Keywords

1 Introduction

With the rapid development of information technology, the reproduction, distribution and tampering of digital products have become common nowadays [1]. How to protect the copyright of these digital products effectively has been a hot topic in recent years. As a copyright protection technology, digital watermarking draws a lot of attentions. Because it can embed authentication information into the host image, audio and video data and also ensure the integrity and security of these data [2].

Image watermarking algorithms can be classified into spatial domain algorithms and transform domain algorithms. For the spatial domain algorithms, the watermark is usually embedded into the host image by modifying its pixels directly [3, 4]. Although the spatial domain algorithms have lower computational complexity, they are fragile against some image attacks. For transform domain watermarking algorithms, the host image is firstly decomposed by some transforms, and then the watermark is embedded by modifying the coefficients after the transforms. The transform domain algorithms usually have better robustness than the spatial domain algorithms, so a lot of researchers pay more attentions to the transform domain algorithms. In recent years, the popular transform domain watermarking algorithms include Discrete Cosine Transform (DCT) [5], Discrete Fourier Transform (DFT) [6], Discrete Wavelet Transform (DWT) [7], Discrete Shearlet Transform (DST) [8] and so on.

A watermarking scheme using subsampling based on DCT was proposed by Chu et al. [9]. Many subsampling-based watermarking algorithms have been developed. In [10], a binary watermark image was permuted using Baker chaotic map. Then it was embedded into the DCT coefficients of two subimages which were selected according to a random coordinates sequence generated by a secret key. As a new multi-scale analysis tool for image representation, QWT was proposed based on Hilbert transform [11]. QWT has already been successfully applied in the field of image processing such as image denoising [12], image fusion [13], object recognition [14], and digital watermarking [15].

In this paper, a novel image watermarking scheme is proposed based on QWT and DCT. A binary watermark is scrambled by Arnold map and iterated sine chaotic system. The processes of watermark embedding and extracting are implemented on the luminance component of a host color image in YCbCr space. Instead of using subsampling, we obtain four approximation subimages of the luminance component using QWT. The signs and amplitudes of mid-frequency DCT coefficients are relatively stable to some attacks, so these coefficients are used to embed the encrypted watermark. The experimental results demonstrate the proposed scheme is more robust and effective to protect the copyright of color images.

2 Quaternion Wavelet Transform

QWT overcomes the common drawbacks of wavelet transforms by shift-invariant feature. Besides of the shift-invariant magnitude, QWT has three phases. The first two phases represent local image shifts, and the third one denotes the texture information [12]. Let f(x, y) be 2-D image signal, the quaternion analytic signal is defined as follows:

$$\begin{aligned} f^q(x,y)=f(x,y)+if_{H_x}(x,y)+f_{H_y}(x,y)+kf_{H_xH_y}(x,y), \end{aligned}$$
(1)

where \(f_{H_x}(x,y)\) and \(f_{H_y}(x,y)\) are partial Hilbert Transform respectively, \(f_{H_xH_y}(x,y)\) is the total Hilbert Transform.

Suppose \(\phi (x, y)\) is the scaling function, \(\psi ^D(x, y)\), \(\psi ^V(x, y)\) and \(\psi ^H(x, y)\) are respectively mother wavelets. If \(\phi (x, y)\) and \(\psi (x, y)\) are separable, the 2D QWT of f(x, y) according to the quaternion analytic is defined as follows:

$$\begin{aligned} \left\{ \begin{aligned} \phi (x, y)&=\phi _h(x)\phi _h(y)+i\phi _g(x)\phi _h(y)+j\phi _h(x)\phi _g(y)+k\phi _g(x)\phi _g(y) \\ \psi ^D(x, y)&=\psi _h(x)\psi _h(y)+i\psi _g(x)\psi _h(y)+j\psi _h(x)\psi _g(y)+k\psi _g(x)\psi _g(y)\\ \psi ^V(x, y)&=\phi _h(x)\psi _h(y)+i\phi _g(x)\psi _h(y)+j\phi _h(x)\psi _g(y)+k\phi _g(x)\psi _g(y)\\ \psi ^H(x, y)&=\psi _h(x)\phi _h(y)+i\psi _g(x)\phi _h(y)+j\psi _h(x)\phi _g(y)+k\psi _g(x)\phi _g(y) \end{aligned} \right. . \end{aligned}$$
(2)

In other words, the coefficients of the image decomposed by QWT constitute a matrix F,

$$\begin{aligned} F=\left[ \begin{array}{cccc} LL_{\phi _h(x)\phi _h(y)} &{} LH_{\phi _h(x)\psi _h(y)} &{} HL_{\psi _h(x)\phi _h(y)}&{} HH_{\psi _h(x)\psi _h(y)}\\ LL_{\phi _g(x)\phi _h(y)} &{} LH_{\phi _g(x)\psi _h(y)} &{} HL_{\psi _g(x)\phi _h(y)}&{} HH_{\psi _g(x)\psi _h(y)}\\ LL_{\phi _h(x)\phi _g(y)} &{} LH_{\phi _h(x)\psi _g(y)} &{} HL_{\psi _h(x)\phi _g(y)}&{} HH_{\psi _h(x)\psi _g(y)}\\ LL_{\phi _g(x)\phi _g(y)} &{} LH_{\phi _g(x)\psi _g(y)} &{} HL_{\psi _g(x)\phi _g(y)}&{} HH_{\psi _g(x)\psi _g(y)} \end{array} \right] . \end{aligned}$$
(3)

Each column of matrix F is corresponding to a quaternion. The first column is corresponding to the approximation subimage, and the other three columns are respectively corresponding to horizontal, vertical and diagonal subimages [14].

3 Watermarking Scheme Based on DCT and QWT

In this section, the novel watermarking embedding and extracting schemes are detailed based on DCT and QWT.

3.1 Watermark Embedding

The steps of embedding watermark into the original host color image are described as follows:

  • Step 1. The original watermark W is permuted by Arnold map controlled by the scrambling times \(K_1\) to obtain the scrambled watermark \(W_1\).

  • Step 2. A random sequence \(X_1=\{x_n \,|\, n=1, 2,\ldots ,L\}\) is generated by the iterated sine chaotic map which is defined as

    $$\begin{aligned} x_{n+1}=\sin \left( \varepsilon \arcsin \sqrt{\left| x_n-1\right| }\right) , \end{aligned}$$
    (4)

    and then \(X_1\) is converted into a binary sequence \(G_1\) by comparing with the threshold T.

  • Step 3. \(W_1\) is converted into a vector \(\widetilde{W}\) by zigzag scanning. Then we do XOR operation on \(\widetilde{W}\) with \(G_1\) to obtain the vector \(\overline{W}\). \(\overline{W}\) is divided into \(\overline{W}_1\) and \(\overline{W}_2\) as the final watermark information. The above process is shown as

    $$\begin{aligned} \left\{ \begin{aligned}&\overline{W} = \widetilde{W}\oplus G_1 \\&\left\{ \begin{aligned} \overline{W}_1&= \overline{W} (1:L/2)\\ \overline{W}_2&= \overline{W} (L/2+1:L) \end{aligned} \right. \end{aligned} \right. . \end{aligned}$$
    (5)
  • Step 4. The original host image I is converted from RGB space into YCbCr space. The luminance component Y is decomposed by 2-level QWT transform to obtain one magnitude low-frequency subimage and three phase low-frequency subimages, denoted by \(D_1,D_2,D_3\) and \(D_4\).

  • Step 5. \(D_1,D_2,D_3\) and \(D_4\) are decomposed by 2D-DCT transform, and the transformed coefficients are zigzag scanned into four vectors respectively, denoted by \(V_1,V_2,V_3\) and \(V_4\).

  • Step 6. Two random sequences \(X_2\) and \(X_3\) are generated following the step2, where the length of \(X_2\) and \(X_3\) are both L / 2. For every \(x_n\) of \(X_2\) or \(X_3\), we set \(g_n=\text {ceil}(4*x_n)\) to obtain \(G_2\) and \(G_3\). According to \(G_2\) and \(G_3\), we construct a sequence of random number pairs \(Z_1=\{(i, j) \,|\, i\ne j \text { and } i,j\in \{1,2,3,4\}\}\), where the length of \(Z_1\) is L / 2.

  • Step 7. According to \(Z_1\), a complementary sequence with random number pairs \(Z_2=\{(x,y)\}\) is determined. For instance, if \((i,j)=(1,4)\) in \(Z_1\), then (x, y) must be (2, 3) or (3, 2) in \(Z_2\). \(Z_1\) and \(Z_2\) are used to select which two vectors of \(V_1,V_2,V_3\) and \(V_4\) to embed the watermark \(\overline{W}_1\) and \(\overline{W}_2\) respectively.

  • Step 8. Because the process of embedding \(\overline{W}_1\) into \(V_i\) and \(V_j\) is same to that of embedding \(\overline{W}_2\) into \(V_x\) and \(V_y\), we take embedding \(\overline{W}_1\) into \(V_i\) and \(V_j\) as an example to describe the process of watermark embedding:

    Firstly, we select two vectors \(V_i\) and \(V_j\) based on \(Z_1\) so that \(V_i(k)\geqslant V_j(k)\) if \(\overline{W}_1(k)=1\) and \(V_i(k)< V_j(k)\) if \(\overline{W}_1(k)=0\):

    $$ \begin{aligned} Z_1'(k)={\left\{ \begin{array}{ll} Z_1(k)\{i\leftrightarrow j\} &{}\text {if }\overline{W}_1(k)=1\ \& \ V_i(k)< V_j(k)\\ Z_1(k)\{i\leftrightarrow j\} &{}\text {if }\overline{W}_1(k)=0\ \& \ V_i(k)\ge V_j(k) \end{array}\right. }, \end{aligned}$$
    (6)

    where \(Z_1(k)\{i\leftrightarrow j\}\) means swapping i and j for the k-th number pairs in \(Z_1\).

    Secondly, we re-select the k-th pair coefficients based on \(Z_1'\), and calculate the following equations

    $$\begin{aligned} d_1=\left| V_i(a_1+k)\right| +\left| V_j(a_1+k)\right| ,\ d_2=\left| V_i(a_1+k)-V_j(a_1+k)\right| . \end{aligned}$$
    (7)

    Finally, the watermark embedding algorithm is given as

    $$\begin{aligned} {\left\{ \begin{array}{ll} \left\{ \begin{aligned} V_i'(a_1+k)&{}=V_i(a_1+k)+\alpha \left( 2\overline{W}_1(k)-1\right) d_1\\ V_j'(a_1+k)&{}=V_j(a_1+k)-\alpha \left( 2\overline{W}_1(k)-1\right) d_1 \end{aligned} \right. &{} \text {if } d_2/d_1\le \beta \\ V_i'(k)=V_i(k),\ V_j'(k)=V_j(k)&{}\text {else} \end{array}\right. }, \end{aligned}$$
    (8)

    where \(a_1\) means the first position of the selected coefficients, \(\alpha \) and \(\beta \) are two strength parameters.

  • Step 9. Inverse zigzag scanning and inverse DCT are applied to \(V_1'\), \(V_2'\), \(V_3'\) and \(V_4'\) to obtain four watermarked low-frequency sub-images. After the inverse QWT, the watermarked luminance component \(Y'\) is obtained. Then we compose \(Y'\) with the other two components to obtain the watermarked image \(I_1\).

3.2 Watermark Extraction

The detailed steps of watermark extracting are described as follows:

  • Step 1. Suppose the watermarked image which undergone some attacks is \(I_2\). \(I_2\) is converted from RGB space to YCbCr space. Then we obtain the luminance component of watermarked image, denoted by \(Y_1\).

  • Step 2. \(Y_1'\) is decomposed by 2-levels QWT transform to obtain one magnitude low-frequency subimage and three phase low-frequency subimages, denoted by \(D_1^*\), \(D_2^*\), \(D_3^*\) and \(D_4^*\).

  • Step 3. \(D_1^*\), \(D_2^*\), \(D_3^*\) and \(D_4^*\) are decomposed by 2D-DCT transform, and the transformed coefficients are zigzag scanned into four vectors respectively, denoted by \(U_1\), \(U_2\), \(U_3\) and \(U_4\).

  • Step 4. Two vectors \(U_i\) and \(U_j\) are selected according to \(Z_1\) or \(Z_2\). The extracted watermark \(\hat{W}_1\) or \(\hat{W}_2\) can be obtained as follows:

    $$\begin{aligned} \hat{W}_l(k)={\left\{ \begin{array}{ll} 1&{}\text {if }U_i(a_1+k)\geqslant U_j(a_1+k)\\ 0&{} \text {else}\end{array}\right. }, \end{aligned}$$
    (9)

    where \(l=1,2\).

  • Step 5. \(\hat{W}_1\) is combined with \(\hat{W}_2\). Then the final extracted watermarked \(W'\) is obtained

    $$\begin{aligned} W'=\text {Arnold}^{-1}\left( \text {zigzag}^{-1}\left( \hat{W}\oplus G_1\right) \right) . \end{aligned}$$
    (10)

4 Experimental Results

The experimental results of the proposed watermarking scheme are presented in this section. Three \(512\times 512\) RGB color images in Fig. 1(a)–(c) are used as test images. A \(64\times 64\) binary logo image in Fig. 1(d) is used as the original watermark. In the experiments, we set the initial values \(x_0\) and factors \({\upvarepsilon }\) to 0.6345, 0.5872, 0.4536 and 2.356, 2.123, 2.678 for \(X_1\), \(X_2\), \(X_3\) respectively. The threshold T is set to 0.5. The parameter \(a_1\) in Eqs. (7) and (8) is set to 200. The parameters \(\alpha \) and \(\beta \) in Eq. (8) are set to 0.4 and 0.2.

Fig. 1.
figure 1

(a) Host Tiffany image; (b) Host Sailboat image; (c) Host House image; (d) Original watermark.

4.1 Imperceptibility Test

The imperceptibility means that the human visual quality of original host image should not be affected much even after watermark embedding [5]. The peak value signal to noise ratio (PSNR) is used as objective criteria to evaluate the quality of the watermarked image. The PSNR for color image can be calculated as follows:

$$\begin{aligned} \text {PSNR}=\frac{1}{3}\sum _{c}10 \, \log _{10}\frac{N^2P^2}{\sum _{x=1}^N\sum _{y=1}^N\left( I(x,y)-I'(x,y)\right) ^2}, \end{aligned}$$
(11)

where I and \(I'\) are the host image and watermarked image respectively, N denotes the size of I and \(I'\), P is their peak value, and \(c\in \{R,G,B\}\) denotes each component of color image.

The proposed scheme shows high imperceptibility, as shown in Fig. 2, where high PSNR values are achieved for the host test images, such as Tiffany image (55.4122 dB), Sailboat image (48.4961 dB), House image (49.7479 dB).

Fig. 2.
figure 2

(a) Watermarked Tiffany image; (b) Watermarked Sailboat image; (c) Watermarked House image.

4.2 Robustness Test

Robustness is an important requirement for any watermarking system. In this paper, the normalized cross-correlation (NC) is employed to evaluate the robustness of the algorithms. The NC is defined as

$$\begin{aligned} \text {NC}(W,W')=\frac{\sum \limits _{i=1}^M\sum \limits _{j=1}^MW(i,j)W'(i,j)}{\sqrt{\sum \limits _{i=1}^M\sum \limits _{j=1}^MW^2(i,j)} \sqrt{\sum \limits _{i=1}^M\sum \limits _{j=1}^MW'^2(i,j)}}, \end{aligned}$$
(12)

where M represents the size of the watermark, W and \(W'\) indicate the original watermark and the extracted watermark. The NC value ranges from 0 to 1. If the NC value is near to 1, it means that the extracted watermark is strong correlate to the original watermark. But if it is near to 0, it means that the extracted watermark is almost uncorrelated. If the similarity between the original watermark and the extracted watermark is higher, the NC value is larger, which indicates that the algorithm is more robust. Generally, the NC value is considered acceptable if it is not less than 0.75.

The proposed scheme has strong robustness. This can be proved by extracting the watermark image and calculating NC between the original watermark and the extracted watermark after image attacks. In Fig. 3, we show some watermarked Tiffany images which have undergone the attacks of (a) Gaussian noise (0.03), (b) Speckle noise (0.1), (c) Pepper & Salt noise (0.1), (d) Median filter (\(7\times 7\)), (e) Scaling (512–64–512), (f) JPEG compression \(Q=5\), (g) Cropping (1/32 upper left corner), (h) Rows deleting (101–130), (i) Right translation by two columns, (j) Image adjusting (\([0.3\ 0.7]\rightarrow [0\,1]\)), (k) Brightening (\(-80\)), and (l) Turn right rotation (\(1^{\circ }\)). Compared with the original Tiffany image, the watermarked Tiffany images in Fig. 3 have changed a lot after these attacks. The corresponding extracted watermarks from the attacked images in Fig. 3 are shown in Fig. 4. It is shown that the proposed scheme has strong robustness, since the extracted watermarks in Fig. 4 are basically clear.

Fig. 3.
figure 3

Watermarked Tiffany images under different attacks

Fig. 4.
figure 4

Extracted watermarks from watermarked Tiffany images under different attacks

4.3 Comparative Analysis and Discussion

The binary watermark is embedded into the luminance component in YCbCr space and YUV space respectively in [16, 17]. The host images are \(512\times 512\) gray-scale images in [10]. In our experiments, the binary watermark is embedded into the luminance components of host color images in YCbCr space by Lu’s method in [10]. In Table 1, Figs. 5 and 6, the proposed method shows the strongest robustness, especially in adding noise, filtering, scaling, JPEG compression and rotation attacks for different color images.

Table 1. NC values comparison in different schemes for Tiffany image
Fig. 5.
figure 5

Robustness comparison in different schemes for Sailboat image

Fig. 6.
figure 6

Robustness comparison in different schemes for House image

5 Conclusion

In this paper, a novel color image watermarking algorithm has been proposed based on QWT and DCT. The Arnold map and iterated sine chaotic system are used to encrypt the watermark to increase the security of this algorithm. The luminance component of host color image in YCbCr space is decomposed by QWT firstly. Then the encrypted watermark has been embedded into the mid-frequency DCT coefficients of two random approximation subimages. The experimental results have shown that the proposed method attains more excellent imperceptibility and has stronger robustness against some attacks than the watermarking schemes in [10, 16, 17]. In future, we will extend the proposed watermarking scheme to the video watermarking.