key: cord-1016940-fssrtw77 authors: Yasmeen, Fauzia; Uddin, Mohammad Shorif title: An Efficient Watermarking Approach Based on LL and HH Edges of DWT–SVD date: 2021-02-08 journal: SN Comput Sci DOI: 10.1007/s42979-021-00478-y sha: 3a089a5704e7ef6358bf74c64d0fd6b700b6e606 doc_id: 1016940 cord_uid: fssrtw77 Digital watermarking is playing a vital role in the improvement of authentication, security, and copyright protection in today’s digital transformation. The performance of this technique is shown to be impressive around the globe. Text, audio, video, and image data are acted as watermarks in the digital platform. In this article, a hybrid watermarking scheme is proposed to furnish the robustness and protection of digital data. This hybrid scheme is a form of discrete wavelet transform (DWT) and singular value decomposition (SVD). The embedding and extracting features are carried out through multi-level operations of DWT and SVD. Various attacks are added to the proposed method to justify the robustness of the watermark. In the end, the suggested approach is contrasted with existing methods to confirm the supremacy. With the rapid growth of information technology, interactive media have become the most important gadgets for transmitting information [1] . The mode of communication and business has been converted into digital form due to the global pandemic situations and this scenario is increasing day by day. Thus, there are millions, and billions of data are moving worldwide in the digital platform. Recently, this has caused considerable interest within the community due to the pandemic situation of COVID-19. Considering the privilege of cyberspace, anyone can easily modify or use content without the owner's permission. So, security and authenticity become a concern to protect the information from being altered or misuse. Digital watermarking stands here to solve the issues. Digital watermarking is pursued as a marker or verification mechanism that proves an individual's identity for his/her work. This marker can be a logo for an organization or the digital signature of an author. A digital watermark can be visible or invisible and embedded into the digital carrier like text, image, audio, or video-related content. Intangibility and robustness are considered in the substantial watermarking algorithm [2] . Intangibility is calculated by PSNR value (peak signal-to-noise ratio) and robustness is computed by correlation among the original watermark and recovered watermark image [3] . Digital watermarking is classified into spatial domain and frequency domain transform. In the spatial domain, the watermark is precisely enclosed by adjusting the grayscale values of the pixels of the host image beyond any transformation [4] . On the contrary, the transformation, such as DWT, SVD, DCT, DFT, etc., is performed in the host image before embedding into the watermark image [4] . It is said that the frequency domain not only tends to be more robust in comparison with the spatial domain but also further complex than the spatial method [4] . Several research groups have been working on the design of the watermarking technique. This has been introduced to overcome some of the inherent limitations of cryptography. The solution is to apply an appropriate hybrid method that guarantees strong authentication as well as the robustness of the owner's property. With this aim in mind, we seek to develop a novel approach with the goal of copyright protection. We examine the three key elements of work in this area: (1) the first part was focused on the embedding procedure (2) the second phase was involved in the extraction process and (3) the last stage concentrated the resistance against multiple attacks. The remaining of the paper has been structured as follows-"Literature Review" illustrates a review of techniques used in digital watermarking, "Digital Watermarking Concept", "DWT" and "SVD" has set out the theories of digital watermarking, DWT (discrete wavelet transform), SVD (singular value decomposition) that underpin the method used in this paper, "Proposed Work" presents the embedding and extracting algorithm of our proposed work, "Performance Analysis" shows the performance analysis and discussion and "False Positive Issue" concludes the paper by examining the impact of the method. The literature is reviewed to examine available methods that could be used in watermarking. A good number of research work is conducted for contemporary watermarking methods. Zhang et al. [2] suggested a robust color image watermarking algorithm. This algorithm converts the host color image watermarking into YUV and SVD is utilized to Y component. However, the watermark is embedded into the host image followed by the modification through Arnold transform and DWT. This method claimed robustness against geometric attacks, but it is seen that the PSNR value is very low compare to other watermark-related schemes. Singh et al. [5] proposed a block-based DWT-SVD image watermarking approach where QR (quick response code) code is considered as a watermark image. Both the original image and watermark image are decomposed by 2-level DWT on a low-frequency band and the corresponding frequency band is separated into m × n block size. As the color image is used here as a host image, SVD had to apply on each RGB component of a block to find the singular values of the watermarking. This method claims robustness against Gaussian noise and salt and pepper noise. Similar work also has been pursued by others [6] in which a hybrid (DWT-SVD) watermarking scheme and a mathematical tool known as PSO (particle swarm optimization) are used for the efficient and secured watermarked image. RGB components of the host image are separated, and threelevel DWT is performed on the R component. Then, SVD is applied on the approximate co-efficient of the R component. On the other hand, the watermark image is scrambled using Arnold transform and SVD is also used here to find the singular value of the watermark. The scaling factor is obtained from PSO to embed into the watermark image. This technique asserted good PSNR values adjacent to different attacks. This issue was explored by Naik et al. [7] , who introduced a robust watermarking technique based on DWT and SVD, which decomposed the host image by 2-level DWT and SVD is applied into the HL sub-band. The same working principle is performed on the watermark image and then the SVD of both images is embedded with a scaling factor to form a watermarked image. Conceptually similar work has also been carried out by [8, 9] in which the cover image is divided by first-level Haar DWT and the SVD is added to the LH and HL sub-bands. Besides, the watermark is split into equal halves and LH and HL are modified before being inserted in the host image. The watermark is extracted from the reverse process. It is noted that this approach only demonstrates robustness for histogram equalization. Harjito and Suryani [10] developed their watermarking scheme where white Gaussian is added to the scaling factor. But this technique is not resistant to some attacks like rotating, cropping, and blurring. In the study [11] , both the host and watermark are converted into the grayscale and the watermark is encrypted before the embedding procedure. Host image is decomposed by 2-D DWT and SVD is applied on lower-level frequency region. Encrypted watermark is then embedded into this LL sub-band of the host image. A hybrid watermarking algorithm based on DWT-DCT is suggested by Akter et al. [3] . The authors applied 4thlevel DWT into the original image and select HL4 and LH4 sub-bands. The properties of DCT are performed to the coefficient of these said sub-bands. Concurrently, the watermark image is reformed and scramble it. The scrambled watermark image is then transformed into DCT. The duo of these modified host image and watermark is embedded to form the watermarked image. The reverse process is used to extract the watermark. This algorithm is tested through PSNR and MSE to evaluate the performance and compared the existing method. It can be seen the PSNR value is found 36.52 dB of the watermarked image before the attack and it is 30.21 dB after the attack. This method only used Additive White Gaussian Noise (AWGN) to prove the performance, but other significant attacks were not tested here. This method [12] presented a unique technique that showed a comprehensive rise of PSNR value. The host image and the watermark image are split into R, G, and B channels, and the single-level 2D DWT is applied to the selected frequency sub-bands. Increased levels of host image and watermark have been associated with 2D DFT and DCT respectfully. The SVD is performed on both images before the embedding. But this method is not being tested by a variety of attacks. Another method is approached by [13] , where DCT is used in host images and a watermark is embedded by a slightly modified version of Cox's formula. This system provides robustness upon adding a watermark in the lowfrequency regions compare with high-frequency regions. It is noted that some methods provide good PSNR values in terms of watermarked images, but the robustness is low for the watermark extraction procedure. The grayscale image works well in some approaches while several techniques produce better results in color images. Fewer algorithms show robustness upon geometric attacks where some other is applicable only for lean attacks. Considering the abovementioned difficulties discussed in the literature review, a novel hybrid watermarking procedure is approached in the presented work. This mechanism is developed to consider the grayscale and color images. Watermark embedding and extraction are evaluated in both types of images and robustness is examined in various types of attacks. This scheme is allowed an acceptable imperceptibility rate along with security issues. Digital watermarking is a good choice for the authentication and copyright protection of images. This has proven to be a serious impediment to a widespread misuse of information in a common communication environment like the internet [14] . The basic idea of image watermarking is to embed invisible or inaudible data within multimedia content. The copyright information is contained in the watermarked substance. The hidden data for such purposes are referred to as a watermark and the content can be an image, audio, or some other type of media in any of the formats available [15] . On that account, digital watermarking has been chosen for its wide range of applications in the field of computer science, cryptography, signal processing, and communications [16] . The digital watermarking technique comprises two processes-embedding process and extraction process. In the embedding phase, the secret information (known as a watermark) is inserted into the multimedia object (known as a cover image) and is called "watermarked image" [17] . This watermarked image is then transmitted through the communication channel and the stored watermark can be retrieved at the receiver end to ensure the validity of the digital data. This retrieval process is called "watermark extraction" [17] . The embedding and extraction process is schematically shown in Fig. 1 . Imperceptibility, robustness, and security are the key features of the watermarking method. Imperceptibility is computed by the visual affinity of the host image in comparison to the watermarked image [18] . The watermarking framework ought to be robust against any deliberate or accidental assault of the watermarked substance that can be a picture, sound, video, or text [13] . A watermark system is supposed to be secure if the unauthorized person cannot extract the watermark without having complete knowledge of the embedding algorithm, the detector, and the composition of the watermark [19] . The schematic diagram of digital watermarking is shown in Fig. 1 . Discrete wavelet transform is considered the most widely used transformation technique for digital watermarking. It is indeed useful to describe DWT as any wavelet transform for which wavelets are sampled discretely [31] . The strength of DWT over Fourier transform is its ability to produce a temporal resolution in which it captures both frequency and location information. The wavelet's translations and dilations are triggered by the mother wavelet [26] . The DWT splits an image into four non-overlapping multi-resolution sub-bands-LL, LH, HL, and HH [37] . The LL (low-low) level signifies the approximate part of the cover image while the other three levels, i.e. LH (low-high), HL (high-low), and HH (high-high) provide detailed information about the host image [33] . For further decomposition, any of the sub-bands are selected and hence divide into four levels. The decomposition method is replicated until the [32] . The maximum degree of decomposition seems to be the intensity of the watermarked image [33] . At each step of decomposition, the magnitude of DWT coefficients is greater in the lower band (LL) and smaller in the other three bands (LH, HL, and HH) [33] . As HVS (human visual system) is more sensitive to low-frequency parts (LL sub-band), so watermarks are ideally put in the three other sub-bands to maintain the quality of the original image [33] . A diagram, showing the steps in the DWT decomposition process is shown in Fig. 2 . Singular value decomposition is a mathematical transformation that is used for the factorization of a real or complex matrix with diverse applications in various areas of image processing [36] . The purpose of SVD is to minimize the complexity by splitting the non-negative image matrix into U × S × V T , where U and V denote the orthogonal matrices and S is called the diagonal matrix of singular values of the original matrix handled in decreasing order [26] . There are two key features of SVD to be used in automated watermarking techniques: [33] (1) The changes in singular values would inevitably affect the quality of the images. (2) The singular values of the image are therefore of high stability; they do not shift after numerous attacks. A graphical description of the procedure of SVD of an M × N image is presented in Fig. 3 [32] . In our work, we explore a new hybrid approach, a fusion of DWT and SVD, for the improved quality of watermark insertion and extraction procedure. The advantage of this proposed algorithm is that it has the properties of undetectability and durability. The blend of DWT and SVD will bring to light the potential mechanisms responsible for the owner's authenticity and robustness to several kinds of attacks. The suggested algorithm belongs to two parts-the watermark embedding and extraction algorithm. Both parts along with respective flowcharts have been described in detail in "Watermark Embedding Algorithm" and "Watermark Extracting Algorithm". A detailed description of the steps of watermark embedding is given below: Page 6 of 16 The flowchart of watermark embedding is presented in Fig. 4 . The procedure of watermark extraction is explained in the following Algorithm 2. The flowchart of watermark extraction is shown in Fig. 5 . The proposed algorithm has been accomplished using MAT-LAB R2016a software. This technique is carried out under several conditions with different types of host images and logo watermark image. The sizes of the host image are taken as 512 × 512 pixels and the watermark image as 256 × 256 pixels. Imperceptibility implies that the visual quality of the host image should not be skewed by the presence of the watermark [3] . Peak signal-to-noise ratio (PSNR) is used as a primary tool to show the visual effect between the host image and the watermarked image whereas MSE is calculated as the square of error amidst those images [34] . Besides, the Structural Similarity Index Measure (SSIM) and Normalized Correlation (NC) act as essential parameters for the evidence of invisibility. The range of SSIM varies from 0 to 1. Although 1 indicates the perfect match of the reconstructed image compares to the original one, the values range from 0.9 to 1 are designated as appropriate regenerated images. NC is also used to measure the similarity between two images. Mathematically, PSNR and MSE can be expressed as follows: Apart from PSNR, MSE, SSIM, and NC, a new metric known as feature similarity index (FSIM) has been applied to correlate the feature similarity measure among the host image and the watermarked image [35] for image quality assessment (IQA). The phase congruency (PC) and the gradient magnitude (GM) are the two main parameters in FSIM to measure the image quality [36] . At first, the feature similarity of phase congruency (PC) of host and watermarked images can be defined as where, S PC is the feature similarity of phase congruency (PC) between host image and watermarked image, PC h and PC WI are the phase congruency of host image and watermarked image, respectively, and T 1 is a positive constant for boosting the stability of S PC . Likewise, the similarity measure of GM value can be calculated as follows: where S GM is the similarity computation of gradient magnitude of both images (host and watermarked), G h and G WI are the gradient values of host and watermarked image and T 2 is the positive constant factor relying on the changing values of gradient magnitude. (1) PSNR(dB) = 10 log 10 MAX 2 MSE where Ω is the whole image spatial domain. An additional mathematical tool, called gradient magnitude similarity deviation (GMSD) has been used to evaluate the performance of image quality assessment. To predict the overall image quality, GMSD analyses the exploit of global variation of the gradient-based local-quality map [36] . The gradient is normally computed by transforming an image with a linear filter. The GMS map is represented pixel-wise and serves as the local-quality map of the distorted image. The gradient magnitude similarity deviation (GMSD) can be calculated as follows: where, N is the total number of pixels in the image, GMS is the gradient magnitude similarity at location i, and GMSM is the gradient magnitude similarity map at location i. The value of GMSD represents the range of magnitude of distortion in an image. The higher the GMSD score, the greater the distortion range, and hence, the lower the perceptual quality of the image. Initially, the test is performed for the grayscale and colored version of the same host image. The scaling factoralpha of the watermark image is chosen manually through a trial-and-error basis. The range beyond the values from 0.03 to 0.06 gives a drastic change of extracted watermark images. Thus, the scaling factor-alpha has been set within this range. Figure 6 shows the watermarked images of Lena (grayscale) and Lena (color) and the subsequent Table 1 displays the testimony of these images. The PSNR values of Lena (grayscale) and Lena (color) are found here as 43.8362 and 34.7266 dB. MSE, SSIM, NC, and FSIM values also validate the output. GMSD is a distortion index where a lower value indicates higher quality. Furthermore, Figs. 7 and 8 indicate the watermarked images of grayscale and color formats of Zelda and penguin Tables 2 and 3 convey the values of those images. It can be seen that the PSNR values inclusive of MSE, SSIM, and NC of Zelda and penguin provide well-founded results for watermarked images and extraction of the watermark process. The value of FSIM is also on a normalized scale. GMSD identically shows a very good appraisal which indicates the minimal distortion between the host and the watermarked images. The proposed method is also executed through some test images, taken from open-source databases, such as Berkeley Segmentation Dataset (BSD) [37] and THUR15K dataset [38] . The values of FSIM and GMSD show the validation of the proposed method. Figures 9 and 10 illustrate the watermarked and extracted watermark images from different test images of the specified datasets. Robustness implies that how efficiently the watermark can be extracted from various types of attacks employed in the watermarked image. Both geometric and non-geometric attacks are considered for stability assessment. Geometric attacks include cropping, rotation, and scaling. JPEG compression, median filtering, average filtering, noise, and histogram equalization are dealt with non-geometric attacks [20] . The Figs. 9, 10, 11, 12 and 13 illustrate the retrieved watermark (without noise) from the watermarked image and Tables 4, 5, and 6 summarize the range of parameters used in interpretation purpose. The following Table 7 shows the PSNR values that are retrieved from the several watermarked images under numerous attacks. Table 8 summarizes the NC (normalized coefficient) values of the extracted watermark, recovered from multiple attacked watermarked images. Table 9 indicates the comparison of the watermarked image and extracted watermark between the proposed method and existing methods for the grayscale image. The NC (normalized correlation) values of the extracted watermark (grayscale image) from different attacks are shown in Table 10 . Here is the chart in Table 11 , which shows the comparison of the proposed method with existing methods for colored images. The watermark extraction from the colored image under several attacks is compared in Table 12 . In SVD-based watermarking system, different types of errors, such as message error, false-negative, and false-positive errors, can occur. The most significant problem in the SVD-based image watermarking scheme is a false-positive error. This error happens during the extraction of the watermark process. A transformation technique along with SVD can resolve the issue. In this paper, we have applied multilevel DWT transform accompanying SVD to mitigate this error. Owing to DWT transform and to find out the singular values of LL and HH edges of host and watermark image and embed those singular values into the host part could inhibit the false-positive fallacy. This paper proposed an improved DWT-SVD-based hybrid approach which is proved to be a good mechanism for both grayscale and color images. The blending of the 1st level and the 2nd level of singular values are inserted into the lowerlevel and higher-level frequency regions of the cover image. It is said that adding singular values in the host image cause false-positive results, but our proposed approach has overcome this issue. We have applied our method in three types of duo images (grayscale and color) to exhibit the outcome. The authenticity and robustness are found at an acceptable rate for both types of images using the proposed method. More efforts will be taken in near future for further improvement of the imperceptibility and robustness, such as the incorporation of the modified Fibonacci sequence for watermark encryption and particle swarm optimization (PSO) for embedding purposes. We will also work on infusing multiple watermarks with the host image for more flexibility. Novel and robust image watermarking for copyright protection and integrity control. Circuits Syst Signal Process A robust color image watermarking based on SVD and DWT Digital image watermarking based on DWT-DCT: evaluate for a new embedding algorithm Performance analysis of spatial domain digital watermarking techniques A secure and robust block-based DWT-SVD image watermarking approach Digital image watermarking in RGB host using DWT, SVD, and PSO techniques Robust digital image watermarking using DWT+SVD approach An adaptive image watermarking method combining SVD and Wang-Landau sampling in DWT domain Image watermarking based on DWT-SVD Robust image watermarking using DWT and SVD for copyright protection A robust and secure DWT-SVD digital image watermarking using encrypted watermark for copyright protection of cheque image Digital image watermarking using optimized transform-domain approach Robustness analysis of a digital image watermarking technique for various frequency bands in DCT domain A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks A cascade DWT-DCT based digital watermarking scheme Comparison of digital watermarking techniques A new digital image watermarking algorithm based on image interlacing, DWT, DCT Comparative analysis of LSB, DCT, and DWT for digital watermarking A review paper on digital watermarking and its techniques Robust copyright protection of raster images using wavelet-based digital watermarking Digital image watermarking using dual-scrambling and singular value decomposition Combined technique for improving digital image watermarking Digital image watermarking and its optimization using genetic algorithm DWT-SVD combination method for copyrights protection A digital watermarking approach based on DCT domain combining QR code and chaotic theory Robust digital watermarking for coloured images using SVD and DWT technique Design of a hybrid digital watermarking algorithm with high robustness An imperceptible semi-blind image watermarking scheme in DWT-SVD domain using a zigzag embedding technique. Multimedia tools and applications Color image watermarking with watermark authentication against false positive detection using SVD A hybrid domain color image watermarking based on DWT-SVD A DWT-SVD based robust digital watermarking for digital images Performance evaluation of robust watermarking using DWT-SVD and RDWT-SVD A more secure transmission of medical images by two label DWT and SVD based watermarking technique Study and analysis of robust DWT-SVD domain based digital image watermarking technique using MAT-LAB Image quality assessment through FSIM, SSIM, MSE and PSNR-a comparative study FSIM: a feature similarity index for image quality assessment The Berkeley Segmentation Dataset (BSD) Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations The authors declare that they have no conflict of interest.Ethical Approval This article does not contain any studies with human participants or animals performed by any of the authors.