[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking

Published: 20 May 2023 Publication History

Abstract

In this paper, an analysis on hybrid Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) for image watermarking is carried out to investigate the effect of a deeper level of the SVD on imperceptibility and robustness to resist common signal processing and geometric attacks. For this purpose, we have designed two hybrid watermarking schemes, the first one with DWT and first level of SVD, whereas, in the second scheme, the same design is employed with a second level of SVD. In this experiment, a comprehensive analysis is performed on the two designed schemes and the effect of robustness and imperceptibility is compared in the first and second levels of SVD in each DWT sub-band. Having analyzed more than 100 medical and non-medical images in standard datasets and real medical samples of patients, the experimental outcomes show a remarkable increase in both imperceptibility and robustness in the second level of SVD, in comparison to the first level. In addition, the achieved result shows that the SVD2 scheme offers the highest imperceptibility in the LL sub-band (more than 60 dB on average PSNR), with satisfactory robustness against noise attacks, but less persistence in some geometric attacks such as cropping. For the HH sub-band, strong robustness against all types of tested of attacks is obtained, though its imperceptibility is slightly lower than the achieved PSNR in the LL sub-band. In HH sub-band, an average growth of 5 dB in PSNR and 2% in NC can be observed from the second level of SVD in comparison to the first level. These results make SVD2 a good candidate for content protection, especially for medical images.

References

[1]
Abdallah HA et al. Blind wavelet-based image watermarking International Journal of Signal Processing, Image Processing and Pattern Recognition 2011 4 1 15-28
[2]
Ahmadi SBB, Zhang G, Rabbani M, Boukela L, and Jelodar H An intelligent and blind dual color image watermarking for authentication and copyright protection Appl Intell 2021 51 1701-1732
[3]
Akhaee MA and Marvasti F A survey on digital data hiding schemes: principals, algorithms, and applications ISC Int J Inf Secur 2013 5 5
[4]
Ali M and Ahn CW An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain Signal Process 2014 94 545-556
[5]
Ali M, Ahn CW, and Siarry P Differential evolution algorithm for the selection of optimal scaling factors in image watermarking Eng Appl Artif Intell 2014 31 15-26
[6]
Ali M, Ahn CW, Pant M, and Siarry P An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony Inf Sci 2015 301 44-60
[7]
Ali M, Wook Ahn C, Pant M, Kumar S, Singh MK, and Saini D An optimized digital watermarking scheme based on invariant DC coefficients in spatial domain Electronics 2020 9 1428
[8]
Anand A, Singh AK (2020) RDWT-SVD-firefly based dual watermarking technique for medical images (workshop paper). In: 2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM), pp 366-372
[9]
Araghi TK (2019) Digital image watermarking and performance analysis of histogram modification based methods. In: Arai K, Kapoor S, Bhatia R (eds) Intelligent computing. SAI 2018. Advances in intelligent systems and computing, vol 858. Springer, Cham.
[10]
Araghi TK, Manaf ABA (2017) Evaluation of Digital Image Watermarking Techniques. In: International Conference of Reliable Information and Communication Technology, pp 361-368
[11]
Araghi TK and Manaf AA An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD Futur Gener Comput Syst 2019 101 1223-1246
[12]
Araghi TK, Manaf ABA, and Araghi MZSK Taxonomy and performance evaluation of feature based extraction techniques in digital image watermarking Int J Image Process Tech– IJIPT 2016 3 20-23
[13]
Araghi TK, Manaf ABA, Zamani M, and Araghi SK A survey on digital image watermarking techniques in spatial and transform domains Int J Adv Image Process Tech– IJIPT 2016 3 6-10
[14]
Araghi TK, Manaf AA, and Araghi SK A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition Expert Syst Appl 2018 112 208-228
[15]
Araghi TK, Alarood AA, Araghi SK (2021) Analysis and evaluation of template based methods against geometric attacks: a survey. In: Saeed F, Mohammed F, Al-Nahari A (eds) Innovative systems for intelligent health informatics. IRICT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 72. Springer, Cham.
[16]
Arora SM, Kadian P (2022) Enhanced image security through hybrid approach: protect your copyright over digital images. Wireless Communication Security, pp 35–57
[17]
Bansal M, Mishra A, Sharma A (2020) Optimized DWT SVD Based Image Watermarking Scheme Using Particle Swarm Optimization. In: International conference on computational science and its applications, pp 862–877
[18]
Bhuyan HK, Chakraborty C (2022) Explainable machine learning for data extraction across computational social system. In IEEE Transactions on Computational Social Systems.
[19]
Chakraborty C, Mishra K, Majhi SK, and Bhuyan HK Intelligent latency-aware tasks prioritization and offloading strategy in distributed fog-cloud of things IEEE Trans Industr Inform 2022 19 2099-2106
[20]
Chandrakar N and Bagga J Performance comparison of digital image watermarking techniques: a survey Int J Comput Appl Technol Res 2013 2 126-130
[21]
Chaturvedi N, Basha S (2012) Comparison of digital image watermarking methods DWT & DWT-DCT on the basis of PSNR. Image 2:1
[22]
Danyali H, Makhloghi M, and Tab FA Robust blind dwt based digital image watermarking using singular value decomposition Int J Innov Comput Inf Control 2012 8 4691-4703
[23]
Dhawan S et al (2022) An efficient steganography technique based on S2OA & DESAE model. Multimed Tools Appl 1–29
[24]
Dittmann J, Megias D, Lang A, Herrera-Joancomarti J (2006) Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity. In: Transactions on data hiding and multimedia security I, ed. Springer, pp 1–40
[25]
Guo X and Zhuang T-g A region-based lossless watermarking scheme for enhancing security of medical data J Digit Imaging 2009 22 53-64
[26]
Gupta M, Parmar G, Gupta R, and Saraswat M Discrete wavelet transform-based color image watermarking using uncorrelated color space and artificial bee colony Int J Comput Intell Syst 2015 8 364-380
[27]
Hussein E, Belal MA (2012) Digital watermarking techniques, applications and attacks applied to digital media: a survey. Threshold 5:6
[28]
Khanam T, Dhar PK, Kowsar S, and Kim J-M SVD-based image watermarking using the fast Walsh-Hadamard transform, key mapping, and coefficient ordering for ownership protection Symmetry 2020 12 52
[29]
Koohpayeh Araghi T, Abd Manaf A, Alarood A, and Zainol AB Host feasibility investigation to improve robustness in hybrid DWT+SVD based image watermarking schemes Adv Multimed 2018 2018 1609378
[30]
Mahajan PH, Bhalerao PB (2014) A review of digital watermarking strategies. Int J Adv Res Comput Sci Manag Stud 7
[31]
Makbol NM and Khoo BE A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition Digit Signal Process 2014 33 134-147
[32]
Makbol NM, Khoo BE, Rassem TH, and Loukhaoukha K A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection Inf Sci 2017 417 381-400
[33]
Makbol NM, Khoo BE, and Rassem TH Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain Multimed Tools Appl 2018 77 26845-26879
[34]
Mohammed AA, Salih DA, Saeed AM, and Kheder MQ An imperceptible semi-blind image watermarking scheme in DWT-SVD domain using a zigzag embedding technique Multimed Tools Appl 2020 79 32095-32118
[35]
Moon SK (2022) Authentication and security aspect of information privacy using anti-forensic audio–video embedding technique. In: Inventive systems and control: proceedings of ICISC 2022, ed. Springer, pp 157-171
[36]
Moon SK (2022) Application of forensic audio-video steganography technique to improve security, robustness, and authentication of secret data, Cham, pp 11–25
[37]
Nikolaidis A Local distortion resistant image watermarking relying on salient feature extraction EURASIP J Adv Signal Process 2012 2012 1-17
[38]
Nyeem H, Boles W, Boyd C (2012) On the robustness and security of digital image watermarking. In: Informatics, electronics & vision (ICIEV), 2012 international conference on, pp 1136–1141
[39]
Pan Z, Hu S, Ma X, and Wang L A new lossless data hiding method based on joint neighboring coding J Vis Commun Image Represent 2015 26 14-23
[40]
Qian Z, Zhang X, and Ren Y JPEG encryption for image rescaling in the encrypted domain J Vis Commun Image Represent 2015 26 9-13
[41]
Radiopaedia.org [Online]. Available: https://radiopaedia.org/cases?lang=us. Accessed 12 May 2023
[42]
Rawat N and Manchanda R Review of methodologies and techniques for digital watermarking Int J Emerg Technol Adv Eng 2014 4 4 237-240
[43]
Shojanazeri H, Adnan WAW, and Ahmad SMS Video watermarking techniques for copyright protection and content authentication Int J Comput Inf Syst Ind Manag Appl 2013 5 652-660
[44]
Singh AK, Dave M, and Mohan A Wavelet based image watermarking: futuristic concepts in information security Proc Natl Acad Sci India Sect A Phys Sci 2014 84 345-359
[45]
Tao H, Chongmin L, Zain JM, and Abdalla AN Robust image watermarking theories and techniques: a review J Appl Res Technol 2014 12 122-138
[46]
Thapa M, Sood SK, Sharma AM (2011) Digital image watermarking technique based on diferent attacks. Int J Adv Comput Sci Appl 2(4):14–19.
[47]
The USC-SIPI Image Database [Online]. Available: https://sipi.usc.edu/database/. Accessed 12 May 2023
[48]
Wan W et al (2022) A comprehensive survey on robust image watermarking. Neurocomputing.
[49]
Wang B and Zhao P An adaptive image watermarking method combining SVD and Wang-Landau sampling in DWT domain Mathematics 2020 8 691
[50]
Yuan X-C and Pun C-M Feature extraction and local Zernike moments based geometric invariant watermarking Multimed Tools Appl 2014 72 777-799
[51]
Zeng F, Bai H, Xiao K (2022) Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS. Secur Priv 5(4):e223

Cited By

View all
  • (2024)Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670934(1-10)Online publication date: 30-Jul-2024
  • (2024)Disinformation detection and source tracking using semi-fragile watermarking and blockchainProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3655718(136-143)Online publication date: 5-Jun-2024
  • (2024)Optimized Watermarking Using Artificial Bee Colony Algorithm and 6-D Hyperchaotic Map Based Image Cryptographic SchemeSN Computer Science10.1007/s42979-024-03344-95:8Online publication date: 28-Oct-2024

Index Terms

  1. Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Multimedia Tools and Applications
          Multimedia Tools and Applications  Volume 83, Issue 2
          Jan 2024
          3003 pages

          Publisher

          Kluwer Academic Publishers

          United States

          Publication History

          Published: 20 May 2023
          Accepted: 18 April 2023
          Revision received: 16 February 2023
          Received: 03 June 2022

          Author Tags

          1. Hybrid image watermarking
          2. DWT
          3. SVD1
          4. SVD2
          5. Security
          6. Robustness
          7. Imperceptibility

          Qualifiers

          • Research-article

          Funding Sources

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 11 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670934(1-10)Online publication date: 30-Jul-2024
          • (2024)Disinformation detection and source tracking using semi-fragile watermarking and blockchainProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3655718(136-143)Online publication date: 5-Jun-2024
          • (2024)Optimized Watermarking Using Artificial Bee Colony Algorithm and 6-D Hyperchaotic Map Based Image Cryptographic SchemeSN Computer Science10.1007/s42979-024-03344-95:8Online publication date: 28-Oct-2024

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media