Research Article  Open Access
A Novel Scrambling Digital Image Watermark Algorithm Based on Double Transform Domains
Abstract
Digital watermark technology is a very good method for protecting copyright. In this paper, in terms of requisition of imperceptibility and robustness of watermarking, the multidirectional, multiscale, and bandpass coefficient features of Curvelet transform are introduced and a novel image watermark scheme based on Curvelet and human visual system is proposed. Digital watermark information is embedded into the first 16 directions with larger energy in the fourth layer. Experimental results indicate that the proposed watermark scheme is feasible and simple. Simultaneously, the embedded watermark images just have tiny difference with the original images and the extracted watermark is accurate. Moreover, it is imperceptible and robust against various methods of signals processing such as cropping, noise adding, and rotating and altering.
1. Introduction
With the development of multimedia technology and network communications, digital products are increasingly popular. Due to illegal copying and tampering of digital product, traditional encryption technology is not sufficient to protect legitimate rights of digital media copyright. Digital watermarking which is hidden in digital products can play an important role. Recently, the digital watermarking has become one of research hotspots in the field of signal processing and information security. Its key is to embed the unremovable watermarking into the protected original signal without affecting data availability. Simultaneously, the watermarking can be completely and exactly extracted or detected, to satisfy solving the copyright disputes such as piracy tracking, and so forth. Therefore, the embedded digital watermarking must possess the following characteristics [1, 2]: imperceptibility: embedded watermarking should not lead to obvious visual difference and hidden information cannot be perceived easily; robustness: the carrier image is attacked or processed; the embedded digital watermark information also can be extracted exactly; maximum of information: the embedded watermark information should be capacity as much as possible in the digital products to achieve the largest hidden information volume of carrier object; determinacy: the copyright of digital watermark information could uniquely determine the owner of the digital products even via certain damage.
According to the difference of embedding watermark technology, the algorithms were divided into watermarking in spatial domain and watermarking in transform domain [3]. For watermarking in spatial domain, the amplitude of sample points of original image was changed directly and its representative algorithm was the Least Significant Bit algorithm [4]. Changing coefficients of carrier image via embedding watermark information was called watermarking in transform domain. In general, the main idea of watermark algorithm in transform domain is changing the image transform domain coefficients to embed watermarking which adopts the spread spectrum communication principle. Digital watermark technology in transform domain has obvious advantages [5, 6]: The watermark information can be distributed into all pixels of spatial domain and ensure the imperceptibility of watermarking. Centralization of energy distribution can embed large quantity of watermark data and guarantee better imperceptibility, stronger robustness, and higher security. It is compatible with the existed image compression method and can embed watermarking into the compressed image. It is compatible with human visual system and can hide the watermarking easily. The existed watermark algorithms in transform domain mainly include Discrete Fourier Transform (DFT) [7], Discrete Cosine Transform (DCT) [8], and Discrete Wavelet Transform (DWT) [9]. They can effectively represent point singularity and deficiency for linear or curve singularity of natural images. Recently, with the development of the multiscale geometric transform, the approximation abilities of signal and image are continually enhanced, which is gradually correspondent to the human visual system and has been widely applied in many fields. There are plenty of researches in the field of information security, such as watermark algorithm based on Ridgelet Domain [10] and Curvelet Domain [11]; they can further improve the imperceptibility and robustness of watermark algorithm. According to various transforms and HVS, the capacity of the watermark insertion was introduced in some literatures [12–14].
In this paper, we study an algorithm in transform domain. According to the requirement of digital watermarking robustness and imperceptibility, the multidirectional, multiscale, and bandpass coefficient features of Curvelet transform are introduced and a novel image watermark scheme based on Curvelet and human visual system is proposed. At first, the scrambling digital watermark image via a layer of wavelet decomposition. Then, the original carrier image is transformed via Curvelet. At last, we embed low frequency components of watermark image into the larger 16directional coefficient matrix of fourth layer of carrier image. Experimental results show that the proposed algorithm is simple and effective. The difference between the original image and the embedded watermark image is tiny. Simultaneously, the embedded watermarking can be extracted easily and accurately. Moreover, the algorithm has good imperceptivity and robustness for various attacks such as cropping, noise adding, and rotating and altering.
2. Curvelet Transform
2.1. The Theory of Curvelet Transform
Wavelet theory emerged in the mid1980s. The good capability of time and frequency analysis is the important reason for its rapid development. However, wavelet transform cannot ideally achieve the optimal approximation order of signal for twodimensional or higher “line of singularity.” So, Ridgelet theory was arisen at the historic background of theory. The basic theories of Ridgelet transform are given by Candès in 1998 [15]. It transforms “line of singularity” in the twodimensional function into “point of singularity,” and then wavelet transform can obtain the optimal nonlinear approximation order for the “line of singularity” of twodimensional or high dimensional function. Monoscale Ridgelet transform [16] and Curvelet transform [17] are developed based on the Ridgelet transform. They derive from function localization and frequency band splitting, respectively, and both can approximately represent line and curve singularity. Differently, the basic scale of monoscale Ridgelet transform is fixed; the basic scale of Curvelet transform is arbitrary and can be decomposed in any possible scale. Curvelet transform is a mixture of special filter process and multiscale Ridgelet transform as follows. Achieving Curvelet transform requires a series of filters: , . The filter maps the function as follows: The coefficients of Curvelet transform are as follows:
Curvelet transform maps arbitrary mean square integrable function as transform coefficient , where the parameter set of is and is called Curvelet. The set of Curvelet constitutes a compact framework of and can be decomposed asSupport interval of Curvelet bases is the most core relationship of Curvelet transform and satisfies the following:
It denotes anisotropy scaling relationship. Curvelet is a kind of directional basis atom and Curvelet transform is a kind of multidirectional, multiresolution, and bandpass function analysis method. USFFT and WRAP algorithm for Curvelet transform are presented by Candès [18].
2.2. Analysis of Curvelet Coefficients Characteristics
The coefficients of structure can be obtained via Curvelet transform, where , , and denote scale, direction, and th direction matrix coordinate in scale layer , respectively. Lena image (Figure 1) with the size of , for example, is divided into sixscale layer via Curvelet transform. Its innermost layer, namely, the first layer, is called Course scale layer, which is a matrix made up of low frequency coefficient and occupies the vast majority of energy of the coefficients, including the general picture of image. The outermost layer, namely, the 6th layer, is called fine scale layer, which is a matrix composed of high frequency coefficient, and shows image edges and details. The 2~5 layer in the middle is called the detail scale layers. Coefficient of each layer is stratified into four broad directions and each broad direction is divided into 8, 8, 16, and 16 small directions. Each small direction is a matrix composed of medium and high frequency coefficients and the matrix is called subband coefficients matrix. Figure 2 shows coefficient matrix images of the first five layers; Figure 3 shows the coefficient matrix image of different directions in the 4th layer. Figure 4 is the outermost layer coefficient matrix image. The transform coefficient format of matrix coordinate in th direction of th layer is shown in Table 1.

3. Wavelet Transform
Wavelet analysis, as a mathematical theory and method, was developed from the mid1980s. It is proposed by the French scientists Grossma and Morlet during their analysis of the seismic signals [19]. Wavelet analysis was regarded as a breakthrough of Fourier analysis and has good localization performance in timefrequency domain and solved many difficult problems that cannot be solved by the Fourier transform. The wavelet transform is known as the “mathematical microscope,” which is a milestone in the history of harmonic analysis development. The main idea of wavelet transform is to perform a detailed frequency separation for image, known as the multiresolution transform. Image can be stratified into the low frequency domain (on behalf of the general picture of the image) and the high frequency domain (on behalf of the image detail) via wavelet transform. And then, the high frequency part can be divided into three parts: HL, LH, and HH, which represents horizontal, vertical, and diagonal direction of the image, respectively. The low frequency coefficient represents average brightness of the corresponding wavelet blocks and high frequency coefficient represents the image texture and edges. If low frequency region is further subdivided via wavelet transform, it will generate a higher order of low frequency and higher frequency order in accordance with the above recursion principle. Figure 5 denotes the structure diagram of the twoorder wavelet decomposition and Figure 6 shows the colored Lena image via twoorder wavelet decomposition.
4. Watermark Algorithm and Evaluation Criterion
4.1. Image Scrambling Transform
Image scrambling transform which is an algorithm via messing image pixel sequence is a kind of image encryption technology. The number of pixels and the histogram of the image are not changed. The scrambling watermark can eliminate the spatial interdependency of watermark pixels. So it enhances the robustness of watermark image for clipping operation.
The scrambling methods, such as Fass curve, Graycode, Arnold transform, and magic square, have been used. According to intuitionism and periodicity of the Arnold transform, we preprocessed the watermark image via the transform [20]. Arnold transform, known as Arnold’s Cat Map, is an ergodic theory. From the view of the theory of sampling, digital image is a twodimensional discrete sampling array, namely, an image matrix. Discrete Arnold transform can be operated for a square digital image:where and denote the anterior pixel location and posterior pixel location via Arnold transform, respectively. The scrambling image can be produced via Arnold transform.
4.2. Watermark Algorithm and Evaluation Criterion
Lena image () is executed Curvelet transform via USFFT. According to the structure of the human eye and knowledge of human visual system, human eyes are more sensitive to low frequency signal than to high frequency information. Taking into account robustness and imperceptibility of watermark information, watermark information is embedded into the detail scale level. The first 16direction subbands with higher energy are chosen for watermark embedded site. Concrete steps of embedding watermark information are as follows.
Step 1. Execute Curvelet decomposition on Lena image.
Step 2. Turn each of the coefficient matrixes of 64 small directions in the 4th layer into row vectors and compute the energy value in each direction. The formula is as follows:
Step 3. Select the first 16 directions with larger energy as the watermark carrier site.
Step 4. Execute Arnold scrambling for original watermark () and then via wavelet transform (Figure 7).
Step 5. Turn the low frequency matrix () into row vectors, which is used as watermark information.
Step 6. Embed watermark information into the first 16 directions with larger energy vector coefficient in Step , and change them into direction matrix respectively:
Step 7. Execute Curvelet reconstruction to obtain the embedded watermark image (Figure 8).
The extraction of the watermark is implemented via inverse process of the watermark embedding; specific steps are as follows.
Step 1. Execute Curvelet decomposition for Lena image which have been embedded with watermark information.
Step 2. Turn the coefficient matrix of 64 small directions in the fourth layer into row vectors, respectively. Then subtract coefficient matrix row vector corresponding to original Lena image and multiply the reciprocal of 16 times embedding strength factor:
Step 3. Turn the first 1024 elements of vector into the matrix, which is extracted watermark information.
Step 4. Combine extracted watermark information with high frequency component obtained by a layer of wavelet decomposition of the original watermark and make a wavelet reconstruction.
Step 5. Execute inverse Arnold scrambling for the reconstructed image and watermark image is thus extracted (Figure 8).
The human eye which acts as the digital image processing terminal is the most accurate method for the subjective evaluation. However, subjective evaluation methods are all complex, timeconsuming, and difficult to quantify. So the limitations of subjective evaluation promote the development of objective evaluation method. The traditional objective evaluation methods such as Peak Signal to Noise Ratio (PSNR) and Mean Square Estimation (MSE) are widely used in image quality evaluation [21]. However, they are not combined with the human visual system and cannot accurately measure the watermarked image visual quality. Therefore, it is necessary to seek a more objective and accurate evaluation. Recently, the structural similarity index (SSIM) which acts as a novel objective evaluation of twoimage similarity index is gradually applied [22]. It comes from the improvement of the universal image quality. Structural similarity of images consists of comparison of brightness, contrast, and structure information; their expression is as follows:They form evaluation method:where , , , represent, respectively, the original image blocks and the degraded image blocks and denote, respectively, their corresponding variance and are all small positive constants and is covariance of and . In order to adjust the proportion of three parts, given parameters , , are greater than zero and , , are all small constant to avoid the denominator is zero, where , , , , and is the dynamic range of pixel values. SSIM utilizes image information in different frequency bands and different directions and also can capture local statistical characteristics of the image. Compared with PSNR, it is more consistent with human visual system and accords with the objective evaluation of the embedded watermark image. To value the image quality, the image is stratified into several overlapping or nonoverlapping subblocks and each subblock SSIM is calculated; then average summation of subblock SSIM and obtain the whole image MSSIM, namely,where , represents the original image block and degraded image blocks, respectively, is the total account of image subblocks, and , denotes the th subblock of the original image and the distortion image, respectively. In this paper, MSSIM index is an objective measure of the hidden watermark. To quantify consequent, using more concrete form of MSSIM index,
In order to eliminate the effect of subjective and objective factors such as experience, physical condition of the observers, and experimental conditions, Normalized CrossCorrelation (NC) is adopted to quantitatively evaluate the similarities between extracted watermark and the original watermark [23], which is defined as follows:
Generally, if the extracted watermark and the original watermark satisfy the relationship , it is shown that the extracted watermark has good similarity with original one and the watermarking satisfies the requirements of robustness. The greater the relative value, the better the robustness.
4.3. Watermark Attack Analysis
In order to detect the imperceptibility of watermark information and robustness of the algorithm, cutting edge attack, Gaussian noise attack, a quarter of the clipping attack, and rotating and altering attack are simulated to test the Lena image. All kinds of attack effects are shown in Figures 9–24.
As can be seen from Table 2, the embedded watermark image has very good imperceptibility and can resist various attacks. Moreover, the extracted watermark image and the original one have much correlation, satisfying the requirement of the watermark robustness. Furthermore, the proposed algorithm in the paper is better robustness to the rotational attack than other transforms; Table 3 is the test results of the spinning processing attack for various transforms.


5. Conclusions
In this paper, the basic principles of Curvelet transform have been analyzed. Compared with wavelet transform and Ridgelet transform, Curvelet transform shows better performance in signal processing. We take full advantage of multidirection, multiresolution, and bandpass features of Curvelet transform and the characteristics of human visual system. The scrambling digital watermark information is embedded into the first 16 directions with larger energy in the fourth layer. All kinds of attack are simulated on embedded watermark image. Experimental results show that the algorithm has good robustness and imperceptibility and better robustness to the spinning processing attack than other transforms. In the future, we will do a further study on the effect of the watermark which is embedded into the other scale layers.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
The work was supported by the National Nature Science Foundation of China (no. 61071188) and the Nature Science Foundation of Hubei Province (no. B2015095) and the innovative personnel Foundation of Hubei Polytechnic University (no. 14xjz02C).
References
 F. Mintzer, W. Gordon, and M. Minerva, “Effective and ineffective digital watermarks,” in Proceedings of the IEEE International Conference on Image Processing, vol. 10, pp. 343–351, Santa Barbara, Calif, USA, October 1997. View at: Google Scholar
 M. Minerva and C. Mintzer, “Digital watermarking for highquality imaging,” in Proceedings of the 1st Signal Processing Society Workshop on Multimedia, vol. 6, pp. 357–362, Princeton, NJ, USA, 1997. View at: Google Scholar
 R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, “Perceptual watermarks for digital images and video,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1108–1126, 1999. View at: Publisher Site  Google Scholar
 I. J. Cox, L. Matt, and A. J. Bloom, Digital Watermarking, Electronic Industry Press, Beijing, China, 2003.
 L. K. Jones, “A simple lemma on greedy approximation in hilbert space and convergence rates for projection pursuit regression and neural network training,” The Annals of Statistics, vol. 20, no. 1, pp. 608–613, 1992. View at: Publisher Site  Google Scholar
 R. R. Coifman and M. V. Wickerhauser, “Entropybased algorithms for best basis selection,” IEEE Transactions on Information Theory, vol. 38, no. 2, pp. 713–718, 1992. View at: Publisher Site  Google Scholar
 T. L. Ruanaidh and W. Sletan, “An algorithm of watermark based on discrete Fourier transform,” IEEE Transactions on Image Processing, vol. 6, no. 8, pp. 663–672, 1997. View at: Google Scholar
 J. R. Hernández, M. Amado, and F. PérezGonzález, “DCTdomain watermarking techniques for still images: detector performance analysis and a new structure,” IEEE Transactions on Image Processing, vol. 9, no. 1, pp. 55–68, 2000. View at: Publisher Site  Google Scholar
 F. Davoine, “Comparison of two wavelet based image watermarking schemes,” in Proceedings of the International Conference on Image Processing (ICIP '00), pp. 682–685, Vancouver, Canada, September 2000. View at: Google Scholar
 E. J. Candes, R. R. Coifman, and D. L. Donoho, “Digital implementation of ridgelet packets,” Tech. Rep., Stanford University, Stanford, Calif, USA, 2002. View at: Google Scholar
 E. Candès, L. Demanet, D. Donoho, and L. Ying, “Fast discrete curvelet transforms,” Multiscale Modeling and Simulation, vol. 5, no. 3, pp. 861–899, 2006. View at: Publisher Site  Google Scholar  Zentralblatt MATH
 W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 34, pp. 313–336, 1996. View at: Publisher Site  Google Scholar
 F. Bartolini, M. Barni, V. Cappellini, and A. Piva, “Mask building for perceptually hiding frequency embedded watermarks,” in Proceedings of the International Conference on Image Processing (ICIP '98), pp. 450–454, October 1998. View at: Google Scholar
 M. Kutter and S. Winkler, “A visionbased masking model for spreadspectrum image watermarking,” IEEE Transactions on Image Processing, vol. 11, no. 1, pp. 16–25, 2002. View at: Publisher Site  Google Scholar
 E. J. Candes, Ridgelets: theory and applications [Ph.D. thesis], Department of Statistics, Stanford University, Stanford, Calif, USA, 1998.
 E. J. Candes, “Monoscale Ridgelet for the representation of images with edges,” Tech. Rep., Deperment of Statistics, Stanford University, Stanford, Calif, USA, 1999. View at: Google Scholar
 D. L. Donoho and M. R. Duncan, “Digital curvelet transform: strategy, implementation, and experiments,” in Wavelet Applications VII, vol. 4056 of Proceedings of SPIE, pp. 12–29, Orlando, Fla, USA, April 2000. View at: Publisher Site  Google Scholar
 E. J. Candès and D. L. Donoho, “New tight frames of curvelets and optimal representations of objects with piecewise C^{2} singularities,” Communications on Pure and Applied Mathematics, vol. 57, no. 2, pp. 219–266, 2004. View at: Publisher Site  Google Scholar
 A. Grossman and J. Morlet, “Decoposition of Hardy functions into square integral wavelets of constant shape,” Signal Processing, vol. 52, no. 3, pp. 375–383, 1984. View at: Google Scholar
 T. Kong and T. Zhang, “A novel algorithm for inverse Arnold transforms,” Journal of Software, vol. 15, no. 10, pp. 1558–1564, 2004. View at: Google Scholar
 K. Mizuno, K. Takagi, Y. Terachi, S. Izumi, H. Kawaguchi, and M. Yoshimoto, “A sub100mw dualcore HOG accelerator VLSI for parallel feature extraction processing for HDTV resolution video,” IEICE Transactions on Electronics, vol. 96, no. 4, pp. 433–443, 2013. View at: Publisher Site  Google Scholar
 H. Li, Research on quality evaluation method based on the gradient of structural similarity image [Ph.D. thesis], Xi'an University of Science and Technology, Xi'an, China, 2012.
 Vqeg, “Final report from the video quality experts group on the validation of objective models of video quality assessment,” 2000, http://www.vqeg.org/. View at: Google Scholar
Copyright
Copyright © 2015 Taiyue Wang and Hongwei Li. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.