A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT

Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image’s quality is of utmost importance, for example in medical images, where improper emb...

Full description

Bibliographic Details
Main Authors: Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva, Andrés Romero-Arellano
Format: Article
Language:English
Published: MDPI AG 2023-07-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/14/8430
_version_ 1797590414856814592
author Sandra L. Gomez-Coronel
Ernesto Moya-Albor
Jorge Brieva
Andrés Romero-Arellano
author_facet Sandra L. Gomez-Coronel
Ernesto Moya-Albor
Jorge Brieva
Andrés Romero-Arellano
author_sort Sandra L. Gomez-Coronel
collection DOAJ
description Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image’s quality is of utmost importance, for example in medical images, where improper embedding of the watermark could change the patient’s diagnosis. On the other hand, in digital images distributed over the Internet, the owner of the images must also be protected. In this work, an imperceptible, robust, secure, and hybrid watermarking algorithm is presented for copyright protection. It is based on the Hermite Transform (HT) and the Discrete Cosine Transform (DCT) as a spatial–frequency representation of a grayscale image. Besides, it uses a block-based strategy and a perfectibility analysis of the best embedding regions inspired by the Human Vision System (HVS), giving the imperceptibility of the watermark, and a Singular-Value Decomposition (SVD) approach improved robustness against attacks. In addition, the proposed method can embed two watermarks, a digital binary image (LOGO) and information about the owner and the technical data of the original image in text format (MetaData). To secure both watermarks, the proposed method uses the Jigsaw Transform (JST) and the Elementary Cellular Automaton (ECA) to encrypt the image LOGO and a random sequence generator and the XOR operation to encrypt the image MetaData. On the other hand, the proposed method was tested using a public dataset of 49 grayscale images to assess the effectiveness of the watermark embedding and extraction procedures. Furthermore, the proposed watermarking algorithm was evaluated under several processing and geometric algorithms to demonstrate its robustness to the majority, intentional or unintentional, attacks, and a comparison was made with several state-of-the-art techniques. The proposed method obtained average values of PSNR = 40.2051 dB, NCC = 0.9987, SSIM = 0.9999, and MSSIM = 0.9994 for the watermarked image. In the case of the extraction of the LOGO, the proposal gave MSE = 0, PSNR ≫ 60 dB, NCC = 1, SSIM = 1, and MSSIM = 1, whereas, for the image MetaData extracted, it gave BER = 0% and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>B</mi><mrow><mi>e</mi><mi>r</mi><mi>r</mi><mi>o</mi><mi>r</mi></mrow></msub><mspace width="3.33333pt"></mspace><mo>=</mo><mspace width="3.33333pt"></mspace><mn>0</mn></mrow></semantics></math></inline-formula>. Finally, the proposed encryption method presented a large key space (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>K</mi><mspace width="3.33333pt"></mspace><mo>=</mo><mspace width="3.33333pt"></mspace><mn>1.2689</mn><mspace width="3.33333pt"></mspace><mo>×</mo><mspace width="3.33333pt"></mspace><msup><mn>10</mn><mn>89</mn></msup></mrow></semantics></math></inline-formula>) for the LOGO image.
first_indexed 2024-03-11T01:20:10Z
format Article
id doaj.art-f62555ccefc04ab181e309a68c9a2543
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T01:20:10Z
publishDate 2023-07-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-f62555ccefc04ab181e309a68c9a25432023-11-18T18:13:02ZengMDPI AGApplied Sciences2076-34172023-07-011314843010.3390/app13148430A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCTSandra L. Gomez-Coronel0Ernesto Moya-Albor1Jorge Brieva2Andrés Romero-Arellano3Instituto Politécnico Nacional, UPIITA. Av. IPN No. 2580, Col. La Laguna Ticoman, CDMX 07340, MexicoFacultad de Ingeniería, Universidad Panamericana, Augusto Rodin 498, Ciudad de México 03920, MexicoFacultad de Ingeniería, Universidad Panamericana, Augusto Rodin 498, Ciudad de México 03920, MexicoFacultad de Ingeniería, Universidad Panamericana, Augusto Rodin 498, Ciudad de México 03920, MexicoCurrently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image’s quality is of utmost importance, for example in medical images, where improper embedding of the watermark could change the patient’s diagnosis. On the other hand, in digital images distributed over the Internet, the owner of the images must also be protected. In this work, an imperceptible, robust, secure, and hybrid watermarking algorithm is presented for copyright protection. It is based on the Hermite Transform (HT) and the Discrete Cosine Transform (DCT) as a spatial–frequency representation of a grayscale image. Besides, it uses a block-based strategy and a perfectibility analysis of the best embedding regions inspired by the Human Vision System (HVS), giving the imperceptibility of the watermark, and a Singular-Value Decomposition (SVD) approach improved robustness against attacks. In addition, the proposed method can embed two watermarks, a digital binary image (LOGO) and information about the owner and the technical data of the original image in text format (MetaData). To secure both watermarks, the proposed method uses the Jigsaw Transform (JST) and the Elementary Cellular Automaton (ECA) to encrypt the image LOGO and a random sequence generator and the XOR operation to encrypt the image MetaData. On the other hand, the proposed method was tested using a public dataset of 49 grayscale images to assess the effectiveness of the watermark embedding and extraction procedures. Furthermore, the proposed watermarking algorithm was evaluated under several processing and geometric algorithms to demonstrate its robustness to the majority, intentional or unintentional, attacks, and a comparison was made with several state-of-the-art techniques. The proposed method obtained average values of PSNR = 40.2051 dB, NCC = 0.9987, SSIM = 0.9999, and MSSIM = 0.9994 for the watermarked image. In the case of the extraction of the LOGO, the proposal gave MSE = 0, PSNR ≫ 60 dB, NCC = 1, SSIM = 1, and MSSIM = 1, whereas, for the image MetaData extracted, it gave BER = 0% and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>B</mi><mrow><mi>e</mi><mi>r</mi><mi>r</mi><mi>o</mi><mi>r</mi></mrow></msub><mspace width="3.33333pt"></mspace><mo>=</mo><mspace width="3.33333pt"></mspace><mn>0</mn></mrow></semantics></math></inline-formula>. Finally, the proposed encryption method presented a large key space (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>K</mi><mspace width="3.33333pt"></mspace><mo>=</mo><mspace width="3.33333pt"></mspace><mn>1.2689</mn><mspace width="3.33333pt"></mspace><mo>×</mo><mspace width="3.33333pt"></mspace><msup><mn>10</mn><mn>89</mn></msup></mrow></semantics></math></inline-formula>) for the LOGO image.https://www.mdpi.com/2076-3417/13/14/8430digital image watermarkingdiscrete cosine transformHermite transformJigsaw transformwatermarking robustnesssingular-value decomposition
spellingShingle Sandra L. Gomez-Coronel
Ernesto Moya-Albor
Jorge Brieva
Andrés Romero-Arellano
A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT
Applied Sciences
digital image watermarking
discrete cosine transform
Hermite transform
Jigsaw transform
watermarking robustness
singular-value decomposition
title A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT
title_full A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT
title_fullStr A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT
title_full_unstemmed A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT
title_short A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT
title_sort robust and secure watermarking approach based on hermite transform and svd dct
topic digital image watermarking
discrete cosine transform
Hermite transform
Jigsaw transform
watermarking robustness
singular-value decomposition
url https://www.mdpi.com/2076-3417/13/14/8430
work_keys_str_mv AT sandralgomezcoronel arobustandsecurewatermarkingapproachbasedonhermitetransformandsvddct
AT ernestomoyaalbor arobustandsecurewatermarkingapproachbasedonhermitetransformandsvddct
AT jorgebrieva arobustandsecurewatermarkingapproachbasedonhermitetransformandsvddct
AT andresromeroarellano arobustandsecurewatermarkingapproachbasedonhermitetransformandsvddct
AT sandralgomezcoronel robustandsecurewatermarkingapproachbasedonhermitetransformandsvddct
AT ernestomoyaalbor robustandsecurewatermarkingapproachbasedonhermitetransformandsvddct
AT jorgebrieva robustandsecurewatermarkingapproachbasedonhermitetransformandsvddct
AT andresromeroarellano robustandsecurewatermarkingapproachbasedonhermitetransformandsvddct