Computational Intelligence in Image Processing 2014View this Special Issue
Research Article | Open Access
An Image Watermarking Scheme Using Arnold Transform and Fuzzy Smooth Support Vector Machine
With the development of information security, the traditional encryption algorithm for image has been far from ensuring the security of image in the transmission. This paper presents a new image watermarking scheme based on Arnold Transform (AT) and Fuzzy Smooth Support Vector Machine (FSSVM). First of all, improved AT (IAT) is obtained by adding variables and expanding transformation space, and FSSVM is proposed by introducing fuzzy membership degree. The embedding positions of watermark are obtained from IAT, and the pixel values are embedded in carrier image by quantization embedding rules. Then, the watermark can be embedded in carrier image. In order to realize blind extraction of watermark, FSSVM model is used to find the embedding positions of watermark, and the pixel values are extracted by using quantization extraction rules. Through using improved Arnold inverse transformation for embedding positions, the watermark coordinates can be calculated, and the extraction of watermark is carried out. Compared with other watermarking techniques, the presented scheme can promote the security by adding more secret keys, and the imperceptibility of watermark is improved by introducing quantization rules. The experimental results show that the proposed method outperforms many existing methods against various types of attacks.
Application and popularization of multimedia technologies and computer networks have made duplication and distribution much easier for multimedia contents [1, 2]. The digital media (such as video, image, audio, and text) can be modified easily by attackers who can claim their ownership . Then copyright protection of intellectual properties has become an important and challenging task. One way for copyright protection is digital watermarking, which means embedding certain specific information about the copyright holder into the protected media . In the last decade, digital watermarking methods for images from different purposes are usually categorized into two types: robust watermarking and fragile watermarking. And the watermarking techniques can also be classified into two groups based on the domain in which the watermark is inserted: spatial domain techniques and frequency domain techniques [2, 5–7]. The methods of spatial domain have advantages of easy implementation and low cost of operation, but they are generally not robust to geometrical attacks and image processing. Nowadays, there are many transform domain watermarking techniques [8, 9], such as discrete cosine transform, singular value decomposition, discrete Fourier transform, and discrete wavelet transform. In practice, the performances of watermarking methods are further improved by combining two or more transforms . The image encryption using gyrator transform based on two-step phase-shifting interferometry and AT has been proposed in . Liu et al.  proposed an image encryption algorithm by using AT and discrete cosine transform. Abuturab  proposed the color information encryption in the gyrator transform domain not only based on discrete cosine transform and radial Hilbert phase mask but also based on AT. Sui and Gao  presented a color image encryption scheme by using gyrator transform and AT. Chen et al.  designed a new image encryption algorithm based on singular value decomposition and AT. Chen et al.  offered a watermarking scheme based on Arnold cat map. AT has periodicity and the transform is simple, but the periodicity depends on image size. Moreover, it is the main concern of the watermarking schemes that the embedded watermark should not degrade the quality of carrier image and the inserted watermark must be as much invisible as possible. The distortion of the watermarked image should be negligible without degrading its robustness under attacking conditions. In order to generate the watermarked images of high quality and extract high fidelity watermarks in attacking environments, the overall watermarking procedure depends on a set of configuration parameters which need to be optimized. Most existing image watermarking algorithms take scaling factor as a single value which needs the proper fine tune. However, when each singular value has a different tolerance limit, a single scaling factor is not suitable in case of singular value decomposition. It is known that imperceptibility and robustness are two important issues of image watermarking schemes. Then the tradeoff between imperceptibility and robustness in watermarking problems is viewed as an optimization problem.
Recently, attacks against image watermarking systems have become more sophisticated [15, 16]. A simple solution consists in embedding the watermark in a geometrical invariant subspace, and another strategy for coping with geometric distortions is to insert an additional watermark or template into the carrier image [17, 18]. However, the implementation difficulties hinder the research of image watermarking schemes based on this principle above. Nasir et al.  proposed feature-based image watermarking schemes. Wang et al.  proposed a feature-based digital watermarking method for halftone images. However, some drawbacks indwelled in current feature-based schemes restrict the performance of watermarking systems. To address the issues, support vector machine (SVM) is introduced to the image watermarking domain. Fu et al.  embedded template and watermark into original images; then the output of SVM models was constructed and the watermark was extracted. Tsai and Sun  employed the classification technique based on SVMs to extract a watermark in spatial domain. Li et al.  used support vector regression for watermark embedding and extracting in spatial domain. Peng et al.  proposed an image watermarking method in multiwavelet domain based on SVMs. Tsai et al.  presented a robust lossless watermarking technique based on -trimmed mean algorithm and SVM. Li et al.  introduced a semifragile watermarking scheme based on SVM. Yang et al.  proposed a new geometrically invariant image watermarking algorithm based on fuzzy SVM correction. However, by virtue of the good learning ability of SVM and AT, most of the existing watermarking schemes mentioned above still have some shortcomings as follows. (1) The standard SVM is always used as a learning scheme, while the speed and precision of training samples are not very ideal. Then, the distortion of final extracted watermark is more serious. (2) As many AT schemes only have single secret key, this characteristic has the limitations of being susceptible to one or several joint attacks and breaks, and then the difficulty of watermark extraction will be increased. (3) Because the extracted image feature is not very stable, hyperplane and generalization capability in SVM of the learned models are affected. Moreover, all samples in training data set are treated uniformly in the same class during the learning process of SVM, but this is not always true. (4) Due to the poor feature vectors, these methods are not very robust against some attacks. In watermark detection procedure, the original carrier image is usually needed, so it is unfavorable to practical application. Furthermore, some of them lack blind detection features; then they cannot balance imperceptibility and robustness effectively.
In this paper, embedding and extraction models of watermark based on AT and FSSVM are proposed with corresponding algorithms. The watermark image is first processed by IAT, and the pixel values are embedded by using quantization embedding rules. The watermarked carrier image can be obtained. Then the embedding method is presented by increasing secret keys to enhance the security degree. The quantization embedding rules can improve imperceptibility of watermark well. FSSVM model is constructed by training some embedding positions to find out positions embedded with watermark in the extraction process. The pixel values of watermark are extracted by introducing quantization extraction rules. FSSVM model not only enhances the training speed and precision of image characteristic values, but also realizes the blind extraction of watermark with the help of quantization extraction rules. The watermark coordinates are calculated by improving Arnold inverse transformation for embedding positions. The original watermark image is extracted, and the processing does not need original carrier image. Moreover, the combination of spatial domain and SVM can balance imperceptibility and robustness of watermark well.
The rest of this paper is organized as follows. In Section 2, AT and SVM techniques are briefly described. In Section 3, the proposed techniques are illustrated. In Section 4, the experimental results are presented and the comparative analysis of our scheme with other methods is given. Finally, the conclusion is drawn in Section 5.
2.1. Arnold Transform (AT)
In practical applications, AT not only scrambles the pixel position by encoding the iterative number of the process, but also reduces the key spaces of storage and transmission. Although there are many ways for scrambling, here we will discuss only the AT in [10, 14], which is an iterative process of moving the pixel position. Suppose that the original image is a array and the coordinate of the pixel is . The generalized two-dimension AT is denoted bywhere and are the transformed coordinates corresponding to and after iterations, respectively, and are positive integers, and is the height or width of the square image processed.
Since the transformation is an iterative process, if the location () is transformed several times, it returns to its original position after iterations. is called the period of the transformation and depends on parameters , , and . These parameters (, , and ) can be used as secret keys in this paper. The pixels will continue to move until they return back to their original positions. Here, the moving time is , and the size of pixel space is . Pixels move with periodicity. , , , and (the size of original watermark) are correlated. Whenever the values change, it generates a completely different Arnold cat map. After being multiplied a few times, the correlation among the pixels will be completely chaotic. To get back to the original image, periodicity is required. Suppose that the scrambling has performed iterations; then one can get back to the original image by performing () iterations.
2.2. Support Vector Machine (SVM)
SVM has been successfully applied to classification and function estimation problems introduced by Vapnik within the context of statistical learning theory and structural risk minimization [21, 22], and it can be used as regression prediction. Suppose that are training samples, and samples have nonlinear relationship in many cases. The regression function can be denoted by , where is an input vector, is a weight vector, is a nonlinearity mapping function, and is an offset.
In order to obtain the last two parameters and , the structural risk minimization rule is used and the original problem is transformed as follows:where describes the complexity of the function , is a constant to determine the complex rate of model and moderation of experimental risk, and are slack variables, is a sample, is a weight vector, is an offset, and is an insensitive loss function.
To solve the above convex optimization problem, the core idea is to transform the optimization question into dual form by using Lagrange multiplier method as follows:where , , , and are the weight coefficients and denotes the inner product operation. In the above formulas, kernel function is introduced to complete the inner product computation for inputting data of high-dimensional feature space while the is not known. The kernel function must satisfy Mercer theorem.
3. Proposed Techniques
3.1. Fuzzy Smooth Support Vector Machine (FSSVM)
In order to improve the efficiency and precision of prediction, SVM is introduced, and through combining with fuzzy mathematics and transforming the problem into unconstrained optimization problem, one can optimize the object function and transform the risk function into fuzzy dual extreme problems. Then, it can effectively reduce the errors between the predicted pixel values and the actual pixel values in the carrier image. The FSSVM model is used to train the specific pixels in some positions and find the embedding positions of watermark in carrier image, which is constructed in detail as follows.
Step 1. Select coordinates from embedding position coordinates at random, where . The pixel values corresponding to the original carrier image are denoted by , where .
Step 2. Take each position coordinate as the center of the original carrier image for each selected watermark position , select an image block with the size , and then receive image blocks.
Step 3. Calculate the corresponding eigenvalues of the image block in the carrier image for each position coordinate . Namely, the mean value of pixels except the central point is calculated as follows:And the pixel variance except the central point is calculated as follows:Thus, one can totally get groups of eigenvalues .
Step 4. Let each feature vector be a training data set and the corresponding pixel value of the original carrier image the target value of the training. It constitutes couples of training sample sets, shown as , to present a FSSVM training process for the above sample sets as follows.
Step 4.1. Introduce fuzzy membership degree to each training sample, and blur the input sample set . Fuzzy membership degree is determined by the relationship between sample input sets and optimization values .
Step 4.2. Divide the sets into two categories through fuzzy -means clustering to all eigenvalue sets , find out the center of the two classes, and then calculate the distance from the feature vector to the center of the corresponding class. Then the membership degree can be expressed aswhere represents the maximum distance from feature point to class center for the class of feature vector .
Step 4.3. Introduce the kernel function to map the sample points into high-dimensional feature space.
Step 4.4. Carry out linear regression in high-dimensional feature space, and obtain the nonlinear regression effect in the original space. Then its regressive function can be expressed asHere, the kernel function mainly uses Gaussian radial basis function as follows:where represent the input vector , and are the weight coefficients after training, is the deviation, is a nonlinearity function, and denotes the inner product operation.
Step 5. Use the principle of structural risk minimization to determine the parameters (, and ). Namely, transform the original regression equation into solving unconstrained programming problem. Then, the objective function is denoted bywhere , simply, is an adjustable parameter, and is a constant which is used to determine the complexity of the model and the folded moderation of empirical risk.
3.2. Watermark Embedding Algorithm
The watermark embedding procedure, participating in the optimization flow chart of Figure 1, consists of the processing modules depicted as follows.
Step 1. Input a carrier image with size and a binary symbol image with size . As the original carrier image and the watermark image, they are, respectively, described as , , where and are the height and width of binary symbol image, respectively, is the pixel value of the position in carrier image, and is the pixel value of the position in watermark image.
Step 2. Expand the pixel matrix of binary image into square matrix for making , and satisfy the conditions of AT. That is, if , then , where , and if , then , where . Through adding 1 to pixel matrix of binary symbol image , it is expanded into square matrix; that is, . AT algorithm can be improved by adding the number of variables and expanding transformation space. Then, the coordinate of the watermark is taken as initial value to do times Arnold iteration transformation in binary symbol image. On the basis of such an above consideration, IAT can be denoted byand it follows thatwhere , , , , , is down to an integral function, is the current order of watermark image matrix, is the order of original carrier image, , , and are all positive integers, and . Suppose that (11) are taken times iteration; then the corresponding watermark embedding position is got. So position coordinates can be obtained easily, where .
In the above conversion formulas, independent parameters , , and are defined by the copyright owners themselves, and the three secret key parameters can be used to recover the watermark. is the times of iteration, which generally ranges from 1 to 20. Here, if is too large, it will affect the running speed of the program and increase the time-space complexity of IAT. is the enlargement factor to the value of after times iteration transformation. When the watermark is embedded, one needs to make adapt to the size of the whole carrier image instead of focusing on a certain square. Namely, all of the embedding positions are dispersed into the whole original carrier image.
Step 3. Let position coordinates be the embedding positions of watermark in the carrier image. That is, embed the pixel of the watermark position into the position of carrier image after getting embedding positions , where . Then select position coordinates at random from embedding positions to do FSSVM training, where .
Step 4. Determine the pixel value of the embedded position in the original carrier image by using quantitative embedding rules. = 10 is used as the quantifying step size of the pixel value , and , where is rounded to the nearest integral function. Then, to determine the pixel value , the several cases are given as follows.(1)If the watermark pixel value and hold, where , is an odd number, then one has that(2)If the watermark pixel value and hold, where , is an odd number, then one has that(3)If the watermark pixel value and hold, where , is an even number, then one has that(4)If the watermark pixel value and hold, where , is an even number, then one has thatHere, compared with the traditional embedding rules, the magnitude of pixel value in the original carrier image, which is changed by quantitative rule, is relatively small, and the biggest changed value is 10. Thus it can realize the imperceptibility after embedding the watermark. According to the above four rules, the pixel values of embedding coordinate positions of watermark can be calculated in the watermarked carrier image easily.
Step 5. Replace the original pixel values in the carrier image with those of the calculated embedding coordinate positions ; namely, . Then, the watermarked carrier image can be obtained, whose size is still , and only the pixel values of a minority of points change slightly.
3.3. Watermark Extraction Algorithm
The watermark extraction procedures are illustrated with the help of block diagrams in Figure 2. The watermark extraction process can be summarized as follows.
Step 1. Denote the watermarked carrier image by , whose size is . represents the pixel value of the position in watermarked carrier image, where .
Step 2. Test using FSSVM model obtained from the process of watermark embedding as follows. Firstly, calculate the eigenvalues of each pixel in of , where the mean pixel value of eight points except the central point is calculated byAnd the pixel variance of eight points except the central point is calculated byThen, groups of eigenvalues can be obtained totally. Let the groups of eigenvalues be the input data sets and of FSSVM model test. Namely, and substitute and into the model, respectively, and the result is calculated by using the following regressive function:In (18), , , and have been derived from the training in the process of watermark embedding. So the predicted pixel values of positions in the watermarked carrier image can be got easily.
The eigenvalue selection refers to one-order moment and second-order moment of the probability statistics. In fact, one can also increase the type of eigenvalue, such as the third-order moment, which is beneficial for improving the prediction accuracy. Here, the -order moment can be briefly expressed aswhere represents the average values of pixel points except the central point in selected image blocks and is to solve the average.
Step 3. Compare the pixel values of with the predictive pixel values of the positions, and calculate their difference matrix , which is denoted bywhere , . Then sort each element and take out the top pixel values corresponding to , which are progressively becoming smaller. Their corresponding position coordinates in carrier image, which are embedded with watermark, are obtained. Process the pixel coordinates by improving Arnold inverse transformation. Namely, take the pixel coordinate as initial value to do times iteration. Thus, the corresponding position coordinate for in the watermark image can be got from the following formula:and it follows thatwhere , , , , describes the inverse matrix, is the order of watermark matrix, is the order of carrier image, , , and are all positive integers, and . Suppose that, in every iteration, is used by the assignment of , is used by the assignment of , and (22) are taken times iteration, and then the position coordinates of watermark corresponding to can be obtained. Finally, position coordinates can be obtained easily, where , which are the coordinate values of the original watermark.
Step 4. Compute the corresponding pixel values in the watermark, when the position coordinates ( of the watermarked carrier image have been determined and their corresponding position coordinates ( in the watermark have also been calculated. Namely, according to the change rules of the pixel values in the watermarked carrier image, the pixel recovery rules of the current watermark are deduced in the process of watermark extraction.
Suppose that ; then is still the size of quantifying step of pixel value, and is the pixel value at the position of the watermarked carrier image. If , where , then the is an odd number, and . It follows that the pixel value of watermark is 1. If , where , then the is an even number, and . It follows that the pixel value of watermark is 0. However, the current position coordinate is not the position coordinate corresponding to the watermark. The recovery rules of the pixel values just embody the advantages of binary watermark image, because the pixel value is either 0 or 1. So it does not depend on the pixel characteristics, and the pixel values of watermark can be judged only by the quantitative extraction rules of the pixel value in the watermarked carrier image.
Step 5. Restore the pixel values of original watermark image according to the values of , which are calculated at the position of pixel coordinates and selected from . Then, each position coordinate is replaced by through improved Arnold inverse transformation; that is, . The coordinate values of watermark and the corresponding pixel values have been determined. According to the above two results, the original watermark image can be recombined.
4. Experimental Works
For the experimental purposes, specific software has been developed to implement the proposed methods using MATLAB. Figure 3(a) shows an original carrier image with size , which is Lena gray image of unit 8. Figure 3(b) depicts an original watermark image with size , which is the school badge image of Henan Normal University with binary sequence. When the watermark is embedded, the positions embedded into the carrier image are determined by IAT, and the secret key parameters are set as , , , and . Then, the pixel values of the embedding positions are determined. When the watermark is extracted, the embedded positions should be found out by using FSSVM model, and the pixel values are restored. Thus, the embedding position is transformed inversely back to the original watermark by using improved Arnold inverse transformation. The above two processes can complement each other. Figure 3(c) is the Lena digital image embedded with actual watermark image by using the watermark embedding algorithm in this paper.
The quality and perceptibility of digital image embedded with actual watermark are judged by using the value of peak signal-to-noise ratio (PSNR), which presents the damaged degree of embedded watermark information to carrier quality. The bigger the PSNR is, the smaller the damaged degree is. Then, PSNR is denoted bywhere , , and and describe the pixel values of the original carrier image and the watermarked carrier image, respectively.
The bit error rate (BER) between extracted watermark and original watermark is employed to evaluate the extracted watermark image objectively. The closer the distance between BER and 0 is, the higher the robustness of the watermark system is, and the stronger the antiattack capability is. Then, BER is denoted bywhere , , and describe the pixel values of the original watermark and the extracted watermark in corresponding positions, respectively, and represents XOR operation by bit.
The objective evaluation of the test result of watermark can also use normalized correlation coefficient (NCC) to evaluate the similarity degree, which describes the change before and after embedding watermark in the carrier image. The greater the similarity degree is, the higher the robustness of watermark is. Then, NCC is denoted byIt follows from Figure 3(c) that PSNR is very high and gets 36.3697 dB, and the quality of the watermarked image has no change, which is consistent with Figure 3(a). Hence, it fully satisfies the requirement of imperceptibility of watermark. In what follows, the watermark shown in Figure 3(d) is extracted from Figure 3(c) by using the proposed extraction algorithm. When the watermarked image has not got any attack, the actual watermark can almost be extracted losslessly, BER = 0.0059 is approximately equal to 0, and NCC = 0.9785 is very close to 1. Therefore, the extracted watermark is almost the same as the original watermark.
In order to further investigate the robustness of our proposed scheme, the watermarked image shown in Figure 3(c) is distorted by taking various attacks, respectively, like (1) image brightening, (2) image darkening, (3) histogram equalization, (4) superposition of Gaussian noise, (5) median filter, (6) JPEG compression, (7) geometric cutting, and (8) geometric rotation. Then, Table 1 shows the experimental data under the above eight types of attacks, and Figures 4(a)–4(h) display the watermarks extracted from the watermarked images which are manipulated by the above attack operations, respectively. From Table 1, the results show that the actual embedded watermarks still have ideal capability of antiattacks, and the BER values are equal to 0 approximately. It follows from Figure 4 that these embedded watermarks can be extracted well and are close to the result of no attacks. Thus, the proposed method in this paper has better robustness against various attacks.
The following part of our experiments continues testing the proposed algorithms in a new watermark image with size , shown in Figure 5(a), while the carrier image is still Figure 3(a). By using the embedding algorithm in this paper, the quality of the watermarked image has not changed too much, and PSNR is very high, up to 50.0612 dB, which is consistent with Figure 3(a). Then, it fully satisfies the requirements of the watermark invisibility. Figure 5(b) is the watermark extracted by using the proposed extraction algorithm. It shows that when the watermarked image has not suffered any attack processing, the embedded watermark can be extracted losslessly, BER = 0.0049 is approximate to 0, and NCC = 0.9956 is very close to 1. So the extracted watermark is almost the same as Figure 5(a). What is more, the watermarked image further suffers the above eight types of attacks, and then the corresponding extracted watermark images are shown in Figures 5(c)–5(j). With respect to PSNR and BER, our proposed scheme (IAT + FSSVM) is compared with the other two methods, including the fact that IAT is replaced by AT to combine AT and FSSVM (AT + FSSVM) method and FSSVM is replaced by Least Squares Support Vector Machine (LSSVM) to combine IAT and LSSVM (IAT + LSSVM) method. The experimental results are illustrated in Table 2.
The third part of our experiments is to test the proposed algorithms in a camera man image with size , shown in Figure 6, while the watermark is still Figure 3(b). The camera man image is embedded with Figure 3(b) by using the proposed embedding algorithm, and then PSNR is very high, up to 73.9578 dB. Figure 7(a) is the watermark extracted from the watermarked camera man image by using the proposed extraction algorithm. When the watermarked camera man image has not suffered any attack processing, the embedded actual watermark can be almost extracted losslessly, BER = 0.0035 is approximate to 0, and NCC = 1. Hence, Figure 7(a) is almost the same as Figure 3(b). In what follows, the watermarked camera man image further suffers the above eight attacks, and then the corresponding extracted watermark images are shown in Figures 7(b)–7(i). Similarly, with respect to PSNR and BER, the experimental results of three methods (AT + FSSVM, IAT + LSSVM, and IAT + FSSVM) are shown in Table 3.
From Tables 2 and 3, it can be concluded that the combination of IAT and FSSVM proposed in this paper makes the BER and PSNR very ideal. On the one hand, though the PSNR values between AT + FSSVM and IAT + FSSVM are approximate, the BER values in our scheme are obviously smaller; then it is obvious that IAT has more advantages in the watermark extraction. On the other hand, though the PSNR values between IAT + LSSVM and IAT + FSSVM are identical, half of the BER values in our scheme are slightly smaller and the others are approximate, so it can be concluded that the FSSVM model is more powerful in the watermark extraction. Therefore, the performances of IAT and FSSVM are better than those of AT and LSSVM.
The fourth part of our experiments is to give more details and justifications of our scheme by taking six carrier images against thirteen kinds of attacks. The watermark is still Figure 3(b), and the carrier images include Clock, Aerial, Girl, Truck, Airport, and Man standard images, respectively, which are downloaded from USC-SIPI image library. The thirteen kinds of attack indexes present free, JPEG, low-pass filtering, median filtering, average filtering, salt peppers noise, Gaussian noise, cropping 25%, rotation 15°, sharpening, brightening, darkening, and histogram equalization, respectively. The BER values between original and extracted watermark for the six carrier images against thirteen attacks are shown in Figure 8, which shows that the Airport and Man with size have the least BER, the Clock and Aerial with size have the most BER, and the sizes of Girl and Truck are . That is, the larger the carrier is, the lesser the BER is. The reason is the parameter of IAT in our scheme, which makes the watermark pixels evenly dispersed in the whole carrier and minimizes the damage of being attacked, while the larger the carrier is, the larger the is, the more the pixels disperse, the less the damage is, and as a result, the lesser the BER is. So the proposed embedding and extraction methods can be considered reasonable and feasible.
The last part of our experiments is to compare our proposed scheme with the other state-of-the-art watermarking methods based on SVM, which are Peng’s method , Tsai’s method , and Li’s method , respectively. The watermark is still Figure 3(b), and the carrier image is Boat with size , downloaded from USC-SIPI image library. The top-ten kinds of the above thirteen kinds of attacks are given to the watermarked Boat image. Then the BER values of our scheme compared with the other three methods against ten attacks are shown in Figure 9. It can be concluded from Figure 9 that our scheme outperforms the other three methods as a whole, though the BER values of our scheme are a little bigger than those of others against the low-pass filtering and Gaussian noise.
From the above experimental results, the comparative analysis of our scheme with other schemes and the advantages of our algorithms are further summarized as follows.
(1) The embedding method presented in this paper is realized by using IAT and quantization rules, and more parameters (, , , , and ) are used, where , , , and are introduced in IAT and appears in quantization rules. These parameters are used as secret keys to extract watermark in the process of watermark extraction, which can be obtained from the embedding process. Because the number of secret keys increases to five and every key has many possible values, our extraction scheme is very difficult to break; then the security of the proposed embedding and extraction algorithms is improved greatly. Besides, the watermark can be extracted without the original carrier by using our scheme; then the blind extraction is realized, which expands the watermarking applications and improves the security degree. In addition, the change range of pixel values in the carrier image with the quantitative embedding rules is very small. Therefore, compared with the traditional embedding techniques of watermark, the proposed scheme not only realizes the complete imperceptibility of the watermark, but also causes minor damage to the original carrier image. Thus, the problem of image degradation does not exist, so it maintains the integrity of original information of the carrier and the imperceptibility of the carrier image with watermark.
(2) Compared with the existing SVM-based watermarking techniques, the FSSVM model proposed in this paper introduces the concept of fuzzy membership degree and combines the fuzzy mathematics with smooth SVM to simulate the visual features of the human eyes for the watermarked carrier image instead of the standard SVM. The application method not only provides a new solution for digital image watermark technique, but also quickens the training speed and improves the efficiency of image characteristic value. The predicted pixel results of test sample are closer to the actual values than the standard SVM. Thus, the extracted watermark is very close to the original watermark.
(3) Based on IAT, the proposed watermarking scheme has implemented mutual conversion of coordinates from watermarked carrier and original watermark, and then it makes full use of the chaotic scrambling feature of AT to distribute the watermark into the carrier image. In the combination of the new space domain transformation and FSSVM, the watermarked carrier image still can remember the relationship among the local pixels after experiencing various attacks and realize the correct extraction of watermark. Therefore, the embedding and extraction methods have strong robustness to all kinds of conventional image attacks, and they also balance imperceptibility and robustness of watermark well.
In this paper, a detailed investigation of image watermarking process by handling it as an optimization procedure based on IAT and FSSVM is presented. The watermarking technique of spatial domain by using IAT is introduced to determine the positions embedded with watermark. Then, one can make full use of the scrambling feature of IAT to evenly distribute the watermark into the whole space of carrier image. Through increasing the secret key parameters, the security degree is improved efficiently. By using quantization and round methods in mathematics to change the pixels of embedding positions, it not only realizes the imperceptibility of watermark, but also deduces the quantitative extraction rules reversely. So the process realizes the blind extraction of watermark without depending on the original carrier image. Furthermore, FSSVM model is constructed to predict the original pixel values of watermarked carrier when the watermark is extracted. Through comparing the predictable values with the actual pixel values of the watermarked carrier image, the positions embedded with watermark can be found out easily. It makes full use of spatial domain features of the image and improves the accuracy and efficiency in predicting outcomes. What is more, the combination of spatial domain and SVM not only efficiently improves the robustness of watermark obviously, but also realizes the blind extraction of watermark. Thus, it achieves the efficacy of advantageous complementarities. Hence, the proposed scheme in this paper is different from the traditional watermark embedding and extraction methods. Theoretical analysis and computer simulations indicate the feasibility of our proposed algorithms. Therefore, our proposed scheme has satisfied the blind extraction, robustness, imperceptibility, and security requirements. In addition, to extend the proposed idea to color video watermarking is another future work.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
This work was supported by the National Natural Science Foundation of China (nos. 61370169, 61402153, and 61472042), the Key Project of Science and Technology Department of Henan Province (no. 142102210056), the Science and Technology Research Key Project of Educational Department of Henan Province (nos. 13A520529, 12A520027), and the Education Fund for Youth Key Teachers of Henan Normal University.
- G. A. Papakostas, E. D. Tsougenis, and D. E. Koulouriotis, “Moment-based local image watermarking via genetic optimization,” Applied Mathematics and Computation, vol. 227, pp. 222–236, 2014.
- B.-Z. Li and Y.-P. Shi, “Image watermarking in the linear canonical transform domain,” Mathematical Problems in Engineering, vol. 2014, Article ID 645059, 9 pages, 2014.
- N. M. Makbol and B. E. Khoo, “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU—International Journal of Electronics and Communications, vol. 67, no. 2, pp. 102–112, 2013.
- Y. Naderahmadian and S. Hosseini-Khayat, “Fast and robust watermarking in still images based on QR decomposition,” Multimedia Tools and Applications, vol. 72, no. 3, pp. 2597–2618, 2014.
- M. Ali, C. W. Ahn, and M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Optik—International Journal for Light and Electron Optics, vol. 125, no. 1, pp. 428–434, 2014.
- A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, “Optimized gray-scale image watermarkingusing DWT-SVD and firefly algorithm,” Expert Systems with Applications, vol. 41, no. 17, pp. 7858–7867, 2014.
- E. Nezhadarya and R. K. Ward, “Multiscale derivative transform and its application to image watermarking,” Digital Signal Processing, vol. 33, pp. 148–155, 2014.
- M. Mundher, D. Muhamad, A. Rehman, T. Saba, and F. Kausar, “Digital watermarking for images security using discrete slantlet transform,” Applied Mathematics & Information Sciences, vol. 8, no. 6, pp. 2823–2830, 2014.
- A. K. Singh, M. Dave, and A. Mohan, “Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain,” National Academy Science Letters, vol. 37, no. 4, pp. 351–358, 2014.
- L. Sui and B. Gao, “Color image encryption based on gyrator transform and Arnold transform,” Optics and Laser Technology, vol. 48, pp. 530–538, 2013.
- Z. Liu, L. Xu, T. Liu et al., “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Optics Communications, vol. 284, no. 1, pp. 123–128, 2011.
- M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Optics and Lasers in Engineering, vol. 50, no. 5, pp. 772–779, 2012.
- L. F. Chen, D. M. Zhao, and F. Ge, “Image encryption based on singular value decomposition and Arnold transform in fractional domain,” Optics Communications, vol. 291, pp. 98–103, 2013.
- Y.-L. Chen, H.-T. Yau, and G.-J. Yang, “A maximum entropy-based chaotic time-variant fragile: watermarking scheme for image tampering detection,” Entropy, vol. 15, no. 8, pp. 3170–3185, 2013.
- S. Sadasivam, P. Moulin, and T. P. Coleman, “A message-passing approach to combating desynchronization attacks,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 894–905, 2011.
- X.-Y. Wang, E.-N. Miao, and H.-Y. Yang, “A new SVM-based image watermarking using Gaussian-Hermite moments,” Applied Soft Computing, vol. 12, no. 2, pp. 887–903, 2012.
- H.-Y. Yang, X.-Y. Wang, and C.-P. Wang, “A robust digital watermarking algorithm in undecimated discrete wavelet transform domain,” Computers and Electrical Engineering, vol. 39, no. 3, pp. 893–906, 2013.
- L. D. Li, S. S. Li, A. Abraham, and J. S. Pan, “Geometrically invariant image watermarking using Polar Harmonic Transforms,” Information Sciences, vol. 199, pp. 1–19, 2012.
- I. Nasir, F. Khelifi, J. Jiang, and S. Ipson, “Robust image watermarking via geometrically invariant feature points and image normalisation,” IET Image Processing, vol. 6, no. 4, pp. 354–363, 2012.
- X. Wang, Z. Xu, and P. Niu, “A feature-based digital watermarking scheme for halftone image,” AEU: International Journal of Electronics and Communications, vol. 64, no. 10, pp. 924–933, 2010.
- Y. Fu, R. Shen, and H. Lu, “Watermarking scheme based on support vector machine for colour images,” Electronics Letters, vol. 40, no. 16, pp. 986–987, 2004.
- H.-H. Tsai and D.-W. Sun, “Color image watermark extraction based on support vector machines,” Information Sciences, vol. 177, no. 2, pp. 550–569, 2007.
- C. H. Li, Z. D. Lu, and K. Zhou, “An image watermarking technique based on support vector regression,” in Proceedings of the International Symposium on Communications and Information Technologies (ISCIT '05), pp. 177–180, October 2005.
- H. Peng, J. Wang, and W. X. Wang, “Image watermarking method in multiwavelet domain based on support vector machines,” Journal of Systems and Software, vol. 83, no. 8, pp. 1470–1477, 2010.
- H.-H. Tsai, H.-C. Tseng, and Y.-S. Lai, “Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine,” Journal of Systems and Software, vol. 83, no. 6, pp. 1015–1028, 2010.
- C.-H. Li, H.-F. Ling, and Z.-D. Lu, “Semi-fragile watermarking based on SVM for image authentication,” in IEEE International Conference onMultimedia and Expo (ICME '07), pp. 1255–1258, July 2007.
Copyright © 2015 Lin Sun et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.