Machine Learning Based
Machine Learning Based
a r t i c l e i n f o a b s t r a c t
Article history: This work presents a blind and robust scheme using YCbCr color space, IWT (integer wavelet transform)
Received 30 April 2020 and DCT (discrete cosine transform) for color image watermarking. During watermark insertion, Y chan-
Revised 18 January 2021
nel is divided into blocks and Mersenne Twister random number generator is used to select the blocks
Accepted 12 February 2021
for embedding. This randomized selection of blocks required a secret key, thus improving the security of
Available online 15 February 2021
the scheme. To reduce the computational complexity, the artificial neural network architecture is devel-
Keywords: oped for watermark embedding. To check the robustness, several signal processing attacks such as JPEG
Robust image watermarking compression, filtering attacks, noise attacks, cropping, resizing and other common attacks are applied
Artificial neural network on the watermarked images. The proposed work is tested on different images to verify the similarity
Machine learning in watermarking results. The scheme provides similar results (having little variation) for different test
YCbCr color space images. Experimental results demonstrate the superior performance in terms of imperceptibility and ro-
bustness. Further, the ANN framework provides faster embedding with approximately similar parametric
results. The performance comparison with existing schemes demonstrates better performance for differ-
ent attacks. The proposed work can be used in robust applications (i.e. copyright protection) for efficient
results and less computational time.
© 2021 Elsevier B.V. All rights reserved.
https://doi.org/10.1016/j.patrec.2021.02.011
0167-8655/© 2021 Elsevier B.V. All rights reserved.
R. Sinhal, D.K. Jain and I.A. Ansari Pattern Recognition Letters 145 (2021) 171–177
172
R. Sinhal, D.K. Jain and I.A. Ansari Pattern Recognition Letters 145 (2021) 171–177
posed a YCoCg-R color space and DCT based robust scheme for wa- • Select the Y channel and perform block-wise division to divide
termarking the color images. The binary watermark is encrypted it into uniform 4 × 4 blocks.
using Arnold transform before insertion into the host image. At • Choose the blocks with the help of randomization for embed-
embedding stage, the image is transformed using DCT followed by ding the watermark bits.
block-wise division. The complexity of the blocks gets checked to • Now, sequentially select block to embed a watermark bit watbit
select blocks for embedding. Adaptive embedding strength based into it.
on the energy of the block is used for watermark insertion. Ex- • Perform IWT transform to get the sub bands (LL, LH, HL and
perimental results show the significant parametric values, how- HH) and apply DCT transform on the LL sub band.
ever adaptive embedding strength may increase the time complex- • Select a coefficient (embedcoe f f ) from the DCT matrix and mod-
ity and it should be analyzed. Su and Chen [36] offered a spa- ify it to get newcoe f f as per the Eq. (1).
tial domain based robust watermarking technique for color im-
ages to protect copyright. The scheme is blind in nature and used (rembed × Q _ f ac ) + Q _ 2f ac , i f Econd = 0
newcoe f f = (1)
blue channel to embed the binary watermark. To insert the wa- (rembed × Q _ f ac ) − Q _2f ac , i f Econd = 1
termark, the pixels are modified based on the properties of DC
(Direct current) coefficients. At extraction, the watermark extrac- Where rembed = round ( (embedcoe f f )/Q _ f ac ), Q _ f acis the
tion is done using DC coefficients and the concept of quantiza- quantization factor and Econd has been calculated as Econd =
tion. Simulation results show that the method has good impercep- XOR(mod (rembed , 2 ), watbit ).
tibility but the time complexity and robustness needs further im- Here, mod indicates a modular operation and watbit denotes the
provement. Abdulrahman and Ozturk [37] presented a robust wa- watermark bit to be embedded.
termarking scheme based on DWT and DCT. The Arnold transform • Replace embedcoe f f with the updated coefficient value newcoe f f .
was applied on the watermark to provide security. The host im- • Perform the inverse DCT on the modified DCT matrix to get
age and the encrypted watermark were transformed using DWT
modified LL band. Further perform inverse IWT transform to get
and DCT respectively. Further, the DWT sub bands are modified via
the watermarked block.
DCT coefficient of the equally divided watermark portions. Signifi- • Perform these steps for each selected block to embed all the
cant robustness achieved during experimentation, however the ap-
watermark bits in a sequential manner and get the modified
plication of transforms and Arnold scrambling increase the com-
blocks to get the watermarked Y channel.
putational complexity of the method. Sinhal et al. [21] presented • Finally, convert the updated YCbCr image into the RGB image to
a deep neural network (DNN) based robust watermarking method
get the watermarked image.
for identifying the source of the online digital information. The
scheme used SLT transforms for watermark embedding. An op- During transmission through the communication media, the
timization approach had been used to reduce the computational watermarked image may get distorted (e.g. attacked) via signal
time for embedding. The use of DNN provided fast extraction. Ex- processing attacks such as JPEG compression, filtering etc. There-
perimental performance proved that the scheme has efficient re- fore, various signal processing attacks are considered to evaluate
sults in terms of robustness, imperceptibility and computational the performance of the method.
time. However, the embedding capacity had been compromised to
enhance the reliability. Valandar et al. [38] proposed a robust wa- 2.2. Extraction steps
termarking scheme using different transforms (i.e. DW T, IW T, CT)
and block-wise division. In this blind scheme, the security was ob- • Select the watermarked/attacked image and convert it into
tained by Henon chaotic map and the chaotic nature of the map YCbCr from RGB color space.
is presented by using Lyapunov exponent, bifurcation and trajec- • Choose Y channel and divide it into uniform non-overlapping
tory diagram. During embedding, the image is divided into uniform blocks of 4 × 4 size.
blocks and the transform is applied on blocks. Finally, LL band is • Select blocks used for embedding with the help of secret key
used to embed the watermark bit. The significant imperceptibil- (i.e. randomization) and apply the following steps on each block
ity results were achieved but the robustness against various signal to extract the watermark bit.
processing attacks should be improved. • Perform IWT on the block followed by the DCT transform of the
The objective of this work is to propose a new image water- LL band.
marking scheme that would be useful in copyright protection and • Select the coefficient value (extcoe f f ) of DCT matrix that has
ownership verification in an efficient way. This scheme is robust been used at the embedding stage and extract the watermark
and blind in nature. It uses randomization [39] for selecting the bit (extbit ) as per the Eq. (2).
blocks to embed the watermark bits. The concept of randomization ⎧
⎪
⎪ 0, i f (extcond = 0 )and extcoe f f > 0
improves the security of the watermarking method and the use ⎨
1, i f (extcond = 0 ) and extcoe f f ≤ 0
of YCbCr color space offer better visual experience to the viewers.
tbit = (2)
Further, to improve the computational complexity of the scheme, ⎪0, i f (extcond = 1) and extcoe f f ≤ 0
⎪
⎩
an artificial neural network based embedding framework is pre- 1, i f (extcond = 1 ) and extcoe f f > 0
pared which gives approximately similar parametric values with
less computational time. Where,extcond = mod (rext , 2 ) and rext is obtained as rext =
f ix(extcoe f f /Q _ f ac ).
2. Proposed watermarking method Similarly, extract the watermark bits from selected blocks and
reshape to get the extracted binary watermark.
The embedding and extraction steps of the proposed water-
marking scheme are presented as follows: 3. Experimental results and performance evaluation
173
R. Sinhal, D.K. Jain and I.A. Ansari Pattern Recognition Letters 145 (2021) 171–177
174
R. Sinhal, D.K. Jain and I.A. Ansari Pattern Recognition Letters 145 (2021) 171–177
Table 2
BER, NC for different signal processing attacks.
BER, NC
Signal processing
Lena Mandrill Plane Pepper Sailboat House Barbara
S. No. Attacks
BER NC BER NC BER NC BER NC BER NC BER NC BER NC
Table 3
Performance comparison of imperceptibility results (PSNR, SSIM).
Schemes
Images
[32] [33] [36] [38] Our
Lena 41.78, 0.9704 42.01, 0.9787 49.98, 0.9872 55.19, 0.9964 40.13, 0.9976
Mandrill 40.24, 0.9893 36.11, 0.9754 49.89, 0.9957 51.29, 0.9944 39.74, 0.9961
Plane 40.79, 0.9872 39.76, 0.9851 49.86, 0.9854 50.00, 0.9919 40.02, 0.9700
Pepper 41.01, 0.9733 42.68, 0.9816 50.08, 0.9859 52.48, 0.9964 40.25, 0.9976
175
R. Sinhal, D.K. Jain and I.A. Ansari Pattern Recognition Letters 145 (2021) 171–177
Table 4
Performance comparison of robustness results (NC).
Images
S&P (0.002) 0.81 1.00 1.00 1.00 0.82 0.99 0.99 1.00 0.81 1.00 1.00 1.00 0.80 1.00 1.00 1.00
S&P (0.004) 0.78 0.96 0.97 1.00 0.77 0.98 0.98 1.00 0.79 0.98 0.98 1.00 0.78 0.98 0.99 0.99
S&P (0.006) 0.76 0.92 0.94 0.99 0.77 0.96 0.97 1.00 0.77 0.97 0.98 1.00 0.76 0.96 0.97 1.00
S&P (0.008) 0.72 0.90 0.90 1.00 0.73 0.95 0.96 0.99 0.72 0.93 0.93 1.00 0.71 0.95 0.94 0.99
S&P (0.010) 0.67 0.89 0.90 0.99 0.70 0.89 0.90 0.99 0.71 0.89 0.89 0.99 0.79 0.92 0.94 0.99
S&P (0.012) 0.65 0.84 0.87 0.97 0.67 0.89 0.91 0.98 0.68 0.84 0.86 0.96 0.71 0.86 0.91 0.95
MF (2 × 2) 0.83 0.93 0.95 0.95 0.70 0.75 0.74 0.67 0.85 0.95 0.95 0.88 0.81 0.93 0.94 0.93
MF (3 × 3) 0.91 0.95 1.00 0.98 0.88 0.75 0.88 0.72 0.94 0.99 1.00 0.95 0.92 0.94 1.00 0.97
JPEG (10) 0.62 0.64 0.77 0.34 0.50 0.80 0.58 0.64 0.28 0.63 0.21 0.47 0.57 0.60 0.86 0.40
JPEG (20) 0.72 0.72 0.73 0.93 0.49 0.80 0.60 0.97 0.42 0.70 0.39 0.92 0.61 0.78 0.80 0.92
JPEG (30) 0.67 0.85 0.67 1.00 0.51 0.86 0.66 1.00 0.57 0.84 0.68 1.00 0.65 0.87 0.65 1.00
JPEG (40) 0.62 0.98 0.67 1.00 0.68 0.96 0.72 1.00 0.63 0.96 0.72 1.00 0.66 0.96 0.71 1.00
JPEG (50) 0.68 1.00 0.72 1.00 0.67 0.99 0.70 1.00 0.67 0.97 0.70 1.00 0.70 0.98 0.67 1.00
JPEG (60) 0.68 1.00 0.74 1.00 0.73 1.00 0.75 1.00 0.71 1.00 0.74 1.00 0.73 0.99 0.79 1.00
JPEG (70) 0.80 1.00 0.77 1.00 0.79 1.00 0.77 1.00 0.79 1.00 0.81 1.00 0.77 1.00 0.83 1.00
JPEG (80) 0.87 1.00 0.91 1.00 0.84 1.00 0.94 1.00 0.87 1.00 0.93 1.00 0.86 1.00 0.95 1.00
JPEG (90) 1.00 1.00 0.99 1.00 0.98 1.00 0.98 1.00 0.98 1.00 0.98 1.00 0.94 1.00 1.00 1.00
JPEG (100) 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 0.99 1.00 1.00 1.00 0.97 1.00 1.00 1.00
Resize(50%) 0.96 0.98 1.00 0.99 0.92 0.94 0.99 0.82 0.97 0.96 0.99 0.96 0.99 0.97 1.00 0.98
Resize(200%) 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00
Table 5 posed scheme has robust and blind nature. It used the random-
Statistical comparison in terms of average NC values.
ization process based on Mersenne Twister random generator for
Attacks [38] our Attacks [38] our selecting the blocks to embed the watermark bits. Further, an ANN
No attack 1.00 1.00 Blur (2.5,50) 0.90 0.96 framework is developed to reduce the computational complexity
GF (2 × 2) 1.00 0.90 Blur (1.5,50) 0.98 1.00 of embedding process for speedy response. Experimental results
GF (3 × 3) 0.99 1.00 Blur (0.5,50) 1.00 1.00 proved the significance of the method as compared to the other re-
GF (5 × 5) 0.96 1.00 Resize (0.5) 0.98 0.97 cently developed robust watermarking schemes. Future work will
GC (1.5) 0.91 0.99 MF (3 × 3) 0.99 0.95
include the development of more efficient neural network archi-
GC (1.0) 1.00 1.00 WF (2 × 2) 1.00 1.00
GC (0.5) 0.83 0.83 WF (3 × 3) 0.99 0.99 tecture to achieve optimal performance in terms of watermarking
GN (0.001) 0.99 1.00 JPEG 90 0.96 1.00 parameters and improving the embedding strategy. The extraction
GN (0.01) 0.98 0.93 JPEG 80 0.95 1.00 process will also be investigated using neural network architec-
S&P (0.01) 0.99 0.98 JPEG 70 0.90 1.00
tures to improve the performance.
S&P (0.02) 0.97 0.94 SN (0.001) 0.96 1.00
S&P (0.05) 0.82 0.79 SN (0.005) 0.94 1.00
Declaration of Competing Interest
Table 6
The authors declare that they have no known competing finan-
Performance comparison with and without ANN framework.
cial interests or personal relationships that could have appeared to
Host Without ANN influence the work reported in this paper.
Image
Avg. Avg.
Embed Embed Acknowledgments
time (in time (in
PSNR Avg. BER sec) PSNR Avg. BER sec)
This work was supported by Faculty Initiation Grant of PDPM
Lena 40.13 0.0476 1.93 39.90 0.0515 0.41 Indian Institute of Information Technology Design and Manufactur-
Mandrill 39.74 0.0668 1.91 37.47 0.0991 0.42
ing Jabalpur, India.
Plane 40.02 0.0554 1.94 39.78 0.0685 0.41
Pepper 40.25 0.0493 1.93 39.82 0.0527 0.38
sailboat 40.02 0.0595 1.92 39.39 0.0731 0.40 References
House 39.81 0.0609 1.91 39.28 0.0718 0.39
Barbara 39.86 0.0520 1.92 38.73 0.0600 0.40 [1] L. Me, G.R. Arce, A class of authentication digital watermarks for secure multi-
media communication, IEEE Trans. Image Process. 10 (11) (2001) 1754–1764.
[2] Y. Wang, J.F. Doherty, R.E. Van Dyck, A wavelet-based watermarking algorithm
for ownership verification of digital images, IEEE Trans. Image Process. 11 (2)
(2002) 77–88.
BER is calculated for 34 different signal processing attacks. From
[3] R. Liu, T. Tan, An SVD-based watermarking scheme for protecting rightful own-
Table 6, it is observed that the embedding time has been reduced ership, IEEE Trans. Multimed. 4 (1) (2002) 121–128.
significantly by using ANN framework and the degradation in other [4] I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and
parametric values is very less. Therefore, the ANN framework can Steganography, Morgan kaufmann, 2007.
[5] C.C. Chang, H.C. Wu, A copyright protection scheme of images based on visual
be used effectively for practical applications that required fast re- cryptography, Imag. Sci. J. 49 (3) (2001) 141–150.
sponse . [6] P.T. Yu, H.H. Tsai, J.S. Lin, Digital watermarking based on neural networks for
color images, Signal Process. 81 (3) (2001) 663–671.
[7] M. Khalili, D. Asatryan, Colour spaces effects on improved discrete wavelet
4. Conclusion transform-based digital image watermarking using Arnold transform map, IET
Signal Process. 7 (3) (2013) 177–187.
[8] Y. Huang, B. Niu, H. Guan, S. Zhang, Enhancing image watermarking with adap-
In this study, an improved color image watermarking based on tive embedding parameter and psnr guarantee, IEEE Trans. Multimed. 21 (10)
machine learning and transform domain was elaborated. The pro- (2019) 2447–2460.
176
R. Sinhal, D.K. Jain and I.A. Ansari Pattern Recognition Letters 145 (2021) 171–177
[9] Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, Image quality assessment: [26] N.M. Makbol, B.E. Khoo, A new robust and secure digital image watermarking
from error visibility to structural similarity, IEEE Trans. Image Process. 13 (4) scheme based on the integer wavelet transform and singular value decompo-
(20 04) 60 0–612. sition, Digit. Signal Process. 33 (2014) 134–147.
[10] S. Thakur, A.K. Singh, B. Kumar, S.P. Ghrera, Improved DWT-SVD-based med- [27] I. Daubechies, W. Sweldens, Factoring wavelet transforms into lifting steps, J.
ical image watermarking through hamming code and chaotic encryption, in: Fourier Anal. Appl. 4 (3) (1998) 247–269.
Advances in VLSI, Communication, and Signal Processing, Springer, Singapore, [28] V.S. Verma, R.K. Jha, A. Ojha, Significant region based robust watermarking
2020, pp. 897–905. scheme in lifting wavelet transform domain, Expert Syst. Appl. 42 (21) (2015)
[11] C.S. Hsu, S.F. Tu, Enhancing the robustness of image watermarking against 8184–8197.
cropping attacks with dual watermarks, Multimed. Tool. Appl. (2019) 1–27. [29] Y.G. Fu, R.M. Shen, Color image watermarking scheme based on linear discrim-
[12] I.J. Cox, M.L. Miller, J.A. Bloom, C. Honsinger, Digital Watermarking, Morgan inant analysis, Comput. Stand. Interface. 30 (3) (2008) 115–120.
Kaufmann, San Francisco, 2002 (Vol. 53). [30] X.B. Wen, H. Zhang, X.Q. Xu, J.J. Quan, A new watermarking approach based on
[13] P.L. Lin, C.K. Hsieh, P.W. Huang, A hierarchical digital watermarking method probabilistic neural network in wavelet domain, Soft. Comput. 13 (4) (2009)
for image tamper detection and recovery, Pattern Recognit. 38 (12) (2005) 355–360.
2519–2529. [31] H. Peng, J. Wang, W. Wang, Image watermarking method in multiwavelet
[14] C.S. Lu, H.Y. Liao, Multipurpose watermarking for image authentication and domain based on support vector machines, J. Syst. Softw. 83 (8) (2010)
protection, IEEE Trans. Image Process. 10 (10) (2001) 1579–1592. 1470–1477.
[15] M.M. Yeung, Digital watermarking, Commun. ACM 41 (7) (1998) 31–33. [32] C. Das, S. Panigrahi, V.K. Sharma, K.K. Mahapatra, A novel blind robust image
[16] A. Khan, F. Jabeen, F. Naz, S. Suhail, M. Ahmed, S. Nawaz, Buyer seller water- watermarking in DCT domain using inter-block coefficient correlation, AEU-Int.
marking protocols issues and challenges–A survey, J. Netw. Comput. Appl. 75 J. Electron. Commun. 68 (3) (2014) 244–253.
(2016) 317–334. [33] G.S. Kalra, R. Talwar, H. Sadawarti, Adaptive digital image watermarking for
[17] A.S. Panah, R. Van Schyndel, T. Sellis, E. Bertino, On the properties of non-me- color images in frequency domain, Multimed. Tool. Appl. 74 (17) (2015)
dia digital watermarking: a review of state of the art techniques, IEEE Access 6849–6869.
4 (2016) 2670–2704. [34] N. Pan-Pan, W. Xiang-Yang, L. Yu-Nan, Y. Hong-Ying, A robust color image wa-
[18] M.A. Nematollahi, C. Vorakulpipat, H.G. Rosales, Security enhancement of termarking using local invariant significant bitplane histogram, Multimed. Tool.
digital watermarking, in: In Digital Watermarking, Springer, Singapore, 2017, Appl. 76 (3) (2017) 3403–3433.
pp. 191–203. [35] M. Moosazadeh, G. Ekbatanifard, An improved robust image watermark-
[19] X. Kang, J. Huang, Y.Q. Shi, Y. Lin, A DWT-DFT composite watermarking scheme ing method using DCT and YCoCg-R color space, Optik (Stuttg) 140 (2017)
robust to both affine transform and JPEG compression, IEEE Trans. Circuit. Syst. 975–988.
Video Technol. 13 (8) (2003) 776–786. [36] Q. Su, B. Chen, Robust color image watermarking technique in the spatial do-
[20] M.A. Suhail, M.S. Obaidat, Digital watermarking based DCT and JPEG model, main, Soft. Comput. 22 (1) (2018) 91–106.
IEEE Trans. Instrum. Meas. 52 (5) (2003) 1640–1647. [37] A.K. Abdulrahman, S. Ozturk, A novel hybrid DCT and DWT based robust wa-
[21] R. Sinhal, I.A. Ansari, D.K. Jain, Real-time watermark reconstruction for the termarking algorithm for color images, Multimed. Tool. Appl. 78 (12) (2019)
identification of source information based on deep neural network, J. Real– 17027–17049.
Time Image Process. (2019) 1–19. [38] M.Y. Valandar, M.J. Barani, P. Ayubi, A blind and robust color images water-
[22] R.N. Bracewell, R.N. Bracewell, The Fourier transform and Its Applications, Mc- marking method based on block transform and secured by modified 3-dimen-
Graw-Hill, New York, 1986 (Vol. 31999). sional Hénon map, Soft. Comput. 24 (2) (2020) 771–794.
[23] M.N. Do, M. Vetterli, The contourlet transform: an efficient directional mul- [39] M. Saito, M. Matsumoto, Variants of Mersenne twister suitable for graphic pro-
tiresolution image representation, IEEE Trans. Image Process. 14 (12) (2005) cessors, ACM Trans. Math. Softw. (TOMS) 39 (2) (2013) 1–20.
2091–2106. [40] “Image databases”, Accessed: Sep. 2020. [Online]. Available: http://www.
[24] B. Lei, Y. Soon, F. Zhou, Z. Li, H. Lei, A robust audio watermarking scheme based imageprocessingplace.com/root_files_V3/image_databases.htm.
on lifting wavelet transform and singular value decomposition, Signal Process. [41] Hore, A., & Ziou, D. (2010, August). Image quality metrics: PSNR vs. SSIM. In
92 (9) (2012) 1985–2001. 2010 20th International Conference on Pattern Recognition (pp. 2366–2369).
[25] I.A. Ansari, M. Pant, C.W. Ahn, Robust and false positive free watermarking IEEE.
in IWT domain using SVD and ABC, Eng. Appl. Artif. Intell. 49 (2016) 114– [42] M.H. Hassoun, Fundamentals of Artificial Neural Networks, MIT press, 1995.
125. [43] B. Yegnanarayana, Artificial Neural Networks, PHI Learning Pvt. Ltd, 2009.
177