Journal of Optimization

Volume 2013 (2013), Article ID 921270, 10 pages

http://dx.doi.org/10.1155/2013/921270

## Image Watermarking Algorithm Based on Multiobjective Ant Colony Optimization and Singular Value Decomposition in Wavelet Domain

Department of Electrical and Computer Engineering, Laval University, Québec, QC, Canada 1K 7P4

Received 6 February 2013; Revised 19 April 2013; Accepted 14 May 2013

Academic Editor: Peiping Shen

Copyright © 2013 Khaled Loukhaoukha. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

We present a new optimal watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) using multiobjective ant colony optimization (MOACO). A binary watermark is decomposed using a singular value decomposition. Then, the singular values are embedded in a detailed subband of host image. The trade-off between watermark transparency and robustness is controlled by multiple scaling factors (MSFs) instead of a single scaling factor (SSF). Determining the optimal values of the multiple scaling factors (MSFs) is a difficult problem. However, a multiobjective ant colony optimization is used to determine these values. Experimental results show much improved performances of the proposed scheme in terms of transparency and robustness compared to other watermarking schemes. Furthermore, it does not suffer from the problem of high probability of false positive detection of the watermarks.

#### 1. Introduction

With the advent of numeric era at the end of 20th century, the exchange of digital documents became a very easy task. This extraordinary technical revolution from analog to numerical technology was not achieved without generating anxiety in terms of the protection of the authors rights since multimedia documents can be quite easily duplicated, modified, and illegally attacked without deterioration. Affected by significant revenue losses multimedia documents author’s are motivated more than ever to secure their documents. In this context digital watermarking was introduced: it consists of inscribing invisible (or visible) data into the multimedia documents. This is done in two stages: embedding and extracting process. Digital watermarking schemes for images can be classified into different classes according to embedding domain, embedding rule, imperceptibility, and permanency.

In terms of robustness, the watermarking algorithm can be classified into three categories: fragile, semifragile, and robust. Fragile watermarking is designed to detect any modification in such a way that slight modifications or tampering on the watermarked image will destroy the watermark. This type is employed to ensure the integrity and image authenticity. Conversely, robust watermarking is designed to be resistant against attacks that attempt to remove or destroy the watermark without degrading the visual quality of the watermarked image significantly. Robust watermarking is typically employed for copyright protection and ownership verification. Semifragile watermarking combines the properties of fragile and robust watermarking in order to detect unauthorized manipulations while still being robust against authorized manipulations.

Generally, watermarking algorithms operate either in the spatial domain or in a transform domain such as discrete wavelet transform (DWT) [1–3], discrete Fourier transform (DFT) [4–6], and discrete cosine transform (DCT) [7–9]. Spatial domain watermarking has the advantage of low calculation complexity compared to that in transform domains. However, most watermarking schemes in the scientific literature operate in the transform domain because it provides enhanced imperceptibility and robustness compared to those in spatial domain. However, decomposition of images in a standard basis set using the transform domain does not necessarily leads to the optimal representation of an image. Therefore, different representations were investigated for watermarking: these include nonnegative matrix factorization (NMF) [10–12] and singular value decomposition (SVD) [13–15]. Watermarking schemes based on SVD are advantageous since slight changes in the singular values do not affect significantly the image quality. Unfortunately, several SVD-based watermarking schemes suffer from typically high probability of false positive watermark detection [16–18].

According to embedding rule, watermarking algorithm can be classified into three categories: multiplicative, additive, or substitution. In multiplicative and additive embedding schemes, the trade-off between imperceptibility and robustness is controlled by a single scaling factor (SSF). Cox et al. [19] suggest to use multiple scaling factors (MSFs) instead of one. They state that single scaling factor may not be applicable for altering all the pixel values of the original image. Determining the optimal values of the multiple scaling factors can be viewed as optimization problem which is unfortunately a difficult problem. In this paper, a multiobjective ant colony optimization (MOACO) is used to solve this difficult problem and to determine these optimal values.

The rest of this paper is organized as follows. Section 2 reviews the basic concepts of the ant colony optimization (ACO). In Section 3, we presented the proposed watermarking algorithm based on discrete wavelet transform (DWT) and singular value decomposition (SVD). The proposed watermarking algorithm using multiobjective ant colony optimization is described in Section 4. The experimental results are provided in Section 5. Finally, the concluding remarks are given in Section 6.

#### 2. Ant Colony Optimization Principle

The ant colony optimization (ACO) was introduced by Dorigo [20] as solution for hard optimization problems. It is inspired by observation of real ant colonies. Ants explore randomly the area surrounding their nest in order to find food. If an ant finds a food source, it evaluates and carries some food to the nest. During the return travels the ant deposits on the ground a chemical substance called pheromone trail. Other ants can smell the pheromone and follow it with some probability. This way, ants can communicate via pheromone and find the optimal path between the food source and the nest. This capability of real ant colony to find optimal paths has led to the definition of artificial ant colonies that can find the optimal solution for hard optimization problems [21] such as the traveling salesman problem. The outline of the generic ACO algorithm is presented in Figure 1.

The first point to take into account in ant colony optimization is how the colony is represented. For continuous variables, a colony of ants is represented as matrix , where such that is a vector of design variables that corresponds to a single ant. The second point to consider is how to model the pheromone communication scheme. Socha and Dorigo [21] suggest to use a normal distribution for a continuous model implementation: where is the optimal point found within the design space and the standard deviation as an index of the ants aggregation around the current minimum. To initialize the algorithm, is randomly chosen in the design space, using a uniform distribution, and is taken at least three times greater than the length of the design space, to uniformly locate the ants within it. As shown in Figure 1, at each iteration, the ACO algorithm updates the values of each design variable, and this is for all the ants of the colony; that is, at each iteration each ant sets the values for the trial solution as per the distribution in (1). At the end, the pheromone distribution over the design space is updated by collecting the information acquired throughout the optimization steps. Since the pheromone is modeled by (1), it is necessary only to update and as where makes use of the colony of ants (candidate solution) to return a vector containing the standard deviation for each design variable [23]. The accumulation of pheromone increases in the vicinity of the candidate towards the optimum solution. However, to avoid premature convergence, negative update procedures are not discarded: for this, a simple method is used, which consists in dissolving the pheromone. The principle is to spread the amount of pheromone by changing the current standard deviation (for each variable) according to where is the dissolving rate.

#### 3. Watermarking Algorithm Based on SVD and DWT

The SVD-DWT watermarking algorithm presented in [14] is described by the following embedding and extraction processes.

##### 3.1. Embedding Process

Consider an original image of size , and let the watermark be a binary image of size . The embedding process is as follows. (1)Decompose the original image into subbands by applying a -level discrete wavelet transform (DWT). (2)Select one sub-band () among the three following sub-bands: , , and . (3)Compute the inverse DWT of the selected sub-band (): (4)Apply a singular value decomposition (SVD) of matrix : (5)Encrypt watermark image using image encryption algorithm to get encrypted watermark denoted by . (6)Apply a singular value decomposition to watermark matrix . (7)Compute the one-way hash functions for matrices and : (8)Matrices and and their hash values and are stored in the private key. (Steps and are necessary to mitigate the problem of false positive detection of watermark. This solution was proposed in [24].) (9)Compute matrix according to where is the watermark strength factor that controls the trade-off between imperceptibility and robustness of the watermarking scheme. This parameter can be used as single scaling factor (SSF) or multiple scaling factors (MSFs). (10)Compute matrix , according to (11)Compute the discrete wavelet transform of matrix , (12)The watermarked image is computed by applying the inverse -level discrete wavelet transform to the modified sub-band and the unmodified sub-bands.

##### 3.2. Extracting Process

The extracting process is summarized by the following steps. (1)A safety test is first done: hash values of matrices and , possibly altered by an attacker as and , are computed to give and . These hash values are compared with these stored during the embedding process: (2)Decompose the original and watermarked images, and , by applying the -level discrete wavelet transform. (3)Select the same sub-band () used in 2 of the watermark embedding process. and are, respectively, the subbands selected for the original and watermarked images. (4)Compute the inverse discrete wavelet transform of selected subbands and : (5)Apply the singular value decomposition on matrices and : (6)Compute matrix as follows: (7)Determine the extracted encrypted watermark, , by computing (8)Decrypt to get the extracted watermark .

##### 3.3. Protection against False Positive Detection

To protect the proposed image watermarking scheme against false positive detection, two countermeasures have been proposed in [24]. The first countermeasure consists of computing a *one-way hash function* for the matrices and . The hash function algorithm such as *message digest 5* (MD5) or *secure hash algorithm 1* (SHA-1) can be used for this purpose. During embedding process, the hash values of matrices and denoted, respectively, by and are stored in a private key. In the extracting process, the hash function is first computed from received (and possibly altered by an attacker) matrices and , denoted by and . Thus, if or , the watermark extracting process is stopped because or : otherwise the watermark extracting process is performed. The authors indicate that the hash function test can be also be applied on a combined matrix from and such as and.

The second countermeasure consists in encrypting the watermark before the embedding process. The watermark is encrypted resulting in an encrypted watermark denoted by which will then be embedded in the original image . Suppose that for watermark extraction process, an attacker uses his own watermark . Then matrices and will be used instead of proper matrices and . The first extracted watermark will be the same as , but the decryption process must be performed since the embedded watermark is encrypted during the watermark embedding process. Therefore, the extracted watermark will be a random-like image. Note that, if there is no attack, the first extracted watermark will indeed be the encrypted image, but after decryption, the extracted watermark will have a high correlation value with the original watermark . Figures 2 and 3 illustrate an example of one-way hash function and encryption countermeasures, respectively, using Lena as original image and LOGO as watermark .

#### 4. Watermarking Algorithm Using Multiobjective Ant Colony Optimization

In general, watermarking schemes are either based on an additive or a multiplicative rule. The embedding rules themselves are usually of the following form, where and are, respectively, original and watermarked image (or their representation in other domains such as FFT, DCT, and DWT), is used to control the trade-off between imperceptibility and robustness of an image and generally is used as scaling factor:

Cox et al. [19] suggest the use of multiple scaling factors instead of one. They state that a single scaling factor may not be applicable for altering all the values of original image. Determining the optimal values of these multiple scaling factors is a complex computational problem. To solve it, we propose to use a multi-objective ant colony optimization (MOACO).

Figure 4 illustrates block diagram of multiobjective optimization which is closed-loop control system. System input is multiple scaling factors and objective measure as system output; this measure is calculated from original image , watermarked image , watermark , and the () extracted watermarks ( and , where ) under attacks.

The steps for applying MOACO into SVD-DWT watermarking scheme are enumerated below. (1)Define the colony size, the initial pheromone trail, the dissolving rate (), the objective function, and a generation number as the algorithm stopping criterion. (2)Using (17), generate randomly an initial population of ants, which constitute a set of potential solutions. Each ant is denoted by ,
where is theth coordinate of the best point found by optimization within the design space at the current iteration and is the ants aggregation index for the th coordinate of the design space. At the first iteration, is chosen according a uniform distribution with taken as at least 3 times larger than the length of the search interval. (3)For each ant of the population, consider the following.(i)Produce the watermarking image using embedding process (Section 3.1) using the ant as the watermark strength factor. Note that (8) in watermark embedding process is transformed into. (Note that, is changed into multiple scaling factors instead of single scaling factor and is diagonal matrix created from the vector , that is, the ant )
(ii)Compute the normalized correlation between original and watermarked images. (iii)Apply a watermark attack out of a set of selected attacks upon the watermarked image . This leads to different attacked watermarked images for each original watermarked image . (iv)Extract the watermarks from the attacked watermarked images using the extraction process, as described in Section 3.2, where . (v)Compute the normalized correlation between the original watermark and the set of extracted watermarks , that is, . (vi)Construct the vector of objective values, , defined as
(vii)Evaluate the vector of objective values according to the *exponential weighted method* for multiobjective optimization [26]:
where , , and are positive constants. In experiments, we take , et . (4)Find the best ant as the one having the smallest objective value . (5)Update the pheromone trail distribution using the formula (17); in this step the aggregation index for theth dimension is given by
where is theth column of the colony matrix , is the mean value of the vector , and is the number of colony size.(6)Save the best ant between this generation and the old one generation. (7)If the generation number is reached, the optimization process of the multiple scaling factors (MSFs) is terminated, else it goes to the next step. (8)Using the distribution of (17), generate a new population of ants and then go back to 3.

#### 5. Experimental Results

To show the effectiveness of the proposed watermarking algorithm using multiple scaling factors optimized by multiobjective ant colony optimization instead of single scaling factor in terms of imperceptibility and robustness, a number of tests have been carried out using four gray-scale test images and a binary watermark, which are depicted in Figure 5. Note that is set to be equal to 3.

We conducted several experiments to compare the imperceptibility and robustness of the proposed watermarking algorithm using multiple scaling factors optimized by multiobjective ant colony optimization (i.e., MSF-MOACO) and single scaling factor (SSF) with Xianghong et al. [1], Liu [3], Pai and Ruan [25], and Ouhsain and Hamza [12] algorithms. Table 1 lists the PSNR values of proposed and other algorithms for the same test images. It is clearly shown that our algorithm using multiple scaling factors (MSF-MOACO) outperforms all other algorithms in terms of the visual quality of the reconstructed watermarked image except Pai and Ruan algorithm [25]. Furthermore, the normalized correlation between watermark and extracted watermark of the proposed algorithm (MSF-MOACO) is very close to unity.

For the robustness tests, ten different attacks were selected in conjunction to multiobjective optimization (i.e., ). These attacks are salt and peppers noise (with a density of 0.05), Gaussian filtering (), cropping (1/8 of the image center), JPEG compression (), sharpening, scaling (256→512→256), histogram equalization, gray-scale quantization (1 bit), re-watermarking using other watermarks that differ from the watermark (Letter A) and collusion attack using five watermarks, which are denoted by SP, GF, CR, CM, SH, SC, HE, QN, RW, and CA, respectively. The normalized correlation values between embedded and extracted watermarks under these attacks are depicted in Table 2, where the MSF-MOACO algorithm outperforms other algorithms [1, 3, 12, 25].

The effectiveness of the proposed algorithm (MSF-MOACO) is also tested against other attacks such as gamma correction (), dithering, rotation (25°), motion blur (45°), and translation (25 pixels × 25 pixels), which were denoted by GC, DI, RT, MB, and TR, respectively. Table 3 depicts the normalized correlation values under these attacks, where one can observe that MSF-MOACO algorithm is more robust against these attacks compared to other algorithms. Figure 6 shows an example of watermarked images under these attacks, while Figure 7 depicts their corresponding extracted watermarks.

#### 6. Conclusion

In this paper, we present a new watermarking algorithm based on lifting wavelet transform (LWT) and singular value decomposition (SVD) using multiple scaling factors (MSF) optimized by multiobjective ant colony optimization (MOACO). The MSFs are used instead of single scaling factor (SSF) to achieve a highest possible robustness without losing watermark transparency. However, determining the optimal set of multiple scaling factors is a prohibitively complex problem; to solve this problem a multiobjective ant colony optimization is used. Experimental results demonstrate that the proposed watermarking algorithm (MSF-MOACO) outperforms other watermarking algorithms in terms of imperceptibility and robustness. Moreover, MSF-MOACO algorithm showed better imperceptibility and excellent resiliency against a wide range of watermarking attacks such as additive noise, compression, filtering, and geometrical attacks. Furthermore, the problem of false positive detection which affects most SVD watermarking algorithms is resolved using countermeasures based on one-way hash function and watermark encryption proposed in [24].

#### References

- T. Xianghong, L. Lu, Y. Lianjie, and N. Yamei, “A digital watermarking scheme based on DWT and vector transform,” in
*Proceedings of the International Symposium on Intelligent Multimedia, Video and Speech Processing (ISIMP '04)*, pp. 635–638, October 2004. View at Scopus - L. Li, H. Xu, C. Chang, and Y. Ma, “A novel image watermarking in redistributed invariant wavelet domain,”
*Journal of Systems and Software*, vol. 84, no. 6, pp. 923–929, 2011. View at Publisher · View at Google Scholar · View at Scopus - X.-F. Liu and S.-M. Li, “Image digital watermarking algorithm based on Arnold scrambling and wavelet transform,” in
*Proceedings of the International Conference on Mechanical and Electronics Engineering*, vol. 130–134, pp. 2928–2931, September 2011. - V. Solachidis and I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,”
*IEEE Transactions on Image Processing*, vol. 10, no. 11, pp. 1741–1753, 2001. View at Publisher · View at Google Scholar · View at Scopus - W. Wang, A. Men, and X. Chen, “Robust image watermarking scheme based on phase features in DFT domain and generalized radon transformations,” in
*Proceedings of the International Workshop on Education Technology and Computer Science*, pp. 736–739, March 2009. - E. Ganic, S. D. Dexter, and A. M. Eskicioglu, “Embedding multiple watermarks in the DFT domain using low and high frequency bands,” in
*Security, Steganography, and Watermarking of Multimedia Contents VII*, vol. 5681 of*Proceedings of the SPIE*, pp. 175–184, March 2005, January 2005. View at Publisher · View at Google Scholar · View at Scopus - S. D. Lin, S. Shie, and J. Y. Guo, “Improving the robustness of DCT-based image watermarking against JPEG compression,”
*Computer Standards and Interfaces*, vol. 32, no. 1-2, pp. 51–58, 2010. View at Publisher · View at Google Scholar · View at Scopus - A. H. Taherinia and M. Jamzad, “A robust spread spectrum watermarking method using two levels DCT,”
*International Journal of Electronic Security and Digital Forensics*, vol. 2, no. 3, pp. 280–305, 2009. View at Publisher · View at Google Scholar · View at Scopus - J. R. Hernández, M. Amado, and F. Pérez-González, “DCT-domain watermarking techniques for still images: detector performance analysis and a new structure,”
*IEEE Transactions on Image Processing*, vol. 9, no. 1, pp. 55–68, 2000. View at Publisher · View at Google Scholar · View at Scopus - W. Lu, W. Sun, and H. Lu, “Robust watermarking based on DWT and nonnegative matrix factorization,”
*Computers and Electrical Engineering*, vol. 35, no. 1, pp. 183–188, 2009. View at Publisher · View at Google Scholar · View at Scopus - W. Lu and H. Lu, “Robust watermarking based on subsampling and nonnegative matrix factorization,”
*Informatica*, vol. 19, no. 4, pp. 555–566, 2008. View at Google Scholar · View at Scopus - M. Ouhsain and A. B. Hamza, “Image watermarking scheme using nonnegative matrix factorization and wavelet transform,”
*Expert Systems with Applications*, vol. 36, no. 2, pp. 2123–2129, 2009. View at Publisher · View at Google Scholar · View at Scopus - A. A. Mohammad, A. Alhaj, and S. Shaltaf, “An improved SVD-based watermarking scheme for protecting rightful ownership,”
*Signal Processing*, vol. 88, no. 9, pp. 2158–2180, 2008. View at Publisher · View at Google Scholar · View at Scopus - K. Loukhaoukha and J.-Y. Chouinard, “Hybrid watermarking algorithm based on SVD and lifting wavelet transform for ownership verification,” in
*Proceedings of the 11th Canadian Workshop on Information Theory (CWIT '09)*, pp. 177–182, May 2009. View at Publisher · View at Google Scholar · View at Scopus - R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,”
*IEEE Transactions on Multimedia*, vol. 4, no. 1, pp. 121–128, 2002. View at Publisher · View at Google Scholar · View at Scopus - R. Rykaczewski, “Comments on ‘An SVD-based watermarking scheme for protecting rightful ownership’,”
*IEEE Transactions on Multimedia*, vol. 9, no. 2, pp. 421–423, 2007. View at Publisher · View at Google Scholar · View at Scopus - X. Zhang and K. Li, “Comments on ‘an SVD-based watermarking scheme for protecting rightful ownership’,”
*IEEE Transactions on Multimedia*, vol. 7, no. 3, pp. 593–594, 2005. View at Publisher · View at Google Scholar · View at Scopus - L. Xiao, Z. Wei, and J. Ye, “Comments on “Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition” and theoretical analysis,”
*Journal of Electronic Imaging*, vol. 17, no. 4, Article ID 040501, 2008. View at Publisher · View at Google Scholar · View at Scopus - I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,”
*IEEE Transactions on Image Processing*, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar · View at Scopus - M. Dorigo,
*Optimization, learning and natural algorithms [Ph.D. thesis]*, Dipartimento di Elettronica e Informazione, Politecnico di Milano, Milan, Italy, 1992. - K. Socha and M. Dorigo, “Ant colony optimization for continuous domains,”
*European Journal of Operational Research*, vol. 185, no. 3, pp. 1155–1173, 2008. View at Publisher · View at Google Scholar · View at Scopus - F. A. C. Viana, G. I. Kotinda, D. A. Rade, and V. Steffen Jr., “Tuning dynamic vibration absorbers by using ant colony optimization,”
*Computers and Structures*, vol. 86, no. 13-14, pp. 1539–1549, 2008. View at Publisher · View at Google Scholar · View at Scopus - S. Pourtakdoust and H. Nobahari, “An extension of ant colony system to continuous optimization problems,” in
*Proceedings of the International Workshop of Ant Colony Optimization and Swarm Intelligence*, pp. 294–301, September 2004. - K. Loukhaoukha and J.-Y. Chouinard, “Security of ownership watermarking of digital images based on singular value decomposition,”
*Journal of Electronic Imaging*, vol. 19, no. 1, Article ID 013007, 2010. View at Publisher · View at Google Scholar · View at Scopus - Y. Pai and S. Ruan, “A high quality robust digital watermarking by smart distribution technique and effective embedded scheme,”
*IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences*, vol. E90, no. 3, pp. 597–605, 2007. View at Publisher · View at Google Scholar · View at Scopus - R. T. Marler and J. S. Arora, “Survey of multi-objective optimization methods for engineering,”
*Structural and Multidisciplinary Optimization*, vol. 26, no. 6, pp. 369–395, 2004. View at Publisher · View at Google Scholar · View at Scopus