Professional Documents
Culture Documents
https://doi.org/10.1007/s11227-021-03886-2
Abstract
With the wide spread of image information, it is an urgent problem to protect image
property rights and crack down on piracy. Watermarking algorithm is an effective
means to solve the problem of copyright protection. In this paper, we propose an
optimized image watermarking algorithm based on singular value decomposition
(SVD) and integer wavelet transform (IWT). First, the carrier images are divided
into blocks. Then, the block-based integer wavelet transform is performed, and the
singular value decomposition is performed in the low frequency part. Finally, the
first singular value is used to extract energy effectively, so as to improve the robust-
ness of digital watermarking. At the same time, genetic algorithm is used to opti-
mize the robustness and imperceptibility of image watermarking. Four classic gray
images, including Lena, baboon, peppers, and Goldhill, are used as carrier images to
test, the test results show that the watermarking algorithm has good imperceptibil-
ity, and robustness. Compared with other methods, the experimental results show
that the algorithm has good PSNR(peak signal-to-noise ratio) and NC(normalized
correlation coefficient) values. In the attacks including Gaussian noise, low-pass fil-
tering, changing the size, straight square error equalization, image blur, image con-
trast, JPEG compression, and gamma correction, the proposed method shows good
performance. The NC value of this method is better than that of the contrast method,
especially in Gaussian noise attack.
* Wen Qu
quwen2020@126.com
Extended author information available on the last page of the article
1Vol:.(1234567890)
3
An optimized image watermarking algorithm based on SVD and… 223
1 Introduction
With the rapid development of computer technology and the wide spread of net-
work information, the problem of digital copyright and property rights protection
has been widely concerned by industry and academia. The use of digital water-
marking technology to achieve digital copyright is the main means to achieve
property rights protection and combat piracy. In recent years, digital watermark-
ing has attracted the interest of a large number of researchers and becomes the
current research hotspot [1–3]. Digital steganography is an information security
mechanism that is general concerned with concealing the presence of a secret
data during mundane communication sessions by embedding the secret data in
another innocuous data in such a way that only the sender and intended recipient
are aware of the secret’s existence. In recent years,interest in steganography has
shifted from traditional and ancient practices into hiding secret data and media
objects, especially secret image files [4].
Digital watermarking is an effective way to protect information security,
achieve anti-counterfeiting traceability and copyright protection. It is also an
important branch and research direction in the field of information hiding tech-
nology. How to solve the contradiction among embedding capacity, invisibility,
and robustness of the algorithm has been a hot and difficult topic in this research.
According to the region of watermark embedding, watermarking algorithm is
mainly divided into spatial domain algorithm and transform domain algorithm.
The typical spatial domain algorithm the least significant bit method. LSB [5]
method is to use secret information bits to replace the unimportant part of the
original carrier, in order to achieve the purpose of secret information coding. The
algorithm has the advantage of large embedding capacity, but it lacks the ability
to resist geometric attacks. The transform domain algorithm is more and more
widely used because of its strong robustness. Among the main transform domain
methods currently used, wavelet transform has broad development prospects
because of its good time–frequency decomposition characteristics and compat-
ibility with the new generation of international compression standard JPEG2000
[6, 7].
The key problem of the current digital watermarking algorithm is how to
enhance the robustness of the watermark without affecting the imperceptibil-
ity of the watermark. At the same time, it solves how to embed multi-signature,
watermark, or label copyright owner. In recent years, singular value decomposi-
tion (SVD) can effectively extract the information of signal, the energy of the
extracted singular value has a decreasing trend, and it can extract the maximum
value of watermark energy [8–10]. In addition, the singular value has stability.
Therefore, the watermark algorithm based on singular value can achieve the pur-
pose of watermark robustness. Based on this, the current popular watermarking
algorithm usually adopts this algorithm to improve the robustness of the water-
mark. Many image watermarking algorithms based on singular value decomposi-
tion are proposed to solve the ownership problem. The key of image watermark-
ing based on singular value is the stability of singular value. Many authors have
13
224 T. Zhu et al.
2 Preliminary
To understand the proposed method more easily, in this section, we introduce related
background knowledge.
13
An optimized image watermarking algorithm based on SVD and… 225
transform domain on a few singular values of the matrix and their corresponding
singular vectors. In image processing, we use formula(1) to decompose the image
of M × N. In the formula (1), a represents the matrix of the image, U and V repre-
sent the matrix of M × M and N × N, T represents transpose, S is the non-negative
diagonal matrix of M × N.
(1) Separation: raw signal [Sk Separate into odd sequence [Ok And even sequence
j j−1
[Ek :
j−1
j−1 j j−1 j
[Ek = S2k , Ok = S2k+1 (2)
(2) Prediction: according to the correlation between data, odd series Ok By even
j−1
sequence Ek And the prediction results are obtained P(Ek ) And odd sequence
j−1 j−1
Among O� k represents the forecast difference, that is, the new prediction
j−1
E� k is the updated even sequence. After the integer wavelet transform, the
j−1
even sequence is taken as the low frequency part and the odd number sequence
as the high frequency part. The low frequency part can be further transformed
with the above separation, prediction, and update program.
13
226 T. Zhu et al.
2.3 Genetic algorithm
3 Algorithm description
First, the carrier images are divided into blocks. Then, the block-based integer wave-
let transform is performed, and the singular value decomposition is performed in the
low frequency part. Finally, the first singular value is used to extract energy effec-
tively, so as to improve the robustness of digital watermarking. At the same time,
genetic algorithm is used to optimize the robustness and imperceptibility of image
watermarking.
3.1 Watermark embedding
In this paper, singular value decomposition (SVD) is applied to the carrier image,
and the watermark is embedded and extracted from the watermarked image. The
watermark is encrypted by encryption algorithm. The watermark is divided into
two parts. Only the first part is used to add watermark, the second part is used to
embed the key. The part of the embedded key is the reconstructed watermark. The
encrypted watermark can be transmitted over the network, and the key is kept by the
copyright owner. In this respect, the key method is used. It can be used for water-
mark authentication simply and quickly. Because the two parts are independent of
each other, even if the other part has changed, the watermark will not be exposed.
This watermarking system is robust after many attacks.
13
An optimized image watermarking algorithm based on SVD and… 227
Suppose that the watermark encryption algorithm has obvious gradient vector
and normal distribution. Different geometric image encryption algorithms are also
proposed in the literature. The special case of affine transformation in the literature
is used in this algorithm because of its universality and good encryption perfor-
mance. Suppose the size of the watermark image is N × N , the encryption formula
of watermark image is as follows:
( � ) [( )( ) ( )]
X A B X E
Y�
=
C D Y
+
F
mod (N) (5)
M and N in the formula (6) are the length and width of the watermark image,
respectively.
Step 5: after obtaining the maximum singular value of each block, the first singular
value of Si,j (1, 1) is quantized by the quantization step size, which can adaptively
adjust the watermark strength. A small quantization step can improve the imper-
ceptibility of the watermark, and a large quantization step can increase the robust-
ness of the watermark. Therefore, the quantization step can be used to weigh the
13
228 T. Zhu et al.
imperceptibility and robustness of the watermark. Because the first singular value
is very stable and has the maximum energy, the watermark can still be extracted
with small changes embedded in the watermark.
Step 6: make Di,j = Δ mod Si,j (1, 1) , wi,j is the watermark generated before. The
watermark algorithm is as follows:
If wi,j = 0 , then
{
Si,j (1, 1) − Di,j + Δ∕4 Di,j ∈ [0, 3Δ∕4]
(7)
�
Si,j (1, 1) =
Si,j (1, 1) − Di,j + 5Δ∕4 Di,j ∈ [3Δ∕4, Δ]
3.2 Watermark extraction
13
An optimized image watermarking algorithm based on SVD and… 229
{
0 D�i,j ∈ [0, Δ∕2)
w�i,j = (9)
1 D�i,j ∈ [Δ∕2, Δ]
Step 5: decrypt the watermark with the same key of the embedded algorithm. After
decryption, the meaningful watermark image can be extracted.
3.3 Watermark optimization
Start
Randomly initialize
Yes Maximum
End
iterations?
No
Calculate the step size
Yes Calculate
The biggest attack
objective solution
No
Select optimal
Extract the watermark value
13
230 T. Zhu et al.
4 Evaluation
13
An optimized image watermarking algorithm based on SVD and… 231
Fig. 4 Carrier images
whole algorithm is 5S. It can be seen that the execution time of the shaping algorithm
is very fast due to the use of integer wavelet transform. For the watermark capacity, due
to the limitation of watermark energy and noise energy at all pixel positions, the analy-
sis of watermark capacity mainly focuses on the change trend of watermark capacity
to meet the requirements of watermark, and some practical examples are considered.
The capacity of watermark is calculated by common algorithm, which is expressed as
follows:
1 P
C= log (1 + w ) (11)
2 2 Pn
13
232 T. Zhu et al.
Pn is the energy of the carrier image. Pw is the energy of the watermark image.
By using formula 10, we get the watermark capacity value of 4, which can fully
meet the requirements of the watermark system.
PSNR is the abbreviation of peak signal-to-noise ratio, which is an objective
standard to evaluate image quality. The unit of PSNR is dB. The higher the PSNR is,
the smaller the distortion is.
4.1 Imperceptibility test
4.2 Robustness test
13
An optimized image watermarking algorithm based on SVD and… 233
20
15
10
5
0
a b c d e f g h
attack
13
234 T. Zhu et al.
0.96
0.95
0.94
0.93
0.92
a b c d e f g h
attack
adding attacks, which proves that the watermark has excellent performance of high
robustness.
4.3 Comparison of algorithms
13
An optimized image watermarking algorithm based on SVD and… 235
0.92
0.9
0.88
0.86
0.84
0.82
a b c d e f g h
attack
5 Conclusion
Acknowledgements The work of Wen Qu was supported by the Science and Technology Research Pro-
ject in Department of Education of JiangxiProvince under Grant GJJ191599.
References
1. Adams R, Bischof L (2002) Seeded region growing. IEEE Trans Pattern Anal Mach Intell 16(6):641–647
2. Xuan TP, Siarry P, Oulhadj H (2018) Integrating fuzzy entropy clustering with an improved PSO for MRI
brain image segmentation. Appl Soft Comput 65, S1568494618300097.
3. Niu Y, Chen J, Wenzhong G (2018) Meta-metric for saliency detection evaluation metrics based on appli-
cation preference. Multimed Tools Appl Online Public 77(20):26351–26369
4. Xu Y, Zhu C, Li C, Zhang Q, Meng X, Wang X (2018) Field crop segmentation based on color coefficient
reverse mutation particle swarm optimization algorithm. Trans Chinese Soc Agric Eng
5. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding effi-
ciency and security in digital steganography[D]. The University of Buckingham, United Kingdom
13
236 T. Zhu et al.
6. Thakkar F, Srivastava VK (2021) An adaptive, secure and imperceptive image watermarking using swarm
intelligence, Arnold transform, SVD and DWT. Multimed Tools Appl 1–18
7. Priya C, Ramya C (2020) Robust and secure video watermarking based on cellular automata and singu-
lar value decomposition for copyright protection. Circ Syst Sign Process DOI:https://doi.org/10.1007/
s00034-020-01585-6
8. Chen X, Li A, Xue’e Z, Wenzhong G, Gang H (2015) Runtime model based approach to IoT application
development. Front Comp Sci 9(4):540–553
9. Chakraborty R, Sushil R, Garg ML (2018) An improved pso-based multilevel image segmentation tech-
nique using minimum cross-entropy thresholding. Arab J Sci Eng (13), 1–16
10. Wenzhong G, Guolong C (2015) Human action recognition via multi-task learning base on spatial-
temporal feature. Inform Sci 320, 418–428
11. Wang S, Guo W (2017) Robust co-clustering via dual local learning and high-order matrix factoriza-
tion. Knowl-Based Syst 138:176–187
12. Dong G, Xie M (2005) Color clustering and learning for image segmentation based on neural networks.
IEEE Trans Neural Netw 16(4):925–936
13. Davis LS (1975) A survey of edge detection techniques. Comput Graph Image Process 4(3), 248–270
14. Ernawan F (2016) Robust image watermarking based on psychovisual threshold. J ICT Res Appl
10(3):228–242
15. Wang S, Wenzhong G (2017) Robust co-clustering via dual local learning and high-order matrix fac-
torization. Knowl-Based Syst 138:176–187
16. Samat NA, Salleh MNM (2017) A study of data imputation using fuzzy C-means with particle swarm
optimization
17. Liu G, Huang X, Wenzhong G, Yuzhen N, Guolong C (2015) Multilayer obstacle-avoiding X-archi-
tecture steiner minimal tree construction based on particle swarm optimization. IEEE Trans Cybern
45(5):989–1002
18. Jones G, Willett P, Glen RC, Leach AR, Taylor R (1997) Development and validation of agenetic algo-
rithm for flexible docking 267, 0–748
19. Kang LL et al (2019) Selecting hyper-parameters of gaussian process regression based on non-inertial
particle swarm optimization in internet of things. IEEE ACCESS 7:59504–59513
20. Kang LL, Chen RS, Cao WL et al (2020) Non-inertial opposition-based particle swarm optimization
and its theoretical analysis for deep learning applications. Appl Soft Comput 88: 106038
21. Kun G, Wenzhong G, Yuzhong C, Qirong Q, Qishan Z (2015) Community discovery by propagating
local and global information based on the MapReduce model. Inform Sci 323, 73–93
22. Lin B, Guo W, Xiong N et al (2016) A pretreatment workflow scheduling approach for big data applica-
tions in multicloud environments. IEEE Trans Netw Serv Manage 13(3):581–594
23. Mirghasemi S, Andreae P, Zhang M, Rayudu R (2017) Severely noisy image segmentation via wavelet
shrinkage using PSO and Fuzzy C-Means.Comput Intell
24. RahkarFarshi T, Demirci R, Feiziderakhshi MR (2018) Image clustering with optimization algorithms
and color space. Entropy 20(4), 296
25. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE
Trans Multimedia 4(2):121–128
26. Niu YZ, Lin W, Ke X et al (2017) (2017) Fitting-based optimization for image visual salient object
detection. IET Comput Vision 11(2):161–172
27. Pham TX, Siarry P, Oulhadj H (2017) Image clustering using improved particle swarm optimization
28. Ostu N (2007) A threshold selection method from gray-histogram. IEEE Trans Syst Man Cybern
9(1):62–66
29. Shnayderman A, Gusev A, Eskicioglu AM (2006) An SVD-based grayscale image quality measure for
local and global assessment. IEEE Trans Image Process 15: 422–429.
Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published
maps and institutional affiliations.
13
An optimized image watermarking algorithm based on SVD and… 237
13