Cargando…
Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains
This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of t...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8402257/ https://www.ncbi.nlm.nih.gov/pubmed/34450982 http://dx.doi.org/10.3390/s21165540 |
_version_ | 1783745744934535168 |
---|---|
author | Hasan, Nayeem Islam, Md Saiful Chen, Wenyu Kabir, Muhammad Ashad Al-Ahmadi, Saad |
author_facet | Hasan, Nayeem Islam, Md Saiful Chen, Wenyu Kabir, Muhammad Ashad Al-Ahmadi, Saad |
author_sort | Hasan, Nayeem |
collection | PubMed |
description | This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks. |
format | Online Article Text |
id | pubmed-8402257 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-84022572021-08-29 Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains Hasan, Nayeem Islam, Md Saiful Chen, Wenyu Kabir, Muhammad Ashad Al-Ahmadi, Saad Sensors (Basel) Article This paper proposes an encryption-based image watermarking scheme using a combination of second-level discrete wavelet transform (2DWT) and discrete cosine transform (DCT) with an auto extraction feature. The 2DWT has been selected based on the analysis of the trade-off between imperceptibility of the watermark and embedding capacity at various levels of decomposition. DCT operation is applied to the selected area to gather the image coefficients into a single vector using a zig-zig operation. We have utilized the same random bit sequence as the watermark and seed for the embedding zone coefficient. The quality of the reconstructed image was measured according to bit correction rate, peak signal-to-noise ratio (PSNR), and similarity index. Experimental results demonstrated that the proposed scheme is highly robust under different types of image-processing attacks. Several image attacks, e.g., JPEG compression, filtering, noise addition, cropping, sharpening, and bit-plane removal, were examined on watermarked images, and the results of our proposed method outstripped existing methods, especially in terms of the bit correction ratio (100%), which is a measure of bit restoration. The results were also highly satisfactory in terms of the quality of the reconstructed image, which demonstrated high imperceptibility in terms of peak signal-to-noise ratio (PSNR ≥ 40 dB) and structural similarity (SSIM ≥ 0.9) under different image attacks. MDPI 2021-08-17 /pmc/articles/PMC8402257/ /pubmed/34450982 http://dx.doi.org/10.3390/s21165540 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Hasan, Nayeem Islam, Md Saiful Chen, Wenyu Kabir, Muhammad Ashad Al-Ahmadi, Saad Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains |
title | Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains |
title_full | Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains |
title_fullStr | Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains |
title_full_unstemmed | Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains |
title_short | Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains |
title_sort | encryption based image watermarking algorithm in 2dwt-dct domains |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8402257/ https://www.ncbi.nlm.nih.gov/pubmed/34450982 http://dx.doi.org/10.3390/s21165540 |
work_keys_str_mv | AT hasannayeem encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains AT islammdsaiful encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains AT chenwenyu encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains AT kabirmuhammadashad encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains AT alahmadisaad encryptionbasedimagewatermarkingalgorithmin2dwtdctdomains |