Abstract

Zero-watermarking is a blind digital watermarking method. It has reached the point where the robustness and the imperceptibility can arrive at a good balance. In this paper, a strong robust zero-watermarking scheme is proposed which employs multiresolution and multiscale representation characteristics of nonsubsampled shearlet transform to analyze the direction features of the given image. The effectiveness of the proposed scheme for dealing with many kinds of attack such as compression, noise addition, and scaling is demonstrated by the experimental results. When compared with other zero-watermarking schemes using counterpart transforms like discrete wavelet transform, the experimental results show that the proposed watermarking scheme can get better performance.

1. Introduction

Digital watermarking techniques [14] are effective means to protect copyright of the digital media. It has attracted a lot of attention in the last decade. However, traditional digital watermarking system which modifies the host image to some extent has been studied for a long time. There still remain such problems about watermarks as robustness, imperceptibility, or unavailability of the host image in the extracting process. A zero-watermarking system is a type of watermarking schemes that is encrypted with the host image [5] instead of hiding information inside the host image. It can be a good alternative watermarking method for its bringing no distortion to the host image. Thus, the quality of the host image can be ensured.

The crucial step in the zero-watermarking system is to extract stable internal feature information from the host image. As a higher dimensional signal, images are governed by anisotropic directional features [6], such as edges or textures. How to efficiently represent images with rich direction feature information is a central problem in image processing fields. The wavelet transform is well known for capturing the geometry of image edges because it provides a good multiresolution representation of one-dimensional piecewise smooth signals [7, 8], but it is restricted by the limited directionality in its filtering structures.

These disappointing behaviors indicate that more powerful representation methods are needed. Thus, numerous approaches for efficiently representing direction features in images have been proposed, including directional filter banks [9], Contourlet [1012], and shearlets [6, 10, 13, 14]. Among all these representation systems, shearlets exhibit many outstanding properties: the potential ability to use the power of multiscale to capture geometry of multidimensional data, optimally sparse approximation of anisotropic features. It is an affine system containing a single mother function that is parameterized by scaling, shearing, and translating parameters [15]. It is argued that shearlets can capture direction features more precisely and efficiently [13, 15]. All these brilliant advantages make shearlets the most successful and versatile representation system.

Zero-watermark algorithm was proposed by Wen et al. [16], which does not change the original image. And the most important step is to construct a zero-watermark with the essential characteristics of the host image. In previous literatures [17], though NSST was applied in zero-watermarking algorithms. It was not clearly stated what kind of essential parts of the images should be considered and why NSST is a better tool for representing images. Based on former studies [18], a novel zero-watermarking scheme is proposed through using shearlets and matrix norm to analyze image direction features and transform domain coefficients respectively. In this paper, image directionality is taken into account as a kind of essential property. And direction information intensity is defined to quantify the measurements. The experimental results demonstrate that the proposed algorithm can get remarkable robust ability. The comparison with latest methods proves that the zero-watermarking scheme that use shearlets is superior to those based on DWT.

2. Theoretical Background

2.1. Basic Theory of Shearlets [6, 13, 14, 19]

2-dimensional affine system with composite dilations is as follows:If forms a Parseval frame, the elements of this system are called composite wavelets. Shearlets are a special example of composite wavelets in . There are collections of the form (1) where is the anisotropic dilation matrix and is the shear matrix:for any , letwhere assume thatfor ,from the supporting condition and  , in frequency domain is supported withThat is, each element is supported on a pair of trapezoids, of approximate size , oriented along lines of the slope .

Nonsubsampled shearlet transform (NSST) is implemented by two steps. Firstly, apply Laplace Pyramid scheme to decompose the host image into a low-pass image and several different scale levels, namely, high-pass component . Secondly, the high-pass part is decomposed by discrete shearlet transform to get direction subbands. Because the image is decomposed without either downsampling or upsampling, the outputs have the same size as the original image. Figure 1(a) shows the illustration of LP decomposition succession and shearlet directional filtering. Figure 1(b) shows the tilling of frequency plane of shearlets.

2.2. Matrix Norm

If is a nonnegative matrix, its singular value decomposition (SVD) is defined as follows:where is minimum of and , is the singular value of matrix , is left singular value vector, and is right singular value vector. Spectrum norm and -norm of nonnegative matrix are defined as follows:Matrix’s spectrum norm is maximal singular; -norm is the square sum of all singular values. From formula (8), when , the matrix 2-norm is equivalent to the largest singular value.

SVD is widely applied to digital watermarking technologies [20, 21] and it effectively reveals that the larger singular values of an image do not change significantly when common image processing attacks are performed on this image. However, SVD calculating will increase algorithm’s complexity and computing cost, since the SVD process has matrix product. The definition of matrix multiplication is that if for an matrix and an matrix , then is an matrix with entries.

From this, a simple algorithm can be constructed which loops over the indices from 1 through and from 1 through , computing the above using a nested loop in Algorithm 1.

Input: matrices and
Let be a new matrix of the appropriate size
For from 1 to :
  For from 1 to :
   Let sum = 0
   For from 1 to :
     Set sum sum +
   Set sum
Return

This algorithm takes time . A common simplification for the purpose of the algorithm analysis is to assume that the inputs are all square matrices of size , in which case the running time is . The intimate relationship between matrix 2 norm and singular value is that matrix 2-norm is equivalent to the largest matrix singular value. Here we compared the calculating costs of SVD and matrix 2-norm. Table 1 shows the time costs when calculating SVD and 2-norm of a matrix by Matlab, R2013b. The CPU is Intel® Core™ 2, 3.00 GHz, 32 bit.

From Table 1, calculating 2-norms is faster than calculating SVD. When matrixes size become larger, like Lena (), the advantage of using 2-norm instead of SVD to acquire largest singular value becomes much more explicit. For the sake of time consuming, therefore, in this paper, matrix 2-norm is used instead of singular values to zero-watermarking embedding because of the intimate relationship between matrix norm and singular values.

3. A Novel Zero-Watermarking Scheme

3.1. Image Multidirection Features

There exist many kinds of directional components in the host image like textures or edges. A large number of literatures [22, 23] talked about methods to portray texture and edge directionality. Inspired by this special characteristic, in the proposed algorithm, multidirectionality of an image is regarded as a stable feature that should be given more attention in digital watermarking techniques.

Since the direction feature of an image is diverse, however, it is undisputable that only a few directions that DWT or DCT provides may not be sufficient enough to represent the direction information of an image [24]. Thus, high direction sensitivity becomes the most important property of the tool selected for image direction analysis. According to the discussion of shearlets in Section 2, NSST is suitable for dealing with this task because of its direction sensitivity and sparse approximation of anisotropic features. Figure 2 illustrates the two-level NSST of the Zoneplate image. The first scale-level is decomposed into 4 directional subbands, and the second scale-level is decomposed into 8-directional subbands. In the following, NSST is used to illustrate the method to extract direction feature information.

Let artificial image (a) in Figure 3 be denoted as , and then perform the forward NSST to obtain multidirection and multiscale representation:where denotes forward NSST and denotes the NSST coefficient matrix set of at scale , direction . As is shown in Figure 3, when single direction coefficients are reconstructed to the time domain, specific image direction features can be seen clearly. However, as is shown in Figure 4, there are many kinds of direction components existing in real images, such as geometrical lines, edges, and textures. Direction information intensity here is adopted to measure how much feature information the subband has in given direction. Direction information intensity is defined by the following rule:where denotes inverse NSST, indicates the direction coefficients in the time domain. The larger the is, the richer the direction information the subband has at scale , direction .

This direction feature information can be used for selecting watermark embedding position. To obtain the robustness, the directional subband with the largest direction feature information intensity will be selected to construct zero-watermark. Table 2 shows direction feature information intensity values of image Lena.

3.2. Proposed Algorithm

Based on the former analysis, a novel zero-watermarking scheme is proposed in this section. The actual watermark is a binary image denoted as . The host image is a gray-level image denoted as . Without the loss of generality, the size of host image and watermark must satisfy are integers. In this paper, the size of watermark is , the size of the host images is . That is, .

(1) Watermark Embedding

Step 1. Apply forward NSST to decompose the host image to gain multiscale and multiresolution representation.

Step 2. Reconstruct coefficients of 8 direction subbands to the time domain. All these 8-direction subbands are marked from to .

Step 3. Calculate direction feature information intensity of each subband according to formula (9) to determine embedding position .

Step 4. Divide the selected subband into nonoverlapping blocks followed by calculating 2-norms of each block and the largest 2-norm is ; the minimum 2-norm is . Then, compare all these 2-norms with the threshold defined as below:When the 2-norm is larger than ; otherwise, .

Step 5. The zero-watermarking is obtained from the binary embedding key and the actual watermarking based on the exclusive-or (XOR) operation:

At last, can be used to assert the copyright of the image when needed.

(2) Watermark Extracting

Step 1. Apply forward NSST to decompose the tested image .

Step 2. The extracting position and embedding position must be the same; thus, the extracting position is also .

Step 3. Divide the selected subband into nonoverlapping blocks followed by calculating 2-norms of each block and the largest 2-norm is , the minimum 2-norm is . Then, compare 2-norms with the threshold defined below like (12). When the 2-norm is larger than , :

Step 4. The extracted watermark can be obtained based on the following XOR operation

4. Performance Evaluation and Analysis

To verify the effectiveness of the proposed algorithm, a series of experiments were conducted using images from USI-SIPI image database. Here six sized grayscale images, which are shown in Figure 5, are taken as host images to quantify analysis of the proposed watermarking scheme. Structural similarity (SSIM) [25], which is used to measure the perceived quality of two images, and normalized correlation (), which is used to measure the resemblance between extracted and actual watermark, are applied. The SSIM index is calculated on various windows of an image. The measure between two windows and of common size iswhere and are the averages of and and are the variances of and , and is the covariance of and . and are constants, where by default, and is the dynamic range of the pixel-values.

is calculated aswhere and are the original and extracted watermark signals, respectively.

Figure 6 shows the extracted watermark from original images before attacking and it turns out that the watermark can be perfectly extracted.

In the following subsection,, various attacks, like JPEG compression, adding noise, median filtering et al., are performed on the original images to test the robustness of the proposed scheme.

4.1. Robustness to JPEG Compression

JPEG compression is one of the common attacks in image processing realm. Table 3 shows the values of and after JPEG compressing with various quality factors. It reveals that no matter what compressing factor is, values are all above 0.96. Therefore, the proposed algorithm is very robust against jpeg compressing. And three extracted watermarks are selected to show visual quality in Figure 7 with the compressing factor . It is not hard for anyone to notice that the watermarks can be perfectly extracted.

4.2. Robustness to Median Filtering

Figure 8 gives the results of extracted watermarks after median filtering. From the figures, it can be concluded that the performance of the proposed algorithm in anti-median filtering is different among different host images. For example, the values of the host image Baboon show that the image is easily distorted by median filtering. And thus, it cannot get strong robustness like other host images. Table 4 shows the and values after three kinds of median filtering. And three extracted watermarks are selected to show visual quality in Figure 8 after median filtering.

4.3. Robustness to Gaussian Noise and Salt and Pepper Noise

Adding noise is carried out to test antiattacking capacity with different standard deviations. Tables 5 and 6 show SSIM values of distorted host images and NC values under different variances of Gaussian noise and Salt and Pepper noise when the noise means are all set to 0. And the standard deviations are set at 0.001, 0.005, 0.01, 0.05, and 0.1. Figures 9 and 10 show the quantitative results of extracted watermarks. From the figures, though noise brings perceptibility distortion to the host images, the extracted watermarks can be seen clearly.

4.4. Robustness to Scaling

Four scaling operations are utilized to deteriorate the host images and scaling parameters are , 2, and 4. Table 7 shows the values of SSIM and NC at different scaling parameters. And Figure 11 shows the attacked images and extracted watermarks at scaling parameter = . From the SSIM values, it shows that the scaling attack brings little distortion to host images except that when scaling parameter is . But the extracted watermark is still pretty similar to the original watermark according to NC values.

4.5. Robustness to Rotating

No matter images are rotated by which angle, the inherent image direction information cannot be altered. In conventional DWT based algorithms, images are only decomposed in horizontal, vertical, or diagonal direction. Direction shortness in DWT leads to poor performance in analyzing rotated images. However, this kind of disadvantage can be perfectly resolved by NSST. Both transform directions and bases structure can be adjusted to adapt rotated images. Table 8 shows and values in experiments of six images rotated in 5 kinds of angles. And from Figure 12, the watermarks can be extracted without too much distortion.

4.6. The Comparison of Related Algorithm

Comparative experiments are implemented in order to verify the antiattacking capacity between the proposed algorithm in this paper and the other two schemes in paper [5], which use the counterpart transform, DWT. The scheme-1 first divide the host image into overlapping blocks. Each block is further decomposed up to level-one using DWT followed by singular value decomposition. Scheme-2 first applies DWT on the whole image and LL subband is then selected for the following processing.

Figures 13 and 14 demonstrate values comparing results and seven kinds of attacking style are listed in Table 9. The host images are Peppers and Barbara, respectively. It can be easily seen from these two figures that the proposed scheme in this paper generally outperforms the other two zero-watermarking methods. From Figure 13, the antiattacking ability of the proposed scheme is higher than other two methods, except that value of the third attacking is a bit lower. From Figure 14, values of our scheme are lower than the scheme-1 when attacking is resizing (512-256-512), median filtering (), and average filtering (). But according to the experimental data, values of our scheme are all above 0.96. That is to say, the proposed scheme is also a good method.

However, it cannot be ignored that DWT based methods are slightly better than the proposed algorithm in antiresizing. DWT has been widely used in watermarking mainly owing to its good ability in modeling the human visual system. The most important feature of NSST is its appropriate representation of direction feature parts, like textures or edges. When images are resized from 512 × 512 to 256 × 256, some direction feature information may be missing to some extent. This is the main reason why extracted watermark is slightly different from the original. However, it cannot be overlooked that the proposed algorithm shows the strong robustness ability significantly against rotating than the other two methods.

From the above analysis, the proposed algorithm takes more advantage in robustness performance and, therefore, it gets a higher security than the other two zero-watermarking algorithms.

5. Conclusions

A digital watermarking scheme based on NSST has been described in this paper. Experimental results demonstrate that the NSST improves the digital watermarking performance considerably when compared to other methods based on DWT. The results show the good robustness against common attacks. In conclusion, it can be argued that a NSST-based watermarking scheme has a good perspective for effective digital right management.

Competing Interests

The authors declare that they have no competing interests.

Acknowledgments

This work was supported by Scientific Research Starting Foundation of Northwest University, National Natural Science Foundation of China (nos. 61379010 and 61572400), and Natural Science Basic Research Plan in Shaanxi Province of China (no. 2015JM6293).