key: cord-0058784-wv24d1ai authors: Bansal, Megha; Mishra, Anurag; Sharma, Arpita title: Optimized DWT SVD Based Image Watermarking Scheme Using Particle Swarm Optimization date: 2020-08-24 journal: Computational Science and Its Applications - ICCSA 2020 DOI: 10.1007/978-3-030-58817-5_61 sha: 16e84e888a16ef2bd733400004325871275deb6e doc_id: 58784 cord_uid: wv24d1ai The robust watermarking techniques have gained popularity over last decade as more and more digital contents are being shared over Internet. This increase in data transmission also poses greater risk of various attacks which hamper data authenticity, integrity and quality. Therefore, efficient mechanisms are required that can handle robust transmission of digital data while honoring the Digital Right Management (DRM) protection measures of copyrighted content. In this paper, we explore an optimized Particle Swarm Optimization (PSO) based watermarking scheme on digital images in the hybrid Discrete wavelet transform (DWT) and Singular value decomposition (SVD) transform. The watermark is embedded in the host images by using both single scaling and multiple scaling factors for optimizing the visual quality of the signed images viz-a-viz robustness. Eight gray-scale and six colored images are used to carry out the experiments. Comparison of the proposed watermarking scheme with other techniques ascertain the proposed scheme outperforms others and it also fulfills all requisite conditions to be a robust and optimized watermarking scheme. In recent years, there is a vast increase in the amount of digital data communicated across the network. This has raised the security concerns related to authenticity and ownership of the data across Internet. Watermarking has emerged out as one of the solutions to above problems. Digital watermarking is a process for copyright protection and owner identification and verification in which a copyright data is embedded into the cover image as watermark in an invisible or visible manner that can be extracted later without much degradation of the cover signed image and the watermark [1, 2] . In this regard, visual quality of the signed images and robustness of the embedding scheme are two important parameters to quantify the performance of the watermarking scheme. Since both parameters are inversely related to each other, in lieu of this, watermarking can be visualized as an optimization problem. Cox et al. [1] proposed three groups to classify most commonly used watermarking schemes: Robust, Fragile, and Semi-fragile. Robust watermarking schemes are used for copyright protection and are resilient against compression, geometric and counterfeit attacks [3] . The fragile and semi fragile techniques are used when the focus is on image integrity and authenticity. The watermark is embedded in fragile framework in such manner that any attempt to modify signed image will result in complete distortion of the watermark. The semi fragile watermarks are developed to harness benefits of both robust and fragile framework. When the embedding process is carried out in the spatial domain of image, it leads to fragile watermarking. Such kind of watermarking results in directly changing the bits of the host image, thus, ease the implementation but compromises on the robustness of scheme against various attacks [3, 4] . On the other hand, watermarking in the transform domain results in embedding the watermark in the frequency domain coefficients of host image and has been found to be a more robust watermarking scheme. Out of various frequency domain techniques like Discrete Fourier Transform (DFT) [5, 6] , Discrete Cosine Transform (DCT) [7, 8, 26] and Discrete Wavelet Transform (DWT) [9, 10, 25, 33] , DWT has been found to achieve an imperceptible watermarking along with high robustness [1] . Xianghong et al. [29] proposed DWT in conjunction with vector transform as watermark embedding scheme. They have used single scaling factor for embedding the watermark in host image. These techniques have further been used in collaboration with other techniques like Singular value decomposition (SVD) [2, 11, 23, 27] for better watermarking efficiency. The secure transmission of digital images has greatly evolved from the initial proposed algorithms like DFT, DCT to more sophisticated soft computing techniques like artificial neural networks, fuzzy logic systems, support vector machines along with HVS model [12] [13] [14] [15] [16] 24] . Mishra et al. [17] have proposed watermarking scheme based on characteristics of human visual model. They have exploited three HVS features and fed them into FIS. They have also integrated a single layer feed-forward neural network known as extreme machine learning to generate the watermark. They claimed that their scheme is capable to implement real time watermarking applications. The last decade has seen numerous applications having origin in nature inspired techniques to efficiently solve optimization problems. Hybridization of different metaheuristic techniques -Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO) and nature inspired algorithms like Spider monkey, Cuckoo search and Artificial Bee Colony optimization along with transform domain techniques have also been explored and reported. Lai et al. [18] presented tiny genetic algorithm in conjunction with the SVD transform domain. In their work, they used tiny-GA to compute the values of embedding scaling factors to optimize the parameters of watermarking algorithm. Agarwal et al. [19] proposed their watermarking scheme using cuckoo search algorithm. In their scheme, they have embedded the watermark in different coefficients of the host image using multiple scaling factors which they have optimized using CSA. Loukhaoukha et al. [30] have used multiobjective ant colony optimization technique in LWT-SVD domain while Ishtiaq et al. [32] have proposed the Particle Swarm Optimization technique to find the optimal values for multiple scaling factors. Mishra et al. [20] have presented their widely cited hybrid watermarking scheme in DWT domain using famous Firefly Optimization for gray-scale images. They have decomposed LL3 sub-band coefficients into singular values using SVD to embed the watermark. They have nicely analyzed the use of Multiple Scaling Factors (MSFs) for embedding the watermark in the images. The MSFs are generated through Firefly Algorithm by using an Objective Function (Obj) which is composed of the PSNR and all image processing operations they used to attack the signed images. Their results were superior to all other such schemes falling in the same category. Abdelhakim [31] have suggested a combination of DCT with Artificial Bee Colony for the optimization of watermarking scheme. They claimed that their proposed technique minimized the error between optimal and predicted solutions for watermark embedding. Kuppusamy et al. [21] have proposed a PSO based watermarking algorithm in daubechies4 transform domain. They employed various attacks over the signed images and claimed good results of their scheme using IQIM. Loukhaoukha et al. [22] have hybridized multi-objective particle swarm optimization technique with SVD in wavelet domain for watermarking. They showed significant improvement in their results with the use of MSFs for watermark embedding. Image watermarking is performed by using embedding strength (/) which can be either single valued i.e. Single Scaling Factor (SSF) or there can be multiple values of the embedding strength i.e., Multiple Scaling Factors (MSFs). The SSF takes constant numerical value for every coefficient of the host image for watermarking purpose. Thus, it does not consider variations in the physical parameters like contrast and intensity of the host image. However, it has been seen that different regions of image vary in their structural and physical properties which disturbs the visibility of the signed image especially in the smoother regions [1, 4, 14] . Thus, MSF plays an important role in optimizing the results for an efficient watermarking scheme. The MSF considers different values for different coefficients of host image and thus, embedding the watermark with lesser strength in smoother areas as compared to the high intensity areas of the host image. In this paper, we propose an optimized hybrid watermarking scheme using DWT-SVD based on PSO technique. We have carried out the watermark embedding using both the SSF and MSF in gray-scale and colored images for the sake of comparison. Our proposed scheme further examines the robustness parameter by employing various image process attacks which are also used in the Objective Function. This Objective Function happens to be a linear function of PSNR value of signed image and sum of Normalized Correlation (NC) values for attacked images. The research paper is organized as follows: It presents the brief introduction of PSO along with its necessary mathematical inputs in Sect. 2. The Sect. 3 comprises of the proposed embedding and extraction schemes. Section 4 contains our experimental results and their analysis on the basis of its comparison with other hybrid schemes. Section 5 concludes the whole work. PSO is a population-based global optimization technique modelled by Kennedy and Eberhart [28] . PSO is a meta-heuristic technique that is based on co-operative and social characteristics of evolution like flocking of birds, insects swarming as compared to other evolutionary strategies like genetic algorithms that use competitive aspects like survival of the fittest. PSO involves creating a diffuse population (known as swarm) of individuals (termed as particles) that tend to move in the search space and clustering in areas where local minima are located. In each iteration, particles learn from their surroundings and on that basis, update their positions and velocities which are based on the combination of best positions found by that particle (personal best, pbest) and also, the best position value achieved by entire swarm (global best, gbest). With each iteration, particles tend to move closer and converge towards a single point. The output generated by PSO largely depends on the values of parameters used like inertial weight w, maximum number of iterations used maxItr and the acceleration constants £ 1 and £ 2 . As the process terminates, the best solution is denoted by gbest which provides the optimal solution. In the proposed scheme, host image (I) of 512 Â 512 and binary watermark (W) of size 32 Â 32 are used for embedding and extraction process. The embedding is carried out in the transform domain by partitioning the host image into sub-bands using 4 -level DWT and decomposing the coefficients using SVD as explained in Sect. 3.1. The extraction process is executed as the reverse procedure of embedding and is explained in Sect. 3.2 in detail. In the embedding process, the bits of the host image are altered according to the values of the coefficients of watermark to be inserted. Figure 1 represents the procedure through block diagram. A good embedding is determined by the visual quality of the signed images. The metric PSNR measures peak signal to noise ratio and determines the quality of embedding. Higher values of PSNR reflects higher visual quality of the signed images. It is given by the equation: where, I max defines the maximum pixel intensity for image I and MSE denotes mean square error. • Decompose the host image using 4 -level DWT HAAR wavelet transform into four sub-bands: LL4, LH4, HH4, HL4. • For good robustness, use LL4 sub-band for watermark embedding. • For unique feature extraction, perform SVD on LL4 sub band of host image and obtain S using equation: • Apply SVD on the watermark (W) used to achieve singular value matrix (S w ) using following equation: • Embed the watermark coefficients (S w Þ into the obtained coefficients of host image (S) using equation: where, / represents the embedding scaling factor that needs to be optimized. • Obtain modified coefficients using equation given below: • Perform IDWT on the above modified coefficients resulting into signed image. This process recovers the extracted watermark from the signed image. The process is represented through the block diagram in Fig. 2 . A good watermark extraction scheme should be robust to the image processing attacks. To measure the robustness of the scheme, NC W; W 0 ð Þ (normalized cross-correlation) coefficient is computed for the original watermark (W) from host image and the recovered watermark (W 0 ) from the signed image using the equation: The values closer to 1 indicate good recovery of the watermark from the signed image and hence, high robustness of the watermarking scheme. • For recovery, apply 4-level DWT on the host image and signed image. • Retrieve LL4 and LL4 0 sub band coefficients from both the images respectively. • Apply SVD on above calculated coefficients and obtain corresponding singular values S and S 0 values using the following equations: • Extract the singular values of the watermark (S 0 w Þ through formula given by equation: • Recover the watermark (W 0 Þ using equation given below: In this scheme, the watermark coefficients are embedded in the host image using the multiple scaling factor (/). This embedding is performed in the transform domain using discrete wavelet transform and singular value decomposition. The MSF 0 / 0 is optimized using PSO algorithm. Listing 4: PSO based watermarking scheme • Create an initial population of n swarms randomly, where each particle has position vector of size mxm. This corresponds to the size of binary watermark used. • For each particle of swarm s i : i) Perform watermark embedding in the host image using algorithm in Listing 2. MSF 0 / 0 used in Eq. (4) is optimized by PSO algorithm given in Listing 1. ii) Generate T different attacked signed images by executing T image-processing attacks on obtained signed image I 0 . iii) Perform watermark extraction on all attacked signed images using the watermark extraction algorithm given in Listing 3. iv) Calculate the visual quality of signed image I 0 using PSNR by Eq. (1) and robustness of the watermarking scheme using NC W; W 0 À Á values for the attacked signed images using Eq. (6) . v) Finally, compute the value of objective function of the swarm using the function given by following equation: • Update each swarm's global position with the best value according to the objective function value achieved above. • Optimize the swarms using the algorithm given in Listing 1. • Repeat the above steps till termination criteria are met. Experiments are performed on eight 512 Â 512 gray scale host images: Baboon, Boat, Lena, Cameraman, Parrots, Tiger, Jumbo and Cosmological Cabbage. Embedding is done using 32 Â 32 binary image as watermark. The PSO parameters: w ¼ 1, The use of SSF results in embedding the watermark with same strength in the entire host image. Table 1 compiles the PSNR and NC W; W 0 À Á values of the four gray scale signed images used in the present work. These four test images are used by us as other researchers have used the same test images and this becomes a mandatory criterion to present a comparative assessment of various other schemes vis-à-vis the proposed one. Table 2 compiles the PSNR and NC W; W 0 À Á values of four additional gray scale signed images used in our work without any such comparison. A close observation of the data compiled in Table 1 reveals that embedding the watermark using the MSF strategy gives better results as compared to the SSF strategy in proposed scheme. We also compare our MSF and SSF results with the same of other schemes belonging to the similar category. Clearly, our results outperform the results presented by other state of art works. This is found true both the PSNR and NC W; W 0 À Á parameter of the signed images. Table 2 further compiles results of PSNR and In the next part of this work, the next two tables compile the results for robustness studies carried out over these eight signed images by considering both SSF and MSF strategies. This is carried out to make an assessment of these embedding strategies over the robustness of the embedded watermark. Due to paucity of space and formatting issues, these results are divided into two tables - Table 3 A close observation of Table 3 and Table 4 clearly indicates that the NC W; W 0 À Á parameter values using MSF strategy for various image processing attacks are better as compared to SSF strategy. A high numerical value of the NC W; W 0 À Á parameter indicates that the watermark recovery out of the signed images is quite good which indicates a high robustness of the proposed scheme. Therefore, it can be deduced that our DWT-SVD hybrid transform based PSO watermarking scheme is suitable for optimizing the twin parameters of visual quality of signed grayscale images and the robustness of the watermark embedding scheme in the same. The use of the PSO based optimization of the Multiple Scaling Factors for embedding under DWT-SVD hybrid transform is primarily responsible for this outcome. In the previous sections, we have established that for eight different gray scale images, the PSO based optimization scheme operating under DWT-SVD hybrid transform is found comparatively better for watermark embedding. To further test the effectiveness of our proposed scheme, we extend our research work to six compressed colored images depicted in Fig. 3 , working with SSF and MSF strategies. These images are -Parrot, Baboon, Tiger, Lena, Jumbo and Cosmological Cabbage, all compressed as Jpeg compression standard. It is important to note that the use of compressed copyright material is one of the major important requirements of Digital Rights Management (DRM). Therefore, we use these images in Jpeg compressed domain for testing our watermarking scheme. We tabulate the obtained results for PSNR and NC W; W 0 À Á in Table 5 . Table 6 compiles the robustness studies data over the six colored images for SSF and MSF strategies. It is found that the results as obtained for the eight grayscale images reported in Sect. 4.2 and 4.3 above are repeated with MSF strategy out casting the SSF strategy in this case as well. Hence, it can be concluded that the PSO optimization has fairly performed well for colored images also. We conclude that the use of We attribute better results obtained by us to the use of the hybrid objective function used to optimize the PSO technique. This objective function is a linear combination of the PSNR and the image processing attacks used in this work. This function has resulted in better optimization of the MSF for PSO based watermarking scheme. The paper proposes an optimized PSO based watermarking scheme working in hybrid DWT-SVD transform domain. The PSO is used to determine the Multiple Scaling Factor (MSF) based embedding strength further used to embed the watermark in the image coefficients on the basis of its structural and physical properties. The experimentation is carried out over eight gray-scale and six colored images of the size 512 Â 512. The Objective function proposed by Mishra et al. which is a linear combination of the PSNR and six different image processing attacks is used to run the PSO algorithm. The optimized value of the MSFs so generated by the PSO is used to embed the watermark in the selected low frequency coefficients of the host images. The signed images so obtained are found to exhibit very high visual quality and the watermark embedding scheme is also found to be quite robust. The proposed watermarking scheme outperforms several other identical schemes with the observed results. It is found that the PSO based scheme carried out in hybrid DWT-SVD transform domain is very successful to optimize the MSF parameters in accordance with various regions of the test images. Additionally, the visual quality of the signed images and the robustness parameter NC are also found to be well balanced due to its use. We attribute this exceling performance of our scheme to the use of particle swarm optimization technique in collaboration with the objective function used. Secure spread spectrum watermarking for multimedia An SVD-based watermarking scheme for protecting rightful ownership Robust image watermarking in the spatial domain Fast two-layer image watermarking without referring to the original image and watermark Rotation, scale, and translation resilient watermarking for images Circularly symmetric watermark embedding in 2-D DFT domain DCT-domain watermarking techniques for still images: detector performance analysis and a new structure A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression A chaos-based robust wavelet-domain watermarking algorithm Survey of wavelet-domain watermarking algorithms A Watermarking algorithm for digital image based on DCT and SVD Gray-scale image watermarking using GA-BPN hybrid network Decision of image watermarking strength based on artificial neural-networks Adaptive DWT-SVD domain image watermarking using human visual model A novel image watermarking scheme using extreme learning machine Wavelet based fuzzy perceptual mask for images Digital image watermarking in DCT domain using fuzzy inference system. In: 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE) Corrigendum to 'A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm Toward optimal watermarking of grayscale images using the multiple scaling factor based cuckoo search technique Optimized gray-scale image watermarking using DWT SVD and firefly algorithm Optimized image watermarking scheme based on PSO A robust SVD-based image watermarking using a multi-objective particle swarm optimization A hybrid SVD-DCT watermarking method based on LPSNR A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture Embedding a seal in to a picture under orthogonal wavelet transform Image watermarking using DCT domain constraints An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD Particle swarm optimization A digital watermarking scheme based on DWT and vector transform Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization A time-efficient optimization for robust image watermarking using machine learning Adaptive watermark strength selection using particle swarm optimization Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition