Skip to main content
Log in

Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An imperceptible digital watermarking algorithm based on 4-level discrete wavelet transform, discrete cosine transform and singular value decomposition is designed. In this method, the 4-level diagonal sub-band image is obtained by performing the 4-level two-dimensional wavelet transform on the original image, and then a coefficient matrix is produced by applying the discrete cosine transform on the 4-level diagonal sub-band image. A diagonal matrix is constructed by performing the singular value decomposition on the coefficient matrix. The watermark is scrambled by Arnold transform and Logistic map, then the scrambled watermark is processed by the singular value decomposition. Later, the encryption process is completed by embedding the scrambled watermark singular value into the singular value of the coefficient matrix. Simulation results demonstrate that the proposed digital watermarking algorithm could resist JPEG compression attack, Salt and Pepper noise attack, Gaussian noise attack, filter attack, brightness change attack, geometric attack, cut attack, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Elmougy S, Ghoneim A (2018) Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access 6:10332–10340

    Article  Google Scholar 

  2. Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083

    Article  Google Scholar 

  3. Abd El-Latif AA, Abd-El-Atty B, Talha M (2018) Robust encryption of quantum medical images. IEEE Access: Practical Innovations. Open Solutions 6:1073–1081

    Google Scholar 

  4. Abd El-Latif AA, Yan XH, Li L, Wang N, Peng JL, Niu XM (2013) A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption. Opt Laser Technol 54:389–400

    Article  Google Scholar 

  5. Abd El-Latif AA, Li L, Wang N, Li Q, Niu XM (2012) A new image encryption based on chaotic systems and singular value decomposition. 4th international conference on digital image processing, 2012 ICDIP, IEEE, pp 8334

  6. Bassel A, Nordin M J (2016) Digital image watermark authentication using DWT-DCT. J Eng Appl Sci 11(14):3227–3232

    Google Scholar 

  7. Belazi A, Abd El-Latif AA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

    Article  Google Scholar 

  8. Belazi A, Abd El-Latif AA, Rhouma R, Safya B (2015) Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. 2015 International Wireless Communications and Mobile Computing Conference, IWCMC, IEEE, pp 606–610

  9. Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718

    Article  Google Scholar 

  10. Cao WQ, Guan Q X, Zhao XF, Wang KR, Han JS (2017) Constructing local information feature for spatial image steganalysis. Multimed Tools Appl 76(11):13221–13237

    Article  Google Scholar 

  11. Esgandari R, Khalili M (2015) A robust image watermarking scheme based on discrete wavelet transforms. 2015 2nd IEEE International Conference on Knowledge-Based Engineering and Innovation, pp 988–992

  12. Gupta AK, Raval MS (2012) A robust and secure watermarking scheme based on singular values replacement. Sadhana-Acad Proc Eng Sci 37(4):425–440

    MathSciNet  MATH  Google Scholar 

  13. Hu HT, Hsu LY (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimed Tools Appl 76(5):6575–6594

    Article  Google Scholar 

  14. Li M, Xiao D, Zhu Y, Zhang YS, Sun L (2019) Commutative fragile zero-watermarking and encryption for image integrity protection. Multimed Tools Appl 78(16):22727–22742

    Article  Google Scholar 

  15. Liu CY, Tang LL, Pan JS (2012) Novel fragile FRFT watermarking algorithm based on blocking method. International Conference on Computing, Measurement, Control and Sensor Network, Taiyuan, China, pp 273–276

  16. Luo H, Yu FX, Huang ZL, Lu ZM (2011) Blind image watermarking based on discrete fractional random transform and subsampling. Opt Int J Light Electron Opt 122(4):311–316

    Article  Google Scholar 

  17. Moeinaddini E, Afsari F (2018) Robust Watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm. Multimed Tools Appl 77(19):26083–26105

    Article  Google Scholar 

  18. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76:8881–8900

    Article  Google Scholar 

  19. Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76(11):13001–13024

    Article  Google Scholar 

  20. Singh RK, Shaw DK, Sahoo J (2017) A secure and robust block based DWT-SVD image watermarking approach. J Inf Optim Sci 38(6):911–925

    MathSciNet  Google Scholar 

  21. Song XH, Wang S, Abd El-Latif AA, Niu XM (2014) Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimed Syst 20(4):379–388

    Article  Google Scholar 

  22. Song XH, Wang S, Liu S, Abd El-Latif AA, Niu XM (2013) A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf Process 12(12):3689–3706

    Article  MathSciNet  Google Scholar 

  23. Tang LL, Huang CT, Pan JS, Liu CY (2015) Dual watermarking algorithm based on the Fractional Fourier Transform. Multimed Tools Appl 74(12):1–17

    Article  Google Scholar 

  24. Van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Int. Conf. on Image Processing, Austin, Texas, USA 2(2), 86–90

  25. Xia C, Guan QX, Zhao XF, Zhao CD (2017) Highly accurate real-time image steganalysis based on GPU. J Real-Time Image Process 14(1):223–236

    Article  Google Scholar 

  26. Xia C, Wu KK, Guan QX, Tong XH, Li ZY, Xue YM (2019) Improved PHARM for JPEG steganalysis: making PHARM more efficient and effective. IEEE Access 7:50339–50346

    Article  Google Scholar 

  27. Xiao D, Cai HK, Wang Y, Bai S (2016) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimed Tools Appl 75 (21):13779–13789

    Article  Google Scholar 

  28. Xiao D, Chang YT, Xiang T, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimed Tools Appl 76(7):9265–9296

    Article  Google Scholar 

  29. Xiao D, Deng MM, Zhu XY (2015) A reversible image authentication scheme based on compressive sensing. Multimed Tools Appl 74(18):7729–7752

    Article  Google Scholar 

  30. Yan XH, Wang S, Abd El-Latif AA, Niu XM (2015) New approaches for efficient information hiding-based secret image sharing schemes. Signal, Image and Video Process 9(3):499–510

    Article  Google Scholar 

  31. Ye X, Chen X, Deng M, Wang YL (2015) A SIFT-based DWT-SVD blind watermark method against geometrical attacks. CISP, Bangalore, India, pp 323–329

  32. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):48634–4882

    Article  Google Scholar 

  33. Zhao ZZ, Guan QX, Zhao XF, Yu HB, Liu CJ (2018) Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. Multimed Tools Appl 77(11):14093–14113

    Article  Google Scholar 

  34. Zhou NR, Xiahou WM, Wen RH, Zou WP (2018) Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77 (23):30251–30267

    Article  Google Scholar 

  35. Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78(2):2507–2523

    Article  Google Scholar 

  36. Zhou X, Zhang H, Wang CY (2018) A Robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry-Basel 10(3):77

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61861029 and 61462061), the Department of Human Resources and Social security of Jiangxi Province, the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant No. 20162BCB22011), the Natural Science Foundation of Jiangxi Province (Grant No. 20171BAB202002), and the Cultivation Plan of Applied Research of Jiangxi Province (Grant no. 20181BBE58022).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li-Hua Gong.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, JY., Huang, WL., Xia-Hou, WM. et al. Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition. Multimed Tools Appl 79, 22727–22747 (2020). https://doi.org/10.1007/s11042-020-08987-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08987-3

Keywords

Navigation