Block-Based Discrete Wavelet Transformsingular
Block-Based Discrete Wavelet Transformsingular
Research Article
ISSN 1751-9659
Block-based discrete wavelet transform- Received on 4th April 2014
Revised on 2nd June 2015
singular value decomposition image Accepted on 8th July 2015
doi: 10.1049/iet-ipr.2014.0965
watermarking scheme using human visual www.ietdl.org
system characteristics
Nasrin M. Makbol 1, Bee Ee Khoo 1 ✉, Taha H. Rassem 2
1
School of Electrical and Electronic Engineering, Universiti Sains Malaysia, Malaysia
2
Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang (UMP), Malaysia
✉ E-mail: [email protected]
Abstract: Digital watermarking has been suggested as a way to achieve digital protection. The aim of digital watermarking
is to insert the secret data into the image without significantly affecting the visual quality. This study presents a robust
block-based image watermarking scheme based on the singular value decomposition (SVD) and human visual system
in the discrete wavelet transform (DWT) domain. The proposed method is considered to be a block-based scheme that
utilises the entropy and edge entropy as HVS characteristics for the selection of significant blocks to embed the
watermark, which is a binary watermark logo. The blocks of the lowest entropy values and edge entropy values are
selected as the best regions to insert the watermark. After the first level of DWT decomposition, the SVD is performed
on the low-low sub-band to modify several elements in its U matrix according to predefined conditions. The
experimental results of the proposed scheme showed high imperceptibility and high robustness against all image
processing attacks and several geometrical attacks using examples of standard and real images. Furthermore, the
proposed scheme outperformed several previous schemes in terms of imperceptibility and robustness. The security
issue is improved by encrypting a portion of the important information using Advanced Standard Encryption a key size
of 192-bits (AES-192).
† The ability to handle each block separately allows multiple secret watermarking, ROI blocks are preserved, and the watermark
keys to be used for the selected blocks and improves security. is embedded in the remaining portion of the image; this
† The watermark capacity will vary between blocks according to portion is called the region of non-interest [22].
their properties, improving the robustness and imperceptibility. (ii) The scheme employs HVS characteristics (entropy and edge
† Block-based schemes are widely used in numerous entropy) to determine in which parts (blocks) of the image will
applications, such as region of interest (ROI) functions in produce un-noticeable distortion and achieve maximum robustness
medical images. To secure medical images through during embedding.
Fig. 8 PSNR values and visual perception comparison for the Lena watermarked image
Fig. 9 PSNR values and visual perception comparison for the pepper watermarked image
Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15]
‘No attack’ 1.0000 0.9863 1.0000 0.9893 1.0000 0.9736 0.9893 0.9795 1.0000 0.9619 0.9766 0.9795 0.8418 0.9023 0.7861 0.8945
7
8
Table 2 BCRs for the Lena and pepper images under geometrical attacks with different threshold values for the proposed scheme and Lai’s scheme
Attack type T = 0.04 T = 0.02 T = 0.012 T = 0.002
Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15]
‘Centred cropping 20%’ 0.9980 0.9854 0.9873 0.9805 0.9980 0.9727 0.9766 0.9697 0.9980 0.9609 0.9639 0.9697 0.8408 0.9023 0.7773 0.8857
‘Centred cropping 50%’ 0.9648 0.9512 0.8643 0.8535 0.9648 0.9434 0.8535 0.8447 0.9648 0.9277 0.8408 0.8447 0.8105 0.8701 0.6875 0.7725
‘Cropping off 20%’ 0.9600 0.9434 0.9844 0.9746 0.9600 0.9307 0.9746 0.9648 0.9600 0.9248 0.9619 0.9648 0.8076 0.8682 0.7715 0.8809
‘Cropping off 50%’ 0.7979 0.7891 0.8145 0.8047 0.7979 0.7773 0.8047 0.7979 0.7979 0.7686 0.7939 0.7939 0.6855 0.7285 0.6553 0.7354
‘Cropping off (20, 30)’ 0.9209 0.9121 0.9561 0.9502 0.9209 0.8984 0.9463 0.9404 0.9209 0.8906 0.9316 0.9385 0.7813 0.8369 0.7510 0.8594
‘Cropping off (40, 40)’ 0.8457 0.8379 0.8887 0.8809 0.8457 0.8271 0.8789 0.8750 0.8457 0.8174 0.8682 0.8770 0.7227 0.7705 0.7021 0.8057
‘Cropping columns off 10%’ 0.9102 0.8926 0.9434 0.9316 0.9102 0.8809 0.9316 0.9248 0.9102 0.8760 0.9199 0.9229 0.7627 0.8281 0.7500 0.8408
‘Cropping columns off 50%’ 0.7305 0.7227 0.5547 0.5508 0.7305 0.7100 0.5469 0.5459 0.7305 0.7061 0.5420 0.5439 0.6328 0.6689 0.4648 0.5127
‘Cropping rows off 10’ 0.8154 0.8125 0.9346 0.9346 0.8154 0.7969 0.9238 0.9248 0.8154 0.7920 0.9111 0.9248 0.7012 0.7373 0.7334 0.8428
‘Cropping rows off 50’ 0.5703 0.5693 0.6582 0.6504 0.5703 0.5557 0.6484 0.6455 0.5703 0.5557 0.6406 0.6436 0.5156 0.5293 0.5400 0.6016
‘Shift 2’ 0.9990 0.9102 0.9717 0.8848 0.9980 0.9082 0.9424 0.8613 0.9844 0.8857 0.8945 0.8398 0.7520 0.7178 0.6816 0.6680
‘Shift 20’ 0.5674 0.5674 0.5811 0.5771 0.5664 0.5762 0.5791 0.5801 0.5693 0.5654 0.5693 0.5850 0.5371 0.5547 0.5615 0.5635
‘Cut attack 50’ 0.7734 0.7559 0.8574 0.8486 0.7734 0.7432 0.8496 0.8438 0.7734 0.7383 0.8379 0.8428 0.6631 0.6855 0.6748 0.7705
‘Cut attack 100 rows’ 0.6475 0.6455 0.6582 0.6523 0.6475 0.6299 0.6533 0.6514 0.6475 0.6270 0.6494 0.6504 0.5752 0.5898 0.5254 0.5996
‘Cut attack 100 columns’ 0.6338 0.6201 0.7373 0.7256 0.6338 0.6182 0.7324 0.7227 0.6338 0.6143 0.7266 0.7197 0.5352 0.5898 0.6104 0.6680
‘Rotation 45’ 0.4912 0.4883 0.4922 0.5264 0.4883 0.4814 0.4883 0.5176 0.4912 0.4941 0.4941 0.5215 0.4941 0.5029 0.4902 0.5264
‘Rotation 2’ 0.5303 0.5928 0.4707 0.5498 0.5303 0.5938 0.4854 0.5459 0.5313 0.5977 0.4951 0.5713 0.5381 0.5400 0.5107 0.5596
‘Rotation 70’ 0.4785 0.5420 0.5068 0.5264 0.4814 0.5391 0.5078 0.5264 0.4834 0.5420 0.5068 0.5283 0.4873 0.5371 0.5059 0.5361
‘Rotation 110’ 0.4307 0.5576 0.5068 0.5625 0.4248 0.5576 0.5146 0.5645 0.4238 0.5625 0.5146 0.5625 0.4268 0.5547 0.5156 0.5615
‘Rotation 50’ 0.5000 0.5234 0.4932 0.5322 0.4961 0.5303 0.4961 0.5313 0.4912 0.5352 0.4922 0.5273 0.5039 0.5371 0.4971 0.5264
‘Rotation −50’ 0.4805 0.5059 0.4512 0.5215 0.4854 0.5078 0.4453 0.5234 0.4883 0.5098 0.4434 0.5137 0.4902 0.5029 0.4482 0.5098
‘Translate attack (10, 10)’ 0.3984 0.6133 0.4922 0.5566 0.4111 0.5752 0.5029 0.5381 0.4199 0.5430 0.5020 0.5225 0.4473 0.5049 0.5117 0.5117
‘Translate attack (10, 20)’ 0.4395 0.5889 0.4697 0.5557 0.4453 0.5625 0.4727 0.5342 0.4580 0.5313 0.4834 0.5332 0.4648 0.5029 0.4990 0.5225
‘Translate attack (30, 40)’ 0.4434 0.4648 0.5010 0.4971 0.4443 0.4736 0.5039 0.5020 0.4521 0.4863 0.5127 0.5215 0.4619 0.5244 0.5186 0.5381
‘Shearing attack (1, 0.2)’ 0.4863 0.5439 0.4600 0.5381 0.4863 0.5557 0.4521 0.5303 0.4893 0.5605 0.4541 0.5547 0.5068 0.5459 0.4580 0.5645
‘Shearing attack (0.2, 1)’ 0.4863 0.5439 0.4600 0.5381 0.4863 0.5557 0.4521 0.5303 0.4893 0.5605 0.4541 0.5547 0.5068 0.5459 0.4580 0.5645
‘Scaling 0.5’ 1.0000 0.8701 0.9756 0.8965 0.9990 0.9043 0.9453 0.9033 0.9990 0.9209 0.9072 0.9092 0.7969 0.7979 0.6787 0.7520
‘Scaling 0.25’ 0.9951 0.3906 0.8584 0.4951 0.9219 0.4717 0.7754 0.5420 0.8193 0.5127 0.6885 0.5381 0.5674 0.5283 0.5439 0.5254
Fig. 10 Visual quality comparison of the extracted watermarks for the Lena and pepper images for the proposed scheme and Lai’s scheme under image
processing attacks when T = 0.04
Fig. 11 Visual quality comparison of the extracted watermarks for the Lena and pepper images for the proposed scheme and Lai’s scheme under geometrical
attacks when T = 0.04
Attack type 0.04 0.02 0.012 0.002 0.04 0.020 0.012 0.002
Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15]
1.0000 0.8740 1.0000 0.8750 1.0000 0.8389 0.7969 0.7246 1.0000 0.7422 1.0000 0.5273 1.0000 0.8896 0.6553 0.7480
11
12
Table 4 BCRs for the examples of real-world images (Engineering campus image and Penang Bridge image) under geometrical attacks with different threshold values for the proposed scheme and Lai’s scheme
Threshold Engineering campus image Penang Bridge image
Attack type 0.04 0.02 0.012 0.002 0.04 0.020 0.012 0.002
Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15] Our Lai [15]
‘Centered_Cropping_50’ 0.9199 0.8096 0.9199 0.8174 0.9199 0.7871 0.7373 0.6807 0.8428 0.6543 0.8428 0.4727 0.8428 0.7412 0.5928 0.6543
‘Cropping_off_20’ 0.9521 0.8359 0.9512 0.8457 0.9512 0.8086 0.7549 0.6943 0.9658 0.7207 0.9658 0.5059 0.9658 0.8643 0.6299 0.7217
‘Cropping_off_50’ 0.8232 0.7285 0.8232 0.7324 0.8232 0.7100 0.6631 0.6113 0.7568 0.5527 0.7568 0.3916 0.7568 0.6650 0.5000 0.5361
‘Cropping_off_2030’ 0.9209 0.8086 0.9209 0.8174 0.9209 0.7813 0.7295 0.6729 0.9512 0.7119 0.9512 0.4980 0.9512 0.8525 0.6221 0.7100
‘Cropping_off_4040’ 0.8896 0.7754 0.8896 0.7852 0.8896 0.7490 0.7090 0.6436 0.8242 0.6123 0.8242 0.4248 0.8242 0.7295 0.5459 0.5918
‘Cropping_columns_off_10’ 0.9043 0.8008 0.9043 0.7949 0.9023 0.7744 0.7256 0.6660 0.9150 0.6670 0.9150 0.4824 0.9150 0.8086 0.5986 0.6787
‘Cropping_columns_off_50’ 0.6777 0.6113 0.6777 0.6064 0.6777 0.5947 0.5645 0.5225 0.6846 0.5049 0.6846 0.3828 0.6846 0.5938 0.4668 0.5020
‘Cropping_raws_off_10’ 0.7998 0.7217 0.7998 0.7246 0.7998 0.6963 0.6289 0.6035 0.9141 0.6914 0.9141 0.5039 0.9141 0.8271 0.5947 0.6816
‘Cropping_raws_off_50’ 0.6553 0.5938 0.6553 0.5928 0.6553 0.5791 0.5205 0.5020 0.3721 0.3262 0.3721 0.2852 0.3721 0.3496 0.3115 0.3096
‘shift_2’ 0.9932 0.8555 0.9561 0.8174 0.9063 0.7412 0.7021 0.6377 1.0000 0.7402 1.0000 0.5967 1.0000 0.8115 0.6943 0.6650
‘shift_20’ 0.5986 0.5947 0.6143 0.5703 0.5996 0.5596 0.5889 0.5625 0.6152 0.5303 0.6064 0.4131 0.6035 0.5791 0.4785 0.5234
‘cut_attack_50’ 0.6836 0.6055 0.6836 0.6133 0.6836 0.5762 0.5693 0.5303 0.9277 0.6914 0.9277 0.5039 0.9277 0.8271 0.6055 0.6816
‘cut_attack_100_raws’ 0.5215 0.4658 0.5215 0.4785 0.5215 0.4424 0.4561 0.4199 0.7900 0.5908 0.7900 0.4365 0.7900 0.6982 0.5186 0.5742
‘cut_attack_100_columns’ 0.6768 0.6182 0.6738 0.6104 0.6729 0.5967 0.5605 0.5293 0.6777 0.5303 0.6777 0.4043 0.6777 0.6396 0.4629 0.5371
‘rotation_45’ 0.4512 0.5332 0.4512 0.5195 0.4502 0.5117 0.4541 0.5176 0.4961 0.5684 0.5049 0.5654 0.5176 0.5752 0.5234 0.5742
‘rotation_2’ 0.5264 0.5732 0.5303 0.5811 0.5400 0.5713 0.5518 0.5645 0.4678 0.5508 0.4795 0.5361 0.5020 0.5547 0.5479 0.6143
‘rotation_70’ 0.4453 0.5244 0.4443 0.5205 0.4443 0.5156 0.4404 0.5195 0.4805 0.5420 0.4697 0.5410 0.4678 0.5439 0.4570 0.5459
‘rotation_110’ 0.4541 0.5400 0.4570 0.5361 0.4551 0.5342 0.4551 0.5449 0.4854 0.5781 0.4785 0.5820 0.4785 0.5674 0.4658 0.5674
‘rotation_50’ 0.4258 0.5000 0.4287 0.4941 0.4307 0.4980 0.4316 0.5000 0.4922 0.5703 0.4990 0.5645 0.4990 0.5752 0.5049 0.5742
‘rotation__50’ 0.4619 0.4961 0.4648 0.5039 0.4609 0.5059 0.4619 0.5107 0.5088 0.5742 0.5205 0.5732 0.5283 0.5762 0.5342 0.5586
‘Translate_attack_10_10’ 0.4121 0.5811 0.4570 0.5557 0.4883 0.5527 0.5234 0.5498 0.4746 0.6533 0.4834 0.6465 0.4805 0.6270 0.5518 0.5703
‘Translate_attack_10_20’ 0.4316 0.5811 0.4521 0.5674 0.4824 0.5635 0.5078 0.5635 0.4795 0.6563 0.4814 0.6387 0.4971 0.6055 0.5371 0.5713
‘Translate_attack_30_40’ 0.4922 0.5273 0.5029 0.5430 0.5273 0.5654 0.5518 0.5684 0.4893 0.4658 0.4883 0.4766 0.4902 0.4854 0.5410 0.5674
‘Shearing_attack_1_02’ 0.5098 0.5371 0.5254 0.5459 0.5293 0.5508 0.5361 0.5488 0.5342 0.5400 0.5371 0.5430 0.5420 0.5449 0.5439 0.6006
‘Shearing_attack_02_1’ 0.5098 0.5371 0.5254 0.5459 0.5293 0.5508 0.5361 0.5488 0.5342 0.5400 0.5371 0.5430 0.5420 0.5449 0.5439 0.6006
‘Scaling_05’ 0.9980 0.8975 0.9785 0.8936 0.9297 0.8301 0.6768 0.6436 1.0000 0.7227 1.0000 0.7461 1.0000 0.7227 0.6318 0.6846
‘Scaling_025’ 0.8076 0.5244 0.7266 0.5527 0.6777 0.5723 0.6162 0.5645 0.9990 0.5098 0.9697 0.5293 0.8682 0.5244 0.4834 0.4795
⎡ ⎤⎡ ⎤⎡ ⎤
u1,1 , . . . , u1,n s1,1 , 0, . . . , 0 v1,1 , . . . , v1,n T
⎢ u2,1 , . . . , u2,n ⎥⎢ ⎥⎢ . . . , v2,n ⎥ 3 Proposed image watermarking scheme
⎢ ⎥⎢ 0, s2,2 , . . . , 0 ⎥⎢ v2,1 , ⎥
A=⎢
⎢ . ⎥⎢
⎥⎢ . ⎥⎢
⎥⎢ . ⎥
⎥ (7)
⎣ . ⎦⎣ . ⎦⎣ . ⎦ A robust hybrid digital image watermarking scheme based on DWT,
SVD and HVS characteristics is presented in this work. The
un,1 , . . . , un,n 0, 0, . . . , sn,n vn,1 , . . . , vn,n
watermark embedding and extracting procedures, depicted in
Figs. 2 and 3, are presented in the subsequent subsections. Before
U and V are n × n orthogonal matrices; U TU = I, V TV = I and S = listing the watermarking steps, we highlight two important points.
diag(σ1,1, σ2,2, …, σn,n) that includes non-negative singular First, the scheme is a block-based scheme embedding the
values arranged in a descending order. These matrices can be watermark in specified regions (blocks); therefore, the image is
rectangular or square. Many hybrid digital image watermarking decomposed into (8 × 8) non-overlapping blocks. This size is
schemes use SVD with other transforms watermark. A lot of selected to obtain 4 × 4 blocks after performing a DWT
them explore the singular values, S; to embed the watermark. decomposition; this size is considered the smallest possible size
Fig. 12 PSNR values and visual perception comparison for the Engineering campus watermarked image
that can be obtained in the proposed scheme. HVS characteristics The changing process in each block is based on examination of
are employed to select the desired blocks by calculating the the binary watermark bit at the location of the block (as
entropy and edge entropy using (1) and (2), respectively, for each explained in the following algorithm). This algorithm can
block. These two obtained values of each block are summed, and preserve the image quality and provide greater robustness
the resulting magnitude values are sorted in ascending order. It is against attacks, notably against JPEG attacks. The watermark
desirable to modify the minimum number of edge points of the embedding and extracting procedures are shown in Algorithm 1
host image during the watermark embedding [27]. Therefore, the (see Fig. 4).
blocks with the lowest magnitude values (called low informative
blocks) are selected as the best regions to insert the watermark
[21, 29]. The number of selected blocks is 1024, equal to the
watermark size (32 × 32). 3.1 Embedding procedure
The second point is that the embedding process is achieved by
extracting the algebraic properties of the image from the first Before displaying the embedding steps, the coordinates (x, y) of the
column of the U vector, and the watermark bits are embedded selected blocks are stored in two matrices denoted X and Y. These
by changing the relationship between the U2,1 and U3,1. coordinates represents the secret keys and have been encrypted
Empirically, selecting U2,1 and U3,1 in the first column of U to using AES-192.
embed a watermark bit achieves better results than Lai [21]
scheme, who employed U3,1 and U4,1 to embed the watermark. † Divide the host image into (8 × 8) non-overlapping blocks.
Fig. 14 Visual quality comparison of the extracted watermarks for the real-world images (Engineering campus image and Penang Bridge image) for the
proposed scheme and Lai’s scheme under image processing attacks when T = 0.04
Fig. 15 Visual quality comparison of the extracted watermarks for the real-world images (Engineering campus image and Penang Bridge image) for the
proposed scheme and Lai’s scheme under geometrical attacks when T = 0.04
Table 5 Comparing the PSNR values for the host images, Lena and pepper, under different threshold values
Image Scheme T = 0.002 T = 0.012 T = 0.02 T = 0.04 Average
Table 6 Comparing the BCR values of the extracted watermark for the host images, Lena and pepper, under different attacks when 0.012 and 0.04
thresholds
Threshold Image Scheme Cropping off 25% Gauss. noise 3% Median filter [3 × 3] JPEG comp. 70% Sharpening Average
0.012 Lena Chang et al. [18] 0.8115 0.6230 0.5283 0.6806 0.8847 0.7056
Chung et al. [19] 0.8115 0.7080 0.4980 0.6855 0.9589 0.7324
Fan et al. [20] 0.8115 0.6250 0.5292 0.6806 0.8867 0.7066
Lai [21] 0.8476 0.5928 0.9688 0.9941 0.9990 0.8805
our scheme 0.9307 0.6504 0.9961 0.9932 0.9999 0.9141
Pepper Chang et al. [18] 0.8310 0.6435 0.4794 0.6943 0.8837 0.7064
Chung et al. [19] 0.8330 0.6611 0.4628 0.6562 0.9365 0.7099
Fan et al. [20] 0.8311 0.6464 0.4833 0.6933 0.8828 0.7074
Lai [21] 0.7969 0.5908 0.8369 0.9160 0.9316 0.8145
our scheme 0.9385 0.6152 0.8340 0.9063 0.9434 0.8475
0.04 Lena Chang et al. [18] 0.8125 0.8750 0.5507 0.9687 0.9873 0.8388
Chung et al. [19] 0.8125 0.9179 0.5107 0.9794 0.9892 0.8419
Fan et al. [20] 0.8125 0.8740 0.5468 0.9658 0.9873 0.8373
Lai [21] 0.8477 0.9521 1.0000 1.0000 1.0000 0.9599
our scheme 0.9307 0.9053 1.0000 1.0000 1.0000 0.9672
Pepper Chang et al. [18] 0.8359 0.8720 0.4921 0.9511 0.9667 0.8236
Chung et al. [19] 0.8359 0.8896 0.4726 0.9443 0.9628 0.8211
Fan et al. [20] 0.8359 0.8720 0.4941 0.9472 0.9658 0.8230
Lai [21] 0.8271 0.8544 0.9541 0.9609 0.9717 0.9136
our scheme 0.9629 0.7988 0.9375 0.9717 0.9775 0.9297
In this experiment, the proposed scheme is tested with the same 7 References
watermark logo that is used previously [21]. The same host 1 Gerhard, C., Setyawan, I., Lagendijk, R.: ‘Watermarking digital image and video
images, Lena and pepper, are used with identical threshold values. data’, IEEE Signal Process. Mag., 2000, 17, (5), pp. 20–46
Table 5 shows the PSNR of the imperceptibility of all schemes 2 Chang, C., Lin, P., Yeh, J.: ‘Preserving robustness and removability for digital
under different threshold values. The imperceptibility of the watermarks using subsampling and difference correlation’, Inf. Sci., 2009, 179,
(13), pp. 2283–2293
proposed scheme is best, and our scheme outperforms all others 3 Huang, C., Wu, J.: ‘Fidelity-guaranteed robustness enhancement of blind-detection
under all threshold values with both host images, Lena and watermarking schemes’, Inf. Sci., 2009, 179, (6), pp. 791–808
pepper. In the robustness comparison, only threshold values of 4 Liu, K.C., Chou, C.H.: ‘Robust and transparent watermarking scheme for colour
0.04 and 0.012 are tested. Table 6 shows the similarity between images’, IET Image Process., 2009, 3, (4), pp. 228–242
5 de Vugt, F.: ‘Quantization-watermarking methods for digital audio’, 2001
the extracted watermark and the original watermark in terms of 6 Ruanaidh, J., Pun, T.: ‘Rotation, scale and translation invariant digital image
BCR. Only five different attacks that are exposed to our proposed watermarking’. Proc. IEEE Int. Conf. Image Processing, 1997, pp. 536–539
scheme are similar to other schemes. These are the cropping attack 7 Makbol, N.M., Khoo, B.E.: ‘Robust blind image watermarking scheme based on
(cropping of 25%), Gaussian noise 3%, median filter [3 × 3], JPEG redundant discrete wavelet transform and singular value decomposition’,
AEU-Int. J. Electron. C, 2013, 67, (2), pp. 102–112
compression attack (Q = 70%) and sharpening attack. At a 8 Chang, C., Lin, C., Tseng, C., et al.: ‘Reversible hiding in DCT-based compressed
threshold value = 0.04, the proposed scheme performs better than images’, Inf. Sci., 2007, 177, (13), pp. 2768–2786
other schemes, except in the median filter attack for the Lena 9 Cox, I., Kilian, J., Leighton, F., et al.: ‘Secure spread spectrum watermarking for
image and in the median filter and Gaussian noise attack for the multimedia’, IEEE Trans. Image Process., 1997, 6, (12), pp. 1673–1687
10 Li, Q., Cox, I.: ‘Using perceptual models to improve fidelity and provide resistance
pepper image. At a threshold value = 0.04, the proposed scheme to valumetric scaling for quantization index modulation watermarking’, IEEE
performs better than other schemes, except in the median filter Trans. Inf. Forensics Sec., 2007, 2, (2), pp. 127–139
attack for the Lena image and in the median filter and Gaussian 11 Aslantas, V., Ozer, S., Ozturk, S.: ‘Improving the performance of DCT-based
noise attack for the pepper image. Under the other threshold fragile watermarking using intelligent optimization algorithms’, Opt. Commun.,
2009, 282, (14), pp. 2806–2817
values (T = 0.012), the proposed scheme is the best for the Lena 12 Li, L., Yuan, X., Lu, Z., et al.: ‘Rotation invariant watermark embedding based on
image in the sharpening and cropping attacks and in the scale-adapted characteristic regions’, Inf. Sci., 2010, 180, (15), pp. 2875–2888
sharpening, cropping and median filter attacks for the pepper host 13 Lin, T., Lin, C.: ‘Wavelet-based copyright-protection scheme for digital images
image. Based on the average of the BCR values of all attacks, our based on local features’, Inf. Sci., 2009, 179, (19), pp. 3349–3358
14 Maity, S., Kundu, M., Das, T.: ‘Robust SS watermarking with improved capacity’,
proposed scheme is the best when T = 0.04 and T = 0.012. Pattern Recognit. Lett., 2007, 28, (3), pp. 350–356
15 Lai, C.C., Tsai, C.C.: ‘Digital image watermarking using discrete wavelet
transform and singular value decomposition’, IEEE Trans. Instrum. Meas., 2010,
59, (11), pp. 3060–3063
5 Conclusions 16 Aslantas, V.: ‘An optimal robust digital image watermarking based on SVD using
differential evolution algorithm’, Opt. Commun., 2009, 282, (5), pp. 769–777
In this paper, a DWT–SVD block-based image watermarking 17 Basso, A., Bergadano, F., Cavagnino, D., et al.: ‘A novel block-based
watermarking scheme using the svd transform’, Algorithms, 2009, 2, (1), pp. 46–75
scheme is presented. Several characteristics were employed to 18 Chang, C.C., Tsai, P., Lin, C.C.: ‘SVD-based digital image watermarking scheme’,
achieve high-level grades for the watermarking requirements and Pattern Recognit. Lett, 2005, 26, (10), pp. 1577–1586
maintain the trade-off between them. Initially, blocking was used 19 Chung, K.L., Yang, W.N., Huang, Y.H., et al.: ‘On SVD-based watermarking
to divide the image into blocks. Then, only a portion of these algorithm’, Appl. Math. Comput., 2007, 188, (1), pp. 54–57
20 Fan, M.Q., Wang, H.X., Li, S.K.: ‘Restudy on SVD-based watermarking scheme’,
blocks were selected to include the watermark; this selection Appl. Math. Comput., 2008, 203, (2), pp. 926–930
ensured that the embedding process would affect specific regions 21 Lai, C.C.: ‘An improved SVD-based watermarking scheme using human visual
of the image. The HVS characteristics of entropy and edge entropy characteristics’, Opt. Commun., 2011, 284, (4), pp. 938–944
were used to select the low informative blocks as the best 22 Rathi, S., Inamdar, V.: ‘Medical images authentication through watermarking
preserving ROI’, Healthcare Inf., Int. J. (HIIJ), 2012, 1, (1), pp. 27–42
embedding regions. The scheme employed the properties of a 23 Serdean, C.V., Tomlinson, M., Wade, J.G, Ambroze, M.: ‘Protecting intellectual
DWT and SVD. These methods aimed to provide high robustness rights: Digital watermaking in the wavelet domain’. Proc. IEEE Int. Workshop
by selecting the most robust regions with an emphasis on Trends and Recent Achievements in Information Technology, 2002
maintaining non-noticeable distortions, in other words, to maintain 24 Liu, L.: ‘A survey of digital watermarking technologies’. Tech. Rep., Stoney Brook
University, USA, 2005
imperceptibility. 25 Padmanabha Reddy, Varadarajan, S.: ‘Human visual system sentient imperceptible
The proposed scheme outperformed all similar previous schemes and efficient wavelet-based watermarking scheme for copyright protection of
and achieved the highest imperceptibility. In terms of robustness, digital images’, IJCSNS Int. J. Comput. Sci. Netw. Sec., 2009, 9, (4), pp. 255–264