Article Information
Corresponding Author: Fenghua Wang** , yangyanan0309@gmail.com
Qiumei Zheng*, College of Computer Science and Technology, China University of Petroleum Huadong, China, zhengqm@upc.edu.cn
Nan Liu*, College of Computer Science and Technology, China University of Petroleum Huadong, China, 17854227923@163.com
Baoqin Cao*, College of Computer Science and Technology, China University of Petroleum Huadong, China, caobaoqin2302@163.com
Fenghua Wang**, College of Computer and Communication Engineering, China University of Petroleum Huadong, Qingdao, China, yangyanan0309@gmail.com
Yanan Yang*, College of Computer Science and Technology, China University of Petroleum Huadong, China, fenghuawang@upc.edu.cn
Received: November 27 2018
Revision received: July 10 2019
Revision received: April 13 2020
Revision received: May 26 2020
Accepted: May 29 2020
Published (Print): December 31 2020
Published (Electronic): December 31 2020
1. Introduction
In recent decades, the production and dissemination of digital works have become more and more convenient due to the rapid development of computer technology and the internet. Simply copying and modifying existing digital works have become a quick and easy way to “own” them. However, it is also accompanied by a lot of serious copyright problems, such as malicious tampering and arbitrary embezzlement. Therefore, digital watermarking, which refers to the embedding of copyright information such as random sequences, copyright logos and owner identities into digital works to effectively protect their copyright, emerged as an indispensable technology [1-3]. Digital watermarking can be used not only in image, text and video but also in medical domain such as medical image [4,5]. Images are one of the most commonly used digital works, and its copyright problems cannot be more overstated [6,7]. Therefore, embedding digital watermarking has become one of the important methods for protecting image copyright. However, the embedded digital watermarking will affect image quality, that is, its invisibility will be poor [8-11].
The watermarking has two characteristics: invisibility and robustness. Invisibility refers to the visual effect of the embedded watermark on the original image. The effect is the optimal when it is completely invisible. Robustness refers to the ability of the protected image embedded with watermark to extract the watermark after compression, noise addition, and other attacks. Zero-watermarking is a method for protecting copyright by displaying the watermark information in the host image, so it avoids the dilemma the traditional digital watermarking is difficult to achieve a balance between invisibility and robustness [12-16].
“Zero” in the “zero-watermarking” means that the host image is no longer embedded with a watermark and is no longer encrypted by the copyright watermark provided by the owner, such as random sequence of copyright information, ownership mark or user identity [17-19]. More specifically, this encryption method uses the rich and stable features of the original image to construct the master share, and the master share and the copyright watermark superimpose to generate a zero watermark, which is called ownership share [20]. The two shares do not provide any information about the host image and copyright watermark separately, and the copyright watermark will be displayed only when they are superimposed [21,22] , thus making zero-watermark reliable and secure in copyright protection. A zero-watermarking scheme divides digital copyright protection into two processes, namely registration and identification. Upon registration, the ownership share is registered with an intellectual property database of the third-party certification authority (CA). When a copyright dispute arises, identification process is required. Firstly, the master share is extracted from the disputed image, and then the ownership share is taken out from the third-party CA. Finally, the copyright watermark is retrieved under the joint action of two shares to determine the ownership of the digital work [23].
The zero-watermarking scheme proposed by Rani and his colleagues in [24,25], first implements discrete cosine transform (DCT) and singular value decomposition (SVD) for overlapping block sub-images of the host image, and then constructs the master share according to the relation of coefficients. This method is robust to many attacks. However, the test image used in Rani’s study is gray image, which is not applicable to more mainstream applications of color images. In [26], the authors proposed two zero-watermarking schemes based on visual mapping, which combined QR decomposition with DCT to generate master share. Although this method is robust to common attacks, when the color image is used as the test image to construct the master share in the experimental scheme, the image is converted to the YUV color space, and only Y-component is used, and the characteristics of the image are not fully utilized. Similarly, the zero-watermarking algorithm for color images based on DWT-DCT-SVD proposed by Jiang and Chen [27] converts the image from the RGB color space to the YCbCr color space. Then the master share is constructed using only the luminance component (Y), and the characteristics of the image are not fully utilized. In the robust zero-watermarking algorithm for color images in the spatial domain proposed by Xiong [28], master share is constructed directly in the spatial domain using the relationship between the mean value of the pixel and that of the block. This method can resist common attacks because it uses voting policy to extract copyright watermarks in authentication, but it is not robust to rotation attacks because the coefficients in spatial domain are easily interfered by attacks
It can be seen from the above literature that only by using the features of the image can the watermarking algorithm have strong robustness, and the host image must be color image rather than gray image. In order to address these issues, a zero-watermarking algorithm in transform domain based on RGB channel and voting strategy (RGB-CV) is proposed in this paper, which can be applied to color images. The robustness of the algorithm is improved by fully utilizing the RGB channel features of the image and using voting decision in the identification process.
2. The Proposed Zero-Watermarking (RGB-CV)
The RGB-CV algorithm achieves copyright protection for color images with ownership registration and identification, as shown in Fig. 1. In the registration phase, the master share of the image is constructed firstly, and then the ownership share generated by the interaction of master share and copyright watermark is registered to a CA. In the identification phase, the master share of the image with copyright dispute is constructed and superposed with the registered ownership share to restore the copyright watermark.
Flow chart of the RGB-CV algorithm for protecting image copyright.
2.1 Overview of RGB-CV
In the phase of zero watermark identification, in order to improve the robustness of the algorithm, the algorithm makes full use of image features to construct the master share, namely the transformation domain coefficients of the three channels in the construction of color image. When constructing the master share with the host image, the low-frequency approximate sub-image of the host image is divided into three channels of R, G, and B in the RGB color space, and three master shares are constructed from the three channels by applying the same rule. The rules for constructing the master share are as follows: firstly divide a channel into non-overlapping 88 sub-blocks and perform 1-level wavelet transform on the sub-block to obtain a low-frequency block. Secondly, perform discrete cosine transform and singular value decomposition on the low-frequency block. Finally, construct a singular value coefficient matrix using the maximum singular value of each sub-block, and generate a master share by comparing the relationship between the maximum singular value of each block and the mean value of the singular value coefficient matrix.
We use host image and copyright watermark image to generate ownership share. In the experimental method of this paper, the copyright watermark is simply referred to as Watermark (W). Firstly, the watermark is encrypted by using the double-chaos scrambling method and the three-master sharing X-OR method, respectively. The three watermark bits obtained are used as the R, G and B channel data of ownership share respectively. When the watermark is encrypted by double chaos scrambling method, relevant data such as the initial value of the chaos and the encryption control rate are used as the owner’s key.
In the phase of zero watermark registration, when master share and ownership share are separated, neither of them will display any relevant information about watermark. Only when the two are superimposed (that is, X-OR operation) can the encrypted watermark bits be displayed. Therefore, when retrieving copyright information of disputed images, it is necessary to construct three master shares, respectively, corresponding to R, G, and B channels. The channels corresponding to R, G, and B of the master share and ownership share are respectively subjected to X-OR operations to obtain three encrypted watermarks which should theoretically be identical. In order to further improve the robustness of the algorithm, the watermark bits are determined bit by bit using voting decisions on the three obtained watermarks. Finally, under the effect of the legitimate owner’s key, the watermark bits are inverted to obtain the copyright watermark. The key further guarantees the reliability and security of the zero watermark.
Therefore, this study improves the robustness of the algorithm in two ways: (1) more stable transform domain coefficients are used, and the master share is constructed from three channels; (2) in the phase of copyright identification, the final watermark is obtained through the bit-by-bit voting decision of the watermark obtained from the three channels.
2.2 Implementation of RGB-CV
This section describes the implementation of RGB-CV algorithm used in the phase of ownership registration and identification. A color image I with a size of L×L is used as a host image, and a binary image W with a size of N×N as a watermark image.
2.2.1 Ownership registration phase
There are two main steps in the phase of ownership registration, namely the construction of master share and the construction of ownership share, which are discussed as follows.
(1) Construction of master share
The construction of the master share (M) of the original image I is divided into in the following four steps, as shown in Fig. 2.
Step 1 (Acquisition of approximate sub-image): Using Haar filter, 1-level wavelet decomposition is performed on the original image [TeX:] $$I$$ to obtain a low-frequency approximation sub-image [TeX:] $$ILF$$ of size [TeX:] $$\frac{L}{2} \times \frac{L}{2} \times 3$$ .
Step 2 (Separation of three channels): The RGB channels of the low frequency approximation sub-image [TeX:] $$ILF$$ are separated to obtain [TeX:] $$I_R$$, [TeX:] $$I_G$$, and [TeX:] $$I_B$$ of size [TeX:] $$\frac{L}{2} \times \frac{L}{2}$$.
Step 3 (Construction of master shares): The master shares [TeX:] $$M_{R}$$, [TeX:] $$M_{G}$$, and [TeX:] $$M_{B}$$ of [TeX:] $$N \times N$$ size are constructed by the same series of processing for the three channels. Taking R channel construction [TeX:] $$M_{B}$$ as an example, the construction process is introduced.
a) After [TeX:] $$I_R$$ is performed with non-overlapping partitions with a block size of [TeX:] $$\frac{L}{2 \times N} \times \frac{L}{2 \times N}$$ , the block matrix [TeX:] $$\left\{B l c_{-} R_{i j}\right\}$$ is obtained, where [TeX:] $$i, j=1, \mathrm{~K}, N$$.
b) After each block [TeX:] $$B l c_{-} R_{i j}$$ is subjected to 1-level DWT, the low-frequency sub-band is obtained, and then the obtained low-frequency coefficients are subjected to DCT. Finally, the DCT coefficients are further subjected to singular value decomposition to obtain the maximum singular values.
c) The matrix [TeX:] $$\left\{S_{-} R_{i j}\right\}$$ is constructed with [TeX:] $$s$$ taken from each block, and the mean [TeX:] $$savg$$ of the matrix is calculated.
d) The master share [TeX:] $$M_{R}$$ of the R channel is constructed using the method shown in (1).
Step 4 (Construction of master share M): The [TeX:] $$M_{R}$$, [TeX:] $$M_{G}$$, and [TeX:] $$M_{B}$$ are used as the data for the three channels R, G, and B, respectively, to generate the master share M of the image I.
Flow chart for constructing the master share (M).
(2) Ownership share construction
The construction of the ownership share (O) is divided into in the following two steps. The construction flow chart is shown in Fig. 3.
Step 1 (Preprocessing of watermark image): The Arnold scrambling encryption has periodic characteristics and is easy be broken by force. Therefore, chaotic scrambling technique sensitive to initial value is used in this paper to encrypt the watermark image. In order to obtain the encrypted watermark W′, the odd and even columns of the watermark images are encrypted by using the mapping sequence with different initial chaotic values and encryption control rates respectively, and the initial values of the chaos and the control rate are stored as part of the secret key, Key.
Step 2 (Construction of ownership share O): The three channels of [TeX:] $$O$$ are composed of [TeX:] $$O_{R}$$, [TeX:] $$O_{G}$$, and [TeX:] $$O_{B}$$. The [TeX:] $$O_{R}$$, [TeX:] $$O_{G}$$, and [TeX:] $$O_{B}$$ are generated by X-OR operations between the [TeX:] $$M_{R}$$, [TeX:] $$M_{G}$$, and [TeX:] $$M_{B}$$ and the encrypted secret watermark SW, respectively, as shown in (2).
Flow chart for constructing the ownership share (O): (a) watermark encryption (b) zero-watermark construction, (c) data of watermark encryption, and (d) data of zero-watermark construction.
2.2.2 Ownership identification phase
When a copyright dispute arises, the master share (M′) is firstly “extracted” from the disputed digital image I′ in the same way as the master share in the registration phase. Then, the registered ownership share is then taken out from the CA’s IPR database. Finally, the watermark bit is obtained by the X-OR operation of M′ and O, and the copyright watermark W′ of the legal person is decrypted by the key, Key. The process is specifically divided into the following five steps and its flow chart is shown in Fig. 4.
Step 1: According to the construction process of master share, the master shares [TeX:] $${M_{R}}^{\prime}$$, [TeX:] $${M_{G}}^{\prime}$$, and [TeX:] $${M_{B}}^{\prime}$$ of the R, G, and B channels of the disputed image I′ are constructed.
Step 2: [TeX:] $${O_{R}}^{\prime}$$, [TeX:] $${O_{G}}^{\prime}$$, and [TeX:] $${O_{B}}^{\prime}$$ are separated from the R, G, and B channels of the ownership share O that has been taken out.
Step 3: Watermarks [TeX:] $${W_{R}}^{\prime}$$, [TeX:] $${W_{G}}^{\prime}$$, and [TeX:] $${W_{B}}^{\prime}$$ are respectively “extracted” from the three channels. The specific method is shown in (3).
Step 4: The watermark bit WMB is calculated by using the Voting decision.
Flow chart for extracting copyright watermarks from disputed images: (a) zero-watermark extraction and (b) data of zero-watermark extraction.
According to the construction process, the theoretical values of [TeX:] $${W_{R}}^{\prime}$$, [TeX:] $${W_{G}}^{\prime}$$ and [TeX:] $${W_{B}}^{\prime}$$ at the same pixel position are equal, but the actual values of WR, WG and WB obtained from the image to be detected after the attack are not equal at the same pixel position. Therefore, if the i-th row and the j-th column on the watermark image are regarded as the position P, where i, j=1, …, N, the watermark value of the WMB at the P position can be determined according to the voting decision theory. The three channels are treated as three voters, and the watermark value of each channel at the P position is regarded as a vote. In other words, if the watermark value is 1, the number of vote for a channel at the P position is considered to be 1; conversely, if the watermark value is 0, the number of votes is 0. And then the total number of votes from the three channels at the P position is calculated. If the total number of votes is more than half, the watermark value of the WMB at that position is considered to be 1, otherwise, it is considered to be 0. The specific calculation method of the watermark bit WMB is as shown in (5).
Step 5: With decryption using the owner’s key, the watermark bit WMB is subjected to inverse double chaos scrambling to obtain the decrypted watermark image W′.
3. Experimental Results and Analysis
In order to verify the effectiveness of the proposed watermarking algorithm, simulation experiments are carried out in MATLAB R2017b. In the experiments, 10 color images of 512×512 size are selected from the Standard Image Database (SIDBA) as the test images, as shown in Fig. 5. A 3232 binary image is used as the watermark image, as shown in Fig. 6. In this paper, peak signal-to-noise ratio (PSNR) is used to describe the peak signal-to-noise ratio between the post-attack test image I′ and the original image I, i.e., PSNR is used to express the amplitude of the attack on the test image. The larger the PSNR value, the smaller the attack on the image to be detected. The similarity between the extracted watermark W′ and the copyright watermark W is expressed with the normalization coefficient (NC). The larger NC value is, the higher similarity between W′ and W, the more effective the proposed zero watermarking algorithm. The PSNR value of the test image I′(i, j) with a size of L×L is calculated according to (6). The NC value of the extracted watermark W′(i, j) with a size of N×N is calculated according to (8).
The test images: (a) house, (b) housewoods, (c) ivytree, (d) lgthouse, (e) london, (f) mare, (g) lostlake, (h) malight, (i) manhatan, and (j) Lena.
3.1 Robustness Comparison
Since the zero watermarking algorithm proposed in this paper targets at color images, 10 pairs of color images, which are different in color, contrast, texture, etc. (shown in Fig. 5), are selected as test images in this paper so as to better demonstrate the robustness of the proposed algorithm. In order to verify the effectiveness of the proposed algorithm, the common attack methods in the watermark algorithm are used to attack the test image to varying degrees. NC is used to evaluate the robustness of the algorithm, the larger value of NC, the more robust the proposed algorithm:
(1) Common attack. Common attacks include noise addition, compression, and filter. The image is attacked by noise addition, which includes Salt-and-Pepper noise and Gaussian noise. Both attacks are carried out 10 times. The range of the effect factor of Salt and Pepper noise is from 1% to 10%, the mean value of added Gaussian noise is 0, and the variance range is from 1% to 15%. In 10 compression attack tests, the range of image quality factor after compression is 90–10. In Gaussian filter experiment, a Gaussian filter is used to blur the image and the filter window size is set as 11 to 1010.
(2) Geometric attack. Geometric attacks include shear attack, translation, rotation, and scaling. In shear attack, 10% to 90% of the image is cut in the x-axis direction. In the Center crop attack on the image, 1/9, 2/9, 3/9, 4/9 of the image center are cut off respectively. In the translation attack, the image is shifted by 10 to 100 pixels in the width direction. In the rotation attack, the rotation angle ranges from 10° to 100°. And in terms of scaling attacks, the zoom factor ranges from 0.3 to 1.9. According to the experimental method of Thanh in [29], the rotated and scaled images are inversely transformed according to the attacking factor, namely the image is re-rotated and re-scaled.
(3) Other attack. In the brightness attack, the image brightness changes from -127 to +127. In the tampering attack, a label is placed anywhere 10 times in the image.
The robustness of the proposed algorithm is detailed as follows.
The watermark extracted from Table 1
3.1.1 Analysis of the results of “Lena”
“Lena” image is selected to display the attacked image and the extracted watermark. The PSNR of the image to be measured after attack and the non-original image under different attacks are calculated, and the NC between the extracted watermark and the copyrighted watermark is also calculated. The results are shown in Tables 1 and 2, respectively, and the comparison of NC values with different degree of attack factors is shown in Table 3.
In addition, the NC values of the watermarks extracted from the attacked “Lena” image are compared, as shown in Table 4.
To further verify the robustness of the algorithm, the bit error rate (BER) values of the watermarks extracted from the attacked “Lena” image are compared, as shown in Table 5.
Comparison of NC values with different degree of attack factors
Comparison of NC values obtained using different algorithms
Comparison of BER values with different degree of attack factors
The NC and BER values are used to evaluate the robustness of RGB-CV. It can be seen that the proposed algorithm is highly robust to conventional attacks such as noise, filtering, and JPEG compression. In addition, the RGB-CV algorithm is robust to the distortion of filter Puzzle and Pixelize in Photoshop software. The RGB-CV is more robust not only than current zero watermarking algorithms but also than traditional robust watermarking algorithms.
3.1.2 Analysis of the results of 10 images
In the robustness comparison experiment, 10 images suffered from 10 different attacks such as noise addition, compression, and rotation. When an image is attacked, the image is subjected to 10 attacks of different intensities, and the values of the action factors of different intensities are evenly distributed and changed 10 times within the attack range described in Section 3.1. Table 6 shows the comparison of the NC values obtained by the RGB-CV algorithm and other algorithms under the premise of the same PSNR value. Among them, the data of each line is the average value obtained after 10 different attacks on 10 images.
Comparison of average NC values obtained using different algorithms
In order to illustrate the stability of the RGB-CV algorithm proposed in this paper for color images with large differences in hue, texture, etc., under certain attack of certain strength, the 10 images shown in Fig. 5 are used as test images, and the variance of the NC values of the watermarks detected by the 10 images after the attack is calculated. Since the magnitude of the fluctuation of the NC value is not an order of magnitude in the case of common attacks and geometric attacks, the two-line charts shown in Figs. 7 and 8 are used to respectively represent the variance of the NC values in the conventional attack and geometric attack. The horizontal coordinates in the line chart represent the action factors of a certain attack at 10 levels, with action factors increasing from 1 to 10 and attack intensity increasing.
It can be seen from the NC average comparison in Table 6 that the watermarking algorithm proposed in the paper has good robustness to common attacks such as noise addition, JPEG compression, filtering, scaling, tampering, etc. In the JPEG compression and Gaussian filtering, the watermarking NC reached 0.999. Moreover, as can be seen from Fig. 7, when the attack strength is enhanced, the variance of the NC values for extracting watermarks from different images is mostly less than 0.003, and only fluctuates
Comparison of NC variance in common attacks.
Comparison of NC variance in geometric attacks.
slightly in scaling attacks and Gaussian noise attacks. Among them, when the scaling attack factor is 0.3, the maximum variance of the watermark NC value obtained by 10 images is only 0.004. When Gaussian noise with a mean of 0 and a variance of 0.13 is added, the maximum variance of the NC value of the watermark obtained from 10 images is only 0.007. Therefore, the zero-watermarking algorithm proposed in this paper is suitable for color images with common hue and texture, and is very robust to conventional attacks.
According to Table 6, we can conclude that the algorithm is less robust to shear and translation in geometric attacks. The main reason is that the watermark bit is constructed in blocks when the master share is constructed. From the line chart shown in Fig. 8, we can see that the influence of the image difference on the extraction of the watermark gradually increases as the attack intensity increases, and the shear and translation also have a large fluctuation in the NC value, namely the stability of the algorithm is weakened. However, in the labeling attack, the attack that tampers with the image content is not affected by the image difference, and the NC value does not fluctuate greatly, but basically remains around 0.96.
Although the robustness to shear and translation is relatively weak due to the influence of the block structure master share method, the proposed algorithm is superior to Rani and Raman [25] and Thanh and Tanaka [26] in noise addition, filtering JPEG compression, scaling, tampering, Puzzle and Pixelize.
3.2 Complexity Analysis Comparison
The complexity of the proposed algorithm is also compared from the perspectives of copyright watermark size, algorithm scope and security, as shown in Table 7. We can conclude from the comparison results that the zero-watermark algorithm proposed in this paper is applied to color images, which requires a small third-party database to preserve the copyright watermark. And when the complexity is equal to other algorithms, it has higher security.
4. Conclusion
In this paper, a zero-watermarking algorithm in transform domain based on RGB-CV is proposed. RGB-CV extracts the transform domain features that can resist various kinds of attacks, and DWT, DCT and SVD are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conductive to improving the robustness of proposed algorithm. In the identification phase, voting decision is used to obtain the watermark bit of the three channels so as to accurately obtain copyright watermark. Experimental results show that the proposed watermarking algorithm is very robust to common attacks such as compression, noise addition, and filtering when used in common color images. The NC of the extracted watermark is more than 0.99. However, its robustness to shear attack and translation attack needs to be improved. In the future research, we hope that the global features of the image can be used for constructing master share to improve the robustness of the algorithm to geometric attacks.
Acknowledgement
This work was supported by the National Natural Science Foundation of China (No. 51274232, 61305008); the Natural Science Foundation of Shandong Province of China (No. ZR2018MEE004); and the Fundamental Research Funds for the Central Universities (No. 19CX02030A).