Next Article in Journal
Research on a Trustworthiness Measurement Method of Cloud Service Construction Processes Based on Information Entropy
Next Article in Special Issue
Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain
Previous Article in Journal
Second Law Analysis of Spectral Radiative Transfer and Calculation in One-Dimensional Furnace Cases
Previous Article in Special Issue
Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Adaptive and Secure Holographic Image Watermarking Scheme

1
School of Physics and Electronic Engineering, Hanshan Normal University, Chaozhou 521041, China
2
School of Electronics and Information Engineering, Sichuan University, Chengdu 610065, China
3
Network and Educational Technology Center, Hanshan Normal University, Chaozhou 521041, China
4
College of Mathematics and Statistics, Hanshan Normal University, Chaozhou 521041, China
*
Author to whom correspondence should be addressed.
Submission received: 22 March 2019 / Revised: 27 April 2019 / Accepted: 28 April 2019 / Published: 2 May 2019
(This article belongs to the Special Issue Entropy Based Data Hiding)

Abstract

:
A novel adaptive secure holographic image watermarking method in the sharp frequency localized contourlet transform (SFLCT) domain is presented. Based upon the sine logistic modulation map and the logistic map, we develop an encrypted binary computer-generated hologram technique to fabricate a hologram of a watermark first. Owing to the enormous key space of the encrypted hologram, the security of the image watermarking system is increased. Then the hologram watermark is embedded into the SFLCT coefficients with Schur decomposition. To obtain better imperceptibility and robustness, the entropy and the edge entropy are utilized to select the suitable watermark embedding positions adaptively. Compared with other watermarking schemes, the suggested method provides a better performance with respect to both imperceptibility and robustness. Experiments show that our watermarking scheme for images is not only is secure and invisible, but also has a stronger robustness against different kinds of attack.

1. Introduction

Owing to the rapid growth of internet and multimedia technologies, the acquisition, transmission and exchange of digital multimedia data including images, audio and videos has become a simple task. On the other hand, digital images can be manipulated or reproduced easily by the use of powerful image processing tools. How to effectively protect the copyright of the digital products has become a significant topic. A great many techniques have been proposed for protecting the digital rights of image content recently. Among these methods, digital watermarking is viewed as the most promising solution for digital copyright protection. Digital watermarking is a process that hides a piece of secret information (watermark) in the original digital multimedia data for the purpose of copyright protection and its verification [1]. For the requirements of actual application, a watermarking system has some an essential characteristic, more specifically for its imperceptibility, robustness, security, and so on [2].
In recent years, a large number of image watermarking methods have been reported [2,3,4,5,6], which can be categorized into two groups: transform-domain and spatial-domain. In spatial domain schemes, the watermark is embedded directly into the original image by manipulating the pixel intensity values [3]. In contrast, the transform domain method inserts the watermark by changing the frequency coefficients of the original image in a transform domain. There are numerous transform domain watermarking techniques such as discrete wavelet transform (DWT) [4], discrete cosine transform (DCT) [2], fractional Fourier transform [5], gyrator transform [6] and singular value decomposition (SVD) [2], etc. As a powerful matrix decomposition technique, SVD has been widely applied in image watermarking [2]. To improve robustness, some hybrid SVD-based watermarking methods have been designed [2,4,7,8]. In comparison to spatial domain methods, these techniques are more robust against different image attacks.
In general, robustness and imperceptibility, which are the most two important properties, are adopted to evaluate the performance of a watermarking system [9]. But these two characteristics oppose each other [9]. To achieve a tradeoff between transparency and robustness, adaptive watermarking algorithms [7,9] have been studied extensively recently. In recent years, entropy has been used to select adaptively the embedding positions which determine the performance of the watermarking scheme [2,4,10]. In [10], an image watermarking approach is proposed to insert the watermark into the DWT sub-band with the highest entropy. The major drawback of this method is that the quality of the watermarked image is seriously degraded. Since the above method is non-blind, the original image is needed in the watermark extraction process. Based on SVD and DCT, Lai designed a watermarking method where the watermark is superimposed on the blocks selected by entropy and edge entropy [2]. But this method cannot resist filtering, JPEG compression, blurring and rescaling attacks. To achieve a level of higher imperceptibility and robustness, Makbol et al. developed a block-based watermarking scheme based on SVD and DWT [4]. However, it is weak with respect to filtering, JPEG compression and blurring attacks too.
Because of the encryption characteristic and the strong anti-interference property of a hologram, a new technique wherein digital holograms are employed as watermarks has been explored to increase the watermarking system’s performance [11,12,13] in recent years. In [11], based on the improved fuzzy c-means clustering and the iterative algorithm for embedding processes, an adaptive watermarking scheme that inserts the mark hologram into the DWT-transformed original image is proposed. The drawback of this method is high computation cost. Reference [12] reported that a hologram watermark was performed in the DWT domain by using an encrypted kinoform as watermark. The encrypted kinoform was generated by a non-cascade phase retrieval algorithm. The main shortcomings of this method are that the quality of the reconstruction of the mark kinoform is decreased and the phase retrieval algorithm has a high complexity. In previous work [13], the phase-shifting interferometry-based CGH was inserted into the contourlet-transformed host image, and the embedding parameter is optimized by the use of particle swarm optimization. However, the computational complexity of this optimal scheme is high. In the above-mentioned methods, the watermarks are gray-level holograms. Due the advantage of being stored, transferred and replicated [14], the binary hologram is superimposed on the low-frequency wavelet coefficients of the original image using quantization index modulation [15]. But the parameter of this watermarking method is determined experimentally. Additionally, the watermarking method with an adaptive texturized algorithm is also developed to protect digital hologram recently [16].
Though DWT has been applied widely in watermarking and image processing [8] due to its good properties such as multiscale and time frequency localization, it cannot capture the directional information of images effectively. This weakness is overcome by contourlet transform (CT) [17]. However, the efficiency of contourlets in representing smooth contours of an image is decreased because of some waste components [7,8]. This drawback is settled by use of sharp frequency localized contourlet transform (SFLCT) [18]. In addition, SVD alone is not preferred owing to the large computation cost [4]. Compared with SVD, Schur decomposition has the advantage of lower computational complexity because it is a major intermediate step in SVD [19,20]. Therefore, in this study, the advantages of SFLCT and Schur decomposition are considered to enhance the performance of image watermarking. Moreover, to gain both imperceptibility and robustness in terms of the watermarking requirements, the entropy and edge entropy are utilized to choose the suitable positions to embed the watermark. Furthermore, the security risks of the traditional holographic watermarking methods are increased because of the small key space of hologram watermark. Hence, to enhance the security of watermarking system, the chaotic maps that are extreme sensitive to initial conditions are adopted to develop a new encrypted computer-generated hologram algorithm in this work. The hologram fabricated by this algorithm has a huge key space.
In this paper, a secure adaptive holographic watermarking scheme is presented. To enhance the security of the watermarking system, a novel encrypted binary CGH method based on sine logistic modulation map (SLMM) and logistic map is designed to fabricate a hologram watermark. The mark CGH is superposed on the original image which is transformed by SFLCT and Schur decomposition. The entropy and the edge entropy are employed to choose the positions which are suitable for embedding to achieve a high imperceptibility without losing the robustness in the embedding procedure. The watermark can be extracted without the host image during the watermark extraction process. Compared with other published schemes, the proposed method offers better performance better performance in both imperceptibility and robustness. Experiments exhibit that the proposed watermarking method, in addition to high security and transparency, has good robustness against different kinds of attack.

2. Related Background

2.1. Entropy and the Edge Entropy

To acquire the satisfactory level imperceptibility and robustness, different techniques are utilized to find optimal watermarking parameters [9]. Entropy has also been used extensively to support data-hiding algorithms. For an image, disturbances are much less visible in highly textured regions than in uniform areas, and the entropy can be used to describing the texture of it. The edge is regarded as another important image characteristic. But the edge points are not the suitable site for watermark embedding. Therefore, the edge entropy is an important factor that determines an image block to be selected for embedding whether or not. The entropy and the edge entropy were utilized to determine the embedding positions in the cover data so as to cause minimal perceptual distortion.
The entropy of an n-state system can be represented as follows [21]:
E T P = i = 1 n p i log p i .
where pi indicates the probability of occurrence of the event "i" with 0 ≤ pi ≤ 1 and i = 1 n p i = 1 .
The edge entropy can be described as follows [21].
E T P E = i = 1 n p i exp ( μ i ) = i = 1 n p i exp ( 1 p i ) .
where μi = 1− pi is the ignorance or uncertainty of the pixel value.

2.2. Chaos Functions

In this work, two chaos functions including the Sine Logistic modulation map (SLMM) and logistic map have been chosen to heighten the security of the CGH. 2D-SLMM is defined as [22]
{ X ( n + 1 ) = α ( sin ( π Y ( n ) ) + β ) X ( n ) ( 1 X ( n ) ) Y ( n + 1 ) = α ( sin ( π X ( n + 1 ) ) + β ) Y ( n ) ( 1 Y ( n ) ) ,
where 0 ≤ α ≤ 1 and 0 ≤ β ≤ 3 are control parameters. When parameter β is close to 3, SLMM works in a chaotic state [22].
The logistic map is a 1D chaos function and defined as [23]
x ( n + 1 ) = γ x ( n ) ( 1 x ( n ) ) ,
where γ is the logistic map parameter, and γ ∈ [0,4], xn ∈ (0,1). When 3.5699456 < γ ≤ 4, logistic map exhibits chaotic performance [23].

2.3. Schur Decomposition

Suppose the size of an image matrix A is N × N, the Schur decomposition of A is defined as [19]
A = U S U T ,
where S is the block upper triangular matrix and U is a unitary matrix. UT denotes the conjugate transpose of U.

3. Encrypted Binary Computer-Generated Hologram Based on Chaos

In this section, the chaotic maps are used to enhance the security level of a CGH. First, based on SLMM and logistic map, a scrambling algorithm is designed. Then the encrypted CGH method is developed by using Burch’s coding method and this proposed scrambling algorithm.

3.1. The Image Permutation Method Using SLMM and Logistic Map

Assuming that the size of the input image I(x,y) is M × N, the scrambling method is described as the following steps:
(1)
Initialize SX(1), SY(1) and SZ which are between 0 and 1 randomly and choose an arbitrary natural number T first. Then with SX(1) and SY(1), iteratively generate two chaotic sequences SX(i) and SY(i) using Equation (3). The lengths of SX(i) and SY(i) both are MN + T. Here, i = 1, 2, …, MN + T.
(2)
Generate two random integers t1 and t2 between 1 and MN + T. Then calculate the initial value XL(1) of logistic map according to the following Equation (6)
X L ( 1 ) = { | [ S X ( t 1 ) + S Y ( t 2 ) ] / 2 | S Z } / 10 ,
where SX(t1) and SY(t2) are the t1th element in SX and the t2th element in SY, respectively.
(3)
Using XL(1) and Equation (4), generate the chaotic sequences XL(i) whose length is MN + T iteratively. Here, i = 1, 2, …, MN + T.
(4)
Generate a random integer t3 between 1 and T. Truncate NM elements of XL(i) from the t3th element to obtain a chaotic sequence SE = {XL(i), i = t3, t3 + 1,…, t3 + MN − 1}.
(5)
Subsequently, a new sequence SP and its corresponding permutation indices ISP can be obtained by sorting the sequences SE in ascending order. There are MN elements in ISP. The relations between SE and SP is SP=SE(ISP). For example, the mth element in SP corresponds to the ISP(m)th element in SE.
(6)
Map I(x,y) into a 1D array IZ by use of the zigzag algorithm [24]. The length of I1 is MN.
(7)
Then the permutation indices ISP is utilized to permute IZ and the scrambled vector IV can be achieved as follows
I V = I Z ( I S P ) .
(8)
Finally, the permuted image SEI can be achieved by applying the inverse zigzag scan process [24] to IV.
The inverse image permutation process is similar to the image permutation process. In inverse scrambling process, as described in steps (1)–(5), the permutation indices ISP is achieved first using the same initial values and control parameters of the chaotic functions. Then the permuted image SEI is mapped into a 1D vector SEI1 by employing the zigzag algorithm. Subsequently, permute SEI1 back to their original position according to the following equation
D S I ( I S P ) = S E I 1 .
Finally, apply the inverse zigzag algorithm to DSI to retrieve the decrypted image DI. The parameters SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3 are employed as private (secret) keys.

3.2. Encrypted Binary CGH

The encrypted CGH is generated as follows:
(1) In order to decrease the dynamic range of the hologram, a random phase ψ(x0,y0) which is uniformly in the interval [0,1] is multiplied to the image f(x0,y0) first.
f 1 ( x 0 , y 0 ) = f ( x 0 , y 0 ) exp [ j 2 π ψ ( x 0 , y 0 ) ] ,
(2) Apply the Fourier transform to f1(x0,y0) to get the object wave OW(x,y).
O W ( x , y ) = F T [ f 1 ( x 0 , y 0 ) ] = A ( x , y ) exp [ j φ ( x , y ) ] ,
where FT() is the Fourier transform operator. The amplitude and phase of OW(x,y) are A(x,y) and φ (x,y), respectively.
(3) Assume that the parallel reference wave is mathematically represented by function RW(x,y) = Arexp[jρφr(x,y)]. Here, ρ is the carrier frequency. The amplitude and phase of RW(x,y) are Ar(x,y) and φr(x,y), respectively. Sequentially, permute OW(x,y) and RW(x,y) to obtain the scrambled Os(x,y) and Rs(x,y) by use of the proposed chaos-based permutation method shown in Section 3.1 with the parameters SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3.
(4) The shuffled hologram transmittance h(x,y) can be achieved according to the following formula.
h ( x , y ) = | O s ( x , y ) + R s ( x , y ) | 2     = | A s ( x , y ) | 2 + A s r 2 + 2 A s r A ( x , y ) s cos [ 2 π ρ φ s r ( x , y ) φ s ( x , y ) ]     = C + 2 A s r A s ( x , y ) cos [ 2 π ρ φ s r ( x , y ) φ s ( x , y ) ] ,
In Equation (11), let |As(x,y)|2 + Asr2 be a constant C. φs(x,y) and As(x,y) are the phase and amplitude of Os(x,y), φsr (x,y) and Asr(x,y) are the phase and amplitude of Rs(x,y), respectively.
(5) In the light of Burch’s coding method, let |As(x,y)|max = 1 and Asr = 1, then h(x,y) becomes
h ( x , y ) = 0.5 { 1 + A s ( x , y ) cos [ 2 π ρ φ s r ( x , y ) φ s ( x , y ) ] } .
(6) Finally, fabricate the encrypted binary CGH EBH (x,y) by quantizing h(x,y), which is achieved by use of Equation (12), in 1-bit using OTSU algorithm [25].
The security of this encryption system is enhanced greatly because of the huge key space which is formed by the private keys including SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3.
The reconstruction process of an encrypted binary CGH is described as follows:
(1) With the parameters SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3, the encrypted CGH EBH(x,y) is scrambled by the proposed inverse permutation process mentioned in Section 3.1 to obtain DEBH(x,y).
(2) With the conjugate reference wave, the binarized reconstruction RH of the hologram can be achieved via utilizing inverse Fourier transform and OTSU algorithm. To improve the quality of reconstruction, the high-pass filter approach is employed to attenuate the DC item in the reconstructed image.

4. The Proposed Watermarking Method

4.1. Selection of Embedding Positions

As described in Section 2.1, to maintain imperceptibility and robustness to attacks, the entropy and the edge entropy are employed to select the embedding positions adaptively in our method. In addition, to strengthen the robustness, the watermark signal will be superimposed on the low frequency sub-band of the SFLCT-transformed original image in this work. The detailed steps that select the suitable blocks for watermark embedding are shown as follows.
(1) Divide the low frequency sub-bands of the SFLCT-transformed original image into non-overlapping blocks with z × z pixels first. Then compute the entropy and the edge entropy of each block by use of Equations (1) and (2), respectively.
(2) Sum up the two measure of entropy of each block according to the following equation.
E T P S i = E T P i + E T P E i ,
where ETPi and ETPEi are the entropy and the edge entropy of the ith block.
(3) Sort the values ETPSi in an ascending order. Literatures state that the block with low ETPS value is suitable for embedding [2,21]. Thus, the block with smallest ETPS value is chosen for embedding the watermark signal until the number of selected blocks is equal to the number of watermark bits.

4.2. Watermark Embedding Algorithm

Suppose that H and W are the host image and the original binary watermark image, respectively. And their sizes are M × N and P × Q. Steps of embedding watermark into the original image are described as follows:
(1) Using the method described in Section 3, generate the encrypted binary hologram CW of the original watermark W first. Then map CW into a 1-D array WM by use of the zigzag scan process.
(2) Decompose H with 1-level SFLCT to achieve the low frequency sub-band SL.
(3) SL is divided into non-overlapping blocks of z × z pixels.
(4) In term of the Section 4.1, select PQ blocks which are suitable for embedding watermark signal.
(5) Apply Schur decomposition to all selected blocks.
(6) During the embedding process, an element of WM is superposed on one block. The (1,1)th element in S matrix of the chosen block is altered to insert the watermark. To embed WM, the first element of WM is inserted into the first selected block, and then the embedding procedure is repeated until the rest elements of WM are inserted into the other chosen blocks in sequence. Let Si be the S matrix of the ith selected block after Schur decomposition, WMi be the ith element of WM. Here, i = 1, 2, …, PQ. The watermark is embedded via Equation (14).
S i ( 1 , 1 ) = { S i ( 1 , 1 ) Δ + 0.25 q , W M i = 0 and Δ [ 0 , 0.75 q )   S i ( 1 , 1 ) Δ + 1.25 q , W M i = 0 and Δ [ 0.75 q , q ) S i ( 1 , 1 ) Δ 0.25 q , W M i = 1 and Δ [ 0 , 0.25 q ) S i ( 1 , 1 ) Δ + 0.75 q , W M i = 1 and Δ [ 0.25 q , q )
where Δ = mod(Si(1,1),q), Si(1,1) is the (1,1)th element in Si matrix, q is the quantization step. mod() is the modulo operation. Experiments show that the proposed method has high imperceptibility and good robustness against attacks when q ∈ [40, 60].
(7) Apply inverse Schur decomposition to every embedded block. Then the watermarked image can be obtained by use of inverse SFLCT. The x-coordinates and the y-coordinates of the first pixels of the selected blocks are saved in a 2 × PQ matrix. They will be used for watermark extraction.

4.3. Watermark Extraction

(1) First, the watermarked image is decomposed by 1-level SFLCT to achieve the low frequency sub-band SL’. Then SL’ is splitted into non-overlapping blocks of z × z pixels.
(2) Using the stored the x-coordinates and the y-coordinates, all the embedded blocks can be obtained.
(3) Apply Schur decomposition to all obtained blocks.
(4) The watermark signal WMi can be extracted by use of the following formula.
W M i = { 0 ,   if   mod [ S i ( 1 , 1 ) , q ] < 0.5 q 1 ,   otherwise ,
where Si be the S matrix of the ith obtained block after Schur decomposition,
(5) By utilizing the inverse zigzag algorithm, the hologram watermark CW’ can be achieved.
(6) With the private keys SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3, the extracted hologram CW’ is reconstructed in term of reconstruction process in Section 3.2.
Figure 1 delineates the flowchart of the proposed method. In Figure 1a,b are the diagrams of the watermark embedding process and the watermark extraction process, respectively.

5. Experiments and Results

A set of experiments were performed to validate the proposed watermarking method using MATLAB.

5.1. Fabrication of the Encrypted Hologram

In the experiment, the encrypted binary CGH was fabricated by using the approach described in Section 3. Figure 2 depicts the original watermark and its corresponding reconstruction. The image, whose size is 64 × 64, in Figure 2a was employed to generate the encrypted hologram. Here, SX(1) = 0.352, SY(1) = 0.865, SZ = 0.752, α = 0.998, β = 3, γ = 4, T = 104, t1 = 3528, t2 = 7832 and t3 = 6832, respectively. Figure 2b is the encrypted binary CGH. Figure 2c shows the reconstruction of Figure 2b with the all correct keys.

5.2. Test for the Effectiveness of Our Watermarking Scheme

A series of experiments were carried out to evaluate the imperceptibility and the robustness, which are two main requirements of the watermarking system according to the proposed method. The peak signal to noise ratio (PSNR) [26] was employed to measure the quality of the watermarked images. The watermarked image is within the acceptable degradation level if PSNR is larger than 30dB. Another metric normalized correlation (NC) [26], which is used to estimate the similarity between the original watermark and the extracted watermark, is utilized to evaluate the correctness of the extracted watermark. NC ∈ [0, 1]. Usually, it can be considered acceptable if NC is greater than 0.7. Higher NC value indicates good quality of extracted watermark. Bit error rate (BER) [27] is employed to calculate the difference between the reconstructed images of the embedded and extracted holograms. BER ∈ [0, 1]. The smaller the BER is, the better reconstructed image quality is. Experiments demonstrate the reconstructions obtained from the extracted watermarks cannot be recognized when their BER values are larger than 0.3. Ideally, NC = 1 and BER = 0.
The encrypted CGH in Figure 2b was used as the watermark in the tests. Four 1024 × 1024 grayscale images Elaine, Goldhill, Peppers and Crane given in Figure 3 were the host images. The quantization step q is 45 and z = 8. In terms of imperceptibility and robustness, the PSNR, NC and BER of our scheme are compared those of three other adaptive methods in [2,4,7]. For a fair comparison, the encrypted binary CGH in Figure 2b was adopted as the watermark in these four algorithms.

5.2.1. Test Results for Imperceptibility

The watermarked images produced by the proposed scheme are exhibited in Figure 4. The PSNRs for the watermarked images without attacks are listed in Table 1. As can be seen from Table 1, all the PSNRs of our method are greater than 50db. The high PSNRs certify the good imperceptibility of the proposed method. From Table 1, the proposed watermarking scheme outperforms the methods in [2,4,7] in the light of the imperceptibility. Additionally, all of the NCs of the watermarks which are extracted from the watermarked images shown in Figure 4 are 1, and the BERs of their corresponding reconstructed images are 0, respectively.

5.2.2. Robustness to Attacks

Different kinds of attacks were conducted to verify the robustness of the proposed method. They are Gaussian low-pass filtering (hsize = 5, sigma = 9), Average filtering (5 × 5) Median filtering (7 × 7), Occlusion (25%), Unsharp (alpha = 1), Blurring (Circular average, radius = 3), JPEG compression (Q = 30), Gaussian noise (0.0005), Salt and pepper noise (0.005), Brighten (adds 50 to each pixel of the images), Darken (subtracts 50 from each pixel of the images), Rescaling (1024→512→1024), Rotation (30°→−30°) and Painting, respectively.
For all attack cases, a comparison of NCs between our method and the schemes from the literature [2,4,7] is listed in Table 2 and Table 3. In Table 4 and Table 5, a comparison of BERs is made between our method and the three schemes. Figure 5 displays some distorted watermarked images of the proposed method together with PSNRs. The corresponding reconstructed images of the mark CGH, which are extracted from the attacked images in Figure 5, are exhibited in Figure 6. As can be seen from Table 2, Table 3, Table 4 and Table 5 and Figure 6, our method has good robustness against various kinds of attack. It can be observed from Table 2 and Table 3 and Figure 6 that most of the NCs of the proposed method are above 0.9 and the corresponding reconstructions are clear enough to be recognized. Almost of all BERs of the reconstructed images in Figure 6 are zero, or close to zero. In addition, when the watermarked images are undergone occlusion and rotation attacks, the NCs of the extracted mark hologram are less than 0.8. The reason is that part of the extracted CGH is missing. However, the reconstructed images, such as Figure 6d,m, are clear enough to be recognized because of the characteristic that part of a hologram can still display the whole image [15]. Furthermore, it can be seen from Table 2, Table 3, Table 4 and Table 5 that when the NC of the extracted mark CGH is larger than 0.975, the BER of its corresponding reconstruction equals to 0. The reason is that the hologram has a strong anti-interference characteristic. Therefore, the robustness of the proposed method can be enhanced by using the hologram as a watermark. From Table 2, Table 3, Table 4 and Table 5, it is apparent that our method is superior to the three algorithms in [2,4,7] under most attacks in terms of NC and BER.
It can be seen from Figure 6i that the quality of the reconstructed image is unsatisfactory when the watermarked image was suffered to the salt and pepper noise attacks. The main causation to this question is analysed as follows. For salt and pepper noise, the image pixel values are altered to 0 or 2r−1 [28]. Here, r is the maximum number of bits that is used in the image. Therefore, after Schur decomposition, the value of the (1,1)th element in S matrix of the image block to which the salt and pepper noise is added are changed greatly. It results that the watermarking signal in this damaged block may not be extracted correctly by using Equation (15). As a result, the hologram obtained from the watermarked image under this attack is highly corrupted. Experimental results indicate that the reconstruction of the extracted CGH cannot be distinguished when the noise density of salt and pepper noise is bigger than 0.01.

5.2.3. Key Sensitivity

The sensitivity of the reconstructed image of the extracted CGH to slight alterations of the secret keys SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3, is investigated. Figure 7a–i show the decrypted reconstructed images with wrong keys X(1) = 0.352 + 10−15, Y(1) = 0.865 + 10−15, SZ = 0.752 + 10−15, α = 0.998 + 10−14, β = 3−10−14, γ = 4−10−15, t1 = 3528 + 1, t2 = 7832 + 1 and t3 = 6832 + 2, respectively. The NCs of the decrypted CGH with the above wrong permutation keys and the BERs of the corresponding reconstructions are presented in Table 6. Please note that in the above experiments, the other keys remain correct while a key is varied in decryption. As illustrated in Figure 7a–f, we cannot obtain any information from the decrypted reconstructions visually when the absolute values of deviations of SX(1),SY(1), SZ and γ are up to 10−15 and those of α and β are up to 10−14. In addition, we know from Figure 7g–h that if the parameters t1 and t2 are less 1 or more 1 than the right value, the decoded images are noise-like images. Similarly, the decrypted reconstructed image shown in Figure 6i cannot be recognized when the key t3 are less 2 or more 2 than the correct value. So, the keys SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3 are highly sensitive to the proposed method.
Now we evaluate the key space of the proposed encrypted hologram. In light of the description of the proposed scheme, we know that the key space of the cryptosystem consists of the parameters SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3. Let KS1, KS2, KS3, KS4, KS5, KS6, KS7, KS8 and KS9 be the key spaces of the secret keys SX(1), SY(1), SZ, α, β, γ, t1, t2 and t3, respectively. From Table 6, the parameters SX(1), SY(1), SZ, α, β and γ maintain 15, 15, 15, 14, 14 and 15 digits after the decimal point respectively. So KS1 × KS2 × KS3 × KS4 × KS5 × KS6 = 1088. Since 1 ≤ t1 ≤ T + PQ, 1 ≤ t2 ≤ T + PQ and 1 ≤ t3 ≤ T KS7 × KS8 × KS9 = (T + PQ)2 × T. Since T and PQ are 10000 and (64 × 64)2 in the experiments, S7 × S8 × S9 ≈ 2 × 1012. Hence, the total key space of the encryption system is KS1 × KS2 × KS3 × KS4 × KS5 × KS6 × KS7 × KS8 × KS9 ≈ 1088 × 2 × 1012 ≈ 2333. It is clear that the key space of the proposed cryptosystem is far larger than 2100 and enormous enough to resist a brute force attack [29]. Therefore, by use of the encrypted hologram, the security level of the proposed watermarking scheme can be improved.

6. Conclusions

Based upon the entropy and edge entropy, an adaptive secure image watermarking method that inserts the encrypted hologram into the SFLCT domain is proposed in this paper. Without using the host image, the watermark can be extracted by using the presented method.
A novel chaos-based binary CGH encryption technique which provides a huge key space is developed to fabricate a hologram of a watermark. Compared with the encryption techniques based on conventional optical holography, the advantages of the proposed method are: (1) the parameters of chaotic maps which are used as keys make it easy to save and distribute the keys expediently and safely; (2) the proposed CGH cryptosystem has the advantage in being implemented effectively by the use of a computer. By using the initial values and the parameters of chaotic system as secret keys, the security strength of the watermarking approach is heightened.
In the presented method, the use of entropy and edge entropy helps to choose the suitable embedding positions adaptively for satisfying the invisibility and robustness requirements of the watermarked image. The encrypted hologram watermark is embedded into the SFLCT coefficients with Schur decomposition. The experimental results illustrate that our scheme is not only secure and transparent, but also robust against various kinds of attacks including filtering, JPEG compression, occlusion, unsharp, brighten, darken, blurring, rotation, rescaling and painting attacks, etc.

Author Contributions

C.Y., J.L., X.L., and X.C. commonly finished the manuscript. All authors have read and approved the final manuscript. Funding acquisition, C.Y. and J.L.; Investigation, C.Y. and X.C.; Methodology, C.Y. and J.L.; Validation, C.Y., X.L. and J.L.; Writing—original draft, C.Y. and J.L.; Writing—review & editing, X.L. and J.L.

Funding

This research was funded by the Natural Science Foundation of Guangdong Province under Grant No.2018A0303070009 and No. 2014A030310038), and the Educational and Commission of Guangdong Province under Grant (No. 2015KTSCX089 and 2018).

Acknowledgments

The authors are grateful for the reviewers’ careful, unbiased and constructive suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cox, I.J.; Miller, M.L. The first 50 years of electronic watermarking. J. Appl. Signal Process. 2002, 56, 126–132. [Google Scholar] [CrossRef]
  2. Lai, C.C. An improved SVD-based watermarking scheme using human visual characteristics. Opt. Commun. 2011, 284, 938–944. [Google Scholar] [CrossRef]
  3. Li, L.D.; Guo, B.L. Localized image watermarking in spatial domain resistant to geometric attacks. Int. J. Electron. Commun. (AEÜ) 2009, 63, 123–131. [Google Scholar] [CrossRef]
  4. Makbol, N.M.; Khoo, B.E.; Rassem, T.H. Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process. 2016, 10, 34–52. [Google Scholar] [CrossRef] [Green Version]
  5. Guo, Q.; Liu, Z.; Liu, S. Image watermarking algorithm based on fractional Fourier transform and random phase encoding. Opt. Commun. 2011, 284, 3918–3923. [Google Scholar] [CrossRef]
  6. Liu, Z.; Xu, L.; Guo, Q.; Lin, C.; Liu, S. Image watermarking by using phase retrieval algorithm in gyrator transform domain. Opt. Commun. 2010, 283, 4923–4927. [Google Scholar] [CrossRef]
  7. Fan, D.; Wang, Y.; Zhu, C.W. A blind watermarking algorithm based on adaptive quantization in Contourlet domain. Multimed. Tools Appl. 2019. [Google Scholar] [CrossRef]
  8. Najafia, E.; Loukhaoukha, K. Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. JISA 2019, 44, 144–156. [Google Scholar] [CrossRef]
  9. Aslantas, V. An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt. Commun. 2009, 282, 769–777. [Google Scholar] [CrossRef]
  10. Sangeethaa, N.; Anitab, X. Entropy based texture watermarking using discrete wavelet transform. Optik 2018, 160, 380–388. [Google Scholar] [CrossRef]
  11. Li, J.Z.; Zhang, X.S.; Liu, S.; Ren, X.C. Adaptive watermarking scheme using a gray-level computer generated hologram. Appl. Opt. 2009, 48, 4858–4865. [Google Scholar] [CrossRef]
  12. Deng, K.; Yang, G.; Xie, H. A blind robust watermarking scheme with non-cascade iterative encrypted kinoform. Opt. Exp. 2011, 19, 10241–10251. [Google Scholar] [CrossRef] [PubMed]
  13. Li, J.Z. An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization. Opt. Exp. 2014, 22, 10002–10016. [Google Scholar] [CrossRef] [PubMed]
  14. Tsang, P.W.M.; Poon, T.C.; Cheung, W.K. Intensity image-embedded binary holograms. Appl. Opt. 2013, 52, A26–A32. [Google Scholar] [CrossRef]
  15. Okman, O.E.; Akar, G.B. Quantization index modulation-based image watermarking using digital holography. J. Opt. Soc. Am. A 2007, 24, 243–253. [Google Scholar] [CrossRef]
  16. Li, X.W.; Kim, S.T.; Wang, Q.H. Copyright protection for elemental image array by hypercomplex Fourier transform and an adaptive texturized holographic algorithm. Opt. Exp. 2017, 25, 17076–17091. [Google Scholar] [CrossRef] [PubMed]
  17. Do, M.N.; Vetterli, M. The contourlet transform: An efficient directional multiresolution image representation. IEEE T. Image Process. 2005, 14, 2091–2106. [Google Scholar] [CrossRef]
  18. Lu, Y.; Do, M.N. A new contourlet transform with sharp frequency localization. In Proceedings of the 2006 IEEE International Conference on Image Processing, Atlanta, GA, USA, 8–11 October 2006; IEEE: New York, NY, USA, 2006. [Google Scholar]
  19. Su, Q.T.; Niu, Y.G.; Liu, X.X.; Zhu, Y. Embedding color watermarks in color images based on Schur decomposition. Opt. Commun. 2012, 285, 1792–1802. [Google Scholar] [CrossRef]
  20. Li, J.Z.; Yu, C.Y.; Gupta, B.B.; Ren, X.C. Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed. Tools Appl. 2018, 77, 4545–4561. [Google Scholar] [CrossRef]
  21. Maitya, S.P.; Kundub, M.K. DHT domain digital watermarking with low loss in image informations. AEU Int. J. Electron. Commun. 2010, 64, 243–257. [Google Scholar] [CrossRef] [Green Version]
  22. Hua, Z.Y.; Zhou, Y.C.; Pun, C.M.; Chen, C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94. [Google Scholar] [CrossRef]
  23. Singh, N.; Sinha, A. Optical image encryption using Hartley transform and logistic map. Opt. Commun. 2009, 282, 1104–1109. [Google Scholar] [CrossRef]
  24. Smila, M.; Sankar, S. Novel algorithms for finding an optimal scanning path for JPEG image compression. IJETCSE 2014, 8, 230–236. [Google Scholar]
  25. Otsu, N. A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man. Cybern. 1979, 9, 62–66. [Google Scholar] [CrossRef]
  26. Shen, J.J.; Ren, J.M. A robust associative watermarking technique based on vector quantization. Digital Signal Process. 2010, 20, 1408–1423. [Google Scholar] [CrossRef]
  27. Yang, H.Y.; Wang, X.Y.; Chen, L.L. Geometrically invariant image watermarking using SVR correction in NSCT domain. Comput. Electr. Eng. 2011, 37, 695–713. [Google Scholar] [CrossRef]
  28. Mousavi, S.M.; Naghsh, A.; Manaf, A.A.; Abu-Bakar, S.A.R. A robust medical image watermarking against salt and pepper noise for brain MRI images. Multimed. Tools Appl. 2017, 76, 10313–10342. [Google Scholar] [CrossRef]
  29. Zhang, Y.; Xiao, D. Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt. Lasers Eng. 2013, 51, 472–480. [Google Scholar] [CrossRef]
Figure 1. Flowchart of proposed watermarking method. (a) watermark embedding process; (b)watermark extraction process.
Figure 1. Flowchart of proposed watermarking method. (a) watermark embedding process; (b)watermark extraction process.
Entropy 21 00460 g001
Figure 2. Results of the encrypted binary CGH. (a) the original image; (b) the encrypted binary CGH; (c) the binarized reconstruction of (b).
Figure 2. Results of the encrypted binary CGH. (a) the original image; (b) the encrypted binary CGH; (c) the binarized reconstruction of (b).
Entropy 21 00460 g002
Figure 3. The host grayscale images. (a) Elaine; (b)Goldhill; (c) Peppers; (d) Crane.
Figure 3. The host grayscale images. (a) Elaine; (b)Goldhill; (c) Peppers; (d) Crane.
Entropy 21 00460 g003
Figure 4. The watermarked images produced by the proposed method. (a) Elaine (PSNR = 50.72); (b) Goldhill (PSNR = 50.59); (c) Peppers (PSNR = 50.53); (d) Crane (PSNR = 50.62).
Figure 4. The watermarked images produced by the proposed method. (a) Elaine (PSNR = 50.72); (b) Goldhill (PSNR = 50.59); (c) Peppers (PSNR = 50.53); (d) Crane (PSNR = 50.62).
Entropy 21 00460 g004
Figure 5. The attacked watermarked images. (a) Gaussian low-pass filtering (PSNR = 32.54); (b) average filtering (PSNR = 32.42); (c) median filtering (PSNR = 34.9); (d) occlusion (PSNR = 15.06); (e) JPEG (PSNR = 35.95); (f) unsharp (PSNR = 27.74); (g) burring (PSNR = 34.03); (h) Gaussian noise (PSNR = 32.89); (i) salt & pepper noise (PSNR = 28.5); (j) brighten (PSNR = 14.15); (k) darken (PSNR = 14.52); (l) rescaling (PSNR = 34.67); (m) rotation (PSNR = 13.17); (n) painting (PSNR = 20.34).
Figure 5. The attacked watermarked images. (a) Gaussian low-pass filtering (PSNR = 32.54); (b) average filtering (PSNR = 32.42); (c) median filtering (PSNR = 34.9); (d) occlusion (PSNR = 15.06); (e) JPEG (PSNR = 35.95); (f) unsharp (PSNR = 27.74); (g) burring (PSNR = 34.03); (h) Gaussian noise (PSNR = 32.89); (i) salt & pepper noise (PSNR = 28.5); (j) brighten (PSNR = 14.15); (k) darken (PSNR = 14.52); (l) rescaling (PSNR = 34.67); (m) rotation (PSNR = 13.17); (n) painting (PSNR = 20.34).
Entropy 21 00460 g005
Figure 6. The corresponding reconstructed images of the CGH extracted from the distorted watermarked images in Figure 4. (a) Gaussian low-pass filtering; (b) average filtering; (c) median filtering; (d) occlusion; (e) JPEG; (f) unsharp; (g) burring; (h) Gaussian noise; (i) salt & pepper noise; (j) brighten; (k) darken; (l) rescaling; (m) rotation; (n) painting.
Figure 6. The corresponding reconstructed images of the CGH extracted from the distorted watermarked images in Figure 4. (a) Gaussian low-pass filtering; (b) average filtering; (c) median filtering; (d) occlusion; (e) JPEG; (f) unsharp; (g) burring; (h) Gaussian noise; (i) salt & pepper noise; (j) brighten; (k) darken; (l) rescaling; (m) rotation; (n) painting.
Entropy 21 00460 g006
Figure 7. The reconstructed images of the CGHs extracted from watermarked Elaine. (a) reconstruction with SX(1) = 0.352 + 10−15; (b) reconstruction with SY(1) = 0.865 + 10−15; (c) reconstruction with SZ = 0.752 + 10−15; (d) reconstruction with α = 0.998 + 10−14; (e) reconstruction with β = 3−10−14; (f) reconstruction with γ = 4−10−15; (g) reconstruction with t1 = 3528 + 1; (h) reconstruction with t2 = 7832 + 1; (i) reconstruction with t3 = 6832 + 2.
Figure 7. The reconstructed images of the CGHs extracted from watermarked Elaine. (a) reconstruction with SX(1) = 0.352 + 10−15; (b) reconstruction with SY(1) = 0.865 + 10−15; (c) reconstruction with SZ = 0.752 + 10−15; (d) reconstruction with α = 0.998 + 10−14; (e) reconstruction with β = 3−10−14; (f) reconstruction with γ = 4−10−15; (g) reconstruction with t1 = 3528 + 1; (h) reconstruction with t2 = 7832 + 1; (i) reconstruction with t3 = 6832 + 2.
Entropy 21 00460 g007
Table 1. The PSNRs of the watermarked images without attacks comparing between our method and the schemes in [2,4,7].
Table 1. The PSNRs of the watermarked images without attacks comparing between our method and the schemes in [2,4,7].
Our MethodScheme in [7]Scheme in [2]Scheme in [4]
Elaine50.7245.2243.1545.74
Goldhill50.5945.7147.1549.18
Peppers50.5345.445.1347.8
Crane50.6245.7449.1150.23
Table 2. The NCs of the mark CGHs which were extracted from the attacked watermarked Elaine and Goldhill comparing between our method and the schemes in [2,4,7].
Table 2. The NCs of the mark CGHs which were extracted from the attacked watermarked Elaine and Goldhill comparing between our method and the schemes in [2,4,7].
ElaineGoldhill
AttacksOur MethodScheme in [7]Scheme in [2]Scheme in [4]Our MethodScheme in [7]Scheme in [2]Scheme in [4]
Gaussian low-pass filtering0.9940.9270.6860.6810.930.9130.6130.656
Average filtering 0.9950.9250.6560.6730.9290.9110.6120.65
Median filtering 0.9470.9130.6370.5390.8840.770.6650.576
Occlusion0.8240.7520.8020.8210.7560.7520.8060.814
Unsharp0.9860.940.7360.9850.9410.9390.8190.984
Blurring 0.990.930.6390.8060.9130.90.6010.669
JPEG0.8950.9310.6460.9240.8680.9270.6920.645
Gaussian noise 0.9540.970.8230.9930.9480.960.8190.922
Salt and pepper noise 0.8290.8130.8880.9480.8550.8340.8930.938
Brighten0.8170.530.7810.7970.9960.4740.9870.995
Darken0.9920.5280.9720.9910.7770.4920.8470.832
Rescaling0.9950.7950.750.9930.9520.6360.8220.966
Rotation0.80.830.7640.7770.8020.8320.7680.779
Painting0.9860.930.9680.9830.9770.940.9730.984
Table 3. The NCs of the mark CGHs which were extracted from the attacked watermarked Peppers and Crane comparing between our method and the schemes in [2,4,7].
Table 3. The NCs of the mark CGHs which were extracted from the attacked watermarked Peppers and Crane comparing between our method and the schemes in [2,4,7].
PeppersCrane
AttacksOur MethodScheme in [7]Scheme in [2]Scheme in [4]Our MethodScheme in [7]Scheme in [2]Scheme in [4]
Gaussian low-pass filtering0.9940.8950.6560.7520.970.9510.6240.615
Average filtering 0.9940.8920.6550.7380.9710.950.6210.609
Median filtering 0.9710.8910.6250.5010.9160.8020.6530.493
Occlusion 0.7620.7610.7610.7580.780.7620.7910.8
Unsharp0.9950.9170.6360.9710.970.9570.8040.971
Blurring 0.9910.8660.6530.7920.9650.940.6140.628
JPEG0.8830.9130.5970.6440.8950.8940.7860.512
Gaussian noise 0.9550.9640.7150.9310.9470.9610.7980.94
Salt and pepper noise0.8510.8290.8270.9240.8580.8410.8780.927
Brighten0.9690.5280.9620.96310.5110.9850.997
Darken0.8860.4950.8660.8770.9150.4870.950.958
Rescaling0.9970.7810.6840.9620.9880.80.850.976
Rotation0.8320.830.7890.7850.7890.8390.7590.767
Painting0.970.950.9640.9550.980.950.9720.978
Table 4. The BERs of the reconstructions of the mark CGHs which were extracted from the attacked watermarked Elaine and Goldhill comparing between our method and the schemes in [2,4,7].
Table 4. The BERs of the reconstructions of the mark CGHs which were extracted from the attacked watermarked Elaine and Goldhill comparing between our method and the schemes in [2,4,7].
ElaineGoldhill
AttacksOur MethodScheme in [7]Scheme in [2]Scheme in [4]Our MethodScheme in [7]Scheme in [2]Scheme in [4]
Gaussian low-pass filtering00.0070.3870.7240.0050.0130.3640.407
Average filtering 00.0080.3950.7250.0050.0150.4090.405
Median filtering 0.0020.0130.4120.7510.1180.330.4230.403
Occlusion0.0230.1620.0270.0260.0680.1320.0420.022
JPEG0.0380.0080.3950.0070.0520.010.3160.421
Unsharp00.0090.1200.0030.0120.0730
Blurring00.0060.4070.3180.0080.0150.3890.391
Gaussian noise 0.0010.0010.16200.0030.0030.2490.008
Salt and pepper noise0.1070.240.0780.0090.1050.2080.0710.009
Brighten0.0060.4010.0740.100.40700
Darken00.415000.1030.4560.0830.097
Rescaling00.2950.37200.0010.40.3270.001
Rotation0.0570.1130.1040.1050.0360.1310.0810.106
Painting00.0650.001000.01100
Table 5. The BERs of the reconstructions of the mark CGHs which were extracted from the attacked watermarked Peppers and Crane comparing between our method and the schemes in [2,4,7].
Table 5. The BERs of the reconstructions of the mark CGHs which were extracted from the attacked watermarked Peppers and Crane comparing between our method and the schemes in [2,4,7].
PeppersCrane
AttacksOur MethodScheme in [7]Scheme in [2]Scheme in [4]Our methodScheme in [7]Scheme in [2]Scheme in [4]
Gaussian low-pass filtering00.1020.3890.340.0010.0090.6240.416
Average filtering 00.1070.4080.3630.0010.0080.6210.414
Median filtering 0.0020.1080.3850.3980.0050.2770.6530.415
Occlusion0.0350.1630.0580.1080.0470.1550.0340.021
JPEG0.1290.0080.3710.2130.1130.0560.1150.342
Unsharp00.0090.3010.0010.0010.0040.0790.001
Blurring00.1560.4080.290.0010.0140.3920.418
Gaussian noise 0.0020.0020.3390.0040.0020.0020.2760.005
Salt and pepper noise0.1010.2410.1130.0090.1040.2710.1180.006
Brighten00.420.0020.00100.42300
Darken0.0030.4210.0030.0030.0020.4170.0010.001
Rescaling00.320.3770.00100.3230.3630.001
Rotation0.0430.1240.0530.0670.0620.1130.1030.085
Painting00.0150.0010.00100.0090.0010
Table 6. The NC values of the decrypted CGH with the wrong keys and the BER values of the corresponding reconstructions.
Table 6. The NC values of the decrypted CGH with the wrong keys and the BER values of the corresponding reconstructions.
SX(1) =
0.352 + 10−15
SY(1) =
0.865 + 10−15
SZ =
0.752 + 10−15
α =
0.998 + 10−14
β =
3-10−14
γ =
4-10−15
t1 =
3528 + 1
t2 =
7832 + 1
t3 =
6832 + 2
NC0.5060.4970.5030.5140.5020.5090.5090.5060.493
BER0.7550.7430.7330.7560.750.7410.7430.7460.717

Share and Cite

MDPI and ACS Style

Yu, C.; Li, X.; Chen, X.; Li, J. An Adaptive and Secure Holographic Image Watermarking Scheme. Entropy 2019, 21, 460. https://0-doi-org.brum.beds.ac.uk/10.3390/e21050460

AMA Style

Yu C, Li X, Chen X, Li J. An Adaptive and Secure Holographic Image Watermarking Scheme. Entropy. 2019; 21(5):460. https://0-doi-org.brum.beds.ac.uk/10.3390/e21050460

Chicago/Turabian Style

Yu, Chuying, Xiaowei Li, Xinan Chen, and Jianzhong Li. 2019. "An Adaptive and Secure Holographic Image Watermarking Scheme" Entropy 21, no. 5: 460. https://0-doi-org.brum.beds.ac.uk/10.3390/e21050460

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop