Cargando…

Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains

This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of t...

Descripción completa

Detalles Bibliográficos
Autores principales: Hasan, Nayeem, Islam, Md Saiful, Chen, Wenyu, Kabir, Muhammad Ashad, Al-Ahmadi, Saad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8402257/
https://www.ncbi.nlm.nih.gov/pubmed/34450982
http://dx.doi.org/10.3390/s21165540
_version_ 1783745744934535168
author Hasan, Nayeem
Islam, Md Saiful
Chen, Wenyu
Kabir, Muhammad Ashad
Al-Ahmadi, Saad
author_facet Hasan, Nayeem
Islam, Md Saiful
Chen, Wenyu
Kabir, Muhammad Ashad
Al-Ahmadi, Saad
author_sort Hasan, Nayeem
collection PubMed
description This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks.
format Online
Article
Text
id pubmed-8402257
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-84022572021-08-29 Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains Hasan, Nayeem Islam, Md Saiful Chen, Wenyu Kabir, Muhammad Ashad Al-Ahmadi, Saad Sensors (Basel) Article This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks. MDPI 2021-08-17 /pmc/articles/PMC8402257/ /pubmed/34450982 http://dx.doi.org/10.3390/s21165540 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Hasan, Nayeem
Islam, Md Saiful
Chen, Wenyu
Kabir, Muhammad Ashad
Al-Ahmadi, Saad
Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains
title Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains
title_full Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains
title_fullStr Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains
title_full_unstemmed Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains
title_short Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains
title_sort encryption based image watermarking algorithm in 2dwt-dct domains
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8402257/
https://www.ncbi.nlm.nih.gov/pubmed/34450982
http://dx.doi.org/10.3390/s21165540
work_keys_str_mv AT hasannayeem encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains
AT islammdsaiful encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains
AT chenwenyu encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains
AT kabirmuhammadashad encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains
AT alahmadisaad encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains