Abstract
This paper introduces a robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain. First, host image is transformed using lifting wavelet transform, Hessenberg decomposition and redundant singular value decomposition. Then, we use appropriate scaling factor to invisibly embed the singular value of watermark data into the lower frequency sub-band of the host image. We also use suitable encryption-then-compression scheme to improve the security of the image. Additionally, de-noising convolutional neural network is performed at extracted mark data to enhance the robustness of the scheme. Experimental results verify the effectiveness of our scheme, including embedding capacity, robustness, invisibility, and security. Further, it is established that our scheme has a better ability to recover concealed mark than conventional ones at low cost.
Similar content being viewed by others
Introduction
Nowadays, the growth of internet makes easier to disseminate multimedia information through various open channels [1]. Due to availability of internet, multimedia data can be easily tampered, stored, and shared through communication medium [2]. So, it leads to various problems such as copyright, unauthorized access, and security issues [3]. Watermarking is one of the highly recommended schemes to provide the protection of multimedia data [4, 5]. The effectiveness of watermarking scheme can be evaluated using some important performance metric such as robustness, capacity and imperceptibility. Based upon on these performance metrics, watermarking approach can be divided into two parts such as robust and fragile [6]. In fragile-based watermarking scheme, it can be easily modified and it is used for content authentication and integrity verification [7]. On the other side, robust watermarking techniques are more robust against various attacks and it is normally used for copyright protection [8]. In general, watermarking scheme is classified based upon embedding domain of cover image [9]. We can categorize watermarking scheme into two parts such as spatial and transform domain. In spatial domain, watermark is embedded into cover by modifying the intensity of pixel image [10]. However, it is less resistant against various attacks. On the other side, mark is hided into transformed coefficient of cover image, which may greatly improve the robustness against attacks [11].
In this paper, LWT–HD–RSVD-based image data hiding scheme is proposed. Note that although various traditional image data hiding approaches have been reported, the interesting contributions of the proposed methods include the following four aspects:
-
We propose an image data hiding scheme based on LWT–HD–RSVD, which can provide both invisibility and robustness. LWT provides various advantages such as less distortion, low aliasing effect, very less memory requirement, low computation cost and reconstruction is very good [12]. The more precise components of the host image are obtained by HD [13]. This property of HD is used to provide high degree of robustness. It is reported that RSVD offered lower cost than SVD [14].
-
The chaotic encryption [15]-then-wavelet-based compression scheme [16] is adopted to improve the security of the media data over possibly noisy network(s), while appropriate compression of encrypted data before transmission reduces the bandwidth demand.
-
DnCNN is performed at extracted mark data to offer the additional robustness of the scheme.
-
The obtained results indicate that the method is satisfactorily invisibility, high payload and confirms its robustness against various attacks. Further, it is established that our scheme has a better ability to recover concealed mark than conventional ones at low cost.
Rest of the paper is organized as follows: “Related works” summarizes the related state-of-the-art techniques, followed by detailed description of the embedding, compression of encrypted data, and extraction procedure and de-noising of recovered data in “The proposed scheme”. The results are discussed in “Experimental results” and the conclusions are summarized in “Conclusions”.
Related works
Qingtang Su et al. [17] developed a copyright protection scheme for color images. Initially, Contourlet transform (CT) performed on each component of cover image and selected LL sub-band is decomposed into desired block. In their scheme, encrypted mark is produced then embedded in the transformed block to increase the security of the scheme. Their method was shown to be successful against against common attacks.
Chakraborty et al. [18] illustrated the comparative analysis of SVD- and RSVD-based watermarking approach in transform domain. First, this scheme decomposed carrier image into multiple sub-bands via DWT, and the selected sub-band is transformed using DCT. Further, RSVD is performed to modify the singular values of carrier image. The experimental analysis of this method proves that RSVD is much faster than general SVD-based watermarking approach.
Singh et al. [19] presented a DWT–DCT–SVD-based robust watermarking approach in transform domain. Initially, DWT is applied to decompose the host image into sub-bands. Further, DCT and SVD have been applied on selected sub-band. The watermark image is decomposed with the help of DCT and SVD. Watermark is inserted into transformed coefficient of host image. This scheme provides a better robustness against several attacks. Anand et al. [20] proposed a dual watermarking approach for smart healthcare system in compression-then-encryption (CTE) domain. First, cover image is transformed using redundant DWT and RSVD. In CTE scheme, it compresses the multimedia data before applying encryption technique to ensure security of multimedia data. Turbo code is applied to encode text watermark before the embedding process. In this procedure, compression and encryption of multimedia data are performed by wavelet-based compression and a stereo image encryption technique, which greatly improved the performance in several aspects. The author proposed a hybrid watermarking approach for digital images [21]. Initially, host image is decomposed into sub-bands using DWT. Further, selected sub-band of host image is transformed by DCT and SVD. The text watermark is encrypted before embedding process to enhance the security of this scheme. In embedding procedure, image and text watermark are embedded into different level of DWT coefficient of host image. Their method was shown to be successful against against common attacks. Authors have demonstrated a robust and secure watermarking approach for healthcare applications by Zear et al. [22]. First, Arnold scheme is adopted to scramble the mark image. Further, Hamming and Arithmetic encoding techniques are applied on signature and symptoms text watermark, respectively. In embedding process, encrypted image, compressed text and encoded text are embedded into different level of DWT coefficient of host image. Additionally, neural network is adopted to enhance robustness of the scheme. In [23], a dual watermarking scheme is used to enhance the security of digital contents. In embedding stage, it uses the second-level of DWT to decompose host image into different sub-bands. Further, selected sub-band is transformed using SVD. The encoded dual watermark is hidden into transformed coefficients of host image. The watermarked image is compressed via wavelet-based compression to reduce bandwidth demand.
A dual watermarking approach is developed for providing the security of medical application using DWT and SVD in [24]. Prior to embedding, Hamming code is adopted to encode the text mark, which may greatly reduce the channel distortion. The dual text and image watermark are embedded into transformed coefficients of host image. After embedding procedure, watermarked image is scrambled using chaotic encryption and then encrypted image is compressed via Huffman. This scheme provides the better results in terms of robustness, security, and imperceptibility. Author proposed an effective watermark approach for gray-scale image [25]. In this scheme, host image is transformed first into sub-bands using LWT and selected sub-band is transformed via SVD. The watermark image is also decomposed using fourth-level of LWT. In embedding process, watermark is inserted into transformed coefficient of LWT. After embedding procedure, digital signature is verified ownership authentication before watermark extraction procedure. This scheme provides better performance compared with some traditional watermarking scheme. Zheng et.al has implemented a robust watermarking method for copyright protection in transform domain [26]. Initially, cover image is transformed using DWT and DCT. Further SVD is performed to modify the singular value of transformed coefficient. The digital signature is applied in the embedding procedure to avoid false-positive problem. This scheme provides the better robustness against rotation attacks. In Ref. [27], author developed an efficient medical image watermarking in transform domain. Initially, DWT–SVD transformed host image and watermark is concealed into transformed coefficient of cover image. The chaotic encryption is performed on watermark to enhance the security of this scheme. A blind watermarking scheme is implemented to provide copyright protection of medical image [28]. In the first part of this scheme, DCT and Schur transform is performed to decompose host image and watermark is embedded into medium part of host image. In second part, DWT and Schur transformed used for embedding watermark into host image. So, this scheme provides better robustness and imperceptibility against various attacks.
The proposed scheme
The design proposed in this paper consists of four phases, i.e. (a) mark data embedding, (b) encryption and compression of marked data, (c) recovery of hidden data, and (d) de-noising of recovered mark. The main idea of the different sizes of mark embedding is to use LWT to decompose cover image through LWT–HD–RSVD. Then we use appropriate scaling factor to invisibly embed the singular value of mark data into the lower frequency (LL) sub-band of the cover. We also use chaotic encryption-then-SPIHT compression scheme to improve the security of the image over possibly noisy network(s), while the compression of encrypted data before transmission reduces the bandwidth demand. Additionally, DnCNN is performed at extracted mark data to enhance the robustness of the scheme. A simplified block scheme of different operations by the proposed solution is shown in Fig. 1. The detail description of mark data embedding, encryption and compression of marked data, recovery of hidden data, and the de-noising process of recovered mark is shown in the section “Embedding procedure”, “Encryption and compression of marked data”, “Extraction procedure”, and “De-noising process of recovered data”, respectively. The notations are summarized in Table 1.
Embedding procedure
In this process, cover image \( \left( C \right)\) and watermark image \(\left( W \right) \) are given as input to the embedding procedure. After embedding procedure, watermarked image \(C^{\prime}\) is obtained as output. Algorithm 1 describes the embedding process in detail.
Encryption and compression of marked data
In this sub-section, watermarked image (\(C^{\prime}\)) is encrypted using chaotic encryption to enhance the security of watermarking scheme. The encrypted image \(({\text{Enc}}_{{{\text{img}}}} )\) is obtained by applying the XOR operation on chaotic key matrix and watermarked image (\(C^{\prime}\)). Further, SPIHT compression is applied on encrypted image to reduce bandwidth and also save memory space. The SPIHT procedure contains three steps such as sorting, refinement and quantization for compress the image. Finally, compressed image (\({\text{Comp}}_{{{\text{img}}}}\)) is obtained as output. The detail steps of encryption and compression of marked data are explained in Algorithm 2.
Extraction procedure
Reverse embedding procedure is followed for extracting the watermark. Initially, \({\text{Comp}}_{{{\text{img}}}} \) is decompressed with the help of SPIHT decoding. After that, decrypted image \({\text{Dec}}_{{{\text{img}}}}\) is obtained by applying Chaotic Decryption on \( {\text{Decom}}_{{{\text{img}}}}\). In this process, decrypted image \({\text{Dec}}_{{{\text{img}}}}\) is given as input of extraction procedure and extracted watermark \({\text{Ext}}_{{{\text{wat}}}}\) is obtained as output. The extraction procedure of watermark is described in Fig. 1. The various steps of extraction process are described in Algorithm 3.
De-noising process of recovered data
In the proposed approach, \({\text{DnCNN}}\) is implemented at extraction procedure to enhance the robustness and enhance visual quality of extracted watermark. Deep Learning toolbox is used to apply pre-trained denoising convolutional neural network. The several steps of De-noising process of recovered data are described in Algorithm 4.
Experimental results
All experiments done with the proposed scheme are simulated on a PC of 8 GB RAM using MATLAB R2019a. All used gray-scale host images with the size of 512 × 512 [29] are shown in Fig. 2. The mark images of varying size such as \(256 \times 256,\; 128 \times 128\;{\text{and}}\; 64 \times 64\) are shown in Fig. 3 [27]. We estimate the performance in terms of objective assessment is adopted in this paper, which is defined in Table 2.
The objective evaluation (PSNR, SSIM and NC) scores are depicted in Fig. 4. It can be seen from this figure, all the evaluation metric have high results. The validity of the proposed approach is verified for different cover images and variable size of watermark. The results obtained are summarized in Table 3.
According to Table 3, it provides performance for ten cover images and different size of watermark at gain value = 0.05. The highest PSNR value is obtained as 50.14 dB for Sailboat image at gain value = 0.05. The values of NC and SSIM are approaching 1 for all the cases. Further, best values of NPCR and UACI obtained are 0.9964 and 0.3916, respectively. Notably, values of SSIM, NC, NPCR, and UACI of our implemented scheme are higher than 0.9952, 0.9954, 0.9957 and 0.2686, respectively. It is observed that if decrease size of watermark, then our imperceptibility performance is increased and robustness value is decreased, respectively. The quality of extracted watermark is evaluated, when different types of attack are performed on watermarked images.
The implemented scheme is simulated on different gain value. The experimental result is depicted in Table 4. In this table, we found the highest PSNR and SSIM value are 50.93 dB and 0.9999, respectively at gain value 0.008. However, the NC value of extracted watermark is 1 when gain value is more than 0.05. It is observed that if we increase the gain value, then PSNR and SSIM values are decreased; however, robustness improves.
According to Fig. 5, it can be observe that our proposed scheme is examined against various attacks with different size of watermark. The robustness is tested against JPEG compression with various quality factors. The quality factor is indicated as compression strength. If the quality factor is increased, then NC value is also increased. The NC values of speckle noise are greater than 0.9362 for three different sizes of watermark.
In median and average filter, NC values are greater than 0.9859 and 0.9725, respectively. In salt and peppers noise, NC values are more than 0.9274 for three different sizes of watermark. The robustness performance of our scheme against Gaussian noise is greater than 0.9089 for three different sizes of watermark. The NC values of sharpening and Poisson noise are more than 0.9980 and 0.9717, respectively. Our proposed watermarking technique is robust against all the attacks except Histogram Equalization attacks. Therefore, from the above analysis, it can be identified that implemented scheme achieves optimal trade-off among robustness and imperceptibility.
The robustness performance of our implemented scheme, when compared with some mentioned techniques [19, 20, 24, 27] against attacks are illustrated in Table 5. It is remarked that the implemented scheme provides the better robustness when compared with mentioned techniques for all the considered attacks except Histogram Equalization attack. The maximum percentage of improvement of our scheme, when compared some mentioned techniques [19, 20, 24, 27] is 27.48. Further, graphical representation of our proposed scheme is compared with previous scheme in Figs. 6, 7, 8 and 9. It is clearly indicated from figure that performance of our scheme is found to better in term of all the attacks under consideration.
Lastly, subjective evaluation [24] is also adopted to evaluate the image quality, which is defined in Table 6. It indicates that the smaller gain has proven to be more suitable quality of marked image.
Conclusions
This paper described a robust and secure data hiding algorithm that utilizes LWT–HD–RSVD for embedding of mark data. A main interesting point of the proposed solution is the mentioned chaotic encryption-then-wavelet based compression scheme which enhances the security of the media data over possibly noisy network(s), while appropriate compression of encrypted data before transmission reduces the bandwidth demand. Further, DnCNN is performed at extracted mark data to offer the additional robustness of the scheme. Obtained results verified the effectiveness of our scheme. Furthermore, our scheme is more efficient at low cost when compared with similar existing methods.
References
Singh A, Kumar B, Singh G, Mohan A (2017) Digital image watermarking: concepts and applications, medical image watermarking. Springer, pp 1–12 (ISBN: 978-3319576985)
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608
Singh O, Singh A, Srivastava G, Kumar N (2020) Image watermarking using soft computing techniques: a comprehensive survey. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09606-x
Singh A (2020) Data hiding: current trends, innovation and potential challenges. ACM Trans Multimed Comput Commun Appl 16:1–16
Singh A (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881–8900
Kumar S, Singh B, Yadav M (2020) A recent survey on multimedia and database watermarking. Multimed Tools Appl 79:20149–20197
Park J, Jeong S, Kim C (2001) Robust and fragile watermarking techniques for documents using bi-directional diagonal profiles. Information and communications security, pp 483–494
Zhou X, Zhang H, Wang C (2018) A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3):1–14
Mohanty S, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consum Electron Mag 6(3):83–91
Yuan Z, Su Q, Liu D, Zhang X (2020) A blind image watermarking scheme combining spatial domain and frequency domain. Vis Comput. https://doi.org/10.1007/s00371-020-01945-y
Araghi T, Manaf A, Araghi S (2018) A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst Appl 112:208–228
Naaz S, Sana E, Ansari I (2019) Comparative analysis of digital image watermarking based on lifting wavelet transform and singular value decomposition. Adv Intell Syst Comput 1064:65–81
Liu J et al (2019) An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7:80849–80860
Zhang J, Erway J, Hu X, Zhang Q, Plemmons R (2012) Randomized SVD methods in hyperspectral imaging. J Electr Comput Eng 2012:1–15
Al-Maadeed S, Al-Ali A, Abdalla T (2012) A new chaos-based image-encryption and compression algorithm. J Electr Comput Eng 2012:1–11
Chuman T, Sirichotedumrong W, Kiya H (2019) Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans Inf Forensics Secur 14(6):1515–1525
Su Q, Wang G, Lv G, Zhang X, Deng G, Chen B (2016) A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition. Multimed Tools Appl 76(6):8781–8801
Chakraborty S, Chatterjee S, Dey N, Ashour A, Hassanien A (2016) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. Intelligent techniques in signal processing for multimedia security, pp 133–149
Singh A, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381–8401
Anand A, Singh A, Lv Z, Bhatnagar G (2020) Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE Multimed 27(4):133–143
Singh A, Kumar B, Dave M, Mohan A (2014) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433
Zear A, Singh A, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882
Kumar C, Singh A, Kumar P (2019) Dual watermarking: an approach for securing digital documents. Multimed Tools Appl 79(11–12):7339–7354
Anand A, Singh A (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72–80
Zhang L, Wei D (2020) Robust and reliable image copyright protection scheme using down sampling and block transform in integer wavelet domain. Digit Signal Process 106:102805
Zheng P, Zhang Y (2020) A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks. Multimed Tools Appl 79(25–26):18343–18365
Thakur S, Singh AK, Kumar B, Ghrera SP (2020) Improved DWT-SVD-based medical image watermarking through hamming code and chaotic encryption. Commun Signal Process Lect Notes Electr Eng 587:897–905
Fares K, Khaldi A, Redouane K, Salah E (2021) DCT and DWT based watermarking scheme for medical information security. Biomed Signal Process Control 66:102403
http://sipi.usc.edu/database/database.php?volume=misc. Accessed 25 Nov 2020
Thakur S, Singh A, Ghrera S, Dave M (2018) Watermarking techniques and its applications in Tele-health: a technical survey. Cryptographic and information security, pp 467–508
Khanzadi H, Eshghi M, Borujeni S (2013) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39(2):1039–1047
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Singh, O.P., Singh, A.K. Data hiding in encryption–compression domain. Complex Intell. Syst. 9, 2759–2772 (2023). https://doi.org/10.1007/s40747-021-00309-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40747-021-00309-w