TY - JOUR
T1 - Encryption based image watermarking algorithm in 2DWT-DCT domains
AU - Hasan, Nayeem
AU - Islam, Md Saiful
AU - Chen, Wenyu
AU - Kabir, Ashad
AU - Al-Ahmadi, Saad
PY - 2021/8/17
Y1 - 2021/8/17
N2 -
This paper proposes an encryption-based image watermarking scheme using a
combination of second-level discrete wavelet transform (2DWT) and
discrete cosine transform (DCT) with an auto extraction feature. The
2DWT has been selected based on the analysis of the trade-off between
imperceptibility of the watermark and embedding capacity at various
levels of decomposition. DCT operation is applied to the selected area
to gather the image coefficients into a single vector using a zig-zig
operation. We have utilized the same random bit sequence as the
watermark and seed for the embedding zone coefficient. The quality of
the reconstructed image was measured according to bit correction rate,
peak signal-to-noise ratio (PSNR), and
similarity index. Experimental results demonstrated that the proposed
scheme is highly robust under different types of image-processing
attacks. Several image attacks, e.g., JPEG compression, filtering, noise
addition, cropping, sharpening, and bit-plane removal, were examined on
watermarked images, and the results of our proposed method outstripped
existing methods, especially in terms of the bit correction ratio
(100%), which is a measure of bit restoration. The results were also
highly satisfactory in terms of the quality of the reconstructed image,
which demonstrated high imperceptibility in terms of peak
signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks.
AB -
This paper proposes an encryption-based image watermarking scheme using a
combination of second-level discrete wavelet transform (2DWT) and
discrete cosine transform (DCT) with an auto extraction feature. The
2DWT has been selected based on the analysis of the trade-off between
imperceptibility of the watermark and embedding capacity at various
levels of decomposition. DCT operation is applied to the selected area
to gather the image coefficients into a single vector using a zig-zig
operation. We have utilized the same random bit sequence as the
watermark and seed for the embedding zone coefficient. The quality of
the reconstructed image was measured according to bit correction rate,
peak signal-to-noise ratio (PSNR), and
similarity index. Experimental results demonstrated that the proposed
scheme is highly robust under different types of image-processing
attacks. Several image attacks, e.g., JPEG compression, filtering, noise
addition, cropping, sharpening, and bit-plane removal, were examined on
watermarked images, and the results of our proposed method outstripped
existing methods, especially in terms of the bit correction ratio
(100%), which is a measure of bit restoration. The results were also
highly satisfactory in terms of the quality of the reconstructed image,
which demonstrated high imperceptibility in terms of peak
signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks.
KW - image watermarking
KW - differential encryption
KW - Discrete Wavelet Transform (DWT)
KW - Discrete Cosine Transform
KW - Information Security
U2 - 10.3390/s21165540
DO - 10.3390/s21165540
M3 - Article
C2 - 34450982
SN - 1424-8220
VL - 21
SP - 1
EP - 20
JO - Sensors (Switzerland)
JF - Sensors (Switzerland)
IS - 16
M1 - 5540
ER -