Robust Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation
Digital content protection is one of the most significant research areas that lies at the intersection of cyber-security and multimedia processing. Protect multimedia content from copyright violation, unauthorized use, replication, and online content theft is needed. Digital Image Watermarking is utilized to preserve the copyright of different digital images from forgery. Various techniques had been developed in this regard with two main issues, the method robustness and the resistance against various types of attacks like, Salt and Pepper noise, filtering and blurring. Current digital watermarking techniques may reduce the quality of the original digital media content if it is not robust. The purpose of this research is to create a robust image watermarking technique against different attack types such as salt and pepper noise and Gaussian noise, ensuring the image content is protected. Specifically, this study proposed a new mechanism for Image watermarking based on combining Discrete Wavelet Transform (DWT), and Discrete Cosine Transform (DCT). Additionally, Particle Swarm Optimization (PSO) was applied to perform the optimization for both the embedding and extraction processes. At the final stage we assess the proposed approach against some types of attacks such as Additive White Gaussian Noise (AWGN). The Denoising Convolutional Neural Network, (DnCNN) was used to evaluate the mechanism against AWGN. For testing, we utilized measures such as Peak Signal-to-Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC). The experimental results of implementing our proposed method for embedding and extracting watermarks across various host image sizes were encouraging, achieving a PSNR ratio of 0.998 and an NCC of 1 in the absence of attacks. Additionally, our evaluation revealed that a specific type of denoising attack, while damaging the watermark (though not completely), actually improved the image quality. It is also important to highlight that our findings surpassed those reported in existing literature, with the PSNR and NCC values serving as evidence of this superior performance.
[1] Abraham J. and Paul V., “An Imperceptible Spatial Domain Color Image Watermarking Scheme,” Journal of King Saud University- Computer and Information Sciences, vol. 31, no. 1, pp. 125-133, 2019. https://doi.org/10.1016/j.jksuci.2016.12.004
[2] Ahvanooey M., Li Q., Shim H., and Huang Y., “A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents,” Security and Communication Networks, pp. 1-22, 2018. https://doi.org/10.1155/2018/5325040
[3] Al-Fayoumi M., Al-Mimi H., Veisi A., Al-Aqrabi H., Daoud M., and Eftekhari-Zadeh E., “Utilizing Artificial Neural Networks and Combined Capacitance-Based Sensors to Predict Void Fraction in Two-Phase Annular Fluids Regardless of Liquid Phase Type,” IEEE Access, vol. 11, pp. 143746-143747, 2023.
[4] Alia M. and Suwais K., “A Novel Steganography Scheme Based on Fractal Set,” The International Arab Journal of Information Technology, vol. 17, no. 1, pp. 128-136, 2020.
[5] Al-Madi R., Saleh K., and Tarawneh M., “A Comprehensive Review on Digital Watermarking Security and Performance Evaluation,” Journal of Computational Security, vol. 29, no. 1, pp. 102- 121, 2024.
[6] AL-Nabhani Y., Jalab H., Wahid A., and Noor R., “Robust Watermarking Algorithm for Digital Images Using Discrete Wavelet and Probabilistic Neural Network,” Journal of King Saud University-Computer and Information Sciences, vol. 27, no. 4, pp. 393-401, 2015.
[7] Alsarayreh M., Alia M., and Abu-Maria K., “A Novel Image Steganographic System Based on Exact Matching Algorithm and Key-Dependent Data Technique,” The International Arab Journal of Information Technology, vol. 95, no. 5, pp. 1212-1224, 2017.
[8] Blum C. and Merkle D., Swarm Intelligence: Introduction and Applications, Springer Science and Business Media, 2008.
[9] Chang J., Chen B., and Tsai C., “LBP-based Fragile Watermarking Scheme for Image Tamper Detection and Recovery,” in Proceedings of the International Symposium on Next-Generation Electronics, Kaohsiung, pp. 173-176, 2013.
[10] Chopra D., Gupta P., Sanjay G., and Gupta A., “LSB based Digital Image Watermarking for Gray Scale Image,” IOSR Journal of Computer Engineering, vol. 6, no. 1, pp. 36-41, 2012.
[11] Chunwei T., Lunke F., Wenxian Z., Yong X., Wangmeng Z., and Chia-Wen L., “Deep Learning on Image Denoising: An Overview,” Neural Networks, vol. 131, pp. 251-275, 2020. https://doi.org/10.1016/j.neunet.2020.07.025.
[12] Cruz C., Foi A., Katkovnik V., and Egiazarian K., “Nonlocality-Reinforced Convolutional Neural Networks for Image Denoising,” IEEE Signal Processing Letters, vol. 25, no. 8, pp. 1216-1220, 2018. DOI: 10.1109/LSP.2018.2850222
[13] Dixit A. and Dixit R., “A Review on Digital Image Watermarking Techniques,” International Journal of Image, Graphics and Signal Processing, vol. 9, no. 4, pp. 56-66, 2017.
[14] Dong C., Loy C., He K., and Tang X., “Image 976 The International Arab Journal of Information Technology, Vol. 21, No. 6, Novmber 2024 Super-Resolution Using Deep Convolutional Networks,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 38, no. 2, pp. 295-307, 2015.
[15] Engelbrecht A., Fundamentals of Computational Swarm Intelligence, Wiley, 2005.
[16] Fukushima K., “A Self-Organizing Neural Network Model for A Mechanism of Pattern Recognition Unaffected by Shift in Position,” Biological Cybernetics, vol. 36, pp. 193-202, 1980. https://doi.org/10.1007/BF00344251
[17] Geng L., Zhang W., Chen H., Fang H., and Yu N., “Real-Time Attacks on Robust Watermarking Tools in the Wild by CNN,” Journal of Real-Time Image Processing, vol. 17, pp. 631-641, 2020.
[18] Goodfellow I., Pouget-Abadie J., Mirza M., Xu B., Warde-Farley D., Ozair S., Courville A., and Bengio Y., “Generative Adversarial Nets,” in Proceedings of the Conference on Advances in Neural Information Processing Systems, Montreal, pp. 2672-2680, 2014. https://doi.org/10.48550/arXiv.1406.2661
[19] Gu S. and Timofte R., “A Brief Review of Image Denoising Algorithms and Beyond,” Inpainting and Denoising Challenges, pp. 1-21, 2019. https://doi.org/10.1007/978-3-030-25614-2_1
[20] Hatoum M., Couchot J., Couturier R., and Darazi R., “Using Deep Learning for Image Watermarking Attack,” Signal Processing: Image Communication, vol. 90, 2021. https://doi.org/10.1016/j.image.2020.116019
[21] Jana M. and Jana B., “A new DCT Based Robust Image Watermarking Scheme Using Cellular Automata,” Information Security Journal: A Global Perspective, vol. 31, no. 5, pp. 527-543, 2022.
[22] Kumar A., “A Review on Implementation of Digital Image Watermarking Techniques Using LSB and DWT,” in Proceedings of the Information and Communication Technology for Sustainable Development Conference, New Delhi, pp. 595-602, 2020.
[23] Lucas A., Iliadis M., Molina R., and Katsaggelos A., “Using Deep Neural Networks for Inverse Problems in Imaging: Beyond Analytical Methods,” IEEE Signal Processing Magazine, vol. 35, no. 1, pp. 20-36, 2018. DOI:10.1109/MSP.2017.2760358
[24] Quan Y., Teng H., Chen Y., and Ji H., “Watermarking Deep Neural Networks in Image Processing,” IEEE Transactions on Neural Networks and Learning Systems, vol. 32, no. 5, pp. 1852-1865, 2020.
[25] Rani A., Bhullar K., Dangwal D., and Kumar S., “A Zero-Watermarking Scheme using Discrete Wavelet Transform,” in Proceedings of the 4th International Conference on Eco-Friendly Computing and Communication Systems, Manchester, pp. 603-609, 2015. https://doi.org/10.1016/j.procs.2015.10.046
[26] Singh A., Kumar B., Singh G., and Mohan A., “Digital Image Watermarking: Concepts and Applications,” Medical Image Watermarking: Techniques and Applications, pp. 1-12, 2017. https://doi.org/10.1007/978-3-319-57699-2_1
[27] Sridhar S., Digital Image Processing, Oxford Publications, 2016.
[28] Wadhera S., Kamra D., Rajpal A., Jain A., and Jain V., “A Comprehensive Review on Digital Image Watermarking,” arXiv Preprint, vol. arXiv:2207.06909, 2022.
[29] Yadav N., Rajpoot D., and Dhakad S., “Optimization of Watermarking in Image by Using Particle Swarm Optimization Algorithm,” in Proceedings of the 6th International Conference on Signal Processing and Communication, Noida, pp. 85-90, 2020.
[30] Yadav N., Rajpoot D., and Dhakad S., “Enhancing Digital Image Watermarking Using Deep Learning Approaches,” Journal of Image Processing and Security, vol. 25, no. 3, pp. 451- 467, 2023.
[31] Zhang K., Zuo W., Chen Y., Meng D., and Zhang L., “Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising,” in Proceedings of the IEEE Transactions on Image Processing, vol. 26, no. 7, pp. 3142-3155, 2017. doi: 10.1109/TIP.2017.2662206
[32] Zhou Y., Chellappa R., and Jenkins B., “A Novel Approach to Image Restoration Based on a Neural Network,” in Proceedings of the International Conference on Neural Networks, San Diego, pp. 269-276, 1987.