Next Article in Journal
A Metaheuristic Algorithm for Flexible Energy Storage Management in Residential Electricity Distribution Grids
Next Article in Special Issue
Optimized Unidirectional and Bidirectional Stiffened Objects for Minimum Material Consumption of 3D Printing
Previous Article in Journal
New Bounds for the Sine Function and Tangent Function
Previous Article in Special Issue
Voxel-Based 3D Object Reconstruction from Single 2D Image Using Variational Autoencoders
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging

by
Oswaldo Ulises Juarez-Sandoval
1,*,
Francisco Javier Garcia-Ugalde
1,
Manuel Cedillo-Hernandez
2,
Jazmin Ramirez-Hernandez
2 and
Leobardo Hernandez-Gonzalez
2,*
1
Facultad de Ingeniería, Universidad Nacional Autónoma de México (UNAM), Av. Universidad No. 3000, Ciudad Universitaria, Coyoacán, México City 04510, Mexico
2
Instituto Politécnico Nacional (IPN), Escuela Superior de Ingeniería Mecánica y Eléctrica, Unidad Culhuacan, Av. Santa Ana No. 1000, San Francisco Culhuacan, Coyoacán, México City 04430, Mexico
*
Authors to whom correspondence should be addressed.
Mathematics 2021, 9(19), 2374; https://doi.org/10.3390/math9192374
Submission received: 27 July 2021 / Revised: 26 August 2021 / Accepted: 17 September 2021 / Published: 24 September 2021
(This article belongs to the Special Issue Computer Graphics, Image Processing and Artificial Intelligence)

Abstract

:
Digital image watermarking algorithms have been designed for intellectual property, copyright protection, medical data management, and other related fields; furthermore, in real-world applications such as official documents, banknotes, etc., they are used to deliver additional information about the documents’ authenticity. In this context, the imperceptible–visible watermarking (IVW) algorithm has been designed as a digital reproduction of the real-world watermarks. This paper presents a new improved IVW algorithm for copyright protection that can deliver additional information to the image content. The proposed algorithm is divided into two stages: in the embedding stage, a human visual system-based strategy is used to embed an owner logotype or a 2D quick response (QR) code as a watermark into a color image, maintaining a high watermark imperceptibility and low image-quality degradation. In the exhibition, a new histogram binarization function approach is introduced to exhibit any watermark with enough quality to be recognized or decoded by any application, which is focused on reading QR codes. The experimental results show that the proposed algorithm can embed one or more watermark patterns, maintaining the high imperceptibility and visual quality of the embedded and the exhibited watermark. The performance evaluation shows that the method overcomes several drawbacks reported in previous algorithms, including geometric and image processing attacks such as JPEG and JPEG2000.

1. Introduction

Since the beginning of the digital era and the rise of social media, many digital images and videos have been manipulated and shared without restrictions, control, and protection, creating copyright protection and intellectual propriety problems [1,2,3,4]. As a solution, several visible and invisible digital watermarking algorithms have been proposed mainly for images [5,6,7], video, audio [8,9], and other related fields [10,11,12]. However, in real-world applications such as banknotes, official documents, etc., the watermarks are used to deliver information about its authenticity. In this way, a novel watermarking algorithm named invisible–visible watermarking has been proposed as digital representation of the watermarks in real-world applications; in this algorithm, the imperceptibility, payload, and robustness of the invisible and the visible watermarking algorithms are combined with the high quality, resolution [13,14], and the robust display processing capabilities [14,15,16,17] incorporated into several electronic devices. This new watermarking technology can be classified by its exhibition stage as unseen–visible watermarking (UVW) [18,19,20,21] and imperceptible–visible watermarking (IVW) [22,23,24,25], as shown in Figure 1.
The UVW algorithms [18,19,20,21] embed imperceptibly a watermark pattern through a visible watermarking strategy and take advantage of the image enhancement functions provided by the display devices, such as brightness, contrast, gamma, etc. [26,27], to exhibit without additional computational algorithms the watermark to the human visual system (HVS). The IVW algorithms [22,23,24,25] have been proposed as a solution to the several drawbacks presented in the exhibition stage of the UVW algorithms, where a QR code as a watermark is exhibited to the HVS in gray-color, which reduces its readability and the capacity to be correct decoded by common applications. Considering the mentioned drawbacks, the authors of [23] present a pioneer IVW algorithm that takes advantage of the processing capabilities incorporated into the capture devices to embed and exhibit a QR code as a watermark. This algorithm addresses and improves the drawbacks presented by the UVW algorithms; however, its applicability is restricted to professional capture devices with high storage memory and histogram modulation functions, and the exhibited watermark is shown to the HVS in color, which limits its reading and the information decoding by applications with the ability to read QR codes in color. Conversely, an improved IVW algorithm is presented in [24] that solves the above-mentioned drawbacks. To achieve this, a visible watermarking algorithm in the spatial domain is used to embed a QR code into a color image, and an invisible watermarking algorithm in the frequency domain [28] is used to embed the crucial parameters of the embedding stage. In the exhibition stage, the algorithm takes advantage of the processing capabilities of the electronics devices to exhibit the watermark pattern through a strategy named binarization function.
In this paper, the algorithm reported in [23] is improved to deliver additional information about the visual content of images via QR codes exhibited in black-and-white color, maintaining its capability to be exhibited in color; besides, it can be applied to information security tasks that do not require strong robustness. The proposed improvements consider in the embedding stage the human visual perception based on the just noticeable distortion (JND) [29] and the analysis of the histogram distortion induced by the embedding strategy [25]. In the exhibition stage, the algorithm takes advantages of the processing capabilities of the electronic devices to implement a histogram binarization function and exhibit the watermark in black-and-white color. The experimental results show that the proposed algorithm is capable of embedding a watermark maintaining a high imperceptibility and improving the performance of the previously reported algorithms [23,24], and its robustness to common geometric and image processing attacks is higher in several aspects compared with article [24], including JEPG and JPEG2000 compression.
The rest of this paper is organized as follows. Section 2 shows the related works of the IVW algorithms. The procedure of the proposed algorithm is presented in Section 3. The experimental results and a performance comparison with the algorithms [23] and [24] are shown in Section 4 and Section 5, respectively. A discussion is presented in Section 6. Finally, this work concludes in Section 7.

2. Related Works

In this section, the IVW algorithms [23] and [24] are described briefly. These algorithms are considered fundamental works and are used to compare the performance of the proposed algorithm.

2.1. Imperceptible Visible Watermarking (IVW)

The authors of [23] reported a pioneer IVW algorithm that is based on the observation of how several capture devices are equipped with robust image processing capabilities used to provide post-capture functions such as histogram modulation, which is considered as the exhibition strategy, as shown in Figure 2.
In the algorithm, the appropriate embedding region is selected as the largest homogeneous region with smallest variance Rk and size M × N, from the color image Ik, where k∈{R, G, B}. Here, the appropriate mean value m is satisfied by Equation (1).
  m = min ( R ¯ R , R ¯ G , R ¯ B ) ,           i f     min ( R ¯ R , R ¯ G , R ¯ B ) T , max ( R ¯ R , R ¯ G , R ¯ B ) ,         o t h e r w i s e ,
where R ¯ k and T = 2 correspond to the mean value of the embedding region in the color channel k and an empirical strength of the embedding strategy, respectively. To embed a binary watermark pattern W = {wi|wi = 0,1, and i = 1, 2, 3,, M × N}, a color channel of the embedding region is selected among RR, RG, and RB with the smallest mean value. Finally, the embedding strategy is satisfied by Equation (2) if min ( R ¯ R , R ¯ G , R ¯ B ) T or by Equation (3) if min ( R ¯ R , R ¯ G , R ¯ B ) < T , respectively.
  R w ( p i ) = m ,                             i f     w i = 0       a n d   R k ( p i ) < m , m T ,           i f       w i = 1       a n d   R k ( p i ) > m T ,
  R w ( p i ) = m + T ,           i f       w i = 0     a n d   R k ( p i ) < m + T , m ,                           i f       w i = 1       a n d   R k ( p i ) > m ,
where Rk(pi) and Rw(pi) are the i-th pixel value of the embedding and its corresponding watermarked region in the color channel k. Once the watermarked image Iw is obtained, to exhibit the watermark, the algorithm leverages the processing capabilities equipped into the capture devices to execute an exhibition strategy based on the histogram modulation function in the range [α, β], where the range value is obtained as shown in Equation (4).
α = m T ,   β = m ,                         i f min ( R ¯ R ,   R ¯ G ,   R ¯ B ) T , α = m ,                   β = m + T ,       o t h e r w i s e .

2.2. Improved Imperceptible Visible Watermarking (IIVW)

The authors of [24] proposed an improved version of the IVW algorithm [23] that uses a visible watermarking algorithm in the spatial domain and an invisible water-marking algorithm based on the discrete cosine transform (DCT) [28] to embed imperceptibly a binary watermark into a color image Ik. As is shown in Figure 3, once the watermarked image is obtained, it is distributed to the end-users by on-demand or streaming services, and the exhibition stage leverages the processing capabilities of the display devices to exhibit the watermark to the HVS by the mechanism called binarization function.
In this algorithm, n binary watermarks W = {wi|wi = 0,1, and i = 1, 2, 3,, M × N} are embedded into n non-overlapping embedding regions Rn∈Ik selected with the smallest variance from the color image Ik, k∈{R, G, B}, as shown in Equation (5).
R w p i = max 0 , μ R n Δ J N D p i ,                 i f     w i = 0 , min     μ R n + Δ J N D p i , 255 ,     i f     w i = 1 ,
where µRn and Rw(pi) are the mean value of the n-th region and the i-th pixel value of the watermarked region, respectively; ΔJND(pi) is the JND-based embedding strength [29], where Δ = 0.5 corresponds to the imperceptibility factor. After this process, a binary expression of the crucial parameters {n, R1, k1), (μR2, k2), R3, k3), , (µRn, kn)} is obtained to be embedded into BN blocks of size (8 × 8) through the imperceptible DCT-based watermarking algorithm called Quantization Index Modulation Dither-Modulation (QIM-DM) [28]. Finally, to exhibit the watermarks to the HVS, the QIM-DM inverse process is used to recover the crucial parameters used by the mechanism called the binarization function that is given by Equation (6).
I E = 1 ,           i f     I k μ R , 0 ,       o t h e r w i s e ,
where IE corresponds to the exhibited image.

2.3. Oportunities to Improve the IVW algorithms

In the algorithm [23], the performance evaluation is reported in terms of the PSNR in the range of 49 to 69 dB for watermarks with sizes of 320 × 320 and 48 × 48, respectively. However, its embedding strategy, which is given by Equation (2) or Equation (3), modifies the histogram of the embedding region in the range of [m − T, m] or [m, m + T], as is shown in Figure 4a,b respectively.
In the improved IVW algorithm [24], the performance evaluation is reported in terms of the PSNR in the range of 47.97 to 49.5 dB until three binary watermarks are embedded at the same time into a color image. However, in this algorithm, the embedding strategy given by Equation (5) modifies the histogram of the embedding region, as shown in Figure 5.
As is described in Section 1, the algorithm in [24] improves the algorithm in [23] mainly in the exhibition stage where a QR code as watermark is exhibited in color, limiting its capability to be read. However, both algorithms have a strong similarity in their embedding strategies, which can be analyzed through the histogram of their corresponding watermarked regions. Comparing Figure 4 and Figure 5, both algorithms accumulate the watermark information in the defined upper and lower boundaries with respect to the mean value; in the case of [23], there are [m − T, m] and [m, m + T] to 4a,b respectively, and [µRn −ΔJND(pi), µRn + ΔJND(pi)] to the improved IVW [24]; however, in [23], the watermark is exhibited in color to the HVS, representing an applicability limitation with respect to [24], where the watermark is exhibited in a black and white color that is a better option for QR codes as a watermark. Considering these similarities in the embedding stage, the histogram study of the IVW algorithms reported in [23,24], and observing Figure 4 and Figure 5, in this paper, a new improved version of the IVW algorithms is proposed, where several weaknesses of the algorithm in [23] are improved by the performance of the algorithm in [24]. The embedding strategy is improved, substituting the empirical embedding strength T2 by the luminance-based just noticeable difference (JNDL), ensuring a high watermark imperceptibility under normal viewing condition. A new exhibition strategy called histogram binarization function is proposed as well, which exhibits the watermark pattern and binarizes the histogram of the watermarked image with respect to the mean value of the embedding region.

3. Proposed Framework

In the new improved IVW algorithm, a watermark pattern with several characteristics such as owner logotype or QR code can be embedded to provide in color copyright protection or deliver information about the image content; the procedure is divided into the embedding and exhibition stages. The embedding stage based on [23] is improved by the similarities of the algorithms reported previously [25], the histogram study of the invisible–visible watermarking algorithms [18,19,20,21,22,23,24,25], and the incorporation of the JNDL as embedding strength [29], as shown in Figure 6. The exhibition stage leverages the processing capabilities of the display devices to execute an exhibition strategy called histogram binarization function. In this section, both stages are described in detail.

3.1. Embedding Stage

Given an original color image Ik = {Ik(pi)|0Ik(pi)255, i = 1, 2, 3,, wI × hI}, where Ik(pi) corresponds to the i-th pixel in the color channel k∈{R, G, B}, wI and hI are the width and height of the image, and a binary watermark pattern W = {wi|wi = 0,1, and i = 1, 2, 3, , M × N}, with size M × N, the embedding procedure is given by the following steps.
  • Largest homogeneous region selection. In the beginning of the embedding procedure, an embedding region R, with the same size of the watermark, is selected as the largest homogeneous region from Ik; in other words, it must satisfy the minimum variance given by Equation (7).
min   R I k 1 M × N 1 i = 1 M × N R ( p i ) μ * 2 ,
where R(pi) and µ* are the i-th pixel of the largest homogeneous region and its corresponding mean value.
To ensure the homogeneity of the embedding region, a high percentage of its pixels must have the same intensity value; however, if the percentage of pixels is less than a predefined homogeneity threshold Th as shown in Equations (8) and (9), a smoothing operation can be used iteratively until minimize the variance among them.
i = 1 M × N G   R ( p i ) μ * M × N   × T h ,
where
G ( l ) = 1 ,       i f     l = 0 , 0 ,     o t h e r w i s e .   .
Occasionally, the smoothing operation generates a strong visual degradation in the embedding region, which is perceived by the HVS under normal view conditions. To minimalize the visual degradation, instead of using a smoothing operation, the pixels with the most dispersed values are selected, and its values are replaced by others nearest to the mean value µ*; this strategy minimizes the variance and homogenizes the embedding region; empirical analysis shows that 10% of the pixels in R can be used without affecting the visual content.
2.
Appropriate color channel selection. Once the largest homogeneous region R is obtained, an appropriate color channel is selected to embed the corresponding watermark W. According to the previously mentioned, the mean values of each color channel of the embedding region in an RGB color model (µRR, µRG, and µRB) are obtained by Equation (10), and the appropriate color channel must satisfy Equation (11); for example, if the optimal mean value is satisfied by µR = µRG, in which µRG is the minimum or maximum mean value, the appropriate color channel corresponds to the green one.
μ R R = 1 M × N i = 1 M × N R R ( p i ) , μ R G = 1 M × N i = 1 M × N R G ( p i ) , μ R B = 1 M × N i = 1 M × N R B ( p i ) ,  
μ R = min μ R R ,   μ R G ,   μ R B ,       i f   min μ R R ,   μ R G ,   μ R B J N D L min μ R R ,   μ R G ,   μ R B , max μ R R ,   μ R G ,   μ R B ,       o t h e r w i s e ,
where JNDL(x) corresponds to luminance-based JND [29,30].
3.
Embedding strategy. In the proposed algorithm, the empirical embedding strength T is improved by the just noticeable difference (JND), which represents the maximum luminance variation perceived by the HVS [29,30]. In the literature, several JND algorithms in the spatial and frequency domain have been reported to estimate a numerical value [30,31]. Its use is typically defined by the application [31,32,33,34], which in the proposed algorithm concerns the image watermarking. An embedding strength that allows embedding imperceptibly a visible watermark pattern is required; in this way, the JNDL function [29] is considered to estimate the embedding strength and ensure the watermark imperceptibility of the new improved IVW algorithm. Thus, if the appropriate color channel to embed the watermark pattern depends on ensuring that the largest homogeneous region R has a variance value nearest to 0, the JNDL-based embedding strength can be obtained with respect to the corresponding mean value µR, as shown in Equation (12).
J N D L μ R = 1 8 μ R + 6 ,                 μ R ( 0 , 32 ) 1 32 μ R + 3 ,           μ R ( 33 , 64 ) 1 96 μ R + 1 3 ,               μ R ( 65 , 255 )     ,     0 μ R 255.
Once the largest homogeneous regions and its appropriate color channel are selected, an embedding strategy based on the JNDL is adopted to embed imperceptibly the binary watermark W. The embedding strategy is given by two ways given by Equations (13) and (14), which are satisfied when µR = minRR, µRG, µRB) or µR = maxRR, µRG, µRB), respectively.
R w ( p i ) = max ( 0 , μ R Δ ) ,       i f   w i = 0   , min ( μ R , 255 ) ,               o t h e r w i s e   ,
R w ( p i ) = max ( 0 , μ R ) ,                                 i f   w i = 0   , min ( μ R + Δ , 255 ) ,       o t h e r w i s e ,
where Rw(pi) corresponds to the i-th pixel of the watermarked region and Δ = round(JNDL(µR)) represents the embedding strength based on the JNDL with respect to the optimal mean value µR. According to the embedding strategy given by Equations (13) and (14), the histogram of the watermarked region is modified as shown in Figure 7, ensuring the same distortion as that of the algorithms reported previously [23,24]. In both embedding strategies, the bits wi = 0 and wi = 1 of the binary watermark are embedded imperceptibly into the pixels with low and high intensity respectively, and with respect to the optimal mean value µR. In Equation (13), the pixels with low intensity are far from the optimal mean value in −Δ, as is shown in Figure 7a; whereas in Equation (14), the pixels with high intensity are far from the mean value in +Δ, as is shown in Figure 7b.
4.
Finally, the watermarked image Iw = {Iw(pi)|0Iw(pi)255, i = 1, 2, 3, , wIw × hIw} with size wIw × hIw is obtained through the reconstruction of the watermarked region Rw.
According to the embedding procedure survey in Table 1 and considering that n non-overlapping homogeneous regions can be found into an image, these steps can be performed iteratively until they have embedded n binary watermark patterns imperceptibly to the HVS. Although the proposed algorithm is designed to embed a watermark with its original size, it is not limited to leverage the robustness of the QR codes and the characteristics of owner logotypes to resize it if the original image does not have homogeneous regions with the same size as the watermark.

3.2. Exhibition Stage

In the final stage of the proposed framework, the watermark is exhibited to the HVS by a novel histogram binarization function that leverages the characteristics of the embedding strategy and the histogram distortion induced with respect to the optimal mean value; also, this strategy can be easily implemented in several electronic devices.

Histogram Binarization Function

The two approaches of the embedding strategy given by Equations (13) and (14) modify the histogram of the appropriate color channel as shown in Figure 7, and its characteristics are leveraged to propose the novel histogram binarization function as the exhibition stage, as shown in Figure 8. The main idea of this function is to binarize the watermarked image Iw with respect to the main histogram characteristic of the watermarked region, such as the optimal mean value µR, through the two different functions formulated by Equations (15) and (16).
I E p i = 1 ,       i f     μ R = min μ R R ,   μ R G ,   μ R B     a n d     I w ( p i ) μ R , 0 ,     o t h e r w i s e ,
I E p i = 0 ,       i f     μ R = max μ R R ,   μ R G ,   μ R B     a n d     I w ( p i ) μ R , 1 ,     o t h e r w i s e ,
where Equations (15) and (16) are satisfying the embedding strategy given by Equations (13) and (14), respectively. Finally, IE(pi) corresponds to the i-th pixel of the exhibited image IE.

4. Experimental Results

According to [24], the robustness against malicious or non-malicious attacks becomes meaningless, since the main approach of the IVW algorithms is the additional information delivery to the image visual content. However, the copyright application of the proposed algorithm requires reconsidering a robustness evaluation [35]. The experimental results show their applicability to any class of images, and the performance evaluation is provided against common geometric and image processing attacks including JPEG and JPEG2000 compression. Additionally, this section includes a fair comparison against several previously reported algorithms.

4.1. Dataset Detail and Binary Watermark Pattern

The dataset used to evaluate the performance of the proposed algorithm is obtained from the uncompressed color image dataset (UCID) [36], which contains 1338 uncompressed color images with 512 × 384 size and TIFF format. As shown in Figure 9, three binary watermark patterns are used for the performance evaluation, where Figure 9a,c are two owner logotypes with sizes of 150 × 150 and 134 × 39, respectively. Figure 9b corresponds to a QR code of 116 × 116 size and error correction label L that corresponds to a 7% of loss information; additionally, to specifically evaluate QR codes, error correction levels M, Q, and H are capable of information decoding with 15%, 25%, and 30% of loss information [37], respectively.

4.2. Performance Metrics for Image Quality Degradation, Imperceptibility, and Robustness

To evaluate the performance of the proposed algorithm in terms of the watermarked image quality degradation, imperceptibility of the watermark pattern, and robustness against the common geometric and image processing attacks listed in Table 2 and Table 3, the peak signal to noise ratio (PSNR), structural similarity index (SSIM) [38], normalized color difference (NCD) [39], normalized correlation (NC), and bit error rate (BER) are used.
Image quality degradation is generally measured by the performance metric PSNR, as shown in Equation (17).
P S N R ( I k , I w ) = 10 log 10   max ( I k ( p i ) ) 2 M S E ,
M S E I k , I w = 1 w I w × h I w i = 1 w I w × h I w I k ( p i ) I w ( p i ) 2 ,
where MSE given by Equation (18) is the mean square error between the original Ik and the watermarked image Iw, and wIw = wI and hIw = hI are the width and height of the watermarked image. Typically, when PSNR∈ (37 dB, inf), it means that the embedding process generates a low-quality degradation in the watermarked image, and a value nearest to 0 dB represents a higher-quality degradation [41].
The imperceptibility can be defined as a measure of similarity between the original and its corresponding watermarked image. In addition to the PSNR, other metrics to measure the imperceptibility are the SSIM and the NCD, where the SSIM represents an individual comparison of three image parameters such as luminance, contrast, and structure, as shown in (19).
S S I M I k , I w = 2 μ I k μ I w + C 1 2 σ I k ,     I w + C 2 μ I k 2 + μ I w 2 + C 1 σ I k 2 σ I w 2 + C 2 ,
where µI and µIw are the mean value of Ik and Iw, respectively, σI,Iw and σ2X are the corresponding covariance and variance between Ik and Iw, respectively, and C1 = (k1L)2 and C2 = (k2L)2 are two constants used to stabilize the denominator, where k1 = 0.01, k2 = 0.03 and L = 255 correspond to the dynamic range of 8 bits per pixel. The NCD is another performance metric of imperceptibility that measures in the CIELAB color space the similarity between the original image Ik and its corresponding watermarked image Iw; it is formulated as shown in (20).
N C D I k , I w = x = 1 h I w y = 1 w I w Δ L ( x , y ) 2 + Δ a ( x , y ) 2 + Δ b ( x , y ) 2 x = 1 h I y = 1 w I L ( x , y ) 2 + a ( x , y ) 2 + b ( x , y ) 2 ,
where ΔL(x,y), Δa(x,y), and Δb(x,y) of the numerator are the difference between the luminance L and the spaces a and b of the original image I and the watermarked image Iw at the position (x,y). In the denominator L, a and b are the original image color spaces. Generally, the SSIM and NCD values nearest to 1 and 0, respectively, represent a strong similarity between the original image and its corresponding watermarked image.
The NC and the BER are two metrics used in this paper to evaluate the similarity between the original W and the recover watermark patter W’ as well as the robustness against the common geometric and imagen processing attacks listed in Table 2 and Table 3, respectively. The NC and the BER are denoted by Equations (21) and (22).
N C ( W , W ) = i = 1 M × N w i × w i i = 1 M × N w i 2 × i = 1 M × N w i 2 ,
B E R ( W ,   W ) = i = 1 M × N w i w i M × N ,
where ⨂, wi, and wi are the XOR function, i-th pixel of the original W, and the recover watermark W’ = {wi|wi = 0, 1, and i = 1, 2, 3, …, M × N}, with size M × N, respectively. According to Equations (21) and (22), the values of NC and BER nearest to 1 and 0, respectively, represent a strong similarity and robustness against common geometric and imagen processing attacks.
Additionally, to evaluate the performance of the proposed algorithm with respect to the geometric and the image processing attacks listed in Table 2 and Table 3, a fair performance comparison with the most sophisticated and recent IVW algorithms [23,24] is provided.

4.3. Suitability for Any Class of Images

Similar to the most recent and sophisticated reported algorithms [24], the proposed algorithm can use any class of images to embed any binary watermarks, mainly QR codes. As mentioned above, to evaluate the performance of the proposed algorithm, the binary watermark patterns FI, QR, and UNAM are used.
Although not all images of the UCID dataset ensure the largest homogeneous region to embed the mentioned watermark patterns, the proposed algorithm is able to obtain a low visual quality degradation and high imperceptibility; e.g., Table 4 shows three images that ensure the largest homogeneous region with the minimum required variance and three that do not ensure it, and its corresponding exhibited watermark pattern. Additionally, its performance evaluation in terms of quality degradation, imperceptibility, and robustness is shown, wherein both kinds of images offer a good quantitative and visual performance in non-attacked images.

4.4. Image Quality Degradation and Imperceptibility Analysis

In an efficient watermarking algorithm, the image quality degradation is performed by the PSNR, which is strongly related with the imperceptibility that in terms of SSIM and NCD performs similarly between the original and its corresponding watermarked image. To obtain this evaluation, the binary watermark patterns FI, QR, and UNAM are embedded individually into the 1338 images contained within the UCID dataset, and the PSNR, SSIM, and NCD of the images with the same mean value 0 ≤ µR ≤ 255 in the embedding region are averaging. For the FI watermark, the average values of PSNR, SSIM, and NCD with respect to the mean value µR are shown in Figure 10a–c, respectively, those with respect to the QR watermark are shown in Figure 10d–f, respectively; and finally, those with respect to the UNAM watermark are shown in Figure 10g–i, respectively.
Generally, if PSNR ≥ 37 dB, the watermarked image quality is acceptable, and the watermark is considered invisible to the HVS [39]. In this way, Figure 10a,d,g show the average of the performance quality metric with a value greater than 37 dB. Considering all the images of the mentioned dataset, the average of quality for each embedded watermark pattern FI, QR, and UNAM is greater than 37 dB, 43.50 dB, and 53 dB, respectively; in this context, the general quality value (GQV) of the proposed algorithm is 37 dB ≤ GQV ≥ 53 dB.
In the experiment, if SSIM ≥ 0.93 and NCD ≤ 0.05, the original image and its corresponding watermarking are considered similar, and the embedded watermark is considered as imperceptible to the HVS. Figure 10b,c,e,f,h,i show the imperceptibility metric SSIM and NCD with respect to the mean value µR of the appropriate embedding region. As can be observed, the obtained SSIM and NCD values are greater than 0.93 and smaller than 0.05, respectively. Similar to the GQV, a general similarity value (GSV) and general imperceptibility value (GIV) for watermarks FI, QR, and UNAM are obtained. A survey of the general performance for the UCID dataset is shown in Table 5.

4.5. Robustness against Common Geometric Attacks

The easy geometric edition of digital images by mobile applications [42] or dedicated software [43] requires the proposed algorithm performance evaluation against common geometric attacks [35], such as those listed in Table 2. In this paper, the QR codes are considered the most sensible watermark patterns, because additionally to the recognition, they also required the stored information decoding.
In this context, an image is watermarked by the QR watermark; Table 6 shows the robustness results of the attacked image and its corresponding exhibited watermark. However, due to paper length, several results regarding Rotation, Translation with cropping, Flip transformation, and Shearing attacks are omitted in Table 6 but can be accessed from [40], including similar experimental results to FI and UNAM watermarks.
The high performance of the proposed algorithm against geometric attacks allows the recognition and information decoding of the watermark pattern QR; however, robust affine transformation and aspect ratio attacks avoid the correctly contained information decoding from QR with error correction level L. To solve this drawback, a QR code with a higher error correction level could be used.

4.6. Robustness against Common Image Processing Attacks

To evaluate the performance of the proposed algorithm against malicious or non-malicious image processing attacks, an image is watermarked individually by the three proposed watermarks.
As example, Table 7 shows the QR watermarked image after being attacked by the common image processing attacks listed in Table 3. Table 8 shows the visual and numerical robustness results obtained from the images watermarked by the three mentioned watermarks. For the experimental evaluation, the quality of the exhibited watermarks is performed in terms of the NC and BER, and the watermarked images have been attacked by the maximum attack strength that the watermarks can resist; in this way, for watermarked images by QR, a maximum attack strength allows the QR code information decoding to watermarked images by FI or UNAM, a maximum attack strength also allows recognizing the watermark; the specification to each attack is also provided. The obtained results show the robustness of the proposed algorithm against Filter, Noise contamination, Sharpening, Blurring, and Histogram Equalization; in all those cases, visual results of the exhibited watermarks can be recognized easily by the HVS. Numerical results in terms of NC and BER show diverse values nearest to 1 or 0, respectively, which can be considered as the maximum or minimum degradation to recognize and/or decode the watermark pattern. Obtained results from the QR watermarked image show that the watermark can be exhibited with enough quality to be decoded after being attacked; however, its compression robustness is limited due to the QR watermark characteristics and its error correction level; in this way, the QR is only recognized after compression attacks.
Similar to the results reported in [24], Table 8 shows that watermarks such as owner logotypes FI and UNAM are more robust against common image processing attacks than QR logotypes, as can be observed in the compression evaluation where a UNAM watermark is recognized after being compressed by JPEG and JPEG2000 with a quality factor QF:75 and compression rate CR:15, respectively, while to recognize FI and QR watermarks, the compression attack must be decreased. In general, the proposed algorithm preserves a good imperceptibility and robustness against geometric and image processing attack.

5. Comparison with Similar Algorithms

In this section, the performance of the proposed algorithm is compared with the algorithms [23,24] under the same characteristics such as hardwater capabilities, watermark, and image dataset.
To obtain a trustworthy result, 600 images randomly selected from the UCID dataset were watermarked by the algorithms [23,24], and the proposed watermark used in this evaluation is the QR code, because it is considered the most sensible watermark. Table 9 shows the evaluation results of quality and similarity of the watermarked images and the exhibited watermark patterns, respectively; this evaluation is obtained after treating the watermarked images by the image processing attacks listed in Table 3. As can be seen, the algorithm [23] shows better quality results due to its embedding strength being a fixed and empirical value of 2; in the case of the proposed algorithm, and in [24], the embedding strength is not a fixed value and could be selected by the corresponding strategy in the range of [0,6]. With respect to the similarity evaluation, [23] shows a poor performance due to the algorithm exhibiting the watermark in color. Finally, the proposed algorithm shows a better performance than [23] and one that is a little bit higher than [24].
Figure 11a,b shows a BER comparison of the exhibited QR watermark after compression by JPEG and JPEG 2000, respectively; in both images L, M, Q, and H correspond to the QR error correction level.
Table 10 compares the image quality degradation and watermark imperceptibility of the proposed algorithm against those of [23] and [24]. In this evaluation, we used the 600 images that have been watermarked by the QR code with the maximum embedding strength. As can be seen, the obtained results for [23] are similar to those proposed; however, as explained previously, the embedding strength of [23] corresponds to the empirical value of 2, while the embedding strength of [24] and the proposed algorithm corresponds to Δ = 5.

6. Discussion and Analysis

To improve the previously reported algorithm [23], the proposed algorithm takes advantage of the histogram distortion induced by the embedding strategy. The obtained results show that the proposed algorithm has better performance than the most sophisticated and recent algorithm [24]. These results are obtained considering that the embedding region is selected as the largest homogeneous region satisfying the minimum variance; however, in a real-world scenario, the captured scenes can integrate many homogeneous regions that make it possible to embed multiple watermarks. Figure 12a shows an image that once analyzed chooses three non-overlapping regions to embed the proposed watermarks; Figure 12b–d show the corresponding exhibited watermarks.
The relation between the embedding and the exhibition strategy of [23,24], and the proposed algorithm is analyzed by the histogram distortion of the embedding region; this relation makes it possible to share the exhibition strategies among them, mainly the histogram modulation-based strategy. Figure 13a is the same multi-watermarked image of Figure 12a, and Figure 13b–d show the results to share among them regarding histogram modulation as the exhibition strategy. These results are possible due to all the algorithms inducing the same histogram distortion in the appropriate embedding region; however, this strategy is not feasible to exhibit QR codes.
In [24], the reported algorithm is applied on streaming video and images services, where end-users can exhibit the watermark through clicking a media-player button, which executes the corresponding exhibition strategy. To exhibit the watermark, the exhibition strategy shares a crucial parameters set that was embedded previously by the invisible watermarking algorithm QIM-DM [28], the incorporation of this algorithm increasing the computational cost and decreasing the image quality. In this context and taking into account that the most popular on-demand and streaming services, such as Netflix [44], DisneyPlus [45], and PrimeVideo [46], require a dedicated platform to play their audiovisual content, the crucial parameters to exhibit the watermark can be transmitted by the platform and stored into the memory of the electronic display device. When the end-users want to exhibit the watermark, the proposed algorithm takes advantage of robust image processing capabilities; with this strategy, an additional complex computational algorithm is not required to exhibit the watermark. If the proposed algorithm considers the same crucial parameters to exhibit every watermark, the required memory and the computational cost are low.

7. Conclusions

In this paper, a copyright protection and information delivery algorithm is presented; the proposed one introduces a new improved version of the pioneer imperceptible–visible watermarking algorithm [23] that takes advantage of the histogram distortion induced by the embedding strategy to introduce a new embedding strategy, and the processing capabilities incorporated into the electronic display devices to propose a new histogram binarization function-based exhibition strategy. The experimental results show that the proposed algorithm improves several aspects of the most sophisticated and recent IVW algorithm [24]. In general, the algorithm can embed one or multiple watermarks, guaranteeing high watermarked image quality in the range of 37 dB ≤ PSNR ≥ 53 dB, and the watermark imperceptibility is reported with an SSIM ≥ 0.93 and NCD ≤ 0.05, preserving the high visual quality of the exhibited watermarks, mainly QR codes. The low complexity of the proposed algorithm makes it a feasible option to be applied to copyright protection and information delivery related to video or image visual content.

Author Contributions

Conceptualization, O.U.J.-S. and F.J.G.-U.; methodology, F.J.G.-U., M.C.-H. and L.H.-G.; software, O.U.J.-S.; validation, O.U.J.-S., F.J.G.-U. and M.C.-H.; formal analysis, O.U.J.-S., F.J.G.-U. and M.C.-H.; investigation, O.U.J.-S., F.J.G.-U. and M.C.-H.; resources, M.C.-H. and L.H.-G.; data curation, O.U.J.-S. and J.R.-H.; writing, original draft preparation, O.U.J.-S. and J.R.-H.; writing, review and editing, O.U.J.-S. and J.R.-H.; visualization, F.J.G.-U., M.C.-H. and L.H.-G.; supervision, F.J.G.-U., M.C.-H. and L.H.-G.; project administration, F.J.G.-U., M.C.-H. and L.H.-G.; funding acquisition, F.J.G.-U. and L.H.-G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Universidad Nacional Autónoma de México (UNAM) under the DGAPA Postdoctoral Scholarship Program and the PAPIIT-IT101119 Research Project, and by the Instituto Politécnico Nacional (IPN).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Publicly available datasets were analyzed in this study. These data can be found here: https://www.dropbox.com/s/3alzvk6z8yumeik/Aditional%20IVW%20Re-598sults.rar?dl=0 (accessed on 20 September 2021).

Acknowledgments

The authors thank the Universidad Nacional Autónoma de México (UNAM) under the DGAPA Postdoctoral Scholarship Program, the PAPIIT-IT101119 Research Project, and the Instituto Politécnico Nacional (IPN) by the support provided during the realization of this research. The authors of the article appreciate the valuable suggestions of the referees, and the editor who contributed to improve the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 1997, 6, 1673–1687. [Google Scholar] [CrossRef]
  2. Cox, I.J.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography, 2nd ed.; Morgan Kaufmann: San Francisco, CA, USA, 2007; pp. 335–374. [Google Scholar]
  3. Barni, M.; Bartolini, F. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications (Signal Processing and Communications), 1st ed.; CRC Press: Boca Raton, FI, USA, 2004; pp. 23–43. [Google Scholar]
  4. Lu, C.S. Steganography and Digital Watermarking Techniques for Protection of Intellectual Property; Idea Group Publishing: Hershey, PA, USA, 2005; pp. 173–206. [Google Scholar]
  5. Singh, P.; Chadha, R.S. A survey of digital watermarking techniques, applications and attacks. Int. J. Eng. Innov. Technol. 2013, 2, 165–175. [Google Scholar]
  6. Singh, A.K. Some New Techniques of Improved Wavelet Domain Watermarking for Medical Images. Ph.D. Thesis, National Institute of Technology, Kurukshetra, Haryana, India, May 2015. [Google Scholar]
  7. Su, Q.; Liu, D.; Yuan, Z.; Wang, G.; Zhang, X.; Chen, B.; Yao, T. New rapid and robust color image watermarking technique in spatial domain. IEEE Access 2019, 7, 30398–30409. [Google Scholar] [CrossRef]
  8. Langelaar, G.; Setyawan, I.; Lagendijk, R. Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Process. Mag. 2000, 17, 20–46. [Google Scholar] [CrossRef] [Green Version]
  9. Li, J.; Zhang, H.; Wan, W.; Sun, J. Two-class 3D-CNN classifiers combination for video copy detection. Multimed. Tools Appl. 2020, 79, 4749–4761. [Google Scholar] [CrossRef]
  10. Iwendi, C.; Jalil, Z.; Javed, A.R.; Reddy, G.T.; Kaluri, R.; Srivastava, G.; Jo, O. Key Split Watermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 2020, 8, 72650–72660. [Google Scholar] [CrossRef]
  11. Zigomitros, A.; Papageorgiou, A.; Patsakis, C. Social network content management through watermarking. In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 1381–1386. [Google Scholar]
  12. Bertini, F.; Sharma, R.; Iannì, A.; Montesi, C. Smartphone verification and user profiles linking across social networks by camera fingerprinting. In Proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, Seoul, Korea, 6–8 October 2015; pp. 176–186. [Google Scholar]
  13. Park, Y.; Kim, J.; Kim, M.; Lee, W.; Lee, S. Programmable multimedia platform based on reconfigurable processor for 8K UHD TV. IEEE Trans. Consum. Electron. 2015, 61, 516–523. [Google Scholar] [CrossRef]
  14. Wang, H.; Zhang, X.; Wang, T.; Li, W.; Chen, Q.; Ren, P.; Wu, X.; Sun, H. A 4K × 2K@60fps Multifunctional Video Display Processor for High Perceptual Image Quality. IEEE Trans. Circuits Syst. I Regul. Pap. 2020, 67, 451–463. [Google Scholar] [CrossRef]
  15. Caviedes, J.E. The Evolution of Video Processing Technology and Its Main Drivers. Proc. IEEE 2012, 100, 872–877. [Google Scholar] [CrossRef]
  16. Xu, C.; Peng, Z.; Hu, X.; Zhang, W.; Chen, L.; An, F. FPGA-Based Low-Visibility Enhancement Accelerator for Video Sequence by Adaptive Histogram Equalization With Dynamic Clip-Threshold. IEEE Trans. Circuits Syst. I Regul. Pap. 2020, 67, 3954–3964. [Google Scholar] [CrossRef]
  17. Li, Z.; Wang, J.; Sylvester, D.; Blaauw, D.; Kim, H.S. A 1920 × 1080 25-Frames/s 2.4-TOPS/W Low-Power 6-D Vision Processor for Unified Optical Flow and Stereo Depth With Semi-Global Matching. IEEE J. Solid-State Circuits 2019, 54, 1048–1058. [Google Scholar] [CrossRef]
  18. Chuang, S.; Huang, C.; Wu, J. Unseen Visible Watermarking. In Proceedings of the 2007 IEEE International Conference on Image Processing, San Antonio, TX, USA, 16 September–19 October 2007. [Google Scholar]
  19. Huang, C.; Chuang, S.; Huang, Y.; Wu, J. Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents. IEEE Trans. Inf. Forensics Secur. 2009, 4, 193–206. [Google Scholar] [CrossRef]
  20. Juarez-Sandoval, O.; Fragoso-Navarro, E.; Cedillo-Hernandez, M.; Nakano, M.; Perez-Meana, H.; Cedillo-Hernandez, A. Improved unseen-visible watermarking for copyright protection of digital image. In Proceedings of the 5th International Workshop on Biometrics and Forensics (IWBF), Coventry, UK, 4–5 April 2017; pp. 1–5. [Google Scholar]
  21. Juarez-Sandoval, O.; Cedillo-Hernandez, M.; Nakano, M.; Cedillo-Hernandez, A.; Perez-Meana, H. Digital image ownership authentication via camouflaged unseen-visible watermarking. Multimed. Tools Appl. 2018, 77, 26601–26634. [Google Scholar] [CrossRef]
  22. Hsieh, W.; Lin, P. Imperceptible Visible Watermarking Scheme Using Color Distribution Modulation. In Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and International Conference on Autonomic and Trusted Computing, Fukuoka, Japan, 4–7 September 2012; pp. 1002–1005. [Google Scholar]
  23. Lin, P.Y. Imperceptible Visible Watermarking Based on Postcamera Histogram Operation. J. Syst. Softw. 2014, 95, 194–208. [Google Scholar] [CrossRef]
  24. Juarez-Sandoval, O.; Fragoso-Navarro, E.; Cedillo-Hernandez, M.; Cedillo-Hernandez, A.; Nakano, M.; Perez-Meana, H. Improved imperceptible visible watermarking algorithm for auxiliary information delivery. IET Biom. 2018, 7, 305–313. [Google Scholar] [CrossRef]
  25. Juarez-Sandoval, O.U.; Garcia-Ugalde, F.; Cedillo-Hernandez, M.; Ramirez-Hernandez, J. Imperceptible Visible Watermarking with Watermark Readability Improved. In Proceedings of the IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), Guerrero, México, 4–6 November 2020; pp. 1–6. [Google Scholar]
  26. Projected Image System Contrast Ratio, ANSI/INFOCOMM 3M-2011. Available online: https://www.avixa.org/standards/projected-image-system-contrast-ratio (accessed on 12 April 2021).
  27. Gamma Correction Function. Available online: https://www.mathworks.com/help/images/ref/imadjust.html?s_tid=srchtitle (accessed on 1 July 2021).
  28. Chen, B.; Wornell, G.W. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 2001, 47, 1423–1443. [Google Scholar] [CrossRef] [Green Version]
  29. Yu, P.; Shang, Y.; Li, C. A new visible watermarking technique applied to CMOS image sensor. In Proceedings of the MIPPR 2013: Multispectral Image Acquisition, Processing, and Analysis, Wuhan, China, 26–27 October 2013; p. 891719. [Google Scholar]
  30. Bae, S.; Kim, M. A Novel DCT-Based JND Model for Luminance Adaptation Effect in DCT Frequency. IEEE Signal Process. Lett. 2013, 20, 893–896. [Google Scholar]
  31. Fragoso-Navarro, E.; Cedillo-Hernandez, M.; Nakano-Miyatake, M.; Cedillo-Hernandez, A.; Pérez-Meana, H.M. Visible Watermarking Assessment Metrics Based on Just Noticeable Distortion. IEEE Access 2018, 6, 75767–75788. [Google Scholar] [CrossRef]
  32. Yang, X.K.; Lin, W.S.; Lu, Z.K.; Ong, E.P.; Yao, S.S. Just noticeable distortion model and its applications in video coding. Signal Process. Image Commun. 2005, 20, 662–680. [Google Scholar] [CrossRef]
  33. Jung, S.; Ha, L.T.; Ko, S. A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System. IEEE Signal Process. Lett. 2011, 18, 95–98. [Google Scholar] [CrossRef]
  34. Liu, H.; Zhang, Y.; Zhang, H.; Fan, C.; Kwong, S.; Jay-Kuo, C.-C.; Fan, X. Deep Learning-Based Picture-Wise Just Noticeable Distortion Prediction Model for Image Compression. IEEE Trans. Image Process. 2020, 29, 641–656. [Google Scholar] [CrossRef] [PubMed]
  35. Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. Attacks on copyright marking systems. In Proceedings of the International Workshop on Information Hiding, Berlin, Germany, 14–17 April 1998; pp. 218–238. [Google Scholar]
  36. Schaefer, G.; Stich, M. UCID: An uncompressed color image database. In Proceedings of the Storage and Retrieval Methods and Applications for Multimedia, San Jose, CA, USA, 18–22 January 2004; pp. 472–480. [Google Scholar]
  37. Quick Response Code. Available online: https://www.qrcode.com/ (accessed on 5 July 2021).
  38. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
  39. Chang, H.; Chen, H.H. Stochastic Color Interpolation for Digital Cameras. IEEE Trans. Circuits Syst. Video Technol. 2007, 17, 964–973. [Google Scholar] [CrossRef]
  40. Supplemental Results. Available online: https://www.dropbox.com/s/3alzvk6z8yumeik/Aditional%20IVW%20Results.rar?dl=0 (accessed on 20 September 2021).
  41. Guo, Y.; Li, B.Z.; Goel, N. Optimized blind image watermarking method based on firefly algorithm in DWT-QR transform domain. IET Image Process. 2017, 11, 406–415. [Google Scholar] [CrossRef] [Green Version]
  42. Snapseed. Available online: https://snapseed.uptodown.com (accessed on 1 July 2021).
  43. Adobe Photoshop Express and Adobe Lightroom. Available online: https://www.adobe.com/ (accessed on 24 July 2021).
  44. Netflix. Available online: https://www.netflix.com/ (accessed on 11 July 2021).
  45. Disney Plus. Available online: https://www.disneyplus.com/. (accessed on 11 July 2021).
  46. Prime Video. Available online: https://www.primevideo.com/ (accessed on 11 July 2021).
Figure 1. Invisible–visible watermarking classification.
Figure 1. Invisible–visible watermarking classification.
Mathematics 09 02374 g001
Figure 2. General diagram of the IVW.
Figure 2. General diagram of the IVW.
Mathematics 09 02374 g002
Figure 3. General diagram of the IIVW.
Figure 3. General diagram of the IIVW.
Mathematics 09 02374 g003
Figure 4. Histogram of the watermarked region. (a) Histogram of the watermarked region by Equation (2), (b) histogram of the watermarked region by Equation (3).
Figure 4. Histogram of the watermarked region. (a) Histogram of the watermarked region by Equation (2), (b) histogram of the watermarked region by Equation (3).
Mathematics 09 02374 g004
Figure 5. Histogram of the watermarked region by Equation (5).
Figure 5. Histogram of the watermarked region by Equation (5).
Mathematics 09 02374 g005
Figure 6. General diagram of the embedding stage.
Figure 6. General diagram of the embedding stage.
Mathematics 09 02374 g006
Figure 7. Histogram distortion of the watermarked region, (a) Histogram distortion induced by Equation (13), (b) Histogram distortion induced by Equation (14).
Figure 7. Histogram distortion of the watermarked region, (a) Histogram distortion induced by Equation (13), (b) Histogram distortion induced by Equation (14).
Mathematics 09 02374 g007
Figure 8. General diagram of the exhibition stage.
Figure 8. General diagram of the exhibition stage.
Mathematics 09 02374 g008
Figure 9. Binary watermark patterns: (a) Owner logotype FI, (b) QR code level L, and (c) Owner logotype UNAM.
Figure 9. Binary watermark patterns: (a) Owner logotype FI, (b) QR code level L, and (c) Owner logotype UNAM.
Mathematics 09 02374 g009
Figure 10. Watermarked UCID graphical quality degradation and imperceptibility. (ac) are the corresponding PSNR, SSIM, and NCD for the FI watermark; (df) are the corresponding PSNR, SSIM, and NCD for the QR watermark; (gi) are the corresponding PSNR, SSIM, and NCD for the UNAM watermark.
Figure 10. Watermarked UCID graphical quality degradation and imperceptibility. (ac) are the corresponding PSNR, SSIM, and NCD for the FI watermark; (df) are the corresponding PSNR, SSIM, and NCD for the QR watermark; (gi) are the corresponding PSNR, SSIM, and NCD for the UNAM watermark.
Mathematics 09 02374 g010
Figure 11. Performance comparison in terms of compression. (a) BER vs. JPEG, (b) BER vs. JPEG2000.
Figure 11. Performance comparison in terms of compression. (a) BER vs. JPEG, (b) BER vs. JPEG2000.
Mathematics 09 02374 g011
Figure 12. Multi-Watermarked image, (a) Watermarked image PSNR = 48.63 dB, SSIM = 0.9964, NDC = 0.0055, (b) Exhibited FI watermark, (c) Exhibited QR watermark, (d) Exhibited UNAM watermark.
Figure 12. Multi-Watermarked image, (a) Watermarked image PSNR = 48.63 dB, SSIM = 0.9964, NDC = 0.0055, (b) Exhibited FI watermark, (c) Exhibited QR watermark, (d) Exhibited UNAM watermark.
Mathematics 09 02374 g012
Figure 13. Histogram modulation-based exhibition strategy applied to the proposed algorithm, (a) Multi-Watermarked image, (b) Exhibited FI watermark, (c) Exhibited QR watermark, (d) Exhibited UNAM watermark.
Figure 13. Histogram modulation-based exhibition strategy applied to the proposed algorithm, (a) Multi-Watermarked image, (b) Exhibited FI watermark, (c) Exhibited QR watermark, (d) Exhibited UNAM watermark.
Mathematics 09 02374 g013
Table 1. Embedding procedure survey.
Table 1. Embedding procedure survey.
ProceduresDetails
InputOriginal image Ik and binary watermark W pattern
Step 1The largest homogeneous region R with the same size of the watermark pattern is selected from the original color image.
Step 2The mean values µRR, µRG, and µRB of each RGB color channel are obtained, as formulated by Equation (10).
Step 3According to Equation (11), the optimal mean value µR is obtained. Moreover, the minimum or maximum mean value selected as the optimal one µR, also determines the appropriate color channel to embed the binary watermark pattern W.
Step 4Ensuring the homogeneity of the embedding region R, the embedding strength JNDL-based is obtained with respect to the optimal mean value µR, as shown in Equation (12).
Step 5According to Equation (13) or Equation (14), the binary watermark pattern W is embedded into the appropriate embedding region.
Step 6Finally, once the watermark pattern W is embedded, the watermarked region is reconstructed, and the watermarked image Iw is obtained.
OutputWatermarked image Iw
Table 2. Common geometric attacks used in the experiment.
Table 2. Common geometric attacks used in the experiment.
AttackSpecification
RotationAngle 45°, {90°,180°,270°}
Rescaling0.75×, {0.9×, 1.1×, 1.5×}
Translation with croppingx = 50, y = 50; {x = −50, y = −50}
Flip transformationHorizontal—{Vertical} direction
Affine Transformation[1,0.3,0;0.3,2,0;0,0,1]
Aspect ratio[0.8,0,0;0,1.5,0;0,0,1]
Shearingx-direction [1 0 0; 0.2 1 0; 0 0 1]
{y-direction [1 0.2 0; 0 1 0; 0 0 1]}
Radial------------
{ } additional experimental results refer to [40].
Table 3. Common image processing attacks used for the experiment.
Table 3. Common image processing attacks used for the experiment.
AttackSpecification
Image Watermarked by
FIQRUNAM
FilterAverage7 × 73 × 35 × 5
Median5 × 53 × 39 × 9
Gaussian9 × 93 × 39 × 9
Noise contaminationImpulsivedensity = 0.5density = 0.3density = 0.5
Gaussianµ = 0, σ2 = 0.0004µ = 0, σ2 = 0.00004µ = 0, σ2 = 0.0005
Sharpening------------Radius = 4, Amount = 1Radius = 0.5, Amount = 2Radius = 5, Amount = 2
Blurring------------Radio = 4Radio = 1.7Radio = 4
Histogram Equalization------------[0, 0.33][0, 0.33][0, 0.33]
CompressionJPEGQF:90QF:90QF:75
JPEG2000CR:10CR:10CR:15
Table 4. Visual quality degradation and imperceptibility of non-attacked watermarked images.
Table 4. Visual quality degradation and imperceptibility of non-attacked watermarked images.
WatermarkFI, 150 × 150 (22,500 Bits)QR code, 116 × 116 (13,456 Bits)UNAM, 134 × 39 (5226 Bits)
Host ImageLargest homogeneous regionLargest homogeneous regionLargest homogeneous region
EnsuringNon-ensuringEnsuringNon-ensuringEnsuringNon-ensuring
ucid00146.tifucid00160.tifucid00449.tifucid00775.tifucid00306.tifucid00262.tif
Watermarked image Mathematics 09 02374 i001 Mathematics 09 02374 i002 Mathematics 09 02374 i003 Mathematics 09 02374 i004 Mathematics 09 02374 i005 Mathematics 09 02374 i006
µR2552225558181242
Δ 333123
PSNR (dB)56.5236.0159.7036.0163.1236.75
SSIM0.998640.974170.999300.979150.999890.98863
NCD0.001440.012280.000850.010530.000530.00426
Exhibited watermark. Mathematics 09 02374 i007 Mathematics 09 02374 i008 Mathematics 09 02374 i009 Mathematics 09 02374 i010 Mathematics 09 02374 i011 Mathematics 09 02374 i012
NC111111
BER000000
Table 5. General performance for UCID.
Table 5. General performance for UCID.
Image SizeGQV (dB)GSVGIV
WatermarkLength (Bits)
FI22,500370.97950.0188
QR19,60043.50.99200.0073
UNAM5226530.99820.0017
Table 6. Robustness against geometric attacks.
Table 6. Robustness against geometric attacks.
Rotation 45°Rescaling 0.75XAffine TransformationAspect Ratio
Attacked image Mathematics 09 02374 i013 Mathematics 09 02374 i014 Mathematics 09 02374 i015 Mathematics 09 02374 i016
Exhibited watermark Mathematics 09 02374 i017 Mathematics 09 02374 i018 Mathematics 09 02374 i019 Mathematics 09 02374 i020
QR decodedYesYesNoNo
Translation with croppingFlip transformationShearing x-directionRadial Transformation
Attacked image Mathematics 09 02374 i021 Mathematics 09 02374 i022 Mathematics 09 02374 i023 Mathematics 09 02374 i024
Exhibited watermark Mathematics 09 02374 i025 Mathematics 09 02374 i026 Mathematics 09 02374 i027 Mathematics 09 02374 i028
QR decodedYesYesYesYes
Table 7. QR watermarked image after image processing attacks.
Table 7. QR watermarked image after image processing attacks.
AttackFilterNoise Contamination
AverageMedianGaussianImpulsiveGaussian
Attacked
Image
Mathematics 09 02374 i029 Mathematics 09 02374 i030 Mathematics 09 02374 i031 Mathematics 09 02374 i032 Mathematics 09 02374 i033
PSNR (dBs)30.1031.4438.499.9245.05
AttackSharpeningBlurringHistogram
Equalization
Compression
JPEGJPEG2000
Attacked
Image
Mathematics 09 02374 i034 Mathematics 09 02374 i035 Mathematics 09 02374 i036 Mathematics 09 02374 i037 Mathematics 09 02374 i038
PSNR (dBs)39.3129.958.0236.7241.07
Table 8. Results of common image processing attacks.
Table 8. Results of common image processing attacks.
AttackWatermark
FI, 150 × 150 (22,500 Bits)QR code, 116 × 116 (13,456 bits)UNAM, 134 × 39 (5226 Bits)
FilterAverage Mathematics 09 02374 i039Kernel = 7 × 7
NC = 0.609263
BER = 0.275933
Mathematics 09 02374 i040Kernel = 3 × 3
NC = 0.663281
BER = 0.191032
Mathematics 09 02374 i041Kernel = 5 × 5
NC = 0.580299
BER = 0.220100
Median Mathematics 09 02374 i042Kernel = 5 × 5
NC = 0.813774
BER = 0.087754
Mathematics 09 02374 i043Kernel = 3 × 3
NC = 0.964520
BER = 0.011331
Mathematics 09 02374 i044Kernel = 9 × 9
NC = 0.975498
BER = 0.008761
Gaussian Mathematics 09 02374 i045Kernel = 9 × 9
NC = 0.845513
BER = 0.089324
Mathematics 09 02374 i046Kernel = 3 × 3
NC = 0.724451
BER = 0.155122
Mathematics 09 02374 i047Kernel = 7 × 7
NC = 0.814519
BER = 0.105576
Noise
Contamination
Impulsive Mathematics 09 02374 i048density = 0.5
NC = 0.500342
BER = 0.264525
Mathematics 09 02374 i049density = 0.3
NC = 0.696087
BER = 0.141795
Mathematics 09 02374 i050density = 0.5
NC = 0.610032
BER = 0.263219
Gaussian Mathematics 09 02374 i051µ = 0, σ2 = 0.0004
NC = 0.372110
BER = 0.349014
Mathematics 09 02374 i052µ = 0, σ2 = 0.00004
NC = 0.652150
BER = 0.225626
Mathematics 09 02374 i053µ = 0, σ2 = 0.0005
NC = 0.335012
BER = 0.329954
Sharpening Mathematics 09 02374 i054Radius = 4, Amount = 1
NC = 0.567612
BER = 0.270045
Mathematics 09 02374 i055Radius = 0.5, Amount = 2
NC = 0.665532
BER = 0.206101
Mathematics 09 02374 i056Radius = 5, Amount = 2
NC = 0.898715
BER = 0.056818
Blurring Mathematics 09 02374 i057Radio = 4
NC = 0.620014
BER = 0.265244
Mathematics 09 02374 i058Radio = 1.7
NC = 0.683341
BER = 0.180042
Mathematics 09 02374 i059Radio = 4
NC = 0.470032
BER = 0.351380
Histogram
Equalization
Mathematics 09 02374 i060[0, 0.33]
NC = 1
BER = 0
Mathematics 09 02374 i061[0, 0.33]
NC = 1
BER = 0
Mathematics 09 02374 i062[0, 0.33]
NC = 1
BER = 0
CompressionJPEG Mathematics 09 02374 i063QF:90
NC = 0.481014
BER = 0.335214
Mathematics 09 02374 i064QF:90
NC = 0.372457
BER = 0.380524
Mathematics 09 02374 i065QF:75
NC = 0.590581
BER = 0.228475
JPEG2000 Mathematics 09 02374 i066CR:10
NC = 0.654781
BER = 0.220441
Mathematics 09 02374 i067CR:10
NCD = 0.460211
BER = 0.352850
Mathematics 09 02374 i068CR:15
NC = 0.618700
BER = 0.276114
Table 9. Robustness comparison against image processing attacks.
Table 9. Robustness comparison against image processing attacks.
AttackSpecificationImperceptible Visible Watermarking
Proposed[23] IVW[24] IIVW
QR Code, 116 × 116QR Code, 116 × 116QR Code, 116 × 116
PSNR
(dB)
BERNCPSNR
(dB)
BERNCPSNR
(dB)
BERNC
FilterAverage7 × 730.09940.20860.654631.10020.8995−0.789229.62370.19940.4205
Median5 × 531.43740.02130.955031.43690.9785−0.954830.46350.34240.9288
Gaussian9 × 938.48860.16420.716938.49050.9971−0.993938.74120.19220.7011
Noise contaminationImpulsivedensity = 0.59.949210.15160.68609.96750.8506−0.69179.54780.18200.6104
Gaussianµ = 0,
σ2 = 0.0004
45.05960.22670.630145.04650.8259−0.629945.38740.21630.5110
Sharpening------------Radius = 4,
Amount = 1
33.60650.21630.644233.60620.8041−0.581532.94370.23350.6157
Blurring------------Radio = 429.94600.19580.672129.94680.9061−0.803128.34720.17420.6521
Histogram Equalization------------[0, 0.33]8.0202018.02000.4004−0.09078.074201
CompressionJPEGQF:9036.72140.40670.375036.73120.6970−0.347235.98550.32100.3350
JPEG2000CR:1041.07190.35460.456641.09160.7330−0.424240.45820.33080.4544
Table 10. Image quality and watermark imperceptibility comparison.
Table 10. Image quality and watermark imperceptibility comparison.
AlgorithmImage QualityImage Imperceptibility
PSNRSSIMNCD
[23]50.41860.99780.0040
[24]48.52150.99510.0074
Proposed51.21450.99630.0060
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Juarez-Sandoval, O.U.; Garcia-Ugalde, F.J.; Cedillo-Hernandez, M.; Ramirez-Hernandez, J.; Hernandez-Gonzalez, L. Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging. Mathematics 2021, 9, 2374. https://doi.org/10.3390/math9192374

AMA Style

Juarez-Sandoval OU, Garcia-Ugalde FJ, Cedillo-Hernandez M, Ramirez-Hernandez J, Hernandez-Gonzalez L. Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging. Mathematics. 2021; 9(19):2374. https://doi.org/10.3390/math9192374

Chicago/Turabian Style

Juarez-Sandoval, Oswaldo Ulises, Francisco Javier Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez, and Leobardo Hernandez-Gonzalez. 2021. "Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging" Mathematics 9, no. 19: 2374. https://doi.org/10.3390/math9192374

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop