Next Article in Journal
The QQUIC Transport Protocol: Quantum-Assisted UDP Internet Connections
Previous Article in Journal
Predicting Bitcoin (BTC) Price in the Context of Economic Theories: A Machine Learning Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hyper-Chaotically Encrypted Robust Digital Image Watermarking Method with Large Capacity Using Compress Sensing on a Hybrid Domain

1
School of Information Science and Engineering, Lanzhou University, Lanzhou 730000, China
2
School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730070, China
3
Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2022, 24(10), 1486; https://doi.org/10.3390/e24101486
Submission received: 19 September 2022 / Revised: 11 October 2022 / Accepted: 12 October 2022 / Published: 18 October 2022
(This article belongs to the Topic Applications in Image Analysis and Pattern Recognition)

Abstract

:
The digital watermarking technique is a quite promising technique for both image copyright protection and secure transmission. However, many existing techniques are not as one might have expected for robustness and capacity simultaneously. In this paper, we propose a robust semi-blind image watermarking scheme with a high capacity. Firstly, we perform a discrete wavelet transformation (DWT) transformation on the carrier image. Then, the watermark images are compressed via a compressive sampling technique for saving storage space. Thirdly, a Combination of One and Two-Dimensional Chaotic Map based on the Tent and Logistic map (TL-COTDCM) is used to scramble the compressed watermark image with high security and dramatically reduce the false positive problem (FPP). Finally, a singular value decomposition (SVD) component is used to embed into the decomposed carrier image to finish the embedding process. With this scheme, eight 256 × 256 grayscale watermark images are perfectly embedded into a 512 × 512 carrier image, the capacity of which is eight times over that of the existing watermark techniques on average. The scheme has been tested through several common attacks on high strength, and the experiment results show the superiority of our method via the two most used evaluation indicators, normalized correlation coefficient (NCC) values and the peak signal-to-noise ratio (PSNR). Our method outperforms the state-of-the-art in the aspects of robustness, security, and capacity of digital watermarking, which exhibits great potential in multimedia application in the immediate future.

1. Introduction

The excessive spread of Internet is a double-edged sword. On the one hand, information accessing and sharing are more convenient than ever. On the other hand, illegal data copying, reproduction, and editing are more rampant as well [1]. From social media to government online management, from telemedicine to cloud services, from commercial activities to military, all the important information storage and communication which heavily relies on the Internet are prone to be collected and undermined by unpermitted malicious attackers. The protection, certification, and authentication of the Information Sovereignty are particularly urgent.
Digital watermark embedding is one of the promising solutions for data security, which has been widely used in various scenes. By embedding specific relevant information into the host data, the digital watermarking scheme could be used as an information hiding means to ensure the reliability and origination of online data transformation, so that the multimedia data are protected and secured [2]. The categories of digital watermark can be classified as the visible and imperceptible one according to its visibility. The former often suffers from insufficient robustness, and does not constitute a proof of ownership either [3]. For practical reasons, the latter are preferred by academic researchers [4].
Imperceptible watermarks involve the spatial domain one and the transform domain one referring to distinctions of embedding methods [5]. In the spatial domain, watermarks are embedded via modifying the pixel values of the original image. Harahap et al. [6] proposed a spatial domain watermarking scheme, that in which pictures or text in binary form are embedded into the host data. They manage to embed a 150 × 150 grayscale watermark into a 518 × 649 color image, and pursue low time cost on the embedding process. Although most spatial domain watermarking schemes have less computational complexity than the transform domain schemes to perform, their anti-attack characteristics is far poorer than the latter which has a higher robustness on average [7].
In the transform domain, watermarks are first embedded by changing the frequency coefficients of image transformed mainly by discrete wavelet transform (DWT), discrete cosine transform (DCT) or Contourlet Transform. Then, the embedded coefficients are inverse-processed to form the watermarked image. Thus, the watermark often owns better invisibility and stronger robustness to some common image-processing operations and attacks [8]. Vaidya and Mouli [9] proposed a method based on hybrid transformation with DWT, Contour transformation, Schur transformation, and SVD to embed a 62 × 62 gray watermark image into a 512 × 512 × 3 color image, which reveals good resistance to signal processing attacks. Kumar et al. [10] proposed an enhanced transform domain watermark scheme based on DWT, DCT, and SVD with set partitioning in a hierarchical tree (SPIHT), which can restore a 256 × 256 watermark from a 512 × 512 host image with a high resistance under various attacks. Ambadekar et al. [11] encrypted a 90 × 90 watermark image, and then embedded it into a 228 × 228 host image through DWT transformation, who claimed a high robustness of their method against various types of attacks. However, with all these schemes listed above, only a very limited size of watermark images are embedded into the host image.
The invisible watermarking techniques can be further divided into three types: blind, semi-blind, and non-blind ones according to the amount of information of the original watermark required for extracting. Non-blind methods need the original signal, whose application is limited due to the unsure access to the original signal. Blind methods require no information of the original signal at all for watermark recovering, but are full of challenges [12]. For semi-blind watermarking techniques, side information rather than the whole original watermark is needed for watermark recovery [13], which aims to make a compromise between the blind and the non-blind schemes.
Note that an imperceptible image watermark scheme should be built with large capacity, strong robustness, high security, and good imperceptibility [7]. A watermarking scheme with great capacity could surely contain more information, offering more essential and detailed materials supporting its function like providing authentication or information hidden, e.g., embedding different copyrights into images like digital collections with more than one author [14], or during the distribution of the media content from producers, retailers, and customers to protect the benefits of both the producer and the middle distributors [15]. Unfortunately, most state-of-the-art schemes as discussed above are insufficient, especially in the capacity. Therefore, putting forward algorithms for preserving the desired properties of a watermarking procedure is quite essential.
In this paper, we proposed a hyper-chaotically encrypted robust digital image watermarking scheme which has a high capacity by using compressive sensing (CS) on a hybrid domain. The main contributions of our work are summarized as follows:
(1) Capacity: CS is introduced into our scheme to compress the watermark for pursuing high capacity. Compared with those existing grayscale watermark algorithms, our scheme is eight times over them in capacity, which brings a great improvement to the watermark capacity.
(2) Robustness: The proposed scheme combining DWT with SVD has high robustness, which can effectively restore all the embedded watermarks with high NCC values when confronting with the threats of several typical strong attacks.
(3) Security: A hyperchaotic system with a broad chaos range is introduced for watermark image encryption, which can provide a huge secret key space. The proposed scheme is capable of guaranteeing the security of the watermarks in the host image. Even if the embed algorithm is cracked, the attacker would never be able to restore the encrypted watermark images validly from the host image without the correct secret keys, thus overcoming the FPP of SVD-based watermarking techniques.
The rest of our paper is organized as follows: Section 2 refers to preliminaries including a few fundamentals of CS, SVD, DWT, and the hyperchaotic system TL-COTDCM. In Section 3, the proposed scheme is elaborated in detail. In Section 4, experiment results and discussions are given. In Section 5, we present conclusions for the whole work.

2. Preliminaries

2.1. Discrete Wavelet Transform

DWT is used to transform an image from spatial to frequency domain, which can decompose an image into four sub-bands known as LL, LH, HL, and HH sub-bands, and provide the low resolution, the horizontal, diagonal, and vertical details of the image separately in the spatial domain [16]. Compared with the discrete cosine transform (DCT), DWT has less computational complexity and is more favorable in image processing for the utilization of informative wavelets with details from both spatial and frequency domains rather than merely frequency as in DCT. In particular, the precise spatial frequency localization of DWT allows for the exploitation of the masking effect of the human visual system (HVS) so that only the region corresponding to a modified DWT coefficient would be changed [17]. Several wavelet filters could be chosen to perform the 2D-DWT, such as Coiflets, Haar and Daubechies, etc. As shown in Figure 1, DWT could be iteratively executed on a signal to split it into low and high-frequency sub-bands level by level until a sufficient decomposition is obtained [18]. In our scheme, we choose 1-level DWT [19,20] with the Haar wavelet filter for the low computing complexity and high image resolution.

2.2. 2D Compressive Sensing (CS)

2.2.1. Basic Principle

CS believes sparse signals, which are thought of as an incomplete description of the original signals before, could be used to reconstruct original signals [21]. It was firstly introduced by Candes and Donoho in 2006 [22]. According to the CS theory, a 2D signal A of size a × a could be measured by:
α = Φ 1 Ψ T A
where α is the sparse coefficient, Φ 1 is a b × a measurement matrix, and Ψ is an a × a orthogonal basis [23]. Let β be the sparse coefficient vector of α in the Ψ domain; then, β could be obtained by:
β = Ψ T α T = Ψ T A T Ψ Φ 1 T = γ Φ 1 T
where γ = Ψ T A T Ψ , which is a 2D Ψ transformation of signal A T . The M × M measurement value B is obtained by measuring β with another measurement matrix Φ 2 :
B = Φ 2 β = Φ 2 γ Φ 1 T
where B is the result of the 2D CS transformation.
The original signal A could be recovered from the measurement value B by solving the following convex optimization problem:
δ = arg m i n | | γ | | 0 , s . t . B = Φ 2 γ Φ 1 T
The CS theory enables the signal storage to consume quite a lot less memory, which also can be viewed as a symmetric cryptosystem with the original signal, the measurement matrix and measurement value corresponding to the plaintext, secret key and ciphertext, respectively [24]. It performs sampling, compression, and encryption simultaneously possessing a wide range of application scenarios, such as image compression and data encryption.

2.2.2. The TVAL3 Algorithm

There have been many effective reconstruction algorithms such as the orthogonal matching pursuit (OMP) [25], subspace pursuit (SP) [26], and stochastic gradient pursuit (SGP) [27] to pursue a favorable reconstruction quality. In our scheme, we apply the TVAL3 algorithm for compressive sensing implementation.
The TVAL3 algorithm developed by Li [28] uses the total variation (TV) regularization to solve the CS problems, which improves the recovered image visual quality by preserving the edges or boundaries more accurately. It has been proved that this algorithm could recover the original signal within an affordable running time for noise-free images with various of measurement matrices [28].

2.3. The Hyperchaotic System TL-COTDCM

A hyperchaotic system is defined as chaos with more than one positive Lyapunov exponent, which indicated that the dynamics of the system are expanded in more than one direction and give rise to a more complex attractor. The enhanced behaviors of the hyperchaotic system offer it a wider application in nonlinear circuits, secure communications, lasers, and synchronizations [29].
The TL-COTDCM we proposed in our previous work [30] has two large positive Lyapunov exponents, indicating a quite complex dynamics behavior, which is defined as follows:
( x n + 1 , y n + 1 ) = ( 4 b x n ( 1 x n ) + d y n 2 ) mod 1 ( 4 c y n ( 1 y n / a ) a + e x 2 ) mod 1 i f 0 y n < a ( 4 c ( 1 y n ) ( 1 ( 1 y n ) / ( 1 a ) ) a + e x 2 ) mod 1 i f a y n 1
where a, b, c, d, and e are the control parameters, and a is defined in the range [0,1]. We set a = 0.5, b = 4, c = 4, d = 2, and e = 2, the phase diagram and bifurcation of TL-COTDCM is shown in Figure 2. It is obvious that the phase diagram of this system is able to fill the whole 2D space, indicating the complex nonlinear dynamics characteristics of TL-COTDCM.
In this paper, the initial values of state variables are set as ( x 0 , y 0 ) = ( 0.6 , 0.98 ) , which is used to yield measurement matrix for compressive sensing as well as secret keys for sampled image encryption.

2.4. SVD

SVD, a common linear algebra tool which is widely utilized in signal processing, artificial intelligence and image compression, etc. One merit of applying SVD is that the singular values of an image vary minimally when it is marginally disturbed [31].
An image could be viewed as a matrix, an array of nonnegative scalar, from the point of view of linear algebra [32]. Assuming that A is an N × N grayscale image, then the SVD of it is depicted as
A = U S V T
where both U and V are N × N orthogonal matrices and S is an N × N diagonal matrix containing singular values of the original image matrix A.
SVD is widely used in watermarking algorithms as it adapts to different rectangular size images. The watermarks would be embedded effectively on an SVD executed host image.

3. Methods

In this section, we present our watermark scheme in detail. The proposed watermarking scheme is composed of four main steps: compression and encryption, embedding, extracting, and decryption and decompression process. The first two procedures are performed at the sending site, while the other two are done at the receiving site after obtaining the watermarked image from the public channel. Each procedure is elaborated in detail as follows.

3.1. Compression and Encryption

To maximize utilization of the capacity of host image, we perform CS on original watermark images to compress them into smaller sizes for embedding. Here, we use a sampling rate ρ of 0.25 for a trade off between image quality and compression ratio, which means that only 25% of the information of the original watermark images are used for embedding. Then, the compressed watermarks are encrypted by using the order of a sorted TL-COTDCM sequence again to achieve a higher level of security. Two initial values are defined as secret keys for the TL-COTDCM to generate the chaotic sequence.
The flowchart of this procedure is shown in Figure 3. More details are described as
1.
Perform compressive sampling using measurement matrix with the compression ratio ρ of 0.25 on eight grayscale watermark images ( 256 × 256 ) to obtain the sampled image P . Reshape P with the size of [1, 8 × 64 × 64 ];
2.
Initialize the control parameters of TL-COTDCM, input two states x 0 and y 0 to actuate the hyperchaotic system;
3.
Generate chaotic sequence U = [ u 1 , u 2 , , u 8 × 64 × 64 + 800 ] with the length of ( 8 × 64 × 64 + 800 ) ;
4.
Omit the first 800 elements of U to avoid transient effect in the later scrambling procedure. Reorder the rest elements of U in ascending order, and record the position of them each element in the new sequence. Define the position sequence as L 8 × 64 × 64 ;
5.
Utilize L for shuffling P and yield the scrambled sequence C I ;
6.
Reshape C I into a tensor composed of eight matrices of size 64 × 64 . Then, we obtain the compressed and encrypted images;
7.
Transform the aforementioned watermarks by
x k ( i , j ) = C I k ( i , j ) mod α x x k ( i , j ) = C I k ( i , j ) α
where x k ( i , j ) , x x k ( i , j ) and C I k ( i , j ) are the elements located at the i th row and j th column in the k th matrix of tensor x, x x , and C I , respectively. 1 i 64 , 1 j 64 , 1 k 8 . α is a retaining factor (RF) for controlling the embedding accuracy, a greater value of which may bring better recovery quality but induce worse imperception. It is empirically set as 7 in our schemes. · denotes round down operation.

3.2. Watermarks Embedding

In this process, eight encrypted images are embedded into the host image to obtain a visually meaningful image. The diagram in Figure 4 displays the whole processing in detail, which can be accomplished via eight main steps.
1.
To avoid the distortion of the host image caused by the probable data overflow after the embedding procedure, the pixel values of the host image are normalized in 10 to 245 according to
H = 10 + 235 255 H
where H and H represent the original and adjusted host image, respectively. · denotes a round-up operation.
2.
Perform 2D DWT on H
[ C a , C h , C v , C d ] = D W T ( H )
3.
Perform SVD on the aforementioned DWT components via
U i S i V i T = C i
where i = a , h , v , d .
4.
Generate T i 1 and T i 2 of size [256, 256] by recombining the tensor i ( i = x , x x ) with the following equation to prepare for embedding:
T i 1 = i 1 i 2 i 3 i 4 T i 2 = i 5 i 6 i 7 i 8
where i n ( n = 1 , 2 , , 8 ) represents the n th matrix in tensor i.
5.
Embed T i 1 and T i 2 into S i obtained in Step 3 to generate S i 1 according to
S a 1 = S a + β · T x x 1 S h 1 = S h + β · T x 1 S v 1 = S v + β · T x x 2 S d 1 = S d + β · T x 2
where β is a scaling factor (SF) for embedding strength controlling. A greater β benefits anti-attack robustness but also harms imperception.
It is empirically set as 6 in this paper.
6.
Apply SVD on S i 1 once again
U i 2 S i 2 V i 2 T = S i 1
where U i 2 and V i 2 are stored for reconstruction.
7.
Calculate the embedded DWT components with U and V obtained in Step 3:
C i w = U i S i 2 V i T
where i = a , h , v , d .
8.
Generate the watermarked host image H e by performing inverse discrete wavelet transformation (IDWT) on the embedded components
H e = I D W T ( C a w , C h w , C v w , C d w )

3.3. Watermarks Extracting

Watermark extraction is mainly to execute an inverse operation of embedding process on the watermarked host image, which is illustrated in Figure 5. In the extracting process, we perform DWT on the watermarked image, and SVD and recombination operations are executed subsequently.
1.
Perform 2D DWT on the watermarked image:
[ C a w , C h w , C v w , C d w ] = D W T ( H e )
2.
Perform SVD on the obtained DWT components
U i S i V i T = C i w
where i = a , h , v , d .
3.
Calculate the new approximate coefficient matrices C n e w i , where i = a , h , v , d
C n e w i = U i 2 × S i × V i 2 T
4.
Calculate the scrambled coefficients
W n e w i = ( C n e w i S i ) β
where i = a , h , v , d
5.
Reconstruct the scrambled images via utilizing coefficients in Step 4
S P 1 = W n e w a + α · W n e w h S P 2 = W n e w v + α · W n e w d
6.
Split the aforementioned S P 1 and S P 2 into four matrices separately with a size of 64 × 64 . Then, form these eight matrices into a tensor C I , which is the extracted encrypted watermark images. This step is illustrated in Figure 6.

3.4. Decryption and Decompression Process

To obtain the plain watermarks from the ciphertext obtained from extraction, first, the tensor C I is reshaped into a vector with a size of 1 × 32,768 and scrambled subsequently by the reverse order of the hyperchaotic sequence produced by TD-COTDCM. Finally, the eight watermark images will be recovered from the decrypted tensor through CS reconstruction tools. The diagram of the process is shown in Figure 7. More descriptions are detailed as
1.
Reshape the tensor C I into a row vector with a length of 8 × 64 × 64 ;
2.
Generate chaotic sequence U and obtain the position sequence L as described in Step 3 and Step 4 of part A in the Methods section; the only difference is that elements of U are in descending order;
3.
Perform the shuffle operation to C I by using L ;
4.
Reshape the shuffled C I into a tensor with eight matrices of size 64 × 64 ;
5.
Recover eight grayscale watermarks of 256 × 256 one by one by executing the TVAL3 reconstruction tool on each block of C I with the compression ratio ρ of 0.25.

4. Experimental Results and Discussion

The experiments are conducted on a PC running Windows 11 OS with x64 processor, 16 GB RAM, and 2.11 GHz CPU, and the corresponding codes are executed on the Matlab R2021a. As shown in Figure 8, the test images include the 512 × 512 grayscale host image “baboon” and eight grayscale watermark images with a size of 256 × 256 , which are downloaded from the widely used public image database USC-SIPI. We compare our method with several existing recent ones which include the hybrid blind digital image watermarking methods [33], visually meaningful image encryption scheme based on a single chaotic map [18], blind color image watermarking method based on DWT and DCT [34], blind digital image watermarking based on Henon Chaotic Map and Elliptic Curve Cryptography [35], and secure and robust digital watermarking scheme based on logistic and RSA encryption [36]. The evaluated indicators involve capacity, imperceptibility, robustness, and security.

4.1. Capacity

To obtain an objective assessment, we apply grayscale image “baboon” uniformly to verify our proposed methods and the ones in [18,33,35,36] except for [34] require a colorful form.
As shown in Figure 9, our scheme ensures a total of eight watermarks with a size of 256 × 256 to be inserted in a host image with a size of 512 × 512 , the works in [33,34] can embedded only 1 watermark with a size of 48 × 48 and 64 × 64 , respectively. While the others [18,35,36] are one watermark with a size of 256 × 256 . It is clear that our scheme enables maximum utilization of the capacity of the host image, which owns a higher capacity for watermarks than other schemes.

4.2. Robustness

Robustness refers to the resistance of an embedded watermark to attacks on the watermarked image. The normalized correlation coefficients (NCC), which can measure the similarity between the original watermark and the extracted one, is usually utilized as a criteria for robustness. NCC has a value in range 0 to 1, a greater value of which reflects a higher quality of watermark recovering. It is calculated as
N C C = i = 1 n j = 1 n W ( i , j ) · W ( i , j ) i = 1 n j = 1 n W ( i , j ) 2 i = 1 n j = 1 n W ( i , j ) 2
where W and W represent the pixel value of the original watermark and the extracted one, respectively.
Note that the evaluation indicators in our experiments correspond to the mean value of eight embedded images in order to show a general performance of the proposed scheme.

4.2.1. Noise Attacks

Two types of noise (Salt and Pepper and Gaussian noise) are selected to simulate a noise attack. The variance of Gaussian noise is set as 0.001, 0.005, 0.01, 0.05, and 0.1, while the density of Salt and Pepper noise is set as 0.005, 0.01, 0.05, 0.1, 0.3, and 0.5. NCC values for different methods under various noise attack are shown in Table 1. For Gaussian noise attack, our scheme maintains values of the NCC stably above 0.96 under different noise variance, while others show an apparent descendant tendency. In particular, the scheme in [18] almost has no resistance to Gaussian noise attack. As for Salt and Pepper noise attack, our scheme and [33] maintain NCCs more stably than others. Although the performance of [18] is a little better under this kind of attack than that under Gaussian noise attack, it still obtains the lowest score. Figure 10 also illustrates the comparison of the aforementioned watermarks schemes under different noise attacks. No matter what the attack noise type is, our scheme could resist them well.

4.2.2. Geometric and JPEG Compression Attacks

JPEG compression attack and Geometric attack involving rotation attack and cropping attack are used for testing watermarking schemes robust in this part. The compression ratio is set as 10%, 20%, 30%, 40%, and 70%. The rotation angle is set as 15 , 25 , 30 , and 45 ; the cropping size is set as 50 × 50 , 100 × 100 , 150 × 150 , and 200 × 200 . The experimental results are shown in the latter part of Table 1. For rotation and JPEG compression attacks, the scheme in [33] and ours perform slightly better than in Ref. [35] but are obviously superior to others. As for cropping attack, we can find that the scheme in [33] and ours are still outperforming others. However, when the cropping attack of size 512 × 512 , i.e., no information of the watermarked image is involved, the scheme in [33] can recover the watermark well, which seems unreasonable. In fact, the watermarking scheme in [33] must use the wavelet coefficients of the original watermark for extraction, but it is impossible to obtain these coefficients in the watermarked image unless the watermark is accurately extracted, i.e., one must obtain the original watermark to extract the watermark, which is contradictory. Figure 11 also shows a comparison of those watermarking schemes under different attacks. It is clear that our method performs better than others.
In Figure 12, we display some recovery results of our scheme against several attacks, and the recovered watermarks are still in high visual quality even with the host image under some strong attack.

4.3. Imperceptibility

The NCC is also used to measure the imperceptibility of watermarks in a watermarked image. Except for the aforementioned indicator, the Peak Signal-to-Noise Ratio (PSNR) measures the peak error between the watermarked host image, and the original host image is another popular indicator for imperceptibility. It is defined as
P S N R = 10 l o g ( 10 × 255 2 M S E )
where MSE represents the mean square error,
M S E = 1 M × M i = 1 M j = 1 M ( H ( i , j ) H ( i , j ) ) 2
H ( i , j ) and H ( i , j ) represent the pixel value of the original host image and the watermarked one located at the i th row and j th column, respectively.
Table 2 records the PSNR and NCC values of various techniques without any attacks, which is also illustrated in Figure 13 for clarity. Although our scheme shows low indicators of imperceptibility, we consider it still to be acceptable. As shown in Figure 14, there is almost no visual distortion on the watermarked image even though eight watermarks are embedded.

4.4. Security

4.4.1. Secret Key Sensitivity and False Positive Problem (FPP) Analysis

The application of TD-COTDCM makes our scheme very sensitive to slight variations of secret keys. As shown in Figure 15, with the correct secret key, the image can be decrypted successfully; otherwise, one can not decipher any meaningful information visually even if the secret key varies very little.
Table 3 shows different encryption mechanisms adopted in each watermarking scheme. It is known that Arnold transform has a limited transformation cycle, the image encrypted by Arnold transform can be deciphered easily by attackers with a continuous shuffling process in finite times [31]. Compared with those ordinary chaotic systems, the hyperchaotic system exploited in our scheme owns higher randomness and more complex nonlinear dynamics as well as a very large secret key space. The merits of TD-COTDCM guarantee higher security of the watermarks in our scheme than others.
Most SVD-based watermarking techniques fail to offer authentication due to their FPP [37], and many efforts were made to provide available solutions, e.g., Ganic and Eskicioglu [38] decomposed a host image with one-level DWT and then applied SVD on a grey-scale watermark image and its sub-bands; Rastegar et al. [39] proposed a hybrid SVD-based image watermarking scheme by applying Finite Radon Transform (FRT) and 3-level DWT to the host image. One-way hashing function on U and V is introduced as well in [40] for reducing FFP. However, all these techniques still suffer from FPP [37] as U and V components are stored as secret keys. Therefore, watermark encrypting becomes a valid solution since only a noise-like watermark image could be obtained if the owner could not provide the correct secret keys. In our scheme, we combine the hybrid domain transforming method and encryption method together, and thus to achieve a stronger watermark security, robustness, and higher imperceptibility. The proposed scheme is very sensitive to slight changes in the secret keys and thus is capable of overcoming the FPP [20], and serving for authentication, copyright ownership protection, and digital steganography.

4.4.2. Keyspace Analysis

The TD-COTDCM has five parameters: a , b , c , d , e , which are very sensitive to boundary conditions. Its parameters have a wide range of behaving hyper-chaotically [10]. The secret key space is at least 1 × 100 4 × 2 128 × 5 , which shows its strong resistance to brute force attacks.

4.4.3. Application in Color Images

In addition, our method is applicable to color image watermarking as well. The processing includes decomposing the color host image into three component matrices referred to as R, G, and B channels, firstly. Each channel is deemed as a grayscale host image for watermarks embedding with the proposed scheme, subsequently. A 512 × 512 × 3 color image can be embedded in a total of 24 grayscale watermark images size 256 × 256 . The original color image and grayscale watermarks are shown in the top part of Figure 16, while the bottom of Figure 16 illustrates the watermarked image where one could hardly perceive any visual distortions. Figure 17 displays the watermarks after decryption, which still maintain high visual quality. Indicators include PSNR and NCC values of this part are recorded in Table 4. Note that all NCC values are greater than 0.93, which exhibits a preferable performance.

5. Conclusions

In this paper, a robust digital watermarking scheme using CS sampling and a hyperchaos encrypting technique on a hybrid domain is proposed, which enables a 512 × 512 grayscale host image to accommodate up to eight grayscale watermark images with a size of 256 × 256 . The application of CS in the proposed scheme is to maximize the utilization of capacity, which is equivalent to capacity expansion of the host image. The TD-COTDCM has a very large secret key space and ensures a measurement matrix with the property of preferable pseudo-randomness. The introduction of this hyperchaos into our scheme is another great improvement for the robust and security guarantees as well as the FPP. In addition, the execution of SVD on both watermarks and host images also benefits the capacity, robustness, and security of the proposed scheme to some extent. The experimental results show that our scheme can be effectively resistant against different levels of Gaussian noise, pepper and salt noise, JPEG compression, and cropping attacks, which reveal higher robustness than several existing methods. Although the indicators on imperception of the proposed methods are slightly lower than those of comparison methods, there is no visual distinction between the watermarked image and the host image in our scheme. Furthermore, our scheme ensures a large capacity for watermarks embedding, which applies to both grayscale and color images. It is concluded that the proposed scheme will shine in future watermarking applications.

Author Contributions

Conceptualization, Z.Y. and S.L.; methodology, Z.Y. and Q.S.; software, Q.S. and Y.Q.; validation, Z.Y., Q.S. and Y.Q.; formal analysis, S.L.; investigation, Z.Y.; resources, Q.S.; data curation, Q.S.; writing—original draft preparation, Z.Y. and Q.S.; writing—review and editing, Z.Y. and Q.S.; visualization, Z.Y.; supervision, Z.Y.; project administration, F.R.; funding acquisition, Z.Y. and F.R. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported in part by the National Natural Science Foundation of China (No. 62132007 and 20210424), the Fundamental Research Funds for the Central Universities of China (No. lzujbky-2022-pd12), and by the Natural Science Foundation of Gansu Province (No. 21JR1RA252).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

In this section you can acknowledge any support given which is not covered by the author contribution or funding sections. This may include administrative and technical support, or donations in kind (e.g., materials used for experiments).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kaushal, P.; Kaur, N. A Review on Digital Image Watermarking. Int. J. Eng. Tech. Res. 2015, V4, 272–274. [Google Scholar] [CrossRef]
  2. Kamalanathan, K.; Nanjappan, G.; Rupavathi, N.; Ramesh, K.; Bhuvaneswari, R. Digital Image Watermarking in Multimedia Data Compressions Using Robust 3-Level Discrete Wavelet Transform. Int. Res. J. Innov. Eng. Technol. 2022, 6, 225–228. [Google Scholar]
  3. Wong, P.W.; Memon, N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 2001, 10, 1593–1601. [Google Scholar] [CrossRef] [PubMed]
  4. Pan, P.J.S.; Huang, H.C.; Jain, L.C. Intelligent Watermarking Techniques (With Cd-rom); World Scientific: Singapore, 2004; Volume 7. [Google Scholar]
  5. Abdulrahman, A.K.; Ozturk, S. A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed. Tools Appl. 2019, 78, 17027–17049. [Google Scholar] [CrossRef]
  6. Harahap, M.; Malau, J.R.; Simangungsong, T.N.; Winata, D.; Hadyanto, D. Digital Image Copyright Protection with Spatial Domain Public Image Watermarking Scheme. J. Comput. Netw. Archit. High Perform. Comput. 2022, 4, 69–78. [Google Scholar] [CrossRef]
  7. Roy, S.; Pal, A.K. A hybrid domain color image watermarking based on DWT–SVD. Iran. J. Sci. Technol. Trans. Electr. Eng. 2019, 43, 201–217. [Google Scholar] [CrossRef]
  8. Najafi, E. A robust embedding and blind extraction of image watermarking based on discrete wavelet transform. Math. Sci. 2017, 11, 307–318. [Google Scholar] [CrossRef] [Green Version]
  9. Prasanth Vaidya, S.; Chandra Mouli,, P.V.S.S.R. A robust semi-blind watermarking for color images based on multiple decompositions. Multimed. Tools Appl. 2017, 76, 25623–25656. [Google Scholar] [CrossRef]
  10. Kumar, C.; Singh, A.K.; Kumar, P. Improved wavelet-based image watermarking through SPIHT. Multimed. Tools Appl. 2020, 79, 11069–11082. [Google Scholar] [CrossRef]
  11. Ambadekar, S.P.; Jain, J.; Khanapuri, J. Digital image watermarking through encryption and DWT for copyright protection. In Recent Trends in Signal and Image Processing; Springer: Berlin/Heidelberg, Germany, 2019; pp. 187–195. [Google Scholar]
  12. Shieh, J.M.; Lou, D.C.; Chang, M.C. A semi-blind digital watermarking scheme based on singular value decomposition. Comput. Stand. Interfaces 2006, 28, 428–440. [Google Scholar] [CrossRef]
  13. Mousavi, S.M.; Naghsh, A.; Abu-Bakar, S. Watermarking techniques used in medical images: A survey. J. Digit. Imaging 2014, 27, 714–729. [Google Scholar] [CrossRef] [PubMed]
  14. Zhou, Y.; Jin, W. A robust digital image multi-watermarking scheme in the dwt domain. In Proceedings of the 2012 International Conference on Systems and Informatics (ICSAI2012), Yantai, China, 19–20 May 2012; pp. 1851–1854. [Google Scholar]
  15. Wang, J.; Lian, S.; Shi, Y.Q. Hybrid multiplicative multi-watermarking in DWT domain. Multidimens. Syst. Signal Process. 2017, 28, 617–636. [Google Scholar] [CrossRef]
  16. Garg, P.; Kishore, R.R. An efficient and secured blind image watermarking using ABC optimization in DWT and DCT domain. Multimed. Tools Appl. 2021, 81, 36947–36964. [Google Scholar] [CrossRef]
  17. Al-Haj, A. Combined DWT-DCT digital image watermarking. J. Comput. Sci. 2007, 3, 740–746. [Google Scholar] [CrossRef] [Green Version]
  18. Kanso, A.; Ghebleh, M. An algorithm for encryption of secret images into meaningful images. Opt. Lasers Eng. 2017, 90, 196–208. [Google Scholar] [CrossRef]
  19. Stankovi, R.S.; Falkowski, B.J. The Haar wavelet transform: Its status and achievements. Comput. Electr. Eng. 2003, 29, 25–44. [Google Scholar] [CrossRef]
  20. Zainol, Z.; Teh, J.S.; Alawida, M. A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 2020, 8, 43391–43406. [Google Scholar]
  21. Öktem, O. Handbook of Mathematical Methods in Imaging; Springer: New York, NY, USA,, 2015; pp. 937–1031. [Google Scholar]
  22. Candès, E.J.; Romberg, J.; Tao, T. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 2006, 52, 489–509. [Google Scholar] [CrossRef] [Green Version]
  23. Zhou, N.; Li, H.; Wang, D.; Pan, S.; Zhou, Z. Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt. Commun. 2015, 343, 10–21. [Google Scholar] [CrossRef]
  24. Chai, X.; Wu, H.; Gan, Z.; Han, D.; Zhang, Y.; Chen, Y. An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf. Sci. 2021, 556, 305–340. [Google Scholar] [CrossRef]
  25. Yang, M.; De Hoog, F. Orthogonal matching pursuit with thresholding and its application in compressive sensing. IEEE Trans. Signal Process. 2015, 63, 5479–5486. [Google Scholar] [CrossRef] [Green Version]
  26. Dai, W.; Milenkovic, O. Subspace pursuit for compressive sensing signal reconstruction. IEEE Trans. Inf. Theory 2009, 55, 2230–2249. [Google Scholar] [CrossRef]
  27. Lin, Y.M.; Chen, Y.; Huang, N.S.; Wu, A.Y. Low-complexity stochastic gradient pursuit algorithm and architecture for robust compressive sensing reconstruction. IEEE Trans. Signal Process. 2016, 65, 638–650. [Google Scholar] [CrossRef]
  28. Duarte, M.F.; Davenport, M.A.; Takhar, D.; Laska, J.N.; Sun, T.; Kelly, K.F.; Baraniuk, R.G. Single-pixel imaging via compressive sampling. IEEE Signal Process. Mag. 2008, 25, 83–91. [Google Scholar] [CrossRef] [Green Version]
  29. Yujun, N.; Xingyuan, W.; Mingjun, W.; Huaguang, Z. A new hyperchaotic system and its circuit implementation. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 3518–3524. [Google Scholar] [CrossRef]
  30. Li, S.; Liu, Y.; Ren, F.; Yang, Z. Design of a high throughput pseudo-random number generator based on discrete hyper-chaotic system. IEEE Trans. Circuits Syst. II Express Briefs 2022. [Google Scholar] [CrossRef]
  31. Thakkar, F.N.; Srivastava, V.K. A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed. Tools Appl. 2017, 76, 3669–3697. [Google Scholar] [CrossRef]
  32. Liu, R.; Tan, T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 2002, 4, 121–128. [Google Scholar]
  33. Begum, M.; Ferdush, J.; Uddin, M.S. A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. J. King Saud Univ.Comput. Inf. Sci. 2021, 34, 5856–5867. [Google Scholar] [CrossRef]
  34. Gul, E. A blind robust color image watermarking method based on discrete wavelet transform and discrete cosine transform using grayscale watermark image. Concurr. Comput. Pract. Exp. 2022, 34, e6884. [Google Scholar] [CrossRef]
  35. Murugadoss, B.; Karna, S.N.R.; Kode, J.S.; Subramani, R. Blind Digital Image Watermarking using Henon Chaotic Map and Elliptic Curve Cryptography in Discrete Wavelets with Singular Value Decomposition. In Proceedings of the 2021 International Symposium of Asian Control Association on Intelligent Robotics and Industrial Automation (IRIA), Goa, India, 21–22 September 2021; pp. 203–208. [Google Scholar]
  36. Liu, Y.; Tang, S.; Liu, R.; Zhang, L.; Ma, Z. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 2018, 97, 95–105. [Google Scholar] [CrossRef]
  37. Makbol, N.M.; Khoo, B.E.; Rassem, T.H. Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimed. Tools Appl. 2018, 77, 26845–26879. [Google Scholar] [CrossRef]
  38. Ganic, E.; Eskicioglu, A.M. Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J. Electron. Imaging 2005, 14, 043004. [Google Scholar] [CrossRef]
  39. Rastegar, S.; Namazi, F.; Yaghmaie, K.; Aliabadian, A. Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU-Int. J. Electron. Commun. 2011, 65, 658–663. [Google Scholar] [CrossRef]
  40. Loukhaoukha, K.; Chouinard, J.Y.; Taieb, M.H. Optimal Image Watermarking Algorithm Based on LWT-SVD via Multi-objective Ant Colony Optimization. J. Inf. Hiding Multim. Signal Process. 2011, 2, 303–319. [Google Scholar]
Figure 1. (a) 1-level DWT, (b) 2-level DWT.
Figure 1. (a) 1-level DWT, (b) 2-level DWT.
Entropy 24 01486 g001
Figure 2. (a) phase diagram, (b) bifurcation diagrams of the TL-COTDCM system.
Figure 2. (a) phase diagram, (b) bifurcation diagrams of the TL-COTDCM system.
Entropy 24 01486 g002
Figure 3. Flowchart of the watermarking method for grayscale images.
Figure 3. Flowchart of the watermarking method for grayscale images.
Entropy 24 01486 g003
Figure 4. A diagram of watermarks’ embedding.
Figure 4. A diagram of watermarks’ embedding.
Entropy 24 01486 g004
Figure 5. Diagram of watermark extracting.
Figure 5. Diagram of watermark extracting.
Entropy 24 01486 g005
Figure 6. The illustration of Step 6.
Figure 6. The illustration of Step 6.
Entropy 24 01486 g006
Figure 7. Diagram of watermark decryption and decompression.
Figure 7. Diagram of watermark decryption and decompression.
Entropy 24 01486 g007
Figure 8. (a) 512 × 512 host image “baboon”, (b) eight watermark images size of 256 × 256 .
Figure 8. (a) 512 × 512 host image “baboon”, (b) eight watermark images size of 256 × 256 .
Entropy 24 01486 g008
Figure 9. Total pixels of watermark embedded for various schemes [18,33,34,35,36].
Figure 9. Total pixels of watermark embedded for various schemes [18,33,34,35,36].
Entropy 24 01486 g009
Figure 10. NCC values under noise attack. (a) Gaussian noise attack; (b) Salt and Pepper noise attack [18,33,34,35,36].
Figure 10. NCC values under noise attack. (a) Gaussian noise attack; (b) Salt and Pepper noise attack [18,33,34,35,36].
Entropy 24 01486 g010
Figure 11. NCC values under geometric attack. (a) rotation attack; (b) JPEG compression attack; (c) cropping attack [18,33,34,35,36].
Figure 11. NCC values under geometric attack. (a) rotation attack; (b) JPEG compression attack; (c) cropping attack [18,33,34,35,36].
Entropy 24 01486 g011
Figure 12. Images under various attacks. (a1a5) denote attacked watermarked images; (b1b5) are the extracted watermarks.
Figure 12. Images under various attacks. (a1a5) denote attacked watermarked images; (b1b5) are the extracted watermarks.
Entropy 24 01486 g012
Figure 13. Comparison of impercipient of watermarks in different methods. (a) PSNR values of the host image; (b) NCC values of the watermarked host image; (c) NCC values of the recovered watermarks [18,33,34,35,36].
Figure 13. Comparison of impercipient of watermarks in different methods. (a) PSNR values of the host image; (b) NCC values of the watermarked host image; (c) NCC values of the recovered watermarks [18,33,34,35,36].
Entropy 24 01486 g013
Figure 14. Watermarked image “baboon” and eight extracted watermarks, where no attacks involved. (a) watermarked host image; (b) recovered watermarks.
Figure 14. Watermarked image “baboon” and eight extracted watermarks, where no attacks involved. (a) watermarked host image; (b) recovered watermarks.
Entropy 24 01486 g014
Figure 15. Watermarks extraction with a slight change of secret keys. (a) x 0 = 0.6 + , y 0 = 0.98 (wrong), (b) x 0 = 0.6, y 0 = 0.98 (correct), (c) x 0 = 0.6, y 0 = 0.98 + (wrong), where = 10 16 .
Figure 15. Watermarks extraction with a slight change of secret keys. (a) x 0 = 0.6 + , y 0 = 0.98 (wrong), (b) x 0 = 0.6, y 0 = 0.98 (correct), (c) x 0 = 0.6, y 0 = 0.98 + (wrong), where = 10 16 .
Entropy 24 01486 g015
Figure 16. The flowchart of watermarks embedding for color image. (a) original color host image; (bd) 24 grayscale watermarks.
Figure 16. The flowchart of watermarks embedding for color image. (a) original color host image; (bd) 24 grayscale watermarks.
Entropy 24 01486 g016
Figure 17. The color watermarked image “baboon” and 24 extracted watermarks. (a) is the host image with watermarks embedded, (bd) separately represent 8 different watermarks inserted in the R, G, and B channels of the host image.
Figure 17. The color watermarked image “baboon” and 24 extracted watermarks. (a) is the host image with watermarks embedded, (bd) separately represent 8 different watermarks inserted in the R, G, and B channels of the host image.
Entropy 24 01486 g017
Table 1. Comparisons in NCC values under various attacks.
Table 1. Comparisons in NCC values under various attacks.
Attack TypeAttack PropertiesProposed SchemeRef. [34]Ref. [35]Ref. [33]Ref. [18]Ref. [36]
Gaussian noise0.0010.98990.97980.98470.99030.00350.9811
0.0050.98960.95870.96690.98480.00160.9582
0.010.98860.93290.94640.9807−0.00420.9296
0.050.97780.78970.86790.9492−0.00380.828
0.10.96760.69630.81160.9264−0.00220.7612
Salt & Pepper noise0.0050.99010.98160.98380.99030.96390.9781
0.010.98970.97410.97510.98920.92890.9674
0.050.98730.92270.91950.97880.72390.8938
0.10.98290.85370.86690.9670.54420.8326
0.30.96380.60760.73560.92740.16660.6878
0.50.94770.35230.63740.89430.03750.5903
Rotation 15 0.98570.81990.87910.99310.480.8382
25 0.98330.76640.82170.99420.28940.7555
30 0.98230.73970.81670.99580.20270.7409
45 0.98070.7210.84850.99610.20590.7744
JPEG compresison10%0.99010.95220.9850.99160.01280.983
20%0.990.92770.98430.9916−0.00090.9817
30%0.98980.89180.98070.9909−0.00780.9772
40%0.98930.84670.9760.9907−0.00230.9724
70%0.980.72760.95770.9932−0.00060.9552
Cropping (on the left right corner) 50 × 50 0.990.94760.9380.99160.97940.9417
100 × 100 0.9880.84730.7620.99380.9310.7212
150 × 150 0.98440.72030.6470.99790.85850.6189
200 × 200 0.98140.58190.78910.99960.77050.7925
512 × 512 0.00380−0.00340.9609 *−0.01690
Table 2. PSNR and NC based comparison between various techniques without attacks.
Table 2. PSNR and NC based comparison between various techniques without attacks.
PropertiesProposed SchemeRef. [34]Ref. [35]Ref. [33]Ref. [18]Ref. [36]
PSNR (dB)20.8427Inf24.174832.354235.72423.369
NCC of the embedded host0.919210.97860.98940.99790.974
NCC of the recovered watermarks0.99020.98840.98470.99170.99640.9827
Table 3. Comparison in an encryption method.
Table 3. Comparison in an encryption method.
Proposed SchemeRef. [34]Ref. [35]Ref. [33]Ref. [18]Ref. [36]
TD-COTDCMArnold TransformHenon MapArnold Transform3D Cat TransformLogistic Map
Table 4. PSNR and NCC values of the watermarked host image.
Table 4. PSNR and NCC values of the watermarked host image.
PropertiesEmbedded 8 WatermarksEmbedded 16 WatermarksEmbedded 24 Watermarks
PSNR (dB)26.844823.538320.8481
NCC0.98110.96460.9429
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yang, Z.; Sun, Q.; Qi, Y.; Li, S.; Ren, F. A Hyper-Chaotically Encrypted Robust Digital Image Watermarking Method with Large Capacity Using Compress Sensing on a Hybrid Domain. Entropy 2022, 24, 1486. https://doi.org/10.3390/e24101486

AMA Style

Yang Z, Sun Q, Qi Y, Li S, Ren F. A Hyper-Chaotically Encrypted Robust Digital Image Watermarking Method with Large Capacity Using Compress Sensing on a Hybrid Domain. Entropy. 2022; 24(10):1486. https://doi.org/10.3390/e24101486

Chicago/Turabian Style

Yang, Zhen, Qingwei Sun, Yunliang Qi, Shouliang Li, and Fengyuan Ren. 2022. "A Hyper-Chaotically Encrypted Robust Digital Image Watermarking Method with Large Capacity Using Compress Sensing on a Hybrid Domain" Entropy 24, no. 10: 1486. https://doi.org/10.3390/e24101486

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop