Next Article in Journal
Developing PCM-Based Microwave and Millimetre-Wave Switching Networks by Optimised Building Blocks
Previous Article in Journal
Synthesis of Low Sidelobe Pattern with Enhanced Axial Radiation for Sparse Conformal Arrays Based on MCDE Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust, Secure and Semi-Blind Watermarking Technique Using Flexible Scaling Factor in Block-Based Wavelet Algorithm

College of Engineering and Technology, American University of the Middle East, Egaila 54200, Kuwait
*
Authors to whom correspondence should be addressed.
Electronics 2022, 11(22), 3680; https://doi.org/10.3390/electronics11223680
Submission received: 12 October 2022 / Revised: 6 November 2022 / Accepted: 7 November 2022 / Published: 10 November 2022
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
Multimedia security has received much attention recently because of the rapid transmission of elements such as text, images, audio, video, software, animation and games. Security is becoming especially critical for content owners concerned about the illegal usage of their original products. Encryption and watermarking are two methodologies for digital applications. Spatial domain and frequency domain watermarking algorithms give very promising results in embedding binary images into the cover images. This paper proposed a new method of semi-blind watermarking technique. The digital images are divided into 4 × 4 blocks and converted into discrete Wavelet transformations (DWTs). The binary image is embedded into each block using the flexible scaling factor method. Experimental results show that the proposed method has higher peak signal to noise ratio (PSNR) and similarity ratio (SR) values compared to the standard Wavelet transformation and block-based Wavelet algorithms. The results prove that the proposed hybrid algorithm is more effective, robust, secure and resistant than DWT and block-based DWT algorithms.

1. Introduction

Over the past decade, with the rapid increase and advancement of technology and the internet, along with the distribution and transformation of digital data (audio, image, video, etc.), in addition to the vast spread of illegal replication of multimedia data, many studies have been conducted and several watermarking schemes have been proposed to protect the copyright information and ownership of the digital data [1,2]. Digital watermark technology is used to secure and protect the owner’s copyright, infringement and manipulation by verifying the authenticity of the digital data [3]. There are many challenges facing digital watermarking including robustness, variations of watermarks, speedy embedding techniques, image types, color and file format. The receiver of the digital data validates the original data along with watermarking using the watermarking technique. Similarly to watermarking there is another methodology used to hide confidential data in a text or image named Steganography [4].
The technology of digital watermarking has many applications in the labeling of user information, certification, distribution, protection and anti-counterfeit of digital media. In terms of copyright, there are many techniques that can be used as copyright protection by embedding imperceptible copyright information in the multimedia data, such as logo, image, text or the serial number of the author. The application of watermarking in different data types results in different techniques. For example, embedding a digital watermarking to an image is known as image watermarking, to a video stream is known as video watermarking or to a pdf or other text documents is known as text watermarking. This technique requires special readers or detectors to detect and validate the data or provide certification [5]. There are three different types of digital watermarking, namely fragile, semi-fragile and robust watermarking. Fragile watermarking is utilized in data forgery detection by identifying any modification to the data. On the other hand, semi-fragile watermarking is utilized in data authentication and recovery by susceptible malicious attacks. Robust watermarking is generally used in copyright authentication due to its ability to resist most attacks [6]. Methods used for extracting watermarks are classified into two techniques, namely blind and semi-blind watermarking. A technique is called blind watermarking if only the secret key is required for extracting the watermark. The technique is called semi-blind watermarking if both the secret key and the watermarked image are used for extracting the watermark [7,8].
The remainder of the paper is organized as follows: Section 2 presents background reading and related work. To provide a deeper understanding of this area, Section 3 introduces methodologies. Section 4 introduces the proposed methodology. Section 5 presents the experimental results. Finally, the paper concludes with Section 6 focusing on the contribution along with a future recommendation. The next section discusses the related work.

2. Related Work

Many methods and techniques have been developed and applied for watermarking. In this section we are mentioning some of the work developed by researchers, mainly related to our work. Singular value decomposition (SVD) and frequency domain were used in several watermarking schemes [9,10,11]. Makbol et al. [12] adopted the redundant Wavelet transform (RDWT)-SVD to obtain a singular values S which is used to embed the watermark. Ernawan et al. [2] proposed a watermarking scheme using RDWT-SVD to determine the embedding regions with less distortion. The proposed scheme used Arnold transform to scramble the watermark image, which sequentially increased the computational cost to accomplish extra security. The author in [4] proposed the development of a Discrete Wavelet Transform (DWT) by embedding the digital watermark in the primitive image, then withdrawing the watermark from the watermarked images using Xilinx System Generator. The proposed model aims to minimize complexity, resource utilization and robustness. Li et al. [13] proposed an FrFt scheme that includes two phases for multiple image encryption, where the first phase generated keys will be used in the second phase to recover the data and keys; a contrary process, reverse FFT decryption, is used.
In [6], the author proposed an improvement to the fragile watermarking using Local Binary Pattern (LBP). The proposed model uses the least significant bits technique to embed the watermarking in the cover image; it embeds 2–3 bit watermark into the rough block and 1–2 bit watermark into the smooth block. The aim of the proposed model was to use the least amount of watermark embedding to achieve a high level of image quality and protection. Kumar et al. in [14] proposed a semi-blind watermarking scheme for digital images using the Bat Algorithm (BA). The results show good peak signal to noise ratio (PSNR) and low normalized correlation (NC) compared to the same hybrid combination with firefly optimization. The Quick Response (QR) code was used as a watermark in [15], which proposes a blind watermarking scrambling the QR through Arnold transform before implanting the hidden information in the host signal. Different metrics were used to check the imperceptibility and to verify the robustness such as similarity index measure (SSIM), NC and Bit Error Rate.
Lichao et al. [16] proposed a blind watermarking system using the deep learning model; two noise layers are proposed to improve the robustness. The watermark is embedded and extracted using the encoder and decoder of the model. This system is close to the PSNR watermarking method and the proposed model shows improvement in robustness, image rotation, clipping and compression. Ahuja et al. [17] proposed a copyright protection model using a blind video watermarking algorithm, the proposed model uses MPEG-2 style to embed the watermarking information by alternating the value of the DCT coefficients during the encoding phase. Three parameters were tested: robustness, perceptibility and elapsed time for embedding the watermark. The results showed some improvement in watermarking attacks, compression attacks, noise attacks and frame-specific attacks. Yıldıray et al. [18] proposed an improvement to strengthen the LSB steganography technique by using a mask to decrease the number of changes on the image by concealing the personal information on the image, allowing an increment in the amount of data to be hidden and minimizing the distortion on the image. The authors in [19] proposed insertion of the watermark image on the edge position of the host or the original image. The proposed model identifies the edge pixel; then these pixels will be converted into binary and the logo image will be embedded and finally the image will be constructed. The proposed model used the edge detection algorithm which detects any local change in the image intensity for inserting the original image into the reference image. The PSNR and Jaccard functions are used for quality measures for images. In [20], the authors proposed an audio blind watermarking algorithm called zero-watermarking seeking the audio frame suitable for the embedded watermark using scrambling encryption based on BTC, Arnold and chaos encryption. The proposed algorithm combines the zero-passing rate and short-time energy characteristics of the audio frame, the aim of the algorithm was to determine the watermarking embedding strength and the average energy of each segment.
Garg et al. [21] proposed a frequency domain transform model to be used as a blind watermarking technique, in this model the Artificial Bee Colony (ABC) was used for optimization purposes. The aim of the ABC technique was to find the best embedding factor for watermarking, this technique required only the watermarked image extraction, therefore it makes the proposed model a blind watermarking technique. The proposed model combined the Discrete Wavelet Transform (DWT) and the Discrete Cosine Transform (DCT), constructing a hybrid method for embedding and providing a better robustness scheme. Finally, the watermark encrypted image was embedded into the cover image. In [22] the authors proposed a watermarking framework based on Deep Neural Network (DNN), where the network outputs the image with a certain watermark. The proposed model validates the ownership of the image by identifying the network that generated the image. A secret key technique was used to control the watermark extraction to improve the security of the watermarking system; the authors proposed an additional step during the neural network training by adding noise to the generated image to resist attacks and improve robustness. Wang et al. [23] proposed an improved encryption algorithm based on the Low-Density Prity Check Code (LDPC) by expanding the key space aiming to reduce the bit error rate and improve the security of the system. The proposed model shows that even if the encryption of the carrier image is illegally cracked, copyright protection still functions by extracting the watermark.
In [24], the authors proposed double encryption using Arnold transform and Memristive Chaotic Oscillators (MCO) as digital watermarking technique. The proposed model used the Arnold Transform and the coefficients resulted from the MCO based on discrete cosine coefficient modification to embed the watermark based on fractal dimensions extracted using Higuchi’s algorithm followed by the pixel transformation. The extreme learning machine was used as a semi-blind extraction of the watermark. Sharma et al. in [25] proposed a dual watermarking model for copyright protection by using the owner’s fingerprint in addition to the signature as watermarks to validate the ownership and authority of the media. The authors proposed two different watermarks; if one is compromised the other one will be a safeguard to the media. For watermark embedding purposes, the coefficient selection procedure is modified in equal proportions in addition to using the DWT, DCT for the embedding block selection procedure. The proposed model operates only on tone/greyscale images and multitoned images.
Yue et al. [26] proposed a novel route to periodic and chaotic bursting by using the delayed pitchfork bifurcations around stable attractors to achieve different bursting dynamics by computing the corresponding characteristic polynomial. The proposed model uses these analytical results for bursting dynamics in the Lü system. This study aims to tackle the issue of complex bursting pattern, the proposed periodic or chaotic bursting oscillations show that the termination of bifurcation delay may lead the trajectory to switch to the different attractors. The authors of [27] used the bifurcation analytical approach to study the bursting dynamical properties of the van der Pol–Duffing system with the parametric delay feedback. Geometric analysis was presented to conclude that the magnitude of the delay is the determinant of dynamical behaviors of spiking modes and the exponent rate of p, except for the time delay, strongly affects Hopf bifurcation bursting. Some novel bursting patters can be observed by using a parametrical delayed feedback which may lead the trajectory to switch to the more complicated attractors. Time delay in the systems to control or regulate bursting motions may be one of the best approaches.

3. Methodologies

In this section, we are going to give an overview of the main methods used for watermarking. There are three types of main frequency domain watermarking algorithms in the literature; discrete cosine transformation (DCT), discrete Fourier Transformation (DFT) and discrete Wavelet transformation (DWT). There are several reasons to use frequency domain in watermarking. The main reason is that the nature of the human visual system (HVS) is better acquired by the spectral coefficients. Another reason is that high frequencies demonstrate the object edges in the image which are very efficient locations to embed watermarks. Frequency domain watermarking algorithms are powerful against image processing attacks such as filtering, contrast adjustment, histogram equalization, adding noise, blurring, compression and brightness.

3.1. Stenography

Steganography is considered the method of hiding a secret message into a carrier signal such as text, audio, image, or video, mainly to avoid the perception of this secret message from unauthorized parties. The important information, in this case, is not the carrier but the hidden message. There are several methods used to apply steganography in all types of carriers but for the sake of the topic of this paper, we have limited our discussion only to techniques applied in images. In this type of steganography, an image serves as a cover and we can embed into it a secret message. The secret message can be embedded because of image processing operations such as lossy compression, quality alteration format conversion, palette modification, filtering, etc. [28,29]. In all cases, the stego object (hidden information) must be small enough not to raise any suspicion that the cover has been altered. Watermarking similarly to Steganography uses the same principles. The only difference is that the message used by watermarking is to identify the ownership of the image; meanwhile, in Steganography the message has no relationship with the cover image; most often this cover lies far from the meaning of the secret message. Furthermore, in watermarking, the secret message should be imperceptible in the meaning that should be perceptually indistinguishable from the original work for a human observer, a very important aspect of the cover.
The stenographic techniques can be implemented in both domains, spatial and frequency domains. The least significant bit (LSB) method, statistical methods, distortion technique or transform domain techniques are some of the main methods to implement steganography. In the spatial domain, most of the techniques alter one or more bits of each byte of the cover image. The most known technique is LSB (least significant bit). It consists of replacing the last bit of each pixel with the message information according to a specific pattern such as column by column, row by row, or in a more advanced approach a random number generator is used for embedding such as ex. zig zag. The application of watermarking in the spatial domain is low cost, low complexity and needs fewer low system requirements. However, these methods lack robustness [28]. Steganographic and Watermarking applications in the frequency domain can be applied in several transformations such as Discrete Wavelet, Discrete Cosine or Discrete Fourier Transform. In all cases, the transformation coefficients can be altered to embed the watermark in the image. Each of these transformations has its strengths and weaknesses. DWT makes use of the characteristic of the human visual system but has higher complexity compared to DCT; DCT transformation offers robustness against compression and DFT has an advantage over the others in terms of robustness during rotation, scaling or translation [28,30].

3.2. Discrete Wavelet Transformation

Discrete Wavelet transform consists of processing the image in the frequency domain where the decomposition will happen in two subspaces. By using digital filters, the information will be separated into low-frequency sub-band and high-frequency sub-band. With this transformation, the image is decomposed into small Wavelets with varying frequencies and limited duration. The Wavelet transform coefficients contain the positions of the information. The original signal can be completely reconstructed by performing a reverse Wavelet transformation on the same coefficients [31].
Based on [29], If we consider a low pass filter equation H (ω) and a high pass filter as G(ω):
H ( ω ) = k h k e j k ω , G ( ω ) = k g k e j k ω
then a signal x[n] can be decomposed recursively as:
c j 1 , k = n h n 2 k c j , n and d j 1 , k = n g n 2 k c j , n
for j = J + 1, J, …J0 where cJ+1,k = x|k| Z, J + 1 is the high resolution level index and J0 is the low resolution level index. The coefficients c and d are called the DWT of signal x[n], where cJ0,k is the lowest resolution part of x[n] and dj,k are the details of x[n] at various bands of frequencies.
The signal x[n] can be reconstructed from its DWT coefficients recursively:
c j , n = k h n 2 k c j 1 , k + k g n 2 k d j 1 , k
The classic DWT is implemented through the combination of two filters (low and high) to create four zones of interests LL, LH, HL and HH as per Figure 1.
The low-frequency part includes the main information of the signal while the high-frequency part includes information related to the edge components. From these sub-bands, the LL is the most sensitive part since it contains most of the energy and serves as the base of the image. The other three sub-bands are of interest for watermarking due to the imperfection of the human visual system. Using several layers of decomposition makes the watermarking more robust and difficult to manipulate [32].
Alpha Blending Technique is a popular technique used in image processing and for watermarking. According to the alpha blending technique, the watermark image is obtained by:
W M I = k × ( L L 1 ) + q × ( W M 1 )
where:
  • WMI = watermarked image;
  • LL1 = low frequency approximation of the original image;
  • WM1 = watermark;
  • k, q = scaling factors for the original image and watermark, respectively.
The alpha blending formula used for watermark extraction is given by:
R W = ( W M I k × L L 1 )
where:
  • RW = recovered watermark;
  • LL1 = low frequency approximation of the original image;
  • WMI = watermarked image.

3.3. Discrete Cosine Transformation

Discrete Cosine Transform is also a method used often in watermarking. This technique transforms an image from spatial to the frequency domain by separating the image into sub-bands of different regions of interest based on the visual quality of the image [33].
The general equation of the 1D DCT transform is given as:
F ( u ) = ( 2 N ) 1 2 i = 0 N 1 A i cos [ π u 2 N ( 2 i + 1 ) ] f ( i ) )
With an inverse transform as:
F 1 ( u ) where , A ( i ) = 1 2 for ξ = 0 1 otherwise
The general equation for 2D transform is given as:
F ( u ) = ( 2 N ) 1 2 ( 2 M ) 1 2 i = 0 N 1 j = 0 M 1 A i A j cos [ π u 2 N ( 2 i + 1 ) ] cos [ π ν 2 M ( 2 j + 1 ) ] f ( i , j )
Its inverse transformation is:
F 1 ( u , ν ) where , A ( ξ ) = 1 2 for ξ = 0 1 otherwise
  • f(i,j) is the intensity of the pixel in row i and column j;
  • N is the width of the image and N is the height;
  • F(u,v) is the DCT coefficient in row k1 and column k2 of the DCT matrix.
The DCT is applied in sub-parts of the image with a size of 8 × 8 px. In each of these subparts after the DCT transformation, the energy is shifted to the low frequencies on the top left corner leading the rest of the matrix with many low values which leads to the opportunity to neglect them and perform compression [34]. The 64 basic functions of an 8 × 8 matrix are given in Figure 2.
In traditional techniques, the embedding of the watermarking is applied by modifying the DC values. The main challenge is to find an appropriate embedding factor in terms of robustness and invisibility of the watermarking.

3.4. Discrete Fourier Transformation

Discrete Fourier Transform is a transformation that converts a finite sequence of equally spaced samples of a function into a same-length sequence of equally spaced samples of the discrete-time Fourier Transform. In image processing, the samples are pixel values of an image. The watermarking is mostly applied in the middle-frequency bands since the high frequencies represent the main information causing any change to be visually noticed in the spatial domain and the low frequencies are surpassed by the compression techniques. The application of watermarking in middle frequencies makes it robust and imperceptible at the same time [35,36].
The DFT transform can be obtained as per:
F ( u , ν ) = 1 M N x = 0 M 1 y = 0 N 1 f ( x , y ) e j 2 π ( u x M + ν y N )
where f(x,y) represents the M × N grayscale original image and F(u, v) is a DFT coefficient. e–j2π represents the basis function of Fourier Transform.
The inverse Fourier Transform is given as:
f ( x , y ) = 1 M N u = 0 M 1 ν = 0 N 1 F ( u , ν ) e j 2 π ( u x M + ν y N )
The output of Fourier Transform has both real and imaginary components distributing the information in both magnitude and phase. Since the magnitude contains less information than the phase, it is recommended that the watermarking be embedded by altering the magnitude.

4. Proposed Methodology

Spatial domain watermarking algorithms are robust, secure and adaptive; however, they are not strong against all types of attacks. In this work, frequency domain watermarking algorithms are applied to obtain resistant results in non-blind, semi-blind and blind watermarking for images. DWT, DCT and DFT algorithms have some advantages and disadvantages regarding extracted watermarks and attacks. In this research work, we enhanced the DWT algorithm in semi-blind watermarking in the embedding of binary images. Figure 3 shows the original cover image, binary watermark and watermarked image using the DWT algorithm [37,38].
Dugat et al. [39] proposed a Wavelet-based watermarking algorithm that is robust and secure. The cover image is converted into the DWT with four bands: low frequencies in the LL band and high frequencies in HL, LH and HH bands. Pseudorandom Number (PRN)-based secret information is embedded into the high frequencies of the first level of decomposition. Experimental results show that DWT-based watermarking is very promising; however, embedding only the first decomposition of the cover image is weak for some of the geometric attacks [40].
The Dugat et al. [39] watermark embedding methodology is demonstrated in Algorithm 1.
Algorithm 1: DWT Embedding Algorithm
INPUT: Cover Image I (size is N × N), watermark W (size is N/2 × N/2) and secret key S
  • If a cover image is a color image, convert it into the greyscale image
  • Transform the cover image into the first level decomposition of the discrete Wavelet transformation
  • Select LL coefficients as a low-level frequency and select HL, LH and HH coefficients as high-level frequencies
  • Embed binary watermark W into the cover image I using the following formula. α is a scaling factor that is obtained using several options WI (Watermarked Image) = W + α × I
  • First level of inversion applied to embedded image coefficients to obtain watermarked image WI
OUTPUT: Binary image embedded watermarked image WI
In this method, instead of hiding PSN, a binary image is used as a watermark. When PSN is used as a watermarking, the algorithm detects if there is a watermark or not. If embedding a watermark is an image, stamp, logo, or text, the proposed algorithm extracts hidden multimedia elements. The Dugat algorithm is enhanced using block-based DWT in binary images. The block-based algorithm creates 4 × 4, 8 × 8 or 16 × 16 blocks equal to size blocks from the cover image and embeds a binary image into each block using discrete Wavelet transformation. In block-based watermarking, there is greater chance to find the best embedding pixels to hide secret data, especially against attacks.
Algorithm 2 below demonstrates the block-based DWT methodology [41].
Algorithm 2: Block-based DWT Embedding Algorithm
INPUT: Cover Image I (size is N × N), watermark W (size is N/2 × N/2) and secret key S
  • If a cover image is a color image, convert it into the grey scale image
  • Apply 4 × 4 (or another size) of decomposition to the cover image and binary image. Each block size of the cover image and size of the watermark should be the same
  • Transform each block of the cover image into the first level decomposition of the discrete Wavelet transformation
  • Select LL coefficients as a low-level frequency and select HL, LH and HH coefficients as high-level Frequencies in each band
  • Embed each block of the binary watermark W into each block of the cover image I using the following formula. α is a scaling factor that is obtained using several options
    WI (Watermarked Image) = W + α × I
  • First level of inversion applied to embedded image coefficients to obtain watermarked image WI
OUTPUT: Binary image embedded watermarked image WI
Information hiding using Algorithm 2 gives very promising results, especially in vector images. One of the drawbacks is the high CPU time because of the application of the same algorithm to the N × N blocks. Compared to Algorithm 1, this method is more robust and secure. On the other hand, it has more complexity time. The block-based DWT algorithm is weak against cropping, rotation and image scaling attacks. In this research work, Algorithms 1 and 2 are enhanced in order to find the optimal value of α using the flexible scaling factor idea [42].
In Algorithm 3, the flexible scaling factor is applied to find the optimal α value to reach a robust, secure and resistant watermark methodology.
Algorithm 3: Block-DWT Flexible Scaling Factor Embedding Algorithm
INPUT: Cover Image I (size is N × N), watermark W (size is N/2 × N/2) and secret key S
  • If a cover image is a color image, convert it into the grey scale image
  • Apply 4 × 4 (or another size) of decomposition to the cover image and binary image. Each block size of the cover image and size of the watermark should be the same
  • Transform each block of the cover image into the first level decomposition of the discrete Wavelet Transformation
  • Apply flexible scaling factor algorithms to each block. Every block embeds a watermark into the high frequencies using optimal scaling factor values
  • Embed each block of the binary watermark W into each block of the cover image I using the following formula
    WI (Watermarked Image) = W + α × I
  • First level of inversion applied to embedded image coefficients to obtain watermarked image WI
OUTPUT: Binary image embedded watermarked image WI
The flexible scaling factor in this work is defined as follows [43]:
F S F = i = 1 3 A ( i ) i = 1 3 A ( i ) m x n
where A(i) is the selected neighbor coefficients in block-based DWT, FSF is the flexible scaling factor and mxn is the total number of pixels in the image block.
There are several metrics that can be used in watermarking. Peak signal to noise ratio (PSNR), Mean Square Error (MSE) and Structural Similarity Index (SSIM) are commonly used metrics to measure the quality of the watermarked images or distortions on the images after some processes or attacks. In this work, the similarity ratio (SR) is calculated for each extracted watermark to evaluate the quality of extraction and level of distortion after attacks.
M S E = 1 A x B a = 0 A b = 0 B n ( a , b ) m ( a , b ) 2
where A and B demonstrate the number of pixels in the watermarked image and original image.
P S N R = 20 x log 10 M a x i m u m I m a g e A M e a n S q u a r e E r r o r
where A is the watermark or distorted image.
S S I M = 2 a 1 a 2 a 1 2 + a 2 2 x 2 b 12 b 1 2 + b 2 2
S I M = [ L u m i a n c e ( a , b ) ] i x = [ C o n t r a s t ( a , b ) j x = [ C o r r e l a t i o n ( a , b ) ] z
where a is the mean and b is the variance of images. The similarity ratio is the ratio between a number of pixels with the same value and a total number of pixels in the watermark.

5. Experimental Results

The proposed algorithm is compared with other Wavelet algorithms using Lena, Cameraman, Baboon, Boat, Barbara and Peppers images. Figure 4 demonstrates cover images where the embedding process is applied.
Table 1 shows PSNR values for a watermarked image using Wavelet, block-based Wavelet and flexible scaling factor-based block Wavelet. Results show that the proposed algorithm gives better image quality values in Lena, Baboon, Boat, Barbara and Peppers images, excepting Cameraman [44,45].
Embedding with FSF-based block DWT is compared with the other most common watermarking algorithms DCT and DFT. The cover image is transformed via discrete cosine transformation and the binary logo is embedded into the medium frequencies after zig-zag order. In the DFT algorithm, the binary watermark is embedded into the high magnitudes and is located in the corner of the image after Fourier Transformation. Table 2 demonstrates PSNR values of images after DCT, DFT and the proposed methodology. Results shows that the proposed algorithm higher PSNR values than the DCT and DFT algorithms.
There are several measures of good watermarking algorithms such as robustness, security, data capacity and resistance. Image watermarking can be tested with geometric, temporal and statistical attacks. Temporal attacks are usually used for video sequences and 3D applications. Frame dropping, frame averaging and frame swapping are some of the frequently used attacks in the videos. In this work, we applied several statistical image geometric attacks to compare the proposed watermarking algorithm with the other two Wavelet algorithms [46].
Table 3 demonstrates PSNR values after the most commonly used attacks rotation, cropping, histogram equalization, contrast adjustment, JPEG 25, Gaussian noise, resizing and salt and pepper noise. PSNR values after attacks are always less than the PSNR value of the watermarked image. There are three algorithms tested with several images. Method A represents the Wavelet algorithm, B represents block-based Wavelet and C represents the proposed algorithm [47,48].
Experimental results show that the proposed algorithm FSF-based block DWT has better results than the other two Wavelet algorithms in the literature. Time complexity in information hiding systems are based on the algorithm used to embed the watermark into the cover image. In addition to that, the pre-processing stage for the cover image is also another important criterion for finding out time complexity. The most common watermarking algorithm DWT has O(N), DCT has O(NlogN) and DFT has O(N2) time complexity. Block-based DWT and proposed FSF-based Block-DWT algorithms have O(NlogN) time complexities.
Table 4 shows CPU times in embedding and extraction for binary image watermarking into the grey scale Lena cover image. The block-DWT algorithms require more CPU time for both embedding and extraction than non-block-DWT watermarking.
Table 5 shows similarity ratios after attacks for Lena, Cameraman, Baboon, Boat, Barbara and Peppers images. SR represents the quality of the extracted watermark. If the ratio is equal to 1, it means the extracted watermark is exactly the same as an embedded watermark. Experimental results show that SR values are greater than 0.8 after attacks. The FSF-based watermarking algorithm is more successful than the other two Wavelet algorithms in the extraction [49].
Figure 5 shows similarity ratio values after attacks such as rotation, JPEG25, Gaussian noise and salt and pepper.
Results are demonstrated in four bands: low frequencies in the LL band and high frequencies in HL, LH and HH bands. In rotation attacks, the SR value is 0.869 in the HH band which is the highest value for Lena. FSF block watermarking algorithm results show that extraction from high frequencies (HH band) is more robust and secure than extraction from low frequencies (LL, HL and LH bands). One of the reasons for this is that high frequencies usually reside on the edge or corner of the object in the image, which is the most suitable place to hide secret information [50].

6. Conclusions and Future Work

There are two efficient techniques for data hiding in images, cryptology and watermarking. Logo, stamp or pseudo-random number can be embedded into the cover image, video or audio using frequency domain algorithms such as DCT, DFT and DWT. Wavelet transformation gives very good results in embedding high frequencies. In the literature, some of the algorithms resist one group of attacks; other algorithms resist another group of attacks. In this research work, we use block-based Wavelet transformation with flexible scaling factors to increase the resistance of the watermarking algorithm. Experimental results show that the proposed method is more efficient, secure, robust and resistant to common attacks. Results are compared with the DWT and block-based DWT algorithm in the literature. Experimental results show that the proposed algorithm gives higher PSNR values for watermarked images and higher SR values for extracted watermarks after attacks such as rotation, salt and pepper, JPEG 25 and Gaussian noise.

Author Contributions

Conceptualization, E.E.; methodology, E.E.; software, N.M.; validation, E.E. and N.M.; formal analysis, E.E. and E.C.; investigation, N.M.; resources, E.E.; data curation, E.E.; writing—original draft preparation, E.E., N.M., E.C.; writing—review and editing, E.E., N.M. and E.C.; visualization, E.E.; supervision, E.E. and N.M.; project administration, E.E.; funding acquisition, E.E. and E.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Murali, P.; Sankaradass, V. An efficient ROI based copyright protection scheme for digital images with SVD and orthogonal polynomials transformation. Optik 2018, 170, 242–264. [Google Scholar] [CrossRef]
  2. Ernawan, F.; Kabir, M.N. A blind watermarking technique using redundant Wavelet transform for copyright protection. In Proceedings of the 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA), Penang, Malaysia, 9–10 March 2018; pp. 221–226. [Google Scholar] [CrossRef]
  3. Ahmad, F.; Cheng, L.M. Authenticity and copyright verification of printed images. Signal Process. 2018, 148, 322–335. [Google Scholar] [CrossRef]
  4. Padmapriya, S.; Bagavathi, C.; Jagadeeswari, M. Hardware Software Co-simulation of Watermarking algorithm for Image Processing Applications. In Proceedings of the 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 25–26 March 2022; Volume 1, pp. 1482–1487. [Google Scholar] [CrossRef]
  5. Xuehua, J. Digital Watermarking and its Application in Image Copyright Protection. In Proceedings of the 2010 International Conference on Intelligent Computation Technology and Automation, Washington, DC, USA, 11–12 May 2010; Volume 2, pp. 114–117. [Google Scholar] [CrossRef]
  6. Makhrib, Z.F.; Karim, A.A. Improved Fragile Watermarking Technique Using Modified LBP Operator. In Proceedings of the 2022 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, 15–17 March 2022; pp. 132–137. [Google Scholar] [CrossRef]
  7. Mousavi, S.M.; Naghsh, A.; Abu Bakar, S.A.R. Watermarking Techniques used in Medical Images: A Survey. J. Digit. Imaging 2014, 27, 714–729. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Usha Nandini, D.; Divya, S. A literature survey on various watermarking techniques. In Proceedings of the 2017 International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 19–20 January 2017; pp. 1–4. [Google Scholar] [CrossRef]
  9. Ansari, I.A.; Pant, M. Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recognit. Lett. 2017, 94, 228–236. [Google Scholar] [CrossRef]
  10. Fazli, S.; Moeini, M. A robust image watermarking method based on DWT, DCT and SVD using a new technique for correction of main geometric attacks. Optik 2016, 127, 964–972. [Google Scholar] [CrossRef]
  11. Ansari, I.A.; Pant, M.; Ahn, C.W. Robust and false positive free watermarking in IWT domain using SVD and ABC. Eng. Appl. Artif. Intell. 2016, 49, 114–125. [Google Scholar] [CrossRef]
  12. Makbol, N.M.; Khoo, B.E. Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition. AEU Int. J. Electron. Commun. 2013, 67, 102–112. [Google Scholar] [CrossRef]
  13. Li, X.; Meng, X.; Wang, Y.; Yang, X.; Yin, Y.; Peng, X.; He, W.; Dong, G.; Chen, H. Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain. Opt. Lasers Eng. 2017, 96, 7–16. [Google Scholar] [CrossRef] [Green Version]
  14. Kumar, C.R.; Sivananthamaitrey, P.; Kumar, P.R. An Optimized Semi-blind Watermarking Technique for Digital Images using Bat Algorithm. In Proceedings of the 2022 International Conference on Computing, Communication and Power Technology (IC3P), Visakhapatnam, India, 7–8 January 2022; pp. 167–171. [Google Scholar] [CrossRef]
  15. Seenivasagam, V.; Ramesh, V. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud. Comput. Math. Methods Med. 2013, 2013, 516465. [Google Scholar] [CrossRef] [Green Version]
  16. Zhang, L.; Li, W.; Ye, H. A blind watermarking system based on deep learning model. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; pp. 1208–1213. [Google Scholar] [CrossRef]
  17. Ahuja, R.; Bedi, S. Copyright protection using blind video watermarking algorithm based on MPEG-2 structure. In Proceedings of the International Conference on Computing, Communication and Automation, ICCCA 2015, Greater Noida, India, 15–16 May 2015; pp. 1048–1053. [Google Scholar] [CrossRef]
  18. Yiğit, Y.; Karabatak, M. A Stenography Application for Hiding Student Information into an Image. In Proceedings of the 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, 10–12 June 2019; pp. 1–4. [Google Scholar] [CrossRef]
  19. Sharon, M.B.; Saritha, S. Edge based robust image watermarking scheme for copyright protection of images. In Proceedings of the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 1–2 August 2017; pp. 3565–3570. [Google Scholar] [CrossRef]
  20. Weina, W. Digital audio blind watermarking algorithm based on audio characteristic and scrambling encryption. In Proceedings of the 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 25–26 March 2017; pp. 1195–1199. [Google Scholar] [CrossRef]
  21. Garg, P.; Kishore, R. An efficient and secured blind image watermarking using ABC optimization in DWT and DCT domain. Multimed. Tools Appl. 2022, 81, 36947–36964. [Google Scholar] [CrossRef]
  22. Wu, H.; Liu, G.; Yao, Y.; Zhang, X. Watermarking Neural Networks With Watermarked Images. IEEE Trans. Circuits Syst. Video Technol. 2021, 31, 2591–2601. [Google Scholar] [CrossRef]
  23. Wang, Z.X.; Sha, K.Y.; Gao, X.L. Digital Watermarking Technology Based on LDPC Code and Chaotic Sequence. IEEE Access 2022, 10, 38785–38792. [Google Scholar] [CrossRef]
  24. Sehra, K.; Raut, S.; Mishra, A.; Kasturi, P.; Wadhera, S.; Saxena, G.J.; Saxena, M. Robust and Secure Digital Image Watermarking Technique Using Arnold Transform and Memristive Chaotic Oscillators. IEEE Access 2021, 9, 72465–72483. [Google Scholar] [CrossRef]
  25. Sharma, S.; Zou, J.; Fang, G. A dual watermarking scheme for identity protection. Multimed. Tools Appl. 2022, 1–30. [Google Scholar] [CrossRef]
  26. Yue, Y.; Zhang, Z.; Han, X. Periodic or chaotic bursting dynamics via delayed pitchfork bifurcation in a slow-varying controlled system. Commun. Nonlinear Sci. Numer. Simul. 2017, 56, 380–391. [Google Scholar] [CrossRef]
  27. Yu, Y.; Zhang, Z.; Bi, Q. Multistability and fast-slow analysis for van der Pol–Duffing oscillator with varying exponential delay feedback factor. Appl. Math. Model. 2018, 57, 448–458. [Google Scholar] [CrossRef]
  28. Potdar, V.; Han, S.; Chang, E. A survey of digital image watermarking techniques. In Proceedings of the INDIN ’05. 2005 3rd IEEE International Conference on Industrial Informatics, Cambridge, UK, 10–12 August 2005; pp. 709–716. [Google Scholar] [CrossRef] [Green Version]
  29. Huang, H.; Xue, Y.; Fan, L.; Li, M. The Development and New Direction of Digital Image Stenography. In Proceedings of the 2020 International Conference on Robots & Intelligent System (ICRIS), Sanya, China, 7–8 November 2020; pp. 124–128. [Google Scholar] [CrossRef]
  30. Montalbo, F.J.P.; Barfeh, D.P.Y. Classification of Stenography using Convolutional Neural Networks and Canny Edge Detection Algorithm. In Proceedings of the 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Piscataway, NJ, USA, 11–12 December 2019; pp. 305–310. [Google Scholar] [CrossRef]
  31. Xia, X.G.; Boncelet, C.G.; Arce, G.R. Wavelet transform based watermark for digital images. Opt. Express 1998, 3, 497–511. [Google Scholar] [CrossRef]
  32. Wang, L.; Ji, H. A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images. Electronics 2022, 11, 2027. [Google Scholar] [CrossRef]
  33. Hamidi, M.; El Haziti, M.; Cherifi, H.; El Hassouni, M. A Hybrid Robust Image Watermarking Method Based on DWT-DCT and SIFT for Copyright Protection. J. Imaging. 2021, 7, 218. [Google Scholar] [CrossRef]
  34. Hasan, N.; Islam, M.S.; Chen, W.; Kabir, M.A.; Al-Ahmadi, S. Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains. Sensors 2021, 21, 5540. [Google Scholar] [CrossRef]
  35. Solachidis, V.; Pitas, I. Circularly symmetric watermark embedding in 2-D DFT domain. In Proceedings of the 1999 IEEE International Conference on Acoustics, Speech and Signal Processing—ICASSP99 (Cat. No. 99CH36258), Phoenix, AZ, USA, 15–19 March 1999; Volume 6, pp. 3469–3472. [Google Scholar] [CrossRef]
  36. Jimson, N.; Hemachandran, K. DFT Based Coefficient Exchange Digital Image Watermarking. In Proceedings of the 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), Piscataway, NJ, USA, 14–15 June 2018; pp. 567–571. [Google Scholar] [CrossRef]
  37. Sharma, S.; Zou, J.J.; Fang, G. A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities. IEEE Access 2022, 10, 85677–85700. [Google Scholar] [CrossRef]
  38. Singh, R.; Izhar, L.I.; Elamvazuthi, I.; Ashok, A.; Aole, S.; Sharma, N. Efficient Watermarking Method Based on Maximum Entropy Blocks Selection in Frequency Domain for Color Images. IEEE Access 2022, 10, 52712–52723. [Google Scholar] [CrossRef]
  39. Dugad, R.; Ratakonda, K.; Ahuja, N. A new Wavelet-based scheme for watermarking images. In Proceedings of the 1998 International Conference on Image Processing, ICIP98 (Cat. No.98CB36269), Chicago, IL, USA, 7 October 1998; Volume 2, pp. 419–423. [Google Scholar] [CrossRef]
  40. Şenol, A.; Dınçer, K.; Sever, H.; Elbaşi, E. Blocked-DWT based vector image watermarking. In Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16–19 May 2015; pp. 264–267. [Google Scholar] [CrossRef]
  41. Ghosh, B.R.; Banerjee, S.; Mandal, J.K. Watermark based Image Authentication using Integer Wavelet Transform. In Proceedings of the 2022 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 20–22 July 2022; pp. 312–319. [Google Scholar] [CrossRef]
  42. Mohammmed, A.A.; Elbasi, E.; Alsaydia, O.M. An Adaptive Robust Semi-blind Watermarking in Transform Domain Using Canny Edge Detection Technique. In Proceedings of the 2021 44th International Conference on Telecommunications and Signal Processing (TSP), Brno, Czech Republic, 26–28 July 2021; pp. 10–14. [Google Scholar] [CrossRef]
  43. Ernawan, F.; Ariatmanto, D.; Musa, Z.; Mustaffa, Z.; Zain, J.M. An Improved Robust Watermarking Scheme using Flexible Scaling Factor. In Proceedings of the 2020 International Conference on Computational Intelligence (ICCI), Bandar Seri Iskandar, Malaysia, 8–9 October 2020; pp. 266–269. [Google Scholar] [CrossRef]
  44. Elbasi, E. M-SVD based Quality Measurement in Hybrid non-blind Watermarked Medical Images. In Proceedings of the 2020 43rd International Conference on Telecommunications and Signal Processing (TSP), Milan, Italy, 7–9 July 2020; pp. 506–510. [Google Scholar] [CrossRef]
  45. Elbasi, E. A Robust Information Hiding Scheme Using Third Decomposition Layer of Wavelet Against Universal Attacks. In Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Virtual Congress, 6–9 June 2022; pp. 611–616. [Google Scholar] [CrossRef]
  46. Elbasi, E. Enhancing the robustness of watermarked medical images using heuristic search algorithm. In Proceedings of the 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Paris, France, 14–16 December 2020; pp. 1–5. [Google Scholar] [CrossRef]
  47. Boreiry, M.; Keyvanpour, M.R. Classification of watermarking methods based on watermarking approaches. In Proceedings of the 2017 Artificial Intelligence and Robotics (IRANOPEN), Qazvin, Iran, 9 April 2017; pp. 73–76. [Google Scholar] [CrossRef]
  48. Jin, X.; Feng, Z. A digital watermarking algorithm based on Wavelet transform and singular value segmentation of the watermark image. In Proceedings of the of the 30th Chinese Control Conference, Yantai, China, 22–24 July 2011; pp. 2327–2330. [Google Scholar]
  49. Vaidya, S.P.; Kandala, R.; Hosny, K.; Fouda, M. Digital Watermarking System for Copyright Protection and Authentication of Images Using Cryptographic Techniques. Appl. Sci. 2022, 12, 8724. [Google Scholar] [CrossRef]
  50. Khafaga, D.S.; Karim, F.K.; Darwish, M.M.; Hosny, K.M. Robust Zero-Watermarking of Color Medical Images Using Multi-Channel Gaussian-Hermite Moments and 1D Chebyshev Chaotic Map. Sensors 2022, 22, 5612. [Google Scholar] [CrossRef] [PubMed]
Figure 1. One-layer, two-layer and three-layer decomposition of DWT.
Figure 1. One-layer, two-layer and three-layer decomposition of DWT.
Electronics 11 03680 g001
Figure 2. 64 Basis functions of an 8-by-8 matrix.
Figure 2. 64 Basis functions of an 8-by-8 matrix.
Electronics 11 03680 g002
Figure 3. Cover image, binary watermark and watermarked image.
Figure 3. Cover image, binary watermark and watermarked image.
Electronics 11 03680 g003
Figure 4. Cover images for watermarking embedding process.
Figure 4. Cover images for watermarking embedding process.
Electronics 11 03680 g004
Figure 5. Similarity ratio values for extracted watermark from Lena image using FSF block watermarking.
Figure 5. Similarity ratio values for extracted watermark from Lena image using FSF block watermarking.
Electronics 11 03680 g005
Table 1. Peak signal to noise ratio (PSNR) values after embedding binary image to the cover images.
Table 1. Peak signal to noise ratio (PSNR) values after embedding binary image to the cover images.
DWT (dB)Block-DWT (dB)FSF Based
Block-DWT (dB)
Lena41.1643.2544.41
Cameraman43.6843.6142.19
Baboon42.2742.8642.89
Boat39.6740.8242.86
Barbara39.8239.8443.19
Peppers40.7243.4344.27
Table 2. Peak signal to noise ratio (PSNR) values for DCT, DFT and FSF-based Block-DWT algorithms.
Table 2. Peak signal to noise ratio (PSNR) values for DCT, DFT and FSF-based Block-DWT algorithms.
DCT (dB)DFT (dB)FSF Based
Block-DWT (dB)
Lena40.8741.7444.41
Cameraman42.0242.1642.19
Baboon42.2941.27442.89
Boat36.9440.0142.86
Barbara40.1537.9143.19
Peppers39.8341.5744.27
Table 3. Peak signal to noise ratio (PSNR) values after common attacks (A: DWT, B: Block DWT, C: FSF Block DWT).
Table 3. Peak signal to noise ratio (PSNR) values after common attacks (A: DWT, B: Block DWT, C: FSF Block DWT).
LenaCameramanBaboonBoatBarbaraPeppersMethod
Rotation31.6029.6738.8931.5331.7938.97A
31.9129.1237.5130.7434.9737.12B
34.7630.6138.8832.5435.6137.22C
Cropping31.6329.6738.8931.5331.7938.97A
30.8528.4534.2530.1930.8236.52B
34.5729.8135.1932.2730.1738.72C
Histogram
Equalization
28.2532.4929.2828.1129.6731.53A
29.4933.2530.0828.5329.1232.97B
32.1633.9634.5929.9430.0935.18C
Contrast
Adjustment
31.7928.2532.4929.2828.1129.67A
34.2929.0730.4125.8328.6130.05B
34.3529.5334.6228.8430.0731.59C
JPEG 2538.8931.5331.7928.2532.4929.28A
35.6732.8832.7124.8633.1830.07B
38.2733.6232.7731.2133.4632.53C
Gaussian
Noise
28.1129.3630.8531.2923.6329.54A
30.0529.1632.5932.0727.5228.42B
31.6732.0432.8432.1129.6730.09C
Resizing32.5634.5233.1230.9634.5937.06A
34.1835.0731.6132.5833.8136.75B
34.7737.9136.0734.7336.1839.61C
Salt and
Pepper
Noise
31.2730.8234.1932.9634.5234.04A
33.0232.0134.9234.0135.9137.03B
35.1233.4335.2336.5136.7238.61C
Table 4. CPU times in embedding and extraction.
Table 4. CPU times in embedding and extraction.
Embedding (s)Extraction (s)
DCT3.172.24
DFT4.913.59
DWT1.830.97
2 × 2 Block-DWT2.011.14
4 × 4 Block-DWT2.531.19
8 × 8 Block-DWT2.671.31
FSF based Block-DWT2.691.31
Table 5. Similarity Ratio (SR) values after common attacks (A: DWT B: Block DWT C: FSF Block DWT).
Table 5. Similarity Ratio (SR) values after common attacks (A: DWT B: Block DWT C: FSF Block DWT).
LenaCameramanBaboonBoatBarbaraPeppersMethod
Rotation0.8410.8160.8930.7960.8030.827A
0.8630.8140.9050.8260.8410.897B
0.8690.8570.9170.8290.8390.904C
Cropping0.7860.7940.7620.8020.7560.812A
0.7940.8310.7540.8270.7940.808B
0.8130.8340.7910.8420.8160.819C
Histogram
Equalization
0.8340.8190.8470.8510.8090.819A
0.8470.8370.8550.8690.8140.810B
0.8810.8650.8730.8940.8520.844C
Contrast
Adjustment
0.8710.8540.8830.9010.8720.821A
0.8790.8670.8700.9140.8840.825B
0.8910.8930.8790.9140.8950.853C
JPEG 250.9020.9130.8940.9210.9080.917A
0.9090.9240.8760.9170.9110.921B
0.9180.9290.9010.9300.9080.927C
Gaussian
Noise
0.8750.8810.8670.8550.9020.873A
0.8860.8960.8710.8490.9140.881B
0.8810.9050.8890.8730.9130.897C
Resizing0.9240.9170.9310.9220.9190.925A
0.9290.9250.9290.9340.9280.925B
0.9460.9550.9530.9510.9370.942C
Salt and
Pepper
Noise
0.8570.8820.8490.8930.9010.839A
0.8460.8800.8610.8990.8950.867B
0.8690.9010.8970.9070.9060.875C
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Elbasi, E.; Mostafa, N.; Cina, E. Robust, Secure and Semi-Blind Watermarking Technique Using Flexible Scaling Factor in Block-Based Wavelet Algorithm. Electronics 2022, 11, 3680. https://doi.org/10.3390/electronics11223680

AMA Style

Elbasi E, Mostafa N, Cina E. Robust, Secure and Semi-Blind Watermarking Technique Using Flexible Scaling Factor in Block-Based Wavelet Algorithm. Electronics. 2022; 11(22):3680. https://doi.org/10.3390/electronics11223680

Chicago/Turabian Style

Elbasi, Ersin, Nour Mostafa, and Elda Cina. 2022. "Robust, Secure and Semi-Blind Watermarking Technique Using Flexible Scaling Factor in Block-Based Wavelet Algorithm" Electronics 11, no. 22: 3680. https://doi.org/10.3390/electronics11223680

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop