A novel blind color images watermarking based on SVD
Transcription
A novel blind color images watermarking based on SVD
G Model IJLEO-54174; No. of Pages 7 ARTICLE IN PRESS Optik xxx (2014) xxx–xxx Contents lists available at ScienceDirect Optik journal homepage: www.elsevier.de/ijleo A novel blind color images watermarking based on SVD Shao-li Jia ∗ College of Civil Engineering, Lu dong University, Yantai, 264025 Shandong, PR China a r t i c l e i n f o Article history: Received 12 June 2013 Accepted 16 November 2013 Available online xxx Keywords: Color image Watermark SVD U matrix. a b s t r a c t Since the color image watermark has more bit information, it is a challenging problem to design a robust and blind color watermarking scheme for copyright protection. In this paper, a blind watermarking scheme based on singular value decomposition (SVD) is proposed. By analyzing the orthogonal matrix U via SVD, it is found that there exists a strong similarity correlation between the second row first column element and the third row first column element. Hence, this paper utilizes this property for image watermarking. Firstly, the 4 × 4 non-overlapping pixels block of each component in color host image is processed by SVD. And then, the color watermark is embedded by slightly modifying the value of the second row first column element and the third row first column one of U matrix, and the modified relation can be utilized to extract watermark. Experimental results, compared with the related existing methods, show that the proposed color image scheme has stronger robustness against most common attacks such as image compression, filtering, cropping, noise adding, blurring, scaling and sharpening et al. © 2014 Elsevier GmbH. All rights reserved. 1. Introduction Today storing information and data such as documents, images, video, and audio in digital formats is very common. As is well known, due to the nature of digital information, it is easy to make unlimited lossless copies from the original digital source, to modify the content, and to transfer the copies rapidly over the Internet. Therefore, the demands of copyright protection, ownership demonstration, and tampering verification for digital data are becoming more and more urgent. Among the solutions for these problems, digital watermarking is the most popular one. Researchers have given consideration to this in the past decade. Digital watermarking is to embed the important information into the digital data (audio, image, video, and text). According to the processing domain of the host image, the existing techniques on image watermarking may be roughly divided into two categories, i.e., frequency-domain and spatial-domain methods [1]. Although more information for embedding and better robustness against the common attacks can be achieved through frequency-domain method, the computational cost is higher than the ones based on spatial domain. Embedding the watermark into the component of the original image in spatial domain is a straightforward method, which has the advantages of low computational complexity and easy implementation. However, the watermarking algorithm in spatial domain is generally fragile to common image processing operations or other attacks. In order to ∗ Tel.: +86 535 6673554. E-mail address: ldujiaoshaoli@163.com overcome these shortcomings, the method based on singular value decomposition (SVD) has been becoming one of the research hot fields. The SVD-based watermarking method has three advantages as follows: (1) the size of the matrix from SVD transformation is not fixed; (2) when a small perturbation is added to an image, larger variation of its singular values does not occur; (3) singular values represent intrinsic algebraic image properties [2]. In the last few years, SVD-based watermarking technique and its variations have been mostly considered, e.g., in [3–6]. Among them, a vector quantization-and SVD-based image hiding algorithm was introduced for embedding the secret data into the D matrix of the SVD in [3]. Chang, et al. [4] discussed a block-based watermarking algorithm, in which the image was divided into several blocks and then the elements in U matrix in each block were modified to achieve the watermarking effect. In [5], two notes were proposed to increase invisibility and capacity of SVD-based watermarking scheme, in which the elements in column/row vector were modified to attain less visible distortion than modifying the elements in row/column vector of U matrix after SVD transformation. On the basis of the method in [5], Fan, et al. [6] further considered modifying the elements in the first column of U matrix and V matrix for watermarking. Moreover, the V matrix or U matrix to compensate visible distortion was adopted in [6] when embedding watermark into the matrix of SVD. However, it is noted that the SVD-based methods have four disadvantages: 1) Most methods only consider the case that embedding binary watermark image into the gray-scale image [3–6]. 0030-4026/$ – see front matter © 2014 Elsevier GmbH. All rights reserved. http://dx.doi.org/10.1016/j.ijleo.2014.01.002 Please cite this article in press as: S.-l. Jia, A novel blind color images watermarking based on SVD, Optik - Int. J. Light Electron Opt. (2014), http://dx.doi.org/10.1016/j.ijleo.2014.01.002 G Model IJLEO-54174; No. of Pages 7 2 ARTICLE IN PRESS S.-l. Jia / Optik xxx (2014) xxx–xxx 2) The watermarked image has lower invisibility [7]. This is because all values in a pixel matrix would be changed when one singular value is modified, that is, if one singular value of a N × N matrix is modified, then N2 pixels will be modified. 3) The false positive detection problem is existing in most SVDbased watermarking algorithm [8]. The detailed reason for false positive detection problem is only the singular values of the watermark W are embedded into the host image, that is, if the T , only the singular value decomposition of W is W = UW SW VW diagonal singular values matrix SW is embedded while the orthogonal matrices UW and VW are not. In extraction procedure, only the diagonal matrix SW is extracted, but the UW and VW can be simply provided by the owner without any extraction. However, the orthogonal matrices UW and VW contain the major information about an image. Thus any one can provide a fake pair of orthogonal matrices and claim that his watermark is present in the watermarked image, which causes false positive detection problem. 4) Most the aforementioned watermarking methods were usually performed in a non-blind manner. For example, in [9], the singular values of original watermark are required to extract the embedded singular value, and then, the U and V orthogonal matrices of original watermark were utilized to recover the watermark. In [10], three matrices U, V and D of SVD for watermark are used the user’s secret keys to extract watermark, and the original host image is also need to extract watermark. 2. Singular value decomposition For a N × N square matrix I with rank r, r ≤ N, its SVD is represented by Eq. (1). ⎡u 1,1 ⎢ u2,1 ⎢ ⎣ .. I = UDVT = ⎢ . uN,1 ··· u1,N ··· u2,N .. . . . . ··· ⎤⎡ ⎥⎢ ⎥⎢ ⎥⎢ ⎦⎣ uN,N 1 0 ··· 0 0 2 ··· 0 . . . . . . .. . 0 0 0 ··· N ⎤⎡ v 1,1 ⎥ ⎢ v2,1 ⎥⎢ ⎥⎢ . ⎦⎣ . ··· v1,N ··· v2,N .. . . . . . ⎤ ⎥ ⎥ ⎥ ⎦ (1) vN,1 · · · vN,N where U and V are N × N orthogonal matrices and D is singular, diagonal matrix with diagonal elements satisfying 1 ≥2 ≥· · ·≥r > r+1 = · · · = N = 0 It is assumed that the 4-by-4 matrix A is one of the blocks of the input image, whose SVD is given by Eq. (2). ⎡ A1 A2 ⎢ A5 ⎣ A9 A6 A7 A8 A10 A11 A12 A=⎢ A13 ⎡ a1 A14 A3 A4 A15 a2 a3 ⎤ ⎥ ⎥ = UDVT ⎦ A16 a4 ⎤ ⎡ 1 ⎢ a5 ⎣ a9 a6 a7 a10 a11 ⎥⎢ ⎥⎢ a12 ⎦ ⎣ a13 a14 a15 a16 =⎢ a8 0 0 0 0 2 0 0 0 0 3 0 0 0 ⎤ ⎡ c1 c2 c3 c4 ⎤T c6 c7 0 ⎥ ⎢ c5 ⎥⎢ ⎦ ⎣ c9 c10 c11 ⎥ ⎥ c12 ⎦ 4 c13 c14 c15 c16 (2) c8 Perform the matrix multiplications for UDVT , in which each pixel Although the watermarking proposed in [11] can attain a blind color image extraction watermarking, one or more singular values must be modified to keep the order of singular values such that the quality of the watermarked image will be seriously affected. That can be seen from the following simple example. For example, supposed that the singular values 1 − 16 of one pixel block with size 16 × 16 are 3165.613, 457.5041, 31.54169, 9.85382997, 5.796001, 4.991171, 3.688464, 2.544742, 2.064232, 1.691997, 1.130058, 1.074023, 0.819865, 0.448544, 0.37897, 0.101045, respectively. When a watermark value is 0, according to the method in [11], these singular values will be changed to 3165.613, 457.5041, 31.54169, 9.85382997, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0. That is, 12 singular values will be modified such that all pixel values in this pixel block will be obviously changed. Thus, the visual quality of the watermarked image may be affected. Motivated by the above discussion, this paper proposes a blind SVD-based dual color watermarking scheme for protecting copyrights and overcoming the false positive detection problem. In this paper, it is firstly found the elements in the second row first column and the third row first column are the closest elements of U matrix after SVD, which means that the relation between the both elements can be preserved and further used to extract the embedded watermark without resorting to the original data. Thus, the blind extraction can be achieved. In order to keep the similarity between the anterior two elements in first column of U matrix, it is only required to slightly change the value of the two elements. The experimental results show that the proposed method has better performance than some existing methods. The rest of this paper is organized as follows: Section 2 gives a brief description of the SVD principle and points out its key feature that be used in this paper. Section 3 describes the proposed watermarking method that includes watermark embedding and watermark extraction. In Section 4, the experimental results are presented to show the performance of the proposed watermark. Finally, we draw out the conclusions of this paper in Section 5. is given by Eq. (3). A1 = a1 1 c1 + a2 2 c2 + a3 3 c3 + a4 4 c4 ; A2 = a1 1 c5 + a2 2 c6 + a3 3 c7 + a4 4 c8 A3 = a1 1 c9 + a2 2 c10 + a3 3 c11 + a4 4 c12 ; A4 = a1 1 c13 + a2 2 c14 + a3 3 c15 + a4 4 c16 A5 = a5 1 c1 + a6 2 c2 + a7 3 c3 + a8 4 c4 ; A6 = a5 1 c5 + a6 2 c6 + a7 3 c7 + a8 4 c8 A7 = a5 1 c9 + a6 2 c10 + a7 3 c11 + a8 4 c12 ; A8 = a5 1 c13 + a6 2 c14 + a7 3 c15 + a8 4 c16 (3) A9 = a9 1 c1 + a10 2 c2 + a11 3 c3 + a12 4 c4 ; A10 = a9 1 c5 + a10 2 c6 + a11 3 c7 + a12 4 c8 A11 = a9 1 c9 + a10 2 c10 + a11 3 c11 + a12 4 c12 ; A12 = a9 1 c13 + a10 2 c14 + a11 3 c15 + a12 4 c16 A13 = a13 1 c1 + a14 2 c2 + a15 3 c3 + a16 4 c4 ; A14 = a13 1 c5 + a14 2 c6 + a15 3 c7 + a16 4 c8 A15 = a13 1 c9 + a14 2 c10 + a15 3 c11 + a16 4 c12 ; A16 = a13 1 c13 + a14 2 c14 + a15 3 c15 + a16 4 c16 According to the above formulas, the value of Aj (1 ≤ j ≤ 16) depends on the singular values i (1 ≤ i ≤ 4). The more the modified number for all i is, the bigger the changed magnitude in pixel values is, and the worse the invisibility of the watermark is. That is the main shortcoming of the method in [11]. It is noted that the matrix U has an interesting property, i.e., all elements in the first column are of same sign and their values are Please cite this article in press as: S.-l. Jia, A novel blind color images watermarking based on SVD, Optik - Int. J. Light Electron Opt. (2014), http://dx.doi.org/10.1016/j.ijleo.2014.01.002 G Model ARTICLE IN PRESS IJLEO-54174; No. of Pages 7 S.-l. Jia / Optik xxx (2014) xxx–xxx 3 Color watermark image Color host image Embedding Watermarked image Process Extraction Extracted watermark image Process Key Key Fig. 1. Block diagram of the proposed watermarking scheme. Fig. 2. Original watermark images: (a) PEUGEOT logo, (b) 8-color image. very close. For example, a sample matrix A obtained from a digital image is ⎡ 252 250 250 251 ⎤ ⎢ 255 255 255 255 ⎥ ⎥ A=⎢ ⎣ 254 254 253 253 ⎦ 244 (4) 239 234 229 By undergoing SVD to matrix A, the orthogonal matrix U is given as ⎡ −0.5034 ⎢ 0.5119 ⎣ 0.5089 U=⎢ −0.4749 −0.2588 0.8221 −0.0616 −0.3288 −0.3641 0.7051 0.8780 −0.0099 0.0595 ⎤ ⎥ ⎥ −0.2325 −0.4376 −0.7039 ⎦ (5) As can be seen from U matrix, all the elements in the first column of U matrix are of same sign (negative) and difference of first column elemental is very small. A matrix consisting of m-th row first column element Um,1 of each SVD decomposed U matrix block and another one consisting of n-th row first column element Un,1 of each SVD decomposed U matrix block is formed. Normalized Cross-Correlation (NC) between the two matrices is calculated and is listed in Table 1. As can be seen from the table that this value is very close to 1 for most of the images, and the average value of NC (U2,1 , U3,1 ) is 0.9886 which shown they are the closest elements than any of other elements. Therefore, it is noted that there exists a strong correlation between the second row first column element and the third row first column element of U matrix when SVD is used. This property can be explored for image watermarking. 3. The proposed watermarking scheme As mentioned above, one of the features of SVD is that the relation between the elements in the first column vector of the U matrix could be preserved, while the others are changed when the general image processing is performed. In this work, we shall make full use of the property to embed the color watermark image into the color host image. As shown in Fig. 1, the color watermark image is embedded into color host image and the final watermark can be extracted from the watermarked image without the original host image or watermark image. Without loss of generality, let the original host image H be 24bit color image with size of M × M and the watermark image be 24-bit color image W with size of N × N. The detailed embedding procedures are as follows. Step 1. Pre-processing of the color image watermark. The 3-D original watermark image W is firstly divided into three components R, G, B by dimension-reduction treatment. And then, the 2-D component watermarks Wi are obtained, where i = {1, 2, 3} presents the R, G and B component, respectively. In order to enhance the security and robustness of the watermarking, each component watermark is permuted by Arnold transformation based on the private key K and converted from decimal format to binary sequence. Step 2. Block processing of the host image. The host image H is represented by R, G, B component images and each component image is partitioned into 4 × 4 non-overlapping blocks. Step 3. Performing SVD decomposition on each block as Eq. (1) to obtain the U matrix of each embedding block. Step 4. According to the watermark information w to modify the elements of u2,1 and u3,1 in the U matrix of each embedding block. The watermark is embedded by changing the relation between the second (u2,1 ) and the third (u3,1 ) elements in the first column. If the embedded binary watermark bit is 1, the value of (u2,1 − u3,1 ) should be negative and its magnitude is greater than a threshold T. If the embedded binary watermark bit is 0, the value of (u2,1 − u3,1 ) should be positive and its magnitude is greater than a threshold T. When these two conditions are violated, the elements of u2,1 and u3,1 should be modified as u2,1 and u3,1 , respectively, based on the following rules in Eqs. (6) and (7). u2,1 = sign(u2,1 ) × (Uavg + T/2) if w = 1 &u2,1 − u3,1 < −T, then if w = 0 &u2,1 − u3,1 < T, then (6) u3,1 = sign(u3,1 ) × (Uavg − T/2) u2,1 = sign(u2,1 ) × (Uavg − T/2) (7) u3,1 = sign(u3,1 ) × (Uavg + T/2) where sign (x) presents the sign of x, Uavg = (u2,1 + u3,1 )/2, |x| denotes the absolute value of x. Step 5. Obtain the watermarked component image by performing inverse SVD to all selected blocks subsequently. Step 6. Repeat step 3-step 5 until all watermark bits are embedded in the host image. Finally, recombine the watermarked R, G, B components and the watermarked image H is obtained. The steps in the watermark extraction procedure are as follows: Step 1. The watermarked image H is divided into R, G, B component images, which are further divided into watermarked blocks with size of 4 × 4 pixels, respectively. Step 2. Apply SVD to watermarked image block and get the U matrix of each block. Step 3. The relation between the second and the first elements in the first column of the U matrix is used to extract the watermark information w , as shown in Eq. (8). w = 0, if u2,1 > u3,1 1, if u2,1 ≤ u3,1 (8) Step 4. Repeat step 2–step 3 until all embedded image blocks are performed. These extracted bit values are converted to decimal format, then the inverse-Arnold transform based on the private key K is executed and the extracted watermark of each component is reconstructed. Step 5. Reconstruct the final extracted watermark W from the extracted watermarks of the three components. 4. Experiment results In this experiment, all 24-bit 512 × 512 color images in the CVGUGR image database are used as the host images [12]. Additionally, two 24-bit color images with size of 32 × 32, as shown in Fig. 2(a) and (b), are used as original watermarks. Generally, the bigger the size of image block is, the smaller the watermark capacity is, the worse the watermark invisibility is and Please cite this article in press as: S.-l. Jia, A novel blind color images watermarking based on SVD, Optik - Int. J. Light Electron Opt. (2014), http://dx.doi.org/10.1016/j.ijleo.2014.01.002 G Model ARTICLE IN PRESS IJLEO-54174; No. of Pages 7 S.-l. Jia / Optik xxx (2014) xxx–xxx 4 Table 1 NC values of different elements in first column of U matrix after SVD. Image NC (U1,1 ,U2,1 ) NC (U1,1 ,U3,1 ) NC (U1,1 ,U4,1 ) NC (U2,1 ,U3,1 ) NC (U2,1 ,U4,1 ) NC (U3,1 ,U4,1 ) Lena House Peppers F16 Baboon Bear Kid Sailboat Barbara Couple Average 0.9934 0.9966 0.9673 0.9921 0.9709 0.9153 0.9942 0.9879 0.9882 0.9323 0.9738 0.9886 0.9942 0.9482 0.9873 0.9589 0.8848 0.9896 0.9798 0.9785 0.9006 0.9610 0.9871 0.9935 0.9444 0.9815 0.9525 0.8839 0.9823 0.9779 0.9728 0.8907 0.9567 0.9969 0.9990 0.9871 0.9972 0.9796 0.9564 0.9962 0.9967 0.9947 0.9818 0.9886 0.9901 0.9949 0.9554 0.9884 0.9579 0.9069 0.9852 0.9796 0.9814 0.9219 0.9662 0.9940 0.9969 0.9692 0.9940 0.9716 0.9341 0.9919 0.9876 0.9913 0.9538 0.9784 the better the watermark robustness is, vice verse. Meanwhile, the bigger the threshold T is, the worse the watermark invisibility is and the better the watermark robustness is, vice verse. Considering the tradeoff between the invisibility and the robustness of watermarking and based on many experiments, let the size of image block be 4 × 4 and the threshold T be 0.040. For the imperceptible capability, the structural similarity (SSIM) index as a new method is used to measure the similarity between the original color image H and the watermarked image H . SSIM is designed to improve on traditional methods like peak signalto-noise ratio (PSNR) and mean squared error (MSE), which have proved to be inconsistent with human eye perception [13]. The detailed SSIM is defined as follows: SSIM(H, H ) = l(H, H )c(H, H )s(H, H ) (9) where ⎧ 2H H + C1 ⎪ l(H, H ) = 2 ⎪ ⎪ + 2 + C1 ⎪ H ⎪ H ⎪ ⎨ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎩ c(H, H ) = 2H H + C2 H2 + 2 H (10) + C2 + C3 s(H, H ) = HH H H + C3 The first term in Eq. (10) is the luminance comparison function which measures the closeness of the two images’ mean luminance (H and H ). This factor is maximal and equal to 1 only if H = H . The second term is the contrast comparison function which measures the closeness of the contrast of the two images. Here the contrast is measured by the standard deviation H d H . This term is maximal and equal to 1 only if H = H . The third term is the structure comparison function which measures the cor relation coefficient between the two images H and H . Note that HH is the covariance between H and H . The positive values of the SSIM index are in [0,1]. The result 0 means no correlation between images, and 1 means that H = H . The larger the SSIM value is, the more imperceptible the embedded watermark is. That is, the watermarked image is very similar to the original ones. The positive constants C1 , C2 and C3 are used to avoid a null denominator. Moreover, Normalized cross-correlation (NC), which calculated by the color original watermark image and the extracted watermark W in Eq. (11), is used to measure the robustness of the watermarking [14,15]. Q P 3 NC = (W (x, y, i) × W (x, y, i)) i=1 x=1 y=1 3 P Q 3 P Q 2 2 [W (x, y, i)] [W (x, y, i)] i=1 x=1 y=1 i=1 x=1 y=1 (11) Fig. 3. Original host images: (a) Lena, (b) Avion, (c) Peppers, (d) TTU. In which, P, Q respectively denote the width and height of the watermark image. Generally, the NC can take any value between 0 and 1. If the NC value is closer to 1, the extracted watermark is getting more similar to the embedded one, which means that the watermarking has strong robustness. In general, the watermark may be efficient if the NC is more than or equal to 0.750, conversely maybe inefficient [16]. 4.1. Invisibility test In order to fairly evaluate and prove the invisibility of watermark, as shown in Fig. 3, three standard 24-bit color images (Lena, Avion, Peppers) with size of 512 × 512 are selected from the [11] and one image (TTU) from [14]. Fig. 4 illustrates the watermarked color images and their SSIM values, and shows the comparison of extracted watermarks between [11] and the proposed method without any attacks. The NC values are close to 1, which shown the extracted watermark is very similar to the original watermark, and the extracted watermark also has proved the matter. In addition, the watermark that extracted from the watermarked image by the proposed scheme has a little better visual performance than the method in [11]. The SSIM values are also equal to 1, which illustrates the method [11] and the proposed method all have better watermark hiding feature. Relatively, the proposed method is superior to the method [11], which because the tradeoff between the invisibility and the robustness is considered in this proposed method, that is, the bigger threshold T is, the worse the invisibility is and the better the robustness is, and vice versa. 4.2. Robustness test JPEG compression attack is one of the common attacks that should be verified in watermarking algorithm. In this experiment, the watermarked Lena image is lossy-compressed with different compression factors from 10 to 100. JPEG 2000 is developed by the JPEG in the aim of improving the properties of the JPEG standard. The watermarked Lena image is also performed by JPEG 2000 compression with the compression ratio from 1 to 10 increasing in steps of 1. Please cite this article in press as: S.-l. Jia, A novel blind color images watermarking based on SVD, Optik - Int. J. Light Electron Opt. (2014), http://dx.doi.org/10.1016/j.ijleo.2014.01.002 G Model IJLEO-54174; No. of Pages 7 ARTICLE IN PRESS S.-l. Jia / Optik xxx (2014) xxx–xxx 5 Fig. 4. The watermarked color images and the extracted watermarks without any attacks. In addition, a salt & peppers noising scheme is performed by generating noise to corrupt the watermarked Lena image. The noising scheme generates 2% and 10% noise, respectively, to degrade the watermarked images. Moreover, the Gaussian noising is also added to corrupt the watermarked image. The mean of Gaussian parameters are set to 0.1, 0.3, respectively. In the procedure of sharpening, the radii are 0.2 and 1.0, respectively. And two scaling operations of 400% and 25% are utilized to deteriorate the watermarked Lena image. In the blurring attacks, two cases are simulated here to degrade the two watermarked images. The radius in the first case is 0.2. After the above image attacks, the part extracted watermarks can be list in the Fig. 5. To highlight the robustness of the proposed method, many other kinds of image watermarking attacks are also tested with the Lena image. Table 2 lists the NC results compared with the method in [11]. From Table 2, it can be seen that the proposed watermarking method has strong robustness against some common attacks, including salt & pepper noise, Gaussian noise, contrast adjustment, median filtering, scaling, blurring, sharpen and cropping attacks. In order to further prove the robustness of the proposed methods, we also compared to the method [14]. In [14], two color images, ‘Peppers’ and ‘TTU’, were used as the host image in Fig. 3(c) and (d), one color image was viewed as the watermark image in Fig. 2(b) and all attacks in Table 3 came from the [14]. It can be seen from Table 3, the robustness of watermark in the proposed method is superior to the method in [14]. Table 2 NC values comparison between Golea et al. [11] and the proposed scheme under some common attacks. Attack types Parameters Golea et al. [11] Proposed method Salt and pepper noise 0.02 0.04 0.06 0.08 0.1 0.1 0.2 0.3 0.4 0.5 default 1×1 2×2 3×3 4×4 5×5 0.5 1.5 2 2.5 0.1 1 0.1 0.2 10:100,10:100 40 90 10:1 0.5167 0.3350 0.27242 0.2364 0.2150 0.8158 0.8600 0.8327 0.8164 0.7469 0.9913 0.9936 0.6519 0.5074 0.3792 0.3217 0.5698 0.7714 0.8385 0.7892 0.9936 0.2702 0.8481 0.7808 0.8706 0.7257 0.9772 0.8071 0.9970 0.9938 0.9870 0.9782 0.9730 0.9579 0.9537 0.9111 0.8265 0.7431 1.0000 1.0000 0.8950 0.7136 0.7001 0.6708 0.9037 0.9932 0.9921 0.9943 1.0000 0.8804 0.9994 1.0000 0.9297 0.8772 0.9955 0.9587 Gaussian noise Contrast adjustment Median filtering Scaling Blurring Sharpening Cropping JPEG JPEG2000 Please cite this article in press as: S.-l. Jia, A novel blind color images watermarking based on SVD, Optik - Int. J. Light Electron Opt. (2014), http://dx.doi.org/10.1016/j.ijleo.2014.01.002 G Model IJLEO-54174; No. of Pages 7 ARTICLE IN PRESS S.-l. Jia / Optik xxx (2014) xxx–xxx 6 Table 3 Comparison results of extracted watermarks in terms of visual perception and NC values for Peppers and TTU images. Host image Attack type Chou et al. [14] NC Proposed method Extracted watermark NC Peppers Low-pass filtering 0.539 0.8906 Peppers Crop50% 0.553 0.9288 Peppers Scale 1/4 0.536 0.8272 Peppers Scale 4 0.851 0.9657 Peppers Rotation 30 – – Peppers JPEG compression ratio of 12 0.439 0.9978 Peppers JPEG compression ratio of 27.5 0.343 0.9340 TTU Low-pass filtering 0.423 0.8781 TTU Gaussian noises addition variance 4 0.982 0.9239 TTU Gaussian noises additionvariance 25 0.360 0.7535 TTU Median-filtering 0.170 0.2788 Extracted watermark Please cite this article in press as: S.-l. Jia, A novel blind color images watermarking based on SVD, Optik - Int. J. Light Electron Opt. (2014), http://dx.doi.org/10.1016/j.ijleo.2014.01.002 G Model IJLEO-54174; No. of Pages 7 ARTICLE IN PRESS S.-l. Jia / Optik xxx (2014) xxx–xxx 7 Fig. 5. Extracted watermarks after different attacks: (a) contrast adjustment, (b) cropping, (c) JPEG 70 (d) median filtering 3 × 3, (e) JPEG2000 CR 10:1, (f) scaling 0.5, (g) scaling 2.5, (h) sharpening 0.2, (i) sharpening 0.1, (j) Gaussian noise 0.1, (k) Gaussian noise 0.5, (l) salt & pepper noise 0.002, (m) salt & pepper noise 0.01, (n) blurring 1.0, (o) blurring 0.1. 5. Conclusions An image watermarking scheme SVD-based for protecting copyrights is proposed in this paper. This method has the following advantages: 1) the embedded watermark image is color image, 2) the color watermark image is embedded into a color host image by modifying the relation between the second (u2,1 ) and the third (u3,1 ) elements of U matrix in each block after SVD, 3) the false positive detection problem that existing in most SVD-based watermarking algorithm is overcame, and 4) this method belongs to blind manner. The experimental results show that the proposed scheme succeeds in making the watermark perceptually invisible and also robust against various signal processing operations and geometric attacks. Therefore, we conclude that the new proposed scheme is more suitable for using color image information to protect the copyright of color images that will be transmitted on the Internet. As for future work, the artificial intelligent optimization algorithm will be utilized to improve the watermarking performance. Acknowledgements The authors would like to thank anonymous referees for their valuable comments and suggestions which lead to substantial improvements of this paper. References [1] H.M. Al-Otum, N.A. Samara, A robust blind color image watermarking based on wavelet-tree bit host difference selection, Signal Process. 90 (2010) 2498–2512. [2] R. Liu, T. Tan, An SVD-based watermarking scheme for protecting rightful ownership, IEEE Trans. Multimed. 4 (2002) 121–128. [3] K.-L. Chung, C.-H. Shen, L.-C. Chang, A novel SVD- and VQ-based image hiding scheme, Pattern Recog. Lett. 22 (2001) 1051–1058. [4] C.-C. Chang, P. Tsai, C.-C. Lin, SVD-based digital image watermarking scheme, Pattern Recog. Lett. 26 (2005) 1577–1586. [5] K.-L. Chung, W.-N. Yang, Y.-H. Huang, S.-T. Wu, Y.-C. Hsu, On SVD-based watermarking algorithm, Appl. Math. Comput. 188 (2007) 54–57. [6] M.-Q. Fan, H.-X. Wang, S.-K. Li, Restudy on SVD-based watermarking scheme, Appl. Math. Comput. 203 (2008) 926–930. [7] R. Sun, H. Sun, T. Yao, SVD and quantization based semi-fragile watermarking technique for image authentication, Proc. Internat. Conf. Signal Process 2 (2002) 1952–1955. [8] A.A. Mohammad, A. Alhaj, S. Shaltaf, An improved SVD-based watermarking scheme for protecting rightful ownership, Signal Process. 88 (2008) 2158–2180. [9] C.-Q. Yi, L. Li, A.-Q. Lv, L. Qu, Color image watermarking algorithm based on DWT-SVD, in: IEEE International Conference on Automation and Logistics, 2007, pp. 2607–2611. [10] S.-C. Pei, H.-H. Liu, T.-J. Liu, K.-H. Liu, Color image watermarking using SVD, in: IEEE International Conference on Multimedia and Expo (ICME), 2010, pp. 122–126. [11] N.E.H. Golea, R. Seghir, R. Benzid, A bind RGB color image watermarking based on singular value decomposition, in: IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), 2010, pp. 1–5. [12] University of Granada, Computer Vision Group. CVG-UGR Image Database.[2012–10–22]. http://decsai.ugr.es/cvg/dbimagenes/c512.php [13] Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, Image quality assessment: from error visibility to structural similarity, IEEE Trans. Image Process. 13 (4) (2004) 600–612. [14] C.-H. Chou, T.-L. Wu, Embedding color watermarks in color images, Eurasip J. Adv. Signal Process. 1 (2003) 32–40. [15] A. Al-Gindy, H. Al-Ahmad, R. Qahwaji, A. Tawfik, A high capacity digital watermarking technique for the authentication of colour images, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) (2009) 37–42. [16] L. Li, X. Yuan, Z. Lu, J. Pan, Rotation invariant watermark embedding based on scale-adapted characteristic regions, Inform. Sci. 180 (15) (2010) 2875–2888. Please cite this article in press as: S.-l. Jia, A novel blind color images watermarking based on SVD, Optik - Int. J. Light Electron Opt. (2014), http://dx.doi.org/10.1016/j.ijleo.2014.01.002