Nothing Special   »   [go: up one dir, main page]

Academia.eduAcademia.edu

An IWT based blind and robust image watermarking scheme using secret key matrix

2017, Multimedia Tools and Applications

Multimed Tools Appl DOI 10.1007/s11042-017-4986-1 An IWT based blind and robust image watermarking scheme using secret key matrix Kshiramani Naik1 · Saswati Trivedy1 · Arup Kumar Pal1 Received: 18 October 2016 / Revised: 20 April 2017 / Accepted: 25 June 2017 © Springer Science+Business Media, LLC 2017 Abstract In this paper, the authors have proposed a binary watermark embedding approach for protecting the copyright ownership of the gray-scale images. The proposed watermark embedding process is realized in integer wavelet transform (IWT) domain to defend the robustness property. Instead of inserting the watermark bits directly in the coefficients of cover media, an indirect embedding mechanism is proposed with the reference to a logistic map based secret key matrix which enhance the secrecy of the proposed embedding approach. Initially, the approximate sub band of the IWT transformed cover image is selected with the intention to embed the watermark. Later, a secret key matrix of size corresponding to the approximate sub band of the cover image is formed using the logistic map with secret parameters. During the watermark embedding process, the approximate sub band is modified indirectly with reference to the secret key matrix and a proposed division table. The scheme is tested on a set of standard images and satisfactory results are achieved. In addition, the proposed schemes is also able to extract the watermark information in blind manner. Also, the scheme is comparable with some other related schemes. Finally, the proposed watermarking scheme is able to survive the watermark even after performing certain types of image manipulation attacks. Keywords Blind watermarking · Copyright protection · Integer wavelet transform · Logistic map · Robust watermarking  Kshiramani Naik kshiramani@gmail.com Saswati Trivedy saswatialo12@gmail.com Arup Kumar Pal arupkrpal@gmail.com 1 Department of Computer Science and Engineering, Indian Institute of Technology (ISM) Dhanbad, Jharkhand 826004, India Multimed Tools Appl 1 Introduction The extensive evolution of digital technology facilitates the multimedia data to be transmitted and distributed in digital format over the Internet. As digital data are easily exposed to illegal possession, duplication and dissemination over the Internet, it has become an essential to think about the copyright protection, ownership verification, and tamper-resistance of digital data during their applications. Digital watermarking method is one of the widely used solution for detecting the illegal manipulation occurred in digital data. In digital watermarking method, the information related to the digital data is embedded or hidden in the digital data itself such that the authenticity and integrity can be verified by extracting or detecting the embedded information. The embedded information is termed as watermark. The digital data that contain watermark is termed as cover media. Depending upon the cover media, the watermarking schemes are classified as image, video or audio watermarking. Depending upon the specific goal, the watermarking method can be categorized into robust, semi-fragile and fragile watermarking. The robust watermarking method is generally considered for copyright protection of the digital data [17, 18]. In robust watermarking scheme, the existence of secret information can be known but it is hard to remove/manipulate the secret information [8]. So in copy right protection scheme robust watermarking is preferred. Depending upon the embedding domain, again the robust watermarking schemes can be divided into two categories, i.e., spatial-domain schemes and frequency-domain schemes. In Spatial domain, watermark is added directly by modifying pixel values of the cover image. Several robust watermarking scheme in spatial domain have been devised by researchers [10, 15–17, 21]. Embedding the watermark into the cover image in spatial domain is a straight forward method, which has the advantages of low computational complexity and easy implementation. However, the most serious problem of spatial domains is the weakness of robustness i.e. spatial domain watermarking algorithms is able to resist some limited number of attacks. In transform domain, the watermark is embedded by modulating the coefficients of the transformed cover image. However in case of frequency-domain scheme, the computational cost is higher than the ones based on spatial domain, more information can be embedded and better robustness against the common image processing attacks can be survived. The main advantages of using the frequency domain methods are that they can easily be adapted to lossy compression systems, which have the ability to embed data in the compressed representations, and have ability to reveal the watermark even from the modified watermarked image [9, 20]. The transform domain based watermarking schemes can be implemented through various transformation tools such as discrete cosine transform (DCT) [22], discrete wavelet transform (DWT) [23], Discrete Fourier transform(DFT) [12], Integer wavelet transform(IWT) [4], Singular Value Decomposition(SVD) [11] etc. Various robust image watermarking schemes based on transform domain have shown their effectiveness in image data protection. In [24], Thabit et al. proposed another watermarking scheme based on Slantlet transform matrix to transform small blocks of the original image and hiding the watermark bits by modifying the mean values of the carrier subbands. Fazli et al. [7] proposed a robust watermarking based on a combination of DWT, DCT, and SVD domains. This paper mainly focuses on the geometric attacks. To address this goal, the host image is divided into four non overlapping rectangular segments called sub-images and then watermark is independently embedded into each of them, using the hybrid scheme. The redundancy reduces effect of cropping attack. Moreover, in order to correct main geometric attacks, such as rotation, translation, and affine translation, an inventional synchronization technique is utilized to recover the geometrically attacked image Multimed Tools Appl via detection of desired image corners. A binary image in the first experiment and some 1D binary random sequences with different lengths in the next experiments are used as watermarks. Weng et al. proposed another method based on integer Haar wavelet transform (IHWT), which utilizes block selection and difference expansion (DE) (or histogram shifting (HS)) [28]. IHWT has the characteristic that the average of a block remains unchanged before and after watermark embedding. Hence, this invariability can be used for determining whether a block is located in a smooth region or not. In [19], Pal et al. proposed a robust and blind watermarking scheme based on Discrete Cosine Transform (DCT) for protecting the copyright ownership of the digital images. In this work a binary watermark is embedded into the block based DCT transformed cover image by modifying the middle significant AC coefficients using repetition code. The proposed approach ensures the protection of copyright information even in compressed form of the watermarked image. In [13], Kumsawat et al., the watermark has been embeded into the DMT coefficients using multiwavelet tree techniques. Digital watermarking algorithm using integer wavelet transform(IWT) have received wide range of attention in the recent years due to the property that it can map integer to integer without the rounding error, and can obtain good imperceptibility . There are many IWT-based watermarking schemes that have been proposed in recent years. In [25], Verma et al. designed robust digital watermarking scheme using 3level lifting wavelet transform (LWT) with a block selection procedure. Non-overlapping coefficient blocks from the low pass subband are selected after applying LWT and using certain criterion based on minimum coefficient difference and a threshold value. Ansari et al. proposed another watermarking scheme using IWT and SVD (singular value decomposition) based to address false positive problem that are suffered in SVD based watermarking techniques [3]. The properties of IWT and SVD help in achieving high value of robustness. Singular values are used for the watermark embedding. In order to further improve the quality of watermarking, the optimization of scaling factor (mixing ratio) is performed with the help of artificial bee colony (ABC) algorithm. In [26], Wang et al. proposed an efficient integer transform based reversible watermarking scheme. In this paper, Tian’s difference expansion (DE) technique can be reformulated as an integer transform. Then, a generalized integer transform and a payload-dependent location map are constructed to extend the DE technique to the pixel blocks of arbitrary length. In [5], Bohra et al. proposed a technique for robust watermarking of images based on lifting-based integer wavelet transform. The proposed scheme, along with its robustness has got the capability of blind self–authentication of the watermarked images. This paper also utilizes histogram modification to avoid overflow/underflow problem. In [6], the 2-level IWT based watermarking scheme for embedding the compressed version of the binary watermark logo has been developed for robust watermarking. In this paper, the source document image is divided into empty and non-empty segments depending on the absence or presence of the information. Watermarking is applied for non-empty segments. A binary watermark logo is compressed using binary block coding technique of appropriate block-size. IWT is applied on the nonempty segment of the source document image. LL-sub–band of the transformed image is subdivided into blocks of uniform size and compressed watermark bit stream is embedded into it. In [14], Lingamgunta et al. proposed a reversible watermarking based on IWT. The proposed algorithm hides the data and the bookkeeping information in the high frequency subbands of CDF (2,2) integer wavelet coefficients whose magnitudes are similar to a certain predefined threshold. Histogram modification is applied as a preprocessing to prevent overflow/underflow. The embedding technique is based on the parent–child structure of the transformed coefficients called “quadruple wavelet tree” (QWT). In this paper, we develop an invisible robust watermarking scheme based on 1–level IWT domain. Robustness and Multimed Tools Appl imperceptibility are strongly achieved in the proposed method through the characteristics of IWT. Before watermark embedding, the cover image is transformed through IWT. We have selected the approximate sub band of the integr wavelet transformed cover image for the watermark insertion. Generally watermark embedding only in the approximate sub band reduce the chance of removing or destroying the watermark from the watermarked image. In [27], Wang et al. proposed a 3-level wavelet based intelligent watermarking scheme using particle swarm optimization (PSO) technique. In this scheme, the high sub–bands of the DWT transformed cover image are considered. The coefficents to contains watermark bits are selected randomly from the different sub–bands. Ali & Ahn presented a DWT– SVD based watermarking algorithm where self-adaptive differential evolution algorithm is used during embedding process [1]. Another work is presented by Ali et al was in wavelet domain and SVD domain. In this work the low frequency sub–band is selected and divided into blocks. Again the blocks were SVD transformed and the left and right singular vector matrix are used for watermark embedding using artificial bee colony (ABC) algorithm [2]. In some existing schemes, the watermark bits are embedded directly on the selected coefficients of the cover image. But in the proposed watermarking scheme, instead of embedding the watermark bits directly to the coefficients of the cover image, an indirect method corresponds to a division method is utilized. However watermark embedding only in the low subband increase the chance of removing or destroying the watermark with the attempt of tampering of that portion. Although this proposed method utilize the low sub–band of the transformed cover image, robustness and imperceptibility are strongly achieved through the proposed embedding method and the characteristics of IWT. Also to increase watermarking security, a generated key matrix using logistic is utilized. The intention of the proposed method is to improve the robustness and invisibility of the watermarked image and this scheme is suitable for extract the watermark information in a blind manner. The rest of the paper is organized as follows. Section 2 describes the related fundamentals for better understanding of the proposed method. Section 3 contains the details of the proposed method. The experimental results and discussion are in Section 4. Section 5 contains the conclusion of the work done in this paper. 2 Preliminaries 2.1 Integer to integer wavelet transform Due to the multi-resolution characteristic, the conventional wavelet transform is very popular in signal and image processing field. Also it is a very good computational tool to reduce the digital image files with higher compression ratios which helps to storing images using less memory and for transmitting images faster and more reliably. In the Fig. 1, LL subband represents the approximation part of the image and LH, HH, HL represents the detail part of the image. But the conventional Wavelet transform is not suitable for truly lossless coding because it gives floating point results for any input sequence which generally create problem for reconstruction of the exact signal or image. Due to this problems, a generalized version of conventional wavelet transform, Integer to Integer Wavelet Transform (IWT) is very popular for lossless coding method. It is also known as the second generation of the wavelet transform. The IWT was introduced by Sweldens (1998). The IWT inherits the multi-resolution characteristics of the conventional wavelet transform and that can map integer input sequence to integer output sequence by rounding off the values of wavelet Multimed Tools Appl Fig. 1 n-level wavelet transform transformation. Thus as compared to floating point operation they need less storage space and the implementation is faster than the conventional wavelet coefficients. The IWT was constructed by means of lifting scheme. The schematic diagram of the lifting scheme is shown in Fig. 2: With a lifting scheme, the forward transform is calculated in three steps. Split The input sequence is Sj decomposed into an even sequence and odd sequence.     Evenj −1 , Oddj −1 ← Split Sj Where   Evenj −1 = Evenj −1,k = Sj,2k   Oddj −1 = Oddj −1,k = Sj,2k+1 Predict The numbers from one sequence (generally the odd sequence, Oddj −1 )is predicted on the basis of the other sequence(generally the even sequence, Evenj −1 )by the use of correlation between them.The difference, Dj −1 between the actual value Oddj −1 and   the predicted value, P Evenj −1 becomes the wavelet coefficients. The operation of Fig. 2 Forward integer wavelet transform Multimed Tools Appl obtaining the differences from the prediction is called the lifting step.   Dj −1 = Oddj −1 − P Evenj −1 Where  Pk Evenj −1      Evenj −1,k + Evenj −1,k+1 Sj,2k + Sj,2k+1 = = 2 2 Update The update step follows the prediction step, where the even values are updated from the input even samples and the updated odd samples. They become the scaling coefficients which will be passed on to the next stage of transform. This is the second lifting step.   Sj −1 = Evenj −1 + U Dj −1 Where U is the updated operator and defined as follows:     Dj −1,k Dj −1,k−1 + Dj −1,k 1 = + Uk Dj −1 = 2 4 2 The corresponding inverse transform of IWT is calculated as follows:   Evenj −1 ← Sj −1 − U Dj −1   Oddj −1 ← Dj −1 + P Evenj −1   Sj ← Merge Evenj −1 , Oddj −1   In order to achieve multilevel decomposition,the approximation part, Sj −1,k is further decomposed into approximate and detail parts using split, predict and update stage and we get Sj,2k and Dj,2k . This process can be repeated n number of times, where n = log2 (N ) for the input image of size N × N . 2.2 Logistic mapping Chaotic signals are a kind of pseudorandom, irreversible and dynamical signals generated by deterministic nonlinear equations, which process good characteristics of pseudorandom sequences .The definition is (1) xn+1 = μxn (1 − xn ) Where xn ∈ (0, 1)is the state of the system for (n = 0, 1, 2,..) and μ ∈ [0, 1]. For different values of parameter, μ, the logistic sequence shows different characteristics. For x ∈ (0, 1) and μ ∈ [3.57, 4], the logistic map shows the chaotic behaviour. 3 Proposed method This section describes some motivating factors that are used to design a robust and blind watermarking method. In the proposed approach, the authors have considered various test images of size N ×N as cover images(C) and a binary logo (W ) of size w×w as watermark. To embed the watermark, a region is selected by applying 1–level IWT on the cover image. As already mentioned, the IWT is an efficient and rapid lifting wavelet transform and its properties are best suited to enhance the robustness and preserve the imperceptibility. Due to this, IWT is very popular in case of digital image watermarking. Also the authors have applied IWT on the cover image to decompose the cover image into four sub-bands, named LL, HL, LH and HH. After 1–level IWT transformation of C, the approximation part i.e. LL sub-band with size N 1 × N 1 (N 1 = N2 ) is used for watermark embedding. In this Multimed Tools Appl paper, LL sub-band is termed as CA. Before embedding the watermark, the CA part is decomposed into non-overlapping blocks of size n × n. In the proposed method, the authors consider the block based watermark embedding procedure. To preserve the watermark bit unchanged, a single bit is embedded repeatedly in the selected coefficients of a particular block. Before embedding process some binary key vectors are generated using a division method (explained in the Key Generation phase) for watermark bit embedding. These binary key vectors are generated from a key matrix generated by utilizing the chaotic logistic map. This binary key also utilized to select the coefficients to be embedded in each block. The detail procedure of the proposed method is carried out through three phases as follows: 3.1 Pre-processing phase This phase again comprises of two parts. In the first part a key matrix of same size as CA is generated from the chaotic logistic map. Here, instead of taking the direct values of initial condition and system parameter, the authors have considers the calculated initial value and system parameter to generate the logistic sequence. The key matrix is used to generate the binary key vectors those are used for watermark embedding. In the next part the detail procedure of required binary key vectors is described. Key generation using logistic map Step 1: Generate a random binary key sequence of l bits long, where l = t 2 . Step 2: Divide the key sequence into blocks of 16-bit each. K = σ1 σ2 .....σ16 Step 3: To calculate the initial condition (x0 ) and the system parameter (μ) of the chaotic logistic map, the ASCII key sequence is used. The intermediate values, γ1 and γ2 are used to calculate the initial condition and γ3 , γ4 are used to calculate the system parameter. x0 = mod ((γ1 + γ2 ) , 2)     μ = mod 3.999 + (γ3 + γ4 ) 1000 , 1 Where γ1 γ2 γ3 γ4  = (σ1  σ2  σ3 )10 223 , = (σ4  σ5  σ6 )10 223 , = (σ7  σ8  σ9 )10 223  , = (σ10  σ11  σ12 )10 223 Step 4: Generate a chaotic sequence, a of length l by using the (1). Step 5: Reshape the generated chaotic sequence into a square matrix of size t × t. Step 6: The matrix is concatenated in raster scan order to generate the matrix K EM of size CA i.e N 1 × N 1. Binary key vectors generation for watermark embedding This phase generates the binary keys for the individual block of the decomposed CA. The detail procedure is described as follows: Step 1: Calculate the difference matrix, D using CA sub–band and K EM. D = |CA − K EM| Multimed Tools Appl Step 2: Divide the difference matrix, D into the non overlapping blocks, b of size, n × n.   b = b1 , b2 , ....., b N 12 n2 Step 3: Convert each block into row vector.   2 d = d1×n2 , d2×n2 , ......, d N 12 × n n2 For Example Suppose A is the one of the decomposed block of difference matrix, D. Then A is converted into row vector as shown below. Step 4: Calculate the adjacent differences, Adj Diff in each row using the following formula 2 −1 For i = 1 : 2 : N1 n2 Adj diff (i) = abs(di − di+1 ) Binary Value Generation using Division Method Step 5: Step 6: Step 7: Take a range, R with minimum value, min and maximum value, max. As we are considering gray test images so min = 0 and max = 255. Divide R with r number of divisions to give r slots. Then R = {R1 , R2 , .......Rr } Where R1 = min and Rr = max Then the elements of Binary key vectors, Bin CA(i) reference to the individual block matrix of CA can be generated from the R and Adj diff (i) as follows: ⎧ 1 if Rk ≤ Adj diff(j) ≤ Rk+1 ⎪ ⎪ ⎪ ⎪ and mod (k, 2) == 1 ⎨ (2) Bin CA(j ) = ⎪ ⎪ 0 if R ≤ Adj diff(j) ≤ R ⎪ k k+1 ⎪ ⎩ and mod (k, 2) == 0 Where k = 1 : r and j = 1 : 2 : n2 For example: Suppose r = 20, the range can be divided into different slots as shown in Fig. 3. The main objective of the generation of the binary key vectors space is to utilize these keys as the reference to the coefficients that are to be modified. The utilization of these reference bits are explained in the next section. Multimed Tools Appl Fig. 3 Division of a range 3.2 Watermark embedding phase This section describes the detail of embedding procedure of watermark of size w × w to the CA part of size N 1 × N 1. The main objective is to modify the selected coefficients in such a way that the they fall in the same slot as the watermark bit. The detail procedure is described as follows: Phase 3: watermark embedding Step 1: Decompose CA part into non-overlapping blocks of size n × n.  b = b1 , b2 , ....., bN 12 n2 Step 2: Convert each block into row vectors as follows:  d =     d1×n 2 , d2×n2 , ......, d N 12 ×n 2 n2 Step 3: Store the watermark bits in a row vector W  . Step 4: The watermark bits of the vector, W  are embedded in the blocks of CA part according to the value of binary vectors Bin CA(i) to generate the watermarked Image W CA as follows: Algorithm 1 Watermark embedding algorithm for i 1:w2 do 12 for 1 2 1 do 2 if 0 then if 1 then WCA(i,j) CA(i,j) m end if if 0 then WCA(i,j) CA(i,j) end if end if if 1 then if 0 then WCA(i,j) CA(i,j) m end if if 1 then WCA(i,j) CA(i,j) end if end if end for end for Multimed Tools Appl Fig. 4 Block diagram of the proposed watermark embedding method The block diagram of the watermark embedding method is shown in Fig. 4. 3.3 Extraction method At the receiver end the watermark is detected by the intended recipient from the watermarked image using the same secret key that was used in the embedding method. In the proposed method, instead of sending the whole key ,only the initial value of the logistic map (x0 ) is need to send at the receiver side to generate the required key. The extraction procedure is just the reverse process of embedding procedure and is given as follows: Step 1: Generate the key matrix, K EM from the initial condition(x0 ) of the logistic map. Step 2: Calculate the difference matrix, D  using watermarked image, W CA and K EM. D  = |W CA − K EM| Step 3: Divide the difference matrix, D  into the non overlapping blocks, b of size, 4 × 4.   b = b1  , b2  , ...., b4096  Step 4: Convert each block into row vectors, d  .  d  = d1 , d2 , ...., d4096 Step 5: Calculate the adjacent differences, Adj Diff  in each block of d  . Adj diff = di  − di+1  Multimed Tools Appl Fig. 5 Block diagram of the proposed watermark extraction method Step 6: Step 7: Generate the corresponding binary matrix of Adj Diff  i.e. Bin Adj  using the division method as described above. Calculate the watermarked vectors, W E that contains watermark bits using the following equation:  0 if Bin Adj  = 0 WE = 1 if Bin Adj  = 1 Step 8: Extract the watermark bits from W E as follows:  0 if max f req (W E (i)) = 0 W EX (i) = 1 if max f req (W E (i)) = 1 Step 9: Reshape W EX into a matrix of size 64 × 64. The block diagram of the watermark extraction procedure is depicted in Fig. 5. 4 Experimental results In the proposed scheme, an embedding process using division method (as discussed in the Section 3.1) is employed where the value of the parameter r (r = number of divisions) is given by the user. In this paper, we have considered the value of r = 20, 30, 40 and 50. For the result analysis, several images of size 512 × 512, given in Fig. 6 and a binary logo of size 64 × 64, given in Fig. 7 are taken as the cover media and watermark respectively. The watermark algorithm can be evaluated by considering two important parameters, imperceptibility and robustness (Fig. 8). Imperceptibility measurement The imperceptibility means that the human visual quality of the host image should not be affected much even after watermark embedding. We have generated different sets of watermarked images according to the value of r and are depicted in Figs. 9, 10, 11, and 12. Multimed Tools Appl Fig. 6 Original images: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple h Kiel The corresponding watermarked images with different value of r of the Fig. 6 shown in Figs. 9, 10, 11, and 12. There is very low visual degradation of the watermarked images than original images. Also the histograms of the watermarked images in Fig. 13 are similar to the histogram of original images (Fig. 8) which indicate that the proposed watermark algorithm ensures high degree of fidelity. An alternation to measure the degree of imperceptibility is Peak Signal to Noise Ratio(P SN R) and it can be defined as follows: P SN R = 10 log10 Fig. 7 Binary logo 2552 MSE Multimed Tools Appl Fig. 8 Histogram of original images: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple h Kiel Where M  N  MSE = i−1 j −1 xi,j − x̃i,j M ×N where xi,j and x̃i,j denotes the original and encrypted pixel respectively, and the images are of size M × N . Fig. 9 Watermarked images using 20 divisions: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple h Kiel Multimed Tools Appl Fig. 10 Watermarked images using 30 divisions: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple h Kiel A larger P SN R indicate that the watermarked image more closely resembles the original image meaning that the watermark is more imperceptible. Table 1 shows the calculated P SN R values of the different number of division for the proposed watermarking algorithm. Fig. 11 Watermarked images using 40 divisions: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple h Kiel Multimed Tools Appl Fig. 12 Watermarked images using 50 divisions: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple h Kiel From the Table 1 and the Fig. 14 it shows that the P SN R values are higher than 32 dB and also the P SN R values are improving with the increment of number of divisions. Robustness measurement The robustness of the proposed scheme can be determined in terms of Bit–Error–Rate(BER) and normalized cross correlation(N C) which are measured between the original watermark and extracted watermark (without attack/after applying different types of intended attacks). N C measures the similarities between the original and Fig. 13 Histogram of Watermarked Images: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple h Kiel Multimed Tools Appl Table 1 PSNR of the watermarked images with different number of divisions without attack Image Using 20 division Using 30 division Using 40 division Using 50 division Lena 32.7466 36.475 39.0962 40.6873 Peppers 32.8008 36.1867 39.0348 40.7455 House 32.9646 36.3677 39.1705 40.8079 Baboon 32.8328 36.2423 39.0698 40.6771 Tiffany 32.807 36.1754 39.0559 40.6777 Goldhill 32.7808 36.2274 39.057 40.6843 Zelda 32.7901 36.1801 39.0317 40.6968 Kiel 32.753 36.214 39.882 40.6653 Fig. 14 Imperceptibility comparision with different number of divisions without attack Table 2 BER and NC of the extracted watermark in different number of division without attack Image Lena Peppers House Baboon Tiffany Goldhill Zelda Kiel 20 division 30 division 40 division 50 division BER NC BER NC BER NC BER NC 0.0413 0.0012 0.0068 0.0032 0.0027 0.0017 0.0044 0.0022 1 1 0.9986 1 1 1 1 1 0.0017 0.0017 0.0081 0.0032 0.0022 0.0015 0.0012 0.0034 1 1 0.9993 1 1 1 1 1 0.0097 0.0012 0.0029 0.0002 0.0007 0.0004 0.0009 0.0007 1 1 0.9989 1 1 1 1 1 0.0004 0.0004 0.0015 0 0 0.0002 0 0 1 1 0.9996 1 1 1 1 1 Multimed Tools Appl Fig. 15 N C comparison with different number of divisions extracted watermark. For an efficient watermark algorithm the N C values for different test images should be nearly or equal to 1. Generally, N C ≥ 0.75 is acceptable. The BER values should be very less that means they should be nearly or equal to 0. The N C can be formulated as follows: M  N  i=1 j =1 [w (i, j ) − μw ] × [w̄ (i, j ) − μw̄ ] N C (w, w̄) =    M  M  N N   2  [w (i, j ) − μw ] × [w̄ (i, j ) − μw̄ ]2 i=1 j =1 Fig. 16 BER comparison with different number of divisions i=1 j =1 Multimed Tools Appl Table 3 T AF of the watermarked images with different number of divisions without attack Image Using 20 division Using 30 division Using 40 division Using 50 division Lena 0.1709 0.2197 0.0732 0 Peppers 0.1953 0.1709 0.2441 0 0.1953 House 0.7080 0.6836 0.4395 Baboon 0.2930 0.3906 0.1221 0 Tiffany 0.3418 0.1953 0.1953 0.0488 Goldhill 0.1709 0.1465 0.1221 0 Zelda 0.2686 0.2441 0.0977 0 Kiel 0.2197 0.1709 0.0977 0.0244 Where M and N denote the width and the height of the watermark image, wi,j and w̄i,j denote the original watermark pixel and extracted watermark pixel respectively. μw and μw̄ represent the mean of the original watermark and extracted watermark respectively. The BER can be calculated as follows: BER = Number of error bits Number of error bits per second = Total bits transmitted Data rate per second (3) Table 2 shows the calculated N C and BER values of the proposed scheme. It is observed that the NC values of the extracted watermark of various test images are equal to 1 or nearly equal to 1 and the BER values are also very less which indicate that the extracted watermark is nearly equal to the original watermark. Figures 15 and 16 shows the performance of N C and BER with different number of divisions. Also the robustness can be measured by Tamper Assessment Function(T AF ). It is observed by checking the similarity between the original watermark (w) and extracted watemark(w̄). Mathematically it is written as: N−1   1 w ⊕ w̄ × 100 T AF (%) = M ×N i=0 Fig. 17 T AF comparison with different number of divisions Multimed Tools Appl Fig. 18 Result under Gaussian Low pass filtering (2 × 2) attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Where M × N is the size of watermark image. The value of T AF shoule be closer to zero for the better result. From the Table 3 and Fig. 17 it is observed that the values are very less which indicates the similarity of the extracted watermark from the proposed approach with the original watermark. In general during transmission, the watermarked image may be exposed to various attacks on the watermarked images before reaching to the watermark receiver. The attacks include both geometric and non–geometric attacks. Geometric attacks include cropping, resize, rotation, scaling, translation etc and non–geometric attacks include image filtering, averaging, addition of noise, sharpening, brightness, gamma correction compression etc. In the proposed scheme, the watermarked images are verified against both geometric and non– geometric attacks using 20 division, 30 division, 40 division and 50 division. Although in the proposed scheme, number of watermarked images have generated and verified against robustness to various attacks, but as a representative only results of Lena image are presented. The figures below show the watermarked images with attacks and the extracted watermarks are shown below. Low pass filtering To prove the robustness against the low pass filtering attacks, gaussian low pass filtering attacks with different sizes are applied on the watermarked images with different value of r. The attacked watermarked images and their corresponding extracted watermarks(logo) with calculated N C and BER values are presented in the following figures. Gaussian Low-pass Filtering(2 × 2) (Fig. 18). Gaussian Low-pass Filtering(3 × 3) (Fig. 19). Gaussian Low-pass Filtering(5 × 5) (Fig. 20). Gaussian Low-pass Filtering(7 × 7) (Fig. 21). Fig. 19 Result under Gaussian Low pass filtering (3 × 3) attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Multimed Tools Appl Fig. 20 Result under Gaussian Low pass filtering (5 × 5) attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division From the above figures with the N C and BER values of the extracted logos, it is observed that the proposed method is efficient enough to survive the gaussian low pass filter attack. Median filtering Median filtering attack, the center pixel value is modified by the middle value of the sorted pixel values. For the analysis, we have examined the proposed scheme is examined against median filtering attacks with different window sizes. Median Filtering (3 × 3) (Fig. 22). Averaging attack In this type of attack, number of many samples of a precondition data set are inserted with a different secret key or watermark and then are averaged to evaluate the attacked data. If the amount of data set is sufficiently huge, the inserted watermark cannot be discovered any more supposing that it will output zero mean on average (Fig. 23). Image noising One of the common non-geometrical attack is the addition noise. The proposed method is tested for the robustness against salt and pepper noise attack. Salt & ppepper noise is caused during the transmission due to the pixel’s error. Salt and Pepper noise(var = 0.01) (Fig. 24). Salt and Pepper noise(var = 0.03) (Fig. 25). Salt and Pepper noise(var = 0.05) (Fig. 26). Effect of gamma correction Sometimes watermarked images are enhanced intentionally or unintentionally by power law transformation which may causes the destruction or removal of watermark. The below figures shows the results after the watermarked images are enhanced by gamma correction technique with different gamma value and the recovered watermarks from the enhanced images along with their NC and BER values. Gamma Correction(gamma = 1) (Fig. 27). Fig. 21 Result under Gaussian Low pass filtering(7 × 7) attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Multimed Tools Appl Fig. 22 Result under Median filtering(3 × 3) attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 23 Result under average filtering attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 24 Result under salt and pepper noise(var=0.01) attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 25 Result under salt and pepper noise(var=0.03) attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Multimed Tools Appl Fig. 26 Result under salt and pepper noise(var=0.05) attack and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 27 Result under effect of Gamma Correction(1) and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 28 Result under effect of Gamma Correction(0.75) and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 29 Result under cropping attack(128 × 128) and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Multimed Tools Appl Fig. 30 Result under cropping attack(128 × 128) and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 31 Result under cropping attack(256 × 256) and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 32 Result under cropping attack(256 × 256) and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Fig. 33 Result under effect of image resize(512→ 256 →512) and recovered watermark image using a 20 division b using 30 division c using 40 division d using 50 division Multimed Tools Appl Table 4 Comparison of N C values with different sub-bands Sub-bands LL Number of division 20 Gaussian Filtering(33) Median Filtering(33) Gaussian Noise(0.01) Gamma Correction(0.8) Rotation(20) Histogram Equalization Scaling(0.5,2) Sharpening LH 30 40 50 20 HL 30 40 50 20 HH 30 40 50 20 30 40 50 0.98 0.97 0.95 0.93 0.75 0.75 0.73 0.73 0.76 0.74 0.75 0.76 0.88 0.83 0.79 0.78 0.98 0.98 0.99 0.99 0.75 0.74 0.74 0.74 0.77 0.76 0.75 0.75 0.76 0.76 0.76 0.76 0.93 0.93 0.94 0.94 0.75 0.75 0.76 0.75 0.74 0.77 0.75 0.76 0.74 0.79 0.73 0.75 0.87 0.88 0.88 0.88 0.76 0.75 0.74 0.74 0.77 0.75 0.75 0.74 0.99 0.99 0.98 0.93 0.88 0.89 0.89 0.89 0.75 0.75 0.75 0.75 0.77 0.73 0.74 0.74 0.77 0.73 0.76 0.74 0.88 0.88 0.88 0.88 0.74 0.74 0.74 0.77 0.75 0.74 0.74 0.74 0.86 0.83 0.79 0.79 0.97 0.98 0.99 0.99 0.75 0.74 0.72 0.73 0.74 0.75 0.74 0.75 0.74 0.74 0.75 0.8 0.94 0.98 0.96 0.96 0.74 0.74 0.74 0.74 0.75 0.76 0.74 0.73 0.77 0.74 0.75 0.75 Table 5 Comparison of BER values with different sub-bands Sub-bands CA Number of division 20 Gaussian Filtering(33) Median Filtering(33) Gamma Correction(0.8) Histogram Equalization Scaling(0.5,2) CH 30 40 50 20 CV 30 40 50 20 CD 30 40 50 20 30 40 50 0.04 0.08 0.09 0.11 0.51 0.5 0.51 0.49 0.47 0.49 0.48 0.46 0.31 0.39 0.43 0.45 0.19 0.25 0.27 0.29 0.51 0.53 0.51 0.48 0.46 0.5 0.47 0.46 0.48 0.5 0.46 0.46 0.25 0.21 0.2 0.19 0.51 0.52 0.5 0.49 0.47 0.51 0.49 0.48 0.02 0.03 0.04 0.19 0.34 0.4084 0.38 0.4 0.51 0.52 0.5 0.47 0.49 0.51 0.48 0.48 0.35 0.42 0.44 0.41 0.18 0.23 0.24 0.26 0.5 0.51 0.51 0.48 0.49 0.5 0.48 0.47 0.47 0.5 0.48 0.26 Table 6 Comparision of N C values of the proposed method with Kumsawat et al. [13] and Lingamgunta et al. [14] Image Kumsawat et al. [13] Lingamgunta et al. [14] Proposed method NC NC NC 20 division 30 division 40 division 50 division Lena Peppers Baboon Tiffany Cameraman Barbara 0.97 0.93 0.95 0.97 0.94 0.95 0.98 0.95 0.96 0.97 0.95 0.96 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Multimed Tools Appl Table 7 The comparison results with Ansari et al. [3] and Ali & Ahn et al. [1], for common image processing operations (N C) Attack Ansari Ali & et al. [3] Ahn [1] Proposed method Using Using Using Using 20 division 30 division 40 division 50 division 0.93 Gaussian Filtering(33) 0.99 0.96 0.98 0.97 0.95 Median Filtering(33) 0.98 0.94 0.98 0.98 0.99 0.99 Average Filtering(33) 0.97 0.91 0.88 0.89 0.87 0.79 Gaussian Noise(0.01) 0.94 0.85 0.93 0.93 0.94 0.94 Salt & Pepper(0.001) 0.99 0.92 0.97 0.98 0.98 0.99 Gamma Correction(0.8) 0.99 0.96 0.87 0.88 0.88 0.88 Rotation(20◦ ) 0.98 0.94 0.88 0.89 0.89 0.89 Histogram Equilization 0.98 0.92 0.88 0.88 0.88 0.88 Scaling(0.5,2) 0.98 0.94 0.97 0.98 0.99 0.99 Sharpening 0.94 0.88 0.94 0.98 0.96 0.96 Gamma Correction(gamma = 0.75) (Fig. 28). Cropping attack Cropping attack tries to remove some parts of the image with the intention to destroy the embedded watermark. Cropping(128 × 128 by black) (Fig. 29). Cropping(128 × 128 by white) (Fig. 30). Table 8 The comparison results with Verma et al. [25], for common image processing operations (N C) Attack Verma Proposed Method et al. [25] Using Using Using Using 20 division 30 division 40 division 50 division Gaussian Filtering(3 × 3) 0.97 0.98 0.97 0.95 0.93 Median Filtering(3 × 3) 0.95 0.98 0.98 0.99 0.99 Average Filtering(3 × 3) 0.86 0.88 0.89 0.81 0.79 Gaussian Noise(0.01) 0.97 0.93 0.93 0.94 0.94 Gaussian Noise(0.02) 0.85 0.91 0.91 0.92 0.92 Salt & Pepper(0.01) 0.75 0.96 0.97 0.98 0.98 Speckle Noise(0.01) 0.74 0.96 0.97 0.97 0.98 Cropping(1/4) 0.93 0.97 0.98 0.98 0.99 Rotation(0.1◦ ) 0.85 0.97 0.98 0.99 0.99 Rotation(0.02◦ ) 0.45 0.97 0.98 0.98 0.98 Histogram Equalization 0.92 0.88 0.88 0.88 0.88 Scaling 0.98 0.97 0.98 0.99 0.99 Sharpening 0.88 0.94 0.95 0.96 0.96 Multimed Tools Appl Table 9 The comparison results with Ali et al. [2], for common image processing operations (N C) Attack Ali Proposed Method et al. [2] Using Using Using Using 20 division 30 division 40 division 50 division Gaussian Filtering(3 × 3) 0.99 0.98 0.97 0.95 0.93 Median Filtering(2 × 2) 0.9 0.98 0.98 0.99 0.99 Gaussian Noise(0.001) 0.98 0.94 0.94 0.95 0.95 Histogram Equalization 0.99 0.88 0.88 0.88 0.88 Scaling(1/2) 0.91 0.97 0.98 0.99 0.99 Salt & Pepper(0.05) 0.81 0.93 0.94 0.94 0.94 Table 10 The comparison results with Thabit et al. [24], for common image processing operations (N C) Attack Thabit Proposed Method et al. [24] Using Using Using Using 20 division 30 division 40 division 50 division Salt & Pepper(0.002) 0.93 0.97 0.98 0.98 0.98 Salt & Pepper(0.004) 0.96 0.97 0.98 0.98 0.98 Salt & Pepper(0.008) 0.84 0.97 0.97 0.98 0.98 Salt & Pepper(0.01) 0.82 0.96 0.97 0.98 0.98 Salt & Pepper(0.02) 0.81 0.96 0.96 0.97 0.97 Gamma Correction(2) 0.85 0.67 0.66 0.65 0.65 Gamma Correction(1.5) 0.89 0.81 0.80 0.79 0.79 Gamma Correction(1) 1 1 1 1 1 Gamma Correction(0.8) 0.53 0.87 0.88 0.88 0.88 Sharpening 0.92 0.94 0.95 0.96 0.96 Cropping(64 × 64) 0.92 0.97 0.98 0.98 0.99 Cropping(128 × 128) 0.84 0.97 0.98 0.98 0.99 Cropping(200 × 200) 0.82 0.97 0.98 0.98 0.99 Table 11 The comparison results with Wang et al. [27], for common image processing operations (N C) Attack Wang Proposed Method et al. [27] Using Using Using Using 20 division 30 division 40 division 50 division Gaussian Filtering(3 × 3) 0.96 0.98 0.97 0.95 0.93 Median Filtering(3 × 3) 0.95 0.98 0.98 0.99 0.99 Gaussian Noise 0.94 0.93 0.93 0.94 0.94 Cropping 0.76 0.97 0.98 0.98 0.99 Scalling(1/2) 0.91 0.97 0.98 0.99 0.99 Multimed Tools Appl Fig. 34 The comparison results with Ansari et al. [3] and Ali & Ahn [1], for common image processing operations (N C) Cropping(256 × 256 by black) (Fig. 31). Cropping(256 × 256 by white) (Fig. 32). The watermarked images after cropping attacks and the recovered watermarks along with the N C and BER values are shown above. It is observed that the proposed method can strong enough to survive various types of cropping attacks. Effect of image resize In image resizing attack, the size of the image is reduced by different factors and again resize to the original size. Image resize(512→ 256 →512) (Fig. 33). Also the robustness of the proposed scheme is observed by considering the different sub-bands of the images which are indicated in Tables 4 and 5 in terms of the N C and BER values. Fig. 35 The comparison results with Verma et al. [25], for common image processing operations (N C) Multimed Tools Appl Fig. 36 The comparison results with Ali et al. [2], for common image processing operations (N C) Comparative analysis The proposed robust watermarking scheme is based on IWT domain. In the previous section we have shown the efficiency of the proposed method in terms of imperceptibility and robustness to different types of attack by calculating P SN R, N C and BER values. Also the efficiency of the proposed scheme is compared with some existing robust watermarking schemes in transform domain on the basis of N C values before attack and also after applying some image processing attacks on the watermarked images Tables 6, 7, 8, 9, 10, and 11 and Figs. 34, 35, 36, 37, and 38. Compared with other existing methods, the proposed watermarking algorithm has better robustness against various geometric and non-geometric attacks. Fig. 37 The comparison results with Thabit et al. [24], for common image processing operations (N C) Multimed Tools Appl Fig. 38 The comparison results with Wang et al. [27], for common image processing operations (N C) 5 Conclusion In this paper, a novel robust and blind binary watermarking scheme is proposed. The watermark (logo)is embedded in the low sub–band of the IWT transformed cover image. However in the low sub–band portion, the chance of watermark distortion or removal is high. But in the proposed method even after the various types of attacks applied on the watermarked images, the watermark is able to survive with low BER and high N C values. The quality of the watermarked images are also good in terms of perceptibility and P SN R. Also as compared with some existing schemes, the proposed scheme indicate its efficiency with high robustness. References 1. Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive de in dwt–svd transform domain. Signal Process 94:545–556 2. Ali M, Ahn CW, Pant M, Siarry P (2015) An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Inf Sci 301:44–60 3. Ansari IA, Pant M, Ahn CW (2016) Robust and false positive free watermarking in iwt domain using svd and abc. Eng Appl Artif Intell 49:114–125 4. Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85(4):883–894 5. Bohra A, Farooq O et al. (2009) Blind self-authentication of images for robust watermarking using integer wavelet transform. AEU-Int J Electron C 63(8):703–707 6. Chetan KR, Nirmala S (2015) An efficient and secure robust watermarking scheme for document images using integer wavelets and block coding of binary watermarks. Journal of Information Security and Applications 24:13–24 7. Fazli S, M Moeini A (2016) Robust image watermarking method based on dwt, dct, and svd using a new technique for correction of main geometric attacks. Optik-International Journal for Light and Electron Optics 127(2):964–972 8. Furht B, Kirovski D (2004) Multimedia security handbook. CRC Press 9. Gunjal BL, Manthalkar RR (2010) An overview of transform domain robust digital image watermarking algorithms. Journal of Emerging Trends in Computing and Information Sciences 2(1):37–42 Multimed Tools Appl 10. Hwang M-S, Chang C-C, Hwang K-F (1999) A watermarking technique based on one-way hash functions. IEEE Trans Consum Electron 45(2):286–294 11. Jia S-L (2014) A novel blind color images watermarking based on svd. Optik-International Journal for Light and Electron Optics 125(12):2868–2874 12. Kaushik AK (2012) A novel approach for digital watermarking of an image using dft. Int JElectronComp Sci Eng 1(1):35–41 13. Kumsawat P, Attakitmongcol K, Srikaew A (2007) A robust image watermarking scheme using multiwavelet tree. In: World congress on engineering. Citeseer, pp 612–618 14. Lingamgunta S, Vakulabaranam VK, Thotakura S (2013) Reversible watermarking for image authentication using iwt. Int J Signal Process, Image Process Pattern Recog 6(1):145–156 15. Maity SP, Kundu MK (2002) Robust and blind spatial watermarking in digital image. In: ICVGIP 16. Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans Multimedia 6(1):1–15 17. Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385–403 18. Nin J, Ricciardi S (2013) Digital watermarking techniques and security issues in the information and communication society. In: 27th international conference on advanced information networking and applications workshops (WAINA), 2013. IEEE, pp 1553–1558 19. Pal AK, Roy S (2016) A robust and blind image watermarking scheme in dct domain. Int J Inf Comput Secur, In Press 20. Parashar P, Singh R (2014) A survey: digital image watermarking techniques. Int J Signal Process Image Process Pattern Recognit 7(6):111–124 21. Sebé F, Domingo-Ferrer J, Herrera J (2000) Spatial-domain image watermarking robust against compression, filtering, cropping, and scaling. In: International workshop on information security. Springer, pp 44–53 22. Sverdlov A, Dexter S, Eskicioglu AM (2005) Robust dct-svd domain image watermarking for copyright protection: embedding data in all frequencies. In: Signal processing conference, 2005 13th European. IEEE, pp 1–4 23. Tao P, Eskicioglu AM (2004) A robust multiple watermarking scheme in the discrete wavelet transform domain. In: Optics east. International society for optics and photonics, pp 133–144 24. Thabit R, Khoo BE (2014) Robust reversible watermarking scheme using slantlet transform matrix. J Syst Softw 88:74–86 25. Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst Appl 42(21):8184–8197 26. Wang C, Li X, Yang B (2010) Efficient reversible image watermarking by using dynamical predictionerror expansion. In: 2010 IEEE international conference on image processing. IEEE, pp 3673–3676 27. Wang Y-R, Lin W-H, Yang L (2011) An intelligent watermarking method based on particle swarm optimization. Expert Syst Appl 38(7):8024–8029 28. Weng S, Pan J-S (2016) Integer transform based reversible watermarking incorporating block selection. J Vis Commun Image Represent 35:25–35 Multimed Tools Appl Kshiramani Naik is presently working as an Assistant Professor in the Department of Computer Science and Engineering and IT, Veer Surendra Sai University of Technology, Odisha,India. She completed her Ph.D in Computer Science and Engineering from Indian Institute of Technology(ISM), Dhanbad in 2017. She received her BE in CSE and M.Tech in CSE from BPUT Rourkela and NIT Rourkela respectively. Her research interest includes Image Cryptosystem, Steganography and Watermarking. Saswati Trivedy completed her MTech in Computer Science and Engineering from Indian School of Mines, Dhanbad in 2015. She received her B.Tech in Electronics and Communication Engineering from West Bengal University of Technology, Kolkata. Her research interest includes Image Cryptography and Watermarking. Multimed Tools Appl Arup Kumar Pal is presently working as an Assistant Professor in the Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India. Prior to join this institute, he was a Lecturer in the Department of Computer Science & Engineering, NIT Jamshedpur during April, 2011 to December, 2011. He did his Ph.D in Computer Science and Engineering from Indian School of Mines, Dhanbad in 2011. He has around 4 years of teaching and research experiences, and contributed a number of research papers in several journals and conference proceedings of National and International reputes. His main research interest includes Vector Quantization, Image Compression, Image Cryptosystem, Steganography, Watermarking and CBIR.