Next Article in Journal
Blueprint Separable Subsampling and Aggregate Feature Conformer-Based End-to-End Neural Diarization
Next Article in Special Issue
A Robust Zero-Watermarking Scheme in Spatial Domain by Achieving Features Similar to Frequency Domain
Previous Article in Journal
Influence of a PCB Layout Design on the Efficiency of Heat Dissipation and Mutual Thermal Couplings between Transistors
Previous Article in Special Issue
Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Blind Image Watermarking Using Coefficient Differences of Medium Frequency between Inter-Blocks

1
School of Department of Electronic Information and Computer Engineering, The Engineering & Technical College, Chengdu University of Technology, Leshan 614000, China
2
School of Cyberspace Security, Hainan University, Haikou 570228, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(19), 4117; https://doi.org/10.3390/electronics12194117
Submission received: 2 September 2023 / Revised: 25 September 2023 / Accepted: 28 September 2023 / Published: 1 October 2023

Abstract

:
The existing discrete cosine transform (DCT) differential quantization robust watermarking has poor robustness against JPEG compression, cropping, and combined attacks. To improve such issues, a pair of adjacent block coefficients are selected to reduce the offset and improve the robustness of the watermarking. Firstly, at adjacent positions of neighboring blocks, the differences of medium frequency coefficients are calculated, and then the differences are used to divide regions. Experimental results show that this method is more robust to various attacks than the existing DCT differential quantization robust watermarking. The accuracy of watermark extraction under a JPEG compression attack increased by 2%, while the error rates of watermark extraction under a cropping attack and a combination attack decreased by 4.4% and 9%.

1. Introduction

The promotion of digitization spreads multimedia widely, which inevitably leads to the problem of copyright infringement. Compared with other copyright protection objects, digital images spread rapidly in the network and are more vulnerable to attacks. The types of attacks can be divided into malicious attacks, such as cropping and rotation, and inevitably non-malicious attacks, such as noise and compression. Effective technologies are needed to resist these attacks. Therefore, digital watermarking has been invented to effectively protect the security of digital images, accurately locate the area of malicious tampering, and resist attacks.
The quality of watermarking mainly depends on its robustness, vulnerability, capacity, and imperceptibility [1,2]. Digital watermarking can be divided into two main categories according to embedding methods: spatial domain watermarking [3,4,5,6,7] and frequency domain watermarking [8,9,10,11,12,13,14,15,16,17,18]. The former is to embed a watermark directly into the host image pixels, and the most classic algorithm is the LSB (least significant bit) method [19,20,21,22,23,24]. Although this technique has lower computational complexity and higher image quality, it has poor robustness and it is vulnerable to attacks. Frequency domain watermarking is mainly designed to improve the robustness of watermarking, where modifying a single coefficient in the spatial domain brings about changes in all pixels corresponding to an image block [25,26,27,28,29,30,31,32,33,34,35,36,37]. The host image is transformed through the use of SVD (Singular Value Decomposition), IWT (Integer Wavelet Transform), DCT, etc. [10,11,12,13,14,15,16,17].
SVD is divided into quantization index modulation (QIM) and relative modulation (RM), but it cannot fully extract the embedding watermark, for there is information loss after the transform. Hu et al. [10] proposed a hybrid modulation, integrating QIM and RM, to completely extract the watermark without attacks. The advantage is that the watermark can be recovered well when the JPEG and cropping attacks are less than 25%. The disadvantages are that the embedding process is complicated, and the time complexity is high. The image quality evaluated using the peak signal-to-noise ratio (PSNR) is 38.5 dB, which is lower than the acceptable value of 40 dB [2].
IWT divides a signal into four frequency subbands. Low-frequency subbands contain abundant information, where the information embedding will reduce the image quality. High-frequency subbands contain less information, but information embedding will lead to poor robustness. Therefore, researchers have put forward a series of hybrid transform-based methods [11,12,13]. Salehnia et al. [11] combined LWT and SVD to improve the incomplete watermark extraction of SVD and the poor robustness of WT (wavelet transforms). They embedded the watermark into three subbands of the first-level LWT. This method reduces the extraction error rate and improves the robustness under the attacks of JPEG, noise, and cropping. To further improve the robustness, Sinhal et al. [12] performed DCT on the low-frequency subbands after a wavelet transform, embedded information into DCT coefficients, and applied a neural network to accelerate the embedding speed. It has higher robustness under JPEG and noise attacks, but the PSNR is less than 40 dB. The methods based on DCT inter-block coefficient difference [14,15,16,17] effectively guarantee a PSNR greater than 40 dB and improve robustness under compression and hybrid attacks. Both SVD-based and WT-based methods have their own disadvantages: (1) An SVD-based method cannot extract a watermark accurately without attacks; (2) WT-based methods divide the subbands into low, medium, and high frequencies. When the watermark is embedded in low frequency, PSNR is not ideal, and the robustness is weak in medium and high frequency.
DCT-based watermarking is superior to other methods in terms of accuracy, imperceptibility, and robustness. The method, based on the DCT inter-block coefficient difference, can effectively ensure imperceptibility and increase robustness against compression and hybrid attacks. The literature [14,15,16,17] uses the method of quantizing DCT inter-block coefficient difference to embed watermarks, but the selected coefficients and quantized regions can be further optimized and improve the robustness.
The rest of the paper is organized as follows. Section 2 describes the state of the art of the existing schemes and the improvement idea of our scheme. Section 3 illustrates our method in detail. Section 4 gives the experimental results and comparisons to prove the effectiveness and superiority of our scheme. Section 5 concludes this paper.

2. Related Work

DCT can be performed on the entire image or used on selected blocks. The matrix after DCT is shown in Figure 1, the first coefficient in the upper left corner of the matrix is a DC coefficient, and the others are AC coefficients. The matrix is divided into three parts in zig-zag order: low, medium, and high frequency. The low frequency contains the main information of the image and has the greatest impact on the image, while the high frequency contains a small amount of image information and has little impact on the image. Therefore, considering the balance of robustness and imperceptibility, the watermark is generally embedded into the medium frequency coefficients.
Das et al. [14] proposed a watermarking scheme based on the correlation of coefficients between DCT blocks. According to a predefined threshold, they changed only one coefficient in each block. The scheme is robust in terms of JPEG compression and common image attacks. For a 512 × 512 cover image, the watermark is limited to 64 × 63 because some blocks on the boundary cannot be used for embedding. To solve the limitation of the watermark size, Parah et al. [15] proposed embedding the watermark by using the DCT coefficient difference of adjacent blocks. The method is to select and use the intermediate frequency coefficients of two adjacent rows to divide the difference into five regions. However, this scheme only considers the left-to-right (LR) relationship of adjacent blocks and ignores the normal adjacent relationship and up-to-down (UD) relationship. Although it improves robustness under mixed attacks, it performs poorly in single attacks and PSNR. The method proposed by Hjk et al. [16] considered the left–right–up–down relationship of the image, and improved the inter-block relationship of the scheme [15]. The PSNR is increased to 41.3 dB, and it better resists rotation and cropping attacks. However, there are still problems in the selection and quantitative segmentation of DCT inter-block coefficients, and the robustness and PSNR are not optimal due to the inappropriate setting of region partition and threshold offset. The robust watermark proposed by Kamili et al. [17] also adopt the method based on DCT inter-block coefficients. While comprehensively taking into account the LR and UD adjacencies, they improved the rationality of DCT coefficient division and raised PSNR to 42 dB. The NC value is still higher than 0.76 under a 75% cropping attack, and it is basically 1 under JPEG compression. Nevertheless, the DCT coefficient partitioning in [17] has not been further optimized, and no experiments related to the combined attacks have been carried out.
Generally speaking, the current scheme based on the DCT inter-block coefficient has the following limitations.
(1)
Iteratively modifying a coefficient will increase the error rate and affect the accuracy of watermark extraction under JPEG compression,
(2)
In the case of combined attacks, the error rate of extracted watermarks is too high,
(3)
The partitioning and offset selection is inappropriate and does not balance robustness and imperceptibility.
To push the limit of existing methods, aiming at problems (1) and (2), in this paper, two adjacent medium-frequency coefficients are iteratively modified to eliminate the interaction between the parameters, thus improving robustness under JPEG compression and hybrid attacks. Aiming at problems (2) and (3), the partition and offset are selected appropriately to better balance the robustness and image quality and thus improve the error rate after joint attack. In the third chapter of the proposed methods, a detailed description will be given of the intermediate-frequency coefficients, offset intervals, and iteration process selected for this experiment.

3. Proposed Method

The proposed embedding method is based on the DCT coefficient differences. The watermark is embedded according to the predefined rules and the difference offsets. The watermark is extracted according to the region where the differences are located.
This paper compares the deficiencies of previous methods and puts forward some selection rules in terms of inter-block adjacency, difference regions, and offset coefficients.
Selection of inter-block adjacency: The adjacency used in [14] is UD, where each DCT block is the block in the next row. The selected adjacency in [15] is LR and RL (right to left), and the selection of a UD block is used for the connecting part of two rows; please refer to the location indicated by RD and LD in Figure 2. The selected adjacencies in [16] are LR, UD, RL, and DU (down to up), as shown in Figure 3. A 16 × 16 block is divided into four 8×8 sub-blocks to fully consider the correlation between image blocks. The rules of adjacency selection used in this paper also follow the rules in [16].
Selection of difference regions: The difference partition in [15,16] is set to five regions; watermark bits are embedded in different regions. It can be concluded that Region 3 is not used for embedding. The difference between the coefficients of the same position of adjacent blocks is very small. Thus, most of the difference is within Region 3. This means that all differences need to be modified, and increasing the number and amount of difference offsets will reduce the robustness of the watermark. As a result, the proposed method reduces the difference regions to four, and embeds watermark bits into Region 1, 3 and Region 2, 4, which can reduce the number and the value of offsets and improve the robustness of the watermarking. The rule of partitioning is shown in Figure 4.
Selection of offset coefficients: Adjacent blocks in [15,16] are selected as separate medium-frequency coefficients, which will inevitably cause the iterative influence of coefficient offset in watermark embedding, increase the reference coefficient offset and offset amplitude, and also affect the robustness and imperceptibility of the watermarking scheme. In this paper, two adjacent coefficients in the same block are selected as the correction and the reference coefficients, respectively, so as to eliminate the influence caused by iterative offset coefficients and improve the robustness.

3.1. Embedding Process

Step1: subtract the original image pixel value by 128, and limit the pixel size to the range of [ 128 , 128 ] .
Step2: Divide the image size of H × W into 8 × 8 non-overlapping blocks.
Step3: Perform DCT on each 8 × 8 block, and denote the block matrix as B P , Q , where P, Q represents the position of the block in the image.
Step4: Find the four relationships from LR, RD (rightmost to down), RL, DU according to the selection rule of inter-block adjacency, C is the next block of B P , Q .
LR: C = RD: C = RL: C = B P , Q 1 DU: C = B P 1 , Q
Step5: Calculate the difference between adjacent blocks by Equation (1).
Diff = B P , Q x 1 , y 1 C x 2 , y 2
Step6: Calculate the difference by B P , Q . The DC, M e d B P , Q is the median value of the first nine low-frequency zig-zag-ordered AC coefficients. The scale factor to calculate the difference each time of the offset M( B P , Q ) is found by using Equation (2).
M B P , Q = abs Z × DC B P , Q Med B P , Q DC B P , Q
Step7: Embed the binary watermark map into the difference according to the corresponding position, and iterate the offset by the offset. After each offset, the diff is recalculated by using Equations (3) and (4).
Embedding bit.
0 B P , Q x 1 , y 1 + M B P , Q T 2 d i f f T + E B P , Q x 1 , y 1 M B P , Q E d i f f T 2 B P , Q x 1 , y 1 + M B P , Q d i f f T + E
Embedding bit.
1 B P , Q x 1 , y 1 M B P , Q d i f f T E B P , Q x 1 , y 1 + M B P , Q T / 2 d i f f E B P , Q x 1 , y 1 M B P , Q d i f f T / 2
Step8: Generate all the image blocks by using step4 to step7.
Step9: Perform inverse DCT operation on all blocks; all pixels are added by 128 to generate a watermark image.
For the overall embedding framework of the watermark, the overall steps are shown in the following Figure 5: I represents the original image, W represents the binary watermark image, and I’ represents the embedded watermark image. The quantization and encryption methods used for embedding have been discussed in the previous text.

3.2. Extraction Process

Step1: Subtract the original image pixel value by 128, and the pixel size is limited to the range of −128 to 128.
Step2: Divide the H × W size image into 8 × 8 non-overlapping blocks.
Step3: Perform DCT on each 8 × 8 block, denote the block matrix as B P , Q , where P, Q represents the position of the block in the image.
Step4: According to the selection rule of inter-block adjacency, find the four relationships from LR, RD, RL, DU. C is the next block of B P , Q .
Step5: Calculate the difference between adjacent blocks, extract the watermark according to the partition threshold T, difference region 1, 3 extract watermark bits0, difference region 2, 4 extract watermark bits1.

3.3. Embedding and Extraction of Color Image Watermark

In this experiment, the RGB color channels are divided into three planes, namely R, G, and B. Each plane is regarded as a separate gray scale image, and the watermark is embedded into each plane separately. In the RGB channels, we use the same key and binary watermark.

4. Experimental Results

This experiment tests the robustness and imperceptibility of watermarking by various attacks. Figure 5 shows the original images and the watermarked images, which are labelled as the Lena, Airplane, and Peppers images. The size of each original image is 512 × 512 and the binary watermark is 64 × 64.
Mean square error (MSE) is used to calculate the difference between the original image and the watermark image. PSNR is used to evaluate the quality of the watermark image. Normalized correlation (NC) and bit error rate (BER) are used as the measures of accuracy for the binary watermark extracted from the watermarked image. The definitions of PSNR, NC, and BER are as follows:
PSNR: This is the most important and commonly used image quality assessment. If I denotes the original image and I w denotes the watermarked image, the PSNR is defined by Equation (5).
PSNR = 10 log 10 255 2 MSE
MSE is defined in Equation (6).
MSE = i = 1 W j = 1 H I ( i , j ) - I w ( i , j ) 2
where W and H are the width and height of the image, respectively, I ( i , j ) are the original pixel values, and I w i , j are the original pixel values. MSE indicates the difference between the original image and the watermarked image, and the PSNR value evaluates the imperceptibility of the watermarked image, so MSE is as small as possible and PSNR is as large as possible.
NC: This is used to evaluate the watermark. NC is defined in Equation (7).
NC = i j W i , j × W x i , j i j W ( i , j ) 2
where W is the watermarked image, W x is the image that the watermark is extracted from, and (i,j) is the position of the watermark pixels in the image. Larger NC values indicate that the extracted watermark is more similar to the original watermark, which means the robustness is higher.
BER: This is defined as the ratio of the number of erroneous watermark bits to the total number of embedded bits. The lower the BER, the more robust the watermark is to attacks. The BER is defined in Equation (8).
BER = j = 1 n B j B x ( j ) × 100
where n is the total number of embedded watermarked bits, B j is the original watermarked bits, and B x ( j ) is the extracted watermark bits.
In this experiment, the tests of payload, imperceptibility, and robustness are performed on different gray and color images. The scheme is compared with existing DCT inter-block difference watermarking, and the results show that the scheme outperforms existing watermarking techniques in terms of imperceptibility and robustness. In addition, it is able to provide high-quality watermarked images.

4.1. Non-Attack Watermark Extraction

Different offsets E have various effects on the imperceptibility and robustness of the image. Figure 6a shows the effect of the offset from E = 5 to E = 20 on the PSNR.
Figure 6b is used to compare the imperceptibility of the present experimental method with the two current methods based on the difference between DCT blocks, and it can be clearly seen that the proposed method and the methods of [15,16] are accurate when extracting the watermark without attacks. The imperceptibility of the proposed method is higher than that in [15,16] when the offset E = 12. For this, two coefficients are chosen to eliminate the effect of iteration to improve the image quality and increase the robustness. However, in the following experiments, to achieve the best balance between imperceptibility and robustness, E = 14 is used in single and hybrid attacks. In order to compare with the methods of [15,16] under as similar conditions as possible, the E value of JPEG compression attack is changed to 20.
The I, I′, and W′ in Figure 7 represent the original image, watermark image, extracted binary watermark, and corresponding PSNR, NC, and BER, respectively. It indicates that the watermark can be extracted losslessly without attack.

4.2. Robustness Analysis after a Single Attack

In this section, single attacks such as cropping, JPEG, noise, histogram equalization, and sharpening are performed on the watermarked image to test the robustness and whether the watermark can be extracted under the attacks.

4.2.1. Watermark Extraction after Crop Attack

Figure 8 shows an image with a 10% crop in the center; the BER of the extracted watermark is 1.03%. Figure 8 shows the Lena image with 25% cropping of the image (in different regions: top left, top right, bottom left, bottom right) with an average BER of 2.40%. It also shows the Lena image with 50% bottom crop and a BER of 4.71% for the extracted watermark. The results of the cropping attack experiments show that the method can extract the watermark under a cropping attack, and the robustness of the proposed method is compared with robustness under a cropping attack (Lena image) proposed in schemes [15,16] and shown in Figure 9; the proposed method has a lower BER of about 36% compared to scheme [15] and about 4.4% compared to scheme [16].

4.2.2. Watermark Extraction after JPEG Attack

JPEG is a standard compression technique used to minimize image storage requirements and to reduce the bandwidth required for transmission. In our work, we use JPEG compression for the watermarked Lena image with different quality factors (Q = 90 to 40). In methods [15,16], they have changed the offset threshold E = 12 to E = 20 in the process of embedding in order to increase the robustness under JPEG attack and reduce the invisibility of the watermarked image. Our experiment also performs a JPEG attack with E = 20 and outperforms the previous schemes in terms of PSNR, NC, and BER. As Figure 10 shows, when the JPEG compression quality factor Q is at 90 to 60, the proposed scheme can extract binary watermarking without loss with NC = 1 and BER = 0. As shown in Figure 11, our method can still extract watermarks when the Q values are 50 and 40.
Table 1 shows that the proposed scheme can extract the watermark accurately when the quality factor Q is from 60 to 90, while [15,16] cannot extract it with a minor JPEG compression of Q = 90 and Q = 70. In addition, ref. [17] extracts the watermark accurately with Q from 90 to 70, but the NC values are lower than the proposed scheme with Q = 60 to 40.

4.2.3. Watermark Extraction after Noise and Other Attacks

The proposed method was tested via noise addition, sharpening, histogram equalization, and median filtering. The detailed results for the various attacks are listed as shown in Figure 12.
Salt and Pepper noise: The watermarked image is affected by salt and pepper noise with noise density = 0.01.
Gaussian noise: After adding Gaussian noise 0.001 with zero mean and variance.
Sharpening: The watermarked Lena image after sharpening.
Histogram equalization: The watermarked Lena image after histogram equalization.
Median filtering: The Lena image with the extracted watermark is filtered using a median filter of size 3 × 3.
The comparison of the experimental results is shown in Figure 13 and Table 2, which indicates that the proposed method is generally better than those in the literature [15,16]. The comprehensive watermarking performance of this experimental method after a single attack is higher than that of [15,16], with a 3.9% improvement in BER and 16% improvement in PSNR compared to scheme [15] after a single attack, and a slight improvement in BER and PSNR compared to scheme [16] after a single attack.

4.3. Robustness Analysis after Combined Attacks

This proposed method is robust not only against a single attack but also against 2–3 hybrid attacks. The experimental results under six mixed attacks are shown in Figure 14 and Figure 15. It can be seen that BER is greatly improved compared to scheme [15], with a combined improvement of 9%.

5. Conclusions

A robust watermarking method based on DCT inter-block coefficient difference is proposed in this paper. A pair of coefficients in an 8 × 8 DCT block is selected, and the coefficients are slightly changed and offset to a prescribed interval by the adjacent inter-block relations. The proposed method improves the accuracy and robustness of watermarking, which is mainly reflected in the following four aspects. Under the crop attack, BER is about 36% better than [15] and about 4.4% better than [16]. Under JPEG compression above QF = 60, the scheme extracts the watermark accurately and BER = 0. Under the hybrid attack, the average BER is about 9% better than [15]. Under the attacks of noise, histogram equalization, sharpening, and median filter, BER, in comparison with the literature [15], is increased by 3.9%, and the PSNR is increased by 16%, which is also slightly higher than [16]. From the above experimental data, it can be concluded that our scheme has better robustness compared with the existing DCT differential quantization robust watermarking schemes. The existing scheme only targets traditional robust attacks, and the subsequent research on the method’s resistance to adversarial attacks will be based on [38,39].

Author Contributions

Conceptualization, B.Z. and X.Z.; methodology, B.Z. and X.Z.; validation, B.Z. and T.Z.; writing—original draft preparation, B.Z.; writing—review and editing, X.Z.; visualization, B.Z. and X.F. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (No. 62362025) and the Hainan Province Key R & D plan project (No. ZDYF2022GXJS224).

Data Availability Statement

Data Availability The datasets generated during and/or analyzed during the current study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

List of Abbreviations

DCTDiscrete Cosine Transform
SVDSingular Value Decomposition
IWTInteger Wavelet Transform
WTWavelet Transforms
LWTLifting Wavelet Transform
QIMQuantization Index Modulation
RMRelative Modulation
JPEGJoint Photographic Experts Group
PSNRPeak Signal-to-Noise Ratio
NCNormalized Correlation
BERBit Error Ratio
DCDirect Current
ACAlternating Current

References

  1. Lu, T.-C.; Vo, T.N. Reversible steganography techniques: A survey. In Digital Media Steganography; Elsevier: Amsterdam, The Netherlands, 2020; pp. 189–213. [Google Scholar]
  2. Ray, A.; Roy, S. Recent trends in image watermarking techniques for copyright protection: A survey. Int. J. Multimed. Inf. Retr. 2020, 9, 249–270. [Google Scholar] [CrossRef]
  3. Qin, C.; Ji, P.; Zhang, X.; Dong, J.; Wang, J. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 2017, 138, 280–293. [Google Scholar] [CrossRef]
  4. Wang, W.; Ye, J.; Wang, T. Reversible data hiding scheme based on significant-bit-difference expansion. IET Image Process. 2017, 11, 1002–1014. [Google Scholar] [CrossRef]
  5. Kumar, R.; Jung, K.-H. Robust reversible data hiding scheme based on two-layer embedding strategy. Inf. Sci. 2020, 512, 96–107. [Google Scholar] [CrossRef]
  6. Li, X.; Li, J.; Li, B.; Yang, B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 2013, 93, 198–205. [Google Scholar] [CrossRef]
  7. Peng, F.; Li, X.; Yang, B. Improved PVO-based reversible data hiding. Digit. Signal Process. 2014, 25, 255–265. [Google Scholar] [CrossRef]
  8. Molina-Garcia, J.; Garcia-Salgado, B.P.; Ponomaryov, V.; Reyes-Reyes, R.; Sadovnychiy, S.; Cruz-Ramos, C. An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process. Image Commun. 2019, 81, 115725. [Google Scholar] [CrossRef]
  9. Bolourian Haghighi, B.; Taherinia, A.H.; Monsefi, R. An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network. Cogn. Comput. 2020, 12, 863–890. [Google Scholar] [CrossRef]
  10. Hu, H.T.; Hsu, L.Y.; Chou, H.H. An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated. Inf. Sci. 2020, 519, 161–182. [Google Scholar] [CrossRef]
  11. Salehnia, T.; Fathi, A. Fault tolerance in LWT-SVD based image watermarking systems using three module redundancy technique. Expert Syst. Appl. 2021, 179, 115058. [Google Scholar] [CrossRef]
  12. Sinhal, R.; Jain, D.K.; Ansari, I.A. Machine learning based blind color image watermarking scheme for copyright protection. Pattern Recognit. Lett. 2021, 145, 171–177. [Google Scholar] [CrossRef]
  13. Li, Z.; Zhang, H.; Liu, X.; Wang, C.; Wang, X. Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digit. Signal Process. 2021, 115, 103062. [Google Scholar] [CrossRef]
  14. Das, C.; Panigrahi, S.; Sharma, V.K.; Mahapatra, K. A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int. J. Electron. Commun. 2014, 68, 244–253. [Google Scholar] [CrossRef]
  15. Parah, S.A.; Sheikh, J.A.; Loan, N.A.; Bhat, G.M. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process. 2016, 53, 11–24. [Google Scholar] [CrossRef]
  16. Ko, H.-J.; Huang, C.-T.; Horng, G.; Wang, S.-J. Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 2020, 517, 128–147. [Google Scholar] [CrossRef]
  17. Kamili, A.; Hurrah, N.N.; Parah, S.A.; Bhat, G.M.; Muhammad, K. DWFCAT: Dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans. Ind. Inform. 2020, 17, 5108–5117. [Google Scholar] [CrossRef]
  18. Zhou, X.; Ma, Y.; Zhang, Q.; Mohammed, M.A.; Damaševičius, R. A reversible watermarking system for medical color images: Balancing capacity, imperceptibility, and robustness. Electronics 2021, 10, 1024. [Google Scholar] [CrossRef]
  19. Hemida, O.; He, H. A self-recovery watermarking scheme based on block truncation coding and quantum chaos map. Multimed. Tools Appl. 2020, 79, 18695–18725. [Google Scholar] [CrossRef]
  20. Shehab, A.; Elhoseny, M.; Muhammad, K.; Sangaiah, A.K.; Yang, P.; Huang, H.; Hou, G. Secure and robust fragile watermarking scheme for medical images. IEEE Access 2018, 6, 10269–10278. [Google Scholar] [CrossRef]
  21. Bhalerao, S.; Ansari, I.A.; Kumar, A. A secure image watermarking for tamper detection and localization. J. Ambient Intell. Humaniz. Comput. 2021, 12, 1057–1068. [Google Scholar] [CrossRef]
  22. Rhayma, H.; Makhloufi, A.; Hamam, H.; Hamida, A.B. Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection. Multimed. Tools Appl. 2021, 80, 26813–26832. [Google Scholar] [CrossRef]
  23. Raj, N.R.N.; Shreelekshmi, R. A survey on fragile watermarking based image authentication schemes. Multimed. Tools Appl. 2021, 80, 19307–19333. [Google Scholar] [CrossRef]
  24. Huang, L.; Kuang, D.; Li, C.-L.; Zhuang, Y.-J.; Duan, S.-H.; Zhou, X.-Y. A self-embedding secure fragile watermarking scheme with high quality recovery. J. Vis. Commun. Image Represent. 2022, 83, 103437. [Google Scholar] [CrossRef]
  25. Qi, W.F.; Zhang, T.; Guo, Z.M. Reversible data hiding using multiple histogram modification and dynamic programming. IEEE Trans. Inf. Forensics Secur. 2019, 10, 1109. [Google Scholar]
  26. Liu, X.-L.; Lin, C.-C.; Yuan, S.-M. Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 2016, 28, 1047–1055. [Google Scholar] [CrossRef]
  27. Guo, J.; Zheng, P.; Huang, J. Secure watermarking scheme against watermark attacks in the encrypted domain. J. Vis. Commun. Image Represent. 2015, 30, 125–135. [Google Scholar] [CrossRef]
  28. Ansari, I.A.; Pant, M.; Ahn, C.W. SVD based fragile watermarking scheme for tamper localization and self-recovery. Int. J. Mach. Learn. Cybern. 2016, 7, 1225–1239. [Google Scholar] [CrossRef]
  29. Swaraja, K.; Meenakshi, K.; Kora, P. An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed. Signal Process. Control 2020, 55, 101665. [Google Scholar]
  30. Prasad, S.; Pal, A.K. Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed. Tools Appl. 2020, 79, 20897–20928. [Google Scholar] [CrossRef]
  31. Lee, C.-F.; Shen, J.-J.; Chen, Z.-R.; Agrawal, S. Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery. Sensors 2019, 19, 2267. [Google Scholar] [CrossRef]
  32. Feng, B.; Li, X.; Jie, Y.; Guo, C.; Fu, H. A Novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration. Mob. Netw. Appl. 2020, 25, 82–94. [Google Scholar] [CrossRef]
  33. Rakhmawati, L.; Wirawan, W.; Suwadi, S. A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019, 2019, 61. [Google Scholar] [CrossRef]
  34. Prasad, S.; Pal, A.K. A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed. Tools Appl. 2020, 79, 1673–1705. [Google Scholar] [CrossRef]
  35. Botta, M.; Cavagnino, D.; Pomponiu, V. Reversible fragile watermarking for multichannel images with high redundancy channels. Multimed. Tools Appl. 2020, 79, 26427–26445. [Google Scholar] [CrossRef]
  36. Gong, X.; Chen, L.; Yu, F.; Zhao, X.; Wang, S. A secure image authentication scheme based on dual fragile watermark. Multimed. Tools Appl. 2020, 79, 18071–18088. [Google Scholar] [CrossRef]
  37. Duan, S.; Wang, H.; Liu, Y.; Huang, L.; Zhou, X. A novel comprehensive watermarking scheme for color images. Secur. Commun. Netw. 2020, 2020, 8840779. [Google Scholar] [CrossRef]
  38. Machado, G.R.; Silva, E.; Goldschmidt, R.R. Adversarial Machine Learning in Image Classification: A Survey Towards the Defender’s Perspective. ACM Comput. Surv. (CSUR) 2021, 55, 1–38. [Google Scholar] [CrossRef]
  39. Song, Z.; Zhang, Z.; Zhang, K.; Luo, W.; Fan, Z.; Ren, W.; Lu, J. Robust Single Image Reflection Removal Against Adversarial Attacks. In Proceedings of the 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada, 18–22 June 2023. [Google Scholar]
Figure 1. Zig-zag ordering for DCT coefficients.
Figure 1. Zig-zag ordering for DCT coefficients.
Electronics 12 04117 g001
Figure 2. Arrangement of DCT blocks 1.
Figure 2. Arrangement of DCT blocks 1.
Electronics 12 04117 g002
Figure 3. Arrangement of DCT blocks2.
Figure 3. Arrangement of DCT blocks2.
Electronics 12 04117 g003
Figure 4. Modification of coefficient for embedding a watermark bit.
Figure 4. Modification of coefficient for embedding a watermark bit.
Electronics 12 04117 g004
Figure 5. Watermark embedding flowchart.
Figure 5. Watermark embedding flowchart.
Electronics 12 04117 g005
Figure 6. PSNR comparison of Lena watermark images under different values of E. (a) PSNR under different values of E using proposed method; (b) PSNR under different methods using the same values of E [15,16].
Figure 6. PSNR comparison of Lena watermark images under different values of E. (a) PSNR under different values of E using proposed method; (b) PSNR under different methods using the same values of E [15,16].
Electronics 12 04117 g006
Figure 7. PSNR experimental results.
Figure 7. PSNR experimental results.
Electronics 12 04117 g007
Figure 8. Cropped Lena images in six different regions.
Figure 8. Cropped Lena images in six different regions.
Electronics 12 04117 g008
Figure 9. BER comparison of different cropping methods [15,16].
Figure 9. BER comparison of different cropping methods [15,16].
Electronics 12 04117 g009
Figure 10. After JPEG compression (Q = 90 − 60) and extracted watermarks.
Figure 10. After JPEG compression (Q = 90 − 60) and extracted watermarks.
Electronics 12 04117 g010
Figure 11. After JPEG compression (Q = 50 − 40) and extracted watermarks.
Figure 11. After JPEG compression (Q = 50 − 40) and extracted watermarks.
Electronics 12 04117 g011
Figure 12. Comparisons for a variety of attacks.
Figure 12. Comparisons for a variety of attacks.
Electronics 12 04117 g012
Figure 13. NC comparisons for a variety of attacks [15,16].
Figure 13. NC comparisons for a variety of attacks [15,16].
Electronics 12 04117 g013
Figure 14. BER comparison with various combined attacks. (a): salt and pepper noise and median filter; (b) histogram equalization, sharpening and scaling; (c) histogram equalization and scaling; (d) degree rotation and crop by 25% on the left; (e) 5-degree rotation, 25% crop on the upper left, and histogram equalization; (f) 5-degree rotation, upper left 25% crop, and sharpening.
Figure 14. BER comparison with various combined attacks. (a): salt and pepper noise and median filter; (b) histogram equalization, sharpening and scaling; (c) histogram equalization and scaling; (d) degree rotation and crop by 25% on the left; (e) 5-degree rotation, 25% crop on the upper left, and histogram equalization; (f) 5-degree rotation, upper left 25% crop, and sharpening.
Electronics 12 04117 g014
Figure 15. BER comparison with various combined attacks. (a): salt and pepper noise and median filter; (b) histogram equalization, sharpening and scaling; (c) histogram equalization and scaling; (d) degree rotation and crop by 25% on the left; (e) 5-degree rotation, 25% crop on the upper left, and histogram equalization; (f) 5-degree rotation, upper left 25% crop, and sharpening [15].
Figure 15. BER comparison with various combined attacks. (a): salt and pepper noise and median filter; (b) histogram equalization, sharpening and scaling; (c) histogram equalization and scaling; (d) degree rotation and crop by 25% on the left; (e) 5-degree rotation, 25% crop on the upper left, and histogram equalization; (f) 5-degree rotation, upper left 25% crop, and sharpening [15].
Electronics 12 04117 g015
Table 1. NC Comparisons under JPEG compression with various QF.
Table 1. NC Comparisons under JPEG compression with various QF.
QF[15][16][17]This Program
900.97700.984511
80NANA11
700.97670.981911
60NANA0.99981
50NANA0.99140.9995
40NANA0.90980.9789
Table 2. Comparisons after noise and other attacks.
Table 2. Comparisons after noise and other attacks.
Schemes [15] [16] Proposed
AttackNCPSNRBERNCPSNRBERNCPSNRBER
Salt and pepper noise (0.01)0.858924.915.60.829925.3617.060.839025.2416.48
Gaussian noise (var = 0.001)0.937520.698.660.903520.699.980.900629.679.74
Median Filter (3 × 3)0.944533.529.950.925837.187.640.906035.089.30
Sharpening0.973125.692.980.980730.031.920.982225.341.76
Histogram0.9665113.870.971618.82.970.977919.112.17
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhu, B.; Fan, X.; Zhang, T.; Zhou, X. Robust Blind Image Watermarking Using Coefficient Differences of Medium Frequency between Inter-Blocks. Electronics 2023, 12, 4117. https://doi.org/10.3390/electronics12194117

AMA Style

Zhu B, Fan X, Zhang T, Zhou X. Robust Blind Image Watermarking Using Coefficient Differences of Medium Frequency between Inter-Blocks. Electronics. 2023; 12(19):4117. https://doi.org/10.3390/electronics12194117

Chicago/Turabian Style

Zhu, Bingbing, Xuefeng Fan, Tianshuo Zhang, and Xiaoyi Zhou. 2023. "Robust Blind Image Watermarking Using Coefficient Differences of Medium Frequency between Inter-Blocks" Electronics 12, no. 19: 4117. https://doi.org/10.3390/electronics12194117

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop