Lu et al. [57] presented a method in which
they embedded dual watermarks with complement to each other. This method
is popularly known as “cocktail watermarking”. Furthermore, the result shows
that the proposed method is robust against all possible watermarking attacks.
Zhao et al. [75] reported a dual domain-based method for image authentication. In their method, authors utilized the DCT for watermark generation and
DWT for watermark casting. Agreste and Andaloro [58] presented a novel DWTbased watermarking method for any size of image which hides watermark into the
high-frequency sub-bands of DWT coefficient of host image. Later, Agreste and
Andaloro [59] reported another method which was the modified version of their
previous method by changing the filer bank by Daubechies-2, and concluded that
it is more robust to geometric, filtering, and StirMark attacks. Ghouti et al. [41]
selected balanced multi-wavelets filter bank for the data hiding and found that the
method is more robust against the various watermarking attacks. Furthermore,
Khelifi et al. [60] utilized the advantage of symlet-8 filter bank in their method.
Vahedi et al. [61] uses the Haar wavelet for message hiding. Moreover, Vahedi
et al. [42] exploited the advantage of symlet-4 filter bank to increase the quality
and robustness of watermarking method as compared to existing methods. In his
paper, they proposed a novel DWT-based method for color images by embedding
the binary watermark. For embedding the watermark, DWT-based methods use
three or higher level decompositions [39, 40, 42].
Steerable Pyramid Transform (SPT)-based Method
During the recent years, various image watermarking methods have been developed by using the DWT because it possess a number of desirable properties as
compared with the other transform-based methods. However, there are still rooms
for improvements in the field of watermarking. Although, DWT-based image watermarking methods have various advantages, it suffers in terms of recording the
directional information which is very important components for any digital image
processing operations [44, 47]. Therefore, scholars in this area looking for another reversible transform which possess all the properties of DWT. As a result,
researchers in this area propose various scale and directional image illustrations
during the years and results show that out of other representation, SPT having all
the advantages of DWT. Further, SPT is also capable in capturing the directional
information. Moreover, the results show that the SPT-based image watermarking
methods are more robust against the various geometric attacks in comparison with
19
DWT-based method [46]. Literature shows that the SPT keeps most of the advantages of DWT as its basis functions are confined to a small area in both space
and spatial-frequency. However, this recursive multi-scale & multi-directional decomposition improve the drawbacks of DWT like; it is aliasing free and capable to
generate any number of orientation bands as it is based on a category of random
orientation filters produced by linear grouping of a set of basis filters [46, 76].
Invariance, multi-resolution, and capture of multi-scale and multi-resolution constructions in the images are some of main properties of SPT which make it superior
in watermarking methods. Moreover, researchers concluded on the basis of the results that SPT-based methods of image watermarking are more robust against
the common signal processing and geometric attacks [45, 46, 47, 63]. There are
lot of scope of the research using SPT-based watermarking method because very
few SPT-based image watermarking methods [46, 62] have been reported till date.
Drira et al. [46] developed a SPT-based method and shows that it is resistant
to JPEG compression, additive noise, and median filtering. Hossaini et al. [62]
presented a novel hybrid watermarking method using the SPT and singular value
decomposition (SVD) and concluded that proposed method has good visual quality and resistance against several attacks.
Following section reviews the various optimization methods used to improve
the performance of image watermarking along with their constraints.
1.6.3
Optimization Methods in Image Watermarking
Previous section presented a state-of-the-art survey of different image watermarking methods using various domain like spatial and transform domain. Literature
survey reveals that the transform domain methods are more robust in comparison with spatial domain. In any watermarking method the aim is to maximize
the various parameters like transparency, robustness, capacity, etc. as given in
Section 1.3. Furthermore, the above mentioned parameters are the function of
strength factor of watermark to be added into the host image. However, all these
parameters are inversely related to each other. Therefore, to enhance the performance of the method, researchers must select the optimum value of strength
factor of watermark, so that all above mentioned parameters are maximized simultaneously. From this point of view, there is a room for the optimization methods
in the watermarking area to enhance the performance by optimally selecting the
value of strength factor. There are various optimization methods namely; genetic
algorithm (GA), artificial bee colony (ABC), differential evolution (DE), particle
swarm optimization (PSO), etc. which have been used to increase the quality and
20
robustness of watermarking methods [77]. During the recent years, many watermarking methods have exploited the advantages of various available optimization
methods [42, 55, 71, 78, 79, 80, 81, 82, 83, 84, 85]. The detailed survey of different
optimization methods has been presented by Karaboga and Akay [82] and Darwish
and Abraham [13]. A brief summary of the optimization methods used in image
watermarking methods is presented in Table 1.6.
Table 1.6: Categories of optimization methods in image watermarking.
S.No.
1.
Category
Details
Genetic Algorithm
Optimize 24 strength factor of watermark. [42]
Uses GA for search the optimum values of parameters. [81, 86]
Use GA to embed two bits of watermark data within each pixel
of host image. [87]
2.
Differential
Method
Evolution
Scale factors optimized using DE. [88]
Used a modified DE (self-adaptive differential evolution) algorithm for optimizing the scaling factors. [85]
Applied a DE optimization method, to search optimal scaling
factors. [89]
Use the DE to optimally design the quantization steps (QSs) for
calculating the strength of the watermark for achieving good
robustness and quality. [90]
3.
Artificial Bee Colony
Method
Uses the ABC method to optimize pixel by pixel embedding
at different frequency sub-band with DWT, to improves the
performance of proposed image watermarking method. [91]
Genetic Algorithm
Many researchers used GA in their method for optimizing the watermark strength
to enhance the overall performance. GA have been used by Vahedi et al. [42, 80] to
compute the optimum strength of watermark and result shows that it improves the
robustness of existing methods. Kumsawat et al. [81, 86] used GA in their methods
for searching the optimum values of parameters and the embedding strength to
improve the transparency and robustness of proposed method. Mohammed et
al. [87] proposed a novel method in which they used GA to embed two bits of
watermark data within each pixel of host image.
Differential Evolution Method
A detailed survey of DE method has been presented by Das et al. [92]. Vesterstrom and Thomsen [93] compared the performance of DE with PSO, and other
21
evolutionary algorithms (EAs), and reported that DE outperforms other considered methods. Aslantas [88] reported a method in which the singular values (SVs)
of the host image are manipulated to embed the watermark by using multiple
scaling factors. Further, scale factors are optimized using DE to enhance the
performance of proposed method. Later, Aslantas [94] exploits the DE method
for optimizing the scaling factor parameters to achieve maximum robustness and
transparency. Ali and Ahn [85] used a modified DE (self-adaptive differential evolution) algorithm for optimizing the scaling factors of watermark data to achieve
better robustness and quality in DWT-SVD based watermarking method. Further, Ali et al. [89] applied a DE optimization method to search optimal scaling
factors to improve the quality of watermarked image and robustness of the watermark. Lei et al. [90] proposed a method in which they used DE to optimally
design the quantization steps (QSs) for calculating the strength of the watermark
for achieving good robustness and quality.
Artificial Bee Colony Method
Artificial Bee Colony (ABC) optimization method is one of the most recently developed swarm-based algorithms. A very few watermarking methods have been
reported which utilizes the powerfulness of ABC for optimization in their methods
till date. Karaboga and Akay [82] compared ABC optimization method with GA,
PSO, etc. and concluded that the performance of ABC is better than other optimization methods. Recently, Akay and Karaboga [95] presented a state-of-the-art
survey and applications in the field of image processing. Sha et al. [91] uses the
ABC method to optimize pixel by pixel embedding at different frequency sub-band
with DWT to improve the performance of proposed image watermarking method.
Following section reviews the various color spaces used in image watermarking
method in order to enhance the performance parameters along with their constraints.
1.6.4
Color Spaces in Image Watermarking Method
At the outset, early image watermarking methods embed the watermark message
within the gray scale or color host image in the form of bits or bit stream and
further these bit streams are replaced by some pictorial shape representations
[39, 40]. In various multimedia applications namely; MPEG-1, MPEG-2, and
other MPEGs, the color images are the basic component. Hence, it is vital to
develop a watermarking method for color images. Although digital images are
22
available in color format, most of the watermarking methods embed the gray
scale or binary image watermark while very few work has been reported for color
watermark [96, 97, 98]. In color image processing, we cannot ignore the effects of
different color spaces used on the performance of the method. Furthermore, Vahedi
et al. [99] demonstrated the effects of different color spaces on the performance
of an image watermarking method. The color spaces are dividing into two classes
namely; correlated and uncorrelated color space. The summary of color spaces
used in image watermarking is given in Table 1.7.
Table 1.7: Categories of color spaces in image watermarking method.
S.No.
Category
1.
Correlated
Spaces
Comments
Color
Uses HSV, RGB, YUV and HSI color models respectively
in image watermarking method. [34, 58, 100, 101]
They uses HSI color space in DWT-based watermarking
method. [42]
2.
Uncorrelated
Spaces
Color
Uncorrelated color models Lab and Lαβ are used.[102]
Embeds the color watermark in Lab color space. [96]
Correlated Color Spaces
In a correlated color spaces, a color image is decomposed into three semi-independent
images in which change in one component may affect the other two components
of the images. In literature, various correlated color spaces namely; RGB, Y Cb Cr ,
YIQ, HSI, HSV, etc. are being used in image watermarking methods by the researchers. Methods proposed by researcher in [34, 58, 100, 101] uses HSV, RGB,
YUV, and HSI color models respectively. Vahedi et al. [99] reported a work
dedicated to the performance of DWT-based watermarking method on different
color spaces like RGB, Y Cb Cr , YIQ, HSI, and HSV. In which they concluded
that HSI color space outperforms other considered spaces. Golea et al. [97] presented the SVD-based RGB color image watermarking for embedding the color
RGB watermark into the RGB host image. Recently, Su et al. [98] presented QR
decomposition method for embedding the RGB color watermark into RGB host
image. Vahedi et al. [42] presented a DWT-based watermarking method in which
they used HSI color space to enhance the robustness and transparency.
Uncorrelated Color Spaces
Most of the image watermarking methods reported so far have used the correlated
color spaces. However, correlated color spaces impose the constraints to use only
23
one color channel at a time for casting the watermark data [103]. As a consequence,
researchers in this area proposed various color co-ordinate illustrations during the
recent years to removes the dependency of three decomposed images. Such class
of color space is called as uncorrelated color space. There exist some uncorrelated
color models such as Lab, Lαβ, uncorrelated color space (UCS), etc. which may
be used in color image watermarking to increase the robustness and quality by
using all the color image components of host and watermark images [43, 102,
104]. There is a lot of scope of the research using uncorrelated color spacesbased watermarking method because very few work has been reported till date.
Chou and Wu [96] embedded the color watermark in Lab color space using less
computationally complex spatial-domain color image watermarking method.
1.7
Challenges in Image Watermarking
Though many image watermarking methods have been proposed and demonstrated significant contribution, there are still some challenges which need to be
addressed. One of the main challenges of the watermarking problem is to achieve a
better trade-off between robustness, transparency, capacity, and security. In order
to address above mentioned issue (i.e. the trade-off) to achieve a better performance, many researchers presented solutions for this issue in their work. However,
improvements are required to fulfill the expectation of the industry. This section
overviews some of the crucial challenges of image watermarking.
1.7.1
Use of Color Watermark
Most of the work during the past decade in this area have been reported for
protection of the color or gray scale image (host) by embedding the gray scale
or binary image watermark. To embed a binary or gray scale image, one has to
convert it from color image because in nature color images are available. However,
very few methods have been reported which embed color watermark for protection
of images [96, 97, 98]. From this point of view, there is still a lot of scope for
improvements in the field of image watermarking to embed a color watermark
into the color host image.
1.7.2
Color Spaces
In color image watermarking, we are dealing with color images for host and watermark. To read a color image there are various color spaces/ coordinates available
in the literature as given in Section 1.6.4. Therefore, researchers are use different
24
color spaces to improve the performance of the method. Robustness and transparency of any method depend on how an input host is decomposed into three
color channels and also the decomposed images are independent with each other
or not. In other words, performance parameters of a color image watermarking
depend on the color space used in the method [99]. To consider above facts, there
is a lot scope to improve the performance of method by using a suitable color
space which decompose an image into three independent images. Fortunately, a
class of color spaces known as uncorrelated color space, generate three independent images. However, a very few method has been reported which exploits this
class of color coordinate.
1.7.3
Transform Method
Though various reversible transform methods, as given in Section 1.6.2, have been
used in the reported image watermarking methods, still there is scope for improvements of image watermarking methods by using some newly introduced transforms
(like SPT and other) which show better performance as compare to existing methods.
1.7.4
Optimization Method
A better trade-off is required between the parameters given in Section 1.3 to enhance the performance of the watermarking method. Furthermore, better trade-off
between the parameters depend on how optimally select the embedding parameters (like strength factor of watermark). To achieve this objective, there are
various optimization methods which have been used by the researchers as given
in Section 1.6.3. From this point of view, there is a room for improvements in
the performance of image watermarking method by using some newly developed
optimization methods like ABC, DE, etc.
1.7.5
3-D Watermarking
A recent challenge in watermarking is for protection of the 3-D objects or models
against the illegally utilizations which was introduced by Ohbuchi [105]. This
type watermarking is called “3-D watermarking”. Recently, 3-D watermarking
have been widely used in virtual reality, medical imaging, video games, computer
aided design, etc. This is considered as a new kind of multimedia that has scored
an increasing success. A very few work has been reported to protect the 3-D
models against the illegal utilizations till date, though it has been widely utilized
25
in the entertainment industry.
1.8
Scope of the Thesis
The challenges discussed above have not been fully resolved. Therefore, there is
a need to design and develop a robust image watermarking method. The main
contributions in this thesis are five-fold. It first aims to pre-process the input color
images (host and watermark) by transforming it into UCS color space. Second,
four efficient transform-based image watermarking methods for color images have
been proposed to enhance the transparency and robustness of method. Third,
three optimization methods have been used to improve the performance of proposed methods by optimally selecting the strength factors of watermarks and then
post-processed the watermarked coefficients to reconstruct the watermarked image. Fourth, applying various watermarking attacks in order to test the proposed
method on various benchmark/ validation parameters like composite-peak-signalto-noise ratio (CPSNR), structural similarity (SSIM), and normalized correlation
(NC). Finally, an image watermarking method is designed and developed using
the proposed methods for protection of color images.
Including this introductory chapter, the rest of the thesis is organized in the
following five chapters.
Chapter 2 discusses literature survey of the existing methods for image watermarking using DWT which embed gray-scale watermark image for the protection
of color host images. It then briefly describes the various preliminaries like DWT
method, UCS, and GA followed by the mathematical concept of pre-processing of
input images, embedding, post-processing, and extraction of watermark images.
Moreover, GA has been used to optimize the watermark strength during the embedding phase. Further, the testing of the proposed method is done against the
various watermarking attacks. The results of the proposed method are compared
with existing methods and finally discussion is presented.
Chapter 3 reviews of various available SPT-based image watermarking methods which used gray-scale watermark image for the protection of color host images. Then, brief descriptions of various preface such as SPT method, UCS, and
GA are presented followed by the mathematical concept of pre-processing of input images, embedding, post-processing, and extraction watermark images. The
proposed method also uses GA to optimize the watermark strength during the embedding phase. The results of the proposed method are compared with existing
methods and the method proposed in Chapter 2.
Chapter 4 deals with the protection of color images by embedding the color
26
watermark by using the DWT and ABC methods. This chapter presents a survey
of the existing methods for color image watermarking using DWT followed by
preliminaries. It then describes the pre-processing of input images, embedding,
post-processing, and extraction of watermark images. Then, three optimization
methods have been used to optimize the watermark strength during the embedding
phase followed by the testing of the method. The results of the proposed method
are compared with existing methods.
Chapter 5 proposes a color image watermarking method by casting the color
image watermark into the color host image by using the SPT and DE. A brief
discussion about the SPT and DE methods have been presented followed by the
procedure for embedding and extraction phase. In the proposed method, DE
has been used to optimize the watermark strength during the embedding phase
followed by the testing under various attacks. The results of the proposed method
are compared with existing methods and proposed method in Chapter 4.
The last chapter summarizes the key findings, main contributions of the
thesis, and possible scope for future research in this area.
27
Chapter 2
Digital Image Watermarking using Discrete Wavelet Transform on Gray-Scale
Watermark Image
2.1
Introduction
Two embedding-domain have been used for digital image watermarking methods,
namely; spatial and transform domain as mentioned in Section 1.3. The detailed
survey related to the image watermarking methods is given in the Section 1.6. An
image watermarking method based on the transform domain is more robust than
the spatial domain [15]. Researchers suggested that DWT-based methods of image
watermarking are more robust against the common signal processing and malicious
attacks [51, 106, 107] as compared with the DFT and DCT-based methods. DWTbased methods are capable in embedding a better quality of watermark and also
can recovered it from the watermarked image effectively. Therefore, this chapter
focuses on the protection of color images from its illegal utilization using a DWTbased digital image watermarking method.
During past decade, many image watermarking methods [40, 41, 42, 58, 59,
60, 70, 71, 72, 73] have been reported which utilized the advantages of DWT over
the DFT and DCT [74]. DWT-based methods are more robust because it is more
close to the frequency model for the HVS [70]. The characteristics of HVS model
are used by various researcher in image watermarking to enhance the transparency
and robustness. Kundur et al. [39] exploit HVS model to generate a visual cover
for multi-resolution-based image watermarking method. Later, Reddy et al. [40]
and Ghouti et al. [41] uses the advantages of HVS in their methods. Furthermore,
the performance of the DWT-based methods depend on the parameters namely;
selection of filter bank, decomposition level, and selection of embedding decomposed coefficients [42]. Therefore, all the work reported in this area using DWT
are based on the changing the above mentioned parameters to show the better
robustness and transparency of watermarking method. Vahedi et al. [42] exploit
the advantage of symlet-4 filter bank to increase the quality and robustness of watermarking method as compared to existing methods. In his paper, they proposed
a novel DWT-based method for color images by embedding the binary watermark. Vahedi et al. [42] showed that three level decomposition with all the four
sub-spaces namely approximation, horizontal, vertical, and diagonal along with
symlet-4 filter bank provides better results for image watermarking. Therefore, in
this method DWT has been used with three level of decomposition and symlet-4
filter bank for embedding the watermark. Moreover, to increase the quality and
robustness of watermarking methods, this method utilizes the capabilities of GA
to optimize the watermark strength.
Generally, the researchers used RGB, Y Cb Cr , YIQ, HSI, HSV, etc., color space
models for host image in their digital watermarking method. The above mentioned
color models are correlated i.e. the image components are not independent and
change in one component may affect the other components of the image. This
imposes the constraints for the researchers who used correlated color host image
to use only one color component at a time for embedding the watermark data.
However, there exist some uncorrelated color models such as Lab, Lαβ, UCS,
etc. [102, 108], which may be used in color image watermarking to increase the
robustness and quality by using all the color image components of host images.
Saraswat and Arya [108] used UCS for color transfer of images and observed that
UCS outperforms the other uncorrelated color spaces.
Therefore, due to the limitations of correlated color spaces and powerfulness of
DWT, this chapter proposes a DWT-based image watermarking method using uncorrelated color space (UCS). Further, GA has been used to optimize the strength
factor of the proposed watermarking method. In this chapter Section 2.2 presents
the various preliminaries used. Proposed method and performance improvements
using GA to the proposed method have been discussed in Section 2.3. Further,
experimental results and the conclusion of the chapter are presented in Section
2.4 and 2.5 respectively.
2.2
Preliminaries
In this chapter, the proposed method uses DWT, UCS and GA methods for digital
image watermarking. Therefore, following section describe the functions of these
methods in brief:
30
2.2.1
Discrete Wavelet Transform (DWT)
DWT is frequently used in various image processing applications namely; compression, watermarking, etc. DWT is a sampled version of continuous wavelet transform. The main advantage of DWT is that it maintains both frequency and time
information at the same time which was missing in DFT. The transform based on
small sinusoidal waves of varying frequency and limited duration is called wavelet.
DWT is used to decompose the input image into sub-images of diverse spatial
direction (i.e. horizontal, vertical, and diagonal) and independent frequency area
[40, 41]. Transformation of an image from the spatial domain to DWT domain
by one level decomposes the input image into four different frequency bands in
which one is the low frequency and remaining three are the high frequency bands.
These bands are represented as LL (approximation detail of image), HL (horizontal detail of image), LH (vertical detail of image), and HH (diagonal detail of
image) respectively. Magnitude of DWT coefficients is larger in the lowest bands
(LL) at each level of decomposition and is smaller for other bands (HH, LH, and
HL). Therefore, after one level decomposition, the further decomposition of given
image is done using only LL sub-space which is also decomposed into four distinct
frequency bands as mention above. Figure 2.1 shows the two dimensional image
of size 512 × 512 before and after the three level of DWT decomposition with their
sub-spaces size. Since, a two dimensional image has been used, it needed a 2-D
wavelet transform. The 2-D DWT is implemented as a 1-D row transform followed
by a 1-D column transform. The 2-DWT transform coefficients for input image
function f (n1 , n2 ) of size N1 × N2 are calculated using Eq. (2.1) and (2.2).
N
1 −1 N
2 −1
1
f (n1 , n2 )ϕj0 ,k1 ,k2 (n1 , n2 )
Wϕ (j0 , k1 , k2 ) = √
N1 N2 n =0 n =0
(2.1)
N
1 −1 N
2 −1
1
=√
f (n1 , n2 )ψji0 ,k1 ,k2 (n1 , n2 )
N1 N2 n =0 n =0
(2.2)
1
Wψi (j0 , k1 , k2 )
1
2
2
here, j0 is the starting scale and i = {H, V, D} indicates the directional index of
wavelet function. Eq. (2.1) calculates the approximation coefficient while (2.2)
calculates the other detail coefficients. 2-D scaling function ϕ and wavelet function
ψ i , used in Eq. (2.1) and (2.2), may be calculated through the separable 1-D filter
having the impulse response hϕ (−n) and hφ (−n) respectively. Sub-spaces LL, HL,
LH, and HH are calculated by putting the values of ϕ(n1 , n2 ) and ψ i (n1 , n2 ) from
31
the Eq. (2.3)-(2.6) into Eq. (2.1) and (2.2).
ϕ(n1 , n2 ) = ϕ(n1 )ϕ(n2 )
(2.3)
ψ H (n1 , n2 ) = ψ(n1 )ϕ(n2 )
(2.4)
ψ V (n1 , n2 ) = ϕ(n1 )ψ(n2 )
(2.5)
ψ D (n1 , n2 ) = ψ(n1 )ψ(n2 )
(2.6)
Figure 2.1: Three level decomposition layout of an image.
To reconstruct the image from the DWT coefficients, inverse DWT (IDWT) is
calculated as follows :
f (n1 , n2 ) = √
1
Wϕ (j0 , k1 , k2 )ϕj0 ,k1 ,k2 (n1 , n2 )
N1 N2 k k
1
1
+√
N1 N2
2
∞ i=H,V,D j=0 k1
(2.7)
Wψi (j0 , k1 , k2 )ψji0 ,k1 ,k2 (n1 , n2 )
k2
To embed the watermark in DWT-based decomposed image, the transform coefficients of DWT are modified by watermark. Since, the low frequency band (LL) of
DWT decomposed image is similar to the original image, most of the information
or energy of original image lies in this frequency band. In order to maintain the
quality of watermarked image, this low frequency or approximation detail must be
preserved and maintained the robustness of embed watermark. Therefore, it is the
trade-off between the robustness and quality that at which extent the transform
coefficients are to be modified in order to optimize the overall method.
32
2.2.2
Uncorrelated Color Space (UCS)
The quality of the color image watermarking methods depends on how images
are split into three color channels, i.e. which color space was chosen. For better
quality, color space must be uncorrelated which makes the three color channels
semi-independent [103, 108] and may be used for embedding the watermark. This
method uses the recently developed UCS proposed by Liu [109]. UCS is derived
from RGB color space using principal component analysis (PCA). UCS uses a
linear transformation, WU ∈ R3×3 , of the RGB color space to uncorrelate the
component images as shown in Eq. (2.8) [109];
⎡
⎤
⎡
⎤
U(x, y)
R(x, y)
⎢
⎥
⎢
⎥
⎣C(x, y)⎦ = WU ⎣G(x, y)⎦
S(x, y)
B(x, y)
(2.8)
The WU is calculated by factorizing the covariance matrix C using PCA in the
following form [109]:
C = WUt ΛWU
(2.9)
here WUt and Λ are the orthogonal eigenvector matrix and diagonal eigenvalue matrix with diagonal elements in a decreasing order, respectively. Saraswat and Arya
[108] used UCS for color transfer of images and observed that UCS outperforms
the other uncorrelated color spaces.
2.2.3
Genetic Algorithm (GA)
Genetic algorithm (GA) belongs to the class of evolutionary algorithms and is
an ingredient of artificial intelligence. These algorithms are capable to encode a
solution to the different engineering problems. Furthermore, to achieve a better
solution to the problem these algorithms use methods which are stimulated by
nature namely; inheritance, reproduction, mutation, and crossover. GAs were
reported by the Holland [110, 111].
Terminology
The term used in GA are as follows:
• Search space : the space of all possible solutions.
• Chromosome : it contains the solution in form of genes.
• Population : a set of individuals/chromosomes.
33
• Generation : the procedure of evaluation, reproduction, crossover and mutation.
• Fitness : the value assigned to an individual based on how far or close it is
from the desired solution.
The pseudo-code of the GA is shown in Algorithm 2.1 and the flow chart is
depicted in Figure 2.2.
Algorithm 2.1 Genetic Algorithm
Genetic representation of solution to the problem
Create and initialize the population individuals;
Evaluate the fitness of each individual in population
while Termination criteria is not satisfied do
1. Reproduction: Select the individuals with greater fitness for reproduction.
2. Crossover: Reproduce new individuals through crossover.
3. Mutation: Apply probabilistic alteration or modification on new individuals.
4. Form a new population with these offsprings.
end while
Figure 2.2: Genetic Algorithm Flow Chart.
In GA, there are three operators: reproduction, crossover, and mutation. Initially, a population is generated randomly with uniform distribution followed by
reproduction, crossover, and mutation operators to generate a new population.
Offspring vector generation is a crucial step in GA process. The two operators,
34
crossover and mutation are used to generate the offspring vectors. The reproduction operator is used to select the best vector between offspring and parent for the
next generation. GA operators are explained briefly in the following sections.
Reproduction
Reproduction or selection operator selects the individuals or chromosomes to
crossover and to generate offsprings. The selection is crucial and important step
and it is based on the principle of the best one to be survive and generates new
offsprings. To select the best individual for the optimum solution of given problem, the fitness function is formulated. This function shows the closeness of a
current result to the desired result. There are various techniques for reproduction
operator namely; Roulette-wheel selection, tournament selection, rank selection,
steady-state selection, Boltzmann selection, and scaling selection.
Crossover
Crossover operator selects genes from parent chromosomes, combines them and
produces a new children or offspring. The idea behind this operator is that new
offspring may have better characteristics than both of the parents to achieve the
desired results.There are various techniques for crossover operator namely; singlepoint crossover, two point crossover, uniform crossover, and arithmetic crossover.
Mutation
Mutation operator modifies or alter more than one gene values in an individual.
The advantage of the mutation operator is that it can produce new genes values
in the individual or chromosomes which is not present in a given search space.
Moreover, these new genes can produce the better solution for given problem.
2.3
Proposed Method
The proposed method explores the advantages of uncorrelated color space over
the correlated color space to improve the performance of watermarking methods
in terms of quality and robustness. It implants the gray-scale watermark image
into the color host image by modifying the decomposed wavelet coefficients of host
image. The watermark image is embedded in each color channel of host image to
increase the reliability during the recovery process and protect against the common
signal processing attacks. The proposed method consists of five phases namely;
preprocessing of host and watermark image, watermark embedding, image post
35
processing, extraction of watermark, and performance improvement using GA.
The basic structural design of the proposed method is shown in Figure 2.3. The
details of each phase of the proposed method is described in the following sections.
Figure 2.3: Structural design of proposed method.
Image Pre-processing
In image preprocessing, host RGB color image (H) is transformed into UCS color
space [109], using Eq. (2.10) which produces three independent image components
36
namely HU , HC , and HS .
⎡
⎤
⎤
⎡
HU (x, y)
HR (x, y)
⎢
⎥
⎥
⎢
⎣HC (x, y)⎦ = WU ⎣HG (x, y)⎦
HS (x, y)
HB (x, y)
(2.10)
The WU is calculated by factorizing the covariance matrix C using PCA in the
following form [109]:
(2.11)
C = WUt ΛWU
where WUt and Λ are the orthogonal eigenvector matrix and diagonal eigenvalue
matrix with diagonal elements in a decreasing order, respectively. The watermark
image is divided into 16 non-overlapping sub-areas as shown in Figure 2.3. These
sub-areas of watermark image are then re-arranged or scrambled by some predefined sequence or key to introduce one more level of security and enforced the
user to use the key for the extraction of the image from watermarked image.
Further, third level of decomposition is applied on each component of host image
using symlet-4 wavelet function. The resultant third level wavelet coefficients,
Hk3 , is chosen for embedding process, k = {LL, HL, LH, HH}.
Watermark Embedding
After preprocessing of the images, the scrambled watermark is embedded into the
DWT coefficients of host image. The third level decomposition coefficients of host
image are HLL3 (x, y), HHL3 (x, y), HLH3 (x, y), and HHH3 (x, y), representing the
approximation, horizontal, vertical, and diagonal details of 3-DWT decomposed
host image respectively. In order to increase the reliability and robustness of
proposed method against the malicious attacks, it is desired to hide the watermark
image in all the color components of host coefficients. Therefore, approximation
details of the third level coefficients are divided into 16 non-overlapping areas.
Now, the scrambled watermark is embedded into the approximation details of the
third level decomposed host image coefficients in its all color channels by using
Eq. (2.12).
HWk3 (x, y) = Hk3 (x, y) + α(r)Wp (x, y)
k = {LL, HL, LH, HH}
p = {1, 2, 3, ..., 16}
r = {1, 2, 3, ..., 16}
(2.12)
where, k represents the sub-areas of host image, p is the intended block of watermark, and α denotes the strength of modification done in the host coefficients.
37
Post-processing
After embedding the watermark image into corresponding DWT host image coefficients, inverse DWT (IDWT) is taken for watermarked host image coefficients
which returns watermarked image in UCS color space. Finally UCS watermarked
image is reconverted into RGB color space.
Watermark Extraction
The watermark extraction process requires the watermarked image and the predefined key. To extract the watermark, RGB watermarked image is transformed
into UCS color space and then 3-DWT decomposition using symlet-4 wavelet filter
bank on each channel is applied. To gathered the fraction watermarked image,
a reverse process of embedding ia applied as shown in Figure 2.3 and extract
the watermark image from this fraction using Eq. (2.13). Finally, the scrambled
watermark image is rearranged to its original sequence.
Ŵp (x, y) =
Hk3 (x,y)−HWk3 (x,y)
α(r)
k = {LL, HL, LH, HH}
p = {1, 2, 3, ..., 16}
r = {1, 2, 3, ..., 16}
(2.13)
Performance Improvement using GA
The watermarked image HWk3 is subjected to various watermarking attacks which
degrade the performance of watermarking methods. There are mainly two parameters namely; quality and robustness which must be maximized for a watermarking
method, but these parameters are inversely related with each other i.e. if quality increases, robustness suffers and vice-versa. In this method, optimum values
of these parameters are dependent on the suitable values of strength factor (α).
Therefore, this method uses GA optimization method for selecting the values of
α which optimizes the quality and robustness in terms of fitness function. There
are 16 strength factors used in this method whose optimized values are calculated
38
by minimizing the following fitness function using GA [42].
90%
100
F itness =
[1 − NCjpg(Q) ]
+2×
CP SNR
Q=60%
+
50%
[1 − NCjpg(Q) ] +
+
[1 − NCscale(i) ] +
i=1
+
4
[1 − NCf ilter(i) ]
(2.14)
i=1
Q=10%
3
3
3
[1 − NCnoise(i) ]
i=1
[1 − NCcrop(i) ] + [1 − NCrotation ]
i=1
where, CPSNR is composite peak signal-to-noise ratio, and NC is normalized
correlation. These vales are calculated by applying the mentioned attacks on watermarked image. The GA method is executed for 200 iterations to calculate the
optimum values of strength factors (α).
2.4
Experimental Results
To compare the performance of proposed and considered image watermarking
methods, two popularly used 24-bit RGB color images namely lena and mandrill
each of size 512 × 512 are used as host images and two gray scale images namely;
RTU logo and aeroplane image each of size 64 × 64 are used as watermark images
to embed them in the host images and are shown in Figure 2.4. All the considered
images have been taken from USC-SIPI image database [112] except RTU logo
which is taken from Rajasthan Technical University, Kota, India.
(a) Lena
(b) Mandrill
(c) RTU logo
(d) Aeroplane
Figure 2.4: (a)-(b). RGB host images and (c)-(d). Gray scale watermark images.
In the pre-processing step of the proposed method, host images are converted
into UCS color space followed by third level decomposition of host images and
scrambling of watermark images. One of the possible scrambled watermark image
39
is shown in Figure 2.3. Now, the watermark images are embedded into each of the
considered host images.
The performance of the proposed methods is compared with Vahedi et al. [42] who
also used DWT with correlated color spaces and exploits the powerfulness of GA to
increases the quality and robustness of image watermarking method. To compare
the objective test for quality measures of resultant watermarked images using
proposed method and considered methods, CPSNR [42] performance parameters
are calculated and depicted in Table 2.1. From Table 2.1, it is validated that
both the methods maintain the quality of the watermarked image in terms of
CPSNR (> 35dB). However, the proposed method shows lower values of CPSNR
as compared to other considered method due to the hiding of complete watermark
more than once and into the approximation detail of host image.
Table 2.1: Comparison of CPSNR values of watermarked images resultant from
proposed and considered method.
Used Watermark
Watermarked
images
Vahedi et al. [42]
Proposed
Method
1.
RTU Logo
Lena
36.74
35.92
2.
RTU Logo
Mandrill
35.85
35.67
3.
Aeroplane
Lena
36.32
35.61
4.
Aeroplane
Mandrill
35.42
35.59
S.No.
The robustness of the proposed method has been tested by applying different
attacks on the watermarked images. This method consists of filtering (mean,
median, wiener), noise (gaussian, poisson, salt and pepper), JPEG compression,
rotation, scaling, and cropping attacks. The attacks are applied on all the four
watermarked images embedded with RTU logo and aeroplane watermark images.
The comparison of NC values after applying the attacks on watermarked images
embedded with RTU logo and aeroplane image are depicted in Table 2.2. From
Table 2.2, it is observed that the robustness of watermarked images embedded
with RTU logo have higher values of NC as compared to aeroplane image due
to the coarseness of aeroplane image as compared to RTU logo. Moreover, the
similar performance of the proposed method can be observed from Figure 2.5 and
Figure 2.6 where the extracted watermark images are RTU logo and Aeroplane
images respectively, for all the considered attacks. Therefore, it is validated from
the results that the proposed method produces high quality and better robust
watermarked images and can be utilized for content authentication to protect the
copyrighted images. The comparative results show that the proposed method
outperforms other method for all the considered attacks.
40
41
0.73
0.88
0.70
0.84
0.92
Median filtering (3 × 3)
Wiener filtering (3 × 3)
Mean filtering (3 × 3)
Gaussian noise (0.006)
Poisson noise
Salt and pepper noise
JPEG compression (10%)
JPEG compression (90%)
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
0.59
0.71
0.81
0.92
0.95
0.95
0.94
0.68
0.92
0.84
0.83
Vahedi
et
al.
[42]
Attacks
S.No.
0.62
0.74
0.84
0.96
0.99
0.99
0.98
0.96
0.88
0.71
0.96
0.88
0.87
0.99
0.92
0.76
Proposed
Method
lena
0.58
0.69
0.79
0.89
0.92
0.92
0.91
0.89
0.82
0.66
0.89
0.82
0.81
0.68
0.85
0.71
0.61
0.73
0.83
0.94
0.97
0.97
0.96
0.94
0.86
0.70
0.94
0.86
0.85
0.97
0.90
0.75
Proposed
Method
Mandrill
Vahedi
et
al.
[42]
RTU Logo
0.56
0.68
0.77
0.87
0.90
0.90
0.89
0.87
0.80
0.65
0.87
0.80
0.79
0.67
0.84
0.70
Vahedi
et
al.
[42]
0.61
0.73
0.84
0.95
0.98
0.98
0.97
0.95
0.87
0.70
0.95
0.87
0.86
0.98
0.91
0.75
Proposed
Method
lena
0.55
0.66
0.75
0.85
0.88
0.88
0.87
0.85
0.77
0.63
0.85
0.77
0.77
0.65
0.81
0.67
Vahedi
et
al.
[42]
0.60
0.72
0.82
0.93
0.96
0.96
0.95
0.93
0.85
0.69
0.93
0.85
0.84
0.96
0.89
0.74
Proposed
Method
Mandrill
Aeroplane Image
Table 2.2: Comparison of robustness in terms of NC values obtained after applying attacks on the watermarked images.
Extracted RTU logo Watermark Image After Attacks
Median (3x3)
Wiener (3x3)
Mean (3x3)
Gaussian (0.006)
JPEG (10%)
JPEG (90%)
Poisson
Salt & Pepper
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
Figure 2.5: Extracted RTU logo watermarks by proposed method after applying
considered attacks.
42
Extracted Aeroplane Watermark Image After Attacks
Median (3x3)
Wiener (3x3)
Mean (3x3)
Gaussian (0.006)
JPEG (10%)
JPEG (90%)
Poisson
Salt & Pepper
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
Figure 2.6: Extracted Aeroplane image watermarks by proposed method after
applying considered attacks.
43
2.5
Results and Discussions
This chapter proposes a DWT-based image watermarking method for protecting
the color host image by embedding gray-scale image using UCS and GA. The
use of UCS color space increases the effective utilization of all color channels
of host image which is not feasible in correlated color spaces while GA is used
for optimizing the strength factors to improve the quality and robustness of the
proposed method. The results validate that the proposed method is better than
other method for all the considered performance parameters. In other words, the
UCS color space is outperforms than the correlated color space utilized by Vahedi
et al. [42]. Therefore, it is concluded that the proposed method has high quality
and robust results and can further be used for protection of the copyrighted images.
The next chapter uses the SPT-based method to embed the gray-scale watermark image into color host image.
44
Chapter 3
Digital Image Watermarking using Steerable Pyramid Transform on Gray-Scale
Watermark Images
3.1
Introduction
Previous chapter presented an image watermarking method, which is based on
DWT and further GA has been exploited to optimize the performance of method.
In addition, the proposed method has been compared with existing method and
results shows that the proposed method outperforms. Although, proposed method
in previous chapter working well, there is still room for improvements in the field
of image watermarking by applying some latest developed transform as mentioned
in section 1.6.1.
The imperfect ability of DWT in capturing directional information, which is necessary components for image perception, processing, and reconstruction [47], causes
researcher to find alternative transform having all the advantages of DWT and
simultaneously removes all disadvantages. Fortunately, researcher come up several scale and directional image illustrations and results show that out of other
representation SPT outperforms among the class [46]. Researchers suggested that
SPT-based methods of image watermarking are more robust against the common
signal processing and geometric attacks [45, 46, 47, 63]. Literature shows that the
SPT keeps most of the advantages of DWT as its basis functions are confined to
a small area in both space and spatial-frequency. However, this recursive multiscale & multi-directional decomposition improve their drawbacks like; it is aliasing
free and capable to generate any number of orientation bands as it is based on
a category of random orientation filters produced by linear grouping of a set of
basis filters [46, 76]. Invariance, multi-resolution, and capture of multi-scale and
multi-resolution constructions in the images are some of main properties of SPT
which make it superior in watermarking methods.
Therefore, in this work SPT has been used with three level of decomposition
in place of DWT for embedding the watermark. Moreover, GA method is also
used for optimizing the strength factor of watermark to get better quality and
robustness as used in the previous method discussed in Chapter 2. In the similar
fashion of previous method described in Chapter 2, the host images and watermark
images have been converted to UCS color space before embedding.
Rest of the chapter is organized as follows. Section 3.2 presents the SPT used
in the proposed method while GA and UCS have already been described in Section
2.2. In Section 3.3, proposed method has been discussed followed by experimental
results and conclusions in the successive sections.
3.2
Steerable Pyramid Transform (SPT)
The earliest successful multi-scale, multi-orientation decomposition of an image
is SPT which has been proposed by Freeman and Adelson [44, 45]. The SPT
is a wavelet-like illustration whose investigation functions are scaled and rotated
editions of a single directional wavelet. Steerability is the property in which fundamental wavelets can be rotated to any orientation by appearing appropriate linear
groups of a primary set of equiangular directional wavelet components [113]. This
property is utilized in the SPT for finding the direction of basis function of an
image [76]. SPT decomposes the input image into a set of sub-bands of a variety
of orientations. Figure 3.1 depicts the decomposition block diagram of an input
image, consisting of the three kind of filters; low-pass (L0 ), high-pass (H0 ), and
bank of band-pass (B0 , ..., Bk ) filters. Here k is the order of basis functions of the
steerable pyramid and k + 1 are the orientations. The input image is sub-divided
into the high and low-pass sub-bands by the high and low pass filters respectively.
Every low-pass sub-band is again sub divided into the k + 1 oriented sub-bands
and a low pass sub-band. Finally, sub-sampled are created by a factor 2 and then
further decomposition is performed.
3.3
Proposed Method
The proposed method uses the uncorrelated color space to improve the quality
and robustness of watermarking methods. This method embeds the gray scale
watermark image into the color host image by modifying the decomposed SPT
coefficients of host image. The watermark is added in each color channel of host
image which increases the reliability of extraction process and protection against
46
Figure 3.1: Block diagram for steerable pyramid decomposition of an image.
the common signal processing attacks. The proposed method is divided into five
phases namely, preprocessing of host and watermark images, watermark embedding, image post processing, extraction of watermark, and performance improvement using GA. Figure 3.2 shows basic structural design of the proposed method.
The details of each phase of the proposed method is described in the following
sections.
Image Pre-processing
Image preprocessing, changes the host RGB color image (H) into UCS color image
[109], using Eq. (3.1) and generates three independent image components namely
HU , HC , and HS .
⎡
⎤
⎤
HR (x, y)
HU (x, y)
⎢
⎢
⎥
⎥
⎣HC (x, y)⎦ = WU ⎣HG (x, y)⎦
⎡
HS (x, y)
(3.1)
HB (x, y)
here, WU is calculated by factorizing the covariance matrix C using principal
component analysis (PCA) in the following form [109]:
C = WUt ΛWU
47
(3.2)
Figure 3.2: Structural design of proposed method.
where WUt and Λ are the orthogonal eigenvector matrix and diagonal eigenvalue
matrix with diagonal elements in a decreasing order, respectively. Further, 16
non-overlapping sub-areas are generated from watermark as shown in Figure 3.2.
These sub-areas of watermark are then re-arranged or scrambled by some predefined sequence or key. This increases the level of security and enforces the user
to use the key for the extraction of the watermarked image. Further, third level
of decomposition is applied on each component of host image. The resultant third
48
level SPT coefficients, Hk3, is chosen for embedding process, k = {1, 2, 3, ..., 16}.
Watermark Embedding
After the preprocessing step, the scrambled watermark is embedded into the SPT
coefficients of host image (Hk3). In order to increase the reliability and robustness of proposed method against the malicious attacks, it is desired to hide the
watermark image in all the color components of host coefficients. Therefore, low
frequency details of the third level coefficients are divided into 16 non-overlapping
areas. Now, the scrambled watermark is embedded into the low frequency details
of the third level decomposed host image coefficients in its all color channels by
using Eq. (3.3).
HWk3 (x, y) = Hk3 (x, y) + α(r)Wp (x, y)
k = {1, 2, 3, ..., 16}
p = {1, 2, 3, ..., 16}
r = {1, 2, 3, ..., 16}
(3.3)
where, k represents the sub-areas of host image, p is the intended block of watermark, and α denotes the strength of modification done in the host coefficients.
Post-processing
After embedding the watermark image into corresponding SPT host image coefficients, inverse SPT (ISPT) is taken for watermarked host image coefficients which
returns watermarked image in UCS color space. Finally UCS watermarked image
is reconverted into RGB color space.
Watermark Extraction
The watermark extraction process needs the watermarked image and the predefined key, to extract the watermark. RGB watermarked image is transformed
into UCS color space and then SPT decomposition on each channel is applied.
To gathered the watermarked image, a reverse process of embedding is applied
as shown in Figure 3.2 and extract the watermark using Eq. (3.4). Finally, the
scrambled watermark is rearranged to its original sequence using the pre-defined
49
key.
Ŵp (x, y) =
Hk3 (x,y)−HWk3 (x,y)
α(r)
k = {1, 2, 3, ..., 16}
p = {1, 2, 3, ..., 16}
(3.4)
r = {1, 2, 3, ..., 16}
Performance Improvement using GA
The watermarked image is subjected to various watermarking attacks which degrade the performance of watermarking methods such as quality and robustness
which must be maximized for a watermarking method, but these parameters are
inversely related with each other i.e. if quality increases, robustness suffers and
vice-versa. In this method, optimum values of these parameters are dependent on
the suitable values of strength factor (α). Therefore, this method also uses GA
optimization method for selecting the values of α which optimizes the quality and
robustness in terms of fitness function as described in 2.3.
3.4
Experimental Results
To compare the performance of proposed and considered image watermarking
methods, two popularly used 24-bit RGB color images namely, lena and mandrill
each of size 512 × 512 are used as host images and two gray scale images namely,
RTU logo and aeroplane image each of size 64 × 64 are used as watermark images
to embed them in the host images and are shown in Figure 3.3. All the considered
images have been taken from USC-SIPI image database [112] except RTU logo
which is taken from Rajasthan Technical University, Kota, India.
(a) Lena
(b) Mandrill
(c) RTU logo
(d) Aeroplane
Figure 3.3: (a)-(b). RGB host images and (c)-(d). Gray scale watermark images.
The performance of the proposed method is compared with method proposed
in Chapter 2 in which DWT and GA have been used to increases the quality
and robustness of image watermarking method. To compare the objective test
50
for quality measures of resultant watermarked images using proposed method and
considered methods, CPSNR [42] performance parameters are calculated and depicted in Table 3.1. From Table 3.1, it is validated that all the methods maintain
the quality of the watermarked image in terms of CPSNR (> 35dB). However,
the proposed method shows better results in terms of CPSNR as compared to
proposed DWT-based method.
Table 3.1: Comparison of CPSNR values of watermarked images resultant from
proposed and considered methods.
Used
Watermark
Watermarked
images
Proposed
DWT-based
method
[Chapter 2]
Proposed SPTbased Method
1.
RTU Logo
Lena
35.92
37.23
2.
RTU Logo
Mandrill
35.67
36.87
3.
Aeroplane
Lena
35.61
37.11
4.
Aeroplane
Mandrill
35.59
36.08
S.No.
The robustness of the proposed methods has been tested by applying different
attacks on the watermarked images. This chapter consists of filtering (mean,
median, wiener), noise (gaussian, poisson, salt and pepper), JPEG compression,
rotation, scaling, and cropping attacks. The attacks are applied on all the four
watermarked images embedded with RTU logo and aeroplane watermark images.
The comparison of NC values after applying the attacks on watermarked images
embedded with RTU logo and aeroplane image are depicted in Table 3.2. From
Table 3.2, it is observed that the robustness of watermarked images embedded
with RTU logo have higher values of NC as compared to aeroplane image due to
the coarseness of aeroplane image as compared to RTU logo. Moreover, it can be
concluded from Figure 3.4 and Figure 3.5 which shows the extracted RTU logo
and Aeroplane watermarks by proposed method respectively, for all the considered
attacks have been depicted. Therefore, it is validated from the results that the
proposed method using SPT produces high quality and better robust watermarked
images and can be utilized for content authentication to protect the copyrighted
images. The comparative results show that the proposed method outperforms
other methods for all the considered attacks.
3.5
Results and Discussions
This chapter introduces a SPT-based image watermarking method using UCS and
GA. The uncorrelated color space increases the effective utilization of all color
51
52
0.76
0.92
0.99
Median filtering (3 × 3)
Wiener filtering (3 × 3)
Mean filtering (3 × 3)
Gaussian noise (0.006)
1
2
3
4
0.88
0.96
Salt and pepper noise
JPEG compression (10%)
JPEG compression (90%)
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
6
7
8
9
10
11
12
13
14
15
16
0.62
0.74
0.84
0.96
0.99
0.98
0.98
0.71
0.96
Poisson noise
5
0.88
0.87
Proposed
DWTbased
method
[Chapter 2]
Attacks
S.No.
0.63
0.79
0.90
0.97
0.98
0.98
0.98
0.97
0.88
0.72
0.97
0.94
0.91
0.98
0.93
0.79
Proposed
SPT-based
Method
lena
0.61
0.73
0.83
0.94
0.97
0.97
0.96
0.95
0.86
0.70
0.94
0.86
0.85
0.97
0.90
0.75
0.62
0.73
0.89
0.95
0.98
0.98
0.98
0.96
0.88
0.71
0.96
0.90
0.86
0.98
0.90
0.80
Proposed
SPT-based
Method
Mandrill
Proposed
DWTbased
method
[Chapter 2]
RTU Logo
0.61
0.73
0.84
0.95
0.98
0.98
0.97
0.95
0.87
0.70
0.95
0.87
0.86
0.98
0.91
0.75
Proposed
DWTbased
method
[Chapter 2]
0.62
0.73
0.86
0.96
0.98
0.98
0.98
0.97
0.90
0.71
0.96
0.88
0.87
0.98
0.92
0.78
Proposed
SPT-based
Method
lena
0.60
0.72
0.82
0.93
0.96
0.96
0.95
0.93
0.85
0.69
0.93
0.85
0.84
0.96
0.89
0.74
0.61
0.73
0.83
0.94
0.97
0.97
0.96
0.94
0.86
0.70
0.94
0.90
0.87
0.97
0.91
0.74
Proposed
SPT-based
Method
Mandrill
Proposed
DWTbased
method
[Chapter 2]
Aeroplane Image
Table 3.2: Comparison of robustness in terms of NC values obtained after applying attacks on the watermarked images.
Extracted RTU logo Watermark Image After Attacks
Median (3x3)
Wiener (3x3)
Mean (3x3)
Gaussian (0.006)
JPEG (10%)
JPEG (90%)
Poisson
Salt & Pepper
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
Figure 3.4: Extracted RTU logo watermarks by proposed method after applying
considered attacks.
53
Extracted Aeroplane Watermark Image After Attacks
Median (3x3)
Wiener (3x3)
Mean (3x3)
Gaussian (0.006)
JPEG (10%)
JPEG (90%)
Poisson
Salt & Pepper
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
Figure 3.5: Extracted Aeroplane image watermarks by proposed method after
applying considered attacks.
54
channels of host image as compared to correlated color spaces while GA optimizes
the strength factors and improves the quality and robustness of the proposed
method. The results validates that the proposed method using SPT and UCS
is better than existing methods which are based on DWT for all the considered
performance parameters. Hence, it is concluded that SPT-based method using
UCS outperforms as compared with the DWT.
The next two chapters describe the watermarking methods for embedding the
color watermark images into color host images.
55
Chapter 4
Digital Image Watermarking using Discrete Wavelet Transform on Color Watermark Images
4.1
Introduction
Previous two chapters (2 and 3) present the image watermarking method for the
protection of color host images by embedding gray-scale images using the DWT
and SPT, respectively. Further, the capabilities of GA has been utilized in both
the presented methods to enhance the performance by optimally selecting the
strength factors as discussed in the previous chapters. Finally, it is validates by
the analysis of experimental results that out of both the proposed methods, the
SPT-based method using UCS outperforms among the class. Furthermore, all
the researchers are trying to develop a color image watermarking by embedding
the color watermark images into the color host images, since all the images are
available in the color format. Hence, this chapter introduces a novel DWT-based
color image watermarking method for protection of color images by embedding
the color watermark. Further, this method uses the powerfulness of ABC method
for optimizing the various embedding parameters.
DWT-based image watermarking methods are capable to embed a fairly good
quality of watermark and it can recover the watermark from watermarked image
effectively. The quality and robustness of DWT-based methods depend on the
selection of particular filter bank and decomposition level. Agreste and Andaloro
[58] developed a DWT-based method for any size of image which implants watermark data into high-frequency sub-bands of DWT coefficient. This watermarked
data is imperceptible as per HVS directions. Later, Agreste and Andaloro [59]
modified the previous method by changing the filer bank by Daubechies-2 and ob-
served that it is more robust to geometric, filtering, and StirMark attacks with a
low rate of false alarm. Ghouti et al. [41] selected balanced multi-wavelets for the
data hiding and found that the method is more robust against the standard watermarking attacks. Vahedi et al. [42] exploited the advantage of symlet-4 filter bank
to increase the quality and robustness of watermarking method as compared to
existing methods. For embedding the watermark, DWT-based methods use three
or higher level decompositions [39, 40, 42]. Vahedi et al. [42] showed that three
level decomposition with all the four sub-spaces namely; approximation, horizontal, vertical, and diagonal along with symlet-4 filter bank provide better results for
image watermarking. Therefore, in this method, DWT has been used with three
level of decomposition and symlet-4 filter bank for embedding the watermark.
Moreover, to increase the quality and robustness of watermarking methods,
researchers also used many optimization methods like GA, PSO, ABC, differential
evolution (DE), etc. [42, 55, 78, 81, 82]. PSO and GA have been used by Vahedi
et al. [42, 80] to calculate the optimized strength of watermark which improves
the robustness of existing methods. Therefore, in this chapter, the strength factor
of the proposed method has been optimized using three optimization function
namely; GA, ABC, and DE and their performance are compared.
Initially, image watermarking methods hide the watermark message into gray
scale or color host image in the form of bits or bit stream, and later these digital
bit streams are replaced by some pictorial shape like image [39, 40]. Generally,
various watermarking methods embed the gray scale or binary image watermark
while very few work has been reported for color watermark [96, 97, 98], though
most multimedia images are available in color. Generally, the researchers used
RGB, Y Cb Cr , YIQ, HSI, HSV, etc. color space models for both watermarks and
host images in their digital watermarking method. Golea et al. [97] proposed
the SVD-based RGB color image watermarking for embedding the color RGB
watermark into the RGB host image. Recently, Su et al. [98] presented QR
decomposition method for embedding the RGB color watermark into RGB host
image. In his paper, they concluded that the proposed method is robust against
the attacks such as compression, filtering, cropping, etc. The above mentioned
color models are correlated i.e. the image components are not independent and
change in one component may affect the other components of the image. This
imposes the constraints for the researchers to use only one color component at a
time for embedding the watermark data. However, there exist some uncorrelated
color models such as Lab, Lαβ, etc. [43, 102, 104] which may be used in color image
watermarking to increase the robustness and quality by using all the color image
components of host and watermark images. Chou and Wu [96] embedded the color
58
watermark in Lab color space using less computationally complex spatial-domain
color image watermarking method. However, the robustness of this method is
poor.
Therefore, due to the limitations of correlated color spaces, rare use of colored
watermark images, and powerfulness of DWT, this chapter proposes a novel DWTbased color image watermarking method using UCS. Further, ABC has been used
to optimize the strength factor of the proposed watermarking method.
Rest of the chapter is organized as follows. Section 4.2 and 4.3 describes the
working of ABC and DE methods respectively, used in this method. GA, DWT,
and UCS are already been described in Section 2.2 of Chapter 2. The proposed
method is presented in Section 4.4. Section 4.5 describes the method validation
parameters and experimental results are discussed in Section 4.6. Finally, Section
4.7 concludes the chapter.
4.2
Artificial Bee Colony (ABC) Method
ABC [82] is a newly developed swarm intelligence-based method which is inspired
by the intelligent food foraging behavior of honey bees. Similar to the other
population-based methods, ABC solution search process is an iterative process.
After, initialization of the ABC parameters and swarm, it requires the repetitive
iteration of the three phases namely; employed bee phase, onlooker bee phase,
and scout bee phase. The initialization of the swarm and details of each phase are
described in the following sections.
Initialization of the Swarm
The parameters for ABC are the number of food sources, number trials after which
a food source is considered to be abandoned, and termination criteria. In the basic
ABC, the number of food sources is equal to the employed bees or onlooker bees.
Initially, a uniformly distributed initial swarm of SN food sources, where each
food source xi (i = 1, 2, ..., SN) is a D-dimensional vector, are generated. Here
D is the number of variables in the optimization problem and xi represent the
ith food source in the swarm. Each food source is generated as mentioned in Eq.
(4.1) [82].
xij = xminj + rand[0, 1](xmaxj − xminj )
(4.1)
here, xminj and xmaxj are bound of xi in j th direction and rand[0, 1] is a uniformly
distributed random number in the range [0, 1].
59
Employed Bee Phase
In employed bee phase, employed bees modify the current solution (food source)
based on the information of individual experience and the fitness value of the new
solution. If the fitness value of the new solution is higher than that of the old
solution, the bee updates her position with the new one and discards the old one.
The position update equation for ith candidate in this phase is presented in Eq.
(4.2) [82].
vij = xij + φij (xij − xkj )
(4.2)
here, k ∈ {1, 2, ..., SN} and j ∈ {1, 2, ..., D} are randomly chosen indices. k must
be different from i. φij is a random number between [−1, 1].
Onlooker Bees Phase
After completion of the employed bees phase, the onlooker bees phase starts.
In onlooker bees phase, all the employed bees share the new fitness information
(nectar) of the new solutions (food sources) and their position information with
the onlooker bees in the hive. Onlooker bees analyze the available information and
select a solution with a probability, probi , related to its fitness. The probability
probi may be calculated using Eq. (4.3) [82].
f itnessi
probi = SN
i=1 f itnessi
(4.3)
here, f itnessi is the fitness value of the solution i. As in the case of the employed
bee, it produces a modification on the position in its memory and checks the fitness
of the candidate source. If the fitness is higher than that of the previous one, the
bee memorizes the new position and forgets the old one.
Scout Bees Phase
If the position of a food source is not updated up to predetermined number of
cycles, then the food source is assumed to be abandoned and scout bees phase
starts. In this phase, the bee associated with the abandoned food source becomes
scout bee and the food source is replaced by a randomly chosen food source within
the search space. In ABC, predetermined number of cycles is a crucial control
parameter which is called limit for abandonment. Assume that the abandoned
source is xi . The scout bee replaces this food source by a randomly chosen food
60
source which is generated as given in Eq. (4.4) [82].
xji = xjmin + rand[0, 1](xjmax − xjmin ),
f or
j ∈ {1, 2, ..., D}
(4.4)
here, xminj and xmaxj are bound of xi in j th direction. The pseudo-code of the
ABC is shown in Algorithm 4.1 [82]. In this method, ABC is being used to
optimize the watermarking parameters for increasing the quality and robustness
of the proposed method.
Algorithm 4.1 Artificial Bee Colony Algorithm
Initialize the parameters;
while Termination criteria is not satisfied do
1. Employed bee phase for generating new food sources.
2. Onlooker bees phase for updating the food sources depending on their nectar
amounts.
3. Scout bee phase for discovering the new food sources in place of abandoned
food sources.
4. Memorize the best food source found so far.
5. If a termination criteria is not satisfied, go to step 1; otherwise output the best
solution found so far.
end while
4.3
Differential Evolution (DE) Algorithm
DE algorithm is relatively a simple, fast, and population-based stochastic search
method [114] which falls under the category of Evolutionary Algorithms (EAs).
However, it differs significantly from EAs, e.g. in EAs, crossover is applied first
to generate a trial vector, which is then used within the mutation operation to
produce one offspring while, in DE, crossover follows the mutation operator [115].
DE has several methods of selecting the target vector, number of difference vectors, and the type of crossover [114]. This paper uses DE/rand/1/bin scheme in
which DE stands for differential evolution, ‘rand’ specifies that the target vector
is selected randomly, ‘1’ is for number of differential vectors, and ‘bin’ notation is
for binomial crossover. The popularity of DE is due to its applicability to a wider
class of problems and ease of implementation. The detailed description of DE is
as follows:
Like other population-based search methods, DE also searches the solution
using a population of potential solutions (individuals). In a D-dimensional search
space, an individual is represented by a D-dimensional vector (xi1 , xi2 , ..., xiD )
where i = 1, 2, ..., NP and NP is the population size (number of individuals).
61
In DE, there are three operators: mutation, crossover, and selection. Initially, a
population is generated randomly with uniform distribution followed by mutation,
crossover, and selection operators to generate a new population. Offspring vector
generation is a crucial step in DE process. The two operators (mutation and
crossover) are used to generate the offspring vectors. The selection operator is
used to select the best vector between offspring and parent for the next generation.
DE operators are explained briefly in the following sections.
Mutation
A trial vector is generated by the DE mutation operator for each individual of
the current population. For generating the trial vector, a target vector is mutated
with a weighted differential. An offspring is produced in the crossover operation
using the newly generated trial vector. If G is the index for generation counter,
the mutation operator for generating a trial vector ui (G) from the parent vector
xi (G) is defined as follows:
• Select a target vector, xi1 (G), from the population, such that i = i1 .
• Again, randomly select two individuals, xi2 and xi3 , from the population
such that i = i1 = i2 = i3 .
• Then the target vector is mutated for calculating the trial vector as follows:
Variation Component
ui (G) = xi1 (G) + F × (xi2 (G) − xi3 (G))
Step size
(4.5)
here F ∈ [0, 1] is the mutation scale factor which is used for controlling the
amplification of the differential variation [115].
Crossover
Offspring xi (G) is generated using the crossover of parent vector (xi (G)) and the
trial vector (ui (G)) as follows:
⎧
⎨u (G), if j ∈ J
ij
xij (G) =
⎩x (G), otherwise.
ij
(4.6)
here J is the set of crossover points or the points that will go under perturbation
and xij (G) is the j th element of the vector xi (G).
62
Different methods may be used to determine the set J of crossover points in
which binomial crossover and exponential crossover are the most frequently used
[115]. In this chapter, the DE and its variants are implemented using binomial
crossover whereas for a D dimensional problem, the crossover points are randomly
selected from the set of possible points, {1, 2, . . . , D}. Algorithm 4.2 shows the
steps of binomial crossover to generate crossover points [115].
Algorithm 4.2 Binomial Crossover
Let CR represents the probability with which the considered crossover points will be included.
U (1, D) is a uniformly distributed random integer between 1 and D.
J =φ
j ∗ ∼ U (1, D);
J ← J ∪ j∗;
for each j ∈ 1...D do
if U (0, 1) < CR and j = j ∗ then
J ← J ∪ j;
end if
end for
Selection
There are two functions for the selection operator: First, it selects the individual
for the mutation operation to generate the trial vector and second, it selects the
best between the parent and the offspring based on their fitness value for the next
generation. If fitness of the parent is greater than the offspring then parent is
selected otherwise offspring is selected:
⎧
⎨x (G), if f (x (G)) > f (x (G)).
i
i
i
xi (G + 1) =
⎩x (G), otherwise.
i
(4.7)
This ensures that the population’s average fitness does not deteriorate. The
Pseudo-code for DE method is described in Algorithm 4.3 [115].
Algorithm 4.3 Differential Evolutionary Algorithm
Let F and CR are the control parameters termed as scale factor and crossover probability respectively.
Let P is the population vector.
Initialize the control parameters F and CR;
Create and initialize the population P (0) of N P individuals;
while termination condition do
for each individual xi (G) ∈ P (G) do
Evaluate the fitness f (xi (G));
Create the trial vector ui (G) by applying the mutation operator;
Create an offspring xi (G) by applying the crossover operator;
if f (xi (G)) is better than f (xi (G)) then
Add xi (G) to P (G + 1);
else
Add xi (G) to P (G + 1);
end if
end for
end while
Return the fittest individual as the solution.
63
4.4
Proposed Method
The proposed method explores the advantages of uncorrelated color space over
the correlated color space to improve the performance of watermarking methods
in terms of quality and robustness. It implants the color watermark image into
the color host image by modifying the decomposed wavelet coefficients of host
image. The each channel of color image is embedded in the corresponding channel
of host image to increase the reliability during the recovery process and protect
against the common signal processing attacks. The proposed method consists
of five phases namely; pre-processing of host and watermark image, watermark
embedding, image post-processing, extraction of watermark, and performance improvement using GA, ABC, and DE. The basic structural design of the proposed
method is shown in Figure 4.1. Since each color image has three channels, the
structural design and methodology represented in Figure 4.1 are repeated for all
the three channels. The details of each phase of the proposed method is described
in the following sections.
Image Pre-processing
In image pre-processing, both the host RGB color image (H) and watermark image
(W ) are transformed into UCS color space using Eq. (2.8) which produces six
independent image components (three for host and three for watermark) namely;
HU , HC , and HS for host image and WU , WC , and WS for watermark image.
After transformation, each component of watermark image is divided into 16 nonoverlapping sub-areas as shown in Figure 4.2. These sub-areas of watermark image
are then re-arranged or scrambled by some pre-defined sequence or key to introduce
one more level of security and enforced the user to use the key for the extraction
of the image from watermarked image.
Further, third level of decomposition is applied on each component of host image using symlet-4 wavelet function. The resultant third level wavelet coefficients,
(Hk3 , k = {LL, HL, LH, HH}) is chosen for embedding process.
Watermark Embedding
After pre-processing of the images, the scrambled watermark is embedded into
the DWT coefficients of host image. The third level decomposition coefficients of
host image are HLL3 (x, y), HHL3 (x, y), HLH3 (x, y), and HHH3 (x, y) representing
the approximation, horizontal, vertical, and diagonal details of 3-DWT decomposed host image respectively. In order to increase the reliability and robustness
64
Figure 4.1: Structural design of proposed method.
Figure 4.2: Watermark division.
65
of proposed method against the malicious attacks, it is desired to hide each color
component of the watermark image in corresponding component of host coefficients. Therefore, approximation details of the third level coefficients are divided
into 16 non-overlapping areas as depicted in Figure 4.3.
Figure 4.3: Partitioning of 3-DWT coefficients.
Now, the scrambled watermark is embedded into approximation details of the
third level decomposed host image coefficients by using Eq. (4.8).
HWk3 (x, y) = Hk3 (x, y) + α(r)Wp (x, y)
k = {LL, HL, LH, HH}
p = {1, 2, 3, ..., 16}
(4.8)
r = {1, 2, 3, ..., 16}
here, k represents the sub-areas of host image, p is the intended block of watermark, and α denotes the strength of modification done in the host coefficients.
Post-processing
After embedding all the color channels of UCS watermark image into corresponding DWT host image coefficients, inverse DWT (IDWT) is taken for watermarked
host image coefficients which returns watermarked image in UCS color space. Finally, UCS watermarked image is reconverted into RGB color space.
Watermark Extraction
The watermark extraction process requires watermarked image and pre-defined
key. To extract the watermark, RGB watermarked image is transformed into UCS
color space and then 3-DWT decomposition using symlet-4 wavelet filter bank on
66
each channel is applied. To gather the fraction watermarked image, a reverse
process of embedding ia applied as shown in Figure 4.1 and using Eq. (4.9).
Finally, the scrambled watermark image is rearranged to its original sequence.
Ŵp (x, y) =
Hk3 (x,y)−HWk3 (x,y)
α(r)
k = {LL, HL, LH, HH}
p = {1, 2, 3, ..., 16}
r = {1, 2, 3, ..., 16}
(4.9)
Performance Improvement using Optimization Methods
The watermarked image HWk3 is subjected to various watermarking attacks which
degrade the performance of watermarking methods. The design of the apposite
attacks are as important as to design a method for protection of multimedia contents because they require to test the robustness and security of the newly design
methods for protection of multimedia contents. There are mainly two parameters namely quality and robustness which must be maximized for a watermarking
method, but these parameters are inversely related with each other i.e. if quality increases, robustness suffers and vice-versa. In this method, optimum values
of these parameters are dependent on the suitable values of strength factor (α).
Therefore, this method uses three optimization methods namely; GA, ABC, and
DE for selecting the values of α which optimizes the quality and robustness in
terms of fitness function. The results of all the considered optimization methods
have been compared and analyzed.
There are 16 strength factors used in this chapter which become the dimension
of each individual in ABC/DE/GA method having the population size 50. The
optimized values of these 16 strength factors are calculated by minimizing the
following fitness function which is the modified version of Vahedi et al. [42],
90%
100
100
+
+2×
F itness =
[1 − NCjpg(Q) ]
CP SNR SSIM
Q=60%
+
50%
[1 − NCjpg(Q)] +
+
[1 − NCscale(i) ] +
i=1
+
4
[1 − NCf ilter(i) ]
i=1
Q=10%
3
5
3
[1 − NCnoise(i) ]
i=1
[1 − NCcrop(i) ] + [1 − NCrotation ]
i=1
67
(4.10)
here, CPSNR is composite peak signal-to-noise ratio, SSIM is structural similarity,
and NC is is normalized correlation calculated for the attacks namely; JPEG compression (10 to 90%), filtering (wiener, mean, median), scaling (0.6 to 1.2 factor),
noise addition (poisson, salt and pepper, gaussian), rotation (10 ), and cropping
(10 to 40 %). These values are calculated by applying the mentioned attacks on
watermarked image. The setting of the parameters of three optimization methods
depicts in Table 4.1 for this experiment are given:
Table 4.1: Setting of the parameters of three optimization methods namely; GA,
ABC, and DE.
GA
ABC
DE
Population size = 50.
Colony size N P = 50.
Population size N P = 50.
Crossover rate = 0.6.
φij = rand[−1, 1].
The scale factor which controls
the implication of the differential
variation F = 0.5.
Crossover type = typically two
point.
Number of food sources SN =
N P/2.
The crossover probability CR =
0.9.
Number of generations = 1000.
limit = 1000.
limit = 1000.
Mutation types = bit flip.
The stopping criteria is maximum number of function evaluations (which is set to be 500) is
reached.
The stopping criteria is set to the
maximum number of iterations
which is 500 for this experiment.
4.5
Method Validation
The results obtained from the proposed method are compared with the methods
of Chou and Wu [96] and Su et al. [98], who also embedded the color watermark
images into the color host images. To compare these methods, quality and robustness parameters are considered. The quality of watermarked image can be assess
by two ways namely; subjective and objective tests. Subjective test is done by
10 humans beings on the scale of 0 (very poor) to 5 (excellent) while objective
test calculates the parameters namely; CPSNR and SSIM. CPSNR measures the
degree of similarity between the original and watermarked image and is calculated
as follows [42]:
CP SNR =
10 M × N × 2552
log M N
2
3 s
m=1
n=1 [H(m, n, s) − HW (m, n, s)]
(4.11)
SSIM also measures the degree of similarity by including the three aspects of HVS
namely; loss of correlation (c), luminance distortion (l ), and contrast distortion
68
(s). It is formulated as follows [98]:
SSIM = l(H, HW )c(H, HW )s(H, HW )
where,
(4.12)
l(H, HW ) =
2μH μHW + C1
μ2H + μ2HW + C1
(4.13)
c(H, HW ) =
2σH σHW + C2
2
2
σH
+ σH
+ C2
W
(4.14)
σHHW + C3
σH σHW + C3
(4.15)
s(H, HW ) =
here μ and σ are mean and standard deviation respectively while C1 , C2 , and
C3 are three positive constants used to avoid a null denominator. The values of
CPSNR and SSIM must be maximized for effective quality of watermarked image.
The robustness of watermarking method shows the degree of similarity between
the original watermark image and extracted watermark image after applying the
attacks and is measured by normalized correlation (NC) which is formulated as
shown in Eq.4.16:
1
NC =
3 s
L
m=1
L
[W (m, n, s) × Ŵ (m, n, s)]
n=1
L
L
2
m=1
n=1 W (m, n, s)
(4.16)
The values of NC lie in the rage of 0 (no similarity) to 1 (similar) and are calculated
for the extracted watermarks without attack and with attacks.
4.6
Experimental Results
To compare the performance of proposed and considered color image watermarking
methods, four popularly used 24-bit RGB color images namely; lena, mandrill,
pepper, and sailboat, each of size 512 × 512, are used as host images which are
shown in Figure 4.4. In this chapter, one RGB color logo (64 × 64) and one RGB
color image (64 × 64) namely; RTU logo and aeroplane color image respectively,
are used as watermark images which are shown in Figure 4.5. All the considered
images have been taken from USC-SIPI image database [112] except RTU logo
which is taken from Rajasthan Technical University, Kota, India.
69
(a) Lena
(b) Mandrill
(c) Pepper
(d) Sailboat
Figure 4.4: RGB host images.
(a) RTU logo
(b) Aeroplane
Figure 4.5: RGB watermark images.
In the pre-processing step of the proposed method, each host and watermark
images are converted into UCS color space followed by third level decomposition of
host images and scrambling of watermark images. Figure 4.6 shows the converted
UCS images of host and watermark and third level decomposed lena host image
is represented in Figure 4.7. The watermark image goes through the process of
scrambling. One of the possible scrambled watermark images of RTU logo and
aeroplane are shown in Figure 4.8.
Figure 4.7: Three level decomposed host lena image using DWT.
70
(a)
(b)
(c)
(d)
(e)
(f)
Figure 4.6: UCS host and watermark images (a). Lena, (b). Mandrill, (c).
Pepper, (d). Sailboat, (e). RTU Logo, and (f). Aeroplane.
(a) RTU logo
(b) Aeroplane
Figure 4.8: Representative scrambled UCS watermark images.
Now, the watermark images are embedded into each of the considered host
images and the resultant watermarked images are shown in Figure 4.9.
To compare the objective test for quality measures of resultant watermarked
images using proposed and considered methods, CPSNR and SSIM performance
parameters are calculated and shown in Table 4.2. From Table 4.2, it is validated
that all the methods including proposed method maintain the quality of the watermarked image in terms of CPSNR (> 35dB) and SSIM (> 0.96). However,
the proposed method shows lower values of CPSNR and SSIM as compared to
other considered methods due to the hiding of complete watermark into all three
channels of host image while existing methods hide in only one channel of host
image. Moreover, subjective test on the resultant watermarked images is performed and presented in Table 4.3. The results of subjective test show that the
proposed method effectively embeds the watermarks which is imperceptible by
human beings.
71
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
Figure 4.9: RGB watermarked images embedded by using DE-based proposed
method (a)-(d) RTU logo and (e)-(h) Aeroplane image
Table 4.2: Comparison of CPSNR and SSIM values of watermarked images
resultant from proposed and considered methods.
Quality
Watermarked Su et al.
Parameters images
[98]
Chou
and Wu
[96]
Proposed
Method
using
GA
Proposed
Method
using
ABC
Proposed
Method
using
DE
1.
CPSNR
2.
SSIM
37.79
37.71
37.01
37.32
0.98
0.98
0.97
0.97
35.81
35.13
35.07
35.00
0.98
0.97
0.96
0.97
35.92
35.67
35.23
35.06
0.98
0.96
0.96
0.97
36.01
35.89
35.41
35.21
0.98
0.97
0.96
0.97
S.No.
Lena
Mandrill
Pepper
Sailboat
Lena
Mandrill
Pepper
Sailboat
36.57
36.42
36.61
36.52
0.98
0.98
0.96
0.98
Table 4.3: Average subjective quality comparison of original and watermarked
images by 10 human beings in the scale of 0 to 5.
Watermark
image
Watermarked Su et al.
image
[98]
1.
RTU Logo
2.
Aeroplane
Lena
Mandrill
Pepper
Sailboat
Lena
Mandrill
Pepper
Sailboat
S.No.
5
5
5
5
5
5
5
5
Average Score of 10 Human beings
Proposed Proposed
Chou
Method
Method
and Wu
using
using
[96]
ABC
GA
5
5
5
5
5
5
5
5
72
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
Proposed
Method
using
DE
5
5
5
5
5
5
5
5
To show the effectiveness of the proposed watermarking method, the extracted
watermarks from the watermarked images and their NC values are shown in Figure
4.10 for each of the considered method. From Figure 4.10, it is visualized that the
proposed method and Su et al. [98] have highest NC values (1.0) for all extracted
watermarks and hence outperforms the method of Chou and Wu [96]. The columns
of Figure 4.10 show extracted watermarks from considered watermarked images
and first five rows show the extraction of RTU logo while last five show extraction
of aeroplane image using the proposed and considered methods of watermarking.
The robustness of the proposed method has been tested by applying different
attacks on the watermarked images. In this chapter, attacks have been categorized into two classes namely; common signal processing attacks and geometric
attacks. The considered common signal processing attacks consists of filtering attacks (mean, median, wiener), noise attacks (gaussian, poisson, salt and pepper),
and JPEG compression attacks while rotation, scaling, and cropping are the considered geometric attacks. The attacks are applied on all the eight watermarked
images embedded with RTU logo and aeroplane images. The comparison of NC
values after applying the common signal processing attacks on watermarked images embedded with RTU logo are depicted in Table 4.4 while Table 4.5 shows
the NC values for watermarked images embedded with aeroplane image. After
applying the geometric attacks, the measured NC values for both the watermark
images are compared in Table 4.6. From Tables 4.4, 4.5, and 4.6, it is observed
that the robustness of watermarked images embedded with RTU logo have higher
values of NC as compared to aeroplane image due to the coarseness of aeroplane
image. The comparative results show that the proposed method using DE outperforms other methods for all the considered attacks except JPEG compression
and rotation where the method of Su et al. shows slightly better robustness. The
similar performance of the proposed method can be observed from Figure 4.11 and
Figure 4.12 where the extracted RTU logo and Aeroplane watermarks by proposed
method using DE respectively, for all the considered attacks have been depicted.
Therefore, it is validated from the results that the proposed method using DE
produces high quality and better robust watermarked images and can be utilized
for content authentication to protect the copyrighted images.
4.7
Results and Discussions
This chapter proposes a novel DWT-based color image watermarking method using UCS. The use of uncorrelated color space increases the effective utilization of
all color channels of host image which is not feasible in correlated color spaces.
73
Used Watermarked Image
Method
a. Lena
b. Mandrill
c. Pepper
d. Sailboat
1.00
0.99
0.99
0.98
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
0.99
0.98
0.99
0.99
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
Chou and Wu [96]
(NC)
Su et al. [98]
(NC)
Proposed Method using GA
(NC)
Proposed Method using ABC
(NC)
Proposed Method using DE
(NC)
Chou and Wu [96]
(NC)
Su et al. [98]
(NC)
Proposed Method using GA
(NC)
Proposed Method using ABC
(NC)
Proposed Method using DE
(NC)
Figure 4.10: Comparison of extracted watermarks by considered and proposed
methods along with their corresponding NC values. Columns shows extracted
watermarks from watermarked image namely (a). Lena, (b). Mandrill, (c).
Pepper, and (d). Sailboat using the considered and proposed methods mentioned
in first column. First five rows shows the extraction of RTU logo while last five
shows extraction of aeroplane
watermark image.
74
75
Gaussian
(0.006)
Poisson noise
Salt and
noise
JPEG compression
(10%)
JPEG compression
(30%)
JPEG compression
(60%)
JPEG compression
(90%)
6
7
8
9
10
11
12
pepper
0.44
0.34
0.21
0.14
0.90
0.86
0.90
0.41
Mean filtering (5 ×
5)
5
noise
0.54
Mean filtering (3 ×
3)
0.11
4
Wiener
(3 × 3)
3
filtering
0.18
0.67
Median
(5 × 5)
2
filtering
filtering
Median
(3 × 3)
Attacks
1
S.No.
Chou
and
Wu
[96]
0.93
0.90
0.88
0.71
0.91
0.83
0.82
0.87
0.96
0.87
0.63
0.73
Su
et
al.
[98]
0.92
0.83
0.87
0.70
0.89
0.82
0.81
0.86
0.95
0.86
0.62
0.72
GA
0.90
0.87
0.85
0.69
0.93
0.85
0.84
0.89
0.98
0.89
0.64
0.74
0.91
0.88
0.86
0.70
0.94
0.86
0.84
0.90
0.99
0.90
0.65
0.75
ABC DE
Using
Proposed Method
lena
0.41
0.32
0.20
0.13
0.84
0.80
0.84
0.38
0.50
0.62
0.10
0.17
Chou
and
Wu
[96]
0.86
0.84
0.82
0.66
0.85
0.77
0.76
0.81
0.89
0.81
0.59
0.68
Su
et
al.
[98]
0.86
0.83
0.81
0.65
0.84
0.76
0.75
0.80
0.88
0.80
0.58
0.67
GA
0.84
0.81
0.79
0.64
0.86
0.79
0.78
0.83
0.91
0.83
0.60
0.69
0.85
0.82
0.80
0.65
0.87
0.80
0.79
0.83
0.92
0.83
0.60
0.70
ABC DE
Using
Proposed Method
Mandril
0.43
0.33
0.21
0.14
0.88
0.84
0.88
0.40
0.53
0.66
0.11
0.18
Chou
and
Wu
[96]
0.91
0.88
0.86
0.70
0.89
0.81
0.80
0.85
0.94
0.85
0.62
0.72
Su
et
al.
[98]
0.90
0.87
0.85
0.69
0.88
0.81
0.80
0.84
0.93
0.84
0.61
0.71
GA
0.88
0.86
0.84
0.67
0.91
0.83
0.82
0.87
0.96
0.87
0.63
0.73
0.89
0.86
0.84
0.68
0.92
0.84
0.83
0.88
0.97
0.88
0.64
0.74
ABC DE
Using
Proposed Method
Pepper
0.42
0.33
0.20
0.13
0.86
0.83
0.86
0.39
0.52
0.64
0.11
0.17
Chou
and
Wu
[96]
0.89
0.86
0.84
0.68
0.87
0.80
0.79
0.84
0.92
0.84
0.60
0.70
Su
et
al.
[98]
0.88
0.86
0.84
0.67
0.86
0.79
0.78
0.83
0.91
0.83
0.60
0.69
GA
0.87
0.84
0.82
0.66
0.89
0.81
0.80
0.85
0.94
0.85
0.62
0.71
0.87
0.85
0.83
0.67
0.90
0.82
0.81
0.86
0.95
0.86
0.62
0.72
ABC DE
Using
Proposed Method
Sailboat
Table 4.4: Comparison of robustness in terms of NC values obtained after applying common signal processing attacks on the
watermarked image embedded with RTU logo
76
Gaussian
(0.006)
Poisson noise
Salt and
noise
JPEG compression
(10%)
JPEG compression
(30%)
JPEG compression
(60%)
JPEG compression
(90%)
6
7
8
9
10
11
12
pepper
0.4
0.27
0.16
0.11
0.82
0.7
0.81
0.3
Mean filtering (5 ×
5)
5
noise
0.42
Mean filtering (3 ×
3)
0.06
4
Wiener
(3 × 3)
3
filtering
0.13
0.51
Median
(5 × 5)
2
filtering
filtering
Median
(3 × 3)
Attacks
1
S.No.
Chou
and
Wu
[96]
0.91
0.89
0.86
0.69
0.84
0.81
0.83
0.87
0.95
0.83
0.62
0.71
Su
et
al.
[98]
0.90
0.88
0.85
0.68
0.83
0.80
0.82
0.86
0.94
0.82
0.61
0.70
GA
0.88
0.86
0.83
0.67
0.86
0.83
0.85
0.89
0.97
0.85
0.63
0.72
0.89
0.87
0.84
0.68
0.87
0.83
0.86
0.90
0.98
0.86
0.64
0.73
ABC DE
Using
Proposed Method
lena
0.37
0.25
0.15
0.10
0.76
0.65
0.75
0.28
0.39
0.47
0.06
0.12
Chou
and
Wu
[96]
0.85
0.83
0.80
0.64
0.78
0.75
0.77
0.81
0.88
0.77
0.58
0.66
Su
et
al.
[98]
0.84
0.82
0.79
0.64
0.77
0.75
0.76
0.80
0.87
0.76
0.57
0.65
GA
0.82
0.80
0.78
0.62
0.80
0.77
0.79
0.83
0.90
0.79
0.59
0.67
0.83
0.81
0.78
0.63
0.80
0.78
0.80
0.83
0.91
0.80
0.59
0.68
ABC DE
Using
Proposed Method
Mandril
0.39
0.26
0.16
0.11
0.80
0.69
0.79
0.29
0.41
0.50
0.06
0.13
Chou
and
Wu
[96]
0.89
0.87
0.84
0.68
0.82
0.79
0.81
0.85
0.93
0.81
0.61
0.70
Su
et
al.
[98]
0.88
0.86
0.83
0.67
0.81
0.79
0.81
0.84
0.92
0.81
0.60
0.69
GA
0.87
0.85
0.82
0.66
0.84
0.81
0.83
0.87
0.95
0.83
0.62
0.71
0.87
0.85
0.83
0.66
0.85
0.82
0.84
0.88
0.96
0.84
0.63
0.72
ABC DE
Using
Proposed Method
Pepper
0.38
0.26
0.15
0.11
0.79
0.67
0.78
0.29
0.40
0.49
0.06
0.12
Chou
and
Wu
[96]
0.87
0.85
0.83
0.66
0.81
0.78
0.80
0.84
0.91
0.80
0.60
0.68
Su
et
al.
[98]
0.86
0.85
0.82
0.66
0.80
0.77
0.79
0.83
0.90
0.79
0.59
0.67
GA
0.85
0.83
0.80
0.64
0.82
0.79
0.81
0.85
0.93
0.81
0.61
0.70
0.86
0.84
0.81
0.65
0.83
0.80
0.82
0.86
0.94
0.82
0.61
0.70
ABC DE
Using
Proposed Method
Sailboat
Table 4.5: Comparison of robustness in terms of NC values obtained after applying common signal processing attacks on the
watermarked image embedded with Aeroplane image.
77
0.55
0.73
Cropping (30%)
Cropping (40%)
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
8
1
2
3
4
5
6
7
8
0.43
0.62
0.76
0.86
0.67
0.59
0.5
0.70
0.81
Cropping (20%)
0.91
0.72
0.63
7
Scaling (1.2)
4
6
Scaling (0.9)
3
0.54
0.86
Cropping (10%)
Scaling (0.6)
2
5
Rotation (10 )
Attacks
1
S.No.
Chou
and
Wu
[96]
0.61
0.67
0.79
0.91
0.99
0.97
0.94
0.9
0.60
0.72
0.82
0.93
0.99
0.97
0.95
0.93
Su
et
al.
[98]
0.60
0.66
0.78
0.90
0.98
0.96
0.93
0.89
0.59
0.71
0.81
0.92
0.98
0.96
0.94
0.92
GA
0.62
0.68
0.81
0.93
0.99
0.99
0.96
0.88
0.61
0.73
0.84
0.95
0.99
0.99
0.97
0.91
0.63
0.69
0.81
0.94
1.00
1.00
0.97
0.89
0.62
0.74
0.84
0.96
1.00
1.00
0.98
0.92
ABC DE
Using
Proposed Method
lena
Su
et
al.
[98]
GA
ABC DE
Using
Proposed Method
Mandril
Chou
and
Wu
[96]
0.56
0.67
0.76
0.86
0.92
0.90
0.88
0.86
0.55
0.66
0.75
0.86
0.91
0.89
0.87
0.86
0.57
0.68
0.78
0.88
0.99
0.92
0.90
0.85
0.57
0.69
0.79
0.89
1.00
0.93
0.91
0.86
0.54
0.69
0.79
0.89
0.71
0.62
0.53
0.84
0.40
0.58
0.71
0.80
0.62
0.55
0.47
0.68
0.57
0.62
0.73
0.85
0.92
0.90
0.87
0.84
0.56
0.62
0.73
0.84
0.91
0.89
0.87
0.83
0.58
0.64
0.75
0.86
0.99
0.92
0.89
0.82
0.58
0.64
0.76
0.87
1.00
0.93
0.90
0.83
0.42
0.61
0.74
0.84
0.66
0.58
0.49
0.72
For Aeroplane Watermark Image
0.51
0.65
0.75
0.85
0.67
0.59
0.50
0.80
For RTU Logo Watermark Image
Chou
and
Wu
[96]
0.60
0.66
0.77
0.89
0.97
0.95
0.92
0.88
0.59
0.71
0.80
0.91
0.97
0.95
0.93
0.91
Su
et
al.
[98]
0.59
0.65
0.77
0.88
0.96
0.94
0.91
0.87
0.58
0.70
0.80
0.90
0.96
0.94
0.92
0.90
GA
0.61
0.67
0.79
0.91
0.99
0.97
0.94
0.85
0.60
0.72
0.82
0.93
0.99
0.97
0.95
0.90
0.62
0.68
0.80
0.92
1.00
0.98
0.95
0.86
0.61
0.73
0.83
0.94
1.00
0.98
0.96
0.91
ABC DE
Using
Proposed Method
Pepper
0.41
0.60
0.73
0.83
0.64
0.57
0.48
0.70
0.53
0.67
0.78
0.87
0.69
0.60
0.52
0.83
Chou
and
Wu
[96]
0.59
0.64
0.76
0.87
0.95
0.93
0.90
0.86
0.58
0.69
0.79
0.89
0.95
0.93
0.91
0.89
Su
et
al.
[98]
0.58
0.64
0.75
0.86
0.94
0.92
0.89
0.86
0.57
0.68
0.78
0.88
0.94
0.92
0.90
0.88
GA
0.60
0.66
0.77
0.89
0.99
0.95
0.92
0.83
0.59
0.71
0.80
0.91
0.99
0.95
0.93
0.87
0.60
0.66
0.78
0.90
1.00
0.96
0.93
0.84
0.59
0.71
0.81
0.92
1.00
0.96
0.94
0.88
ABC DE
Using
Proposed Method
Sailboat
Table 4.6: Comparison of robustness in terms of NC values obtained after applying geometric attacks on the watermarked images.
Extracted RTU logo Watermark Image After Attacks
Median (3x3)
Median (5x5)
Wiener (3x3)
Mean (3x3)
Mean (5x5)
Gaussian (0.006)
Poisson
Salt & Pepper
JPEG (10%)
JPEG (30%)
JPEG (60%)
JPEG (90%)
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
Figure 4.11: Extracted RTU logo watermarks by proposed method using DE
after applying considered attacks.
78
Extracted Aeroplane Watermark Image After Attacks
Median (3x3)
Median (5x5)
Wiener (3x3)
Mean (3x3)
Mean (5x5)
Gaussian (0.006)
Poisson
Salt & Pepper
JPEG (10%)
JPEG (30%)
JPEG (60%)
JPEG (90%)
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
Figure 4.12: Extracted Aeroplane watermarks by proposed method using DE
after applying considered attacks.
79
Moreover, different optimization methods are used for optimizing the strength
factors to improve the quality and robustness of the proposed method. The performance of the proposed methods have been measured in terms of quality and
robustness against different signal processing attacks and results are compared
with the work of Chou and Wu [96] and Su et al. [98]. The results validate that
the proposed method using DE is better than other methods for all the considered
parameters except slight decay in JPEG compression and rotation attacks as compared to Su et al. [98]. Therefore, it is concluded that the proposed method using
DE has high quality and robust results and can further be used for protection of
the copyrighted images.
The next chapter introduces SPT-based watermarking method for color watermark images.
80
Chapter 5
Digital Image Watermarking using Steerable Pyramid Transform on Color Watermark Images
5.1
Introduction
Previous chapter presented the DWT-based image watermarking method for protecting the color images against illegal uses by embedding the color watermark.
Further, optimization methods have been used to improve the performance. In
Chapter 3, the SPT-based image watermarking method has been proposed for
protecting the color images against illegal uses by embedding the gray-scale watermark. Moreover, analysis of the results show that the SPT-based method outperforms as compared to DWT. Therefore, this chapter proposes a method for
the protection of color images using SPT by embedding color watermark images.
Since, from the results of previous chapter, it is validated that DE outperforms
other optimization function, hence in this chapter, the DE has been used to optimized the strength factors.
Rest of the chapter is organized as follows. Section 5.2 describes the proposed
method. The method validation parameters and experimental results are discussed
in Section 5.3 and 5.4 respectively. Finally, Section 5.5 concludes the chapter.
5.2
Proposed Method
The proposed method explores the advantages of uncorrelated color space over
the correlated color space to improve the performance of watermarking methods
in terms of quality and robustness. It implants the color watermark image into
the color host image by modifying the decomposed SPT coefficients of host image. Each channel of color image is embedded in the corresponding channel of
host image to increase the reliability during the recovery process and to protect
against the common signal processing attacks. The proposed method consists
of five phases namely; pre-processing of host and watermark image, watermark
embedding, image post-processing, extraction of watermark, and performance improvement using DE. The basic structural design of the proposed method is shown
in Figure 5.1. The details of each phase of the proposed method are described in
the following sections.
Image Pre-processing
In image pre-processing, both the host RGB color image (H) and watermark
image (W ) are transformed into UCS color space using Eq. (2.8) which produces six independent image components (three for host and three for watermark)
namely; HU , HC , and HS for host image and WU , WC , and WS for watermark image. After transformation, each component of watermark image is divided into 16
non-overlapping sub-areas as shown in Figure 5.2. These sub-areas of watermark
image are then re-arranged or scrambled by some pre-defined sequence or key to
introduce one more level of security and enforced the user to use the key for the
extraction of the image from watermarked image. The pre-defined sequence or
key has 16 values (1-16) which are generated randomly. The watermark image is
scrambled according to this randomly generated sequence. One of the scrambled
pattern is shown in Image Preprocessing block of Figure 5.1. The above generated
pattern is stored for extraction phase. Further, third level of steerable pyramid
transformation decomposition is applied on each component of host image. The
resultant coefficients (Hk3 , k = {1, 2, 3, ..., 16}) is chosen for embedding process.
Watermark Embedding
After pre-processing of the images, the scrambled watermark is embedded into the
SPT coefficients of host image. In order to increase the reliability and robustness
of proposed method against the malicious attacks, it is desired to hide each color
component of the watermark image in corresponding component of host coefficients. Now, the scrambled watermark is embedded into approximation details of
the third level decomposed host image coefficients by using Eq. (5.1).
HWk3 (x, y) = Hk3 (x, y) + α(r)Wp (x, y)
k = {1, 2, 3, ..., 16}
p = {1, 2, 3, ..., 16}
r = {1, 2, 3, ..., 16}
82
(5.1)
Figure 5.1: Structural design of proposed method.
here, k represents the sub-areas of host image, p is the intended block of watermark, and α denotes the strength of modification done in the host coefficients.
Post-processing
After embedding all the color channels of UCS watermark image into corresponding SPT host image coefficients, inverse SPT (ISPT) is taken for watermarked host
83
Figure 5.2: Watermark division.
image coefficients which returns watermarked image in UCS color space. Finally,
UCS watermarked image is reconverted into RGB color space.
Watermark Extraction
The watermark extraction process requires watermarked image and pre-defined
key. To extract the watermark, RGB watermarked image is transformed into UCS
color space and then SPT decomposition on each channel is applied. To recover the
watermarked image, a reverse process of embedding is applied as shown in Figure
5.1 by using Eq. (5.2). Finally, the scrambled watermark image is rearranged to
its original sequence.
H (x,y)−H
(x,y)
Ŵp (x, y) = k3 α(r)Wk3
k = {1, 2, 3, ..., 16}
p = {1, 2, 3, ..., 16}
(5.2)
r = {1, 2, 3, ..., 16}
Performance Improvement using DE
The watermarked image is subjected to various watermarking attacks which degrade the performance of watermarking methods. The design of the apposite attacks are as important as to design a method for protection of multimedia contents
because they are required to test the robustness and security of the newly design
methods for protection of multimedia contents. There are mainly two parameters namely; quality and robustness which must be maximized for a watermarking
method, but these parameters are inversely related with each other i.e. if quality increases, robustness suffers and vice-versa. In this method, optimum values
of these parameters are dependent on the suitable values of strength factor (α).
Therefore, this chapter uses DE optimization method for selecting the values of α
which optimizes the quality and robustness in terms of fitness function.
84
This method uses following settings of DE parameters:
• The crossover probability CR = 0.9.
• The scale factor which controls the implication of the differential variation
F = 0.5.
• Population size NP = 50.
• The stopping criteria is set to the maximum number of iterations which is
500 for this experiment.
There are 16 strength factors used in this method which become the dimension
of each individual in DE method. The optimized values of these 16 strength factors
are calculated by minimizing the following fitness function :
90%
100
100
F itness =
[1 − NCjpg(Q) ]
+
+2×
CP SNR SSIM
Q=60%
+
50%
[1 − NCjpg(Q)] +
i=1
Q=10%
+
+
3
i=1
4
5
[1 − NCf ilter(i) ]
[1 − NCscale(i) ] +
3
(5.3)
[1 − NCnoise(i) ]
i=1
[1 − NCcrop(i) ] + [1 − NCrotation ]
i=1
here, CPSNR is composite peak signal-to-noise ratio, SSIM is structural similarity,
and NC is normalized correlation calculated for the attacks namely; JPEG compression (10 to 90%), filtering (wiener, mean, median), scaling (0.6 to 1.2 factor),
noise addition (poisson, salt and pepper, gaussian), rotation (10 ), and cropping
(10 to 40 %). These values are calculated by applying the mentioned attacks on
watermarked image.
5.3
Method Validation
The results obtained from the proposed method are compared with the methods
of Chou and Wu [96] and Su et al. [98] who also embedded the color watermark
images into the color host images. To compare these methods, quality and robustness parameters are considered. The quality of watermarked image can be
assess by two ways namely subjective and objective tests. Subjective test is done
by 10 humans beings on the scale of 0 (very poor) to 5 (excellent) while objective
85
test calculates the parameters namely CPSNR and SSIM. CPSNR measures the
degree of similarity between the original and watermarked image and is calculated
as follows [42]:
CP SNR =
M × N × 2552
10 log M N
2
3 s
m=1
n=1 [H(m, n, s) − HW (m, n, s)]
(5.4)
SSIM also measures the degree of similarity by including the three aspects of HVS
namely loss of correlation (c), luminance distortion (l ), and contrast distortion (s).
It is formulated as follows [98]:
SSIM = l(H, HW )c(H, HW )s(H, HW )
where,
(5.5)
l(H, HW ) =
2μH μHW + C1
μ2H + μ2HW + C1
(5.6)
c(H, HW ) =
2σH σHW + C2
2
2
σH
+ σH
+ C2
W
(5.7)
σHHW + C3
σH σHW + C3
(5.8)
s(H, HW ) =
here μ and σ are mean and standard deviation respectively while C1 , C2 , and
C3 are three positive constants used to avoid a null denominator. The values of
CPSNR and SSIM must be maximized for effective quality of watermarked image.
The robustness of watermarking method shows the degree of similarity between
the original watermark image and extracted watermark image after applying the
attacks and is measured by NC which is formulated as shown in Eq.5.9:
1
NC =
3 s
L
m=1
L
[W (m, n, s) × Ŵ (m, n, s)]
n=1
L
L
2
m=1
n=1 W (m, n, s)
(5.9)
The value of NC lies in the rage of 0 (no similarity) to 1 (similar) and is calculated
for the extracted watermark without attack and with attacks namely; JPEG compression (10 to 90%), filtering (wiener, mean, median), scaling (0.6 to 1.2 factor),
noise addition (poisson, salt and pepper, gaussian), rotation (10 ), and cropping
(10 to 40 %).
86
5.4
Experimental Results
To compare the performance of proposed and considered color image watermarking
methods, four popularly used 24-bit RGB color images namely; lena, mandrill,
pepper, and sailboat each of size 512 × 512 are used as host images which are
shown in Figure 5.3. In this chapter, one 24-bit RGB color logo and one RGB
color image namely; RTU logo and aeroplane color image respectively each of size
64 × 64 are used as watermark images which are shown in Figure 5.4. All the
considered images have been taken from USC-SIPI image database [112] except
RTU logo which is taken from Rajasthan Technical University, Kota, India.
(a) Lena
(b) Mandrill
(c) Pepper
(d) Sailboat
Figure 5.3: RGB host images.
(a) RTU logo
(b) Aeroplane
Figure 5.4: RGB watermark images.
In the pre-processing step of the proposed method, each host and watermark
images are converted into UCS color space followed by SPT decomposition of host
images and scrambling of watermark images. Figure 5.5 shows the converted UCS
images of host and watermark. The watermark image goes through the process
of scrambling. One of the possible scrambled watermark images of RTU logo and
aeroplane are shown in Figure 5.6. Now, the watermark images are embedded
into each of the considered host images and the resultant watermarked images are
shown in Figure 5.7.
A comparison of fitness values before and after optimization for 30 runs has
been depicted in Figure 5.8 which shows that the use of DE enhances the fitness
function value.
87
(a)
(b)
(c)
(d)
(e)
(f)
Figure 5.5: UCS host and watermark images (a). Lena, (b). Mandrill, (c).
Pepper, (d). Sailboat, (e). RTU Logo, and (f). Aeroplane.
(a) RTU logo
(b) Aeroplane
Figure 5.6: Representative scrambled UCS watermark images.
The performance of the proposed method is compared with method proposed
in the chapter 4, in which DWT and DE have been used to increases the quality
and robustness of image watermarking method. To compare the objective test for
quality measures of resultant watermarked images using proposed and considered
methods, CPSNR and SSIM performance parameters are calculated and depicted
in Table 5.1. From Table 5.1 it is validated that all the methods including proposed
method maintain the quality of the watermarked image in terms of CPSNR (>
35dB) and SSIM (> 0.95). However, the proposed method shows lower values of
CPSNR and SSIM as compared to other considered methods due to the hiding
of complete watermark into all the three channels of host image, while existing
methods hide in only one channel of the host image. Further, the results using
SPT is more promising than DWT-based method. Moreover, subjective test on
the resultant watermarked images is performed and presented in Table 5.2. The
results of subjective test show that the proposed method effectively embeds the
88
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
Figure 5.7: RGB watermarked images embedded by (a)-(d) RTU logo and
(e)-(h) Aeroplane image
Figure 5.8: A comparison of before and after optimization of fitness values for 30
runs.
watermarks which is imperceptible by human beings.
To show the effectiveness of the proposed watermarking method, the extracted
watermarks from the watermarked images and their NC values are shown in Figure
5.9 for each of the considered method. From Figure 5.9, it is visualized that the
proposed method using UCS color space and Su et al. [98] have highest NC values
(1.0) for all extracted watermarks and hence outperforms the method of Chou and
Wu [96]. The columns of Figure 5.9 show extracted watermarks from considered
watermarked images and first four rows shows the extraction of RTU logo while
last four shows extraction of aeroplane image using the proposed and considered
89
Table 5.1: Comparison of CPSNR and SSIM values of watermarked images
resultant from proposed and considered methods.
Quality
Parameters
Watermarked
images
Su et
[98]
1.
CPSNR
2.
SSIM
Lena
Mandrill
Pepper
Sailboat
Lena
Mandrill
Pepper
Sailboat
36.94
36.78
36.98
36.89
0.98
0.97
0.97
0.97
S.No.
al.
Chou
and
Wu [96]
DWTbased
Proposed
Method
SPT-based
Proposed
Method
38.17
38.09
37.38
37.69
0.97
0.96
0.97
0.97
36.01
35.89
35.41
35.21
0.98
0.97
0.96
0.97
36.28
36.03
35.58
35.41
0.98
0.96
0.96
0.97
Table 5.2: Average subjective quality comparison of original and watermarked
images by 10 human beings in the scale of 0 to 5.
Watermark
image
Watermarked
image
Average Score of 10 Human beings
Su et al. Chou
and DWT[98]
Wu [96]
based
Proposed
Method
SPT-based
Proposed
Method
1.
RTU Logo
2.
Aeroplane
Lena
Mandrill
Pepper
Sailboat
Lena
Mandrill
Pepper
Sailboat
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
S.No.
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
5
methods of watermarking.
The robustness of the proposed method has been tested by applying different
attacks on the watermarked images. In this chapter, attacks have been categorized into two classes namely; common signal processing attacks and geometric
attacks. The considered common signal processing attacks consists of filtering attacks (mean, median, wiener), noise attacks (gaussian, poisson, salt and pepper),
and JPEG compression attacks while rotation, scaling, and cropping are the considered geometric attacks. The attacks are applied on all the eight watermarked
images embedded with RTU logo and aeroplane images. The comparison of NC
values after applying the common signal processing attacks on watermarked images embedded with RTU logo are depicted in Table 5.3 while Table 5.4 shows
the NC values for watermarked images embedded with aeroplane image by all
considered methods and proposed method. After applying the geometric attacks,
the measured NC values for both the watermark images are compared in Table
5.5. From Tables 5.3 – 5.5, it is observed that the robustness of watermarked
images embedded with RTU logo have higher values of NC as compared to aero90
Method
a. Lena
Used Watermarked Image
b. Mandrill
c. Pepper
d. Sailboat
Chou and Wu [96]
(NC)
0.98
0.99
0.99
0.98
1.00
1.00
1.00
1.00
1.00
0.99
1.00
1.00
1.00
1.00
1.00
1.00
0.99
0.98
0.99
0.99
1.00
1.00
1.00
1.00
1.00
0.99
1.00
0.99
1.00
1.00
1.00
1.00
Su et al. [98]
(NC)
DWT-based Proposed Method
(NC)
SPT-based Proposed Method
(NC)
Chou and Wu [96]
(NC)
Su et al. [98]
(NC)
DWT-based Proposed Method
(NC)
SPT-based Proposed Method
(NC)
Figure 5.9: Comparison of extracted watermarks by considered and proposed
methods along with their corresponding NC values. Columns shows extracted
watermarks from watermarked image namely (a). Lena, (b). Mandrill, (c).
Pepper, and (d). Sailboat using the considered and proposed methods mentioned
in first column. First four rows shows the extraction of RTU logo while last four
shows extraction of aeroplane watermark image.
91
92
Median
(5 × 5)
Wiener
(3 × 3)
Mean
(3 × 3)
Mean
(5 × 5)
Gaussian
(0.006)
Poisson noise
Salt and pepper
noise
JPEG compression (10%)
JPEG compression (30%)
JPEG compression (60%)
JPEG compression (90%)
2
3
4
5
6
7
8
9
10
11
12
noise
filtering
filtering
filtering
filtering
Median
(3 × 3)
1
filtering
Attacks
S.No.
0.44
0.34
0.21
0.14
0.91
0.87
0.91
0.41
0.54
0.68
0.11
0.18
Chou
and
Wu
[96]
0.94
0.91
0.89
0.72
0.92
0.84
0.83
0.88
0.97
0.88
0.63
0.74
Su
et
al.
[98]
0.91
0.88
0.86
0.70
0.94
0.86
0.84
0.90
0.99
0.90
0.65
0.75
DWTbased
Proposed
Method
lena
0.92
0.89
0.87
0.70
0.94
0.86
0.85
0.90
0.99
0.90
0.65
0.76
SPTbased
Proposed
Method
0.41
0.32
0.20
0.13
0.84
0.81
0.84
0.38
0.51
0.63
0.10
0.17
Chou
and
Wu
[96]
0.87
0.84
0.82
0.67
0.85
0.78
0.77
0.82
0.90
0.82
0.59
0.68
Su
et
al.
[98]
0.85
0.82
0.80
0.65
0.87
0.80
0.79
0.83
0.92
0.83
0.60
0.70
DWTbased
Proposed
Method
Mandrill
0.85
0.82
0.81
0.65
0.88
0.80
0.79
0.84
0.92
0.84
0.61
0.70
SPTbased
Proposed
Method
0.43
0.34
0.21
0.14
0.89
0.85
0.89
0.40
0.53
0.66
0.11
0.18
Chou
and
Wu
[96]
0.92
0.89
0.87
0.70
0.90
0.82
0.81
0.86
0.95
0.86
0.62
0.72
Su
et
al.
[98]
0.89
0.86
0.84
0.68
0.92
0.84
0.83
0.88
0.97
0.88
0.64
0.74
DWTbased
Proposed
Method
Pepper
0.90
0.87
0.85
0.69
0.92
0.84
0.83
0.88
0.97
0.88
0.64
0.74
SPTbased
Proposed
Method
0.43
0.33
0.20
0.14
0.87
0.83
0.87
0.40
0.52
0.65
0.11
0.17
Chou
and
Wu
[96]
0.90
0.87
0.85
0.69
0.88
0.80
0.79
0.84
0.93
0.84
0.61
0.71
Su
et
al.
[98]
0.87
0.85
0.83
0.67
0.90
0.82
0.81
0.86
0.95
0.86
0.62
0.72
DWTbased
Proposed
Method
Sailboat
0.88
0.85
0.83
0.67
0.90
0.82
0.81
0.86
0.95
0.86
0.63
0.73
SPTbased
Proposed
Method
Table 5.3: Comparison of robustness in terms of NC values obtained after applying common signal processing attacks on the
watermarked image embedded with RTU logo
93
Median
(5 × 5)
Wiener
(3 × 3)
Mean
(3 × 3)
Mean
(5 × 5)
Gaussian
(0.006)
Poisson noise
Salt and pepper
noise
JPEG compression (10%)
JPEG compression (30%)
JPEG compression (60%)
JPEG compression (90%)
2
3
4
5
6
7
8
9
10
11
12
noise
filtering
filtering
filtering
filtering
Median
(3 × 3)
1
filtering
Attacks
S.No.
0.40
0.27
0.16
0.11
0.83
0.71
0.82
0.30
0.42
0.51
0.06
0.13
Chou
and
Wu
[96]
0.92
0.90
0.87
0.70
0.85
0.82
0.84
0.88
0.96
0.84
0.63
0.72
Su
et
al.
[98]
0.89
0.87
0.84
0.68
0.87
0.83
0.86
0.90
0.98
0.86
0.64
0.73
DWTbased
Proposed
Method
lena
0.90
0.88
0.85
0.68
0.87
0.84
0.86
0.90
0.98
0.86
0.64
0.74
SPTbased
Proposed
Method
0.38
0.25
0.15
0.10
0.77
0.66
0.76
0.28
0.39
0.48
0.06
0.12
Chou
and
Wu
[96]
0.85
0.83
0.81
0.65
0.79
0.76
0.78
0.82
0.89
0.78
0.58
0.67
Su
et
al.
[98]
0.83
0.81
0.78
0.63
0.80
0.78
0.80
0.83
0.91
0.80
0.59
0.68
DWTbased
Proposed
Method
Mandrill
0.83
0.81
0.79
0.63
0.81
0.78
0.80
0.84
0.91
0.80
0.60
0.68
SPTbased
Proposed
Method
0.40
0.27
0.16
0.11
0.81
0.69
0.80
0.30
0.42
0.50
0.06
0.13
Chou
and
Wu
[96]
0.90
0.88
0.85
0.68
0.83
0.80
0.82
0.86
0.94
0.82
0.61
0.70
Su
et
al.
[98]
0.87
0.85
0.83
0.66
0.85
0.82
0.84
0.88
0.96
0.84
0.63
0.72
DWTbased
Proposed
Method
Pepper
0.88
0.86
0.83
0.67
0.85
0.82
0.84
0.88
0.96
0.84
0.63
0.72
SPTbased
Proposed
Method
0.39
0.26
0.15
0.11
0.79
0.68
0.78
0.29
0.41
0.49
0.06
0.13
Chou
and
Wu
[96]
0.88
0.86
0.83
0.67
0.81
0.78
0.80
0.84
0.92
0.80
0.60
0.69
Su
et
al.
[98]
0.86
0.84
0.81
0.65
0.83
0.80
0.82
0.86
0.94
0.82
0.61
0.70
DWTbased
Proposed
Method
Sailboat
0.86
0.84
0.81
0.65
0.83
0.81
0.82
0.86
0.94
0.82
0.62
0.71
SPTbased
Proposed
Method
Table 5.4: Comparison of robustness in terms of NC values obtained after applying common signal processing attacks on the
watermarked image embedded with Aeroplane image.
94
0.56
0.74
Cropping (20%)
Cropping (30%)
Cropping (40%)
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
6
7
8
1
2
3
4
5
6
7
8
0.43
0.63
0.77
0.87
0.68
0.60
0.51
0.71
0.82
0.92
Cropping (10%)
0.73
0.64
5
Scaling (0.9)
3
0.55
Scaling (1.2)
Scaling (0.6)
2
0.87
Chou
and
Wu
[96]
4
Rotation (10 )
Attacks
1
S.No.
0.62
0.68
0.80
0.92
0.98
0.98
0.95
0.91
0.61
0.73
0.83
0.94
0.98
0.98
0.96
0.94
Su
et
al.
[98]
0.63
0.69
0.81
0.94
1.00
1.00
0.97
0.89
0.62
0.74
0.84
0.96
1.00
1.00
0.98
0.92
DWTbased
Proposed
Method
lena
0.63
0.69
0.82
0.94
0.98
0.98
0.97
0.91
0.62
0.75
0.85
0.96
0.98
0.98
0.98
0.95
SPTbased
Proposed
Method
Su
et
al.
[98]
DWTbased
Proposed
Method
Mandrill
Proposed Chou
Method and
Wu
using
[96]
UCS
0.56
0.68
0.77
0.87
0.93
0.91
0.89
0.87
0.57
0.69
0.79
0.89
1.00
0.93
0.91
0.86
0.58
0.69
0.79
0.90
0.98
0.93
0.91
0.88
0.54
0.69
0.80
0.90
0.71
0.62
0.53
0.85
0.40
0.58
0.71
0.81
0.63
0.55
0.47
0.69
0.57
0.63
0.74
0.85
0.93
0.91
0.88
0.85
0.58
0.64
0.76
0.87
1.00
0.93
0.90
0.83
0.59
0.65
0.76
0.88
0.98
0.93
0.91
0.86
0.43
0.61
0.75
0.85
0.66
0.58
0.49
0.72
For Aeroplane Watermark Image
0.52
0.66
0.76
0.85
0.68
0.59
0.51
0.81
For RTU Logo Watermark Image
Chou
and
Wu
[96]
0.60
0.66
0.78
0.90
0.98
0.96
0.93
0.89
0.59
0.71
0.81
0.92
0.98
0.96
0.94
0.92
Su
et
al.
[98]
0.62
0.68
0.80
0.92
1.00
0.98
0.95
0.86
0.61
0.73
0.83
0.94
1.00
0.98
0.96
0.91
DWTbased
Proposed
Method
Pepper
0.62
0.68
0.80
0.92
0.98
0.98
0.95
0.89
0.61
0.73
0.83
0.94
0.98
0.98
0.96
0.93
SPTbased
Proposed
Method
0.42
0.60
0.74
0.83
0.65
0.57
0.48
0.71
0.53
0.68
0.79
0.88
0.70
0.61
0.52
0.83
Chou
and
Wu
[96]
0.59
0.65
0.77
0.88
0.96
0.94
0.91
0.87
0.58
0.70
0.80
0.90
0.96
0.94
0.92
0.90
Su
et
al.
[98]
0.60
0.66
0.78
0.90
1.00
0.96
0.93
0.84
0.59
0.71
0.81
0.92
1.00
0.96
0.94
0.88
DWTbased
Proposed
Method
Sailboat
0.61
0.67
0.79
0.90
0.97
0.96
0.93
0.86
0.60
0.72
0.81
0.92
0.97
0.96
0.94
0.90
SPTbased
Proposed
Method
Table 5.5: Comparison of robustness in terms of NC values obtained after applying geometric attacks on the watermarked images.
Extracted Watermark Image After Attacks
Median (3x3)
Median (5x5)
Wiener (3x3)
Mean (3x3)
Mean (5x5)
Gaussian (0.006)
Poisson
Salt & Pepper
JPEG (10%)
JPEG (30%)
JPEG (60%)
JPEG (90%)
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
Figure 5.10: Extracted RTU logo watermarks by proposed method using UCS
and DE after applying considered attacks.
95
Extracted Aeroplane Watermark Image After Attacks
Median (3x3)
Median (5x5)
Wiener (3x3)
Mean (3x3)
Mean (5x5)
Gaussian (0.006)
Poisson
Salt & Pepper
JPEG (10%)
JPEG (30%)
JPEG (60%)
JPEG (90%)
Rotation (10 )
Scaling (0.6)
Scaling (0.9)
Scaling (1.2)
Cropping (10%)
Cropping (20%)
Cropping (30%)
Cropping (40%)
Figure 5.11: Extracted Aeroplane watermarks by proposed method using UCS
and DE after applying considered attacks.
96
plane image due to the coarseness of aeroplane image as compared to RTU logo.
The comparative results show that the proposed method using SPT, UCS color
space, and DE method outperforms other methods for all the considered attacks
except JPEG compression where the method of Su et al. [98] shows slightly better
robustness. The similar performance of the proposed method can be observed
from Figures 5.10 and 5.11 where the extracted RTU logo and aeroplane image
watermarks by proposed method using SPT, UCS, and DE for all the considered
attacks have been depicted. Therefore, it is validated from the results that the
proposed method using SPT, UCS color space, and DE produces high quality and
better robust watermarked images and can be utilized for content authentication
to protect the copyrighted images.
5.5
Results and Discussions
This chapter proposes a novel SPT-based color image watermarking method using
UCS and DE method. The use of uncorrelated color space increases the effective
utilization of all color channels of host image which is not feasible in correlated
color spaces while DE is used for optimizing the strength factors to improve the
quality and robustness of the proposed method. The performance of the proposed
method has been measured in terms of quality and robustness against different
signal processing attacks and results are compared with the work of Chou and
Wu [96] and Su et al. [98]. The results validate that the proposed method is
better than other methods for all the considered parameters except slight decay
in JPEG compression attack as compared to Su et al. [98]. Moreover, the results
are also compared with DWT-based method introduce in Chapter 4. The results
depict that SPT-based method outperforms DWT-based method. Therefore, it
is concluded that the proposed method using SPT, UCS color space, and DE
has high quality and robust results and can further be used for protection of the
copyrighted images.
97
Chapter 6
Conclusions and Scope for Future Work
In this thesis, an attempt has been made to identify the problems pertaining to
image watermarking for protection of color images. Color spaces, transform methods, optimization methods, and attacks are the major problems encountered in
the image watermarking area. In this work, some inherent drawbacks of existing methods used for quantitative analysis of watermarking for color images are
studied. The outcome of this study motivated to develop an image watermarking
system for the content authentication of color images.
Though the experimental results along with the discussions have been given
at the end of each chapter, this concluding chapter is mainly devoted to the contributions made in this thesis. The main contributions in this thesis are four-fold.
First, pre-process the input color images (host and watermark) by transforming it
into UCS color space. Second, four efficient transform-based image watermarking
methods for color images have been proposed to enhance the transparency and
robustness of method. Third, three optimization methods have been used to improves the performance of proposed methods by optimally selecting the strength
factors of watermarks and then post-processed the watermarked coefficients to reconstruct the watermarked image. Fourth, applying various watermarking attacks
in order to test the proposed method on various benchmark/ validation parameters
like composite-peak-signal-to-noise ratio (CPSNR), structural similarity (SSIM),
and normalized correlation (NC). Finally, an image watermarking method is designed and developed using the proposed methods for protection of color images.
The thesis is concluded with a summary of contribution followed by some pointers
to new research that are directly related to the present work.
6.1
Contributions Made in the Thesis
The major contributions of this work are discussed below.
1. Digital Image Watermarking using Discrete Wavelet Transform on
Gray-Scale Watermark Image
The first contribution is to develop a robust image watermarking method
based on the DWT and UCS for the protection of color images by embedding
the gray-scale image watermarks. Further, the capabilities of GA have been
used to optimize 16 strength factors to improves the transparency and the
robustness of proposed method. In this method, the watermark images
are embeds in third level decomposed image by using symlet-4 filter bank.
Experimental results show that the proposed method has good quality and
robustness against the 16 considered signal processing and geometric attacks.
Moreover, the performance of the proposed method is better than the image
watermarking method by Vahedi et al. [42] who also used DWT and GA
method.
2. Digital Image Watermarking using Steerable Pyramid Transform
on Gray-Scale Watermark Images
The second contribution is devoted to design an image watermarking method
based on the SPT and UCS. In this method a gray-scale watermark has been
embedded in third level decompose coefficients of input image. Furthermore,
GA has been used to enhance the performance of the method. Experimental results show that the proposed method has good quality and robustness
against the 16 considered signal processing and geometric attacks. Moreover,
the performance of the proposed method is better than the image watermarking method by Vahedi et al. [42] and the previously proposed method
(Digital Image Watermarking using Discrete Wavelet Transform on GrayScale Watermark Image) which also used DWT and GA in their method.
Hence, it is concluded that the SPT outperforms the DWT.
3. Digital Image Watermarking using Discrete Wavelet Transform on
Color Watermark Images
The third contribution introduces a robust and blind image watermarking
method based on DWT and UCS for the protection of color images by embedding the color image watermark into the third level decomposed host
coefficients. Moreover, to increase the reliability the watermark hides into
the multiple sections of the host image. Further, the capabilities of three
100
optimization methods namely; GA, ABC, and DE, have been exploited to optimize the 16 strength factors. Experimental results show that the proposed
method with DE has better quality and robustness against the 20 considered signal processing and geometric attacks. Moreover, the performance of
the proposed method is better than the image watermarking methods proposed by Su et al. [98] and Chou and Wu [96] who also embedded the color
watermark.
4. Digital Image Watermarking using Steerable Pyramid Transform
on Color Watermark Images
The fourth contribution is based on the SPT-based image watermarking
method for the protection of color host images by embedding the color watermark into the third level decomposed of image. Moreover, to increase
the reliability, the watermark is embedded into the multiple areas of the
host image. Further, the capabilities of the newly introduce DE method
has been exploited to optimize the 16 strength factors. Experimental results
show that the proposed method has better quality and robustness against
the 20 considered signal processing and geometric attacks. Moreover, the
performance of the proposed method is better than the image watermarking methods proposed by Su et al. [98], Chou and Wu [96], and previously
proposed method (Chapter 4) who have also embedded the color watermark.
6.2
Scope for Future Work
The present work opens a lot of new avenues and directions for research in the
field of watermarking. Some of the possible directions for future research related
to the present work are given below;
• The developed methods may be explored for recently introduced transforms
and color spaces.
• The proposed work can be further explored by using hybrid methods like
more than one transform, color space, etc.
• The present work can be further investigated for other multimedia contents
such as video signals and 3-D models.
• The developed methods may be further explored for other newly introduced
optimization methods.
101
References
[1] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM systems journal, vol. 35, pp. 313–336, 1996.
[2] V. Fotopoulos and A. N. Skodras, “Digital image watermarking:
An
overview,” Eurasip Newsletter, vol. 14, pp. 10–19, 2003.
[3] V. Potdar, S. Han, and E. Chang, “A survey of digital image watermarking
techniques,” in Proc. of International Conference on Industrial Informatics,
Frontier Technologies for the Future of Industry and Business, Perth, WA,
2005.
[4] J. Liu and X. He, “A review study on digital watermarking,” in Proc. of
IEEE International Conference on Information and Communication Technologies, (ICICT 2005), 2005.
[5] S. R. Oliveira and M. A. Nascimento, “Digital watermarking: Status, limitations and prospects,” 2002.
[6] A. O. Adesina, H. O. Nyongesa, and K. K. Agbele, “Digital watermarking:
A state-of-the-art review,” in Proc. of IEEE International Conference ISTAfrica, 2010, 2010.
[7] B. Schneier, “Applied cryptography,” Cover and title pages, pp. 125–147,
1996.
[8] E. Koch and J. Zhao, “Towards robust and hidden image copyright labeling,”
in Proc. of IEEE Workshop on Nonlinear Signal and Image Processing. Neos
Marmaras, Greece, 1995.
[9] R. J. Anderson and F. A. Petitcolas, “Information hiding,” Signal Processing, vol. 80, pp. 2067–2070, 1996.
[10] F. Mintzer, G. W. Braudaway, and A. E. Bell, “Opportunities for watermarking standards,” Communications of the ACM, vol. 41, pp. 57–64, 1998.
103
[11] I. J. Cox, M. L. Miller, and J. A. Bloom, “Watermarking applications and
their properties,” in Proc. International Conference on IEEE Information
Technology: Coding and Computing, 2000.
[12] B. J. Cox I. J., Miller M., Digital Watermarking: Principles and Practice.
Morgan Kaufmann, 2001.
[13] A. Darwish and A. Abraham, “The use of computational intelligence in
digital watermarking: Review, challenges, and new trends,” Neural Network
World, vol. 21, p. 277, 2011.
[14] T. Bianchi and A. Piva, “Secure watermarking for multimedia content protection: A review of its benefits and open issues,” IEEE Signal Processing
Magazine, vol. 30, pp. 87–96, 2013.
[15] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, pp. 1673–1687, 1997.
[16] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su, “Attacks
on digital watermarks: classification, estimation based attacks, and benchmarks,” IEEE Communications Magazine, vol. 39, pp. 118–126, 2001.
[17] S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand Maillet, and
T. Pun, “Second generation benchmarking and application oriented evaluation,” in Proc. of Information Hiding. Springer, 2001.
[18] J. K. Su and B. Girod, “Power-spectrum condition for energy-efficient watermarking,” IEEE Transactions on Multimedia, vol. 4, pp. 551–560, 2002.
[19] G. C. Langelaar, R. L. Lagendijk, J. Biemond et al., “Removing spatial
spread spectrum watermarks by non-linear filtering,” in Proc. of 9th European Signal Processing Conference (EUSIPCO98), 1998.
[20] S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, “Attack modelling:
towards a second generation watermarking benchmark,” Signal processing,
vol. 81, pp. 1177–1214, 2001.
[21] S.
P.
Mohanty,
“Digital
watermarking:
A
rial
review,”
URL:
http://www.
csee.
usf.
edu/˜
hanty/research/Reports/WMSurvey1999Mohanty. pdf, 1999.
104
tutosmo-
[22] S. J. Lee and S. H. Jung, “A survey of watermarking techniques applied
to multimedia,” in Proc. of IEEE International Symposium on Industrial
Electronics, (ISIE 2001), 2001.
[23] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, pp. 1079–1107, 1999.
[24] D. Aucsmith, Information hiding. Springer, 1998.
[25] F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a
survey,” Proceedings of the IEEE, vol. 87, pp. 1062–1078, 1999.
[26] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image
steganography: Survey and analysis of current methods,” Signal processing, vol. 90, pp. 727–752, 2010.
[27] A. Z. Tirkel, R. G. van Schyndel, and C. Osborne, “A two-dimensional
digital watermark,” in Proc. of Dicta, 1995.
[28] R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” in Proc.
of IEEE International Conference on Image Processing, 1996.
[29] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal processing, vol. 66, pp. 385–403, 1998.
[30] R. B. Wolfgang and E. J. Delp, “A watermarking technique for digital imagery: further studies,” in Proc. of International Conference on Imaging,
Systems, and Technology, 1997.
[31] G. Voyatzis and I. Pitas, “Digital image watermarking using mixing systems,” Computers & Graphics, vol. 22, pp. 405–416, 1998.
[32] O. Bruyndonckx, J. J. Quisquater, and B. Macq, “Spatial method for copyright labeling of digital images,” Proc. of IEEE Nonlinear Signal and Image
Processing, 1995.
[33] I. Pitas, “A method for signature casting on digital images,” in Proc. of
IEEE International Conference on Image Processing, 1996.
[34] P. S. Huang, C. S. Chiang, C. P. Chang, and T. M. Tu, “Robust spatial
watermarking technique for colour images via direct saturation adjustment,”
IEE Proceedings-Vision, Image and Signal Processing, vol. 152, pp. 561–574,
2005.
105
[35] R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” in Proc. of IEEE International Conference on Image Processing,
(ICIP 1994), 1994.
[36] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE
Transactions on Image Processing, vol. 8, pp. 58–68, 1999.
[37] G. M. Su, “An overview of transparent and robust digital image watermarking,” 2008.
[38] T. H. Lan and A. H. Tewfik, “A novel high-capacity data-embedding system,” IEEE Transactions on Image Processing, vol. 15, pp. 2431–2440, 2006.
[39] D. Kundur and D. Hatzinakos, “Toward robust logo watermarking using
multiresolution image fusion principles,” IEEE Transactions on Multimedia,
vol. 6, pp. 185–198, 2004.
[40] A. A. Reddy and B. N. Chatterji, “A new wavelet based logo-watermarking
scheme,” Pattern Recognition Letters, vol. 26, pp. 1019–1027, 2005.
[41] L. Ghouti, A. Bouridane, M. K. Ibrahim, and S. Boussakta, “Digital image
watermarking using balanced multiwavelets,” IEEE Transactions on Signal
Processing, vol. 54, pp. 1519–1536, 2006.
[42] E. Vahedi, R. A. Zoroofi, and M. Shiva, “Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles,” Digital Signal Processing, vol. 22, pp. 153–162, 2012.
[43] X. Y. Wang, C. P. Wang, H. Y. Yang, and P. P. Niu, “A robust blind color
image watermarking in quaternion fourier transform domain,” Journal of
Systems and Software, 2012.
[44] W. T. Freeman and E. H. Adelson, “The design and use of steerable filters,”
IEEE Transactions on Pattern analysis and machine intelligence, vol. 13,
pp. 891–906, 1991.
[45] E. P. Simoncelli, W. T. Freeman, E. H. Adelson, and D. J. Heeger, “Shiftable
multiscale transforms,” IEEE Transactions on Information Theory, vol. 38,
pp. 587–607, 1992.
[46] F. Drira, F. Denis, and A. M. Baskurt, “Image watermarking technique
based on the steerable pyramid transform,” in Proc. of SPIE, 2004.
106
[47] M. Unser and N. Chenouard, “A unifying parametric framework for 2-d
steerable wavelet transforms,” SIAM Journal on Imaging Sciences, vol. 6,
pp. 102–135, 2013.
[48] P. P. Niu, X. Y. Wang, H. B. Jin, and M. Y. Lu, “A feature-based robust
digital image watermarking scheme using bandelet transform,” Optics &
Laser Technology, vol. 43, pp. 437–450, 2011.
[49] J. Ruanaidh, W. Dowling, and F. Boland, “Phase watermarking of digital
images,” in Proc. of IEEE International Conference on Image Processing,
1996.
[50] J. O’Ruanaidh and T. Pun, “Rotation, translation and scale invariant digital
image watermarking,” in Proc. of IEEE International Conference on Image
Processing, 1997.
[51] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui,
“Rotation, scale, and translation-resilient public watermarking for images,”
in Proc. of Electronic Imaging, 2000.
[52] M. Ramkumar, A. N. Akansu, and A. A. Alatan, “A robust data hiding
scheme for images using dft,” in Proc. of IEEE International Conference on
Image Processing (ICIP 99), 1999.
[53] A. De Rosa, M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “Optimum
decoding of non-additive full frame dft watermarks,” in Proc. of Information
Hiding. Springer, 2000.
[54] V. Solachidis and L. Pitas, “Circularly symmetric watermark embedding
in 2-d dft domain,” IEEE Transactions on Image Processing, vol. 10, pp.
1741–1753, 2001.
[55] V. Aslantas, S. Ozer, and S. Ozturk, “Improving the performance of dctbased fragile watermarking using intelligent optimization algorithms,” Optics Communications, vol. 282, pp. 2806–2817, 2009.
[56] J. Wang, S. Lian, Z. Liu, Z. Ren, Y. Dai, and H. Wang, “Image watermarking scheme based on 3-d dct,” in Proc. of IEEE Conference on Industrial
Electronics and Applications, 2006.
[57] C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Liao, “A new watermarking technique for multimedia protection,” Multimedia image and video processing,
pp. 507–530, 2001.
107
[58] S. Agreste, G. Andaloro, D. Prestipino, and L. Puccio, “An image adaptive,
wavelet-based watermarking of digital images,” Journal of Computational
and Applied Mathematics, vol. 210, pp. 13–21, 2007.
[59] S. Agreste and G. Andaloro, “A new approach to pre-processing digital
image for wavelet-based watermark,” Journal of Computational and Applied
Mathematics, vol. 221, pp. 274–283, 2008.
[60] F. K. A. T. F. Khelifi, A. Bouridane, “An improved waveletbased image
watermarking technique,” in Proc. of 4th International Workshop on Digital
Watermarking, Siena, Italy, 2005.
[61] E. Vahedi, R. A. Zoroofi, and M. Shiva, “On optimal parameter selection
for multiresolution based image watermarking,” in Proc. IEEE International
Conference on Intelligent and Advanced Systems (ICIAS 2007), 2007.
[62] E. Hossaini, A. El Arab, M. El Aroussi, K. Jamali, S. Mbarki, and M. Wahbi,
“Hybrid watermarking algorithm based on singular value decomposition and
steerable pyramid,” in Proc. of IEEE International Conference on Multimedia Computing and Systems (ICMCS 2014), 2014.
[63] J. Ni, R. Zhang, J. Huang, C. Wang, and Q. Li, “A rotation-invariant secure
image watermarking algorithm incorporating steerable pyramid transform,”
in Digital Watermarking. Springer, 2006.
[64] A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “Dct-based watermark
recovering without resorting to the uncorrupted original image,” in Proc. of
IEEE International Conference on Image Processing, 1997.
[65] B. Tao and B. Dickinson, “Adaptive watermarking in the dct domain,” in
Proc. of IEEE International Conference on Acoustics, Speech, and Signal
Processing, 1997.
[66] B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, “Reversible image watermarking by histogram modification for integer dct coefficients,” in
Proc. of IEEE 6th Workshop on Multimedia Signal Processing, 2004.
[67] W. P. G.L. Varco, “Dct-based data hiding for securing roi of color images,”
in Proc. of the IEEE International Conference on Image Processing (ICIP),
Genova, Italy, 2005.
[68] V. Saxena and J. Gupta, “Collusion attack resistant watermarking scheme
for images using dct,” in Proc. of 15th IEEE International Conference on
Signal Processing and Communications Applications (SIU 2007), 2007.
108
[69] S. D. Lin, S. C. Shie, and J. Guo, “Improving the robustness of dct-based
image watermarking against jpeg compression,” Computer Standards & Interfaces, vol. 32, pp. 54–60, 2010.
[70] M. Barni, F. Bartolini, V. Cappellini, A. Lippi, and A. Piva, “Dwt-based
technique for spatio-frequency masking of digital signatures,” in Proc. of
Electronic Imaging, 1999.
[71] V. Aslantas, A. L. Dogan, and S. Ozturk, “Dwt-svd based image watermarking using particle swarm optimizer,” in Proc. of IEEE International
Conference on Multimedia and Expo, 2008.
[72] K. C. Liu, “Wavelet-based watermarking for color images through visual
masking,” AEU-International Journal of Electronics and Communications,
vol. 64, pp. 112–124, 2010.
[73] S. Agreste and L. Puccio, “Wavelet-based watermarking algorithms: theory, applications and critical aspects,” International Journal of Computer
Mathematics, vol. 88, pp. 1885–1895, 2011.
[74] S. Pereira, S. Voloshynoskiy, and T. Pun, “Optimal transform domain watermark embedding via linear programming,” Signal processing, vol. 81, pp.
1251–1260, 2001.
[75] Y. Zhao, P. Campisi, and D. Kundur, “Dual domain watermarking for authentication and compression of cultural heritage images,” IEEE Transactions on Image Processing, vol. 13, pp. 430–448, 2004.
[76] M. Unser, N. Chenouard, and D. Van De Ville, “Steerable pyramids and
tight wavelet frames in,” IEEE Transactions on Image Processing, vol. 20,
pp. 2705–2721, 2011.
[77] S. X. Wu and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: A review,” Applied Soft Computing, vol. 10, pp.
1–35, 2010.
[78] Z. Wang, X. Sun, and D. Zhang, “A novel watermarking scheme based
on pso algorithm,” in Proc. of Bio-Inspired Computational Intelligence and
Applications. Springer, 2007.
[79] E. Vahedi, C. Lucas, R. A. Zoroofi, and M. Shiva, “A bio-inspired content
adaptive approach for multiresolution-based image watermarking,” in Proc.
109
of Third International Conference on Natural Computation (ICNC 2007),
2007.
[80] ——, “A new approach for image watermarking by using particle swarm optimization,” in Proc. of IEEE International Conference on Signal Processing
and Communications, 2007.
[81] P. Kumsawat, K. Attakitmongcol, and A. Srikaew, “An optimal robust digital image watermarking based on genetic algorithms in multiwavelet domain,” WSEAS Transactions on Signal Processing, vol. 5, pp. 42–51, 2009.
[82] D. Karaboga and B. Akay, “A comparative study of artificial bee colony
algorithm,” Applied Mathematics and Computation, vol. 214, pp. 108–132,
2009.
[83] M. Rohani and A. Avanaki, “A watermarking method based on optimizing
ssim index by using pso in dct domain,” in Proc. of 14th IEEE International
on Computer Conference (CSICC 2009), 2009.
[84] C. Agarwal, A. Mishra, and A. Sharma, “Gray-scale image watermarking
using ga-bpn hybrid network,” Journal of Visual Communication and Image
Representation, 2013.
[85] M. Ali and C. W. Ahn, “An optimized watermarking technique based on
self-adaptive de in dwt–svd transform domain,” Signal Processing, vol. 94,
pp. 545–556, 2014.
[86] P. Kumsawat, K. Attakitmongcol, and A. Srikaew, “A new approach for
optimization in image watermarking by using genetic algorithms,” IEEE
Transactions on Signal Processing, vol. 53, pp. 4707–4719, 2005.
[87] G. N. Mohammed, A. Yasin, and A. M. Zeki, “High image quality watermarking model by using genetic algorithm,” in Proc. of IEEE International
Conference on Advanced Computer Science Applications and Technologies
(ACSAT), 2012.
[88] V. Aslantas, “Optimal svd based robust watermarking using differential evolution algorithm,” in Proc. of World Congress of Engineering, London, UK,
2008.
[89] M. Ali, C. W. Ahn, and P. Siarry, “Differential evolution algorithm for the
selection of optimal scaling factors in image watermarking,” Engineering
Applications of Artificial Intelligence, vol. 31, pp. 15–26, 2014.
110
[90] B. Lei, E. L. Tan, S. Chen, D. Ni, T. Wang, and H. Lei, “Reversible watermarking scheme for medical image based on differential evolution,” Expert
Systems with Applications, vol. 41, pp. 3178–3188, 2014.
[91] F. Sha, F. Lo, Y. Y. Chung, X. Chen, and W. C. Yeh, “A novel optimized
watermark embedding scheme for digital images,” in Proc. of MultiMedia
Modeling. Springer, 2015.
[92] S. Das and P. N. Suganthan, “Differential evolution: a survey of the stateof-the-art,” IEEE Transactions on Evolutionary Computation, vol. 15, pp.
4–31, 2011.
[93] J. Vesterstrom and R. Thomsen, “A comparative study of differential evolution, particle swarm optimization, and evolutionary algorithms on numerical
benchmark problems,” in Proc. of Congress on Evolutionary Computation
(CEC2004), 2004.
[94] V. Aslantas, “An optimal robust digital image watermarking based on svd
using differential evolution algorithm,” Optics Communications, vol. 282,
pp. 769–777, 2009.
[95] B. Akay and D. Karaboga, “A survey on the applications of artificial bee
colony in signal, image, and video processing,” Signal, Image and Video
Processing, pp. 1–24, 2015.
[96] C. H. Chou and T. L. Wu, “Embedding color watermarks in color images,”
EURASIP Journal on Applied Signal Processing, vol. 2003, pp. 32–40, 2003.
[97] N. H. Golea, R. Seghir, and R. Benzid, “A bind rgb color image watermarking based on singular value decomposition,” in Proc. of IEEE/ ACS
International Conference on Computer Systems and Applications (AICCSA
2010), 2010.
[98] Q. Su, Y. Niu, G. Wang, S. Jia, and J. Yue, “Color image blind watermarking
scheme based on qr decomposition,” Signal Processing, vol. 94, pp. 219–235,
2014.
[99] E. Vahedi, R. A. Zoroofi, and M. Shiva, “On optimal color coordinate selection for wavelet-based color image watermarking,” in Proc. of International
Conference on Intelligent and Advanced Systems (ICIAS 2007), 2007.
[100] Z. Peng and W. Liu, “Color image authentication based on spatiotemporal
chaos and svd,” Chaos, Solitons & Fractals, vol. 36, pp. 946–952, 2008.
111
[101] C. H. Lin, D. Y. Chan, H. Su, and W. S. Hsieh, “Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against
geometric attacks and signal processing,” IEE Proceedings-Vision, Image
and Signal Processing, vol. 153, pp. 483–492, 2006.
[102] C. H. Chou and K. C. Liu, “A perceptually tuned watermarking scheme for
color images,” IEEE Transactions on Image Processing, vol. 19, pp. 2966–
2982, 2010.
[103] P. T. Reinhard E, “Colour spaces for colour transfer,” in Proc. of the International Conference on Computational Color Imaging; Milan, Italy., 2011.
[104] S. Ren and T. Zhang, “Study of reversible information hiding scheme based
on cardbal2 and color field structure,” Advanced Materials Research, vol.
225, pp. 275–279, 2011.
[105] R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking three-dimensional
polygonal models through geometric and topological modifications,” IEEE
Journal on Selected Areas in Communications, vol. 16, pp. 551–560, 1998.
[106] B. S. Kim, J. G. Choi, C. H. Park, J. U. Won, D. M. Kwak, S. K. Oh, C. R.
Koh, and K. H. Park, “Robust digital image watermarking method against
geometrical attacks,” Real-Time Imaging, vol. 9, pp. 139–149, 2003.
[107] P. Su and C. Kuo, “Information embedding in jpeg-2000 compressed images,” in Proc. of IEEE International Symposium Circuits and Systems (ISCAS 2003), Bangkok, Thailand, 2003.
[108] M. Saraswat and K. V. Arya, “Colour normalisation of histopathological
images,” Computer Methods in Biomechanics and Biomedical Engineering:
Imaging & Visualization, vol. 1, pp. 185–197, 2013.
[109] L. C., “Learning the uncorrelated, independent, and discriminating color
spaces for face recognition,” IEEE Transactions on Information Forensics
and Security, vol. 3, pp. 213–222, 2008.
[110] J. H. Holland, Adaptation in natural and artificial systems: An introductory
analysis with applications to biology, control, and artificial intelligence.
Michigan Press, 1975.
[111] H. John, “Adaptation in natural and artificial systems,” 1992.
[112] U.-S. image database URL: http://sipi.usc.edu/database/database.php.
112
U
[113] M. N. Do and M. Vetterli, “Rotation invariant texture characterization
and retrieval using steerable wavelet-domain hidden markov models,” IEEE
Transactions on Multimedia, vol. 4, pp. 517–527, 2002.
[114] R. Storn and K. Price, “Differential evolution–a simple and efficient heuristic
for global optimization over continuous spaces,” Journal of global optimization, vol. 11, pp. 341–359, 1997.
[115] A. P. Engelbrecht, Computational intelligence: an introduction. John Wiley
& Sons, 2007.
113
List of Publications
1. M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “Discrete wavelet
transform-based color image watermarking using uncorrelated color space
and artificial bee colony”, International Journal of Computational Intelligence Systems, Taylor & Francis, Vol. 8 (2), pp. 364-380, 2015.
[Published]
2. M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “Color image watermarking using steerable pyramid transform and uncorrelated color space”,
Journal of Experimental and Theoretical Artificial Intelligence, Taylor &
Francis. [Under Review after Third Minor Revision]
3. M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “Digital image watermarking using steerable pyramid transform and uncorrelated color space”,
in Proc. of Ninth International Conference on Industrial and Information
Systems (ICIIS 2014), India, 2014.
[Published]
4. M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “Digital image watermarking using uncorrelated color space”, in Proc. of IEEE Symposium
on Computer Applications & Industrial Electronics (ISCAIE 2014), Penang,
Malaysia, 2014.
[Published]
5. M. Gupta, G. Parmar, R. Gupta, and R. Saraswat, “Authentication of
Multimedia Assets using Digital Watermarking: A Review”, in Proc. of
International Conference on Electronic Communication & Instrumentation
(e-Manthan 2012), India, 2012. [Published]
115