Next Article in Journal
Combinatorial Effect of Multiple Abiotic Factors on Up-Regulation of Carotenoids and Lipids in Monoraphidium sp. for Pharmacological and Nutraceutical Applications
Next Article in Special Issue
A Novel Fractional Sine Chaotic Map and Its Application to Image Encryption and Watermarking
Previous Article in Journal
Geometrical Tolerances—Separate, Combined or Simultaneous?
Previous Article in Special Issue
Reversible Data Hiding in Encrypted Images Based on the Mixed Multi-Bit Layer Embedding Strategy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform

Department of Basic Sciences, PYD, King Faisal University, Al Ahsa 31982, Saudi Arabia
Appl. Sci. 2023, 13(10), 6105; https://doi.org/10.3390/app13106105
Submission received: 4 April 2023 / Revised: 10 May 2023 / Accepted: 11 May 2023 / Published: 16 May 2023
(This article belongs to the Special Issue Digital Image Security and Privacy Protection)

Abstract

:
In recent years, digital image watermarking has gained a significant amount of popularity and developed into a crucial and essential tool for copyright protection, security, and the identification of multimedia content. Despite its high computational complexity, singular value decomposition (SVD) is an extensively utilized transformation in digital image watermarking. This research presents a robust and blind image watermarking scheme that directly alters the image pixels in the spatial domain to incorporate the watermark by quantizing the block-wise invariant maximum singular value. Using a distribution rule, pixels from the cover image are redistributed to obtain a new image that is divided into square and non-overlapping blocks to obtain invariant maximum singular values by using the matrix 2-norm in the spatial domain without performing an SVD transform. This modifies the pixels of the cover image such that the outcome is equivalent to the difference between the maximum singular values of the corresponding blocks in covers and watermarked images. The strengths of the proposed approach are highlighted by a comparison of experimental results with the most recent and comparable watermarking approaches.

1. Introduction

In recent years, digital media has evolved into an essential component of the routine activities of each and every person. Due to recent technical breakthroughs, it is now simpler than ever to manipulate and share digital multimedia files. However, this has raised concerns about the unauthorized copying of copy-protected media, and its protection is a challenging task [1,2,3]. The digital watermarking scheme was developed to handle such issues [4,5,6,7,8], and since then, it has been developed into a novel area of study and is generating substantial attention among scientists [9,10]. Watermarking is a relatively new field of study that provides effective solutions for a number of security applications, such as authentication and copyright protection [11,12]. Several watermarking methods have been created, which can be classified according to various factors, such as robust or fragile watermarking, visible or invisible watermarking, spatial or frequency domain watermarking, and hybrid domain watermarking. In the following paragraphs, a concise analysis of watermarking schemes that take these factors into consideration is provided. However, interested researchers may refer to [9,10,12,13,14,15] to obtain more details about watermarking techniques. There are two main components of any watermarking scheme—embedding and extraction. A general framework for image watermarking is given in Figure 1.
Watermarking schemes that directly modify the image pixels to insert the watermark’s information without any transformation are considered spatial domain watermarking schemes [16,17,18]. The most basic method of watermarking in this category is to introduce the watermark by modifying the least significant bits (LSBs) of the pixels in the cover image [19,20]. These watermarking techniques are simple to implement and require less effort than other schemes, although they generally compromise the quality.
In contrast, frequency-domain watermarking techniques incorporate watermark information in frequency coefficients by converting spatial representation into the frequency domain. Several transforms have been used in watermarking, including discrete wavelet transform (DWT), discrete cosine transform (DCT), discrete Fourier transform (DFT), discrete fractional Fourier transform (DFrFT), quaternion wavelet transform (QWT), singular value decomposition (SVD), and their combinations [21,22,23,24,25,26]. Li et al. [27] presented image watermarking based on the redistributed invariant discrete wavelet transform (RIDWT). This scheme is invariant relative to row and column flips as well as ninety-degree rotations. It is accomplished by simply relocating the image’s pixels to their new places, applying the wavelet transform, and performing some normalization. Liu et al. [28] suggested a blind color image watermarking approach with variable steps based on the Schur decomposition. Using the Walsh–Hadamard transform (WHT), Prabha et al. [29] presented an effective, resilient, and invisible blind color image watermarking technique. Garg et al. [30] proposed a robust image watermarking strategy that focuses on the protection of biometric images by combining discrete wavelet transform, SVD transform, and chaotic encryption. Using a hybrid transform consisting of discrete wavelet transform and singular value decomposition, Zermi et al. [31] proposed a watermarking scheme to preserve medical images.
The suitable choice of the parameters used in watermarking and location selection to embed the watermark has been a hectic task. Several researchers have used optimization techniques and machine learning for this task, such as fuzzy logic, neural networks, support vector machine, and evolutionary algorithms (EAs) [17,32,33,34,35,36,37,38,39,40,41]. From the evolutionary algorithm family, the firefly algorithm (FA) [42], artificial bee colony (ABC) [43], particle swarm optimization (PSO) [44], genetic algorithm (GA) [41], differential evolution (DE) [17], and teaching-learning based optimization (TLBO) [45] have all made significant contributions to watermarking. By viewing watermarking as a multi-objective problem, Hatami et al. [46] proposed an intelligent watermarking scheme that uses PSO to determine the optimal parameters.
In some instances, it is possible to achieve transform domain-equivalent features in the spatial domain, which could be used for watermarking with the same effect as transform domain watermarking. The direct current (DC) value of the DCT of any image is the average of its pixels value. Considering the complexity of DCT, some researchers have proposed watermarking in the spatial domain by directly altering the pixel’s value, which has the same effect, as the watermark information is embedded by modifying the direct current (DC) value [17,47,48,49,50]. Similarly, watermarking techniques based on SVD transform mostly insert the watermark in the singular values of the host image obtained by the SVD transform [24,51]. The implementation of SVD is a time-consuming process due to the multiplication of matrices [49,52]. In response to this issue, Zhang et al. [49] proposed a robust watermarking scheme in the spatial domain based on SVD. Using matrix norm, a binary watermark is inserted in the maximum singular value of each image block in the spatial domain.
Although the SVD-based image watermarking schemes, discussed above, have achieved a certain level of success, their resistance to some simple attacks is not yet acceptable. These attacks simply attempt to harm the watermark by relocating pixels without changing their intensity. In order to combat such attacks, this research aims to develop a scheme capable of performing effective image watermarking in the spatial domain. Unlike the existing schemes [49], the proposed approach uses the redistributed invariant discrete wavelet transform (RIDWT) concept proposed by Li et al. [27] before obtaining singular values for watermark embedding. It is invariant to row and column flips as well as ninety-degree rotations. The proposed scheme replicates the concepts in the spatial domain that they have used in the transform domain. This is accomplished by simply relocating the image’s pixels to their new locations and performing a normalization process. The singular values of a matrix, as well as its transpose, rotation, and row and column flip matrices, are all the same. The singular values will remain the same regardless of how the values are permuted, so the order of the entries in a matrix is irrelevant. Motivated by the property of a matrix’s singular values, this study proposes a novel approach to image watermarking. Initially, the pixels in the cover image are rearranged to ensure that every block of the image has the same pixel values when rotated by 90° degrees, and its row and column are flipped. Blocks of this new image under these attacks will have the same pixel values, and subsequently, the singular values of these blocks are invariant to these attacks. Due to the high complexity of the SVD transform, in the proposed scheme, the matrix 2-norm is utilized to obtain the maximum singular block-wise value. This maximum singular value is modified by a quantization factor, and the difference between the original and modified singular values is calculated. Based on this, a difference block is obtained to directly modify the host image block’s pixel value so that the total magnitude of change equals the change in the singular values before and after embedding. Using a set of common image distortion attacks, ten standard test images, and four binary watermarks, we evaluated the efficacy of the proposed watermarking scheme. Using well-known evaluation metrics, such as the structural similarity measure (SSIM), peak signal-to-noise ratio (PSNR), bit error ratio (BER), and normalized correlation coefficient (NCC), the proposed watermarking approach is compared to similar approaches described in the literature. The result’s analysis demonstrates the robustness of the proposed watermarking scheme against image distortion attacks and its excellent imperceptibility.
The following is a summary of the key contributions of this work:
1.
Replication of the redistributed invariant wavelet transform concept to the spatial domain;
2.
Application of the matrix 2-norm instead of SVD to obtain singular values;
3.
Development of a new image watermarking scheme in the spatial domain;
4.
Evaluation of the performance of the proposed scheme for grayscale images using a number of metrics and attacks.
The article is structured as follows. An overview of the algorithmic concepts is provided in Section 2. The proposed watermarking scheme is described in Section 3. Section 4 compares and analyzes the results. Section 5 contains the concluding observations and suggestions for future research.

2. Review of the Algorithmic Concepts

This section briefly describes the concepts related to the proposed watermarking scheme and the maximum singular value with SVD and without SVD by means of the matrix 2-norm. Researchers interested in obtaining more details may refer to [24,40,49,51,52].

2.1. Singular Value Decomposition

Singular value decomposition (SVD) [10] based on the linear algebra concept is a diagonalization of a rectangular matrix, and it is a very useful and powerful multimedia tool, particularly in the contexts of data analysis, satellite data, image dimension reduction, etc. It transforms correlated variables into a collection of uncorrelated variables to reveal the relationships in the original data more clearly. Several SVD-based watermarking schemes have been proposed due to the stability of singular values, which may withstand modest image processing disruptions [10,15]. A rectangular matrix ‘A’ of order m × m can be partitioned into the product of three matrices, namely orthogonal matrix U, diagonal matrix S, and the transpose of orthogonal matrix V, in accordance with the theory. It can be theoretically represented by its component matrices as follows:
A = a 1 , 1 a 1 , 2 a 1 , m a 2 , 1 a 2 , 2 a m , 1 a m , m = U S V T = u 1 , 1 u 1 , 2 u 1 , m u 2 , 1 u 2 , 2 u m , 1 u m , m × σ 1 0 0 0 σ 2 0 0 0 0 σ m × v 1 , 1 v 1 , 2 v 1 , m v 2 , 1 v 2 , 2 v m , 1 v m , m T
where UUT = Im and VVT = Im, and Im is the identity matrix of order m. The elements of the diagonal matrix S are in decreasing order, satisfying Relation (2), where r is the rank of the matrix.
σ 1 σ 2 σ r > σ r + 1 = σ r + 2 = σ m = 0

2.2. Matrix Norm

The Frobenius norm of a matrix A, denoted  A F , is the square root of the sum of the square of the singular values and is defined as follows [52]:
A F = i = 1 m j = 1 m a i , j 2 = t r a c e ( A T A ) = i = 1 min { m , n } σ i 2
The matrix 2-norm (or spectral norm) of matrix A is the maximal singular value of A or the square root of the maximum eigenvalue  λ m a x  of ATA. When F = 2, the matrix 2-norm is identical to the maximum singular value and is provided by the following formula:
A 2 = λ max ( A T A ) = σ max
To obtain the maximum singular value of an image, SVD is a widely used technique in digital watermarking because the maximum singular value of an image does not change considerably when it is subjected to conventional image processing attacks. However, the matrix product in SVD calculations will enhance its complexity and the cost of computation. On the other hand, the largest singular value of a matrix is equivalent to the matrix 2-norm [49]. Zhao et al. [52] compared the complexity of the SVD transform and matrix 2-norm and found that matrix 2-norm is faster. Due to the relationship between the matrix 2-norm and the maximum singular value, the proposed watermarking scheme uses the matrix 2-norm instead of the singular values from the SVD transform.

2.3. SVD-Based Watermarking Scheme

In SVD-based image watermarking [49], watermark W is divided into three components by SVD to embed the principal component into the host image by modifying its singular values.
W U w S w V w T
The host image is transformed into the frequency domain by DWT, and the low-frequency sub-band (LL) is selected to divide it into several non-overlapping blocks. SVD is applied to each block to obtain the largest singular value to embed the principal component of the watermark image. It can be given by the following expression:
σ max = σ max + α U w S w
where  σ m a x  and  σ m a x  are the original and modified largest singular values of the host image block, and  α  is the embedding intensity control factor. After the modification of the largest singular value of each block of the host image, the watermarked image is achieved by the reverse process. The principal component of the embedded watermark can be extracted from the watermarked image by the following expression:
U w S w = 1 α ( σ max σ max )
With the help of side information Vw from the watermark insertion phase and by the principal component obtained in Equation (7), the watermark can be extracted by the following equation:
U w S w V w T W
According to Zheng et al. [49], changes equivalent to the watermarking in the SVD domain explained above can be achieved in the spatial domain as follows:
A w = U ( S + Δ S ) V T = U S V T + U Δ S ) V T = A + Δ A
where ∆A is the difference between host image A and watermarked image Aw, and ∆S represents the watermark information. According to Equation (9), the goal of watermarking schemes in the SVD domain is to distribute the watermark information across all pixels of the cover image. Therefore, SVD-based watermarking is possible by directly altering pixel values in the spatial domain if it is possible to obtain the difference matrix ∆A. For example, ∆A can be calculated as follows by taking a 4 × 4 image block:
Δ A = U Δ S V T = u 1 , 1 u 1 , 2 u 1 , 3 u 1 , 4 u 2 , 1 u 2 , 2 u 2 , 3 u 2 , 4 u 3 , 1 u 3 , 2 u 3 , 3 u 3 , 4 u 4 , 1 u 4 , 2 u 4 , 3 u 4 , 4 × Δ S × v 1 , 1 v 1 , 2 v 1 , 3 v 1 , 4 v 2 , 1 v 2 , 2 v 2 , 3 v 2 , 4 v 3 , 1 v 3 , 2 v 3 , 3 v 3 , 4 v 4 , 1 v 4 , 2 v 4 , 3 v 4 , 4 T
Δ A = U Δ S V T = u 1 , 1 u 1 , 2 u 1 , 3 u 1 , 4 u 2 , 1 u 2 , 2 u 2 , 3 u 2 , 4 u 3 , 1 u 3 , 2 u 3 , 3 u 3 , 4 u 4 , 1 u 4 , 2 u 4 , 3 u 4 , 4 × w 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 × v 1 , 1 v 1 , 2 v 1 , 3 v 1 , 4 v 2 , 1 v 2 , 2 v 2 , 3 v 2 , 4 v 3 , 1 v 3 , 2 v 3 , 3 v 3 , 4 v 4 , 1 v 4 , 2 v 4 , 3 v 4 , 4 T
Δ A = U Δ S V T = w u 1 , 1 u 2 , 1 u 3 , 1 u 4 , 1 × v 1 , 1 v 2 , 1 v 3 , 1 v 4 , 1 = w u 1 v 1 T
where w indicates the watermark information, and u1 and v1 are column vectors in the matrices U and V. It is clear in Equation (12) that difference matrix ∆A can be achieved by the multiplication of the watermark’s information and eigenvectors  u 1 v 1 T .
Zheng et al. [49] claimed that when the elements of a matrix are similar,  u 1 v 1 T  is closely associated with its matrix size. Using this property and taking a special case where all elements of a square matrix A are the same, it is expressed as follows:
A = a a a a a a a a a a a a a a a a = u 1 , 1 u 1 , 2 u 1 , 3 u 1 , 4 u 2 , 1 u 2 , 2 u 2 , 3 u 2 , 4 u 3 , 1 u 3 , 2 u 3 , 3 u 3 , 4 u 4 , 1 u 4 , 2 u 4 , 3 u 4 , 4 × S × v 1 , 1 v 1 , 2 v 1 , 3 v 1 , 4 v 2 , 1 v 2 , 2 v 2 , 3 v 2 , 4 v 3 , 1 v 3 , 2 v 3 , 3 v 3 , 4 v 4 , 1 v 4 , 2 v 4 , 3 v 4 , 4 T = σ u 1 v 1 T
where σ is the unique singular value of diagonal matrix S of an image block of size n × n (in this study n = 4). In this case, this unique singular value is equal to the multiplication of block size ‘4’ and matrix element ‘a’. With the help of Equation (13), the  u 1 v 1 T  matrix can be calculated as follows:
u 1 v 1 T = A σ = 1 4 a a a a a a a a a a a a a a a a a = 1 4 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Zhang et al. [49] verified the correctness of the above concept via an experimental analysis of a case study and found that if difference matrix ∆A is obtained by the above process, watermarking in the spatial domain can be achieved, with the same impact as SVD-based watermarking. Figure 2 illustrates the fundamental similarity between the SVD-based watermarking and the watermarking scheme based on the largest singular value in the spatial domain.

3. Proposed Watermarking Scheme

This section describes the components of the proposed watermarking scheme components, including the computation of the block-wise invariant maximum singular value, watermark embedding and extraction processes, and watermark preprocessing.

3.1. Block-Wise Invariant Maximum Singular Value in the Spatial Domain

Several image-watermarking schemes by modifying the singular values to embed the watermark are proposed in the literature [10,15]. While these approaches can withstand some typical image distortion attacks, there is still room for improvement in a number of areas, such as image flipping and rotation by multiples of ninety degrees, where these schemes do not produce satisfactory results. To destroy the embedded watermark information, these basic techniques modify the spatial positions of the pixels in a watermarked image without affecting their intensities. The singular value of a matrix only considers the matrix elements irrespective of their locations. Keeping this in mind, the image pixels are redistributed in such a way that in each block, the pixel values remain the same irrespective of their locations to obtain the same singular value after the attacks.
This goal is achieved by utilizing the approach developed by Li et al. [27] and adopted by others [53]. A square image ‘A’ of size m × m is divided into four sub-images of equal size, and the mean intensities of each are computed and collected in a matrix as  μ 1 μ 2 μ 3 μ 4 , μ i 0 . A normalization matrix (N) is generated as follows using these means:
N = N 1 N 2 N 3 N 4 = μ 1 + μ 2 + μ 3 + μ 4 μ 1 - μ 2 + μ 3 - μ 4 μ 1 - μ 2 + μ 3 - μ 4 μ 1 - μ 2 + μ 3 - μ 4
Using the distribution rule described in Equation (16), the pixels of the given image (A) are relocated to new locations to obtain a new image (B).
B 2 i - 1 , 2 j - 1 = A i , j , i f 1 i m / 2 , 1 j m / 2 B 2 i - 1 , 2 j - m = A i , 3 m / 2 - j + 1 , i f 1 i m / 2 , m / 2 j m B 2 i - m , 2 j - 1 = A 3 m / 2 - i + 1 , j , i f m / 2 i m , 1 j m / 2 B 2 i - m , 2 j - m = A 3 m / 2 - i + 1 , 3 m / 2 - j + 1 , i f m / 2 i m , m / 2 j m
If the absolute value of N2 is more than N3 in Equation (15), matrix B is left unchanged; otherwise, the transpose of B is taken to obtain the normalized image. Image B is divided into square blocks of size 2n (n = 1, 2, 3…│2n < m/2) (in this study, n = 2), which are represented by Bi,j (i = 1, 2,…, m/4; j = 1, 2,…, m/4). The largest singular value σmax of each image block is calculated using the matrix 2-norm given in Equation (4) in the spatial domain instead of utilizing the SVD transform. Figure 3 provides an illustration of the concept described above using the example of a square image with dimensions of 32 by 32 pixels, which has been split into blocks with dimensions of 4 by 4 pixels. It is evident from the figure that the largest singular value of the image blocks remains the same under different attacks.

3.2. Watermark Embedding Process

The process of embedding a watermark may be broken down into the following steps for easier understanding:
  • Step 1: Encrypt the watermark image W using the piecewise linear chaotic map (PWLCM) [54] prior to embedding it into the cover image using a secret key (k) to increase the security of the watermarking approach by adding an additional layer. This is one of the chaotic maps that has recently gained popularity due to its dynamic nature, simple form, and effective implementation. Without the correct security key, an impostor or unauthorized user cannot detect the watermark in the watermarked image.
  • Step 2: Image B is created by rearranging the pixels of cover image ‘A’ in order to obtain the invariant features described in Section 3.1, and this image is split into 4 × 4 non-overlapping blocks Bi,j (i = 1, 2,…, m/4; j = 1, 2,…, m/4). Because a watermark is introduced one bit at a time into each block, the number of non-overlapping blocks must be greater than or equal to the number of watermark bits. Using the matrix 2-norm (Equation (4)), the invariant largest singular value σmax of each image block of redistributed image B is calculated in the spatial domain instead of applying the SVD transform. In the proposed scheme, the number of blocks is more than the watermark’s size, so these singular values are arranged in descending order, and the largest of these are selected according to the watermark’s capacity. The selection of these singular values is motivated by their good imperceptibility relative to other singular values.
  • Step 3: Modification magnitudes T1 and T2, which are decided based on the watermark information, are given by Equation (17):
T 1 = 0.5 Q , T 2 = 1.5 Q i f w = 1 T 1 = 0.5 Q , T 2 = 1.5 Q o t h e w i s e
where ‘Q’ is the quantization factor, which controls imperceptibility and robustness.
  • Step 4: The potential quantization results Q1 and Q2, utilizing these magnitudes T1 and T2, are now calculated as follows:
Q 1 = 2 k Q + T 1 , Q 2 = 2 k Q + T 2
where k is an integer such that k = floor(ceilmax/Q)/2), ceil(*), and floor(*) represents the smallest integer that is greater than or equal to the given value and the greatest integer that is less than or equal to the given value, respectively.
  • Step 5: Based on Q1 and Q2, the modified singular value  σ m a x  corresponding to the singular value  σ m a x  is obtained as follows:
σ max = Q 2 i f ( σ max Q 2 < σ max Q 1 ) Q 1 e l s e
  • Step 6: Singular value difference ∆σ between modified singular value  σ m a x  and its corresponding singular value,  σ m a x , is calculated using Equation (20).
Δ σ = σ max σ max
  • Step 7: Difference matrix ∆A can be achieved with the help of the difference in singular value ∆σ using Equation (12) as  A = σ u 1 v 1 T . With the help of this difference matrix and using Equation (9), watermark bits are directly inserted into image block Bi,j by altering the image pixels. The procedure is repeated until all watermark bits are embedded, and then the reverse process is applied to put back the pixels in their original places to create watermarked image Aw.

3.3. Watermark Extraction Process

A watermark, W, that has been inserted into a watermarked image, Aw, which subsequently has been subjected to image manipulation attacks, can be extracted by the procedure described here. The extracted watermark (W’) may be distorted or of the same quality as when inserted:
  • Step 1: The pixels of the distorted watermarked image ‘Aw’ are redistributed, as described in Section 3.1. The image is divided into 4 × 4 blocks, and the blocks with the watermark information are selected to directly compute the invariant maximum singular value in the spatial domain instead of the SVD transform by Equation (4).
  • Step 2: With the help of the singular values obtained in Step 1 and quantization parameter ‘Q’, the encrypted watermark can be extracted by the following Equation (21).
W = m o d c e i l σ max Q , 2
  • Step 3: The decryption process is applied with the proper key to obtain the embedded watermark W’ that was extracted in Step 2.

4. Experimental Results Discussion

In this section, a comparison of the performance of the proposed watermarking scheme with the performance of other relevant watermarking techniques that have been developed by Parah et al. [48], Zhang et al. [49], Zeng et al. [50], Su et al. [47], and Elbasi et al. [26] is carried out. All these schemes have, in some way or another, utilized an idea that is similar to the proposed scheme. Ten grayscale standard test images (Image1 to Image10) with a size of 512 × 512 and four binary watermarks (W1, W2, W3, and W4) with a size of 64 × 64 were considered for evaluating the performance of the proposed scheme and are given in Figure 4 and Figure 5, respectively. These test images were compiled from a variety of publicly accessible open-source image libraries. To verify the robustness of the proposed approach, the quality of the watermarked image was degraded using a variety of standard image distortion attacks, as shown in Table 1. The proposed scheme was tested on a personal computer (PC) configured with MATLAB, an Intel core i7 processor, NVIDIA GeForce MX450 graphic card, Windows 11, and 16 GB of RAM. The results are given in Table 6 and Figures 12 and 13 for the comparison of algorithms. The best result corresponding to each row is highlighted in bold.
The peak signal-to-noise ratio (PSNR) is a widely used metric for evaluating the quality of a watermarked image among the different quality metrics reported in the literature [49]. A higher PSNR value points toward the higher imperceptibility of the watermarked image. The PSNR of 8-bit image A with a size of m × m and its watermarked image Aw is given by the following equation.
P S N R ( A , A w ) = 10 log 10 ( 255 ) 2 1 m × m i = 1 m j = 1 m A i , j A w i . j 2 ( d B )
Another metric for the imperceptibility measurement is the structural similarity (SSIM) index [49], which measures the similarity between original image A and watermarked image Aw. It models any image distortion as a combination of three factors, which are a loss of correlation  s ( A , A w ) , contrast distortion  c ( A , A w ) , and luminance distortion  l ( A , A w ) . The human visual system (HVS) quality perception and structural similarity are correlated. It is defined as the follows:
S S I M ( A , A w ) = l ( A , A w ) c ( A , A w ) s ( A , A w )
l ( A , A w ) = 2 μ A μ A w + C 1 μ A 2 + μ A w 2 + C 1 , c ( A , A w ) = 2 σ A σ A w + C 2 σ A 2 + σ A w 2 + C 2 , s ( A , A w ) = σ A A w + C 3 σ A σ A w + C 3
where  μ A ,   μ A w ,   σ A ,   σ A w ,   a n d   σ A A w  are the mean, the variance of image A and its watermarked image Aw, and the covariance between these images, while constants C1, C2, and C3 are stability constants used to avoid division by zero.
The extracted watermark (W’) may not be identical to the embedded watermark (W) with a size of n × n due to the implementation of the image distortion attacks on the watermarked image. Consequently, a standard is necessary to evaluate the robustness of the watermarking scheme, and often, the normalized correlation coefficient (NCC) and bit error ratio (BER) are employed for this purpose. These two measures were defined and utilized for the robustness analysis in the current study:
B E R ( W , W ) = i = 1 n j = 1 n W i , j W i , j n × n
N C C ( W , W ) = i = 1 n j = 1 n W i , j × W i , j i = 1 n j = 1 n W i , j 2 i = 1 n j = 1 n W i , j 2
where subscripts i and j indicate the pixel’s position in the images, and   refers to the XOR operation.

4.1. Sensitivity Analysis of Quantization Factor Q

The watermark imperceptibility and robustness are two characteristics of a watermarking algorithm that are mutually exclusive and connected. In the proposed watermarking scheme, these properties are balanced using quantization factor ‘Q’. A smaller value of Q will implant less information into the host image, resulting in a small decrease in the visual quality; however, this information may be easily deleted using basic modification techniques. Although a greater value of Q will implant more information into the host image, resulting in a significant decrease in the visual quality, this information cannot be simply removed using basic modification techniques. Thus, a lower Q favors imperceptibility, and a higher value favors robustness. Finding the appropriate value for this parameter is a very important and challenging task. A sensitivity analysis of Q is performed using several images and watermarks to resolve the trade-off between the robustness and imperceptibility of the proposed watermarking approach. The NCC and SSIM values are computed to represent robustness and imperceptibility, respectively. On the basis of these assessment metrics, the value of Q of the proposed scheme is nearly the same for each image, with minor variations. Some results are given in Figure 6, where a watermark (W1) was embedded into the host image1 and image1 by taking different quantization factor ‘Q’, and the associated NCC and SSIM values were calculated. In the graph of these NCC and SSIM values, it can be seen that Q = 20 was a suitable choice, which was considered in further calculations.

4.2. Imperceptibility Analysis

Imperceptibility in invisible watermarking is associated with the human visual system. If both the host and watermarked images are identical, it is argued that the watermarking scheme is imperceptible. To investigate the invisibility of the inserted watermark, the structural similarity measure (SSIM) and peak signal-to-noise ratio (PSNR) explained above are widely applied in evaluation metrics. This study also used these metrics to investigate the watermarked image’s imperceptibility. The PSNR and SSIM values obtained by the proposed watermarking scheme are listed in Table 2, corresponding to each watermark inserted in the given host images. As can be observed in Table 2, the PSNR and SSIM values for each of the images are close to 49 dB and 1, respectively, for each watermark insertion. This demonstrates that the proposed watermarking scheme has a high level of imperceptibility.

4.3. Robustness Analysis against Attacks

This section analyzes the robustness of the proposed watermarking scheme, utilizing image distortion attacks to distort the watermarked image shown in Table 1 and the extraction procedure described in Section 3.3. The normalized correlation coefficient (NCC) and bits error ratio (BER), which are defined in Equations (25) and (26), were employed for this task. A higher NCC value means higher robustness, while a smaller BER value means higher robustness. Therefore, BER and NCC values approaching zero and one, respectively, indicate that the embedded and extracted watermarks are almost the same. The NCC and BER values of the extracted watermarks corresponding to inserted watermarks W1 to W4 are given in Table 3, Table 4 and Table 5. To investigate the collective robustness of the proposed scheme, the average NCC and SSIM of all the attacks of the extracted watermarks corresponding to each image are given in Table 3. According to the table, the proposed watermarking scheme was resistant to all distortion attacks with NCC values close to 1 and BER values close to 0. Figure 7 and Figure 8 demonstrate the same phenomenon, representing the average NCC and the average BER, respectively. To investigate the robustness of the proposed scheme against each image manipulation attack, the average NCC and BER values of all extracted watermarks for each image are given in Table 4 and Table 5, respectively. The proposed watermarking scheme’s ability to retrieve the watermarks exactly as they were inserted is demonstrated by the NCC values of 1 and BER values of 0 in the cases of 90-degree rotation and row and column flipping (index2, index11, and index12). The outcome of the research comes close to fulfilling the objectives of the study. Due to space constraints, the extracted watermarks only from ‘image1’ are given in Figure 9. The figure demonstrates that the recovered watermarks by the proposed scheme were almost similar to the embedded watermark in every instance. Except in a few cases, the extracted watermark may be recognized with the naked eye. The extracted watermarks in the cases of attack indices 1, 6, 7, 8, 9, and 13 have poor quality in comparison to the other cases. Further improvement of the watermarking scheme is needed considering these cases.

4.4. Comparison with Similar Schemes

This section compares the proposed watermarking scheme with other related watermarking schemes, as presented by Parah et al. [48], Zhang et al. [49], Zeng et al. [50], Su et al. [47], and Elbasi et al. [26]. The schemes selected for the comparison in this study are denoted by scheme1, scheme2, scheme3, scheme4, and scheme5 respectively in Figure 10, Figure 11, Figure 12 and Figure 13. The reason behind the selection of the schemes is that all these schemes have, in some way or another, utilized an idea that is similar to the proposed scheme. The imperceptibility of the schemes was compared by calculating the average of the imperceptibility measurements of all watermarks for each host image, and the findings are shown in Figure 10 and Figure 11 with the help of bar charts. From these Figures, it can be observed that the PSNR and SSIM values achieved by the proposed watermarking approach are relatively better than those achieved by the other approaches in most cases. The scheme proposed by Zhang et al. [49] is second best in terms of imperceptibility. The proposed scheme’s average PSNR and SSIM are also greater than those of competing schemes.
To evaluate the robustness of the schemes, the average NCC values for all test images and all watermarks corresponding to each attack were calculated and are reported in Figure 12. The results of using a similar approach to determine the BER are shown in Figure 13. A close examination of these Figures reveals that, for attack indices 2, 11, and 12, which are rotation, row flipping, and column flipping, respectively, the performance of the other schemes is noticeably worse than the proposed scheme. The proposed watermarking scheme’s ability to retrieve the watermarks exactly as they were inserted is demonstrated by the NCC values of 1 and BER values of 0 in the cases of 90-degree rotation and row and column flipping (index2, index11, and index12). Similarly, in the other instances, the proposed scheme performed reasonably well compared to the alternative schemes. In a few instances, such as indices 1, 3, and 7, it did not perform as expected, requiring further investigation into the causes of its failure to meet expectations.
Schemes were also compared based on their computational time in terms of embedding and extraction times, and they are provided in Table 6. The basic purpose of copyright protection watermarking schemes is to demonstrate ownership regardless of time. Therefore, this is not a vital element in these situations; however, it cannot be ignored in broadcast monitoring when embedding and extraction are conducted live. In Table 6, it is evident that the computational complexity of the proposed scheme is greater than the other schemes but comparable to the scheme provided by Zhang et al. [49] and is less than the scheme proposed by Elbasi et al. [26]. This is due to the time required to redistribute the pixels in the image to their new locations in order to obtain singular values that are invariant. The proposed scheme achieved better imperceptibility and robustness at the cost of high complexity. Hence, reducing the complexity of this approach may be a future study topic.

5. Conclusions

This study proposes a robust image watermarking scheme that is based on a block-wise maximum singular value produced by the matrix 2-norm without an SVD transformation. These singular values are insensitive to ninety-degree rotations and row and column flips and are used to modify the pixel values in the spatial domain using a quantization parameter to incorporate the watermark’s information. This study presents an alternate method for enhancing image watermarking schemes by using block-wise invariant singular values. The experimental results of the proposed watermarking system were analyzed using ten standard test images, four binary watermarks, and fifteen image distortion attacks. The examination of the numerical data and the quality of the recovered watermark images revealed that the proposed watermarking scheme worked extremely well against the majority of attacks considered in this study. The proposed scheme performed better on average than the other schemes tested in terms of imperceptibility and robustness. However, it did not operate as intended in some situations, indicating that additional research is needed in this domain. The complexity of the proposed scheme is slightly higher than that of the other schemes but comparable, so reducing this scheme’s complexity may be the next step in this study. This approach may also be used for color images, medical images, and video and audio watermarking.

Funding

This work was supported by the Deanship of Scientific Research, Vice Presidency for Graduate Studies and Scientific Research, King Faisal University, Saudi Arabia [Grant No. 3405].

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All the relevant data is contained within the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Dhawan, S.; Gupta, R. Analysis of Various Data Security Techniques of Steganography: A Survey. Inf. Secur. J. A Glob. Perspect. 2020, 30, 63–87. [Google Scholar] [CrossRef]
  2. Huh, J.H.; Seo, Y.S. Understanding Edge Computing: Engineering Evolution with Artificial Intelligence. IEEE Access 2019, 7, 164229–164245. [Google Scholar] [CrossRef]
  3. Tran, D.T.; Huh, J.H. Forecast of Seasonal Consumption Behavior of Consumers and Privacy-Preserving Data Mining with New S-Apriori Algorithm. J. Supercomput. 2023, 1–46. [Google Scholar] [CrossRef]
  4. Cox, I.; Miller, M.L.; Bloom, J.A. Digital Watermarking; Morgan Kaufmann Publishers Inc.: Burlington, MA, USA, 2001; ISBN 1-55860-714-5. [Google Scholar]
  5. Gupta, S.; Saluja, K.; Solanki, V.; Kaur, K.; Singla, P.; Shahid, M. Efficient Methods for Digital Image Watermarking and Information Embedding. Meas. Sens. 2022, 24, 100520. [Google Scholar] [CrossRef]
  6. Sanivarapu, P.V.; Rajesh, K.N.V.P.S.; Hosny, K.M.; Fouda, M.M. Digital Watermarking System for Copyright Protection and Authentication of Images Using Cryptographic Techniques. Appl. Sci. 2022, 12, 8724. [Google Scholar] [CrossRef]
  7. El-Kenawy, E.S.M.; Khodadadi, N.; Khoshnaw, A.; Mirjalili, S.; Alhussan, A.A.; Khafaga, D.S.; Ibrahim, A.; Abdelhamid, A.A. Advanced Dipper-Throated Meta-Heuristic Optimization Algorithm for Digital Image Watermarking. Appl. Sci. 2022, 12, 10642. [Google Scholar] [CrossRef]
  8. Wan, W.; Wang, J.; Zhang, Y.; Li, J.; Yu, H.; Sun, J. A Comprehensive Survey on Robust Image Watermarking. Neurocomputing 2022, 488, 226–247. [Google Scholar] [CrossRef]
  9. Giri, K.J.; Quadri, S.M.K.; Bashir, R.; Bhat, J.I. DWT Based Color Image Watermarking: A Review. Multimed. Tools Appl. 2020, 79, 32881–32895. [Google Scholar] [CrossRef]
  10. Alshoura, W.H.; Zainol, Z.; Teh, J.S.; Alawida, M.; Alabdulatif, A. Hybrid SVD-Based Image Watermarking Schemes: A Review. IEEE Access 2021, 9, 32931–32968. [Google Scholar] [CrossRef]
  11. Abdulloh, F.F.; Rahardi, M.; Putra, W.S.; Amikom, Y.; Sleman, I. A Blind Robust Image Watermarking on Selected DCT Coefficients for Copyright Protection. Artic. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 2022. [Google Scholar] [CrossRef]
  12. Ray, A.; Roy, S. Recent Trends in Image Watermarking Techniques for Copyright Protection: A Survey. Int. J. Multimed. Inf. Retr. 2020, 9, 249–270. [Google Scholar] [CrossRef]
  13. Boujerfaoui, S.; Riad, R.; Douzi, H.; Ros, F.; Harba, R. Image Watermarking between Conventional and Learning-Based Techniques: A Literature Review. Electronics 2022, 12, 74. [Google Scholar] [CrossRef]
  14. Khan, A.; Siddiqa, A.; Munib, S.; Malik, S.A. A Recent Survey of Reversible Watermarking Techniques. Inf. Sci. 2014, 279, 251–272. [Google Scholar] [CrossRef]
  15. Ahmadi, S.B.B.; Zhang, G.; Wei, S. Robust and Hybrid SVD-Based Image Watermarking Schemes: A Survey. Multimed. Tools Appl. 2020, 79, 1075–1117. [Google Scholar] [CrossRef]
  16. Mehraj, S.; Mushtaq, S.; Parah, S.A.; Giri, K.J.; Sheikh, J.A.; Gandomi, A.H.; Hijji, M.; Muhammad, K. Spatial Domain-Based Robust Watermarking Framework for Cultural Images. IEEE Access 2022, 10, 117248–117260. [Google Scholar] [CrossRef]
  17. Ali, M.; Ahn, C.W.; Pant, M.; Kumar, S.; Singh, M.K.; Saini, D. An Optimized Digital Watermarking Scheme Based on Invariant DC Coefficients in Spatial Domain. Electronics 2020, 9, 1428. [Google Scholar] [CrossRef]
  18. Su, Q.; Yuan, Z.; Liu, D. An Approximate Schur Decomposition-Based Spatial Domain Color Image Watermarking Method. IEEE Access 2019, 7, 4358–4370. [Google Scholar] [CrossRef]
  19. Bin Faheem, Z.; Ishaq, A.; Rustam, F.; Díez, I.D.L.T.; Gavilanes, D.; Vergara, M.M.; Ashraf, I. Image Watermarking Using Least Significant Bit and Canny Edge Detection. Sensors 2023, 23, 1210. [Google Scholar] [CrossRef]
  20. Bin Faheem, Z.; Ali, M.; Raza, M.A.; Arslan, F.; Ali, J.; Masud, M.; Shorfuzzaman, M. Image Watermarking Scheme Using LSB and Image Gradient. Appl. Sci. 2022, 12, 4202. [Google Scholar] [CrossRef]
  21. Sakthivel, S.M.; Sankar, A.R. Computation-Efficient Image Watermarking Architecture with Improved Performance. Comput. Electr. Eng. 2020, 84, 106649. [Google Scholar] [CrossRef]
  22. Yuan, Z.; Liu, D.; Zhang, X.; Su, Q. New Image Blind Watermarking Method Based on Two-Dimensional Discrete Cosine Transform. Optik 2020, 204, 164152. [Google Scholar] [CrossRef]
  23. Ariatmanto, D.; Ernawan, F. Adaptive Scaling Factors Based on the Impact of Selected DCT Coefficients for Image Watermarking. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 605–614. [Google Scholar] [CrossRef]
  24. Pei, L. Research on Digital Image Watermarking Algorithm Based on Scrambling and Singular Value Decomposition. J. Math. 2022, 2022, 4656010. [Google Scholar] [CrossRef]
  25. Singh, R.; Izhar, L.I.; Elamvazuthi, I.; Ashok, A.; Aole, S.; Sharma, N. Efficient Watermarking Method Based on Maximum Entropy Blocks Selection in Frequency Domain for Color Images. IEEE Access 2022, 10, 52712–52723. [Google Scholar] [CrossRef]
  26. Elbasi, E.; Mostafa, N.; Cina, E. Robust, Secure and Semi-Blind Watermarking Technique Using Flexible Scaling Factor in Block-Based Wavelet Algorithm. Electronics 2022, 11, 3680. [Google Scholar] [CrossRef]
  27. Li, L.; Xu, H.H.; Chang, C.C.; Ma, Y.Y. A Novel Image Watermarking in Redistributed Invariant Wavelet Domain. J. Syst. Softw. 2011, 84, 923–929. [Google Scholar] [CrossRef]
  28. Liu, D.; Yuan, Z.; Su, Q. A Blind Color Image Watermarking Scheme with Variable Steps Based on Schur Decomposition. Multimed. Tools Appl. 2020, 79, 7491–7513. [Google Scholar] [CrossRef]
  29. Prabha, K.; Shatheesh Sam, I. An Effective Robust and Imperceptible Blind Color Image Watermarking Using WHT. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 2982–2992. [Google Scholar] [CrossRef]
  30. Garg, P.; Jain, A. A Robust Technique for Biometric Image Authentication Using Invisible Watermarking. Multimed. Tools Appl. 2023, 82, 2237–2253. [Google Scholar] [CrossRef]
  31. Zermi, N.; Khaldi, A.; Kafi, M.R.; Kahlessenane, F.; Euschi, S. Robust SVD-Based Schemes for Medical Image Watermarking. Microprocess. Microsyst. 2021, 84, 104134. [Google Scholar] [CrossRef]
  32. Shoron, S.H.; Islam, M.; Uddin, J.; Shon, D.; Im, K.; Park, J.H.; Lim, D.S.; Jang, B.; Kim, J.M. A Watermarking Technique for Biomedical Images Using Smqt, Otsu, and Fuzzy c-Means. Electronics 2019, 8, 975. [Google Scholar] [CrossRef]
  33. Maity, S.P.; Maity, S.; Sil, J.; Delpha, C. Collusion Resilient Spread Spectrum Watermarking in M-Band Wavelets Using GA-Fuzzy Hybridization. J. Syst. Softw. 2013, 86, 47–59. [Google Scholar] [CrossRef]
  34. Yang, H.-Y.; Wang, X.-Y.; Zhang, Y.; E-nuo, M. Robust Digital Watermarking in PDTDFB Domain Based on Least Squares Support Vector Machine. Eng. Appl. Artif. Intell. 2013, 26, 2058–2072. [Google Scholar] [CrossRef]
  35. Takore, T.T.; Rajesh Kumar, P.; Lavanya Devi, G. A New Robust and Imperceptible Image Watermarking Scheme Based on Hybrid Transform and PSO. Int. J. Intell. Syst. Appl. 2018, 10, 50–63. [Google Scholar] [CrossRef]
  36. Devi, K.J.; Singh, P.; Dash, J.K.; Thakkar, H.K.; Santamaría, J.; Krishna, M.V.J.; Romero-Manchado, A. A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization. Mathematics 2022, 10, 3015. [Google Scholar] [CrossRef]
  37. Pallaw, V.K.; Singh, K.U.; Kumar, A.; Singh, T.; Swarup, C.; Goswami, A. A Robust Medical Image Watermarking Scheme Based on Nature-Inspired Optimization for Telemedicine Applications. Electronics 2023, 12, 334. [Google Scholar] [CrossRef]
  38. Garg, P.; Kishore, R.R. An Efficient and Secured Blind Image Watermarking Using ABC Optimization in DWT and DCT Domain. Multimed. Tools Appl. 2022, 81, 36947–36964. [Google Scholar] [CrossRef]
  39. Wang, L.; Ji, H.A.; Wang, L.; Ji, H. A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images. Electronics 2022, 11, 2027. [Google Scholar] [CrossRef]
  40. Ali, M.; Ahn, C.W.; Pant, M.; Siarry, P. An Image Watermarking Scheme in Wavelet Domain with Optimized Compensation of Singular Value Decomposition via Artificial Bee Colony. Inf. Sci. 2015, 301, 44–60. [Google Scholar] [CrossRef]
  41. Maity, S.P.; Maity, S.; Sil, J.; Delpha, C. Perceptually Adaptive MC-SS Image Watermarking Using GA-NN Hybridization in Fading Gain. Eng. Appl. Artif. Intell. 2014, 31, 3–14. [Google Scholar] [CrossRef]
  42. Goyal, A.; Malik, M.; Sharma, S.; Choudhary, S.; Sharma, V.K.; Goyal, A. Image Watermarking in Frequency Domain Using Hu’s Invariant Moments and Firefly Algorithm. nt. J. Image Graph. Signal Process. 2022, 2, 1–15. [Google Scholar] [CrossRef]
  43. Yazdan Bakhsh, F.; Moghaddam, M.E. A Robust HDR Images Watermarking Method Using Artificial Bee Colony Algorithm. J. Inf. Secur. Appl. 2018, 41, 12–27. [Google Scholar] [CrossRef]
  44. Cedillo-Hernandez, M.; Cedillo-Hernandez, A.; Garcia-Ugalde, F.J. Improving DFT-Based Image Watermarking Using Particle Swarm Optimization Algorithm. Mathematics 2021, 9, 1795. [Google Scholar] [CrossRef]
  45. Moosazadeh, M.; Ekbatanifard, G. A New DCT-Based Robust Image Watermarking Method Using Teaching-Learning-Based Optimization. J. Inf. Secur. Appl. 2019, 47, 28–38. [Google Scholar] [CrossRef]
  46. Hatami, E.; Rashidy Kanan, H.; Layeghi, K.; Harounabadi, A. An Optimized Robust and Invisible Digital Image Watermarking Scheme in Contourlet Domain for Protecting Rightful Ownership. Multimed. Tools Appl. 2023, 82, 2021–2051. [Google Scholar] [CrossRef]
  47. Su, Q.; Niu, Y.; Wang, Q.; Sheng, G. A Blind Color Image Watermarking Based on DC Component in Thespatial Domain. Optik 2013, 124, 6255–6260. [Google Scholar] [CrossRef]
  48. Parah, S.A.; Loan, N.A.; Shah, A.A.; Sheikh, J.A.; Bhat, G.M. A New Secure and Robust Watermarking Technique Based on Logistic Map and Modification of DC Coefficient. Nonlinear Dyn. 2018, 93, 1933–1951. [Google Scholar] [CrossRef]
  49. Zhang, H.; Wang, C.; Zhou, X. A Robust Image Watermarking Scheme Based on SVD in the Spatial Domain. Future Internet 2017, 9, 45. [Google Scholar] [CrossRef]
  50. Zeng, G.; Qiu, Z. Image Watermarking Based on DC Component in DCT. In Proceedings of the 2nd 2008 International Symposium on Intelligent Information Technology Application Workshop, IITA 2008 Workshop, Shanghai, China, 21–22 December 2008; pp. 573–576. [Google Scholar] [CrossRef]
  51. Zhang, M.; Ding, W.; Li, Y.; Sun, J.; Liu, Z. Color Image Watermarking Based on a Fast Structure-Preserving Algorithm of Quaternion Singular Value Decomposition. Signal Process. 2023, 208, 108971. [Google Scholar] [CrossRef]
  52. Zhao, J.; Xu, W.; Zhang, S.; Fan, S.; Zhang, W. A Strong Robust Zero-Watermarking Scheme Based on Shearlets’ High Ability for Capturing Directional Features. Math. Probl. Eng. 2016, 2016, 2643263. [Google Scholar] [CrossRef]
  53. Ali, M.; Ahn, C.W.; Pant, M.; Siarry, P. A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD. Discret. Dyn. Nat. Soc. 2016, 2016, 3263587. [Google Scholar] [CrossRef]
  54. Bakhshandeh, A.; Eslami, Z. An Authenticated Image Encryption Scheme Based on Chaotic Maps and Memory Cellular Automata. Opt. Lasers Eng. 2013, 51, 665–673. [Google Scholar] [CrossRef]
Figure 1. The general framework of an image watermarking scheme.
Figure 1. The general framework of an image watermarking scheme.
Applsci 13 06105 g001
Figure 2. Illustration of SVD-based watermarking and spatial domain watermarking.
Figure 2. Illustration of SVD-based watermarking and spatial domain watermarking.
Applsci 13 06105 g002
Figure 3. Illustration of block-wise invariant maximum singular values under various attacks.
Figure 3. Illustration of block-wise invariant maximum singular values under various attacks.
Applsci 13 06105 g003
Figure 4. Test images: Ten test images labeled from Image1 to Image10.
Figure 4. Test images: Ten test images labeled from Image1 to Image10.
Applsci 13 06105 g004
Figure 5. Watermark images: Watermark images labeled from W1 to W4.
Figure 5. Watermark images: Watermark images labeled from W1 to W4.
Applsci 13 06105 g005
Figure 6. The NCC and SSIM values obtained by the proposed scheme by taking different values of quantization factor Q.
Figure 6. The NCC and SSIM values obtained by the proposed scheme by taking different values of quantization factor Q.
Applsci 13 06105 g006
Figure 7. Average NCC values corresponding to each image, taking all the attacks.
Figure 7. Average NCC values corresponding to each image, taking all the attacks.
Applsci 13 06105 g007
Figure 8. Average BER values corresponding to each image, taking all the attacks.
Figure 8. Average BER values corresponding to each image, taking all the attacks.
Applsci 13 06105 g008
Figure 9. Extracted watermarks from watermarked images corresponding to various distortion attacks.
Figure 9. Extracted watermarks from watermarked images corresponding to various distortion attacks.
Applsci 13 06105 g009aApplsci 13 06105 g009b
Figure 10. Average PSNR over all the watermarks and all the attacks corresponding to each image.
Figure 10. Average PSNR over all the watermarks and all the attacks corresponding to each image.
Applsci 13 06105 g010
Figure 11. Average SSIM over all the watermarks and all the attacks corresponding to each image.
Figure 11. Average SSIM over all the watermarks and all the attacks corresponding to each image.
Applsci 13 06105 g011
Figure 12. Average NCC over all watermarks and all images corresponding to each attack.
Figure 12. Average NCC over all watermarks and all images corresponding to each attack.
Applsci 13 06105 g012
Figure 13. Average BER over all watermarks and all images corresponding to each attack.
Figure 13. Average BER over all watermarks and all images corresponding to each attack.
Applsci 13 06105 g013
Table 1. Attacks used to destroy watermarks.
Table 1. Attacks used to destroy watermarks.
Attack IndexDescription
Index0No change in watermarked image
Index1Average filter taking a 3 × 3 window size
Index290° anticlockwise rotation
Index325% central region cropping
Index4Addition of Gaussian noise with mean 0 and variance 0.005.
Index5JPEG compression taking a quality factor of 75
Index6Rescaling 512 → 256 → 512
Index7Median filter taking a 3 × 3 window size
Index8Salt and pepper noise addition with density of 0.005
Index910 rows and 10 columns from arbitrary locations are deleted
Index10Low-pass Gaussian filter with a 3 × 3 window
Index11Rows flip
Index12Columns flip
Index13Motion blur with a 3 × 3 window
Index14Pixelation with a 2 × 2 window
Index15Speckle noise with mean of zero and variance of 0.005
Table 2. PSNR (dB) and SSIM values of watermarked images.
Table 2. PSNR (dB) and SSIM values of watermarked images.
IMAGEPSNRSSIM
W1W2W3W4W1W2W3W4
Image149.618749.155949.542149.78810.99570.99520.99650.9966
Image249.255749.134549.863749.75390.99500.99380.99770.9969
Image349.090649.637249.522349.55290.99550.99670.99580.9962
Image448.872249.129949.218848.86600.99720.99630.99710.9973
Image549.007548.783849.339349.28900.99640.99560.99740.9965
Image648.669049.095449.295848.95660.99460.99560.99490.9951
Image748.895649.255948.899749.01640.99570.99730.99540.9964
Image849.289449.174648.863448.83750.98410.98450.98460.9857
Image948.873649.134149.249448.89620.99400.99230.99420.9934
Image1049.146949.082549.313048.95080.99540.99490.99630.9939
Table 3. Average NCC and BER values of all the attacks corresponding to each image.
Table 3. Average NCC and BER values of all the attacks corresponding to each image.
IMAGENCCBER
W1W2W3W4W1W2W3W4
Image10.96640.93290.95010.94010.04640.03760.04220.0407
Image20.96550.93340.94800.94300.04780.03770.04420.0390
Image30.93900.87970.91450.89350.08510.07400.07670.0777
Image40.97330.94300.95850.95270.03760.03210.03570.0324
Image50.94510.89930.91870.90760.07470.05970.06930.0641
Image60.96720.94100.95460.94560.04600.03280.03870.0368
Image70.94240.89690.92130.91070.07540.05810.06470.0599
Image80.96320.93320.95130.94250.05050.03730.04130.0389
Image90.94860.90790.92870.91840.06940.05240.05980.0558
Image100.95030.90560.93200.92170.06760.05460.05800.0545
Table 4. Average NCC values considering all the watermarks corresponding to each attack.
Table 4. Average NCC values considering all the watermarks corresponding to each attack.
Image/
Attack
Image1Image2Image3Image4Image5Image6Image7Image8Image9Image10
Index01.00001.00001.00001.00001.00001.00001.00001.00001.00001.0000
Index10.76910.75110.73900.79060.64240.78610.71870.78510.70240.6909
Index21.00001.00000.97141.00001.00001.00000.99981.00001.00001.0000
Index30.82090.90390.76280.94950.83480.86190.62130.78440.75150.7896
Index40.99940.99910.95280.99970.99840.99960.99490.99951.00000.9962
Index50.99980.99960.95530.99960.99870.99920.99430.99900.99970.9961
Index60.91790.89100.84730.93940.80510.93010.85250.91500.86200.8397
Index70.84060.83130.79010.86510.75720.86860.80850.87680.79250.8385
Index80.92120.92700.90570.93770.93480.93450.94140.92450.92080.9381
Index90.94900.96750.90450.88660.92740.91390.89760.92900.90610.9239
Index100.99960.98780.93720.98270.95770.99710.98570.99370.98320.9636
Index111.00001.00000.97141.00001.00001.00000.99981.00001.00001.0000
Index121.00001.00000.97141.00001.00001.00000.99981.00001.00001.0000
Index130.94050.90140.87710.95940.82740.94210.87550.95390.89610.8662
Index141.00001.00000.96851.00000.99971.00000.99941.00001.00000.9984
Index151.00001.00000.95221.00000.99911.00000.99621.00001.00000.9974
Table 5. Average BER values considering all the watermarks corresponding to each attack.
Table 5. Average BER values considering all the watermarks corresponding to each attack.
Image/
Attack
Image1Image2Image3Image4Image5Image6Image7Image8Image9Image10
Index00.00000.00000.00000.00000.00000.00000.00000.00000.00000.0000
Index10.18260.19840.24440.16500.29520.17100.23380.17440.24320.2564
Index20.00000.00000.02310.00000.00000.00000.00020.00000.00000.0000
Index30.14480.07990.18480.04400.13310.11300.27130.17080.19150.1667
Index40.00040.00070.03780.00020.00130.00030.00400.00040.00010.0031
Index50.00010.00030.03560.00030.00110.00050.00460.00090.00030.0033
Index60.06470.08840.12840.04940.15860.05740.12010.06810.11200.1309
Index70.12300.13280.18660.10350.19450.10280.15140.09730.16550.1266
Index80.06360.05850.07540.05000.05210.05240.04680.06060.06360.0495
Index90.04080.02580.07700.09210.05900.06960.08280.05760.07630.0616
Index100.00030.00980.05020.01360.03380.00220.01150.00480.01320.0289
Index110.00000.00000.02310.00000.00000.00000.00020.00000.00000.0000
Index120.00000.00000.02310.00000.00000.00000.00020.00000.00000.0000
Index130.04730.08050.10040.03330.14140.04770.10170.03700.08400.1087
Index140.00000.00000.02550.00000.00020.00000.00050.00000.00000.0013
Index150.00000.00000.03830.00000.00070.00000.00310.00000.00000.0021
Table 6. Watermark embedding and extraction times of the schemes.
Table 6. Watermark embedding and extraction times of the schemes.
TimeProposedParah et al. [48]Zhang et al. [49]Zeng et al. [50]Su et al. [47]Elbasi et al. [26]
Embedding time0.30860.02460.30410.02790.02881.3742
Extraction time0.28950.00920.28370.00900.01440.9874
Total0.59820.03390.58780.03690.04322.3616
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ali, M. Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform. Appl. Sci. 2023, 13, 6105. https://doi.org/10.3390/app13106105

AMA Style

Ali M. Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform. Applied Sciences. 2023; 13(10):6105. https://doi.org/10.3390/app13106105

Chicago/Turabian Style

Ali, Musrrat. 2023. "Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform" Applied Sciences 13, no. 10: 6105. https://doi.org/10.3390/app13106105

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop