Efficient invisible color image watermarking based on chaos

Belkacem Samia, Messaoudi Noureddine

Abstract


Several difficulties are faced in developing a robust and transparent color image watermarking system, which requires the blending of the human visual system (HVS) during its design. Therefore, employing masks that take into account the features of HVSs has become a very effective tool for boosting robustness requirements without significant alterations in image imperceptibility. The present article offers watermarking strategy for colored images employing a reverse self-reference image in conjunction with the HVS constraint. A color image first undergoes conversion through the Red, Green, and Blue (RGB) format to the National Television Systems Committee (NTSC) space. The reference image is derived from the luminance channel through the discrete wavelet transform (DWT) domain. However, the chaotic map serves to generate the watermark, and a 2D torus automorphism is subsequently used to scramble the watermark. Therefore, the watermark is scrambled and placed in the reference image. Moreover, the detecting phase involves the host image, where the reference image is extracted from both the host and the image with a watermark, and the correlation is subsequently used to assess the similarity between the retrieved and the introduced watermark. The proposed watermarking scheme can retain the watermarked image's perceptibility justified by the PSNR. In addition, it achieves high robustness to withstand a wide array of attacks.

 


Keywords


Attacks; Chaotic map; Copyright protection; Digital image watermarking; DWT; HVS; NTSC; Reverse self-reference image

References


S. Tyagi, H. V. Singh, R. Agarwal, and S. K. Gangwar, ‘Digital watermarking techniques for security applications’, in 2016 International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES), Sultanpur, India: IEEE, Mar. 2016, pp. 379–382. doi: 10.1109/ICETEESES.2016.7581413.

M. A. Jabaar and S. N. Alsaad, ‘Detection of Spliced Images in Social Media Application’, in 2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM), Mosul, Iraq: IEEE, Aug. 2021, pp. 63–69. doi: 10.1109/ICCITM53167.2021.9677737.

H. Khalid, D. Mohamed, and F. Mostapha, ‘Robust Color Images Watermarking Using New Fractional-Order Exponent Moments’, IEEE Access, 2021. [Online]. Available: https://ieeexplore.ieee.org/document/9383223

F. Ernawan, D. Ariatmanto, and A. Firdaus, ‘An Improved Image Watermarking by Modifying Selected DWT-DCT Coefficients’, IEEE Access, vol. 9, pp. 45474–45485, 2021, doi: 10.1109/ACCESS.2021.3067245.

5. L. Verma and S. Pratap Singh Chauhan, ‘A Review on Digital Image Watermarking Using Transformation and Optimization Techniques’, in 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India: IEEE, Dec. 2020, pp. 1008–1012. doi: 10.1109/ICACCCN51052.2020.9362885.

R. Safabakhsh, S. Zaboli, and A. Tabibiazar, ‘Digital watermarking on still images using wavelet transform’, in International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., Las Vegas, NV, USA: IEEE, 2004, pp. 671-675 Vol.1. doi: 10.1109/ITCC.2004.1286543.

D. R. I. M. Setiadi, ‘Improved payload capacity in LSB image steganography uses dilated hybrid edge detection’, J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 2, pp. 104–114, 2022, doi: https://doi.org/10.1016/j.jksuci.2019.12.007.

Y. Zhaoning, L. Yan, and G. Tiegang, ‘A lossless self-recovery watermarking scheme with JPEG-LS compression’, J. Inf. Secur. Appl., vol. 58, p. 102733, May 2021, doi: 10.1016/j.jisa.2020.102733.

V. M. Potdar, S. Han, and E. Chang, ‘A survey of digital image watermarking techniques’, in INDIN ’05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005., Aug. 2005, pp. 709–716. doi: 10.1109/INDIN.2005.1560462.

S. Bagheri Baba Ahmadi, G. Zhang, S. Wei, and L. Boukela, ‘An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics’, Vis. Comput., vol. 37, no. 2, pp. 385–409, Feb. 2021, doi: 10.1007/s00371-020-01808-6.

D. Jabeen, S. M. G. Monir, S. Noor, M. Rafiullah, and M. A. Jatoi, ‘Color image watermarking using spatio-chromatic complex Hadamard transform in sequency domain’, World J. Eng., vol. 19, no. 5, pp. 658–666, Aug. 2022, doi: 10.1108/WJE-03-2021-0176.

S. Belkacem, Z. Dibi, A. Bouridane, and M. Laadjel, ‘Color Image Watermarking based on Chaotic Map’, in 2007 14th IEEE International Conference on Electronics, Circuits and Systems, Marrakech: IEEE, Dec. 2007, pp. 343–346. doi: 10.1109/ICECS.2007.4511000.

D. Algarni, N. F. Soliman, H. A. Abdallah, and F. E. Abd El-Samie, ‘Encryption of ECG signals for telemedicine applications’, Multimed. Tools Appl., vol. 80, no. 7, pp. 10679–10703, Mar. 2021, doi: 10.1007/s11042-020-09369-5.

M. Jamali, M. Bagheri, N. Karimi, and S. Samavi, ‘Robustness and Imperceptibility Enhancement in Watermarked Images by Color Transformation’. arXiv, Nov. 02, 2019. doi: 10.48550/arXiv.1911.00772.

M. Kutter, F. D. Jordan, and F. Bossen, ‘Digital signature of color images using amplitude modulation’, presented at the Electronic Imaging ’97, I. K. Sethi and R. C. Jain, Eds., San Jose, CA, Jan. 1997, pp. 518–526. doi: 10.1117/12.263442.

N. Ahmidi and R. Safabakhsh, ‘A novel DCT-based approach for secure color image watermarking’, in International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., Las Vegas, NV, USA: IEEE, 2004, pp. 709-713 Vol.2. doi: 10.1109/ITCC.2004.1286738.

17. T. Singh, R. Lal Dua, S. Agrawal, and A. Acharya, ‘Detection of Defects in Glass Sheet using C. S. C based Segmentation Method’, Int. J. Comput. Appl., vol. 68, no. 14, pp. 29–32, Apr. 2013, doi: 10.5120/11650-7152.

M. Khalili and D. Asatryan, ‘Color spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map’, IET Signal Process., vol. 7, no. 3, pp. 177–187, 2013, doi: 10.1049/iet-spr.2012.0380.

M. N. Maatouk and N. E. B. Amara, ‘Adaptive Watermarking Algorithm of Color Images of Ancient Documents on YIQ-PCA Color Space’, in International Joint Conference, Á. Herrero, B. Baruque, J. Sedano, H. Quintián, and E. Corchado, Eds., in Advances in Intelligent Systems and Computing. Cham: Springer International Publishing, 2015, pp. 75–86. doi: 10.1007/978-3-319-19713-5_7.

J.-L. Liu, D.-C. Lou, M.-C. Chang, and H.-K. Tso, ‘A robust watermarking scheme using self-reference image’, Comput. Stand. Interfaces, vol. 28, no. 3, pp. 356–367, Jan. 2006, doi: 10.1016/j.csi.2005.07.001.

D. Vaishnavi and T. S. Subashini, ‘Robust and Invisible Image Watermarking in RGB Color Space Using SVD’, Procedia Comput. Sci., vol. 46, pp. 1770–1777, Jan. 2015, doi: 10.1016/j.procs.2015.02.130.

Mohammed, ‘A blind and robust color image watermarking scheme based on DCT and DWT domains | SpringerLink’, 2023. https://link.springer.com/article/10.1007/s11042-023-14797-0 (accessed Aug. 11, 2023).

G. Sun and Y. Yu, ‘DWT Based Watermarking Algorithm of Color Images’, in 2007 2nd IEEE Conference on Industrial Electronics and Applications, May 2007, pp. 1823–1826. doi: 10.1109/ICIEA.2007.4318725.

Q. Su, X. Liu, and W. Yang, ‘A watermarking algorithm for color image based on YIQ color space and Integer Wavelet Transform’, in 2009 International Conference on Image Analysis and Signal Processing, Apr. 2009, pp. 70–73. doi: 10.1109/IASP.2009.5054573.

B. L. Gunjal and S. N. Mali, ‘Secured color image watermarking technique in DWT-DCT domain’, Int. J. Comput. Sci. Eng. Inf. Technol. IJCSEIT, vol. 1, no. 3, 2011, [Online]. Available: https://arxiv.org/abs/1109.2325

Q. Liu, ‘An Adaptive Blind Watermarking Algorithm for Color Image’, Indones. J. Electr. Eng. Comput. Sci., vol. 11, no. 1, Art. no. 1, Jan. 2013.

E. Dey, S. Majumder, and A. Neelim Mazumder, ‘A new approach to color image watermarking based on joint DWT-SVD domain in YIQ color space’, in 2017 3rd International Conference on Electrical Information and Communication Technology (EICT), Dec. 2017, pp. 1–6. doi: 10.1109/EICT.2017.8275190.

S. S. Jamal, T. Shah, and I. Hussain, ‘An efficient scheme for digital watermarking using chaotic map’, Nonlinear Dyn., vol. 73, no. 3, pp. 1469–1474, Aug. 2013, doi: 10.1007/s11071-013-0877-9.

Mooney, J. G. Keating, and I. Pitas, ‘A comparative study of chaotic and white noise signals in digital watermarking’, Chaos Solitons Fractals, vol. 35, no. 5, pp. 913–921, Mar. 2008, doi: 10.1016/j.chaos.2006.05.073.

Feng, X. Li, Y. Jie, C. Guo, and H. Fu, ‘A Novel semi fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration’, Mob. Netw. Appl., vol. 25, no. 1, pp. 82–94, Feb. 2020, doi: 10.1007/s11036-018-1186-9.

R. R. Nair and T. Singh, ‘Multi‐sensor medical image fusion using pyramid‐based DWT: a multi‐resolution approach’, IET Image Process., vol. 13, no. 9, pp. 1447–1459, Jul. 2019, doi: 10.1049/iet-ipr.2018.6556.

S. Mukhopadhyay, S. Biswas, A. Bardhan Roy, and N. Dey, ‘Wavelet Based QRS Complex Detection of ECG Signal’, arXiv e-prints. Sep. 01, 2012. doi: 10.48550/arXiv.1209.1563.

M. Eshaghi and M. R. K. Mollaei, ‘A new algorithm for voice activity detection based on wavelet packets’, in 2008 Second International Conference on Electrical Engineering, Lahore, Pakistan: IEEE, Mar. 2008, pp. 1–4. doi: 10.1109/ICEE.2008.4553891.

B. Plaaintz, W. S. Stiles, ‘Medical image Watermarking: A Study on Image Degradation’, Proceedings of the Australian Pattern Recognition Society (APRS) Workshop on Digital Image Computing (WDIC), Brisbane Australia, 2005.

L. Sheugh and S. H. Alizadeh, ‘A note on pearson correlation coefficient as a metric of similarity in recommender system’, in 2015 AI & Robotics (IRANOPEN), Qazvin: IEEE, Apr. 2015, pp. 1–6. doi: 10.1109/RIOS.2015.7270736.

S. Boujerfaoui, R. Riad, H. Douzi, F. Ros, and R. Harba, ‘Image Watermarking between Conventional and Learning-Based Techniques: A Literature Review’, Electronics, vol. 12, no. 1, p. 74, Dec. 2022, doi: 10.3390/electronics12010074.

S.-J. Wöhnert, K. H. Wöhnert, E. Almamedov, C. Frank, and V. Skwarek, ‘A study on the use of perceptual hashing to detect manipulation of embedded messages in images’. arXiv, Feb. 28, 2023. Accessed: Jul. 29, 2023. [Online]. Available: http://arxiv.org/abs/2303.00092

Song, C., Sudirman, S., Merabti, M., & Llewellyn-Jones, D. (2010). Analysis of Digital Image Watermark Attacks. 2010 7th IEEE Consumer Communications and Networking Conference, 1–5. https://doi.org/10.1109/CCNC.2010.5421631


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats

503 Service Unavailable

Service Unavailable

The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.

Additionally, a 503 Service Unavailable error was encountered while trying to use an ErrorDocument to handle the request.