1 Introduction

With the rapid development of multimedia, it has become easy to obtain the intellectual properties. Consequently, the multimedia owners need more than ever before to protect their data and to prevent the unauthorized use of their data. Digital watermarking has attracted considerable attention and has several applications including copyright protection and fingerprinting of the multimedia for tracing and data authentication [1, 2].

According to the embedding domain, watermarking schemes can be categorized into two groups, spatial domain schemes and transform domain schemes. The schemes in the first category have the advantages of low complexity and easy implementation. However, these schemes generally lack the robustness against lossy image compression. On the other hand, a more robust watermarking can be achieved by the schemes in the second category by embedding the watermark into the transform coefficients of the host multimedia. In an effort to further improve the robustness of these transform domain schemes, in recent years, a number of watermarking schemes have been developed using singular value decomposition in the transform domain [37]. A feature of the singular value decomposition pertinent to digital watermarking is that the singular values of an image do not change significantly when common image processing attacks are performed on an image, and thus yields a more robust watermarking.

In [3], the authors have proposed a watermarking scheme based on DCT and SVD, where the watermark image is embedded into the singular value decomposition matrix of the DC values of the transformed cover image. This scheme provides a good robustness against general processing attacks while providing good imperceptibility, but the scheme lacks robustness against other attacks such as, contrast adjustment, rotation and cropping. In 2010, Lai and Tsai [4] proposed a watermarking scheme based on DWT and SVD. The watermark image is divided into two parts and embedded by modifying the singular values of the middle sub-bands of the one-level decomposed cover image. The proposed scheme has a good robustness against some kinds of attacks such as JPEG compression, rescaling and histogram equalization, but not so against other types of attacks such as, noise corruption or rotation. In [6], a DCT-SVD based watermarking scheme has been proposed, where the watermark image is embedded by modifying the singular values of each sub-band of the DCT coefficients by making use of the singular values of the watermark image. The proposed algorithm has a good resistant against general image processing attacks such as, noise corruption, contrast adjustment, and brightening adjustment, but lack the robustness against attacks such as, rotation, histogram equalization and translation. In [7], the authors have proposed a watermarking scheme based on DWT-SVD using Arnold transform. In this scheme, a watermark image is embedded into the low sub-band of the one-level decomposed cover image. The proposed scheme provides a good robustness against rotation, rescaling and contrast adjustment attacks, but not so against other types of attacks such as, gamma correction, histogram equalization and cropping. In general, the main limitation of the watermarking schemes described in [37] is that they, in general, are not robust against the different types of attacks.

In this paper, a DCT-SVD based digital image watermarking scheme that makes use of Arnold transform is developed with a view to providing improved robustness against different types of attacks while preserving the perceptual quality of the cover image. The paper is organized as follows. In Sect. 2, image scrambling are briefly reviewed. In Sect. 3, a new DCT-SVD based digital image watermarking scheme that makes use of the Arnold transform is proposed. In Sect. 4, experimental results demonstrating the performance of the proposed algorithm are presented. The performance of the proposed algorithm is also compared with those of other existing algorithms in this section. Finally, Sect. 5 concludes this paper by summarizing and highlighting the salient contributions of this work.

2 Background

2.1 Image Scrambling

Image scrambling process is an important image encryption technique that has been used in digital image watermarking. The objective of digital image scrambling is to transform a meaningful image into unintelligible image that prevents unauthorized users from understanding its true content. Without the knowledge of the image scrambling algorithm and the secret key, an unauthorized user (attacker) would not be able to recover the original watermark, even if it has been extracted from the watermarked data. Thus, scrambling provides an additional security for the digital data. Furthermore, since scrambling of an image, eliminates the spatial correlation of its pixels, the robustness of a watermarking scheme can be further improved.

Arnold Transform. The Arnold transform was introduced by Arnold [8]. For an image C with \(N\times N\) pixels, the Arnold transform operation on the position (xy) pixel is given by

$$\begin{aligned} \left( \begin{array}{c} x^{'}\\ y^{'} \end{array}\right) =\left( \begin{array}{cc} 1&{} 1 \\ 1 &{} 2 \end{array}\right) \left( \begin{array}{c} x\\ y \end{array}\right) mod{N} \end{aligned}$$
(1)

The Arnold transform, which changes the positions of the pixels, can be repeated many times in order to obtain a scrambled image. However, due to the periodicity of the Arnold transformation, the original image can be restored after a certain number of iterations. Dyson and Falk [9] have studied the properties of the Arnold transform and pointed out that the transform given by (1) has a period \(T_{N} \le {N^2}/2\), for \(N > 2\).

Anti-Arnold Transform. Use of the Arnold transform periodicity on a scrambled image to recover the original image could be achieved at the expense of possibly a large computational complexity depending on how many iterations have already been used to obtain the scrambled image. For this reason the authors in [10] have obtained the anti-Arnold transform. The anti-Arnold transform is given by

$$\begin{aligned} \left( \begin{array}{c} x\\ y \end{array}\right) =\left( \begin{array}{cc} 2&{} -1 \\ -1 &{} 1 \end{array}\right) \left( \begin{array}{c} x^{'}\\ y^{'} \end{array}\right) mod{N} \end{aligned}$$
(2)

If a scrambled image is obtained by using n iterations of the operation of the Arnold transform, it needs the same number of iterations to recover the original image using the anti-Arnold transform. Therefore, the use of anti-Arnold transform to recover the original image can provide significant savings in computation, if \(n \ll T_{N}\), as depicted in Fig. 1.

Fig. 1.
figure 1

Arnold and Anti-Arnold transforms.

3 Proposed Watermarking Scheme

3.1 Watermark Embedding Scheme

The discrete cosine transform is first applied to an \(M\times M\) cover image, c. Next, the entire array of the DCT coefficients are zig-zag scanned, then the scanned coefficients are mapped in a zig-zag manner into the subbands \(B_{1}, B_{2}, B_{3}\) and \(B_{4}\) starting from the subband \(B_{1}\), and ending with the subband \(B_{4}\), as depicted in Fig. 2. Then, each subband is individually made to undergo an SVD operation. Next, an \( N\times N\) \((2N\le M)\) watermark image is scrambled by applying r iterations of the Arnold transform. The number of iterations r is saved as a secret key, to be used during the extraction process to recover the original watermark image. The singular value matrix of each subband is then modified by adding to this matrix the scrambled watermark image. The resulting subband image \(S_{k}+\alpha W'\) (\(k= 1,2,\ldots ,4\)) is singular value decomposed to obtain the singular value matrix \(S_{wk}^{*}\) of the watermarked subband. The subband watermarked DCT coefficients are obtained by augmenting \(S_{wk}^{*}\) with \(U_{k}\) and \(V_{k}\) as \(B_{k}^{*}=U_{k} S_{wk}^{*} V_{k}^{T}\). Finally, the modified DCT coefficients are mapped back to their original positions, followed by an inverse discrete cosine transform operation to obtain the watermarked image. The proposed watermark embedding scheme is presented as Algorithm 1.

figure a
Fig. 2.
figure 2

(a) Zig-zag scanning of the 2-D discrete cosine transform coefficients. (b) Mapping of the scanned DCT coefficients into four subbands.

3.2 Watermark Extraction Scheme

The discrete cosine transform operation is applied to the watermarked image \(c_{w}\), possibly after attack, followed by a re-arranging of the DCT coefficients into four subbands \(B_{w1}, B_{w2}, B_{w3}\) and \(B_{w4}\) through a zig-zag scanning of the coefficients. Then, each subband is individually made to undergo an SVD operation. Next, the singular value matrix of each subband \(S'_{wk}\) is augmented with \(U_{wk}\) and \(V_{wk}^{T}\) to obtain \(D'_{k}= U_{wk} S'_{wk} V_{wk}^{T}\) (\(k= 1,2,\ldots ,4\)). A scrambled watermark image is extracted from each subband as \(W{'}_{k}^{*} = (D'_{k}-S_{k})/ \alpha \), followed by an application of r iterations of the anti-Arnold transform to obtain the original watermark image. It should be noted that the number of iterations r of the anti-Arnold transform is used as a secret key during the extraction process. The proposed watermark extraction scheme is summarized as Algorithm 2.

figure b

4 Experimental Results and Discussion

The proposed watermarking scheme is implemented using MATLAB (R2012a) on a PC with a 1.6-GHz AMD E-350 processor, 3-GB RAM, and Microsoft Windows 7 operating system. Extensive experiments are conducted to demonstrate the performance of the proposed scheme. Three gray-scale cover images, Lena, Pirate, and Couple, and three watermark images, Boat, Peppers, and Cameraman, as depicted in Fig. 3, are used in these experiments. The size of each cover image is \(256 \times 256\) and that of each watermark image is \(128 \times 128\).

Fig. 3.
figure 3

Cover images: (a) Lena, (b) Pirate, and (c) Couple. Watermark images: (d) Boat, (e) Peppers, and (f) Cameraman.

Figure 4 shows an example of a watermarked image and the extracted watermark image obtained by applying the proposed watermarking scheme. It is seen from this figure that the embedded watermark dose not degrade the perceptual quality of the cover image, and the proposed scheme is able to extract the watermark images successfully from the un-attacked watermarked image.

Fig. 4.
figure 4

(a) Cover image, Lena. (b) Watermark image, Boat. (c) Watermarked image. (d) The watermark image extracted from the watermarked image.

For objective evaluation of the perceptual quality of watermarked image, the peak signal-to-noise ratio (PSNR) is used [11]. The PSNR is given by

$$\begin{aligned} PSNR= 10 \log _{10} \frac{MAX^{2}}{MSE} \end{aligned}$$
(3)

In general, a PSNR value is higher than 30dB is considered to be an indication of good perceptual quality of the watermarked image [11]. Table 1 gives the PSNR values of the various watermarked images obtained by using the proposed scheme. This table clearly indicates that the embedded watermark does not degrade the perceptual quality of the cover image, and thus the proposed embedding scheme guarantees the imperceptibility of the watermark.

Table 1. PSNR values (in dB) of various watermarked images

To investigate the robustness of the proposed watermarking scheme, each watermarked image obtained by using the proposed watermark embedding scheme is subjected to different types of attacks. After each of these attacks, we extract four watermarks using the proposed watermark extraction scheme and then select the one having the largest normalized correlation coefficient between the extracted and the original watermark images. The normalized correlation (NC) between the original \(N\times N\) watermark image W and the extracted watermark image \(W^{*}\) is given by

$$\begin{aligned} NC= \frac{{\sum _{i=1}^{N}}{\sum _{j=1}^{N}}(W_{ij})(W_{ij}^{*})}{\sqrt{{\sum _{i=1}^{N}}{\sum _{j=1}^{N}}(W_{ij}^{2})} \sqrt{{\sum _{i=1}^{N}}{\sum _{j=1}^{N}}(W_{ij}^{*2})}} \end{aligned}$$
(4)

Figure 5 shows the watermarked Lena images, each subjected to one type of attack, and the watermark images extracted from the attacked images. It is seen from this figure that the proposed effectively resists different types of attacks and is able to extract the watermark images with high perceptual quality.

Fig. 5.
figure 5

Watermarked Lena image attacked by different types of attacks and the extracted watermark images.

In order to provide an objective analysis of the robustness of the proposed scheme, the normalized correlation coefficient between the extracted and the original watermark images is computed. Table 2 gives the values of the correlation coefficient using the cover images, Lena, Couple, and Pirate, and the same watermark image, Boat. It is seen from this table that the values of the correlation coefficient are almost invariably larger than 0.9 for the various attacks regardless of the images used in the experiments.

Table 2. Values of the correlation coefficient between the extracted and original watermark images

We also implement the SVD based watermarking scheme of [5], the DCT-SVD based watermarking algorithm of [6], and the DWT-SVD based watermarking scheme of [7], in order to compare the performance of the proposed scheme with theirs in terms of the PSNR of the watermarked image measuring the imperceptibility of the watermark and the correlation coefficient measuring the robustness of the watermarking schemes. The performance comparison is given in Table 3. It is seen from this table that the proposed watermarking scheme preserves the perceptual quality of the cover image, and provides an improved robustness against various types of attacks. Thus, the proposed scheme outperforms the other three algorithms used for comparison.

Table 3. Performance, in terms of PSNR and normalized correlation coefficient, of the proposed and three other watermarking schemes against various types of attacks (Cover Image: Lena, Watermark Image: Boat)

Table 4 gives the execution times of running the proposed watermarking algorithms and that of running the schemes developed in [6, 7]. A comparison of the proposed scheme with the scheme of [6] indicates that the use of the Arnold and anti-Arnold transforms for the embedding and extraction of the watermark in the proposed scheme does not add to its computation time. However, the data scrambling using the Arnold transform in the proposed scheme significantly improves its robustness. It is also seen from this table that the proposed scheme provides savings of 24.7 % and 42 % in the execution times of its embedding and extraction parts, respectively, over those of the scheme of [7] that also uses the Arnold transform.

Table 4. Execution times of running the proposed and two other watermarking schemes

5 Conclusion

In this paper, a DCT-SVD based watermarking scheme, in which the watermark image is embedded using the approach of Arnold transform has been proposed. The DCT coefficients of the cover image are zig-zag scanned and mapped in a zig-zag manner into four subbands. The watermark image is scrambled using the operation of the Arnold transform, and then embedded into the singular value matrices of the four subbands of the array of the re-arranged DCT coefficients.

Extensive experiments have been conducted to evaluate the performance of the proposed scheme. The results of the experiments have demonstrated that the proposed embedding scheme ensures the imperceptibility of the watermark and that the embedded watermark does not degrade the perceptual quality of the cover image. The performance of the proposed scheme has also been compared with three other watermarking schemes. The results of comparison have demonstrated that the proposed watermarking scheme yields a performance superior to that of the other three schemes in preserving the perceptual quality of the cover image, and in providing an improved robustness against various types of attacks.