Research Article  Open Access
WaveletBased Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity
Abstract
This paper proposes a new dynamic and robust blind watermarking scheme for color pathological image based on discrete wavelet transform (DWT). The binary watermark image is preprocessed before embedding; firstly it is scrambled by Arnold cat map and then encrypted by pseudorandom sequence generated by robust chaotic map. The host image is divided into blocks, and the encrypted watermark is embedded into the higher frequency domain of blue component. The mean and variance of the subbands are calculated, to dynamically modify the wavelet coefficient of a block according to the embedded 0 or 1, so as to generate the detection threshold. We research the relationship between embedding intensity and threshold and give the effective range of the threshold to extract the watermark. Experimental results show that the scheme can resist against common distortions, especially getting advantage over JPEG compression, additive noise, brightening, rotation, and cropping.
1. Introduction
For content owners and distributors, there emerged a necessary concern in regard to the content authentication of pathological images as well as copyright protection. A latent solution to this issue is bestowed by digital watermarking. In general, image watermarking can be divided into two categories, according to the processing domain of cover images where the watermark is embedded: (1) the spatial domain method, which directly modifies the intensity value of the image and these algorithms are simple and speedy but not robust; (2) the frequency domain method, which is to modify the frequency coefficients.
In recent years, chaos is employed to encrypt the image, for it has sensitive dependence on initial conditions and can be employed to generate pseudorandom sequences, so the algorithm has large key space. Shyamsunder and Kaliyaperumal [1] proposed an image encryption scheme, which incorporates the concept of modular arithmetic and chaos theory. A necessary random matrix is generated for image encryption, and the lookup table is used to find the element by modular inverse of the random matrix for decryption. Rawat and Raman [2] proposed a chaosbased watermarking scheme for image authentication and tamper detection. Their scheme can detect any modification made to the image and can also indicate the specific locations that have been modified. To improve the security of the proposed scheme, two chaotic maps are employed. Li et al. [3] used logistic system and Chebyshev maps to construct a hybrid chaotic mapping system, the aim is to set risk transfer, process and improve risk management efficiency in projects management. That is a good case for applying chaos in enterprise management.
The DWT approach remains one of the most effective ways for image watermarking. Lin et al. [4] proposed a blind watermarking algorithm based on maximum wavelet coefficient quantization; the blocks are randomly selected from different subbands, by adding different energies to the maximum wavelet coefficient to embed the watermark. The wavelet functions will analyze image features such as edges and borders through good spacefrequency localization. They are used in several fields: image compression, signal denoising, image smoothing, and texture analysis. The main advantages of embedding watermarks in the DWT can be found in [5, 6].
The most important issue in DWTbased image watermarking is how to choose the effective coefficients to be embedded and extracted. Liu [7] estimates the noise detection threshold of each wavelet coefficient in luminance and chrominance components of color image. The thresholds are derived into a locally dynamic fashion based on the wavelet decomposition, through which the perceptually significant coefficients are selected for embedding watermark. AlOtum and Samara [8] proposed a watermark scheme based on the wavelet trees, which exploits the significant features and relations between the color pixel components in the wavelet domain. The watermark is embedded by spreading it that the interpixel robust relations carry the watermark bit sign with sufficient energy. Zhang et al. [9] proposed an adaptive blockbased for embedding binary watermark into grayscale image. In these articles, the watermark bits are only shuffled by pseudorandom sequence, they are not scrambled to uniformly, and randomly distributed in the host image, which will lead to be attacked easily. The threshold is a fixed experimental value, and the authors did not explain how to get the threshold.
Horng et al. [10] proposed a blind watermarking algorithm based on the significant difference of wavelet coefficient quantization. The maximum wavelet coefficients are quantized that their significant difference between watermark bit 0 and 1 exhibits a large energy difference, which can be used for watermark extraction. An adaptive threshold is designed to extract the watermark.
In this paper, we propose a dynamic blind watermarking scheme for color pathological image based on DWT; the watermark is scrambled firstly by Arnold cat map and XOR with pseudorandom sequence generated by Chebyshev map. The host image is divided into blocks, and each bit of the encrypted watermark is embedded into the detail wavelet subband, that is, the higherfrequency domain of blue component. We modify the wavelet coefficient dynamically according to the mean and variance of the subbands to embed “0” or “1.” In addition, we research the relationship between the embedding intensity and the threshold and deduce the range of the threshold, by which to extract the watermark correctly.
2. Watermarking Algorithm
2.1. Preprocessing the Watermark Image
The watermark used for embedding is a binary logo image, which is very small in size compared to the host image. The watermark needs to be very small so that it is spatially localized and becomes robust against the intentional and unintentional attacks.
For a binary logo image, in order to uniformly and randomly spread the bits over the host image, it is needed to be preprocessed, or the watermarked image cannot resist against even the simplest attack: cropping. The watermark can be preprocessed in numerous ways, such as randomly select the embedding position, generate pseudorandom sequences to shuffle these bits [11], or the original watermark itself is dynamically generated from a pseudorandom Gaussian sequence [12, 13].
Here we take two measures to preprocess the watermark bits. Firstly, in order to make the watermarked image be more robust to resist against cropping attack, the twodimensional Arnold cat map [14] is employed to scramble these binary bits. Suppose the watermark is an binary image ; after scrambling, we get the binary image ; the aim is to uniformly spread the watermark bits in the host image. By this means, the watermarked image can be more robust against cropping than the method in [7]. The iteration times is served as one of the keys. The Arnold cat map can be described as follows:
Secondly, watermarks generated from lowpass chaotic signals have superior performance over other signal types [13]. In order to eliminate the statistical significance and make the numbers of 0 and 1 approximately equal, a pseudorandom sequence will be generated by the Chebyshev map.
The expression of Chebyshev map is as follows: where is the degree of Chebyshev map. Its corresponding invariant density is as follows:
Chebyshev map has important properties of excellent cryptosystem [14, 15]. While , the Lyapunov exponent of the Chebyshev map is positive, which predicates that Chebyshev map is chaotic, as shown in Figure 1.
(a) The bifurcate image
(b) The Lyapunov exponent image
Different sequences can be generated with different initial values; we get the sequence by
Finally, we can get the binary image by the XOR operation: which is a binary sequence to be embedded into the host image.
The preprocessing process, including the original image , the scrambled image , and the image , is shown in Figure 2.
(a) Original watermark
(b) Scrambled watermark
(c) Watermark after XOR operation
2.2. Analysis of Wavelet Coefficients
The host image of size is transformed into wavelet coefficients using the level discrete wavelet transform (DWT). With level decomposition, we can get subbands, as shown in Figure 3. The lowest band (approximation band) is the basic band of the decomposed wavelet, which includes most of the energy from the original image; it has a crucial effect on quality; therefore, frequency band is unsuitable to be modified.
Only embedding the watermark into , ,…, subbands is also unsuitable, for they have the highest wavelet coefficients; the subbands can easily be eliminated and modified by lossy compression or other processing [14].
According to these characteristics, we design to adaptively adjusting, the highfrequency coefficient of the subbands , , and , to embed the watermark bits.
Generally, watermark embedding is realized by modifying some special values of pixels or transforming domain coefficients [16]. When the watermarked image receives some attacks, though the quality is still high, the pixel value or coefficient may be seriously eliminated, which will lead to the watermark detecting failed [17, 18]. Here we take advantage of the statistic characteristic, such as mean and variance of the , , and subbands, to modify the whole coefficients of them to dynamically embed the watermark and implement the compromise between quality and robustness.
2.3. Watermark Embedding
After preprocessing the binary watermark image to get , we reshape to binary sequence ; its length is still . According to Human Visual System (HVS) [19], small changes to the blue component of color image are the most difficult to detect by human eyes; then we select the blue component to embed.
Here we improve the method in [9] to embed preprocessed watermark into the blue component of color image. Suppose the host color image is . Firstly, we divide the blue component of into a set of nonoverlapping subblocks , . Then a level DWT decomposition of each subblock of image is performed using Haar wavelet, and then compute the mean of each wavelet block by where is the wavelet coefficient of the th subblock, is the level of wavelet decomposition, refers to the three subbands of , and . is the coordinate for wavelet coefficient in the wavelet blocks, and is the total number of wavelet coefficient in .
For example, here we set , for the th subblock ; we use the function in Matlab to perform a singlelevel twodimensional wavelet decomposition. Finally, can be gotten by (9)
The purpose of is to keep the average of in (10) and (11) close to zero.
If , we modify the whole wavelet coefficients in by
If , we modify the whole wavelet coefficients in by
Here is the modified wavelet coefficient; the distribution of wavelet coefficient is modulated by . refers to the three detail subbands of , , and . That is to say, embedding “0” means that the coefficient mean of wavelet block is , and embedding “1” means 0. refers to the magnification of ; here we set to ensure the range of threshold larger enough to extract the watermark.
Because the variance is bigger in the textures and edges than that in the smooth region, we use the variance of the coefficient as the modulation coefficient to control the dynamically embedding intensity [19]. Raising embedding intensity within the definition can enhance the robustness [15]. So can be defined by is defined as
We can find that is the local variance of the th wavelet subblock except the approximate subband , and is a constant. In (12), is the intensity coefficient, which ensures to embed some watermark in the smooth region while is approximately 0. So (11) can be fully expressed by (14).
Using (10) and (14) we embed watermark by modify the wavelet coefficients. Finally, the IDWT is applied to each block, to get the watermarked image .
2.4. Watermark Extraction
The watermark can be extracted correctly from the watermarked image, without the original host image or the watermark image, so the scheme belongs to blind watermark algorithm. The transformed coefficients are compared with the threshold of the coefficients, those coefficients above the threshold are retained, and all the others are discarded [20].
The extracting process is as follows, which is mirroring the embedding process.
Step 1. We divide the blue component of the watermarked color image into a set of nonoverlapping subblocks.
Step 2. To extract the embedded bit from a subblock, the level DWT decomposition of each block is firstly obtained. Then we compute , the coefficients sum of the wavelet block using
For all the wavelet blocks of ,
where , then we can get the range of .
Step 3. is compared with the threshold , to decide whether the coefficient carries a bit “1” or “0” using where is the extracted bit.
Step 4. Finally, the extracted watermark bits are recovered into a binary image according to the inverse process.
During the embedding and extracting processes, the iteration times of Arnold transform, the initial value of Chebyshev map, the size of each block, the values of , , and , the threshold , and the type of wavelet are all served as keys, which can guarantee the security of the watermarked image; it is impossible to extract the watermark without these keys.
3. Experimental Result Analysis
3.1. Get the Effective Range of the Threshold in Experiment
The threshold is a critical factor, which can ensure to extract the watermark correctly from watermarked image under some attacks, and some papers only provide a fixed value [3, 7, 8]. The proposed scheme provides an exact range of the threshold by testing dozens of images, and it keeps constant even if the watermarked image has been attacked in some degree.
Figure 4 is Image1 distribution of before embedding; we can find that most of the coefficients in the detail subbands after DWT are close to zero, and the mean of each detail subband is approximately zero.
Figures 5 and 6 are the Image1 distribution of after embedding with and ; from them we can find that when , the distribution of is relatively concentrated, but when , the values of distribute in larger range. The distribution of other images, such as Image3 and Airplane, is similar to Image1 when we set .
Experiment results demonstrate that when we set , the threshold , which is consistent with the result of (16), the range of watermark can ensure the watermark to be extracted clearly from the watermarked images.
3.2. The Relationship between and PSNR
The quality of watermarked image is based on the PSNR [12]. From Figure 7 we can find that the PSNRs decrease smoothly with the increase of , which can increase the embedding intensity . What’s more, Figure 7 shows that the PSNR values of Image1, Image2, and Image3 are similar, and they are greater than that of Image1, for they have richer edges and borders than Image4, as shown in Figure 8.
(a) Image1
(b) Image2
(c) Image3
(d) Image4
4. Experimental Results and Key Space
4.1. Experimental Result
Here we made a binary image as the watermark. Some standard color images with the size of bits, including Image1, Airplane, and Image3, are being tested. The size of the subblock is set to , , , when , , and ; the results of watermarked images are satisfactory, as shown in Figure 9.
(a) The original Image1
(b) The watermarked Image1
(c) Almost no difference between (a) and (b)
4.2. Key Space Analysis
The high sensitivity to initial conditions is inherent to any chaotic system. To provide an secure algorithm, the key space should be large enough to make any brute force attack ineffective. Our scheme has some of the following secret keys: (1) for the Arnold cat map, the initial values of and , the iteration times ; (2) Chebyshev maps, the initial value , and the parameter .
For the Arnold cat map, and , here . For the Chebyshev maps, when the tiny change in the initial value , the scrambled watermark image is completely different. A large number of experimental results indicate that the key spaces for initial values are . Similarly, the variation of the parameter in the chaotic region is between 2 and 6 with a step of , so .
Finally, the total key space is , which is larger than , so even the scrambled watermark is extracted; it’s difficult to recover it.
5. Attack Test Results
The attacks to the whole watermarked image can modify the red, green, and blue components simultaneously. The modifications in the red or green component are easier to be observed, that is only because of the Human Visual System. There is no evidence to show that the modification in the blue component can be more robust than the other components.
The peak signaltonoise ratio (PSNR) is used to evaluate the quality between an attacked image and the original image. For the sake of completeness, we list the PSNR formula as follows:
where and are the height and width of the image, respectively. and are the values located at coordinates of the original image and the attacked image, respectively.
After extracting the watermark, the normalized correlation coefficient (NC) is computed using the original watermark and the extracted watermark to judge the existence of the watermark and to measure the correctness of an extracted watermark. It can be defined as where and are the height and width of the watermark, respectively. and are the watermark bits located at coordinates of the original watermark and the extracted watermark.
5.1. Attack of Noise
Noise attack is a common attack during the transmission of the watermarked image on the network [21]. In the experiment, we add salt and pepper noise and Gaussian white noise to Image1 image, as shown in Table 1.

For the watermarked image with salt and pepper noise, with the increase of noise density, more and more noise points appear in the extracted watermark, when the density is set to 0.05, the NC is 0.5309, and the extracted watermark can still be distinguishable. Similarly, for the watermarked image attacked by Gaussian white noise, when the mean value is set to zero, more noise points appear in the extracted watermark with the increase of variance; when variance is set to 0.01, the extracted watermark can still be distinguishable.
5.2. Attack of JPEG Compression
JPEG lossy compression is the most common image compression technique. The watermarked image Image1 is compressed using JPEG with different value of , horizontal resampling by 2 : 1, and compression ratios, 0.80, 0.65, 0.50, 0.25, and 0.10 respectively. The results obtained are summarized in Table 2; the distinguishable watermark can still be extracted even the ratio is set to 0.10, so the algorithm is very robust against compression.

5.3. Attack of Cropping
The algorithm is also very robust against the cropping operation. In order to resist true cropping, that is, only a portion of the image is kept and the remaining part is thrown away, the width and height of the host image, along with the other keys, are sent to the detector. If the detector receives a portion of the image, he can recover it to the original size by zero padding, to extract the watermark.
After randomly selecting the position and crop 5%, 10%, 25%, 50%, and 75% of the watermarked image, respectively, then extract the watermark, as shown in Table 3. When 50% of the whole image is cropped, we can still extract the distinguishable watermark. That is to say, the algorithm has high robustness against cropping.

After cropping the randomly selected position, and filling the cropped region with zero, the extracted watermark before and after the reverse transformation is shown in Table 4; from it we can find that the randomly cropping has no effect on the extracted watermark.

Without the preprocessing to scramble the watermark, the four letters “DLUT” on the original watermark may be unexpectedly cropped; that is, the extracted watermark may be fragmentary, so scrambling the watermark by Arnold cat map in Section 2.1 can help to make the bits randomly distributed, which contributes to the robustness.
5.4. Attack of Brightness
We increase and decrease the brightness by 10%, 30%, and 50%, respectively, as shown in Figure 10. The extracted watermarks demonstrate that increasing the brightness has less effect on the watermark than decreasing the brightness, as shown in Table 5. So the algorithm has high robustness against the attack of brightness.

(a) 10%
(b) 30%
(c) 50%
(d) –10%
(e) –30%
(f) –50%
5.5. Comparison
Finally, we use Image1 with to compare our algorithm with the algorithms proposed in [4, 11, 18]. The results show that our algorithm gets advantages over the others in the attacks of median filter, compression, rotation, and cropping, as shown in Table 6.

6. Conclusion
We propose a dynamic blockbased blind watermark algorithm based on a 2level DWT, using Haar filter to embed a preprocessing binary image into the blue component of the color pathological image. By analyzing the coefficients’ characteristic after wavelet decomposition, we select the detail subbands to embed watermark. During the embedding procedure, the statistic characteristics of the mean and variance are applied to dynamically adjust the embedding intensity, so as to generate the effective range of threshold to extract the watermark. Experiment results demonstrate that the quality of the watermarked image, which is based on the PSNR, decreases smoothly with the increase of the embedding intensity, and the algorithm is robust against common distortions, especially, getting advantages over noise, compression, cropping, rotation, and brightening.
Acknowledgments
The research is supported by the Science and Technology Development Plan of Weifang (no. 20121346) and the Minority Nationality Technology Talent Cultivation Plan of Xinjiang (no. 201123116).
References
 S. Shyamsunder and G. Kaliyaperumal, “Image encryption and decryption using chaotic maps and modular arithmetic,” American Journal of Signal Processing, vol. 1, no. 1, pp. 24–33, 2011. View at: Google Scholar
 S. Rawat and B. Raman, “A chaotic system based fragile watermarking scheme for image tamper detection,” International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840–847, 2011. View at: Publisher Site  Google Scholar
 C. B. Li, P. Li, and G. S. Lu, “Enterprise projects set risk element transmission chaotic genetic model,” Research Journal of Applied Sciences, Engineering and Technology, vol. 4, no. 17, pp. 3162–3167, 2012. View at: Google Scholar
 W. H. Lin, Y. R. Wang, S. J. Horng, T. W. Kao, and Y. Pan, “A blind watermarking method using maximum wavelet coefficient quantization,” Expert Systems with Applications, vol. 36, no. 9, pp. 11509–11516, 2009. View at: Publisher Site  Google Scholar
 S. Agreste and G. Andaloro, “A new approach to preprocessing digital image for waveletbased watermark,” Journal of Computational and Applied Mathematics, vol. 221, no. 2, pp. 274–283, 2008. View at: Publisher Site  Google Scholar
 S. Agreste, G. Andaloro, D. Prestipino, and L. Puccio, “An image adaptive, waveletbased watermarking of digital images,” Journal of Computational and Applied Mathematics, vol. 210, no. 12, pp. 13–21, 2007. View at: Publisher Site  Google Scholar
 K. C. Liu, “Waveletbased watermarking for color images through visual masking,” International Journal of Electronics and Communications, vol. 64, no. 2, pp. 112–124, 2010. View at: Publisher Site  Google Scholar
 H. M. AlOtum and N. A. Samara, “A robust blind color image watermarking based on wavelettree bit host difference selection,” Signal Processing, vol. 90, no. 8, pp. 2498–2512, 2010. View at: Publisher Site  Google Scholar
 G. Zhang, S. Wang, and Q. Wen, “An adaptive blockbased blind watermarking algorithm,” in Proceedings of the 7th International Conference on Signal Processing Proceedings (ICSP '04), vol. 3, pp. 2294–2297, September 2004. View at: Google Scholar
 S. J. Horng, T. W. Kao, P. Fan, C. L. Lee, and Y. Pan, “An efficient watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Transactions on Multimedia, vol. 10, no. 5, pp. 746–757, 2008. View at: Publisher Site  Google Scholar
 W. H. Lin, Y. R. Wang, and S. J. Horng, “A wavelettreebased watermarking method using distance vector of binary cluster,” Expert Systems with Applications, vol. 36, no. 6, pp. 9869–9878, 2009. View at: Publisher Site  Google Scholar
 W. Lu, W. Sun, and H. Lu, “Robust watermarking based on DWT and nonnegative matrix factorization,” Computers and Electrical Engineering, vol. 35, no. 1, pp. 183–188, 2009. View at: Publisher Site  Google Scholar
 H. A. AlOtum and A. O. AlTaba'a, “Adaptive color image watermarking based on a modified improved pixelwise masking technique,” Computers and Electrical Engineering, vol. 35, no. 5, pp. 673–695, 2009. View at: Publisher Site  Google Scholar
 X. Wu and Z. H. Guan, “A novel digital watermark algorithm based on chaotic maps,” Physics Letters A, vol. 365, no. 56, pp. 403–406, 2007. View at: Publisher Site  Google Scholar
 A. Mooney, J. G. Keating, and I. Pitas, “A comparative study of chaotic and white noise signals in digital watermarking,” Chaos, Solitons and Fractals, vol. 35, no. 5, pp. 913–921, 2008. View at: Publisher Site  Google Scholar
 J. M. Amigó, L. Kocarev, and J. Szczepanski, “Theory and practice of chaotic cryptography,” Physics Letters A, vol. 366, no. 3, pp. 211–216, 2007. View at: Publisher Site  Google Scholar
 D. Tsolis, S. Nikolopoulos, L. Drossos, S. Sioutas, and T. Papatheodorou, “Applying robust multibit watermarks to digital images,” Journal of Computational and Applied Mathematics, vol. 227, no. 1, pp. 213–220, 2009. View at: Publisher Site  Google Scholar
 R. S. Run, S. J. Horng, W. H. Lin, T. W. Kao, P. Fan, and M. K. Khan, “An efficient wavelettreebased watermarking method,” Expert Systems with Applications, vol. 38, no. 9, pp. 14357–14366, 2011. View at: Publisher Site  Google Scholar
 H. Chen and P. K. Varshney, “A human perception inspired quality metric for image fusion based on regional information,” Information Fusion, vol. 8, no. 2, pp. 193–207, 2007. View at: Publisher Site  Google Scholar
 G. Bhatnagar and B. Raman, “A new robust reference watermarking scheme based on DWTSVD,” Computer Standards and Interfaces, vol. 31, no. 5, pp. 1002–1013, 2009. View at: Publisher Site  Google Scholar
 A. Mooney, J. G. Keating, and D. M. Heffernan, “Performance analysis of chaotic and white watermarks in the presence of common watermark attacks,” Chaos, Solitons and Fractals, vol. 42, no. 1, pp. 560–570, 2009. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2012 Guoyan Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.