Top Banner
Optimized Digital Image Watermarking for Uncorrelated Color Space A Thesis submitted in partial fulfillment of the requirements for the award of the degree of Doctor of Philosophy by Manish Gupta Enrolment No.: 11E7UCPEM4XP900 Supervisor(s): Dr. Rajeev Gupta Dr. Girish Parmar Department of Electronics Engineering Rajasthan Technical University, Kota Rajasthan, India December, 2015
137

Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Mar 31, 2018

Download

Documents

trannguyet
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Optimized Digital Image Watermarking for

Uncorrelated Color Space

A Thesis

submitted in partial fulfillment of the requirements for the award of

the degree of

Doctor of Philosophy

by

Manish GuptaEnrolment No.: 11E7UCPEM4XP900

Supervisor(s):

Dr. Rajeev Gupta

Dr. Girish Parmar

Department of Electronics Engineering

Rajasthan Technical University, KotaRajasthan, India

December, 2015

Page 2: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

c©RAJASTHAN TECHNICAL UNIVERSITY, KOTA, 2015

ALL RIGHTS RESERVED

Page 3: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Dedicated to

Lord Shri Goverdhan Maharaj Ji,

Lord Shri Banke Bihari Lal Ji,

My Father Shri Kalika Prasad Gupta,

Mother Smt. Rajkumari Gupta,

Brother Neeraj,

Wife Ruchi

and

Daughter Khyati & Son Anant

Page 4: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 5: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 6: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 7: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 8: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 9: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Acknowledgements

I would like to express here my sincere gratitude to my supervisors, Dr.

Rajeev Gupta, Professor, RTU, Kota and Dr. Girish Parmar,

Associate Professor, RTU, Kota, whose precious advice and friendly

encouragement made this work go smoothly throughout the period of

research. They are the source of never-ending inspiration for me. I

have been extremely lucky to have them as my mentors. Their precise

and lucid thoughts have helped me to manage many responsibilities

comfortably. They not only encouraged me to work but also gave

his guidance, experience, constructive thoughts and took keen interest

throughout the course of work and preparation of manuscript which

had made me worth that I claim to be now. Working with them made

me more independent and liable, which I believe is the most important

aspect in anyone’s career. I am indebted to them more than they

recognizes.

No appropriate words could be traced in the presently available lexicon

to avouch the excellent guidance given by Prof. R. S. Meena, Head,

Electronics Engineering Department at RTU, Kota, Prof. Mithilesh

Kumar, Principal, GEC, Jhalawar (Raj.), Prof. Ranjan Maheshwari,

Prof. Lokesh Tharani, Prof. Jankiballabh Sharma, Prof. Pankaj

Shukla, and Prof. Praveen Kumar. It is my great privilege to mention

the entire official staff for helping me in the official documentation

work right from the time of my registration into Ph.D. Moreover, I

would like to thanks to my research committee members and faculty

members of the institute for their help and support.

I am extremely thankful to Dr. Mukesh Sarsawat who has given his

constant guidance, support and encouragement throughout this study.

His expertise, experience, vigorous efforts and co-operation had made

me to complete this work. Without his unfailing support and belief in

me, this thesis would not have been possible.

I am extremely grateful to Hindustan Institute of Technology and

Management, Agra administration, Dr. A. K. Gupta, Dr. Shailen-

dra Singh, Dr. N. P. Singh, Mr. Jayash Kumar Sharma, Mr. Santosh

viii

Page 10: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Kumar Dwivedi, Mr. Kamal Karakoti, Mr. Viresh Chauhan and Mr.

Sudhir Verma for their cooperation during my stay at RTU, Kota.

I express my gratitude to Prof. Rajiv Saxena and Prof. Dinesh Chan-

dra for their constructive suggestions offered to me for successful com-

pletion of my thesis.

I am sincerely thankful to my friends Mr. Jayash Sharma, Mr. Ma-

hendra Kumar Pandey, Mr. Abhay Chaturvedi, Mr. Rajesh Kumar

Bathija, Mr. Pradeep Singh Bhati, Mr. Narbada Prasad Gupta, Mr.

Puneet Kumar Choudhary, Mr. Vikas Rai, Mr. Vijay Kumar Dixit,

Mr. Deepak Bhatia and Mr. Neeraj Jain for their scholastic guidance,

suggestions and encouragement throughout the study duration. Along

with them, I am also thankful to Mrs. Rita Saini and other Ph.D.

scholars for providing their kind helps and supports during the time of

research.

I owe special thanks to all my friends who encouraged and boosted

my morale during the difficult days particularly Mr. S C Gupta, Mr.

Lokendra Sharma, Mr. Shyam Sunder Agrawal, Mr. Sanjay Mishra,

Mr. Manish Agrawal, Mr. Hitendra Garg, Mr. Raj Kumar Verma,

Mr. Manish Oberoi, Mr. Amit Jaiswal, Mr. Anurag Saxena, Mr.

Suneet Parashar, Mr. Darpan Anand, Mr. Rahul Saraswat, Mr. B

N Gupta, Mrs. Nisha Agrawal, Mrs. Hemlata Yadav, Ms. Priyanka

Yadav, Mrs. Priyanka Agrawal, Mr. Gaurav Sharma, Mr. R N Singh,

Mr. P S Parihar, Mr. Santosh Sahu, Dr. A K Verma, Mr. Ajitesh

Kumar, Mr. Brajesh Sharma, Mr. Rahul Sighal, Mr. Nitin Sharma,

and Mrs. Neema Verma.

I would like to offer my most humble gratitude to my Late grandfather,

grand mother, and maternal grandmother.

I would like to offer my most humble gratitude to my maternal grand-

father Shri Ramsewak Neekhara, parents, my uncle and aunty, my

Mausaji and Mausiji, my Mamaji and Mamiji, my brother in-laws

Mr. Vishal Gupta and Mr. Saurabh Gupta, my brothers Neeraj,

Anand, Vinay, Naveen, Ram, Shayam, and Vaibhav, my sisters Su-

ruchi, Sonam, Kritika, Himanshi, and Chritanshi, my nephew Vikhyat,

my in-laws Shri S. L. Gupta, Mrs. Neelam Gupta, Mr. Santosh Gupta,

Mr. Manoj Gupta, Mr. Sachin Gupta and my wife Ruchi, my daughter

Khyati, my son Anant, and other family members for their unsurpassed

love, care, endless patience and countless sacrifices which they made

ix

Page 11: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

for me. Indeed, a plethora of words would not suffice to say what I

owe to them.

Last but not the least I am highly tankful to Lord Shri Goverdhan Ma-

haraj Ji and Lord Shri Banke Bihari Lal Ji for showing his blessings

and brings this bright day in my career.

(Manish Gupta)

x

Page 12: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 13: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Abstract

Digital image watermarking is a process of imperceptibly embedding

watermark in the form of signature, random sequence or some image

into an image (host) which may be used to verify the genuineness of its

owner. Watermarking could be used for various real-time applications

like, protection of intellectual property rights (IPR) of multimedia con-

tents, forensics and piracy deterrence, content filtering, document and

image security, broadcast monitoring, etc. Robustness of digital image

watermarking methods are of paramount importance in the perspec-

tive of the protection of multimedia contents due to easily accessible

data manipulation tools and the strengthening of high data rate trans-

fer over the internet. Therefore, there is a growing interest in devel-

oping a method to protect multimedia contents. However, no single

watermarking method can be used to all applications. Therefore, the

primary objective of this work is to design and develop the robust dig-

ital watermarking methods for the protection of color images from its

unauthorise utilization.

The proposed watermarking methods consist of five steps. First, host

and watermark images are pre-processed using uncorrelated color space.

Second, the watermark is embedded into the host image using four dif-

ferent embedding methods. Third, post-processing is done by embed-

ding the coefficients into the watermarked image. Fourth, performance

of proposed watermarking methods is improved using various optimiza-

tion methods namely; genetic algorithm (GA), artificial bee colony

(ABC), and differential evolution (DE). Finally, the extracted water-

mark is verified for the genuineness of its owner. The performance of

developed methods are measured under various signal processing and

geometric attacks.

Generally, researchers used RGB, Y CbCr, YIQ, HSI, or HSV, etc. color

space models for both watermarks and host images in their digital

watermarking methods which are correlated in nature and impose the

restriction to use any one color component at a time for embedding

the watermark. However, there exists some uncorrelated color models

xii

Page 14: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

such as Lab, Lαβ, etc., which may be used in image watermarking

to increase the robustness and quality by using all the color image

components of host and watermark images. Therefore, in this thesis,

a recently developed uncorrelated color space (UCS) has been utilized

during the pre-processing step. Experimental results show that the

UCS method outperforms other existing methods.

Embedding the watermark image into host image is the second step

of proposed watermarking method. The selection of embedding do-

main is the most vital and difficult task of any watermarking methods.

In this thesis, two transform methods have been used for embedding

the watermark into the host image namely; discrete wavelet transform

(DWT) and steerable pyramid transform (SPT). Both the methods

transform the host image and utilize their transform coefficients for

hiding the pre-process watermark data. After hiding the watermark

data into transform coefficients, post-processing is done to generate

watermarked image. The experimental results show that steerable

pyramid transform (SPT)-based method is better than other existing

methods of digital watermarking.

There is one component during the embedding process namely strength

factor which effects the performance of watermarking methods. There-

fore, there is a requirement to use its optimum value. For the same, the

proposed watermarking methods exploit optimization methods (GA,

ABC, and DE) to calculate the optimum strength factors. Among

other optimization methods, DE improves the performance as com-

pared to other existing methods.

Finally, the performance of the proposed methods are tested after ap-

plying various signal processing and geometric attacks. In this thesis,

20 different attacks have been used for validation of the proposed meth-

ods.

The output of this research work is a robust digital image watermarking

method for the protection of color images against the various malicious

attacks.

Keywords: Image watermarking, Discrete wavelet transform, Steer-

able pyramid transform, Uncorrelated color model, Genetic algorithm,

Artificial bee colony, Differential evolution.

xiii

Page 15: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Table of Contents

Title Page No.

Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi

List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xviii

List of Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx

Chapter 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.1 Motivation for Research . . . . . . . . . . . . . . . . . . . . . . . . 1

1.2 Applications of Watermarking . . . . . . . . . . . . . . . . . . . . . 2

1.3 Requirements and Design Issues of Digital Watermarking Method . 4

1.4 Taxonomy of Watermarking Attacks . . . . . . . . . . . . . . . . . 7

1.5 Classification of Watermarking Methods . . . . . . . . . . . . . . . 10

1.6 Literature Review of Image Watermarking . . . . . . . . . . . . . . 12

1.6.1 Spatial Domain-based Methods . . . . . . . . . . . . . . . . 13

1.6.2 Transform Domain-based Methods . . . . . . . . . . . . . . 14

1.6.3 Optimization Methods in Image Watermarking . . . . . . . 20

1.6.4 Color Spaces in Image Watermarking Method . . . . . . . . 22

1.7 Challenges in Image Watermarking . . . . . . . . . . . . . . . . . . 24

1.7.1 Use of Color Watermark . . . . . . . . . . . . . . . . . . . . 24

1.7.2 Color Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . 24

1.7.3 Transform Method . . . . . . . . . . . . . . . . . . . . . . . 25

1.7.4 Optimization Method . . . . . . . . . . . . . . . . . . . . . . 25

1.7.5 3-D Watermarking . . . . . . . . . . . . . . . . . . . . . . . 25

1.8 Scope of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Chapter 2 Digital Image Watermarking using Discrete Wavelet

Transform on Gray-Scale Watermark Image . . . . . . . 29

2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

2.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

xiv

Page 16: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

2.2.1 Discrete Wavelet Transform (DWT) . . . . . . . . . . . . . . 31

2.2.2 Uncorrelated Color Space (UCS) . . . . . . . . . . . . . . . 33

2.2.3 Genetic Algorithm (GA) . . . . . . . . . . . . . . . . . . . . 33

2.3 Proposed Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

2.4 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 39

2.5 Results and Discussions . . . . . . . . . . . . . . . . . . . . . . . . 44

Chapter 3 Digital Image Watermarking using Steerable Pyramid

Transform on Gray-Scale Watermark Images . . . . . . 45

3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

3.2 Steerable Pyramid Transform (SPT) . . . . . . . . . . . . . . . . . 46

3.3 Proposed Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

3.4 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 50

3.5 Results and Discussions . . . . . . . . . . . . . . . . . . . . . . . . 51

Chapter 4 Digital Image Watermarking using Discrete Wavelet

Transform on Color Watermark Images . . . . . . . . . . 57

4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

4.2 Artificial Bee Colony (ABC) Method . . . . . . . . . . . . . . . . . 59

4.3 Differential Evolution (DE) Algorithm . . . . . . . . . . . . . . . . 61

4.4 Proposed Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

4.5 Method Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

4.6 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 69

4.7 Results and Discussions . . . . . . . . . . . . . . . . . . . . . . . . 73

Chapter 5 Digital Image Watermarking using Steerable Pyramid

Transform on Color Watermark Images . . . . . . . . . . 81

5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5.2 Proposed Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5.3 Method Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

5.4 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 87

5.5 Results and Discussions . . . . . . . . . . . . . . . . . . . . . . . . 97

Chapter 6 Conclusions and Scope for Future Work . . . . . . . . . 99

6.1 Contributions Made in the Thesis . . . . . . . . . . . . . . . . . . . 100

6.2 Scope for Future Work . . . . . . . . . . . . . . . . . . . . . . . . . 101

References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103

List of Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115

xv

Page 17: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

List of Figures

Figure No. Title Page No.

1.1 Mutual dependency between the design parameters. . . . . . . . . . 5

1.2 Three main conflicting issues of watermarking. . . . . . . . . . . . . 5

1.3 Classification of watermarking methods. . . . . . . . . . . . . . . . 10

1.4 General block diagram of transform domain-based image water-

marking system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2.1 Three level decomposition layout of an image. . . . . . . . . . . . . 32

2.2 Genetic Algorithm Flow Chart. . . . . . . . . . . . . . . . . . . . . 34

2.3 Structural design of proposed method. . . . . . . . . . . . . . . . . 36

2.4 (a)-(b). RGB host images and (c)-(d). Gray scale watermark images. 39

2.5 Extracted RTU logo watermarks by proposed method after applying

considered attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

2.6 Extracted Aeroplane image watermarks by proposed method after

applying considered attacks. . . . . . . . . . . . . . . . . . . . . . . 43

3.1 Block diagram for steerable pyramid decomposition of an image. . . 47

3.2 Structural design of proposed method. . . . . . . . . . . . . . . . . 48

3.3 (a)-(b). RGB host images and (c)-(d). Gray scale watermark images. 50

3.4 Extracted RTU logo watermarks by proposed method after applying

considered attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

3.5 Extracted Aeroplane image watermarks by proposed method after

applying considered attacks. . . . . . . . . . . . . . . . . . . . . . . 54

4.1 Structural design of proposed method. . . . . . . . . . . . . . . . . 65

4.2 Watermark division. . . . . . . . . . . . . . . . . . . . . . . . . . . 65

4.3 Partitioning of 3-DWT coefficients. . . . . . . . . . . . . . . . . . . 66

4.4 RGB host images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

4.5 RGB watermark images. . . . . . . . . . . . . . . . . . . . . . . . . 70

4.7 Three level decomposed host lena image using DWT. . . . . . . . . 70

4.6 UCS host and watermark images (a). Lena, (b). Mandrill, (c).

Pepper, (d). Sailboat, (e). RTU Logo, and (f). Aeroplane. . . . . . 71

xvi

Page 18: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

4.8 Representative scrambled UCS watermark images. . . . . . . . . . . 71

4.9 RGB watermarked images embedded by using DE-based proposed

method (a)-(d) RTU logo and (e)-(h) Aeroplane image . . . . . . . 72

4.10 Comparison of extracted watermarks by considered and proposed

methods along with their corresponding NC values. Columns shows

extracted watermarks from watermarked image namely (a). Lena,

(b). Mandrill, (c). Pepper, and (d). Sailboat using the considered

and proposed methods mentioned in first column. First five rows

shows the extraction of RTU logo while last five shows extraction

of aeroplane watermark image. . . . . . . . . . . . . . . . . . . . . 74

4.11 Extracted RTU logo watermarks by proposed method using DE

after applying considered attacks. . . . . . . . . . . . . . . . . . . . 78

4.12 Extracted Aeroplane watermarks by proposed method using DE

after applying considered attacks. . . . . . . . . . . . . . . . . . . . 79

5.1 Structural design of proposed method. . . . . . . . . . . . . . . . . 83

5.2 Watermark division. . . . . . . . . . . . . . . . . . . . . . . . . . . 84

5.3 RGB host images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

5.4 RGB watermark images. . . . . . . . . . . . . . . . . . . . . . . . . 87

5.5 UCS host and watermark images (a). Lena, (b). Mandrill, (c).

Pepper, (d). Sailboat, (e). RTU Logo, and (f). Aeroplane. . . . . . 88

5.6 Representative scrambled UCS watermark images. . . . . . . . . . . 88

5.7 RGB watermarked images embedded by (a)-(d) RTU logo and (e)-

(h) Aeroplane image . . . . . . . . . . . . . . . . . . . . . . . . . . 89

5.8 A comparison of before and after optimization of fitness values for

30 runs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

5.9 Comparison of extracted watermarks by considered and proposed

methods along with their corresponding NC values. Columns shows

extracted watermarks from watermarked image namely (a). Lena,

(b). Mandrill, (c). Pepper, and (d). Sailboat using the considered

and proposed methods mentioned in first column. First four rows

shows the extraction of RTU logo while last four shows extraction

of aeroplane watermark image. . . . . . . . . . . . . . . . . . . . . 91

5.10 Extracted RTU logo watermarks by proposed method using UCS

and DE after applying considered attacks. . . . . . . . . . . . . . . 95

5.11 Extracted Aeroplane watermarks by proposed method using UCS

and DE after applying considered attacks. . . . . . . . . . . . . . . 96

xvii

Page 19: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

List of Tables

Table No. Title Page No.

1.1 Applications of watermarking methods. . . . . . . . . . . . . . . . . 3

1.2 Requirements and design issues of watermarking methods. . . . . . 5

1.3 Taxonomy of watermarking attacks. . . . . . . . . . . . . . . . . . . 8

1.4 Categories of spatial domain-based image watermarking method. . . 14

1.5 Categories of transform domain-based image watermarking method. 17

1.6 Categories of optimization methods in image watermarking. . . . . 21

1.7 Categories of color spaces in image watermarking method. . . . . . 23

2.1 Comparison of CPSNR values of watermarked images resultant

from proposed and considered method. . . . . . . . . . . . . . . . . 40

2.2 Comparison of robustness in terms of NC values obtained after ap-

plying attacks on the watermarked images. . . . . . . . . . . . . . . 41

3.1 Comparison of CPSNR values of watermarked images resultant

from proposed and considered methods. . . . . . . . . . . . . . . . . 51

3.2 Comparison of robustness in terms of NC values obtained after ap-

plying attacks on the watermarked images. . . . . . . . . . . . . . . 52

4.1 Setting of the parameters of three optimization methods namely;

GA, ABC, and DE. . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

4.2 Comparison of CPSNR and SSIM values of watermarked images

resultant from proposed and considered methods. . . . . . . . . . . 72

4.3 Average subjective quality comparison of original and watermarked

images by 10 human beings in the scale of 0 to 5. . . . . . . . . . . 72

4.4 Comparison of robustness in terms of NC values obtained after ap-

plying common signal processing attacks on the watermarked image

embedded with RTU logo . . . . . . . . . . . . . . . . . . . . . . . 75

4.5 Comparison of robustness in terms of NC values obtained after ap-

plying common signal processing attacks on the watermarked image

embedded with Aeroplane image. . . . . . . . . . . . . . . . . . . . 76

xviii

Page 20: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

4.6 Comparison of robustness in terms of NC values obtained after ap-

plying geometric attacks on the watermarked images. . . . . . . . . 77

5.1 Comparison of CPSNR and SSIM values of watermarked images

resultant from proposed and considered methods. . . . . . . . . . . 90

5.2 Average subjective quality comparison of original and watermarked

images by 10 human beings in the scale of 0 to 5. . . . . . . . . . . 90

5.3 Comparison of robustness in terms of NC values obtained after ap-

plying common signal processing attacks on the watermarked image

embedded with RTU logo . . . . . . . . . . . . . . . . . . . . . . . 92

5.4 Comparison of robustness in terms of NC values obtained after ap-

plying common signal processing attacks on the watermarked image

embedded with Aeroplane image. . . . . . . . . . . . . . . . . . . . 93

5.5 Comparison of robustness in terms of NC values obtained after ap-

plying geometric attacks on the watermarked images. . . . . . . . . 94

xix

Page 21: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

List of Abbreviations

ABC Artificial Bee Colony

ACO Ant Colony Optimization

CPSNR Composite Peak Signal-to-Noise Ratio

DCT Discrete Cosine Transform

DE Differential Evolution

DFT Discrete Fourier Transform

DWT Discrete Wavelet Transform

EA Evolutionary Algorithm

GA Genetic Algorithms

HSI Hue Saturation Intensity

HSV Hue Saturation Value

HVS Human Visual System

ICA Independent Component Analysis

IDCT Inverse Discrete Cosine Transform

IDFT Inverse Discrete Fourier Transform

IDWT Inverse Discrete Wavelet Transform

IPR Intellectual Property Rights

ISPT Inverse Steerable Pyramid Transform

JPEG Joint Photographic Expert Group

LSB Least Significant Bit

MPEG Moving Picture Expert Group

NC Normalized Correlation

PCA Principal Component Analysis

PSO Particle Swarm Optimization

QS Quantization Step

RGB Red Green Blue

SA Simulated Annealing

SPIHT Set Partitioning In Hierarchical Trees

SPT Steerable Pyramid Transform

SSIM Structural Similarity

xx

Page 22: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

SV Singular Value

SVD Singular Value Decomposition

UCS Uncorrelated Color Space

Y CbCr Luminance Chroma: Blue Chroma: Red

YIQ Luminance In-phase Quadrature

YUV Luminance Blueluminance Redluminance

xxi

Page 23: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Chapter 1

Introduction

The digital image watermarking method is capable to resolve the issue of ownership

and hence, this area of research has a wider set of applications such as copyright

protection, content authentication, ownership identification, etc. Bender et al. [1],

Fotopoulos et al. [2], Potdar et al. [3], and Liu et al. [4] presented a state-of-the-

art survey of image watermarking methods which have been applied in various

applications. This thesis is an attempt to develop a digital image watermarking

method for copyright protection. This chapter presents the motivation of the

research, application areas, requirement and design issues, taxonomy of attacks,

and classification of watermarking methods. Further, some of the challenges in the

field of image watermarking are identified. Moreover, a detailed survey of relevant

research in digital image watermarking is presented.

1.1 Motivation for Research

In current digital era, the orderly growth of easily capturable multimedia data

devices (such as digital cameras, camcorders, and scanners), efficient compres-

sion algorithms for multimedia data, and digital data transmission speed over the

internet have enable widespread applications, which rely on digital data. Digital

multimedia data offers many advantages over its analog counterpart like high qual-

ity, easy editing, easily stored and copying without loss of fidelity, etc. Though,

the digital data possesses many inherent advantages over its analog version, the

genuineness or ownership is the biggest challenge. The digital multimedia data can

be easily duplicated and/ or manipulated which results the real threat for content

owner from the misuse of their work or data. To keep on with the transmission

of multimedia data over the high speed internet the reliability and originality of

the transmitted multimedia data should be verifiable. In view of these deleterious

findings, it is necessary and need of current digital era that the multimedia data

Page 24: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

must be protected and secured against the illegal utilization.

Today, multimedia content owners are eagerly seeking technologies that promise

to protect their rights and secure their content from piracy, unauthorized usage,

and enable the tracking and conviction of media pirates. During the past decades,

various solutions were proposed by the researchers in order to protect the multime-

dia data against the unauthorized utilization. One of the solutions of this problem

is to embed an invisible data into the original multimedia data to proof the own-

ership of the data. This type of method is named as information hiding which can

be further classified into various sub-classes such as cryptography, steganography,

and watermarking [5, 6]. Cryptography is the most common method of protecting

digital multimedia data, where the multimedia content is encrypted preceding to

release and a decryption key is provided to those who have purchased genuine or

legal copies [7, 8, 9]. However, cryptography cannot assist the content providers

monitor their contents after the decryption process; a buccaneer could easily pur-

chase a genuine or legal copy and then resell it or distribute it for free over a

public network. Further, steganography is about preventing the detection of an

encrypted data, which has been protected by cryptography algorithms. However,

the message hide by steganography is not robust. Watermarking has an extra

requirement of robustness compared to steganography algorithms against various

signal processing and geometric attacks. It is therefore vital to find a path to pro-

tect these digital multimedia contents with a more precise method, which would

enable the content owners to get confidence in placing and distributing their mate-

rial over the internet. Watermarking could be such a vehicle. Therefore, this thesis

plans to design and develop an efficient and robust digital image watermarking

method for protecting the color images against various attacks.

Following section illustrates the various applications of watermarking methods.

1.2 Applications of Watermarking

Digital watermarking methods have many applications namely; copyright pro-

tection, content authentication, fingerprinting, broadcasting monitoring, secret

communication, medical safety, etc. [10, 11, 12, 13] as discussed in the following

sections and summarized in Table 1.1.

• Copyright Protection: One of the motivations of developing the water-

marking methods is copyright protection. In this application, a copyright

data/ information is embedded into host object without loss of quality [14].

The embedded data prevents other parties from claiming the ownership of

2

Page 25: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Table 1.1: Applications of watermarking methods.

S.No. Application Description

1. Copyright Protection The watermark must be known only to the author and also mostimportantly it must be robust against the various attacks.

2. Covert Communication Since various offices or governments put a ceiling on the useof encryption. In this scenario people may send their secretmessages by using the watermarking method.

3. Copy Control This application restrict the illegally copying of copyrighted ma-terials by embedding a never-copy watermark or limiting thenumber of times of copying.

4. Content Authentication Fragile watermark could be embedded into the host image tocheck the authenticity of the data.

5. Fingerprinting Fingerprinting method used by the owner is to trace the sourceof illegal copies.

6. Broadcast Monitoring Owners of copyrighted programs needs to know about illegalbroadcast, aired by the broadcasters, at the time and locationthat they want according to the contracts terms and conditions.

7. Medical Safety Embedding the date and the patients name in medical imagescould be a useful safety measure.

8. Indexing Indexing of multimedia contents like movies, news items, videomail, images, etc., to help search engines to search those contentsover the internet.

that data. Moreover, the watermark must be known only to the author and

must be robust against the various attacks.

• Covert Communication: Watermarking methods can also be used for

the covert information transmission, as various offices or governments put

a ceiling on the use of encryption. In this scenario people may send their

secret messages by using the watermarking methods.

• Copy Control: This application restricts the illegal copying of copyrighted

materials by embedding a never-copy watermark or limiting the number of

times of copying. For example, today many documents are available on the

internet which could not be saved and printed to control the illegal copying.

• Content Authentication: Fragile watermark could be embedded into the

host image to check the authenticity of the data. A fragile watermark indi-

cates whether the data has been altered and also delivers the information as

to where the data was altered. Therefore, this application does not demand

the robust watermark, since we have to detect the changes only.

• Fingerprinting: Fingerprinting method, used by the owner, is to trace the

source of illegal copies. To achieve this, owner can embed different water-

marks into each copy that distributed to a different customer. For example,

3

Page 26: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

unique serial numbers are assigned to customers and used to identify the

customer.

• Broadcast Monitoring: Owners of copyrighted programs needs to know

about illegal broadcast or the commercials, aired by the broadcasters, at

the time and location that they want according to the contracts terms and

conditions. Watermarks can be embed in any type of data to broadcast on

the network by automated systems, which are able to monitor distribution

channels to track the content in the time and the place that they appear.

• Medical Safety: Recently, telemedicine facilitates medical diagnosis by

sending patient medical data/ report over the public network for further

analysis where the modern medical equipments are available. These equip-

ments produce large amount of data every day. Hence, it is necessary to

protect these crucial data. Medical image watermarking is a suitable method

used for enhancing security and authentication of medical data, which is used

for further diagnosis and reference. Embedding the date and the patients

name in medical images could be a useful safety measure.

• Indexing: One of the well-known application of the watermarking is index-

ing of multimedia contents like movies, news items, video mail, images, etc.

In which a comments or any tag/ level is embedded on the contents, so that

these comments or tags are utilized by any search engine to search those

contents over the internet.

The following section listed various requirements and design parameters related

to watermarking methods.

1.3 Requirements and Design Issues of Digital

Watermarking Method

There are various design issues and requirements associated with any watermark-

ing method like transparency, robustness, capacity, security, etc. as summarized

in Table 1.2. The objectives of researchers in the field of watermarking is to maxi-

mize all these parameters for a particular method. Furthermore, these parameters

are mutually dependant on each other as shown in Figure 1.1. Three parameters

namely; transparency, robustness, and capacity are inversely related to each other

i.e. the transparency of a watermarking method increases then its robustness

suffers and vice-versa. This relationship has been depicted in Figure 1.2.

4

Page 27: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Table 1.2: Requirements and design issues of watermarking methods.

S.No. Requirements and DesignIssues

Description

1. Transparency No visual or audio effect should be noticed by the user.

2. Robustness Watermark can be robust against one operation on host dataand may be fragile against another operation.

3. Capacity If the capacity is higher than the better robustness is achievedand at the same time transparency suffers or vice-versa.

4. Security The watermark must resist against the attacks on the hostdata.

5. Complexity The computational cost must be as low as possible to makethe applications real time.

6. Reliability Watermark data embedded into the host, must be recoverablewith the acceptable errors.

Figure 1.1: Mutual dependency between the design parameters.

Figure 1.2: Three main conflicting issues of watermarking.

Hence, the relative importance of these parameters depends on the application-

to-application as listed in the previous section. Moreover, certain applications

demand for more robustness compared to the transparency of the method viz.

copyright protection. Therefore, watermarking method design process involves

trade-off between the conflicting requirements parameters. The most important

requirement for digital watermarking are summarized below:

• Transparency : Transparency or imperceptibility refers to the correlation/

similarity between the watermarked data and the original data. The wa-

5

Page 28: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

termark should be invisible. In other words, there is no visual or audio

effect should be noticed by the user. The watermark should not be disgrace

the quality of the host data. However, for a particular application minute

degradation in the host data is permissible to achieve better robustness or

to optimize the cost.

• Robustness: If a watermark can stay alive after common signal processing

operations (such as compression, filtering, translation, rotation operations,

analog-to-digital conversion, scaling, etc.) on host data, then such type of

watermark is called the robust. Moreover, watermark can be robust against

one operation on host data and may be fragile against another operation. For

certain applications, there is a need to embed a robust watermark into the

host data, while some applications demand the fragile watermark. Hence,

it also depends on the application. If the watermark data is embedded in

significant area of a host image then the better robustness is achieved. This

is because those area do not alter so much after common image processing

operations [15]. Contrary to robust watermark, a fragile watermark is not

designed to be robust.

• Capacity : A capacity or payload refers the amount of watermark data that

can be embedded into host. For example, the capacity in case of image

watermarking means the number of bits embedded within the host image.

If the payload is higher than the better robustness is achieved and at the

same time transparency suffers or vice-versa. Therefore, the payload of the

embedded watermark must be in sufficient amount to enable the envisioned

application.

• Security : The watermark must resist against the attacks on the host data.

It must be impossible for an attacker to delete or modify the watermark

without rendering the multimedia data unusable. From this point of view, a

secret watermark key is also used in watermarking, so that it is not possible

to retrieve or even modify the watermark without knowledge of the key.

• Complexity : Depending on the application, the watermark detection is to

be done at different speeds and complexity. For example in broadcast mon-

itoring application, the detection of the watermarking is done in real time.

The computational cost must be as low as possible to make the applications

real time. To keep above facts, the complexity of the watermarking methods

should be low.

6

Page 29: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

• Reliability : Watermark data, embedded into the host, must be recoverable

with the acceptable errors.

The performance of watermarking methods for achieving above mentioned re-

quirements are tested after applying various attacks. Therefore, the following

section describes the classification of attacks applicable to image watermarking.

1.4 Taxonomy of Watermarking Attacks

Any procedure that can decrease the performance of watermarking method may be

termed as attack. Testing the robustness and security of a watermarking method

against attacks is as important as the design process. The attacks do not always

remove or destroy the watermark but, also disable its detection. The distortions

done by any attacks degrade the performance of the watermarking method.

In general, different attacks on watermarking can be divided into two classes

namely; unintentional and intentional attacks. To achieve the high reliability

of watermark detection, the watermark detection process has to be robust to the

modifications in the host data caused from both unintentional and intentional

attacks. Unintentional attacks take place using signal processing operations on

watermarked data namely; compression, printing, scanning, filtering, noise, geo-

metric transforms, cropping, etc. For example, multimedia data is generally stored

in lossy compressed format in order to use less storage capacities. These compres-

sion algorithms discard the unimportant parts of data. This distortion may cause

damage of inserted watermark data too. This means that a simple attack is com-

pressing multimedia data in a lossy way. In addition, a rotation or scaling can

change pixel values and destroy the watermark data. Signal processing operations

such as quantization, decompression, re-sampling, and color reduction can dam-

age the watermark. For intentional attacks, a person on purpose can attack on

inserted watermark data in order to copy the multimedia data. In both cases,

any watermarking method should be able to detect and extract the watermark

after attacks. The taxonomy of various intentional and unintentional attacks in

watermarking methods [16, 17, 18], are presented in Table 1.3 and their details

are summarized below:

• Noise: Any random unwanted signal with a given distribution namely; Gaus-

sian, salt & pepper, Poisson, etc., is added to the image unintentionally.

This type of noise may be added during the Analog-to-Digital conversion

and vice-versa, or as a result of transmission errors. However, an attacker

may introduce perceptually shaped noise with the maximum un-noticeable

7

Page 30: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Table 1.3: Taxonomy of watermarking attacks.

S.No. Attack Details

1. Noise Any random unwanted signal with a given distribution namely; Gaus-sian, salt & pepper, Poisson, etc., is added to the image unintention-ally.

2. Filtering Filtering attacks are linear filtering namely; low pass/ mean filtering,Gaussian, and sharpening filtering, etc.

3. Compression If the watermark is required to resist different levels of compression, itis usually advisable to perform the watermark embedding in the samedomain where the compression takes places.

4. Multiple Watermarking The one of the solution of such type of problem is to embedding thetime information by a certification authority.

5. Geometrical Attacks Geometrical attacks distort the watermark through spatial alterationsof the watermarked image. Common geometrical attacks are rotation,scaling, etc.

6. Cropping This is a very common attack which crops the region of interest fromthe watermarked object.

7. Watermark Removaland Interference At-tacks

The objective of such attacks is to forecast or estimate the watermark.

8. Statistical Averaging The objective of such attacks is to recover the host image and/orwatermark data by statistical investigation of multiple marked datasets.

power. This will characteristically force to increase the threshold at which

the correlation detector operates.

• Filtering : Filtering attacks are linear filtering namely; low pass/ mean filter-

ing, Gaussian, and sharpening filtering, etc. Mean or average filtering does

not introduce considerable degradation in watermarked images but, can dra-

matically affect the performance. Therefore, to design a watermark, robust

to a known group of filters that might be applied to the watermarked image,

the watermark data should be designed in such a way that it have most of

its energy in the frequencies which filter transfer functions changes the least.

• Compression: Compression belongs to an unintentional attack class, which

appears very often in various multimedia applications. In practice, most of

the images, audio, and video are being transmitted/ distributed via internet

after the compression in order to reduce the time and data usage. If the

watermark is required to resist different levels of compression, it is usually

advisable to perform the watermark embedding in the same domain where

the compression takes places.

• Multiple Watermarking : An attacker may watermark an already water-

marked data and later claims of ownership. One solution to such type of

8

Page 31: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

problem is to embed the time information by a certification authority.

• Geometrical Attacks : Geometrical attacks do not pretend to remove the wa-

termark by itself, but to distort it through spatial alterations of the water-

marked image. With such attacks watermarking detector loses the synchro-

nization with the embedded information. These attacks can be subdivided

into attacks applying general affine transformations and attacks based on

projective transformation. Common geometrical attacks are rotation, scal-

ing, change of aspect ratio, translation and shearing, etc.

• Cropping : This is a very common attack since in many cases the attacker is

interested in a small portion of the watermarked object, such as parts of a

certain picture or frames of video sequence. With this in mind, in order to

survive, the watermark needs to be spread over the dimensions where this

attack takes place.

• Watermark Removal and Interference Attacks: The objective of such attacks

is to forecast or estimate the watermark and then use the predicted water-

mark either to eradicate watermark or to damage its unique extraction at the

destination side. Some known efficient removal attacks are; the median wa-

termark prediction followed by subtraction [19], the Wiener prediction and

subtraction [18] and perceptual re-modulation [20], which combines both

removal and interference attacks.

• Statistical Averaging : The objective of such attacks is to recover the host

image and/or watermark data by statistical investigation of multiple marked

data sets. An attacker may attempt to predict the watermark and then to

remove the watermark by subtracting the estimate. This is very hazardous

if the watermark does not rely significantly on data. That is why the percep-

tual masks are used to create a watermark. Averaging or smoothing attack

is belonging to this class of attack. Averaging attack consists of averaging

many instances of a given data set (e.g. N) each time marked with a different

watermark. In this pattern a prediction of host data is calculated and each

of the watermarks is weakened by a factor N.

In the above section, various classification of watermarking attacks have been

presented. The following section gives the brief details of classification of the

different watermarking methods.

9

Page 32: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

1.5 Classification of Watermarking Methods

Mohanty [21] presented a state-of-the-art categorization of digital watermarking

methods. Digital watermarking methods may be categorized on the basis of host

multimedia data, human perception, embedding domain, robustness, data extrac-

tion, application area, etc. [13]. Figure 1.3 shows the classifications of digital

watermarking methods. There are different way of classification of digital water-

Figure 1.3: Classification of watermarking methods.

mark methods [22].

• First, watermarking methods may be divided into four groups according to

the type of host multimedia data to be watermarked;

– Image watermarking method

– Audio watermarking method

– Video watermarking method

– 3-dimension (3-D) watermarking method

• Second, watermarking methods may be grouped on the basis of the data for

extraction;

– Private or non-blind watermarking method : This class of method re-

quired the original data (watermark or/ and host) during the extraction

of watermark from the watermarked data.

10

Page 33: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

– Semi-private or semi-blind watermarking method : This group of method

needs extra information other than the original data during the detec-

tion.

– Public or blind watermarking method : In public or blind watermarking

method the detection of watermark from the watermarked data needs

only the watermark.

• Third, watermarking methods may be categorized on the basis of human

perception;

– Visible watermarking method : If the watermark data is noticeable to

the user, then such class of watermarking is known as visible water-

marking method. Examples of visible watermarks are logos that are

used in papers and video.

– In-visible watermarking method : If the watermark data is imperceptible

to the user, then such class of watermarking is known as invisible wa-

termarking method. For example, images distribute over the internet

and watermarked invisible for copy protection.

• Fourth, watermarking methods may also be classified on the basis of robust-

ness;

– Fragile: A fragile watermark will be changed if the host data is modi-

fied.

– Semi-fragile: Semi-fragile watermark is sensitive to some degree of the

change to a watermarked image.

– Robust : Watermark in robust method cannot be removed by common

signal processing operations.

• Fifth, watermarking methods may also be classified on the basis of embed-

ding watermark data;

– Text : If the embed watermark data is in the nature of text.

– Image format : If the embedded watermark belongs to any image shape

like logo, binary image, gray scale image, color image or logo, stamp,

etc.

– Noise sequence: In this class of method the embedding watermark is

in terms of random noise sequence like pseudo random or Gaussian

random sequence etc.

11

Page 34: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

• Sixth, watermarking methods may be categorized on the basis of application

of method;

– Source-based watermarking method : In source based, all copies of a

particular data have a unique watermark, which identifies the owner of

that data.

– Destination-based watermarking method : In this method, each dis-

tributed copy is embedded using a unique watermark data, which iden-

tifies a particular destination.

• Finally, watermarking methods may be classified into two major classes ac-

cording to the embedding domain;

– Spatial domain

– Transform domain;

∗ Discrete Fourier Transform (DFT) domain-based watermarking method

∗ Discrete Cosine Transform (DCT) domain-based watermarking method

∗ Discrete Wavelet Transform (DWT) domain-based watermarking

method

∗ Steerable Pyramid Transform (SPT) domain-based watermarking

method

∗ etc.

Following section reviews various image watermarking methods along with their

constraints.

1.6 Literature Review of Image Watermarking

In the previous Sections 1.2 – 1.5 the various application areas, requirements and

key design issues, classification and need of different watermarking attacks, and

classification related to digital watermarking methods have been discussed. In

the area of watermarking, image watermarking particularly attracted the research

community a lot because of following reasons;

• Easily availability of the test image databases.

• It contains adequate superfluous information to give an opportunity for em-

bedding the watermark data easily.

• Any successful image watermarking method may be upgraded for the video

also.

12

Page 35: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

• Wider set of applications.

Therefore, most of the research work in the field of watermarking is dedicated to

image as compared to audio, video, and other multimedia formats [23]. Therefore,

in this thesis the emphasis has been given only on the literature review of image

watermarking methods.

Digital image may be represented/ stored either in spatial/ time domain or

in transform domain. The spatial/ time domain image is characterize by pix-

els, whereas the transform domain image is described in terms of its transform

coefficients. In other words, transform domain representation of an image seg-

regates the transform coefficients into multiple frequency bands. To convert an

image to its transform domain representation, we can use various available re-

versible transform methods namely; Discrete Fourier Transform (DFT), Discrete

Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Steerable Pyra-

mid Transform (SPT), etc. Each of these transform method has its own specific

characteristics and representation of an image.

Digital image watermarking is a process of imperceptibly hiding a watermark

(in the form of signature, random sequence, or some image) into an image (host

or cover) which may be used to verify the genuineness of its owner. The resultant

image of this process is termed as watermarked image. The watermarking meth-

ods can be performed either in spatial domain or in the transform domain. In

spatial domain-based watermarking method, watermark may be embedded within

an image by modifying the pixel values [9] or the Least Significant Bit (LSB) val-

ues. While, in transform domain-based watermarking method, watermark may be

embedded by modifying the transform domain coefficients. However, more robust

watermark could be embedded in the transform domain of images by modifying

the transform domain coefficients as compared with the spatial domain-based im-

age watermarking method. In the following section, the state-of-the-art review of

digital image watermarking methods have been presented based on spatial domain

and transform domain [1, 2, 3, 22, 24, 25, 26].

1.6.1 Spatial Domain-based Methods

A watermarking method based on the spatial domain approach, hides watermark

data in the pixel values of the host image. Such class of methods make minor

changes in the intensity of pixel value of host image [1, 27, 28, 29, 30, 31, 32, 33, 34].

One of the most common examples of this method is to embed the watermark in

the LSB’s of image pixels [28, 30, 35]. In other words, significant portions of

low frequency components of images should be modified in order to insert the

13

Page 36: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

watermark data in a reliable and robust way. As another example, an image is

divided into the same size of blocks and a certain watermark data is added with

the sub-blocks [28]. The imperceptibility of the watermark data is achieved on the

postulation that the LSB bits are visually insignificant. Although, spatial domain-

based watermarking method can be easily implemented and very fast, they have

the many disadvantages. These methods are highly susceptible to common signal

processing operations and can be easily impaired and tempered. For example,

lossy compression could completely crush the watermark data. In summary, wa-

termarking method based on spatial is very easy to destroy using some attacks like

low-pass filtering, additive noise, etc. In other words, the spatial domain-based

image watermarking methods are not robust against the common signal process-

ing operation on the host image. The brief summary of spatial domain-based

methods presented in Table 1.4. Researchers [15] suggested that the transform

domain-based image watermarking methods are more robust as compared to spa-

tial domain-based image watermarking methods against the various watermarking

attacks as mentioned in the Section 1.4. Therefore, further in this thesis our focus

is only on the transform domain-based image watermarking methods.

Table 1.4: Categories of spatial domain-based image watermarking method.

S.No. Category Property Description

1. Pixel-based[27, 28, 33]

Such class of methods makes mi-nor changes in the intensity ofpixel value of host image to em-beds a watermark. One of themost common example of thismethod is to embed the water-mark in the LSB’s of image pix-els.

Spatial domain-based water-marking method can be easilyimplemented and very fast.

2. Block-based[28, 29, 30]

In this class of watermarkingmethod an image is divided intothe same size of blocks and acertain watermark data is addedwith the sub-blocks.

These methods are highly sus-ceptible to common signal pro-cessing operations and canbe easily impaired and tem-pered. For example, compres-sion could completely crush thewatermark data.

1.6.2 Transform Domain-based Methods

The transform of an image is just another form of representation. It does not

change the content present in the image. Transform domain-based image wa-

termarking methods have many advantages over spatial domain-based methods

[15]. As presented in literature, transformed domain-based image watermarking

methods are more robust against the various watermarking attacks and signal

processing operations because the transform domain does not utilize the original

14

Page 37: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

host image for casting the watermark data. In addition, the transform domain-

based image watermarking distributes the watermark data over all part of the

host image. Moreover, transform domain-based methods are capable enough to

embed more watermark bits into the host image and are more robust to attack.

However, they are difficult to implement and are computationally more expensive

as compared with the methods given in Section 1.6.1. In literature, various re-

versible transform methods namely; DFT, DCT, DWT, SPT, etc. are used by the

researcher to improve the robustness of the image watermarking methods. This

class of watermarking methods insert the watermark data into the host image by

manipulating the corresponding transform coefficients [36, 37, 38, 39, 40, 41, 42,

43, 44, 45, 46, 47, 48].

Figure 1.4 shows the general block diagram of transform domain-based digital wa-

termarking system. Summary of the transform domain-based methods are given

in Tables 1.5. A detailed sate-of-the-art survey of transform domain-based image

watermarking methods has been presented by Potdar et al. [3].

Discrete Fourier Transform (DFT)-based Method

Ruanaidh et al. [49] presented a DFT-based image watermarking method in which

the watermark data is inserted into the host image by manipulating the phase

information. Wolfgang et al. [30] later concluded in their work that image water-

marking using the phase manipulation is robust against image contrast operation.

Further, Ruanaidh and Pun [50] presented a method of image watermarking using

the Fourier transform and concluded that method is robust against the geometric

attacks. Lin at al. [51] presented a novel image watermarking method which is ro-

bust against the rotation, scaling, and translation attacks. However, this method

is not robust enough against the cropping and compression attacks. In litera-

ture, few methods are available where the watermark is casted by modifying the

mid frequency band of DFT magnitude component [52, 53]. They concluded that

the proposed methods are robust against the Joint Photographic Expert Group

(JPEG) and Set Partitioning In Hierarchical Trees (SPIHT) compression attacks.

Moreover, Solachidis and Pitas [54] presented a novel method of image watermark-

ing in which a circularly symmetric watermark is embedded in the DFT domain.

In addition, the proposed method is robust against the geometric rotation attacks

because the watermark is circular in shape with its center at image center.

15

Page 38: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

(a) Embedder (b) Extraction

Figure 1.4: General block diagram of transform domain-based imagewatermarking system.

Discrete Cosine Transform (DCT)-based Method

Transform domain-based image watermarking methods possess a number of de-

sirable properties as compared to spatial domain-based methods. Moreover, these

methods make it difficult for any intruder or unauthorized user to read or change

the watermark data. Since in the transform domain, embedded watermark is dis-

tributed over the area of the image after the inverse transformation. The DCT

domain-based method is divided into two groups namely; global-based and block-

based DCT image watermarking methods. The image watermarking methods that

rely on the global DCT approach, spread the watermark over the entire image.

On the other hand, block-based approach embeds the watermark as follows:

1. Divide the host image into non-overlapping blocks of 8× 8.

2. Take the DCT to each of the block as mentioned in step 1.

3. Choose a specific block for watermark embedding by using certain criteria

like Human Visual System (HVS).

4. Choose coefficients for watermark embedding by using certain selection cri-

teria like highest or lowest magnitude.

5. Cast the watermark data by modifying the selected coefficients; and

16

Page 39: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Table 1.5: Categories of transform domain-based image watermarking method.

S.No. Category Description

1. DFT-based Robust against image contrast operation. [49]

Robust against the geometric attacks. [50]

Robust against the rotation, scaling, and translation attacks.However, this method is not robust enough against the crop-ping and compression attacks. [51]

Watermark embedded by modifying the mid frequency band ofDFT coefficients. Furthermore this method is robust againstJPEG and SPIHT compression attacks. [52], [53]

Circularly symmetric watermark is embed in the DFT domainand concluded that method is robust against the geometricrotation attacks. [54]

2. DCT-based Global DCT approach by exploiting the HVS and shows thatthe method is robust against the geometric attacks like rota-tion, scaling, etc. [8], [15]

Block-based DCT method. DCT-based methods missing thetime and frequency information at the same time. [55], [56]

3. DWT-based Based on principle of “toral automorphism”. [31]

Known as “cocktail watermarking”and concluded that themethod is robust against the all possible watermarking attacks.[57]

Presented a novel method for any size of images, which hideswatermark into the high-frequency sub-bands of DWT coeffi-cients. [58]

Uses Daubechies-2 filter bank for transformation of host imageand show that the proposed method is robust to geometric,filtering, and StirMark attacks. [59]

Uses Symlet-8 filter bank and shows that the method is robustagainst various attacks. [60]

Uses Har wavelet for host image transformation. [61]

Uses Symlet-4 filter bank. [42]

4. SPT-based Robust against the various geometric attacks in comparisonwith DWT-based method. [46]

Hybrid watermarking method using the SPT and SVD, thismethod have good visual quality and resistance against severalattacks. [62]

Robust against the common signal processing and geometricattacks like rotation. [63]

6. Take inverse DCT (IDCT) transform on each block.

In the DCT-based image watermarking method, most of the research is dedicated

to design the specific criteria for selecting the particular block and coefficients.

Cox et al. [15] proposed a robust image watermarking method using the global

DCT approach, which embeds the imperceptible watermark data into the host

image by exploiting the HVS. Koch et al. [8] reported a method for watermark

embedding having following steps:

1. Divide the host image into non-overlapping blocks of 8× 8.

2. Take the DCT to each of the block as mentioned in step 1.

17

Page 40: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

3. Choose the specific block by using the pseudo-random subset criteria.

4. A triplet of frequencies is selected from 1 of 18 predetermined triplets.

5. Cast the watermark data by modifying the selected coefficients, so that their

relative strengths encode a 1 or 0 value.

6. Take inverse DCT transform on each block.

In literature, various image watermarking methods have been proposed by using

DCT [55, 56, 64, 65, 66, 67, 68, 69]. Out of the existing DCT-based watermarking

methods, the block-based DCT method is widely used by researchers in the area of

watermarking. Lin et al. [69] find that the DCT-based methods are robust against

JPEG compression, but as robustness increases the quality of watermarked image

decreases. Moreover, DCT-based methods are not robust against the geometric

attacks like rotation, scaling, etc.

Discrete Wavelet Transform (DWT)-based Method

To achieve the robustness of image watermarking methods, discrete wavelet trans-

form utilizes the spatial and frequency information of the transform data in multi-

ple resolution. Recently, many image watermarking methods have been reported

which exploit the advantage of DWT over the DFT and DCT [40, 41, 42, 58, 59,

60, 70, 71, 72, 73, 74]. However, the performance of DWT-based method can be

further enhanced by exploiting the characteristics of HVS during the watermark

embedding stage. If a watermarking method can utilize the characteristics of the

HVS, then it is possible to embed watermark with more energy in a host image,

which makes watermark more robust. Although, the HVS model enhances the

imperceptibility and robustness of watermarking method, it suffers with the com-

putational cost and complexity point of view. According to the HVS, the human

eye is less sensitive to noise in high resolution DWT bands having an orientation

of 450. From this point of view, the DWT is a very useful transform as compared

to DFT and DCT, since it can be used as a computationally efficient version of

the frequency model for the HVS [70]. One of the reasons for the popularity of

DWT-based image watermarking method is that various multimedia standards

like JPEG2000, MPEG-4, etc. are based on the DWT. Hence, DWT decompo-

sition can be exploited to make a real-time watermark application. DWT-based

image watermarking methods are capable to embed a fairly good quality of wa-

termark and it can recover the watermark from watermarked image effectively.

The quality and robustness of DWT-based methods depend on the selection of

18

Page 41: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

particular filter bank and decomposition level [61]. Voyatzis and Pitas [31] devel-

oped a robust method on the principle of “toral automorphism”, in which they

embed the binary logo watermark. Lu et al. [57] presented a method in which

they embedded dual watermarks with complement to each other. This method

is popularly known as “cocktail watermarking”. Furthermore, the result shows

that the proposed method is robust against all possible watermarking attacks.

Zhao et al. [75] reported a dual domain-based method for image authentica-

tion. In their method, authors utilized the DCT for watermark generation and

DWT for watermark casting. Agreste and Andaloro [58] presented a novel DWT-

based watermarking method for any size of image which hides watermark into the

high-frequency sub-bands of DWT coefficient of host image. Later, Agreste and

Andaloro [59] reported another method which was the modified version of their

previous method by changing the filer bank by Daubechies-2, and concluded that

it is more robust to geometric, filtering, and StirMark attacks. Ghouti et al. [41]

selected balanced multi-wavelets filter bank for the data hiding and found that the

method is more robust against the various watermarking attacks. Furthermore,

Khelifi et al. [60] utilized the advantage of symlet-8 filter bank in their method.

Vahedi et al. [61] uses the Haar wavelet for message hiding. Moreover, Vahedi

et al. [42] exploited the advantage of symlet-4 filter bank to increase the quality

and robustness of watermarking method as compared to existing methods. In his

paper, they proposed a novel DWT-based method for color images by embedding

the binary watermark. For embedding the watermark, DWT-based methods use

three or higher level decompositions [39, 40, 42].

Steerable Pyramid Transform (SPT)-based Method

During the recent years, various image watermarking methods have been devel-

oped by using the DWT because it possess a number of desirable properties as

compared with the other transform-based methods. However, there are still rooms

for improvements in the field of watermarking. Although, DWT-based image wa-

termarking methods have various advantages, it suffers in terms of recording the

directional information which is very important components for any digital image

processing operations [44, 47]. Therefore, scholars in this area looking for an-

other reversible transform which possess all the properties of DWT. As a result,

researchers in this area propose various scale and directional image illustrations

during the years and results show that out of other representation, SPT having all

the advantages of DWT. Further, SPT is also capable in capturing the directional

information. Moreover, the results show that the SPT-based image watermarking

methods are more robust against the various geometric attacks in comparison with

19

Page 42: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

DWT-based method [46]. Literature shows that the SPT keeps most of the ad-

vantages of DWT as its basis functions are confined to a small area in both space

and spatial-frequency. However, this recursive multi-scale & multi-directional de-

composition improve the drawbacks of DWT like; it is aliasing free and capable to

generate any number of orientation bands as it is based on a category of random

orientation filters produced by linear grouping of a set of basis filters [46, 76].

Invariance, multi-resolution, and capture of multi-scale and multi-resolution con-

structions in the images are some of main properties of SPT which make it superior

in watermarking methods. Moreover, researchers concluded on the basis of the re-

sults that SPT-based methods of image watermarking are more robust against

the common signal processing and geometric attacks [45, 46, 47, 63]. There are

lot of scope of the research using SPT-based watermarking method because very

few SPT-based image watermarking methods [46, 62] have been reported till date.

Drira et al. [46] developed a SPT-based method and shows that it is resistant

to JPEG compression, additive noise, and median filtering. Hossaini et al. [62]

presented a novel hybrid watermarking method using the SPT and singular value

decomposition (SVD) and concluded that proposed method has good visual qual-

ity and resistance against several attacks.

Following section reviews the various optimization methods used to improve

the performance of image watermarking along with their constraints.

1.6.3 Optimization Methods in Image Watermarking

Previous section presented a state-of-the-art survey of different image watermark-

ing methods using various domain like spatial and transform domain. Literature

survey reveals that the transform domain methods are more robust in compari-

son with spatial domain. In any watermarking method the aim is to maximize

the various parameters like transparency, robustness, capacity, etc. as given in

Section 1.3. Furthermore, the above mentioned parameters are the function of

strength factor of watermark to be added into the host image. However, all these

parameters are inversely related to each other. Therefore, to enhance the per-

formance of the method, researchers must select the optimum value of strength

factor of watermark, so that all above mentioned parameters are maximized simul-

taneously. From this point of view, there is a room for the optimization methods

in the watermarking area to enhance the performance by optimally selecting the

value of strength factor. There are various optimization methods namely; genetic

algorithm (GA), artificial bee colony (ABC), differential evolution (DE), particle

swarm optimization (PSO), etc. which have been used to increase the quality and

20

Page 43: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

robustness of watermarking methods [77]. During the recent years, many water-

marking methods have exploited the advantages of various available optimization

methods [42, 55, 71, 78, 79, 80, 81, 82, 83, 84, 85]. The detailed survey of different

optimization methods has been presented by Karaboga and Akay [82] and Darwish

and Abraham [13]. A brief summary of the optimization methods used in image

watermarking methods is presented in Table 1.6.

Table 1.6: Categories of optimization methods in image watermarking.

S.No. Category Details

1. Genetic Algorithm Optimize 24 strength factor of watermark. [42]

Uses GA for search the optimum values of parameters. [81, 86]

Use GA to embed two bits of watermark data within each pixelof host image. [87]

2. Differential EvolutionMethod

Scale factors optimized using DE. [88]

Used a modified DE (self-adaptive differential evolution) algo-rithm for optimizing the scaling factors. [85]

Applied a DE optimization method, to search optimal scalingfactors. [89]

Use the DE to optimally design the quantization steps (QSs) forcalculating the strength of the watermark for achieving goodrobustness and quality. [90]

3. Artificial Bee ColonyMethod

Uses the ABC method to optimize pixel by pixel embeddingat different frequency sub-band with DWT, to improves theperformance of proposed image watermarking method. [91]

Genetic Algorithm

Many researchers used GA in their method for optimizing the watermark strength

to enhance the overall performance. GA have been used by Vahedi et al. [42, 80] to

compute the optimum strength of watermark and result shows that it improves the

robustness of existing methods. Kumsawat et al. [81, 86] used GA in their methods

for searching the optimum values of parameters and the embedding strength to

improve the transparency and robustness of proposed method. Mohammed et

al. [87] proposed a novel method in which they used GA to embed two bits of

watermark data within each pixel of host image.

Differential Evolution Method

A detailed survey of DE method has been presented by Das et al. [92]. Vester-

strom and Thomsen [93] compared the performance of DE with PSO, and other

21

Page 44: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

evolutionary algorithms (EAs), and reported that DE outperforms other consid-

ered methods. Aslantas [88] reported a method in which the singular values (SVs)

of the host image are manipulated to embed the watermark by using multiple

scaling factors. Further, scale factors are optimized using DE to enhance the

performance of proposed method. Later, Aslantas [94] exploits the DE method

for optimizing the scaling factor parameters to achieve maximum robustness and

transparency. Ali and Ahn [85] used a modified DE (self-adaptive differential evo-

lution) algorithm for optimizing the scaling factors of watermark data to achieve

better robustness and quality in DWT-SVD based watermarking method. Fur-

ther, Ali et al. [89] applied a DE optimization method to search optimal scaling

factors to improve the quality of watermarked image and robustness of the wa-

termark. Lei et al. [90] proposed a method in which they used DE to optimally

design the quantization steps (QSs) for calculating the strength of the watermark

for achieving good robustness and quality.

Artificial Bee Colony Method

Artificial Bee Colony (ABC) optimization method is one of the most recently de-

veloped swarm-based algorithms. A very few watermarking methods have been

reported which utilizes the powerfulness of ABC for optimization in their methods

till date. Karaboga and Akay [82] compared ABC optimization method with GA,

PSO, etc. and concluded that the performance of ABC is better than other opti-

mization methods. Recently, Akay and Karaboga [95] presented a state-of-the-art

survey and applications in the field of image processing. Sha et al. [91] uses the

ABC method to optimize pixel by pixel embedding at different frequency sub-band

with DWT to improve the performance of proposed image watermarking method.

Following section reviews the various color spaces used in image watermarking

method in order to enhance the performance parameters along with their con-

straints.

1.6.4 Color Spaces in Image Watermarking Method

At the outset, early image watermarking methods embed the watermark message

within the gray scale or color host image in the form of bits or bit stream and

further these bit streams are replaced by some pictorial shape representations

[39, 40]. In various multimedia applications namely; MPEG-1, MPEG-2, and

other MPEGs, the color images are the basic component. Hence, it is vital to

develop a watermarking method for color images. Although digital images are

22

Page 45: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

available in color format, most of the watermarking methods embed the gray

scale or binary image watermark while very few work has been reported for color

watermark [96, 97, 98]. In color image processing, we cannot ignore the effects of

different color spaces used on the performance of the method. Furthermore, Vahedi

et al. [99] demonstrated the effects of different color spaces on the performance

of an image watermarking method. The color spaces are dividing into two classes

namely; correlated and uncorrelated color space. The summary of color spaces

used in image watermarking is given in Table 1.7.

Table 1.7: Categories of color spaces in image watermarking method.

S.No. Category Comments

1. Correlated ColorSpaces

Uses HSV, RGB, YUV and HSI color models respectivelyin image watermarking method. [34, 58, 100, 101]

They uses HSI color space in DWT-based watermarkingmethod. [42]

2. Uncorrelated ColorSpaces

Uncorrelated color models Lab and Lαβ are used.[102]

Embeds the color watermark in Lab color space. [96]

Correlated Color Spaces

In a correlated color spaces, a color image is decomposed into three semi-independent

images in which change in one component may affect the other two components

of the images. In literature, various correlated color spaces namely; RGB, Y CbCr,

YIQ, HSI, HSV, etc. are being used in image watermarking methods by the re-

searchers. Methods proposed by researcher in [34, 58, 100, 101] uses HSV, RGB,

YUV, and HSI color models respectively. Vahedi et al. [99] reported a work

dedicated to the performance of DWT-based watermarking method on different

color spaces like RGB, Y CbCr, YIQ, HSI, and HSV. In which they concluded

that HSI color space outperforms other considered spaces. Golea et al. [97] pre-

sented the SVD-based RGB color image watermarking for embedding the color

RGB watermark into the RGB host image. Recently, Su et al. [98] presented QR

decomposition method for embedding the RGB color watermark into RGB host

image. Vahedi et al. [42] presented a DWT-based watermarking method in which

they used HSI color space to enhance the robustness and transparency.

Uncorrelated Color Spaces

Most of the image watermarking methods reported so far have used the correlated

color spaces. However, correlated color spaces impose the constraints to use only

23

Page 46: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

one color channel at a time for casting the watermark data [103]. As a consequence,

researchers in this area proposed various color co-ordinate illustrations during the

recent years to removes the dependency of three decomposed images. Such class

of color space is called as uncorrelated color space. There exist some uncorrelated

color models such as Lab, Lαβ, uncorrelated color space (UCS), etc. which may

be used in color image watermarking to increase the robustness and quality by

using all the color image components of host and watermark images [43, 102,

104]. There is a lot of scope of the research using uncorrelated color spaces-

based watermarking method because very few work has been reported till date.

Chou and Wu [96] embedded the color watermark in Lab color space using less

computationally complex spatial-domain color image watermarking method.

1.7 Challenges in Image Watermarking

Though many image watermarking methods have been proposed and demon-

strated significant contribution, there are still some challenges which need to be

addressed. One of the main challenges of the watermarking problem is to achieve a

better trade-off between robustness, transparency, capacity, and security. In order

to address above mentioned issue (i.e. the trade-off) to achieve a better perfor-

mance, many researchers presented solutions for this issue in their work. However,

improvements are required to fulfill the expectation of the industry. This section

overviews some of the crucial challenges of image watermarking.

1.7.1 Use of Color Watermark

Most of the work during the past decade in this area have been reported for

protection of the color or gray scale image (host) by embedding the gray scale

or binary image watermark. To embed a binary or gray scale image, one has to

convert it from color image because in nature color images are available. However,

very few methods have been reported which embed color watermark for protection

of images [96, 97, 98]. From this point of view, there is still a lot of scope for

improvements in the field of image watermarking to embed a color watermark

into the color host image.

1.7.2 Color Spaces

In color image watermarking, we are dealing with color images for host and water-

mark. To read a color image there are various color spaces/ coordinates available

in the literature as given in Section 1.6.4. Therefore, researchers are use different

24

Page 47: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

color spaces to improve the performance of the method. Robustness and trans-

parency of any method depend on how an input host is decomposed into three

color channels and also the decomposed images are independent with each other

or not. In other words, performance parameters of a color image watermarking

depend on the color space used in the method [99]. To consider above facts, there

is a lot scope to improve the performance of method by using a suitable color

space which decompose an image into three independent images. Fortunately, a

class of color spaces known as uncorrelated color space, generate three indepen-

dent images. However, a very few method has been reported which exploits this

class of color coordinate.

1.7.3 Transform Method

Though various reversible transform methods, as given in Section 1.6.2, have been

used in the reported image watermarking methods, still there is scope for improve-

ments of image watermarking methods by using some newly introduced transforms

(like SPT and other) which show better performance as compare to existing meth-

ods.

1.7.4 Optimization Method

A better trade-off is required between the parameters given in Section 1.3 to en-

hance the performance of the watermarking method. Furthermore, better trade-off

between the parameters depend on how optimally select the embedding param-

eters (like strength factor of watermark). To achieve this objective, there are

various optimization methods which have been used by the researchers as given

in Section 1.6.3. From this point of view, there is a room for improvements in

the performance of image watermarking method by using some newly developed

optimization methods like ABC, DE, etc.

1.7.5 3-D Watermarking

A recent challenge in watermarking is for protection of the 3-D objects or models

against the illegally utilizations which was introduced by Ohbuchi [105]. This

type watermarking is called “3-D watermarking”. Recently, 3-D watermarking

have been widely used in virtual reality, medical imaging, video games, computer

aided design, etc. This is considered as a new kind of multimedia that has scored

an increasing success. A very few work has been reported to protect the 3-D

models against the illegal utilizations till date, though it has been widely utilized

25

Page 48: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

in the entertainment industry.

1.8 Scope of the Thesis

The challenges discussed above have not been fully resolved. Therefore, there is

a need to design and develop a robust image watermarking method. The main

contributions in this thesis are five-fold. It first aims to pre-process the input color

images (host and watermark) by transforming it into UCS color space. Second,

four efficient transform-based image watermarking methods for color images have

been proposed to enhance the transparency and robustness of method. Third,

three optimization methods have been used to improve the performance of pro-

posed methods by optimally selecting the strength factors of watermarks and then

post-processed the watermarked coefficients to reconstruct the watermarked im-

age. Fourth, applying various watermarking attacks in order to test the proposed

method on various benchmark/ validation parameters like composite-peak-signal-

to-noise ratio (CPSNR), structural similarity (SSIM), and normalized correlation

(NC). Finally, an image watermarking method is designed and developed using

the proposed methods for protection of color images.

Including this introductory chapter, the rest of the thesis is organized in the

following five chapters.

Chapter 2 discusses literature survey of the existing methods for image water-

marking using DWT which embed gray-scale watermark image for the protection

of color host images. It then briefly describes the various preliminaries like DWT

method, UCS, and GA followed by the mathematical concept of pre-processing of

input images, embedding, post-processing, and extraction of watermark images.

Moreover, GA has been used to optimize the watermark strength during the em-

bedding phase. Further, the testing of the proposed method is done against the

various watermarking attacks. The results of the proposed method are compared

with existing methods and finally discussion is presented.

Chapter 3 reviews of various available SPT-based image watermarking meth-

ods which used gray-scale watermark image for the protection of color host im-

ages. Then, brief descriptions of various preface such as SPT method, UCS, and

GA are presented followed by the mathematical concept of pre-processing of in-

put images, embedding, post-processing, and extraction watermark images. The

proposed method also uses GA to optimize the watermark strength during the em-

bedding phase. The results of the proposed method are compared with existing

methods and the method proposed in Chapter 2.

Chapter 4 deals with the protection of color images by embedding the color

26

Page 49: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

watermark by using the DWT and ABC methods. This chapter presents a survey

of the existing methods for color image watermarking using DWT followed by

preliminaries. It then describes the pre-processing of input images, embedding,

post-processing, and extraction of watermark images. Then, three optimization

methods have been used to optimize the watermark strength during the embedding

phase followed by the testing of the method. The results of the proposed method

are compared with existing methods.

Chapter 5 proposes a color image watermarking method by casting the color

image watermark into the color host image by using the SPT and DE. A brief

discussion about the SPT and DE methods have been presented followed by the

procedure for embedding and extraction phase. In the proposed method, DE

has been used to optimize the watermark strength during the embedding phase

followed by the testing under various attacks. The results of the proposed method

are compared with existing methods and proposed method in Chapter 4.

The last chapter summarizes the key findings, main contributions of the

thesis, and possible scope for future research in this area.

27

Page 50: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 51: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Chapter 2

Digital Image Watermarking using Dis-

crete Wavelet Transform on Gray-Scale

Watermark Image

2.1 Introduction

Two embedding-domain have been used for digital image watermarking methods,

namely; spatial and transform domain as mentioned in Section 1.3. The detailed

survey related to the image watermarking methods is given in the Section 1.6. An

image watermarking method based on the transform domain is more robust than

the spatial domain [15]. Researchers suggested that DWT-based methods of image

watermarking are more robust against the common signal processing and malicious

attacks [51, 106, 107] as compared with the DFT and DCT-based methods. DWT-

based methods are capable in embedding a better quality of watermark and also

can recovered it from the watermarked image effectively. Therefore, this chapter

focuses on the protection of color images from its illegal utilization using a DWT-

based digital image watermarking method.

During past decade, many image watermarking methods [40, 41, 42, 58, 59,

60, 70, 71, 72, 73] have been reported which utilized the advantages of DWT over

the DFT and DCT [74]. DWT-based methods are more robust because it is more

close to the frequency model for the HVS [70]. The characteristics of HVS model

are used by various researcher in image watermarking to enhance the transparency

and robustness. Kundur et al. [39] exploit HVS model to generate a visual cover

for multi-resolution-based image watermarking method. Later, Reddy et al. [40]

and Ghouti et al. [41] uses the advantages of HVS in their methods. Furthermore,

the performance of the DWT-based methods depend on the parameters namely;

selection of filter bank, decomposition level, and selection of embedding decom-

posed coefficients [42]. Therefore, all the work reported in this area using DWT

Page 52: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

are based on the changing the above mentioned parameters to show the better

robustness and transparency of watermarking method. Vahedi et al. [42] exploit

the advantage of symlet-4 filter bank to increase the quality and robustness of wa-

termarking method as compared to existing methods. In his paper, they proposed

a novel DWT-based method for color images by embedding the binary water-

mark. Vahedi et al. [42] showed that three level decomposition with all the four

sub-spaces namely approximation, horizontal, vertical, and diagonal along with

symlet-4 filter bank provides better results for image watermarking. Therefore, in

this method DWT has been used with three level of decomposition and symlet-4

filter bank for embedding the watermark. Moreover, to increase the quality and

robustness of watermarking methods, this method utilizes the capabilities of GA

to optimize the watermark strength.

Generally, the researchers used RGB, Y CbCr, YIQ, HSI, HSV, etc., color space

models for host image in their digital watermarking method. The above mentioned

color models are correlated i.e. the image components are not independent and

change in one component may affect the other components of the image. This

imposes the constraints for the researchers who used correlated color host image

to use only one color component at a time for embedding the watermark data.

However, there exist some uncorrelated color models such as Lab, Lαβ, UCS,

etc. [102, 108], which may be used in color image watermarking to increase the

robustness and quality by using all the color image components of host images.

Saraswat and Arya [108] used UCS for color transfer of images and observed that

UCS outperforms the other uncorrelated color spaces.

Therefore, due to the limitations of correlated color spaces and powerfulness of

DWT, this chapter proposes a DWT-based image watermarking method using un-

correlated color space (UCS). Further, GA has been used to optimize the strength

factor of the proposed watermarking method. In this chapter Section 2.2 presents

the various preliminaries used. Proposed method and performance improvements

using GA to the proposed method have been discussed in Section 2.3. Further,

experimental results and the conclusion of the chapter are presented in Section

2.4 and 2.5 respectively.

2.2 Preliminaries

In this chapter, the proposed method uses DWT, UCS and GA methods for digital

image watermarking. Therefore, following section describe the functions of these

methods in brief:

30

Page 53: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

2.2.1 Discrete Wavelet Transform (DWT)

DWT is frequently used in various image processing applications namely; compres-

sion, watermarking, etc. DWT is a sampled version of continuous wavelet trans-

form. The main advantage of DWT is that it maintains both frequency and time

information at the same time which was missing in DFT. The transform based on

small sinusoidal waves of varying frequency and limited duration is called wavelet.

DWT is used to decompose the input image into sub-images of diverse spatial

direction (i.e. horizontal, vertical, and diagonal) and independent frequency area

[40, 41]. Transformation of an image from the spatial domain to DWT domain

by one level decomposes the input image into four different frequency bands in

which one is the low frequency and remaining three are the high frequency bands.

These bands are represented as LL (approximation detail of image), HL (hori-

zontal detail of image), LH (vertical detail of image), and HH (diagonal detail of

image) respectively. Magnitude of DWT coefficients is larger in the lowest bands

(LL) at each level of decomposition and is smaller for other bands (HH, LH, and

HL). Therefore, after one level decomposition, the further decomposition of given

image is done using only LL sub-space which is also decomposed into four distinct

frequency bands as mention above. Figure 2.1 shows the two dimensional image

of size 512×512 before and after the three level of DWT decomposition with their

sub-spaces size. Since, a two dimensional image has been used, it needed a 2-D

wavelet transform. The 2-D DWT is implemented as a 1-D row transform followed

by a 1-D column transform. The 2-DWT transform coefficients for input image

function f(n1, n2) of size N1 ×N2 are calculated using Eq. (2.1) and (2.2).

Wϕ(j0, k1, k2) =1√N1N2

N1−1∑n1=0

N2−1∑n2=0

f(n1, n2)ϕj0,k1,k2(n1, n2) (2.1)

W iψ(j0, k1, k2) =

1√N1N2

N1−1∑n1=0

N2−1∑n2=0

f(n1, n2)ψij0,k1,k2

(n1, n2) (2.2)

here, j0 is the starting scale and i = {H, V,D} indicates the directional index of

wavelet function. Eq. (2.1) calculates the approximation coefficient while (2.2)

calculates the other detail coefficients. 2-D scaling function ϕ and wavelet function

ψi, used in Eq. (2.1) and (2.2), may be calculated through the separable 1-D filter

having the impulse response hϕ(−n) and hφ(−n) respectively. Sub-spaces LL, HL,LH, and HH are calculated by putting the values of ϕ(n1, n2) and ψ

i(n1, n2) from

31

Page 54: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

the Eq. (2.3)-(2.6) into Eq. (2.1) and (2.2).

ϕ(n1, n2) = ϕ(n1)ϕ(n2) (2.3)

ψH(n1, n2) = ψ(n1)ϕ(n2) (2.4)

ψV (n1, n2) = ϕ(n1)ψ(n2) (2.5)

ψD(n1, n2) = ψ(n1)ψ(n2) (2.6)

Figure 2.1: Three level decomposition layout of an image.

To reconstruct the image from the DWT coefficients, inverse DWT (IDWT) is

calculated as follows :

f(n1, n2) =1√N1N2

∑k1

∑k2

Wϕ(j0, k1, k2)ϕj0,k1,k2(n1, n2)

+1√N1N2

∑i=H,V,D

∞∑j=0

∑k1

∑k2

W iψ(j0, k1, k2)ψ

ij0,k1,k2(n1, n2)

(2.7)

To embed the watermark in DWT-based decomposed image, the transform coeffi-

cients of DWT are modified by watermark. Since, the low frequency band (LL) of

DWT decomposed image is similar to the original image, most of the information

or energy of original image lies in this frequency band. In order to maintain the

quality of watermarked image, this low frequency or approximation detail must be

preserved and maintained the robustness of embed watermark. Therefore, it is the

trade-off between the robustness and quality that at which extent the transform

coefficients are to be modified in order to optimize the overall method.

32

Page 55: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

2.2.2 Uncorrelated Color Space (UCS)

The quality of the color image watermarking methods depends on how images

are split into three color channels, i.e. which color space was chosen. For better

quality, color space must be uncorrelated which makes the three color channels

semi-independent [103, 108] and may be used for embedding the watermark. This

method uses the recently developed UCS proposed by Liu [109]. UCS is derived

from RGB color space using principal component analysis (PCA). UCS uses a

linear transformation, WU ∈ R3×3, of the RGB color space to uncorrelate the

component images as shown in Eq. (2.8) [109];

⎡⎢⎣U(x, y)

C(x, y)

S(x, y)

⎤⎥⎦ = WU

⎡⎢⎣R(x, y)

G(x, y)

B(x, y)

⎤⎥⎦ (2.8)

The WU is calculated by factorizing the covariance matrix C using PCA in the

following form [109]:

C =W tUΛWU (2.9)

hereW tU and Λ are the orthogonal eigenvector matrix and diagonal eigenvalue ma-

trix with diagonal elements in a decreasing order, respectively. Saraswat and Arya

[108] used UCS for color transfer of images and observed that UCS outperforms

the other uncorrelated color spaces.

2.2.3 Genetic Algorithm (GA)

Genetic algorithm (GA) belongs to the class of evolutionary algorithms and is

an ingredient of artificial intelligence. These algorithms are capable to encode a

solution to the different engineering problems. Furthermore, to achieve a better

solution to the problem these algorithms use methods which are stimulated by

nature namely; inheritance, reproduction, mutation, and crossover. GAs were

reported by the Holland [110, 111].

Terminology

The term used in GA are as follows:

• Search space : the space of all possible solutions.

• Chromosome : it contains the solution in form of genes.

• Population : a set of individuals/chromosomes.

33

Page 56: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

• Generation : the procedure of evaluation, reproduction, crossover and mu-

tation.

• Fitness : the value assigned to an individual based on how far or close it is

from the desired solution.

The pseudo-code of the GA is shown in Algorithm 2.1 and the flow chart is

depicted in Figure 2.2.

Algorithm 2.1 Genetic Algorithm

Genetic representation of solution to the problemCreate and initialize the population individuals;Evaluate the fitness of each individual in populationwhile Termination criteria is not satisfied do

1. Reproduction: Select the individuals with greater fitness for reproduction.2. Crossover: Reproduce new individuals through crossover.3. Mutation: Apply probabilistic alteration or modification on new individuals.4. Form a new population with these offsprings.

end while

Figure 2.2: Genetic Algorithm Flow Chart.

In GA, there are three operators: reproduction, crossover, and mutation. Ini-

tially, a population is generated randomly with uniform distribution followed by

reproduction, crossover, and mutation operators to generate a new population.

Offspring vector generation is a crucial step in GA process. The two operators,

34

Page 57: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

crossover and mutation are used to generate the offspring vectors. The reproduc-

tion operator is used to select the best vector between offspring and parent for the

next generation. GA operators are explained briefly in the following sections.

Reproduction

Reproduction or selection operator selects the individuals or chromosomes to

crossover and to generate offsprings. The selection is crucial and important step

and it is based on the principle of the best one to be survive and generates new

offsprings. To select the best individual for the optimum solution of given prob-

lem, the fitness function is formulated. This function shows the closeness of a

current result to the desired result. There are various techniques for reproduction

operator namely; Roulette-wheel selection, tournament selection, rank selection,

steady-state selection, Boltzmann selection, and scaling selection.

Crossover

Crossover operator selects genes from parent chromosomes, combines them and

produces a new children or offspring. The idea behind this operator is that new

offspring may have better characteristics than both of the parents to achieve the

desired results.There are various techniques for crossover operator namely; single-

point crossover, two point crossover, uniform crossover, and arithmetic crossover.

Mutation

Mutation operator modifies or alter more than one gene values in an individual.

The advantage of the mutation operator is that it can produce new genes values

in the individual or chromosomes which is not present in a given search space.

Moreover, these new genes can produce the better solution for given problem.

2.3 Proposed Method

The proposed method explores the advantages of uncorrelated color space over

the correlated color space to improve the performance of watermarking methods

in terms of quality and robustness. It implants the gray-scale watermark image

into the color host image by modifying the decomposed wavelet coefficients of host

image. The watermark image is embedded in each color channel of host image to

increase the reliability during the recovery process and protect against the common

signal processing attacks. The proposed method consists of five phases namely;

preprocessing of host and watermark image, watermark embedding, image post

35

Page 58: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

processing, extraction of watermark, and performance improvement using GA.

The basic structural design of the proposed method is shown in Figure 2.3. The

details of each phase of the proposed method is described in the following sections.

Figure 2.3: Structural design of proposed method.

Image Pre-processing

In image preprocessing, host RGB color image (H) is transformed into UCS color

space [109], using Eq. (2.10) which produces three independent image components

36

Page 59: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

namely HU , HC , and HS.

⎡⎢⎣HU(x, y)

HC(x, y)

HS(x, y)

⎤⎥⎦ =WU

⎡⎢⎣HR(x, y)

HG(x, y)

HB(x, y)

⎤⎥⎦ (2.10)

The WU is calculated by factorizing the covariance matrix C using PCA in the

following form [109]:

C =W tUΛWU (2.11)

where W tU and Λ are the orthogonal eigenvector matrix and diagonal eigenvalue

matrix with diagonal elements in a decreasing order, respectively. The watermark

image is divided into 16 non-overlapping sub-areas as shown in Figure 2.3. These

sub-areas of watermark image are then re-arranged or scrambled by some pre-

defined sequence or key to introduce one more level of security and enforced the

user to use the key for the extraction of the image from watermarked image.

Further, third level of decomposition is applied on each component of host image

using symlet-4 wavelet function. The resultant third level wavelet coefficients,

Hk3, is chosen for embedding process, k = {LL,HL, LH,HH}.

Watermark Embedding

After preprocessing of the images, the scrambled watermark is embedded into the

DWT coefficients of host image. The third level decomposition coefficients of host

image are HLL3(x, y), HHL3(x, y), HLH3(x, y), and HHH3(x, y), representing the

approximation, horizontal, vertical, and diagonal details of 3-DWT decomposed

host image respectively. In order to increase the reliability and robustness of

proposed method against the malicious attacks, it is desired to hide the watermark

image in all the color components of host coefficients. Therefore, approximation

details of the third level coefficients are divided into 16 non-overlapping areas.

Now, the scrambled watermark is embedded into the approximation details of the

third level decomposed host image coefficients in its all color channels by using

Eq. (2.12).

HWk3(x, y) = Hk3(x, y) + α(r)Wp(x, y)

k = {LL,HL, LH,HH}p = {1, 2, 3, ..., 16}r = {1, 2, 3, ..., 16}

(2.12)

where, k represents the sub-areas of host image, p is the intended block of water-

mark, and α denotes the strength of modification done in the host coefficients.

37

Page 60: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Post-processing

After embedding the watermark image into corresponding DWT host image co-

efficients, inverse DWT (IDWT) is taken for watermarked host image coefficients

which returns watermarked image in UCS color space. Finally UCS watermarked

image is reconverted into RGB color space.

Watermark Extraction

The watermark extraction process requires the watermarked image and the pre-

defined key. To extract the watermark, RGB watermarked image is transformed

into UCS color space and then 3-DWT decomposition using symlet-4 wavelet filter

bank on each channel is applied. To gathered the fraction watermarked image,

a reverse process of embedding ia applied as shown in Figure 2.3 and extract

the watermark image from this fraction using Eq. (2.13). Finally, the scrambled

watermark image is rearranged to its original sequence.

Wp(x, y) =Hk3(x,y)−HWk3

(x,y)

α(r)

k = {LL,HL, LH,HH}p = {1, 2, 3, ..., 16}r = {1, 2, 3, ..., 16}

(2.13)

Performance Improvement using GA

The watermarked image HWk3 is subjected to various watermarking attacks which

degrade the performance of watermarking methods. There are mainly two param-

eters namely; quality and robustness which must be maximized for a watermarking

method, but these parameters are inversely related with each other i.e. if qual-

ity increases, robustness suffers and vice-versa. In this method, optimum values

of these parameters are dependent on the suitable values of strength factor (α).

Therefore, this method uses GA optimization method for selecting the values of

α which optimizes the quality and robustness in terms of fitness function. There

are 16 strength factors used in this method whose optimized values are calculated

38

Page 61: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

by minimizing the following fitness function using GA [42].

Fitness =100

CPSNR+ 2×

90%∑Q=60%

[1−NCjpg(Q)]

+50%∑

Q=10%

[1−NCjpg(Q)] +3∑i=1

[1−NCfilter(i)]

+

3∑i=1

[1−NCscale(i)] +

3∑i=1

[1−NCnoise(i)]

+

4∑i=1

[1−NCcrop(i)] + [1−NCrotation]

(2.14)

where, CPSNR is composite peak signal-to-noise ratio, and NC is normalized

correlation. These vales are calculated by applying the mentioned attacks on wa-

termarked image. The GA method is executed for 200 iterations to calculate the

optimum values of strength factors (α).

2.4 Experimental Results

To compare the performance of proposed and considered image watermarking

methods, two popularly used 24-bit RGB color images namely lena and mandrill

each of size 512× 512 are used as host images and two gray scale images namely;

RTU logo and aeroplane image each of size 64× 64 are used as watermark images

to embed them in the host images and are shown in Figure 2.4. All the considered

images have been taken from USC-SIPI image database [112] except RTU logo

which is taken from Rajasthan Technical University, Kota, India.

(a) Lena (b) Mandrill (c) RTU logo (d) Aeroplane

Figure 2.4: (a)-(b). RGB host images and (c)-(d). Gray scale watermark images.

In the pre-processing step of the proposed method, host images are converted

into UCS color space followed by third level decomposition of host images and

scrambling of watermark images. One of the possible scrambled watermark image

39

Page 62: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

is shown in Figure 2.3. Now, the watermark images are embedded into each of the

considered host images.

The performance of the proposed methods is compared with Vahedi et al. [42] who

also used DWT with correlated color spaces and exploits the powerfulness of GA to

increases the quality and robustness of image watermarking method. To compare

the objective test for quality measures of resultant watermarked images using

proposed method and considered methods, CPSNR [42] performance parameters

are calculated and depicted in Table 2.1. From Table 2.1, it is validated that

both the methods maintain the quality of the watermarked image in terms of

CPSNR (> 35dB). However, the proposed method shows lower values of CPSNR

as compared to other considered method due to the hiding of complete watermark

more than once and into the approximation detail of host image.

Table 2.1: Comparison of CPSNR values of watermarked images resultant fromproposed and considered method.

S.No. Used Watermark Watermarkedimages

Vahedi et al. [42] ProposedMethod

1. RTU Logo Lena 36.74 35.92

2. RTU Logo Mandrill 35.85 35.67

3. Aeroplane Lena 36.32 35.61

4. Aeroplane Mandrill 35.42 35.59

The robustness of the proposed method has been tested by applying different

attacks on the watermarked images. This method consists of filtering (mean,

median, wiener), noise (gaussian, poisson, salt and pepper), JPEG compression,

rotation, scaling, and cropping attacks. The attacks are applied on all the four

watermarked images embedded with RTU logo and aeroplane watermark images.

The comparison of NC values after applying the attacks on watermarked images

embedded with RTU logo and aeroplane image are depicted in Table 2.2. From

Table 2.2, it is observed that the robustness of watermarked images embedded

with RTU logo have higher values of NC as compared to aeroplane image due

to the coarseness of aeroplane image as compared to RTU logo. Moreover, the

similar performance of the proposed method can be observed from Figure 2.5 and

Figure 2.6 where the extracted watermark images are RTU logo and Aeroplane

images respectively, for all the considered attacks. Therefore, it is validated from

the results that the proposed method produces high quality and better robust

watermarked images and can be utilized for content authentication to protect the

copyrighted images. The comparative results show that the proposed method

outperforms other method for all the considered attacks.

40

Page 63: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Tab

le2.2:

Com

parison

ofrobustnessin

term

sof

NC

values

obtained

afterap

plyingattackson

thewatermarkedim

ages.

RTU

Logo

AeroplaneIm

age

lena

Mandrill

lena

Mandrill

S.N

o.

Attacks

Vahedi

et

al.

[42]

Propose

dM

eth

od

Vahedi

et

al.

[42]

Propose

dM

eth

od

Vahedi

et

al.

[42]

Propose

dM

eth

od

Vahedi

et

al.

[42]

Propose

dM

eth

od

1Med

ianfiltering(3

×3)

0.73

0.76

0.71

0.75

0.70

0.75

0.67

0.74

2W

iener

filtering(3

×3)

0.88

0.92

0.85

0.90

0.84

0.91

0.81

0.89

3Meanfiltering(3

×3)

0.70

0.99

0.68

0.97

0.67

0.98

0.65

0.96

4Gaussiannoise(0.006)

0.83

0.87

0.81

0.85

0.79

0.86

0.77

0.84

5Poissonnoise

0.84

0.88

0.82

0.86

0.80

0.87

0.77

0.85

6Salt

andpep

per

noise

0.92

0.96

0.89

0.94

0.87

0.95

0.85

0.93

7JPEG

compression(10%)

0.68

0.71

0.66

0.70

0.65

0.70

0.63

0.69

8JPEG

compression(90%)

0.84

0.88

0.82

0.86

0.80

0.87

0.77

0.85

9Rotation(1

0)

0.92

0.96

0.89

0.94

0.87

0.95

0.85

0.93

10

Scaling(0.6)

0.94

0.98

0.91

0.96

0.89

0.97

0.87

0.95

11

Scaling(0.9)

0.95

0.99

0.92

0.97

0.90

0.98

0.88

0.96

12

Scaling(1.2)

0.95

0.99

0.92

0.97

0.90

0.98

0.88

0.96

13

Cropping(10%)

0.92

0.96

0.89

0.94

0.87

0.95

0.85

0.93

14

Cropping(20%)

0.81

0.84

0.79

0.83

0.77

0.84

0.75

0.82

15

Cropping(30%)

0.71

0.74

0.69

0.73

0.68

0.73

0.66

0.72

16

Cropping(40%)

0.59

0.62

0.58

0.61

0.56

0.61

0.55

0.60

41

Page 64: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Extracted RTU logo Watermark Image After Attacks

Median (3x3) Wiener (3x3) Mean (3x3) Gaussian (0.006)

JPEG (10%) JPEG (90%) Poisson Salt & Pepper

Rotation (10) Scaling (0.6) Scaling (0.9) Scaling (1.2)

Cropping (10%) Cropping (20%) Cropping (30%) Cropping (40%)

Figure 2.5: Extracted RTU logo watermarks by proposed method after applyingconsidered attacks.

42

Page 65: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Extracted Aeroplane Watermark Image After Attacks

Median (3x3) Wiener (3x3) Mean (3x3) Gaussian (0.006)

JPEG (10%) JPEG (90%) Poisson Salt & Pepper

Rotation (10) Scaling (0.6) Scaling (0.9) Scaling (1.2)

Cropping (10%) Cropping (20%) Cropping (30%) Cropping (40%)

Figure 2.6: Extracted Aeroplane image watermarks by proposed method afterapplying considered attacks.

43

Page 66: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

2.5 Results and Discussions

This chapter proposes a DWT-based image watermarking method for protecting

the color host image by embedding gray-scale image using UCS and GA. The

use of UCS color space increases the effective utilization of all color channels

of host image which is not feasible in correlated color spaces while GA is used

for optimizing the strength factors to improve the quality and robustness of the

proposed method. The results validate that the proposed method is better than

other method for all the considered performance parameters. In other words, the

UCS color space is outperforms than the correlated color space utilized by Vahedi

et al. [42]. Therefore, it is concluded that the proposed method has high quality

and robust results and can further be used for protection of the copyrighted images.

The next chapter uses the SPT-based method to embed the gray-scale water-

mark image into color host image.

44

Page 67: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Chapter 3

Digital Image Watermarking using Steer-

able Pyramid Transform on Gray-Scale

Watermark Images

3.1 Introduction

Previous chapter presented an image watermarking method, which is based on

DWT and further GA has been exploited to optimize the performance of method.

In addition, the proposed method has been compared with existing method and

results shows that the proposed method outperforms. Although, proposed method

in previous chapter working well, there is still room for improvements in the field

of image watermarking by applying some latest developed transform as mentioned

in section 1.6.1.

The imperfect ability of DWT in capturing directional information, which is neces-

sary components for image perception, processing, and reconstruction [47], causes

researcher to find alternative transform having all the advantages of DWT and

simultaneously removes all disadvantages. Fortunately, researcher come up sev-

eral scale and directional image illustrations and results show that out of other

representation SPT outperforms among the class [46]. Researchers suggested that

SPT-based methods of image watermarking are more robust against the common

signal processing and geometric attacks [45, 46, 47, 63]. Literature shows that the

SPT keeps most of the advantages of DWT as its basis functions are confined to

a small area in both space and spatial-frequency. However, this recursive multi-

scale & multi-directional decomposition improve their drawbacks like; it is aliasing

free and capable to generate any number of orientation bands as it is based on

a category of random orientation filters produced by linear grouping of a set of

basis filters [46, 76]. Invariance, multi-resolution, and capture of multi-scale and

multi-resolution constructions in the images are some of main properties of SPT

Page 68: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

which make it superior in watermarking methods.

Therefore, in this work SPT has been used with three level of decomposition

in place of DWT for embedding the watermark. Moreover, GA method is also

used for optimizing the strength factor of watermark to get better quality and

robustness as used in the previous method discussed in Chapter 2. In the similar

fashion of previous method described in Chapter 2, the host images and watermark

images have been converted to UCS color space before embedding.

Rest of the chapter is organized as follows. Section 3.2 presents the SPT used

in the proposed method while GA and UCS have already been described in Section

2.2. In Section 3.3, proposed method has been discussed followed by experimental

results and conclusions in the successive sections.

3.2 Steerable Pyramid Transform (SPT)

The earliest successful multi-scale, multi-orientation decomposition of an image

is SPT which has been proposed by Freeman and Adelson [44, 45]. The SPT

is a wavelet-like illustration whose investigation functions are scaled and rotated

editions of a single directional wavelet. Steerability is the property in which funda-

mental wavelets can be rotated to any orientation by appearing appropriate linear

groups of a primary set of equiangular directional wavelet components [113]. This

property is utilized in the SPT for finding the direction of basis function of an

image [76]. SPT decomposes the input image into a set of sub-bands of a variety

of orientations. Figure 3.1 depicts the decomposition block diagram of an input

image, consisting of the three kind of filters; low-pass (L0), high-pass (H0), and

bank of band-pass (B0, ..., Bk) filters. Here k is the order of basis functions of the

steerable pyramid and k + 1 are the orientations. The input image is sub-divided

into the high and low-pass sub-bands by the high and low pass filters respectively.

Every low-pass sub-band is again sub divided into the k + 1 oriented sub-bands

and a low pass sub-band. Finally, sub-sampled are created by a factor 2 and then

further decomposition is performed.

3.3 Proposed Method

The proposed method uses the uncorrelated color space to improve the quality

and robustness of watermarking methods. This method embeds the gray scale

watermark image into the color host image by modifying the decomposed SPT

coefficients of host image. The watermark is added in each color channel of host

image which increases the reliability of extraction process and protection against

46

Page 69: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Figure 3.1: Block diagram for steerable pyramid decomposition of an image.

the common signal processing attacks. The proposed method is divided into five

phases namely, preprocessing of host and watermark images, watermark embed-

ding, image post processing, extraction of watermark, and performance improve-

ment using GA. Figure 3.2 shows basic structural design of the proposed method.

The details of each phase of the proposed method is described in the following

sections.

Image Pre-processing

Image preprocessing, changes the host RGB color image (H) into UCS color image

[109], using Eq. (3.1) and generates three independent image components namely

HU , HC , and HS.

⎡⎢⎣HU(x, y)

HC(x, y)

HS(x, y)

⎤⎥⎦ =WU

⎡⎢⎣HR(x, y)

HG(x, y)

HB(x, y)

⎤⎥⎦ (3.1)

here, WU is calculated by factorizing the covariance matrix C using principal

component analysis (PCA) in the following form [109]:

C =W tUΛWU (3.2)

47

Page 70: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Figure 3.2: Structural design of proposed method.

where W tU and Λ are the orthogonal eigenvector matrix and diagonal eigenvalue

matrix with diagonal elements in a decreasing order, respectively. Further, 16

non-overlapping sub-areas are generated from watermark as shown in Figure 3.2.

These sub-areas of watermark are then re-arranged or scrambled by some pre-

defined sequence or key. This increases the level of security and enforces the user

to use the key for the extraction of the watermarked image. Further, third level

of decomposition is applied on each component of host image. The resultant third

48

Page 71: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

level SPT coefficients, Hk3, is chosen for embedding process, k = {1, 2, 3, ..., 16}.

Watermark Embedding

After the preprocessing step, the scrambled watermark is embedded into the SPT

coefficients of host image (Hk3). In order to increase the reliability and robust-

ness of proposed method against the malicious attacks, it is desired to hide the

watermark image in all the color components of host coefficients. Therefore, low

frequency details of the third level coefficients are divided into 16 non-overlapping

areas. Now, the scrambled watermark is embedded into the low frequency details

of the third level decomposed host image coefficients in its all color channels by

using Eq. (3.3).

HWk3(x, y) = Hk3(x, y) + α(r)Wp(x, y)

k = {1, 2, 3, ..., 16}p = {1, 2, 3, ..., 16}r = {1, 2, 3, ..., 16}

(3.3)

where, k represents the sub-areas of host image, p is the intended block of water-

mark, and α denotes the strength of modification done in the host coefficients.

Post-processing

After embedding the watermark image into corresponding SPT host image coeffi-

cients, inverse SPT (ISPT) is taken for watermarked host image coefficients which

returns watermarked image in UCS color space. Finally UCS watermarked image

is reconverted into RGB color space.

Watermark Extraction

The watermark extraction process needs the watermarked image and the pre-

defined key, to extract the watermark. RGB watermarked image is transformed

into UCS color space and then SPT decomposition on each channel is applied.

To gathered the watermarked image, a reverse process of embedding is applied

as shown in Figure 3.2 and extract the watermark using Eq. (3.4). Finally, the

scrambled watermark is rearranged to its original sequence using the pre-defined

49

Page 72: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

key.

Wp(x, y) =Hk3(x,y)−HWk3

(x,y)

α(r)

k = {1, 2, 3, ..., 16}p = {1, 2, 3, ..., 16}r = {1, 2, 3, ..., 16}

(3.4)

Performance Improvement using GA

The watermarked image is subjected to various watermarking attacks which de-

grade the performance of watermarking methods such as quality and robustness

which must be maximized for a watermarking method, but these parameters are

inversely related with each other i.e. if quality increases, robustness suffers and

vice-versa. In this method, optimum values of these parameters are dependent on

the suitable values of strength factor (α). Therefore, this method also uses GA

optimization method for selecting the values of α which optimizes the quality and

robustness in terms of fitness function as described in 2.3.

3.4 Experimental Results

To compare the performance of proposed and considered image watermarking

methods, two popularly used 24-bit RGB color images namely, lena and mandrill

each of size 512× 512 are used as host images and two gray scale images namely,

RTU logo and aeroplane image each of size 64× 64 are used as watermark images

to embed them in the host images and are shown in Figure 3.3. All the considered

images have been taken from USC-SIPI image database [112] except RTU logo

which is taken from Rajasthan Technical University, Kota, India.

(a) Lena (b) Mandrill (c) RTU logo (d) Aeroplane

Figure 3.3: (a)-(b). RGB host images and (c)-(d). Gray scale watermark images.

The performance of the proposed method is compared with method proposed

in Chapter 2 in which DWT and GA have been used to increases the quality

and robustness of image watermarking method. To compare the objective test

50

Page 73: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

for quality measures of resultant watermarked images using proposed method and

considered methods, CPSNR [42] performance parameters are calculated and de-

picted in Table 3.1. From Table 3.1, it is validated that all the methods maintain

the quality of the watermarked image in terms of CPSNR (> 35dB). However,

the proposed method shows better results in terms of CPSNR as compared to

proposed DWT-based method.

Table 3.1: Comparison of CPSNR values of watermarked images resultant fromproposed and considered methods.

S.No. UsedWatermark

Watermarkedimages

ProposedDWT-basedmethod[Chapter 2]

Proposed SPT-based Method

1. RTU Logo Lena 35.92 37.23

2. RTU Logo Mandrill 35.67 36.87

3. Aeroplane Lena 35.61 37.11

4. Aeroplane Mandrill 35.59 36.08

The robustness of the proposed methods has been tested by applying different

attacks on the watermarked images. This chapter consists of filtering (mean,

median, wiener), noise (gaussian, poisson, salt and pepper), JPEG compression,

rotation, scaling, and cropping attacks. The attacks are applied on all the four

watermarked images embedded with RTU logo and aeroplane watermark images.

The comparison of NC values after applying the attacks on watermarked images

embedded with RTU logo and aeroplane image are depicted in Table 3.2. From

Table 3.2, it is observed that the robustness of watermarked images embedded

with RTU logo have higher values of NC as compared to aeroplane image due to

the coarseness of aeroplane image as compared to RTU logo. Moreover, it can be

concluded from Figure 3.4 and Figure 3.5 which shows the extracted RTU logo

and Aeroplane watermarks by proposed method respectively, for all the considered

attacks have been depicted. Therefore, it is validated from the results that the

proposed method using SPT produces high quality and better robust watermarked

images and can be utilized for content authentication to protect the copyrighted

images. The comparative results show that the proposed method outperforms

other methods for all the considered attacks.

3.5 Results and Discussions

This chapter introduces a SPT-based image watermarking method using UCS and

GA. The uncorrelated color space increases the effective utilization of all color

51

Page 74: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Tab

le3.2:

Com

parison

ofrobustnessin

term

sof

NC

values

obtained

afterap

plyingattackson

thewatermarkedim

ages.

RTU

Logo

AeroplaneIm

age

lena

Mandrill

lena

Mandrill

S.N

o.

Attacks

Propose

dDW

T-

base

dm

eth

od

[Chapte

r2]

Propose

dSPT-b

ase

dM

eth

od

Propose

dDW

T-

base

dm

eth

od

[Chapte

r2]

Propose

dSPT-b

ase

dM

eth

od

Propose

dDW

T-

base

dm

eth

od

[Chapte

r2]

Propose

dSPT-b

ase

dM

eth

od

Propose

dDW

T-

base

dm

eth

od

[Chapte

r2]

Propose

dSPT-b

ase

dM

eth

od

1Med

ianfiltering(3

×3)

0.76

0.79

0.75

0.80

0.75

0.78

0.74

0.74

2W

iener

filtering(3

×3)

0.92

0.93

0.90

0.90

0.91

0.92

0.89

0.91

3Meanfiltering(3

×3)

0.99

0.98

0.97

0.98

0.98

0.98

0.96

0.97

4Gaussiannoise(0.006)

0.87

0.91

0.85

0.86

0.86

0.87

0.84

0.87

5Poissonnoise

0.88

0.94

0.86

0.90

0.87

0.88

0.85

0.90

6Salt

andpep

per

noise

0.96

0.97

0.94

0.96

0.95

0.96

0.93

0.94

7JPEG

compression(10%)

0.71

0.72

0.70

0.71

0.70

0.71

0.69

0.70

8JPEG

compression(90%)

0.88

0.88

0.86

0.88

0.87

0.90

0.85

0.86

9Rotation(1

0)

0.96

0.97

0.95

0.96

0.95

0.97

0.93

0.94

10

Scaling(0.6)

0.98

0.98

0.96

0.98

0.97

0.98

0.95

0.96

11

Scaling(0.9)

0.98

0.98

0.97

0.98

0.98

0.98

0.96

0.97

12

Scaling(1.2)

0.99

0.98

0.97

0.98

0.98

0.98

0.96

0.97

13

Cropping(10%)

0.96

0.97

0.94

0.95

0.95

0.96

0.93

0.94

14

Cropping(20%)

0.84

0.90

0.83

0.89

0.84

0.86

0.82

0.83

15

Cropping(30%)

0.74

0.79

0.73

0.73

0.73

0.73

0.72

0.73

16

Cropping(40%)

0.62

0.63

0.61

0.62

0.61

0.62

0.60

0.61

52

Page 75: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Extracted RTU logo Watermark Image After Attacks

Median (3x3) Wiener (3x3) Mean (3x3) Gaussian (0.006)

JPEG (10%) JPEG (90%) Poisson Salt & Pepper

Rotation (10) Scaling (0.6) Scaling (0.9) Scaling (1.2)

Cropping (10%) Cropping (20%) Cropping (30%) Cropping (40%)

Figure 3.4: Extracted RTU logo watermarks by proposed method after applyingconsidered attacks.

53

Page 76: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Extracted Aeroplane Watermark Image After Attacks

Median (3x3) Wiener (3x3) Mean (3x3) Gaussian (0.006)

JPEG (10%) JPEG (90%) Poisson Salt & Pepper

Rotation (10) Scaling (0.6) Scaling (0.9) Scaling (1.2)

Cropping (10%) Cropping (20%) Cropping (30%) Cropping (40%)

Figure 3.5: Extracted Aeroplane image watermarks by proposed method afterapplying considered attacks.

54

Page 77: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

channels of host image as compared to correlated color spaces while GA optimizes

the strength factors and improves the quality and robustness of the proposed

method. The results validates that the proposed method using SPT and UCS

is better than existing methods which are based on DWT for all the considered

performance parameters. Hence, it is concluded that SPT-based method using

UCS outperforms as compared with the DWT.

The next two chapters describe the watermarking methods for embedding the

color watermark images into color host images.

55

Page 78: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 79: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Chapter 4

Digital Image Watermarking using Dis-

crete Wavelet Transform on Color Wa-

termark Images

4.1 Introduction

Previous two chapters (2 and 3) present the image watermarking method for the

protection of color host images by embedding gray-scale images using the DWT

and SPT, respectively. Further, the capabilities of GA has been utilized in both

the presented methods to enhance the performance by optimally selecting the

strength factors as discussed in the previous chapters. Finally, it is validates by

the analysis of experimental results that out of both the proposed methods, the

SPT-based method using UCS outperforms among the class. Furthermore, all

the researchers are trying to develop a color image watermarking by embedding

the color watermark images into the color host images, since all the images are

available in the color format. Hence, this chapter introduces a novel DWT-based

color image watermarking method for protection of color images by embedding

the color watermark. Further, this method uses the powerfulness of ABC method

for optimizing the various embedding parameters.

DWT-based image watermarking methods are capable to embed a fairly good

quality of watermark and it can recover the watermark from watermarked image

effectively. The quality and robustness of DWT-based methods depend on the

selection of particular filter bank and decomposition level. Agreste and Andaloro

[58] developed a DWT-based method for any size of image which implants water-

mark data into high-frequency sub-bands of DWT coefficient. This watermarked

data is imperceptible as per HVS directions. Later, Agreste and Andaloro [59]

modified the previous method by changing the filer bank by Daubechies-2 and ob-

Page 80: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

served that it is more robust to geometric, filtering, and StirMark attacks with a

low rate of false alarm. Ghouti et al. [41] selected balanced multi-wavelets for the

data hiding and found that the method is more robust against the standard water-

marking attacks. Vahedi et al. [42] exploited the advantage of symlet-4 filter bank

to increase the quality and robustness of watermarking method as compared to

existing methods. For embedding the watermark, DWT-based methods use three

or higher level decompositions [39, 40, 42]. Vahedi et al. [42] showed that three

level decomposition with all the four sub-spaces namely; approximation, horizon-

tal, vertical, and diagonal along with symlet-4 filter bank provide better results for

image watermarking. Therefore, in this method, DWT has been used with three

level of decomposition and symlet-4 filter bank for embedding the watermark.

Moreover, to increase the quality and robustness of watermarking methods,

researchers also used many optimization methods like GA, PSO, ABC, differential

evolution (DE), etc. [42, 55, 78, 81, 82]. PSO and GA have been used by Vahedi

et al. [42, 80] to calculate the optimized strength of watermark which improves

the robustness of existing methods. Therefore, in this chapter, the strength factor

of the proposed method has been optimized using three optimization function

namely; GA, ABC, and DE and their performance are compared.

Initially, image watermarking methods hide the watermark message into gray

scale or color host image in the form of bits or bit stream, and later these digital

bit streams are replaced by some pictorial shape like image [39, 40]. Generally,

various watermarking methods embed the gray scale or binary image watermark

while very few work has been reported for color watermark [96, 97, 98], though

most multimedia images are available in color. Generally, the researchers used

RGB, Y CbCr, YIQ, HSI, HSV, etc. color space models for both watermarks and

host images in their digital watermarking method. Golea et al. [97] proposed

the SVD-based RGB color image watermarking for embedding the color RGB

watermark into the RGB host image. Recently, Su et al. [98] presented QR

decomposition method for embedding the RGB color watermark into RGB host

image. In his paper, they concluded that the proposed method is robust against

the attacks such as compression, filtering, cropping, etc. The above mentioned

color models are correlated i.e. the image components are not independent and

change in one component may affect the other components of the image. This

imposes the constraints for the researchers to use only one color component at a

time for embedding the watermark data. However, there exist some uncorrelated

color models such as Lab, Lαβ, etc. [43, 102, 104] which may be used in color image

watermarking to increase the robustness and quality by using all the color image

components of host and watermark images. Chou and Wu [96] embedded the color

58

Page 81: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

watermark in Lab color space using less computationally complex spatial-domain

color image watermarking method. However, the robustness of this method is

poor.

Therefore, due to the limitations of correlated color spaces, rare use of colored

watermark images, and powerfulness of DWT, this chapter proposes a novel DWT-

based color image watermarking method using UCS. Further, ABC has been used

to optimize the strength factor of the proposed watermarking method.

Rest of the chapter is organized as follows. Section 4.2 and 4.3 describes the

working of ABC and DE methods respectively, used in this method. GA, DWT,

and UCS are already been described in Section 2.2 of Chapter 2. The proposed

method is presented in Section 4.4. Section 4.5 describes the method validation

parameters and experimental results are discussed in Section 4.6. Finally, Section

4.7 concludes the chapter.

4.2 Artificial Bee Colony (ABC) Method

ABC [82] is a newly developed swarm intelligence-based method which is inspired

by the intelligent food foraging behavior of honey bees. Similar to the other

population-based methods, ABC solution search process is an iterative process.

After, initialization of the ABC parameters and swarm, it requires the repetitive

iteration of the three phases namely; employed bee phase, onlooker bee phase,

and scout bee phase. The initialization of the swarm and details of each phase are

described in the following sections.

Initialization of the Swarm

The parameters for ABC are the number of food sources, number trials after which

a food source is considered to be abandoned, and termination criteria. In the basic

ABC, the number of food sources is equal to the employed bees or onlooker bees.

Initially, a uniformly distributed initial swarm of SN food sources, where each

food source xi(i = 1, 2, ..., SN) is a D-dimensional vector, are generated. Here

D is the number of variables in the optimization problem and xi represent the

ith food source in the swarm. Each food source is generated as mentioned in Eq.

(4.1) [82].

xij = xminj + rand[0, 1](xmaxj − xminj) (4.1)

here, xminj and xmaxj are bound of xi in jth direction and rand[0, 1] is a uniformly

distributed random number in the range [0, 1].

59

Page 82: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Employed Bee Phase

In employed bee phase, employed bees modify the current solution (food source)

based on the information of individual experience and the fitness value of the new

solution. If the fitness value of the new solution is higher than that of the old

solution, the bee updates her position with the new one and discards the old one.

The position update equation for ith candidate in this phase is presented in Eq.

(4.2) [82].

vij = xij + φij(xij − xkj) (4.2)

here, k ∈ {1, 2, ..., SN} and j ∈ {1, 2, ..., D} are randomly chosen indices. k must

be different from i. φij is a random number between [−1, 1].

Onlooker Bees Phase

After completion of the employed bees phase, the onlooker bees phase starts.

In onlooker bees phase, all the employed bees share the new fitness information

(nectar) of the new solutions (food sources) and their position information with

the onlooker bees in the hive. Onlooker bees analyze the available information and

select a solution with a probability, probi, related to its fitness. The probability

probi may be calculated using Eq. (4.3) [82].

probi =fitnessi∑SNi=1 fitnessi

(4.3)

here, fitnessi is the fitness value of the solution i. As in the case of the employed

bee, it produces a modification on the position in its memory and checks the fitness

of the candidate source. If the fitness is higher than that of the previous one, the

bee memorizes the new position and forgets the old one.

Scout Bees Phase

If the position of a food source is not updated up to predetermined number of

cycles, then the food source is assumed to be abandoned and scout bees phase

starts. In this phase, the bee associated with the abandoned food source becomes

scout bee and the food source is replaced by a randomly chosen food source within

the search space. In ABC, predetermined number of cycles is a crucial control

parameter which is called limit for abandonment. Assume that the abandoned

source is xi. The scout bee replaces this food source by a randomly chosen food

60

Page 83: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

source which is generated as given in Eq. (4.4) [82].

xji = xjmin + rand[0, 1](xjmax − xjmin), for j ∈ {1, 2, ..., D} (4.4)

here, xminj and xmaxj are bound of xi in jth direction. The pseudo-code of the

ABC is shown in Algorithm 4.1 [82]. In this method, ABC is being used to

optimize the watermarking parameters for increasing the quality and robustness

of the proposed method.

Algorithm 4.1 Artificial Bee Colony Algorithm

Initialize the parameters;while Termination criteria is not satisfied do

1. Employed bee phase for generating new food sources.2. Onlooker bees phase for updating the food sources depending on their nectar

amounts.3. Scout bee phase for discovering the new food sources in place of abandoned

food sources.4. Memorize the best food source found so far.5. If a termination criteria is not satisfied, go to step 1; otherwise output the best

solution found so far.end while

4.3 Differential Evolution (DE) Algorithm

DE algorithm is relatively a simple, fast, and population-based stochastic search

method [114] which falls under the category of Evolutionary Algorithms (EAs).

However, it differs significantly from EAs, e.g. in EAs, crossover is applied first

to generate a trial vector, which is then used within the mutation operation to

produce one offspring while, in DE, crossover follows the mutation operator [115].

DE has several methods of selecting the target vector, number of difference vec-

tors, and the type of crossover [114]. This paper uses DE/rand/1/bin scheme in

which DE stands for differential evolution, ‘rand’ specifies that the target vector

is selected randomly, ‘1’ is for number of differential vectors, and ‘bin’ notation is

for binomial crossover. The popularity of DE is due to its applicability to a wider

class of problems and ease of implementation. The detailed description of DE is

as follows:

Like other population-based search methods, DE also searches the solution

using a population of potential solutions (individuals). In a D-dimensional search

space, an individual is represented by a D-dimensional vector (xi1, xi2, ..., xiD)

where i = 1, 2, ..., NP and NP is the population size (number of individuals).

61

Page 84: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

In DE, there are three operators: mutation, crossover, and selection. Initially, a

population is generated randomly with uniform distribution followed by mutation,

crossover, and selection operators to generate a new population. Offspring vector

generation is a crucial step in DE process. The two operators (mutation and

crossover) are used to generate the offspring vectors. The selection operator is

used to select the best vector between offspring and parent for the next generation.

DE operators are explained briefly in the following sections.

Mutation

A trial vector is generated by the DE mutation operator for each individual of

the current population. For generating the trial vector, a target vector is mutated

with a weighted differential. An offspring is produced in the crossover operation

using the newly generated trial vector. If G is the index for generation counter,

the mutation operator for generating a trial vector ui(G) from the parent vector

xi(G) is defined as follows:

• Select a target vector, xi1(G), from the population, such that i �= i1.

• Again, randomly select two individuals, xi2 and xi3 , from the population

such that i �= i1 �= i2 �= i3.

• Then the target vector is mutated for calculating the trial vector as follows:

ui(G) = xi1(G) + F ×Variation Component︷ ︸︸ ︷(xi2(G)− xi3(G))︸ ︷︷ ︸Step size

(4.5)

here F ∈ [0, 1] is the mutation scale factor which is used for controlling the

amplification of the differential variation [115].

Crossover

Offspring x′i(G) is generated using the crossover of parent vector (xi(G)) and the

trial vector (ui(G)) as follows:

x′ij(G) =

⎧⎨⎩uij(G), if j ∈ J

xij(G), otherwise.(4.6)

here J is the set of crossover points or the points that will go under perturbation

and xij(G) is the jth element of the vector xi(G).

62

Page 85: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Different methods may be used to determine the set J of crossover points in

which binomial crossover and exponential crossover are the most frequently used

[115]. In this chapter, the DE and its variants are implemented using binomial

crossover whereas for a D dimensional problem, the crossover points are randomly

selected from the set of possible points, {1, 2, . . . , D}. Algorithm 4.2 shows the

steps of binomial crossover to generate crossover points [115].

Algorithm 4.2 Binomial CrossoverLet CR represents the probability with which the considered crossover points will be included.U(1,D) is a uniformly distributed random integer between 1 and D.J = φj∗ ∼ U(1, D);J ← J ∪ j∗;for each j ∈ 1...D do

if U(0, 1) < CR and j �= j∗ thenJ ← J ∪ j;

end ifend for

Selection

There are two functions for the selection operator: First, it selects the individual

for the mutation operation to generate the trial vector and second, it selects the

best between the parent and the offspring based on their fitness value for the next

generation. If fitness of the parent is greater than the offspring then parent is

selected otherwise offspring is selected:

xi(G+ 1) =

⎧⎨⎩x′i(G), if f(x′i(G)) > f(xi(G)).

xi(G), otherwise.(4.7)

This ensures that the population’s average fitness does not deteriorate. The

Pseudo-code for DE method is described in Algorithm 4.3 [115].

Algorithm 4.3 Differential Evolutionary AlgorithmLet F and CR are the control parameters termed as scale factor and crossover probability respectively.Let P is the population vector.Initialize the control parameters F and CR;Create and initialize the population P (0) of NP individuals;while termination condition do

for each individual xi(G) ∈ P (G) doEvaluate the fitness f(xi(G));Create the trial vector ui(G) by applying the mutation operator;Create an offspring x′i(G) by applying the crossover operator;if f(x′i(G)) is better than f(xi(G)) then

Add x′i(G) to P (G+ 1);else

Add xi(G) to P (G+ 1);end if

end forend whileReturn the fittest individual as the solution.

63

Page 86: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

4.4 Proposed Method

The proposed method explores the advantages of uncorrelated color space over

the correlated color space to improve the performance of watermarking methods

in terms of quality and robustness. It implants the color watermark image into

the color host image by modifying the decomposed wavelet coefficients of host

image. The each channel of color image is embedded in the corresponding channel

of host image to increase the reliability during the recovery process and protect

against the common signal processing attacks. The proposed method consists

of five phases namely; pre-processing of host and watermark image, watermark

embedding, image post-processing, extraction of watermark, and performance im-

provement using GA, ABC, and DE. The basic structural design of the proposed

method is shown in Figure 4.1. Since each color image has three channels, the

structural design and methodology represented in Figure 4.1 are repeated for all

the three channels. The details of each phase of the proposed method is described

in the following sections.

Image Pre-processing

In image pre-processing, both the host RGB color image (H) and watermark image

(W ) are transformed into UCS color space using Eq. (2.8) which produces six

independent image components (three for host and three for watermark) namely;

HU , HC , and HS for host image and WU , WC , and WS for watermark image.

After transformation, each component of watermark image is divided into 16 non-

overlapping sub-areas as shown in Figure 4.2. These sub-areas of watermark image

are then re-arranged or scrambled by some pre-defined sequence or key to introduce

one more level of security and enforced the user to use the key for the extraction

of the image from watermarked image.

Further, third level of decomposition is applied on each component of host im-

age using symlet-4 wavelet function. The resultant third level wavelet coefficients,

(Hk3, k = {LL,HL, LH,HH}) is chosen for embedding process.

Watermark Embedding

After pre-processing of the images, the scrambled watermark is embedded into

the DWT coefficients of host image. The third level decomposition coefficients of

host image are HLL3(x, y), HHL3(x, y), HLH3(x, y), and HHH3(x, y) representing

the approximation, horizontal, vertical, and diagonal details of 3-DWT decom-

posed host image respectively. In order to increase the reliability and robustness

64

Page 87: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Figure 4.1: Structural design of proposed method.

Figure 4.2: Watermark division.

65

Page 88: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

of proposed method against the malicious attacks, it is desired to hide each color

component of the watermark image in corresponding component of host coeffi-

cients. Therefore, approximation details of the third level coefficients are divided

into 16 non-overlapping areas as depicted in Figure 4.3.

Figure 4.3: Partitioning of 3-DWT coefficients.

Now, the scrambled watermark is embedded into approximation details of the

third level decomposed host image coefficients by using Eq. (4.8).

HWk3(x, y) = Hk3(x, y) + α(r)Wp(x, y)

k = {LL,HL, LH,HH}p = {1, 2, 3, ..., 16}r = {1, 2, 3, ..., 16}

(4.8)

here, k represents the sub-areas of host image, p is the intended block of water-

mark, and α denotes the strength of modification done in the host coefficients.

Post-processing

After embedding all the color channels of UCS watermark image into correspond-

ing DWT host image coefficients, inverse DWT (IDWT) is taken for watermarked

host image coefficients which returns watermarked image in UCS color space. Fi-

nally, UCS watermarked image is reconverted into RGB color space.

Watermark Extraction

The watermark extraction process requires watermarked image and pre-defined

key. To extract the watermark, RGB watermarked image is transformed into UCS

color space and then 3-DWT decomposition using symlet-4 wavelet filter bank on

66

Page 89: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

each channel is applied. To gather the fraction watermarked image, a reverse

process of embedding ia applied as shown in Figure 4.1 and using Eq. (4.9).

Finally, the scrambled watermark image is rearranged to its original sequence.

Wp(x, y) =Hk3(x,y)−HWk3

(x,y)

α(r)

k = {LL,HL, LH,HH}p = {1, 2, 3, ..., 16}r = {1, 2, 3, ..., 16}

(4.9)

Performance Improvement using Optimization Methods

The watermarked image HWk3 is subjected to various watermarking attacks which

degrade the performance of watermarking methods. The design of the apposite

attacks are as important as to design a method for protection of multimedia con-

tents because they require to test the robustness and security of the newly design

methods for protection of multimedia contents. There are mainly two parame-

ters namely quality and robustness which must be maximized for a watermarking

method, but these parameters are inversely related with each other i.e. if qual-

ity increases, robustness suffers and vice-versa. In this method, optimum values

of these parameters are dependent on the suitable values of strength factor (α).

Therefore, this method uses three optimization methods namely; GA, ABC, and

DE for selecting the values of α which optimizes the quality and robustness in

terms of fitness function. The results of all the considered optimization methods

have been compared and analyzed.

There are 16 strength factors used in this chapter which become the dimension

of each individual in ABC/DE/GA method having the population size 50. The

optimized values of these 16 strength factors are calculated by minimizing the

following fitness function which is the modified version of Vahedi et al. [42],

Fitness =100

CPSNR+

100

SSIM+ 2×

90%∑Q=60%

[1−NCjpg(Q)]

+

50%∑Q=10%

[1−NCjpg(Q)] +

5∑i=1

[1−NCfilter(i)]

+3∑i=1

[1−NCscale(i)] +3∑i=1

[1−NCnoise(i)]

+

4∑i=1

[1−NCcrop(i)] + [1−NCrotation]

(4.10)

67

Page 90: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

here, CPSNR is composite peak signal-to-noise ratio, SSIM is structural similarity,

and NC is is normalized correlation calculated for the attacks namely; JPEG com-

pression (10 to 90%), filtering (wiener, mean, median), scaling (0.6 to 1.2 factor),

noise addition (poisson, salt and pepper, gaussian), rotation (10), and cropping

(10 to 40 %). These values are calculated by applying the mentioned attacks on

watermarked image. The setting of the parameters of three optimization methods

depicts in Table 4.1 for this experiment are given:

Table 4.1: Setting of the parameters of three optimization methods namely; GA,ABC, and DE.

GA ABC DE

Population size = 50. Colony size NP = 50. Population size NP = 50.

Crossover rate = 0.6. φij = rand[−1, 1]. The scale factor which controlsthe implication of the differentialvariation F = 0.5.

Crossover type = typically twopoint.

Number of food sources SN =NP/2.

The crossover probability CR =0.9.

Number of generations = 1000. limit = 1000. limit = 1000.

Mutation types = bit flip. The stopping criteria is maxi-mum number of function evalu-ations (which is set to be 500) isreached.

The stopping criteria is set to themaximum number of iterationswhich is 500 for this experiment.

4.5 Method Validation

The results obtained from the proposed method are compared with the methods

of Chou and Wu [96] and Su et al. [98], who also embedded the color watermark

images into the color host images. To compare these methods, quality and robust-

ness parameters are considered. The quality of watermarked image can be assess

by two ways namely; subjective and objective tests. Subjective test is done by

10 humans beings on the scale of 0 (very poor) to 5 (excellent) while objective

test calculates the parameters namely; CPSNR and SSIM. CPSNR measures the

degree of similarity between the original and watermarked image and is calculated

as follows [42]:

CPSNR =10

3

∑s

logM ×N × 2552∑M

m=1

∑Nn=1[H(m,n, s)−HW (m,n, s)]2

(4.11)

SSIM also measures the degree of similarity by including the three aspects of HVS

namely; loss of correlation (c), luminance distortion (l), and contrast distortion

68

Page 91: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

(s). It is formulated as follows [98]:

SSIM = l(H,HW )c(H,HW )s(H,HW ) (4.12)

where,

l(H,HW ) =2μHμHW

+ C1

μ2H + μ2

HW+ C1

(4.13)

c(H,HW ) =2σHσHW

+ C2

σ2H + σ2

HW+ C2

(4.14)

s(H,HW ) =σHHW

+ C3

σHσHW+ C3

(4.15)

here μ and σ are mean and standard deviation respectively while C1, C2, and

C3 are three positive constants used to avoid a null denominator. The values of

CPSNR and SSIM must be maximized for effective quality of watermarked image.

The robustness of watermarking method shows the degree of similarity between

the original watermark image and extracted watermark image after applying the

attacks and is measured by normalized correlation (NC) which is formulated as

shown in Eq.4.16:

NC =1

3

∑s

∑Lm=1

∑Ln=1[W (m,n, s)× W (m,n, s)]∑Lm=1

∑Ln=1W

2(m,n, s)(4.16)

The values of NC lie in the rage of 0 (no similarity) to 1 (similar) and are calculated

for the extracted watermarks without attack and with attacks.

4.6 Experimental Results

To compare the performance of proposed and considered color image watermarking

methods, four popularly used 24-bit RGB color images namely; lena, mandrill,

pepper, and sailboat, each of size 512 × 512, are used as host images which are

shown in Figure 4.4. In this chapter, one RGB color logo (64× 64) and one RGB

color image (64 × 64) namely; RTU logo and aeroplane color image respectively,

are used as watermark images which are shown in Figure 4.5. All the considered

images have been taken from USC-SIPI image database [112] except RTU logo

which is taken from Rajasthan Technical University, Kota, India.

69

Page 92: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

(a) Lena (b) Mandrill (c) Pepper (d) Sailboat

Figure 4.4: RGB host images.

(a) RTU logo (b) Aeroplane

Figure 4.5: RGB watermark images.

In the pre-processing step of the proposed method, each host and watermark

images are converted into UCS color space followed by third level decomposition of

host images and scrambling of watermark images. Figure 4.6 shows the converted

UCS images of host and watermark and third level decomposed lena host image

is represented in Figure 4.7. The watermark image goes through the process of

scrambling. One of the possible scrambled watermark images of RTU logo and

aeroplane are shown in Figure 4.8.

Figure 4.7: Three level decomposed host lena image using DWT.

70

Page 93: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

(a) (b) (c)

(d) (e) (f)

Figure 4.6: UCS host and watermark images (a). Lena, (b). Mandrill, (c).Pepper, (d). Sailboat, (e). RTU Logo, and (f). Aeroplane.

(a) RTU logo (b) Aeroplane

Figure 4.8: Representative scrambled UCS watermark images.

Now, the watermark images are embedded into each of the considered host

images and the resultant watermarked images are shown in Figure 4.9.

To compare the objective test for quality measures of resultant watermarked

images using proposed and considered methods, CPSNR and SSIM performance

parameters are calculated and shown in Table 4.2. From Table 4.2, it is validated

that all the methods including proposed method maintain the quality of the wa-

termarked image in terms of CPSNR (> 35dB) and SSIM (> 0.96). However,

the proposed method shows lower values of CPSNR and SSIM as compared to

other considered methods due to the hiding of complete watermark into all three

channels of host image while existing methods hide in only one channel of host

image. Moreover, subjective test on the resultant watermarked images is per-

formed and presented in Table 4.3. The results of subjective test show that the

proposed method effectively embeds the watermarks which is imperceptible by

human beings.

71

Page 94: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

(a) (b) (c) (d)

(e) (f) (g) (h)

Figure 4.9: RGB watermarked images embedded by using DE-based proposedmethod (a)-(d) RTU logo and (e)-(h) Aeroplane image

Table 4.2: Comparison of CPSNR and SSIM values of watermarked imagesresultant from proposed and considered methods.

S.No. QualityParameters

Watermarkedimages

Su et al.

[98]Chouand Wu[96]

ProposedMethodusingGA

ProposedMethodusingABC

ProposedMethodusingDE

1. CPSNR Lena 36.57 37.79 35.81 35.92 36.01

Mandrill 36.42 37.71 35.13 35.67 35.89

Pepper 36.61 37.01 35.07 35.23 35.41

Sailboat 36.52 37.32 35.00 35.06 35.21

2. SSIM Lena 0.98 0.98 0.98 0.98 0.98

Mandrill 0.98 0.98 0.97 0.96 0.97

Pepper 0.96 0.97 0.96 0.96 0.96

Sailboat 0.98 0.97 0.97 0.97 0.97

Table 4.3: Average subjective quality comparison of original and watermarkedimages by 10 human beings in the scale of 0 to 5.

Average Score of 10 Human beings

S.No. Watermarkimage

Watermarkedimage

Su et al.

[98]Chouand Wu[96]

ProposedMethodusingGA

ProposedMethodusingABC

ProposedMethodusingDE

1. RTU Logo Lena 5 5 5 5 5

Mandrill 5 5 5 5 5

Pepper 5 5 5 5 5

Sailboat 5 5 5 5 5

2. Aeroplane Lena 5 5 5 5 5

Mandrill 5 5 5 5 5

Pepper 5 5 5 5 5

Sailboat 5 5 5 5 5

72

Page 95: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

To show the effectiveness of the proposed watermarking method, the extracted

watermarks from the watermarked images and their NC values are shown in Figure

4.10 for each of the considered method. From Figure 4.10, it is visualized that the

proposed method and Su et al. [98] have highest NC values (1.0) for all extracted

watermarks and hence outperforms the method of Chou and Wu [96]. The columns

of Figure 4.10 show extracted watermarks from considered watermarked images

and first five rows show the extraction of RTU logo while last five show extraction

of aeroplane image using the proposed and considered methods of watermarking.

The robustness of the proposed method has been tested by applying different

attacks on the watermarked images. In this chapter, attacks have been catego-

rized into two classes namely; common signal processing attacks and geometric

attacks. The considered common signal processing attacks consists of filtering at-

tacks (mean, median, wiener), noise attacks (gaussian, poisson, salt and pepper),

and JPEG compression attacks while rotation, scaling, and cropping are the con-

sidered geometric attacks. The attacks are applied on all the eight watermarked

images embedded with RTU logo and aeroplane images. The comparison of NC

values after applying the common signal processing attacks on watermarked im-

ages embedded with RTU logo are depicted in Table 4.4 while Table 4.5 shows

the NC values for watermarked images embedded with aeroplane image. After

applying the geometric attacks, the measured NC values for both the watermark

images are compared in Table 4.6. From Tables 4.4, 4.5, and 4.6, it is observed

that the robustness of watermarked images embedded with RTU logo have higher

values of NC as compared to aeroplane image due to the coarseness of aeroplane

image. The comparative results show that the proposed method using DE out-

performs other methods for all the considered attacks except JPEG compression

and rotation where the method of Su et al. shows slightly better robustness. The

similar performance of the proposed method can be observed from Figure 4.11 and

Figure 4.12 where the extracted RTU logo and Aeroplane watermarks by proposed

method using DE respectively, for all the considered attacks have been depicted.

Therefore, it is validated from the results that the proposed method using DE

produces high quality and better robust watermarked images and can be utilized

for content authentication to protect the copyrighted images.

4.7 Results and Discussions

This chapter proposes a novel DWT-based color image watermarking method us-

ing UCS. The use of uncorrelated color space increases the effective utilization of

all color channels of host image which is not feasible in correlated color spaces.

73

Page 96: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Used Watermarked Image

Method a. Lena b. Mandrill c. Pepper d. Sailboat

Chou and Wu [96]

(NC) 1.00 0.99 0.99 0.98

Su et al. [98]

(NC) 1.00 1.00 1.00 1.00

Proposed Method using GA

(NC) 1.00 1.00 1.00 1.00

Proposed Method using ABC

(NC) 1.00 1.00 1.00 1.00

Proposed Method using DE

(NC) 1.00 1.00 1.00 1.00

Chou and Wu [96]

(NC) 0.99 0.98 0.99 0.99

Su et al. [98]

(NC) 1.00 1.00 1.00 1.00

Proposed Method using GA

(NC) 1.00 1.00 1.00 1.00

Proposed Method using ABC

(NC) 1.00 1.00 1.00 1.00

Proposed Method using DE

(NC) 1.00 1.00 1.00 1.00

Figure 4.10: Comparison of extracted watermarks by considered and proposedmethods along with their corresponding NC values. Columns shows extractedwatermarks from watermarked image namely (a). Lena, (b). Mandrill, (c).

Pepper, and (d). Sailboat using the considered and proposed methods mentionedin first column. First five rows shows the extraction of RTU logo while last five

shows extraction of aeroplane watermark image.74

Page 97: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Tab

le4.4:

Com

parison

ofrobustnessin

term

sof

NC

values

obtained

afterap

plyingcommon

sign

alprocessingattackson

the

watermarkedim

ageem

bedded

withRTU

logo

S.N

o.

Attacks

lena

Mandril

Pepper

Sailboat

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Using

Using

Using

Using

GA

ABC

DE

GA

ABC

DE

GA

ABC

DE

GA

ABC

DE

1Med

ian

filtering

(3×

3)

0.18

0.73

0.72

0.74

0.75

0.17

0.68

0.67

0.69

0.70

0.18

0.72

0.71

0.73

0.74

0.17

0.70

0.69

0.71

0.72

2Med

ian

filtering

(5×

5)

0.11

0.63

0.62

0.64

0.65

0.10

0.59

0.58

0.60

0.60

0.11

0.62

0.61

0.63

0.64

0.11

0.60

0.60

0.62

0.62

3W

iener

filtering

(3×

3)

0.67

0.87

0.86

0.89

0.90

0.62

0.81

0.80

0.83

0.83

0.66

0.85

0.84

0.87

0.88

0.64

0.84

0.83

0.85

0.86

4Mean

filtering(3

×

3)

0.54

0.96

0.95

0.98

0.99

0.50

0.89

0.88

0.91

0.92

0.53

0.94

0.93

0.96

0.97

0.52

0.92

0.91

0.94

0.95

5Mean

filtering(5

×

5)

0.41

0.87

0.86

0.89

0.90

0.38

0.81

0.80

0.83

0.83

0.40

0.85

0.84

0.87

0.88

0.39

0.84

0.83

0.85

0.86

6Gaussian

noise

(0.006)

0.90

0.82

0.81

0.84

0.84

0.84

0.76

0.75

0.78

0.79

0.88

0.80

0.80

0.82

0.83

0.86

0.79

0.78

0.80

0.81

7Poissonnoise

0.86

0.83

0.82

0.85

0.86

0.80

0.77

0.76

0.79

0.80

0.84

0.81

0.81

0.83

0.84

0.83

0.80

0.79

0.81

0.82

8Salt

and

pep

per

noise

0.90

0.91

0.89

0.93

0.94

0.84

0.85

0.84

0.86

0.87

0.88

0.89

0.88

0.91

0.92

0.86

0.87

0.86

0.89

0.90

9JPEG

compression

(10%)

0.14

0.71

0.70

0.69

0.70

0.13

0.66

0.65

0.64

0.65

0.14

0.70

0.69

0.67

0.68

0.13

0.68

0.67

0.66

0.67

10

JPEG

compression

(30%)

0.21

0.88

0.87

0.85

0.86

0.20

0.82

0.81

0.79

0.80

0.21

0.86

0.85

0.84

0.84

0.20

0.84

0.84

0.82

0.83

11

JPEG

compression

(60%)

0.34

0.90

0.83

0.87

0.88

0.32

0.84

0.83

0.81

0.82

0.33

0.88

0.87

0.86

0.86

0.33

0.86

0.86

0.84

0.85

12

JPEG

compression

(90%)

0.44

0.93

0.92

0.90

0.91

0.41

0.86

0.86

0.84

0.85

0.43

0.91

0.90

0.88

0.89

0.42

0.89

0.88

0.87

0.87

75

Page 98: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Tab

le4.5:

Com

parison

ofrobustnessin

term

sof

NC

values

obtained

afterap

plyingcommon

sign

alprocessingattackson

the

watermarkedim

ageem

bedded

withAerop

laneim

age.

S.N

o.

Attacks

lena

Mandril

Pepper

Sailboat

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Using

Using

Using

Using

GA

ABC

DE

GA

ABC

DE

GA

ABC

DE

GA

ABC

DE

1Med

ian

filtering

(3×

3)

0.13

0.71

0.70

0.72

0.73

0.12

0.66

0.65

0.67

0.68

0.13

0.70

0.69

0.71

0.72

0.12

0.68

0.67

0.70

0.70

2Med

ian

filtering

(5×

5)

0.06

0.62

0.61

0.63

0.64

0.06

0.58

0.57

0.59

0.59

0.06

0.61

0.60

0.62

0.63

0.06

0.60

0.59

0.61

0.61

3W

iener

filtering

(3×

3)

0.51

0.83

0.82

0.85

0.86

0.47

0.77

0.76

0.79

0.80

0.50

0.81

0.81

0.83

0.84

0.49

0.80

0.79

0.81

0.82

4Mean

filtering(3

×

3)

0.42

0.95

0.94

0.97

0.98

0.39

0.88

0.87

0.90

0.91

0.41

0.93

0.92

0.95

0.96

0.40

0.91

0.90

0.93

0.94

5Mean

filtering(5

×

5)

0.3

0.87

0.86

0.89

0.90

0.28

0.81

0.80

0.83

0.83

0.29

0.85

0.84

0.87

0.88

0.29

0.84

0.83

0.85

0.86

6Gaussian

noise

(0.006)

0.81

0.83

0.82

0.85

0.86

0.75

0.77

0.76

0.79

0.80

0.79

0.81

0.81

0.83

0.84

0.78

0.80

0.79

0.81

0.82

7Poissonnoise

0.7

0.81

0.80

0.83

0.83

0.65

0.75

0.75

0.77

0.78

0.69

0.79

0.79

0.81

0.82

0.67

0.78

0.77

0.79

0.80

8Salt

and

pep

per

noise

0.82

0.84

0.83

0.86

0.87

0.76

0.78

0.77

0.80

0.80

0.80

0.82

0.81

0.84

0.85

0.79

0.81

0.80

0.82

0.83

9JPEG

compression

(10%)

0.11

0.69

0.68

0.67

0.68

0.10

0.64

0.64

0.62

0.63

0.11

0.68

0.67

0.66

0.66

0.11

0.66

0.66

0.64

0.65

10

JPEG

compression

(30%)

0.16

0.86

0.85

0.83

0.84

0.15

0.80

0.79

0.78

0.78

0.16

0.84

0.83

0.82

0.83

0.15

0.83

0.82

0.80

0.81

11

JPEG

compression

(60%)

0.27

0.89

0.88

0.86

0.87

0.25

0.83

0.82

0.80

0.81

0.26

0.87

0.86

0.85

0.85

0.26

0.85

0.85

0.83

0.84

12

JPEG

compression

(90%)

0.4

0.91

0.90

0.88

0.89

0.37

0.85

0.84

0.82

0.83

0.39

0.89

0.88

0.87

0.87

0.38

0.87

0.86

0.85

0.86

76

Page 99: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Tab

le4.6:

Com

parison

ofrobustnessin

term

sof

NC

values

obtained

afterap

plyinggeom

etricattackson

thewatermarkedim

ages.

S.N

o.

Attacks

lena

Mandril

Pepper

Sailboat

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

Propose

dM

eth

od

Using

Using

Using

Using

GA

ABC

DE

GA

ABC

DE

GA

ABC

DE

GA

ABC

DE

ForRTU

Logo

Wate

rm

ark

Image

1Rotation(1

0)

0.86

0.93

0.92

0.91

0.92

0.80

0.86

0.86

0.85

0.86

0.84

0.91

0.90

0.90

0.91

0.83

0.89

0.88

0.87

0.88

2Scaling(0.6)

0.54

0.95

0.94

0.97

0.98

0.50

0.88

0.87

0.90

0.91

0.53

0.93

0.92

0.95

0.96

0.52

0.91

0.90

0.93

0.94

3Scaling(0.9)

0.63

0.97

0.96

0.99

1.00

0.59

0.90

0.89

0.92

0.93

0.62

0.95

0.94

0.97

0.98

0.60

0.93

0.92

0.95

0.96

4Scaling(1.2)

0.72

0.99

0.98

0.99

1.00

0.67

0.92

0.91

0.99

1.00

0.71

0.97

0.96

0.99

1.00

0.69

0.95

0.94

0.99

1.00

5Cropping(10%)

0.91

0.93

0.92

0.95

0.96

0.85

0.86

0.86

0.88

0.89

0.89

0.91

0.90

0.93

0.94

0.87

0.89

0.88

0.91

0.92

6Cropping(20%)

0.81

0.82

0.81

0.84

0.84

0.75

0.76

0.75

0.78

0.79

0.79

0.80

0.80

0.82

0.83

0.78

0.79

0.78

0.80

0.81

7Cropping(30%)

0.70

0.72

0.71

0.73

0.74

0.65

0.67

0.66

0.68

0.69

0.69

0.71

0.70

0.72

0.73

0.67

0.69

0.68

0.71

0.71

8Cropping(40%)

0.55

0.60

0.59

0.61

0.62

0.51

0.56

0.55

0.57

0.57

0.54

0.59

0.58

0.60

0.61

0.53

0.58

0.57

0.59

0.59

ForAeroplaneW

ate

rm

ark

Image

1Rotation(1

0)

0.73

0.9

0.89

0.88

0.89

0.68

0.84

0.83

0.82

0.83

0.72

0.88

0.87

0.85

0.86

0.70

0.86

0.86

0.83

0.84

2Scaling(0.6)

0.5

0.94

0.93

0.96

0.97

0.47

0.87

0.87

0.89

0.90

0.49

0.92

0.91

0.94

0.95

0.48

0.90

0.89

0.92

0.93

3Scaling(0.9)

0.59

0.97

0.96

0.99

1.00

0.55

0.90

0.89

0.92

0.93

0.58

0.95

0.94

0.97

0.98

0.57

0.93

0.92

0.95

0.96

4Scaling(1.2)

0.67

0.99

0.98

0.99

1.00

0.62

0.92

0.91

0.99

1.00

0.66

0.97

0.96

0.99

1.00

0.64

0.95

0.94

0.99

1.00

5Cropping(10%)

0.86

0.91

0.90

0.93

0.94

0.80

0.85

0.84

0.86

0.87

0.84

0.89

0.88

0.91

0.92

0.83

0.87

0.86

0.89

0.90

6Cropping(20%)

0.76

0.79

0.78

0.81

0.81

0.71

0.73

0.73

0.75

0.76

0.74

0.77

0.77

0.79

0.80

0.73

0.76

0.75

0.77

0.78

7Cropping(30%)

0.62

0.67

0.66

0.68

0.69

0.58

0.62

0.62

0.64

0.64

0.61

0.66

0.65

0.67

0.68

0.60

0.64

0.64

0.66

0.66

8Cropping(40%)

0.43

0.61

0.60

0.62

0.63

0.40

0.57

0.56

0.58

0.58

0.42

0.60

0.59

0.61

0.62

0.41

0.59

0.58

0.60

0.60

77

Page 100: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Extracted RTU logo Watermark Image After Attacks

Median (3x3) Median (5x5) Wiener (3x3) Mean (3x3)

Mean (5x5) Gaussian (0.006) Poisson Salt & Pepper

JPEG (10%) JPEG (30%) JPEG (60%) JPEG (90%)

Rotation (10) Scaling (0.6) Scaling (0.9) Scaling (1.2)

Cropping (10%) Cropping (20%) Cropping (30%) Cropping (40%)

Figure 4.11: Extracted RTU logo watermarks by proposed method using DEafter applying considered attacks.

78

Page 101: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Extracted Aeroplane Watermark Image After Attacks

Median (3x3) Median (5x5) Wiener (3x3) Mean (3x3)

Mean (5x5) Gaussian (0.006) Poisson Salt & Pepper

JPEG (10%) JPEG (30%) JPEG (60%) JPEG (90%)

Rotation (10) Scaling (0.6) Scaling (0.9) Scaling (1.2)

Cropping (10%) Cropping (20%) Cropping (30%) Cropping (40%)

Figure 4.12: Extracted Aeroplane watermarks by proposed method using DEafter applying considered attacks.

79

Page 102: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Moreover, different optimization methods are used for optimizing the strength

factors to improve the quality and robustness of the proposed method. The per-

formance of the proposed methods have been measured in terms of quality and

robustness against different signal processing attacks and results are compared

with the work of Chou and Wu [96] and Su et al. [98]. The results validate that

the proposed method using DE is better than other methods for all the considered

parameters except slight decay in JPEG compression and rotation attacks as com-

pared to Su et al. [98]. Therefore, it is concluded that the proposed method using

DE has high quality and robust results and can further be used for protection of

the copyrighted images.

The next chapter introduces SPT-based watermarking method for color wa-

termark images.

80

Page 103: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Chapter 5

Digital Image Watermarking using Steer-

able Pyramid Transform on Color Water-

mark Images

5.1 Introduction

Previous chapter presented the DWT-based image watermarking method for pro-

tecting the color images against illegal uses by embedding the color watermark.

Further, optimization methods have been used to improve the performance. In

Chapter 3, the SPT-based image watermarking method has been proposed for

protecting the color images against illegal uses by embedding the gray-scale wa-

termark. Moreover, analysis of the results show that the SPT-based method out-

performs as compared to DWT. Therefore, this chapter proposes a method for

the protection of color images using SPT by embedding color watermark images.

Since, from the results of previous chapter, it is validated that DE outperforms

other optimization function, hence in this chapter, the DE has been used to opti-

mized the strength factors.

Rest of the chapter is organized as follows. Section 5.2 describes the proposed

method. The method validation parameters and experimental results are discussed

in Section 5.3 and 5.4 respectively. Finally, Section 5.5 concludes the chapter.

5.2 Proposed Method

The proposed method explores the advantages of uncorrelated color space over

the correlated color space to improve the performance of watermarking methods

in terms of quality and robustness. It implants the color watermark image into

the color host image by modifying the decomposed SPT coefficients of host im-

age. Each channel of color image is embedded in the corresponding channel of

Page 104: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

host image to increase the reliability during the recovery process and to protect

against the common signal processing attacks. The proposed method consists

of five phases namely; pre-processing of host and watermark image, watermark

embedding, image post-processing, extraction of watermark, and performance im-

provement using DE. The basic structural design of the proposed method is shown

in Figure 5.1. The details of each phase of the proposed method are described in

the following sections.

Image Pre-processing

In image pre-processing, both the host RGB color image (H) and watermark

image (W ) are transformed into UCS color space using Eq. (2.8) which pro-

duces six independent image components (three for host and three for watermark)

namely; HU , HC , and HS for host image and WU , WC , and WS for watermark im-

age. After transformation, each component of watermark image is divided into 16

non-overlapping sub-areas as shown in Figure 5.2. These sub-areas of watermark

image are then re-arranged or scrambled by some pre-defined sequence or key to

introduce one more level of security and enforced the user to use the key for the

extraction of the image from watermarked image. The pre-defined sequence or

key has 16 values (1-16) which are generated randomly. The watermark image is

scrambled according to this randomly generated sequence. One of the scrambled

pattern is shown in Image Preprocessing block of Figure 5.1. The above generated

pattern is stored for extraction phase. Further, third level of steerable pyramid

transformation decomposition is applied on each component of host image. The

resultant coefficients (Hk3, k = {1, 2, 3, ..., 16}) is chosen for embedding process.

Watermark Embedding

After pre-processing of the images, the scrambled watermark is embedded into the

SPT coefficients of host image. In order to increase the reliability and robustness

of proposed method against the malicious attacks, it is desired to hide each color

component of the watermark image in corresponding component of host coeffi-

cients. Now, the scrambled watermark is embedded into approximation details of

the third level decomposed host image coefficients by using Eq. (5.1).

HWk3(x, y) = Hk3(x, y) + α(r)Wp(x, y)

k = {1, 2, 3, ..., 16}p = {1, 2, 3, ..., 16}r = {1, 2, 3, ..., 16}

(5.1)

82

Page 105: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Figure 5.1: Structural design of proposed method.

here, k represents the sub-areas of host image, p is the intended block of water-

mark, and α denotes the strength of modification done in the host coefficients.

Post-processing

After embedding all the color channels of UCS watermark image into correspond-

ing SPT host image coefficients, inverse SPT (ISPT) is taken for watermarked host

83

Page 106: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Figure 5.2: Watermark division.

image coefficients which returns watermarked image in UCS color space. Finally,

UCS watermarked image is reconverted into RGB color space.

Watermark Extraction

The watermark extraction process requires watermarked image and pre-defined

key. To extract the watermark, RGB watermarked image is transformed into UCS

color space and then SPT decomposition on each channel is applied. To recover the

watermarked image, a reverse process of embedding is applied as shown in Figure

5.1 by using Eq. (5.2). Finally, the scrambled watermark image is rearranged to

its original sequence.

Wp(x, y) =Hk3(x,y)−HWk3

(x,y)

α(r)

k = {1, 2, 3, ..., 16}p = {1, 2, 3, ..., 16}r = {1, 2, 3, ..., 16}

(5.2)

Performance Improvement using DE

The watermarked image is subjected to various watermarking attacks which de-

grade the performance of watermarking methods. The design of the apposite at-

tacks are as important as to design a method for protection of multimedia contents

because they are required to test the robustness and security of the newly design

methods for protection of multimedia contents. There are mainly two parame-

ters namely; quality and robustness which must be maximized for a watermarking

method, but these parameters are inversely related with each other i.e. if qual-

ity increases, robustness suffers and vice-versa. In this method, optimum values

of these parameters are dependent on the suitable values of strength factor (α).

Therefore, this chapter uses DE optimization method for selecting the values of α

which optimizes the quality and robustness in terms of fitness function.

84

Page 107: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

This method uses following settings of DE parameters:

• The crossover probability CR = 0.9.

• The scale factor which controls the implication of the differential variation

F = 0.5.

• Population size NP = 50.

• The stopping criteria is set to the maximum number of iterations which is

500 for this experiment.

There are 16 strength factors used in this method which become the dimension

of each individual in DE method. The optimized values of these 16 strength factors

are calculated by minimizing the following fitness function :

Fitness =100

CPSNR+

100

SSIM+ 2×

90%∑Q=60%

[1−NCjpg(Q)]

+50%∑

Q=10%

[1−NCjpg(Q)] +5∑i=1

[1−NCfilter(i)]

+

3∑i=1

[1−NCscale(i)] +

3∑i=1

[1−NCnoise(i)]

+

4∑i=1

[1−NCcrop(i)] + [1−NCrotation]

(5.3)

here, CPSNR is composite peak signal-to-noise ratio, SSIM is structural similarity,

and NC is normalized correlation calculated for the attacks namely; JPEG com-

pression (10 to 90%), filtering (wiener, mean, median), scaling (0.6 to 1.2 factor),

noise addition (poisson, salt and pepper, gaussian), rotation (10), and cropping

(10 to 40 %). These values are calculated by applying the mentioned attacks on

watermarked image.

5.3 Method Validation

The results obtained from the proposed method are compared with the methods

of Chou and Wu [96] and Su et al. [98] who also embedded the color watermark

images into the color host images. To compare these methods, quality and ro-

bustness parameters are considered. The quality of watermarked image can be

assess by two ways namely subjective and objective tests. Subjective test is done

by 10 humans beings on the scale of 0 (very poor) to 5 (excellent) while objective

85

Page 108: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

test calculates the parameters namely CPSNR and SSIM. CPSNR measures the

degree of similarity between the original and watermarked image and is calculated

as follows [42]:

CPSNR =10

3

∑s

logM ×N × 2552∑M

m=1

∑Nn=1[H(m,n, s)−HW (m,n, s)]2

(5.4)

SSIM also measures the degree of similarity by including the three aspects of HVS

namely loss of correlation (c), luminance distortion (l), and contrast distortion (s).

It is formulated as follows [98]:

SSIM = l(H,HW )c(H,HW )s(H,HW ) (5.5)

where,

l(H,HW ) =2μHμHW

+ C1

μ2H + μ2

HW+ C1

(5.6)

c(H,HW ) =2σHσHW

+ C2

σ2H + σ2

HW+ C2

(5.7)

s(H,HW ) =σHHW

+ C3

σHσHW+ C3

(5.8)

here μ and σ are mean and standard deviation respectively while C1, C2, and

C3 are three positive constants used to avoid a null denominator. The values of

CPSNR and SSIM must be maximized for effective quality of watermarked image.

The robustness of watermarking method shows the degree of similarity between

the original watermark image and extracted watermark image after applying the

attacks and is measured by NC which is formulated as shown in Eq.5.9:

NC =1

3

∑s

∑Lm=1

∑Ln=1[W (m,n, s)× W (m,n, s)]∑Lm=1

∑Ln=1W

2(m,n, s)(5.9)

The value of NC lies in the rage of 0 (no similarity) to 1 (similar) and is calculated

for the extracted watermark without attack and with attacks namely; JPEG com-

pression (10 to 90%), filtering (wiener, mean, median), scaling (0.6 to 1.2 factor),

noise addition (poisson, salt and pepper, gaussian), rotation (10), and cropping

(10 to 40 %).

86

Page 109: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

5.4 Experimental Results

To compare the performance of proposed and considered color image watermarking

methods, four popularly used 24-bit RGB color images namely; lena, mandrill,

pepper, and sailboat each of size 512 × 512 are used as host images which are

shown in Figure 5.3. In this chapter, one 24-bit RGB color logo and one RGB

color image namely; RTU logo and aeroplane color image respectively each of size

64 × 64 are used as watermark images which are shown in Figure 5.4. All the

considered images have been taken from USC-SIPI image database [112] except

RTU logo which is taken from Rajasthan Technical University, Kota, India.

(a) Lena (b) Mandrill (c) Pepper (d) Sailboat

Figure 5.3: RGB host images.

(a) RTU logo (b) Aeroplane

Figure 5.4: RGB watermark images.

In the pre-processing step of the proposed method, each host and watermark

images are converted into UCS color space followed by SPT decomposition of host

images and scrambling of watermark images. Figure 5.5 shows the converted UCS

images of host and watermark. The watermark image goes through the process

of scrambling. One of the possible scrambled watermark images of RTU logo and

aeroplane are shown in Figure 5.6. Now, the watermark images are embedded

into each of the considered host images and the resultant watermarked images are

shown in Figure 5.7.

A comparison of fitness values before and after optimization for 30 runs has

been depicted in Figure 5.8 which shows that the use of DE enhances the fitness

function value.

87

Page 110: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

(a) (b) (c)

(d) (e) (f)

Figure 5.5: UCS host and watermark images (a). Lena, (b). Mandrill, (c).Pepper, (d). Sailboat, (e). RTU Logo, and (f). Aeroplane.

(a) RTU logo (b) Aeroplane

Figure 5.6: Representative scrambled UCS watermark images.

The performance of the proposed method is compared with method proposed

in the chapter 4, in which DWT and DE have been used to increases the quality

and robustness of image watermarking method. To compare the objective test for

quality measures of resultant watermarked images using proposed and considered

methods, CPSNR and SSIM performance parameters are calculated and depicted

in Table 5.1. From Table 5.1 it is validated that all the methods including proposed

method maintain the quality of the watermarked image in terms of CPSNR (>

35dB) and SSIM (> 0.95). However, the proposed method shows lower values of

CPSNR and SSIM as compared to other considered methods due to the hiding

of complete watermark into all the three channels of host image, while existing

methods hide in only one channel of the host image. Further, the results using

SPT is more promising than DWT-based method. Moreover, subjective test on

the resultant watermarked images is performed and presented in Table 5.2. The

results of subjective test show that the proposed method effectively embeds the

88

Page 111: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

(a) (b) (c) (d)

(e) (f) (g) (h)

Figure 5.7: RGB watermarked images embedded by (a)-(d) RTU logo and(e)-(h) Aeroplane image

Figure 5.8: A comparison of before and after optimization of fitness values for 30runs.

watermarks which is imperceptible by human beings.

To show the effectiveness of the proposed watermarking method, the extracted

watermarks from the watermarked images and their NC values are shown in Figure

5.9 for each of the considered method. From Figure 5.9, it is visualized that the

proposed method using UCS color space and Su et al. [98] have highest NC values

(1.0) for all extracted watermarks and hence outperforms the method of Chou and

Wu [96]. The columns of Figure 5.9 show extracted watermarks from considered

watermarked images and first four rows shows the extraction of RTU logo while

last four shows extraction of aeroplane image using the proposed and considered

89

Page 112: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Table 5.1: Comparison of CPSNR and SSIM values of watermarked imagesresultant from proposed and considered methods.

S.No. QualityParameters

Watermarkedimages

Su et al.

[98]Chou andWu [96]

DWT-basedProposedMethod

SPT-basedProposedMethod

1. CPSNR Lena 36.94 38.17 36.01 36.28

Mandrill 36.78 38.09 35.89 36.03

Pepper 36.98 37.38 35.41 35.58

Sailboat 36.89 37.69 35.21 35.41

2. SSIM Lena 0.98 0.97 0.98 0.98

Mandrill 0.97 0.96 0.97 0.96

Pepper 0.97 0.97 0.96 0.96

Sailboat 0.97 0.97 0.97 0.97

Table 5.2: Average subjective quality comparison of original and watermarkedimages by 10 human beings in the scale of 0 to 5.

Average Score of 10 Human beings

S.No. Watermarkimage

Watermarkedimage

Su et al.

[98]Chou andWu [96]

DWT-basedProposedMethod

SPT-basedProposedMethod

1. RTU Logo Lena 5 5 5 5

Mandrill 5 5 5 5

Pepper 5 5 5 5

Sailboat 5 5 5 5

2. Aeroplane Lena 5 5 5 5

Mandrill 5 5 5 5

Pepper 5 5 5 5

Sailboat 5 5 5 5

methods of watermarking.

The robustness of the proposed method has been tested by applying different

attacks on the watermarked images. In this chapter, attacks have been catego-

rized into two classes namely; common signal processing attacks and geometric

attacks. The considered common signal processing attacks consists of filtering at-

tacks (mean, median, wiener), noise attacks (gaussian, poisson, salt and pepper),

and JPEG compression attacks while rotation, scaling, and cropping are the con-

sidered geometric attacks. The attacks are applied on all the eight watermarked

images embedded with RTU logo and aeroplane images. The comparison of NC

values after applying the common signal processing attacks on watermarked im-

ages embedded with RTU logo are depicted in Table 5.3 while Table 5.4 shows

the NC values for watermarked images embedded with aeroplane image by all

considered methods and proposed method. After applying the geometric attacks,

the measured NC values for both the watermark images are compared in Table

5.5. From Tables 5.3 – 5.5, it is observed that the robustness of watermarked

images embedded with RTU logo have higher values of NC as compared to aero-

90

Page 113: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Used Watermarked ImageMethod a. Lena b. Mandrill c. Pepper d. Sailboat

Chou and Wu [96]

(NC) 0.98 0.99 0.99 0.98

Su et al. [98]

(NC) 1.00 1.00 1.00 1.00

DWT-based Proposed Method

(NC) 1.00 0.99 1.00 1.00

SPT-based Proposed Method

(NC) 1.00 1.00 1.00 1.00

Chou and Wu [96]

(NC) 0.99 0.98 0.99 0.99

Su et al. [98]

(NC) 1.00 1.00 1.00 1.00

DWT-based Proposed Method

(NC) 1.00 0.99 1.00 0.99

SPT-based Proposed Method

(NC) 1.00 1.00 1.00 1.00

Figure 5.9: Comparison of extracted watermarks by considered and proposedmethods along with their corresponding NC values. Columns shows extractedwatermarks from watermarked image namely (a). Lena, (b). Mandrill, (c).

Pepper, and (d). Sailboat using the considered and proposed methods mentionedin first column. First four rows shows the extraction of RTU logo while last four

shows extraction of aeroplane watermark image.

91

Page 114: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Tab

le5.3:

Com

parison

ofrobustnessin

term

sof

NC

values

obtained

afterap

plyingcommon

sign

alprocessingattackson

the

watermarkedim

ageem

bedded

withRTU

logo

lena

Mandrill

Pepper

Sailboat

S.N

o.

Attacks

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

1Med

ian

filtering

(3×

3)

0.18

0.74

0.75

0.76

0.17

0.68

0.70

0.70

0.18

0.72

0.74

0.74

0.17

0.71

0.72

0.73

2Med

ian

filtering

(5×

5)

0.11

0.63

0.65

0.65

0.10

0.59

0.60

0.61

0.11

0.62

0.64

0.64

0.11

0.61

0.62

0.63

3W

iener

filtering

(3×

3)

0.68

0.88

0.90

0.90

0.63

0.82

0.83

0.84

0.66

0.86

0.88

0.88

0.65

0.84

0.86

0.86

4Mean

filtering

(3×

3)

0.54

0.97

0.99

0.99

0.51

0.90

0.92

0.92

0.53

0.95

0.97

0.97

0.52

0.93

0.95

0.95

5Mean

filtering

(5×

5)

0.41

0.88

0.90

0.90

0.38

0.82

0.83

0.84

0.40

0.86

0.88

0.88

0.40

0.84

0.86

0.86

6Gaussian

noise

(0.006)

0.91

0.83

0.84

0.85

0.84

0.77

0.79

0.79

0.89

0.81

0.83

0.83

0.87

0.79

0.81

0.81

7Poissonnoise

0.87

0.84

0.86

0.86

0.81

0.78

0.80

0.80

0.85

0.82

0.84

0.84

0.83

0.80

0.82

0.82

8Salt

and

pep

per

noise

0.91

0.92

0.94

0.94

0.84

0.85

0.87

0.88

0.89

0.90

0.92

0.92

0.87

0.88

0.90

0.90

9JPEG

compres-

sion(10%)

0.14

0.72

0.70

0.70

0.13

0.67

0.65

0.65

0.14

0.70

0.68

0.69

0.14

0.69

0.67

0.67

10

JPEG

compres-

sion(30%)

0.21

0.89

0.86

0.87

0.20

0.82

0.80

0.81

0.21

0.87

0.84

0.85

0.20

0.85

0.83

0.83

11

JPEG

compres-

sion(60%)

0.34

0.91

0.88

0.89

0.32

0.84

0.82

0.82

0.34

0.89

0.86

0.87

0.33

0.87

0.85

0.85

12

JPEG

compres-

sion(90%)

0.44

0.94

0.91

0.92

0.41

0.87

0.85

0.85

0.43

0.92

0.89

0.90

0.43

0.90

0.87

0.88

92

Page 115: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Tab

le5.4:

Com

parison

ofrobustnessin

term

sof

NC

values

obtained

afterap

plyingcommon

sign

alprocessingattackson

the

watermarkedim

ageem

bedded

withAerop

laneim

age.

lena

Mandrill

Pepper

Sailboat

S.N

o.

Attacks

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

1Med

ian

filtering

(3×

3)

0.13

0.72

0.73

0.74

0.12

0.67

0.68

0.68

0.13

0.70

0.72

0.72

0.13

0.69

0.70

0.71

2Med

ian

filtering

(5×

5)

0.06

0.63

0.64

0.64

0.06

0.58

0.59

0.60

0.06

0.61

0.63

0.63

0.06

0.60

0.61

0.62

3W

iener

filtering

(3×

3)

0.51

0.84

0.86

0.86

0.48

0.78

0.80

0.80

0.50

0.82

0.84

0.84

0.49

0.80

0.82

0.82

4Mean

filtering

(3×

3)

0.42

0.96

0.98

0.98

0.39

0.89

0.91

0.91

0.42

0.94

0.96

0.96

0.41

0.92

0.94

0.94

5Mean

filtering

(5×

5)

0.30

0.88

0.90

0.90

0.28

0.82

0.83

0.84

0.30

0.86

0.88

0.88

0.29

0.84

0.86

0.86

6Gaussian

noise

(0.006)

0.82

0.84

0.86

0.86

0.76

0.78

0.80

0.80

0.80

0.82

0.84

0.84

0.78

0.80

0.82

0.82

7Poissonnoise

0.71

0.82

0.83

0.84

0.66

0.76

0.78

0.78

0.69

0.80

0.82

0.82

0.68

0.78

0.80

0.81

8Salt

and

pep

per

noise

0.83

0.85

0.87

0.87

0.77

0.79

0.80

0.81

0.81

0.83

0.85

0.85

0.79

0.81

0.83

0.83

9JPEG

compres-

sion(10%)

0.11

0.70

0.68

0.68

0.10

0.65

0.63

0.63

0.11

0.68

0.66

0.67

0.11

0.67

0.65

0.65

10

JPEG

compres-

sion(30%)

0.16

0.87

0.84

0.85

0.15

0.81

0.78

0.79

0.16

0.85

0.83

0.83

0.15

0.83

0.81

0.81

11

JPEG

compres-

sion(60%)

0.27

0.90

0.87

0.88

0.25

0.83

0.81

0.81

0.27

0.88

0.85

0.86

0.26

0.86

0.84

0.84

12

JPEG

compres-

sion(90%)

0.40

0.92

0.89

0.90

0.38

0.85

0.83

0.83

0.40

0.90

0.87

0.88

0.39

0.88

0.86

0.86

93

Page 116: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Tab

le5.5:

Com

parison

ofrobustnessin

term

sof

NC

values

obtained

afterap

plyinggeom

etricattackson

thewatermarkedim

ages.

lena

Mandrill

Pepper

Sailboat

S.N

o.

Attacks

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

Propose

dM

eth

od

using

UCS

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

Chou

and

Wu

[96]

Su

et

al.

[98]

DW

T-

base

dPro-

pose

dM

eth

od

SPT-

base

dPro-

pose

dM

eth

od

ForRTU

Logo

Wate

rm

ark

Image

1Rotation(1

0)

0.87

0.94

0.92

0.95

0.81

0.87

0.86

0.88

0.85

0.92

0.91

0.93

0.83

0.90

0.88

0.90

2Scaling(0.6)

0.55

0.96

0.98

0.98

0.51

0.89

0.91

0.91

0.53

0.94

0.96

0.96

0.52

0.92

0.94

0.94

3Scaling(0.9)

0.64

0.98

1.00

0.98

0.59

0.91

0.93

0.93

0.62

0.96

0.98

0.98

0.61

0.94

0.96

0.96

4Scaling(1.2)

0.73

0.98

1.00

0.98

0.68

0.93

1.00

0.98

0.71

0.98

1.00

0.98

0.70

0.96

1.00

0.97

5Cropping(10%)

0.92

0.94

0.96

0.96

0.85

0.87

0.89

0.90

0.90

0.92

0.94

0.94

0.88

0.90

0.92

0.92

6Cropping(20%)

0.82

0.83

0.84

0.85

0.76

0.77

0.79

0.79

0.80

0.81

0.83

0.83

0.79

0.80

0.81

0.81

7Cropping(30%)

0.71

0.73

0.74

0.75

0.66

0.68

0.69

0.69

0.69

0.71

0.73

0.73

0.68

0.70

0.71

0.72

8Cropping(40%)

0.56

0.61

0.62

0.62

0.52

0.56

0.57

0.58

0.54

0.59

0.61

0.61

0.53

0.58

0.59

0.60

ForAeroplaneW

ate

rm

ark

Image

1Rotation(1

0)

0.74

0.91

0.89

0.91

0.69

0.85

0.83

0.86

0.72

0.89

0.86

0.89

0.71

0.87

0.84

0.86

2Scaling(0.6)

0.51

0.95

0.97

0.97

0.47

0.88

0.90

0.91

0.49

0.93

0.95

0.95

0.48

0.91

0.93

0.93

3Scaling(0.9)

0.60

0.98

1.00

0.98

0.55

0.91

0.93

0.93

0.58

0.96

0.98

0.98

0.57

0.94

0.96

0.96

4Scaling(1.2)

0.68

0.98

1.00

0.98

0.63

0.93

1.00

0.98

0.66

0.98

1.00

0.98

0.65

0.96

1.00

0.97

5Cropping(10%)

0.87

0.92

0.94

0.94

0.81

0.85

0.87

0.88

0.85

0.90

0.92

0.92

0.83

0.88

0.90

0.90

6Cropping(20%)

0.77

0.80

0.81

0.82

0.71

0.74

0.76

0.76

0.75

0.78

0.80

0.80

0.74

0.77

0.78

0.79

7Cropping(30%)

0.63

0.68

0.69

0.69

0.58

0.63

0.64

0.65

0.61

0.66

0.68

0.68

0.60

0.65

0.66

0.67

8Cropping(40%)

0.43

0.62

0.63

0.63

0.40

0.57

0.58

0.59

0.43

0.60

0.62

0.62

0.42

0.59

0.60

0.61

94

Page 117: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Extracted Watermark Image After Attacks

Median (3x3) Median (5x5) Wiener (3x3) Mean (3x3)

Mean (5x5) Gaussian (0.006) Poisson Salt & Pepper

JPEG (10%) JPEG (30%) JPEG (60%) JPEG (90%)

Rotation (10) Scaling (0.6) Scaling (0.9) Scaling (1.2)

Cropping (10%) Cropping (20%) Cropping (30%) Cropping (40%)

Figure 5.10: Extracted RTU logo watermarks by proposed method using UCSand DE after applying considered attacks.

95

Page 118: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Extracted Aeroplane Watermark Image After Attacks

Median (3x3) Median (5x5) Wiener (3x3) Mean (3x3)

Mean (5x5) Gaussian (0.006) Poisson Salt & Pepper

JPEG (10%) JPEG (30%) JPEG (60%) JPEG (90%)

Rotation (10) Scaling (0.6) Scaling (0.9) Scaling (1.2)

Cropping (10%) Cropping (20%) Cropping (30%) Cropping (40%)

Figure 5.11: Extracted Aeroplane watermarks by proposed method using UCSand DE after applying considered attacks.

96

Page 119: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

plane image due to the coarseness of aeroplane image as compared to RTU logo.

The comparative results show that the proposed method using SPT, UCS color

space, and DE method outperforms other methods for all the considered attacks

except JPEG compression where the method of Su et al. [98] shows slightly better

robustness. The similar performance of the proposed method can be observed

from Figures 5.10 and 5.11 where the extracted RTU logo and aeroplane image

watermarks by proposed method using SPT, UCS, and DE for all the considered

attacks have been depicted. Therefore, it is validated from the results that the

proposed method using SPT, UCS color space, and DE produces high quality and

better robust watermarked images and can be utilized for content authentication

to protect the copyrighted images.

5.5 Results and Discussions

This chapter proposes a novel SPT-based color image watermarking method using

UCS and DE method. The use of uncorrelated color space increases the effective

utilization of all color channels of host image which is not feasible in correlated

color spaces while DE is used for optimizing the strength factors to improve the

quality and robustness of the proposed method. The performance of the proposed

method has been measured in terms of quality and robustness against different

signal processing attacks and results are compared with the work of Chou and

Wu [96] and Su et al. [98]. The results validate that the proposed method is

better than other methods for all the considered parameters except slight decay

in JPEG compression attack as compared to Su et al. [98]. Moreover, the results

are also compared with DWT-based method introduce in Chapter 4. The results

depict that SPT-based method outperforms DWT-based method. Therefore, it

is concluded that the proposed method using SPT, UCS color space, and DE

has high quality and robust results and can further be used for protection of the

copyrighted images.

97

Page 120: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 121: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

Chapter 6

Conclusions and Scope for Future Work

In this thesis, an attempt has been made to identify the problems pertaining to

image watermarking for protection of color images. Color spaces, transform meth-

ods, optimization methods, and attacks are the major problems encountered in

the image watermarking area. In this work, some inherent drawbacks of exist-

ing methods used for quantitative analysis of watermarking for color images are

studied. The outcome of this study motivated to develop an image watermarking

system for the content authentication of color images.

Though the experimental results along with the discussions have been given

at the end of each chapter, this concluding chapter is mainly devoted to the con-

tributions made in this thesis. The main contributions in this thesis are four-fold.

First, pre-process the input color images (host and watermark) by transforming it

into UCS color space. Second, four efficient transform-based image watermarking

methods for color images have been proposed to enhance the transparency and

robustness of method. Third, three optimization methods have been used to im-

proves the performance of proposed methods by optimally selecting the strength

factors of watermarks and then post-processed the watermarked coefficients to re-

construct the watermarked image. Fourth, applying various watermarking attacks

in order to test the proposed method on various benchmark/ validation parameters

like composite-peak-signal-to-noise ratio (CPSNR), structural similarity (SSIM),

and normalized correlation (NC). Finally, an image watermarking method is de-

signed and developed using the proposed methods for protection of color images.

The thesis is concluded with a summary of contribution followed by some pointers

to new research that are directly related to the present work.

Page 122: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

6.1 Contributions Made in the Thesis

The major contributions of this work are discussed below.

1. Digital Image Watermarking using Discrete Wavelet Transform on

Gray-Scale Watermark Image

The first contribution is to develop a robust image watermarking method

based on the DWT and UCS for the protection of color images by embedding

the gray-scale image watermarks. Further, the capabilities of GA have been

used to optimize 16 strength factors to improves the transparency and the

robustness of proposed method. In this method, the watermark images

are embeds in third level decomposed image by using symlet-4 filter bank.

Experimental results show that the proposed method has good quality and

robustness against the 16 considered signal processing and geometric attacks.

Moreover, the performance of the proposed method is better than the image

watermarking method by Vahedi et al. [42] who also used DWT and GA

method.

2. Digital Image Watermarking using Steerable Pyramid Transform

on Gray-Scale Watermark Images

The second contribution is devoted to design an image watermarking method

based on the SPT and UCS. In this method a gray-scale watermark has been

embedded in third level decompose coefficients of input image. Furthermore,

GA has been used to enhance the performance of the method. Experimen-

tal results show that the proposed method has good quality and robustness

against the 16 considered signal processing and geometric attacks. Moreover,

the performance of the proposed method is better than the image water-

marking method by Vahedi et al. [42] and the previously proposed method

(Digital Image Watermarking using Discrete Wavelet Transform on Gray-

Scale Watermark Image) which also used DWT and GA in their method.

Hence, it is concluded that the SPT outperforms the DWT.

3. Digital Image Watermarking using Discrete Wavelet Transform on

Color Watermark Images

The third contribution introduces a robust and blind image watermarking

method based on DWT and UCS for the protection of color images by em-

bedding the color image watermark into the third level decomposed host

coefficients. Moreover, to increase the reliability the watermark hides into

the multiple sections of the host image. Further, the capabilities of three

100

Page 123: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

optimization methods namely; GA, ABC, and DE, have been exploited to op-

timize the 16 strength factors. Experimental results show that the proposed

method with DE has better quality and robustness against the 20 consid-

ered signal processing and geometric attacks. Moreover, the performance of

the proposed method is better than the image watermarking methods pro-

posed by Su et al. [98] and Chou and Wu [96] who also embedded the color

watermark.

4. Digital Image Watermarking using Steerable Pyramid Transform

on Color Watermark Images

The fourth contribution is based on the SPT-based image watermarking

method for the protection of color host images by embedding the color wa-

termark into the third level decomposed of image. Moreover, to increase

the reliability, the watermark is embedded into the multiple areas of the

host image. Further, the capabilities of the newly introduce DE method

has been exploited to optimize the 16 strength factors. Experimental results

show that the proposed method has better quality and robustness against

the 20 considered signal processing and geometric attacks. Moreover, the

performance of the proposed method is better than the image watermark-

ing methods proposed by Su et al. [98], Chou and Wu [96], and previously

proposed method (Chapter 4) who have also embedded the color watermark.

6.2 Scope for Future Work

The present work opens a lot of new avenues and directions for research in the

field of watermarking. Some of the possible directions for future research related

to the present work are given below;

• The developed methods may be explored for recently introduced transforms

and color spaces.

• The proposed work can be further explored by using hybrid methods like

more than one transform, color space, etc.

• The present work can be further investigated for other multimedia contents

such as video signals and 3-D models.

• The developed methods may be further explored for other newly introduced

optimization methods.

101

Page 124: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 125: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

References

[1] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hid-

ing,” IBM systems journal, vol. 35, pp. 313–336, 1996.

[2] V. Fotopoulos and A. N. Skodras, “Digital image watermarking: An

overview,” Eurasip Newsletter, vol. 14, pp. 10–19, 2003.

[3] V. Potdar, S. Han, and E. Chang, “A survey of digital image watermarking

techniques,” in Proc. of International Conference on Industrial Informatics,

Frontier Technologies for the Future of Industry and Business, Perth, WA,

2005.

[4] J. Liu and X. He, “A review study on digital watermarking,” in Proc. of

IEEE International Conference on Information and Communication Tech-

nologies, (ICICT 2005), 2005.

[5] S. R. Oliveira and M. A. Nascimento, “Digital watermarking: Status, limi-

tations and prospects,” 2002.

[6] A. O. Adesina, H. O. Nyongesa, and K. K. Agbele, “Digital watermarking:

A state-of-the-art review,” in Proc. of IEEE International Conference IST-

Africa, 2010, 2010.

[7] B. Schneier, “Applied cryptography,” Cover and title pages, pp. 125–147,

1996.

[8] E. Koch and J. Zhao, “Towards robust and hidden image copyright labeling,”

in Proc. of IEEE Workshop on Nonlinear Signal and Image Processing. Neos

Marmaras, Greece, 1995.

[9] R. J. Anderson and F. A. Petitcolas, “Information hiding,” Signal Process-

ing, vol. 80, pp. 2067–2070, 1996.

[10] F. Mintzer, G. W. Braudaway, and A. E. Bell, “Opportunities for water-

marking standards,” Communications of the ACM, vol. 41, pp. 57–64, 1998.

103

Page 126: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[11] I. J. Cox, M. L. Miller, and J. A. Bloom, “Watermarking applications and

their properties,” in Proc. International Conference on IEEE Information

Technology: Coding and Computing, 2000.

[12] B. J. Cox I. J., Miller M., Digital Watermarking: Principles and Practice.

Morgan Kaufmann, 2001.

[13] A. Darwish and A. Abraham, “The use of computational intelligence in

digital watermarking: Review, challenges, and new trends,” Neural Network

World, vol. 21, p. 277, 2011.

[14] T. Bianchi and A. Piva, “Secure watermarking for multimedia content pro-

tection: A review of its benefits and open issues,” IEEE Signal Processing

Magazine, vol. 30, pp. 87–96, 2013.

[15] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spec-

trum watermarking for multimedia,” IEEE Transactions on Image Process-

ing, vol. 6, pp. 1673–1687, 1997.

[16] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su, “Attacks

on digital watermarks: classification, estimation based attacks, and bench-

marks,” IEEE Communications Magazine, vol. 39, pp. 118–126, 2001.

[17] S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand Maillet, and

T. Pun, “Second generation benchmarking and application oriented eval-

uation,” in Proc. of Information Hiding. Springer, 2001.

[18] J. K. Su and B. Girod, “Power-spectrum condition for energy-efficient wa-

termarking,” IEEE Transactions on Multimedia, vol. 4, pp. 551–560, 2002.

[19] G. C. Langelaar, R. L. Lagendijk, J. Biemond et al., “Removing spatial

spread spectrum watermarks by non-linear filtering,” in Proc. of 9th Euro-

pean Signal Processing Conference (EUSIPCO98), 1998.

[20] S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, “Attack modelling:

towards a second generation watermarking benchmark,” Signal processing,

vol. 81, pp. 1177–1214, 2001.

[21] S. P. Mohanty, “Digital watermarking: A tuto-

rial review,” URL: http://www. csee. usf. edu/˜ smo-

hanty/research/Reports/WMSurvey1999Mohanty. pdf, 1999.

104

Page 127: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[22] S. J. Lee and S. H. Jung, “A survey of watermarking techniques applied

to multimedia,” in Proc. of IEEE International Symposium on Industrial

Electronics, (ISIE 2001), 2001.

[23] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Pro-

ceedings of the IEEE, vol. 87, pp. 1079–1107, 1999.

[24] D. Aucsmith, Information hiding. Springer, 1998.

[25] F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a

survey,” Proceedings of the IEEE, vol. 87, pp. 1062–1078, 1999.

[26] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image

steganography: Survey and analysis of current methods,” Signal process-

ing, vol. 90, pp. 727–752, 2010.

[27] A. Z. Tirkel, R. G. van Schyndel, and C. Osborne, “A two-dimensional

digital watermark,” in Proc. of Dicta, 1995.

[28] R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” in Proc.

of IEEE International Conference on Image Processing, 1996.

[29] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial do-

main,” Signal processing, vol. 66, pp. 385–403, 1998.

[30] R. B. Wolfgang and E. J. Delp, “A watermarking technique for digital im-

agery: further studies,” in Proc. of International Conference on Imaging,

Systems, and Technology, 1997.

[31] G. Voyatzis and I. Pitas, “Digital image watermarking using mixing sys-

tems,” Computers & Graphics, vol. 22, pp. 405–416, 1998.

[32] O. Bruyndonckx, J. J. Quisquater, and B. Macq, “Spatial method for copy-

right labeling of digital images,” Proc. of IEEE Nonlinear Signal and Image

Processing, 1995.

[33] I. Pitas, “A method for signature casting on digital images,” in Proc. of

IEEE International Conference on Image Processing, 1996.

[34] P. S. Huang, C. S. Chiang, C. P. Chang, and T. M. Tu, “Robust spatial

watermarking technique for colour images via direct saturation adjustment,”

IEE Proceedings-Vision, Image and Signal Processing, vol. 152, pp. 561–574,

2005.

105

Page 128: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[35] R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital water-

mark,” in Proc. of IEEE International Conference on Image Processing,

(ICIP 1994), 1994.

[36] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE

Transactions on Image Processing, vol. 8, pp. 58–68, 1999.

[37] G. M. Su, “An overview of transparent and robust digital image watermark-

ing,” 2008.

[38] T. H. Lan and A. H. Tewfik, “A novel high-capacity data-embedding sys-

tem,” IEEE Transactions on Image Processing, vol. 15, pp. 2431–2440, 2006.

[39] D. Kundur and D. Hatzinakos, “Toward robust logo watermarking using

multiresolution image fusion principles,” IEEE Transactions on Multimedia,

vol. 6, pp. 185–198, 2004.

[40] A. A. Reddy and B. N. Chatterji, “A new wavelet based logo-watermarking

scheme,” Pattern Recognition Letters, vol. 26, pp. 1019–1027, 2005.

[41] L. Ghouti, A. Bouridane, M. K. Ibrahim, and S. Boussakta, “Digital image

watermarking using balanced multiwavelets,” IEEE Transactions on Signal

Processing, vol. 54, pp. 1519–1536, 2006.

[42] E. Vahedi, R. A. Zoroofi, and M. Shiva, “Toward a new wavelet-based wa-

termarking approach for color images using bio-inspired optimization prin-

ciples,” Digital Signal Processing, vol. 22, pp. 153–162, 2012.

[43] X. Y. Wang, C. P. Wang, H. Y. Yang, and P. P. Niu, “A robust blind color

image watermarking in quaternion fourier transform domain,” Journal of

Systems and Software, 2012.

[44] W. T. Freeman and E. H. Adelson, “The design and use of steerable filters,”

IEEE Transactions on Pattern analysis and machine intelligence, vol. 13,

pp. 891–906, 1991.

[45] E. P. Simoncelli, W. T. Freeman, E. H. Adelson, and D. J. Heeger, “Shiftable

multiscale transforms,” IEEE Transactions on Information Theory, vol. 38,

pp. 587–607, 1992.

[46] F. Drira, F. Denis, and A. M. Baskurt, “Image watermarking technique

based on the steerable pyramid transform,” in Proc. of SPIE, 2004.

106

Page 129: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[47] M. Unser and N. Chenouard, “A unifying parametric framework for 2-d

steerable wavelet transforms,” SIAM Journal on Imaging Sciences, vol. 6,

pp. 102–135, 2013.

[48] P. P. Niu, X. Y. Wang, H. B. Jin, and M. Y. Lu, “A feature-based robust

digital image watermarking scheme using bandelet transform,” Optics &

Laser Technology, vol. 43, pp. 437–450, 2011.

[49] J. Ruanaidh, W. Dowling, and F. Boland, “Phase watermarking of digital

images,” in Proc. of IEEE International Conference on Image Processing,

1996.

[50] J. O’Ruanaidh and T. Pun, “Rotation, translation and scale invariant digital

image watermarking,” in Proc. of IEEE International Conference on Image

Processing, 1997.

[51] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui,

“Rotation, scale, and translation-resilient public watermarking for images,”

in Proc. of Electronic Imaging, 2000.

[52] M. Ramkumar, A. N. Akansu, and A. A. Alatan, “A robust data hiding

scheme for images using dft,” in Proc. of IEEE International Conference on

Image Processing (ICIP 99), 1999.

[53] A. De Rosa, M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “Optimum

decoding of non-additive full frame dft watermarks,” in Proc. of Information

Hiding. Springer, 2000.

[54] V. Solachidis and L. Pitas, “Circularly symmetric watermark embedding

in 2-d dft domain,” IEEE Transactions on Image Processing, vol. 10, pp.

1741–1753, 2001.

[55] V. Aslantas, S. Ozer, and S. Ozturk, “Improving the performance of dct-

based fragile watermarking using intelligent optimization algorithms,” Op-

tics Communications, vol. 282, pp. 2806–2817, 2009.

[56] J. Wang, S. Lian, Z. Liu, Z. Ren, Y. Dai, and H. Wang, “Image watermark-

ing scheme based on 3-d dct,” in Proc. of IEEE Conference on Industrial

Electronics and Applications, 2006.

[57] C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Liao, “A new watermarking tech-

nique for multimedia protection,” Multimedia image and video processing,

pp. 507–530, 2001.

107

Page 130: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[58] S. Agreste, G. Andaloro, D. Prestipino, and L. Puccio, “An image adaptive,

wavelet-based watermarking of digital images,” Journal of Computational

and Applied Mathematics, vol. 210, pp. 13–21, 2007.

[59] S. Agreste and G. Andaloro, “A new approach to pre-processing digital

image for wavelet-based watermark,” Journal of Computational and Applied

Mathematics, vol. 221, pp. 274–283, 2008.

[60] F. K. A. T. F. Khelifi, A. Bouridane, “An improved waveletbased image

watermarking technique,” in Proc. of 4th International Workshop on Digital

Watermarking, Siena, Italy, 2005.

[61] E. Vahedi, R. A. Zoroofi, and M. Shiva, “On optimal parameter selection

for multiresolution based image watermarking,” in Proc. IEEE International

Conference on Intelligent and Advanced Systems (ICIAS 2007), 2007.

[62] E. Hossaini, A. El Arab, M. El Aroussi, K. Jamali, S. Mbarki, and M. Wahbi,

“Hybrid watermarking algorithm based on singular value decomposition and

steerable pyramid,” in Proc. of IEEE International Conference on Multime-

dia Computing and Systems (ICMCS 2014), 2014.

[63] J. Ni, R. Zhang, J. Huang, C. Wang, and Q. Li, “A rotation-invariant secure

image watermarking algorithm incorporating steerable pyramid transform,”

in Digital Watermarking. Springer, 2006.

[64] A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “Dct-based watermark

recovering without resorting to the uncorrupted original image,” in Proc. of

IEEE International Conference on Image Processing, 1997.

[65] B. Tao and B. Dickinson, “Adaptive watermarking in the dct domain,” in

Proc. of IEEE International Conference on Acoustics, Speech, and Signal

Processing, 1997.

[66] B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, “Reversible im-

age watermarking by histogram modification for integer dct coefficients,” in

Proc. of IEEE 6th Workshop on Multimedia Signal Processing, 2004.

[67] W. P. G.L. Varco, “Dct-based data hiding for securing roi of color images,”

in Proc. of the IEEE International Conference on Image Processing (ICIP),

Genova, Italy, 2005.

[68] V. Saxena and J. Gupta, “Collusion attack resistant watermarking scheme

for images using dct,” in Proc. of 15th IEEE International Conference on

Signal Processing and Communications Applications (SIU 2007), 2007.

108

Page 131: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[69] S. D. Lin, S. C. Shie, and J. Guo, “Improving the robustness of dct-based

image watermarking against jpeg compression,” Computer Standards & In-

terfaces, vol. 32, pp. 54–60, 2010.

[70] M. Barni, F. Bartolini, V. Cappellini, A. Lippi, and A. Piva, “Dwt-based

technique for spatio-frequency masking of digital signatures,” in Proc. of

Electronic Imaging, 1999.

[71] V. Aslantas, A. L. Dogan, and S. Ozturk, “Dwt-svd based image water-

marking using particle swarm optimizer,” in Proc. of IEEE International

Conference on Multimedia and Expo, 2008.

[72] K. C. Liu, “Wavelet-based watermarking for color images through visual

masking,” AEU-International Journal of Electronics and Communications,

vol. 64, pp. 112–124, 2010.

[73] S. Agreste and L. Puccio, “Wavelet-based watermarking algorithms: the-

ory, applications and critical aspects,” International Journal of Computer

Mathematics, vol. 88, pp. 1885–1895, 2011.

[74] S. Pereira, S. Voloshynoskiy, and T. Pun, “Optimal transform domain wa-

termark embedding via linear programming,” Signal processing, vol. 81, pp.

1251–1260, 2001.

[75] Y. Zhao, P. Campisi, and D. Kundur, “Dual domain watermarking for au-

thentication and compression of cultural heritage images,” IEEE Transac-

tions on Image Processing, vol. 13, pp. 430–448, 2004.

[76] M. Unser, N. Chenouard, and D. Van De Ville, “Steerable pyramids and

tight wavelet frames in,” IEEE Transactions on Image Processing, vol. 20,

pp. 2705–2721, 2011.

[77] S. X. Wu and W. Banzhaf, “The use of computational intelligence in in-

trusion detection systems: A review,” Applied Soft Computing, vol. 10, pp.

1–35, 2010.

[78] Z. Wang, X. Sun, and D. Zhang, “A novel watermarking scheme based

on pso algorithm,” in Proc. of Bio-Inspired Computational Intelligence and

Applications. Springer, 2007.

[79] E. Vahedi, C. Lucas, R. A. Zoroofi, and M. Shiva, “A bio-inspired content

adaptive approach for multiresolution-based image watermarking,” in Proc.

109

Page 132: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

of Third International Conference on Natural Computation (ICNC 2007),

2007.

[80] ——, “A new approach for image watermarking by using particle swarm op-

timization,” in Proc. of IEEE International Conference on Signal Processing

and Communications, 2007.

[81] P. Kumsawat, K. Attakitmongcol, and A. Srikaew, “An optimal robust dig-

ital image watermarking based on genetic algorithms in multiwavelet do-

main,” WSEAS Transactions on Signal Processing, vol. 5, pp. 42–51, 2009.

[82] D. Karaboga and B. Akay, “A comparative study of artificial bee colony

algorithm,” Applied Mathematics and Computation, vol. 214, pp. 108–132,

2009.

[83] M. Rohani and A. Avanaki, “A watermarking method based on optimizing

ssim index by using pso in dct domain,” in Proc. of 14th IEEE International

on Computer Conference (CSICC 2009), 2009.

[84] C. Agarwal, A. Mishra, and A. Sharma, “Gray-scale image watermarking

using ga-bpn hybrid network,” Journal of Visual Communication and Image

Representation, 2013.

[85] M. Ali and C. W. Ahn, “An optimized watermarking technique based on

self-adaptive de in dwt–svd transform domain,” Signal Processing, vol. 94,

pp. 545–556, 2014.

[86] P. Kumsawat, K. Attakitmongcol, and A. Srikaew, “A new approach for

optimization in image watermarking by using genetic algorithms,” IEEE

Transactions on Signal Processing, vol. 53, pp. 4707–4719, 2005.

[87] G. N. Mohammed, A. Yasin, and A. M. Zeki, “High image quality water-

marking model by using genetic algorithm,” in Proc. of IEEE International

Conference on Advanced Computer Science Applications and Technologies

(ACSAT), 2012.

[88] V. Aslantas, “Optimal svd based robust watermarking using differential evo-

lution algorithm,” in Proc. of World Congress of Engineering, London, UK,

2008.

[89] M. Ali, C. W. Ahn, and P. Siarry, “Differential evolution algorithm for the

selection of optimal scaling factors in image watermarking,” Engineering

Applications of Artificial Intelligence, vol. 31, pp. 15–26, 2014.

110

Page 133: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[90] B. Lei, E. L. Tan, S. Chen, D. Ni, T. Wang, and H. Lei, “Reversible water-

marking scheme for medical image based on differential evolution,” Expert

Systems with Applications, vol. 41, pp. 3178–3188, 2014.

[91] F. Sha, F. Lo, Y. Y. Chung, X. Chen, and W. C. Yeh, “A novel optimized

watermark embedding scheme for digital images,” in Proc. of MultiMedia

Modeling. Springer, 2015.

[92] S. Das and P. N. Suganthan, “Differential evolution: a survey of the state-

of-the-art,” IEEE Transactions on Evolutionary Computation, vol. 15, pp.

4–31, 2011.

[93] J. Vesterstrom and R. Thomsen, “A comparative study of differential evolu-

tion, particle swarm optimization, and evolutionary algorithms on numerical

benchmark problems,” in Proc. of Congress on Evolutionary Computation

(CEC2004), 2004.

[94] V. Aslantas, “An optimal robust digital image watermarking based on svd

using differential evolution algorithm,” Optics Communications, vol. 282,

pp. 769–777, 2009.

[95] B. Akay and D. Karaboga, “A survey on the applications of artificial bee

colony in signal, image, and video processing,” Signal, Image and Video

Processing, pp. 1–24, 2015.

[96] C. H. Chou and T. L. Wu, “Embedding color watermarks in color images,”

EURASIP Journal on Applied Signal Processing, vol. 2003, pp. 32–40, 2003.

[97] N. H. Golea, R. Seghir, and R. Benzid, “A bind rgb color image water-

marking based on singular value decomposition,” in Proc. of IEEE/ ACS

International Conference on Computer Systems and Applications (AICCSA

2010), 2010.

[98] Q. Su, Y. Niu, G. Wang, S. Jia, and J. Yue, “Color image blind watermarking

scheme based on qr decomposition,” Signal Processing, vol. 94, pp. 219–235,

2014.

[99] E. Vahedi, R. A. Zoroofi, and M. Shiva, “On optimal color coordinate selec-

tion for wavelet-based color image watermarking,” in Proc. of International

Conference on Intelligent and Advanced Systems (ICIAS 2007), 2007.

[100] Z. Peng and W. Liu, “Color image authentication based on spatiotemporal

chaos and svd,” Chaos, Solitons & Fractals, vol. 36, pp. 946–952, 2008.

111

Page 134: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[101] C. H. Lin, D. Y. Chan, H. Su, and W. S. Hsieh, “Histogram-oriented wa-

termarking algorithm: colour image watermarking scheme robust against

geometric attacks and signal processing,” IEE Proceedings-Vision, Image

and Signal Processing, vol. 153, pp. 483–492, 2006.

[102] C. H. Chou and K. C. Liu, “A perceptually tuned watermarking scheme for

color images,” IEEE Transactions on Image Processing, vol. 19, pp. 2966–

2982, 2010.

[103] P. T. Reinhard E, “Colour spaces for colour transfer,” in Proc. of the Inter-

national Conference on Computational Color Imaging; Milan, Italy., 2011.

[104] S. Ren and T. Zhang, “Study of reversible information hiding scheme based

on cardbal2 and color field structure,” Advanced Materials Research, vol.

225, pp. 275–279, 2011.

[105] R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking three-dimensional

polygonal models through geometric and topological modifications,” IEEE

Journal on Selected Areas in Communications, vol. 16, pp. 551–560, 1998.

[106] B. S. Kim, J. G. Choi, C. H. Park, J. U. Won, D. M. Kwak, S. K. Oh, C. R.

Koh, and K. H. Park, “Robust digital image watermarking method against

geometrical attacks,” Real-Time Imaging, vol. 9, pp. 139–149, 2003.

[107] P. Su and C. Kuo, “Information embedding in jpeg-2000 compressed im-

ages,” in Proc. of IEEE International Symposium Circuits and Systems (IS-

CAS 2003), Bangkok, Thailand, 2003.

[108] M. Saraswat and K. V. Arya, “Colour normalisation of histopathological

images,” Computer Methods in Biomechanics and Biomedical Engineering:

Imaging & Visualization, vol. 1, pp. 185–197, 2013.

[109] L. C., “Learning the uncorrelated, independent, and discriminating color

spaces for face recognition,” IEEE Transactions on Information Forensics

and Security, vol. 3, pp. 213–222, 2008.

[110] J. H. Holland, Adaptation in natural and artificial systems: An introductory

analysis with applications to biology, control, and artificial intelligence. U

Michigan Press, 1975.

[111] H. John, “Adaptation in natural and artificial systems,” 1992.

[112] U.-S. image database URL: http://sipi.usc.edu/database/database.php.

112

Page 135: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

[113] M. N. Do and M. Vetterli, “Rotation invariant texture characterization

and retrieval using steerable wavelet-domain hidden markov models,” IEEE

Transactions on Multimedia, vol. 4, pp. 517–527, 2002.

[114] R. Storn and K. Price, “Differential evolution–a simple and efficient heuristic

for global optimization over continuous spaces,” Journal of global optimiza-

tion, vol. 11, pp. 341–359, 1997.

[115] A. P. Engelbrecht, Computational intelligence: an introduction. John Wiley

& Sons, 2007.

113

Page 136: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.
Page 137: Optimized Digital Image Watermarking for Uncorrelated ... · Optimized Digital Image Watermarking for Uncorrelated Color Space ... Iwouldliketoexpressheremysinceregratitudetomysupervisors,Dr.

List of Publications

1. M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “Discrete wavelet

transform-based color image watermarking using uncorrelated color space

and artificial bee colony”, International Journal of Computational Intelli-

gence Systems, Taylor & Francis, Vol. 8 (2), pp. 364-380, 2015.

[Published]

2. M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “Color image water-

marking using steerable pyramid transform and uncorrelated color space”,

Journal of Experimental and Theoretical Artificial Intelligence, Taylor &

Francis. [Under Review after Third Minor Revision]

3. M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “Digital image water-

marking using steerable pyramid transform and uncorrelated color space”,

in Proc. of Ninth International Conference on Industrial and Information

Systems (ICIIS 2014), India, 2014.

[Published]

4. M. Gupta, G. Parmar, R. Gupta, and M. Saraswat, “Digital image wa-

termarking using uncorrelated color space”, in Proc. of IEEE Symposium

on Computer Applications & Industrial Electronics (ISCAIE 2014), Penang,

Malaysia, 2014.

[Published]

5. M. Gupta, G. Parmar, R. Gupta, and R. Saraswat, “Authentication of

Multimedia Assets using Digital Watermarking: A Review”, in Proc. of

International Conference on Electronic Communication & Instrumentation

(e-Manthan 2012), India, 2012. [Published]

115