Next Article in Journal
Link and System-Level NOMA Simulator: The Reproducibility of Research
Next Article in Special Issue
MPEG and DA-AD Resilient DCT-Based Video Watermarking Using Adaptive Frame Selection
Previous Article in Journal
GicoFace: A Deep Face Recognition Model Based on Global-Information Loss Function
Previous Article in Special Issue
A New Blind Video Quality Metric for Assessing Different Turbulence Mitigation Algorithms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Zero Watermarking Based on DT-CWT and Quaternion for HDR Image

1
Faculty of Information Science and Engineering, Ningbo University, Ningbo 315211, China
2
College of Science and Technology, Ningbo University, Ningbo 315212, China
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(19), 2385; https://doi.org/10.3390/electronics10192385
Submission received: 28 August 2021 / Revised: 23 September 2021 / Accepted: 27 September 2021 / Published: 29 September 2021
(This article belongs to the Special Issue Theory and Applications in Digital Signal Processing)

Abstract

:
This paper presents a high dynamic range (HDR) image zero watermarking method based on dual tree complex wavelet transform (DT-CWT) and quaternion. In order to be against tone mapping (TM), DT-CWT is used to transform the three RGB color channels of the HDR image for obtaining the low-pass sub-bands, respectively, since DT-CWT can extract the contour of the HDR image and the contour change of the HDR image is small after TM. The HDR image provides a wide dynamic range, and thus, three-color channel correlations are higher than inner-relationships and the quaternion is used to consider three color channels as a whole to be transformed. Quaternion fast Fourier transform (QFFT) and quaternion singular value decomposition (QSVD) are utilized to decompose the HDR image for obtaining robust features, which is fused with a binary watermark to generate a zero watermark for copyright protection. Furthermore, the binary watermark is scrambled for the security by using the Arnold transform. Experimental results denote that the proposed zero-watermarking method is robust to TM and other image processing attacks, and can protect the HDR image efficiently.

1. Introduction

Since high dynamic range (HDR) imaging is able to capture the wide range of real-world lighting, the HDR image meets the high requirements for image quality and visual perception [1,2,3]. At present, the HDR image can be found in many applications, such as computer vision, broadcasting, surveillance, Internet of things (IOT), and so on [4,5]. However, during the transmission process, the HDR image may be copied and stolen by unauthorized users, and their copyright needs to be protected. Watermarking is security technology that can embed the copyright information into the HDR image for image protection [6,7].
Traditional watermarking methods need to embed a watermark into the original image, which will cause some damage to some extent [8,9]. However, any minor modification is not allowed on some special applications, such as military and judicial imaging. Thus, zero watermarking is proposed by mining key image features to obtain watermarking robustness without image distortion [10]. Hence, it can solve the contradiction between watermarking robustness and imperceptibility. Zhou et al. decomposed the image by using discrete wavelet transform (DWT), and then each DWT transformed block was decomposed by using SVD [11]. The maximum singular value was utilized to form a zero-watermark sequence with the copyright information. However, correlations of zero-watermark sequences constructed from different images are high, which means the uniqueness verification of zero watermark for different images is low. In order to increase uniqueness verification of zero watermark, Rao et al. used enhance SVD to generate a zero watermark [12]. Gao et al. used Bessel–Fourier with rotation invariance to compute a zero watermark, and the method was robust to compression, noise, and rotation attacks [13]. Han et al. decomposed the image by using non-subsampled shearlet transform (NSST), and then, each block was performed with LU decomposition to construct a zero watermark [14]. However, the above zero-watermarking methods were only designed for gray-scale images.
The color image has a rich color information, and its color channels have strong correlations, which can be mined for robust characteristics of the image. Zhu et al. designed a Schur and Contourlet transform based zero watermarking for the color image, but a zero watermark was constructed only in YCoCg space of the color image [15]. Zheng et al. utilized DWT and SVD to decompose RGB channels of the color image, respectively, for constructing a zero watermark, but correlations of three channels were missed [16]. To preserve the relationships of the three channels for extracting robust features, many researchers introduced multi-dimensional transformations, such as tensor and quaternion. In order to resist geometric attacks, Wang et al. selected quaternion-robust exponent moments (QEMs) of the color image to generate a zero watermark [17]. Yang et al. designed a computational strategy for fast generalized extreme complex exponential transform (QGPCET), and selected the mixed low-order moments in QGPCET coefficients to construct a zero watermark [18]. Jiang et al. constructed two three-dimensional tensors using R, G, B and gray channels and expanded them, respectively [19]. By performing SVD and DCT on the expanded matrix, the features representing the main information of the image were extracted to construct a robust zero watermark. However, the above zero-watermarking methods are all designed for the LDR image, and if they are directly applied in the HDR image, the special HDR image characteristics will be ignored for resisting special image attacks, such as tone mapping (TM). Since the HDR image has a wide dynamic range, the inner relationship of one channel is decreased. Moreover, most existing display devices are still used for LDR images, and have a limited dynamic range, and thus, the HDR image should be tone mapped [20,21]. Therefore, TM is an undoubtedly unique and inevitable image processing for HDR image watermarking to be considered when copyright of the HDR image should be protected.
Recently, some robust HDR image watermarking methods were researched. Guerrini et al. used DWT to decompose the image, and then utilized quantized exponential modulation (QEM) to embed the watermark [22]. However, the robustness of that method was not high. Solachidis et al. successively embedded a watermark into LDR image sequences with different exposures in the DWT domain [23]. The idea of embedding a watermark many times obtains high robustness, but it causes the decline of invisibility at the same time. Considering that the structure of the image is stable after TM processing, nonsubsampled contourlet transform and SVD were successively operated on the HDR image to extract the associated structural features for data embedding [24]. Moreover, a hybrid perceptual mask was used to increase the imperceptibility. In order to mine strong correlations of the HDR image, Luo et al. used Tucker decomposition to transform the HDR image to embed a robust watermark, which is robust to varieties of TM attacks [25]. However, the above HDR image watermarking methods need to obtain high robustness, and the corresponding visual quality is decreased. To achieve the tradeoff between watermarking robustness and invisibility, the HDR image zero watermarking is suitable to copyright protection of the HDR image without any quality distortion.
TM processing on the HDR image causes loss of color, brightness, and texture [26], and thus, features extracted from the HDR image should resist those large changes for the zero-watermark construction. In general, after TM, the contour of the HDR image changes a little, and it can be extracted by performing dual tree complex wavelet transform (DT-CWT) [27]. In this paper, a novel zero-watermarking method based on DT-CWT, quaternion fast Fourier transform (QFFT), and quaternion singular value decomposition (QSVD) for the HDR image is presented. For extracting robust contour information, RGB channels are decomposed by DT-CWT to compute three low-pass sub-bands, respectively. In order to mine correlations of three channels, those three low-pass sub-bands are considered as a whole to be transformed by using QFFT and QSVD to compute the largest singular value for extracting robust features. The XOR operation is applied between robust features and the copyright watermark to generate a zero watermark. Experimental results prove that the proposed method is robust to TM and image processing attacks.
The main contributions of the paper are listed as follows.
  • A novel robust DT-CWT-, QFFT-, and QSVD-based zero-watermarking method for the HDR image is presented.
  • Since the contour of the HDR image has not changed much after TM operation, DT-CWT is used to extract the contour information.
  • Three color channels of the HDR image are considered as a whole to be transformed by using QFFT and QSVD for extracting robust image features.
The remainder of the paper is organized as follows. DT-CWT, QFFT, and QSVD are introduced in Section 2. The proposed zero-watermarking method for the HDR image is depicted in Section 3. The experimental results and discussion are given in Section 4. In Section 5, we draw a conclusion.

2. Preliminary

In this section, DT-CWT, QFFT, and QSVD are introduced.

2.1. Dual Tree Complex Wavelet Transform (DT-CWT)

DT-CWT is an enhancement of DWT [27], and it has the properties of shift invariance and multi-directions. Two independent wavelet filter trees are operated on the same original signal, and two real dual tree wavelet coefficients are used to compute complex wavelet coefficients:
F a + F b i
where i is the imaginary operator, Fa and Fb are coefficients of two trees, respectively, and these coefficients generate six directionally selective sub-bands at approximately ±15°, ±45°, and ±75°.
Figure 1 shows that the two-dimensional signal is decomposed by using four-level DT-CWT. For the structure of DT-CWT, F l L is the low-pass sub-band, and F l , D H is the dth high-pass sub-band, where l is the level of transformation, l = 1, 2, 3, 4, d represents the direction, and d = 1, 2, 3, 4, 5, 6. When we decompose three color channels of the HDR image by using four-level DT-CWT, three low-pass sub-bands are computed and denoted as F 4 , R L , F 4 , G L , and F 4 , B L , respectively. Figure 2 shows three low-pass sub-bands of the original HDR image ‘Rend13′, and it is clearly seen that the low-pass sub-bands show the main contour information of the image. Moreover, the low-pass band is invariant to small geometric change. Thus, it can be used to compute stable features for robust zero watermarking.

2.2. Quaternion Fast Fourier Transform (QFFT)

Before introducing QFFT, the quaternion is represented as the generalization of a complex number, and it can be denoted as:
q = q r + q i i + q j j + q k k
where i, j, and k are imaginary operators and qr, qi, qj, and qk are real.
When three low-pass sub-bands are extracted for the color HDR image, to mine correlations of three channels, they can be used to represent the whole image in quaternion form as:
F 4 L = F 4 , R L i + F 4 , G L j + F 4 , B L k
where the real value is set to 0.
In 1996, Sangwine was the first to propose the quaternion Fourier transform applied in the three-dimensional matrices [28]. For the F 4 , R L (a,b), where (a,b) is the coefficient location in the low-pass sub-band, its generalized fast Fourier transform (FFT) and its reverse are as follows:
K R s , t   = 1 M N a = 0 M 1 b = 0 N 1 e μ 2 π a s M + b t N F 4 , R L a , b
F 4 , R L a , b   = 1 M N s = 0 M 1 t = 0 N 1 e μ 2 π a s M + b t N K R s , t
where M and N are the width and length of the low-pass sub-band, respectively, μ is unit pure quaternion, μ 2 = 1 , and μ = i + j + k / 3 .
Similarly, F 4 , G L and F 4 , B L can be transformed by using FFT to obtain K G   and K B , respectively:
K G s , t   = F F T F 4 , G L   = 1 M N a = 0 M 1 b = 0 N 1 e μ 2 π a s M + b t N F 4 , G L a , b
K B s , t   = F F T F 4 , B L   = 1 M N a = 0 M 1 b = 0 N 1 e μ 2 π a s M + b t N F 4 , B L a , b
Considering three low-pass sub-bands of the HDR color image as a whole, the quaternion fast Fourier transform (QFFT) of F 4 L and its reverse are:
K s , t   =   K R s , t i + K G s , t j + K B s , t k
F 4 L a , b   =   ( F 4 , R L a , b ) i + ( F 4 , G L a , b ) j + ( F 4 , B L a , b ) k

2.3. Quaternion Singular Value Decomposition (QSVD)

For any quaternion matrix B, an efficient SVD is proposed by Sangwine et al. [29], and a bidiagonal matrix Y is computed by bidiagonalizing B with quaternion Householder transformations and a simple recursive technique. The singular values of Y and B are same, and the bidiagonalization of B can be represented by:
R B W = Y
where R and W are the left and right quaternion Householder matrices, respectively. Because R and W are unitary, it satisfies: Y = R ¯ T B W ¯ T . Suppose U and V are orthogonal matrices, and the SVD of Y can be presented by Y = U S V T . Thus, the SVD of quaternion matrix B is computed as follows:
A = H ¯ T U S V T G ¯ T
where H ¯ T U and V T G ¯ T are unitary matrices, S = D(σ1, σ2, … , σn), σ1σ2 ≥ … ≥ σn are eigenvalues of B, n is the singular number, and D(•) constructs a diagonal matrix. The singular values represent the main correlations of the given matrix. In particular, the maximum singular value σ1 contains the main energy and has strong stability.
Since QFFT and QSVD combine three channels to be transformed, strong correlations of the HDR color image are maintained for robust zero watermarking.

3. Proposed HDR Image Zero Watermarking

In this section, a novel DT-CWT and quaternion-based zero watermarking for the HDR image is described. The binary watermark as the copyright information is denoted as W with the size of P × P, and three RGB channels are denoted as fR, fG, and fB, respectively. The detailed processes of zero-watermark construction and verification are depicted, respectively.

3.1. Construction of Zero Watermark

The processes of zero-watermark construction are illustrated in Figure 3.
Step a-1. With a private key, the Arnold transform is utilized to scramble W to obtain W0:
W 0 = A r n o l d W
where Arnold(•) is the Arnold transform.
Step a-2. fR, fG, and fB are decomposed by using four-level DT-CWT to obtain F 4 , R L , F 4 , G L , and F 4 , B L , respectively.
Step a-3. F 4 , R L , F 4 , G L , and F 4 , B L are combined and represented in a pure quaternion F 4 L , and QFFT is applied on F 4 L to obtain K s , t .
Step a-4. K s , t is divided into non-overlapping blocks Bx, where x is the block index and its size is c × c. Only P × P + 1 blocks are randomly selected to construct a zero watermark with private key k2. The diagonal matrix Sx is computed by applying QSVD on Bx, and σ1,x of each block is extracted.
Step a-5. All maximum singular values σ1,x of all blocks are computed, and then the feature matrix T is calculated by comparing σ1,x and σ1,x+1:
T x =   1                         i f   σ 1 , x + 1 > σ 1 , x       0                                       o t h e r s                      
Step a-6. Zero watermark WM is computed:
W M = T W 0
Step a-7. For protecting copyright, WM, k1 and k2 are registered in a third-part intellectual property rights (IPR) database.

3.2. Verification of Zero Watermark

Figure 4 shows processes of zero-watermark extraction for copyright verification, which is symmetric to the zero-watermark construction. Let f* be the HDR image to be verified, which may be under some image attacks.
Step b-1. Four-level DT-CWT is used to decompose the three channels of f* to obtain three low-pass sub-bands, denoted as F 4 , R L , F 4 , G L , and F 4 , B L , respectively.
Step b-2. F 4 , R L , F 4 , G L , and F 4 , B L are combined as a pure quaternion F 4 L , which is transformed by using QFFT to compute K u , v .
Step b-3. K u , v is divided into non-overlapping blocks B*x, and P × P + 1 blocks are selected to compute a zero watermark with the private key k2. B*x is decomposed by using QSVD to compute the diagonal matrix S*x, and its maximum singular value σ*1,x of each block is calculated.
Step b-4. The feature matrix T* is constructed by comparing σ*1,x and σ*1,x+1:
T x =   1                         i f   σ 1 , x + 1 > σ 1 , x       0                                               o t h e r s                      
Step b-5. WM and T* are computed by using the exclusive-or operation to obtain W*0:
W 0 = T W M
Step b-6. The inverse Arnold transform is performed on W*0 to compute W*.
Step b-7. W* and W are compared for the copyright verification.
The proposed watermarking method is designed for HDR images in RGB format since the three RGB channels have strong correlations, which can be mined for robust features. However, the proposed method is not suitable for other color formats, and especially not the three-color channel formats, such as LHS format.

4. Experimental Results and Discussions

Eight HDR images are used to be tested as illustrated in Figure 5, and the binary watermark is illustrated in Figure 6. The robustness is evaluated by the bit error rate (BER) [30] is defined as follows:
B E R = N e N t  
where Ne is the wrong bits number of the extracted watermark and Nt is the correct bits number of the watermark.

4.1. Zero-Watermark Uniqueness

A zero watermark generated from one HDR image should be unique and irrelevant to other HDR images for copyright protection. Normalized cross-correlation (NC) is utilized to compute the difference between two zero-watermark images:
N C = i j W 1 i , j W 2 i , j i j W 1 2 i , j i j W 2 2 i , j
where W1 and W2 represent two zero-watermark images, respectively.
Table 1 shows the NCs of zero-watermark images. The maximum NC is less than 0.6, which denotes that the zero watermark from one HDR image is distinguishable from those of other images and can prove the uniqueness of a zero watermark.

4.2. Robustness of Zero Watermarking

In order to show the robustness of the proposed method, TM and common image processing are used for testing.

4.2.1. Robustness on TM Attack

BERs of the proposed method for eight images attacked by 15 different TMs are computed, as shown in Table 2. It is clearly seen that for most of the TM attacks, all BERs of the proposed method are lower than 0.75, which reflects the efficiency of the copyright protection. For Durand and Fattal TM attacks, most of the BERs are a little higher than those of other TMs, and but can still play an important role in copyright protection. Moreover, the average BERs of all TMs are all lower than 0.08, which proves the high robustness of the proposed method for the TM attack.
Figure 7 shows watermark extraction, when Rend01 is attacked by different TMs. Obviously, from the extracted watermark, we can know the copyright of the HDR image. Moreover, we can see that the corresponding NC is high, which means that the extracted watermark is similar to the original watermark. This is mainly because DT-CWT can extract the contour information, and QFFT and QSVD mine strong correlations of the HDR image efficiently.

4.2.2. Robustness on Common Image Processing

To show the capability of resisting other attacks, some common image processing attacks are also used for testing, as listed in Table 3. Table 4 shows that the BERs of the eight HDR images are all less than 20%, which means that the proposed method has the ability of copyright protection for resisting common image processing attacks. Furthermore, averages of BER are all below 6% for all images, which again denotes the high robustness of the proposed method.
After different image processing attacks were operated on Rend01, the watermark was extracted visually, as illustrated in Figure 8. All extracted watermark can be recognized for proving the copyright information. Similar results were obtained for other HDR images, and it proves that the proposed method can resist common image processing attacks well.

4.3. Robustness Comparisons

In this section, Jiang’s [19] and Bai’s [24] methods were used and compared; moreover, under different TM attacks, corresponding BERs are computed, as shown in Table 5. Most BERs of the proposed method are less than those of other comparative methods. Although for Ashikhmin, Mertens, and Durand, the proposed method is a little lower than Bai’s [24], and is worse than Jiang’s [19] for WardGlobal, considering all TM attacks, the average BER is much lower than those of the other two methods. Thus, based on the above experimental results, the proposed method can obtain higher robustness and protect the HDR image more efficiently.

5. Conclusions

In this paper, based on dual tree complex wavelet transform (DT-CWT), quaternion fast Fourier transform (QFFT), and quaternion singular value decomposition (QSVD), a novel high dynamic range (HDR) image zero watermarking method has been presented. Since most tone mapping (TM) operations preserve the contour information of the image, the three RGB channels are transformed by using DT-CWT to extract low-pass sub-bands for the main contour, respectively. To extract the main correlations of the three channels of the HDR image, three low-pass sub-bands are considered as a whole to be decomposed by using QFFT, and are then divided into non-overlapping blocks. Each QFFT transformed block is decomposed by QSVD to obtain the maximum singular value for constructing a binary feature image, which is used with a binary watermark to generate a zero watermark. The experimental results prove that the proposed method has the ability to resist different TMs and image processing attacks, and is superior to the existing zero-watermarking methods. Since deep learning works well on feature extraction, in future research, we will use deep networks to mine features for constructing a robust zero watermark.

Author Contributions

Conceptualization, S.S.; Supervision, T.L.; Writing—original draft, J.H.; Writing—review and editing, J.H., S.S., Z.H. and T.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

This work was supported by the Natural Science Foundation of China under Grant No. 61971247. It was also sponsored by the K. C. Wong Magna Fund in Ningbo University.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, Z.; Lin, W.; Li, X.; Rao, Q.; Jiang, T.; Han, M.; Liu, S. ADNet: Attention-guided deformable convolutional network for high dynamic range imaging. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA, 19–25 June 2021; pp. 463–470. [Google Scholar]
  2. Zhang, J.; Newman, J.P.; Wang, X.; Thakur, C.S.; Rattray, J.; Etienne-Cummings, R.; Wilson, M.A. A closed-loop, all-electronic pixel-wise adaptive imaging system for high dynamic range videography. IEEE Trans. Circuits Syst. I Regul. Pap. 2020, 67, 1803–1814. [Google Scholar] [CrossRef]
  3. Woo, S.M.; Ryu, J.H.; Kim, J.O. Ghost-Free Deep High-Dynamic-Range Imaging Using Focus Pixels for Complex Motion Scenes. IEEE Trans. Image Process. 2021, 30, 5001–5016. [Google Scholar] [CrossRef] [PubMed]
  4. Pan, Z.; Yu, M.; Jiang, G.; Xu, H.; Peng, Z.; Chen, F. Multi-exposure high dynamic range imaging with informative content enhanced network. Neurocomputing 2020, 386, 147–164. [Google Scholar] [CrossRef]
  5. Huang, Y.; Qiu, S.; Wang, C.; Li, C. Learning Representations for High-Dynamic-Range Image Color Transfer in a Self-Supervised Way. IEEE Trans. Multimed. 2020, 23, 176–188. [Google Scholar] [CrossRef]
  6. Fares, K.; Amine, K.; Salah, E. A robust blind color image watermarking based on Fourier transform domain. Optik 2020, 208, 164562. [Google Scholar] [CrossRef]
  7. Hsu, L.Y.; Hu, H.T. Blind watermarking for color images using EMMQ based on QDFT. Expert Syst. Appl. 2020, 149, 113225. [Google Scholar] [CrossRef]
  8. Hu, H.T.; Hsu, L.Y.; Chou, H.H. An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated. Inf. Sci. 2020, 519, 161–182. [Google Scholar] [CrossRef]
  9. Ali, M.; Ahn, C.; Pant, M.; Kumar, S.; Singh, M.; Saini, D. An optimized digital watermarking scheme based on invariant DC coefficients in spatial domain. Electronics 2020, 9, 1428. [Google Scholar] [CrossRef]
  10. Wen, Q.; Sun, T.; Wang, S. Concept and application of zero-watermark. Acta Electron. Sin. 2003, 31, 214–216. [Google Scholar]
  11. Zhou, Y.; Jin, W. A novel image zero-watermarking scheme based on DWT-SVD. In Proceedings of the 2011 International Conference on Multimedia Technology, Hangzhou, China, 26–28 July 2011; pp. 2873–2876. [Google Scholar]
  12. Rao, Y.R.; Nagabhooshanam, E. A novel image zero-watermarking scheme based on DWT-BN-SVD. In Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, India, 27–28 February 2014; pp. 1–6. [Google Scholar]
  13. Gao, G.; Jiang, G. Bessel-Fourier moment-based robust image zero-watermarking. Multimed. Tools Appl. 2015, 74, 841–858. [Google Scholar] [CrossRef]
  14. Han, S.C.; Zhang, Z.N. A novel zero-watermark algorithm based on LU decomposition in NSST domain. In Proceedings of the 2012 IEEE 11th International Conference on Signal Processing, Beijing, China, 21–25 October 2012; Volume 3, pp. 1592–1596. [Google Scholar]
  15. Zhu, C.W.; Li, Y.Y.; Chi, W.D.; Gao, S.; Fan, D. Zero-watermarking Algorithm for Color Image in Contourlet Domain Based on Schur Decomposition. Inf. Technol. Informatiz. 2019, 2, 89–93. [Google Scholar]
  16. Zheng, Q.; Liu, N.; Cao, B.; Wang, F.; Yang, Y. Zero-watermarking algorithm in transform domain based on RGB channel and voting strategy. J. Inf. Process. Syst. 2020, 16, 1391–1406. [Google Scholar]
  17. Wang, C.P.; Wang, X.Y.; Xia, Z.Q.; Zhang, C.; Chen, X.J. Geometrically resilient color image zero-watermarking algorithm based on quaternion exponent moments. J. Vis. Commun. Image Represent. 2016, 41, 247–259. [Google Scholar] [CrossRef]
  18. Yang, H.Y.; Qi, S.R.; Niu, P.P.; Wang, X.Y. Color image zero-watermarking based on fast quaternion generic polar complex exponential transform. Signal Process. Image Commun. 2020, 82, 115747. [Google Scholar] [CrossRef]
  19. Jiang, F.; Gao, T. A robust zero-watermarking algorithm for color image based on tensor mode expansion. Multimed. Tools Appl. 2020, 79, 7599–7614. [Google Scholar] [CrossRef]
  20. Jia, Y.; Zhang, W. Efficient and adaptive tone mapping algorithm based on guided image filter. Int. J. Pattern Recognit. Artif. Intell. 2020, 34, 2054012. [Google Scholar] [CrossRef]
  21. Mohammadi, P.; Pourazad, M.T.; Nasiopoulos, P. A Perception-based Inverse Tone Mapping Operator for High Dynamic Range Video Applications. IEEE Trans. Circuits Syst. Video Technol. 2020, 31, 1711–1723. [Google Scholar] [CrossRef]
  22. Guerrini, F.; Okuda, M.; Adami, N.; Leonardi, R. High dynamic range image watermarking robust against tone-mapping operators. IEEE Trans. Inf. Forensics Secur. 2011, 6, 283–295. [Google Scholar] [CrossRef] [Green Version]
  23. Solachidis, V.; Maiorana, E.; Campisi, P. HDR image multi-bit watermarking using bilateral-filtering-based masking. In Image Processing: Algorithms and Systems XI; International Society for Optics and Photonics: Bellingham, WA, USA, 2013; Volume 8655, p. 865505. [Google Scholar]
  24. Bai, Y.; Jiang, G.; Yu, M.; Peng, Z.; Chen, F. Towards a tone mapping-robust watermarking algorithm for high dynamic range image based on spatial activity. Signal Process. Image Commun. 2018, 65, 187–200. [Google Scholar] [CrossRef]
  25. Luo, T.; Jiang, G.; Yu, M.; Xu, H.; Gao, W. Robust high dynamic range color image watermarking method based on feature map extraction. Signal Process. 2019, 155, 83–95. [Google Scholar] [CrossRef]
  26. Rana, A.; Singh, P.; Valenzise, G.; Dufaux, F.; Komodakis, N.; Smolic, A. Deep tone mapping operator for high dynamic range images. IEEE Trans. Image Process. 2019, 29, 1285–1298. [Google Scholar] [CrossRef] [Green Version]
  27. Huan, W.; Li, S.; Qian, Z.; Zhang, X. Exploring Stable Coefficients on Joint Sub-bands for Robust Video Watermarking in DT CWT Domain. IEEE Trans. Circuits Syst. Video Technol. 2021. [Google Scholar] [CrossRef]
  28. Ell, T.A.; Sangwine, S.J. Hypercomplex Fourier transforms of color images. IEEE Trans. Image Process. 2006, 16, 22–35. [Google Scholar] [CrossRef]
  29. Sangwine, S.J.; Le Bihan, N. Quaternion singular value decomposition based on bidiagonalization to a real or complex matrix using quaternion Householder transformations. Appl. Math. Comput. 2006, 182, 727–738. [Google Scholar] [CrossRef] [Green Version]
  30. Wang, C.P.; Wang, X.Y.; Chen, X.J.; Zhang, C. Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping. Multimed. Tools Appl. 2017, 76, 26355–26376. [Google Scholar] [CrossRef]
Figure 1. Four-level DT-CWT decomposition.
Figure 1. Four-level DT-CWT decomposition.
Electronics 10 02385 g001
Figure 2. Low-pass sub-bands after four-level DT-CWT.
Figure 2. Low-pass sub-bands after four-level DT-CWT.
Electronics 10 02385 g002
Figure 3. Flowchart of zero-watermark construction.
Figure 3. Flowchart of zero-watermark construction.
Electronics 10 02385 g003
Figure 4. Flowchart of zero-watermark verification.
Figure 4. Flowchart of zero-watermark verification.
Electronics 10 02385 g004
Figure 5. Original HDR images.
Figure 5. Original HDR images.
Electronics 10 02385 g005
Figure 6. Original watermark (64 × 64).
Figure 6. Original watermark (64 × 64).
Electronics 10 02385 g006
Figure 7. Extracted watermark from Rend01 under different TMs.
Figure 7. Extracted watermark from Rend01 under different TMs.
Electronics 10 02385 g007
Figure 8. Extracted watermark from Rend01 under different image processing attacks.
Figure 8. Extracted watermark from Rend01 under different image processing attacks.
Electronics 10 02385 g008
Table 1. NCs between generated zero-watermark images [%].
Table 1. NCs between generated zero-watermark images [%].
ImageRend08ApartmentRend09Rend10Rend13AtriumNightBottlesRend01
Rend08100.0051.4250.6353.8551.7650.6452.1654.21
Apartment51.42100.0056.4354.9157.6154.2650.1054.59
Rend0950.6356.43100.0052.7054.4652.3554.0454.32
Rend1053.8554.9152.70100.0053.0052.1654.0449.56
Rend1351.7657.6154.4653.00100.0050.2653.8955.02
AtriumNight50.6454.2652.3552.1650.26100.0054.3052.41
Bottles52.1650.1054.0454.0453.8954.30100.0053.52
Rend0154.2154.5954.3249.5655.0252.4153.52100.00
Table 2. BERs of HDR images while under TM attacks [%].
Table 2. BERs of HDR images while under TM attacks [%].
Rend08ApartmentRend09Rend10Rend13AtriumNightBottlesRend01
Krawczyk8.6413.671.3910.810.082.379.502.00
Gamma8.1813.333.084.595.965.376.323.05
Ashikhmin6.867.936.8410.827.428.5411.046.13
Logarithmic1.511.811.102.343.052.221.730.12
Mertens10.1813.384.139.218.427.7910.426.45
WardGlobal0.000.000.831.682.321.560.000.00
WardHistAdj3.223.644.524.005.305.865.304.27
LischinskiTMO2.037.131.983.274.883.154.960.07
ReinhardDevlin3.206.324.399.186.646.747.253.25
Raman6.187.763.135.206.525.799.574.79
Drago3.835.572.784.885.625.666.232.78
TumblinRushmeier2.763.152.295.544.614.054.663.39
Ferwerda0.020.220.120.270.090.120.710.00
Durand14.9416.3917.6020.2719.5116.2815.4317.65
Fattal10.6710.9111.0418.4812.489.9111.7918.16
Average5.487.414.347.366.595.696.994.18
Table 3. List of common image processing attacks.
Table 3. List of common image processing attacks.
NumberCommon AttacksNumberCommon Attacks
CIA1‘Salt & Pepper’ (0.001)CIA7Poisson noise
CIA2Median filter (3 × 3)CIA8Image sharpen (0.5)
CIA3Median filter (5 × 5)CIA9Average filter (4 × 4)
CIA4Scaling (4)CIA10Imrotate (2)
CIA5Scaling (1/4)CIA11Gaussian noise
CIA6Gaussian low-pass filter (3 × 3)CIA12Imadjust
Table 4. BERs of HDR images under common image processing [%].
Table 4. BERs of HDR images under common image processing [%].
Rend08ApartmentRend09Rend10Rend13AtriumNightBottlesRend01
CIA15.4010.793.748.428.675.307.1310.87
CIA20.560.760.852.860.322.120.611.59
CIA31.731.591.813.660.904.221.904.52
CIA40.020.000.000.020.020.000.000.02
CIA50.020.000.000.040.050.000.000.07
CIA60.490.120.120.460.510.120.220.29
CIA76.0110.301.372.124.202.492.370.34
CIA86.0810.601.592.514.372.832.420.56
CIA90.900.440.461.341.200.340.982.27
CIA1015.6514.2310.7215.979.0611.2417.8718.53
CIA112.592.371.712.862.392.392.814.27
CIA125.9810.301.372.124.206.152.360.34
Average4.865.832.674.432.994.314.323.87
Table 5. Robustness comparisons on TM attacks [%].
Table 5. Robustness comparisons on TM attacks [%].
Attack TypeJiang’s [19]Bai’s [24]Proposed
BERBERBER
Krawczyk11.3511.046.80
Gamma12.2912.346.23
Ashikhmin16.496.978.19
Logarithmic11.326.871.73
Mertens16.556.158.74
WardGlobal0.535.600.80
WardHistAdj12.907.074.51
LischinskiTMO12.875.383.43
ReinhardDevlin14.8011.995.87
Raman17.659.646.11
Drago12.846.854.66
TumblinRushmeier12.158.093.80
Ferwerda0.615.920.19
Durand23.796.6617.25
Fattal16.7413.8912.93
Average11.358.296.08
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Huang, J.; Shi, S.; He, Z.; Luo, T. A Novel Zero Watermarking Based on DT-CWT and Quaternion for HDR Image. Electronics 2021, 10, 2385. https://doi.org/10.3390/electronics10192385

AMA Style

Huang J, Shi S, He Z, Luo T. A Novel Zero Watermarking Based on DT-CWT and Quaternion for HDR Image. Electronics. 2021; 10(19):2385. https://doi.org/10.3390/electronics10192385

Chicago/Turabian Style

Huang, Jiangtao, Shanshan Shi, Zhouyan He, and Ting Luo. 2021. "A Novel Zero Watermarking Based on DT-CWT and Quaternion for HDR Image" Electronics 10, no. 19: 2385. https://doi.org/10.3390/electronics10192385

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop