1 Introduction
Hiding information in image has been widely used in recent years. The numerous applications of hiding information in today’s life have made this science be divided into subcategories, based on the application. The two main subcategories of information hiding are watermarking and steganography. A common important point in these subcategories is the hiddenness of the message, watermark, data, or information. In steganography methods, the goal is to transfer the information through an image securely and invisibly, so that embedding does not create tangible changes in the image and is not recognizable through steganalysis methods that attempt to detect whether carrying the message or not by an image ref001 ; ref002 ; ref003 .
Today, with the growth of virtual communications and the dramatic advance of the Internet, access to text, audio, image and video is provided to everyone, and protecting these documents against the forgery, manipulation, and violation of property rights is a requirement of such a space. Without losing the whole subject, using encryption methods and digital signature, changes made in the digital image can be found, however, this only works until the unintentional attacks, such as compression, image quality processing, poor noise, etc., cause no change in the image; since the digital signature accompanying the image will not be the same as what is extracted by the receiver. In this case, it can only be determined whether the image has changed or not, and the intentional or unintentional attack cannot be determined.
The watermarking can be divided based on the amount of information required to extract the watermark in the destination into three blind, semiblind, and nonblind categories. In the blind watermarking, the main signal is not required during the extraction process, and only the keys are needed. In other words, in these methods, the unembedded original image is not needed to extract the watermark, and only the watermarked image and a few simple keys are needed ref4 ; ref9
. In semiblind watermarking, in some cases, we need additional information to extract the watermark. For example, in some SVDbased methods, to extract the embedded watermark in the destination additional information (such as eigenvectors of the original image) is required
ref6 ; ref10 ; ref11 ; ref12 . In the nonblind watermarking, the original image is required to extract the watermark. These methods are generally more robust than blind watermarking methods, instead, are not very common and functional due to the need to send additional information ref13 ; ref14 ; ref15 .In terms of embedding domain, the watermarking is divided into two categories of spatial domain and transform domain. The spatial domainbased methods spread the watermark data in pixel values of the original image and creates a very small change in image brightness. This methods have less computational complexity and do not require a specific transform. The spatial domainbased methods, although performs well in terms of imperceptibility, operate poorly in terms of robustness to signal processing attacks such as image compression, low pass filtering and noises. The simplest method of this domain is embedding the watermark in the least significant bits of image pixels ref16 ; ref17 . To provide simultaneous imperceptibility and robustness, the watermark is embedded in the transform domain of cover image. In this method, coefficients of transformed image are changed to embed the watermark. The domain of the transform is also called the frequency domain; since the signal is changed from its original form and decomposed into frequency components. The most important and widely used methods in the frequency domain are the discrete cosine transform (DCT), the discrete wavelet transform (DWT), the integer wavelet transform (IWT) and other transforms of the XLet family ref18 ; ref19 ; ref20 .
In order to protect the property rights of an image, it is necessary to insert the watermark in the image in a robust manner that is resistant to unintentional attacks such as image compression, adding noise, resizing, and even cutting some part of the image. In this paper, a blind watermarking based on Arnold Cat map method, a fast discrete curvelet transform (FDCuT), and a DCT transform is proposed which uses two random pseudonoise with a low correlation as the symbol of the bits 0 and 1 of the watermark. This method has the high robustness to intentional and unintentional manipulation, such as intense noises, image compression, and image quality enhancements processing. The rest of the structure of this article is such that in Section 2, related works was investigated. In Section 3, the proposed method is described in detail. In sections 4 and 5, the results of the experiments and conclusion are presented, respectively.
2 Related Work
In this section, a number of robust watermarking methods compared in the evaluation section of the proposed method are briefly described and their main ideas are expressed.
In ref7 , an LWTbased blind robust watermarking method was proposed that uses the quantization method of the LH3 subband coefficients for embedding. In this method, the coefficients in the LH3 subband are subjected to disturbance and then grouped into blocks. The coefficients in each block are arranged, and then two values as the difference between the two maximum and the difference of the two minimum coefficients are obtained. If the difference between the two minimum coefficients is lower than the τ threshold, then the block is considered as an embeddable block. Moreover, to embed in each embeddable block, quantization of the maximum value of that block is used.
In ref8 , a blind robust watermarking based on quantization through dither modulation has been proposed which, in addition to optimal robustness, maintains the visual quality of the image. In this method, three levels of discrete wavelet transform are performed on the host image, and then the LH3 and HL3 coefficients are selected and grouped. In this method, the difference between the two minimum and maximum values in each group is calculated and used in the quantization process.
In ref4 , a robust blind watermarking method based on BCH error correction coding and the Spread spectrum method is proposed. In this method, the second level approximation subband of the discrete wavelet transform was used as the embedding location of the watermark. In this method, the LL2 subband are divided into nonoverlapping blocks and the high frequency coefficients of each block are selected for embedding the watermark. In this method, Spread Spectrum technique is used as embedding method. Moreover, the watermark bits are encoded by BCH error correction codding before embedding. The robustness of this method against attacks, especially compression, is significant.
In ref6
, a semiblind watermarking method is proposed based on the DWT transform and singular values decomposition (SVD). In this way, in order to increase security, the watermark is first encrypted with a public key and RSA algorithm. Then a DWT transform level is calculated from the host image and the approximate subband is selected for embedding. The encoded watermark information is embedded in the eigenvalues of LL1 approximation subband of cover image. The robustness and the image quality of this watermarking method are high, however, there is the point that it is a semiblind method, and in order to extract the watermark, the right and left matrices (U, V) obtained from SVD decomposition of the host image are required, which is a weakness for this method.
3 Proposed method
The proposed algorithm involves the advantages of several methods such as Arnold Cat map, FDCuT transform, DCT transform, and two weak correlated noises. Each method and using trend in the proposed method are presented in subsections 3.1, 3.2, 3.3 and 3.4, respectively. The embedding and extraction way will be expressed in subsections 3.5 and 3.6, respectively. The flowchart of the embedding operation of the proposed method is shown in Fig. 1.
3.1 Arnold Cat Map
Arnold Cat map is a twodimensional mapping, and when applied to a digital image, it changes the original location of the pixels randomly. Arnold Cat map is one of the widely used image processing transforms in the field of encryption and watermarking. This map is a simple, periodic, and reversible transform. The periodicy and reversibility of a transform mean that if we apply a transform successively to a given matrix, then the initial data will be obtain after a complete period. This map is defined as the equation 1
(1) 
In equation 1, , and is the size of host image. and are control parameters and increase the security in determining the mapping periodicity. is the main location of image pixels and is the location of the mapped pixels. This mapping does not change the intensity of the image and only image data are disturbed. After several repetitions, the relationship between adjacent pixels is completely disturbed and the image looks distorted and meaningless ref1 . Using this mapping as a preprocess in watermarking increases the security and reduces the possibility of targeted attacks. In the proposed method, the original image is Arnold mapped by Key1 (number of repetitions), 𝑎 and 𝑏 keys, and after disturbance of the pixels are subjected to the other algorithm phases. In addition to the security advantage that Arnold mapping provides, this mapping distributes the changes caused by embedding the watermark with a strong gain factor parameter in the entire image, which is not visually recognizable. However, using a strong power parameter without using Arnold mapping, the changes will be noticeable visually.
3.2 Fast discrete curvelet transform (FDCuT)
One of the multiscale transforms is the curvelet transform, which works better in distinguishing edges and curves compared to the other transform, and is more accurate to approximate and describe the dispersion and direction. Curvelet transform was first introduced on the basis of filtering the subbands and Ridgelet transform and is known as the first type curvelet. Due to defects in the first type curvelet, the second generation curvelet was presented based on the filtering the bypass in the Fourier domain. In the second generation curvelet, it initially takes a twodimensional Fourier transform from the image, and then the image is fragmented into a series of discrete regions by a window in the frequency domain
ref2 . Then, the data are wrapped around the origin, finally the twodimensional inverse Fourier transform is calculated on the wrapped data in order to calculate the curvelet coefficients.Two types of fast discrete curvelet implementations are the Unequally Spaced Fast Fourier Transform USFFTbased curvelet and Wrappingbased curvelet. The first step in curvelet transform is decomposition of the signal into the subbands. These discrete transforms receive the Cartesian arrays (twodimensional image) as as the input and create the coefficients as the equation 2.
(2) 
Where is the waveform digital curvelet, and represents the Digital word. The steps of discrete Wrapping curvelet transform briefly is as the following steps:

Obtain Fourier coefficients by applying FFT.

Perform the following substeps for each scale and direction:

Obtain the multiplication of , where is the parabolic window.

Wrap the multiplication around the origin and obtain , where and .

Calculate the discrete coefficients by applying the inverse FFT transform on the wrapped date, where, is obtained.

algocf[t!]
algocf[t!]
In Fig. 2, the result of applying a wrapbased FDCuT is provided for a 512512 image. The FDCut transform divides the input image into a 2121 approximation subband, 4 moderate frequency subband with a 16orientation parameter, and finally, a detail subband with the same size of the original image. The approximation subband ( 2121 pixels) of image is presented in the central part of the Fig. 2b. Medium frequency subbands and detail subband are presented respectively in black and gray. In the proposed method, the result of Arnold Cat mat is divided into 6464 nonoverlapping blocks. Then, the FDCuT transform is applied on each block in order to get approximation subband. In the proposed method, approximation subband of each block is used for embedding just one bits of watermark. The reason for choosing the approximation subband for embedding the watermark is it’s robustness against watermarking attacks and its appropriate distribution of information in the whole image.
3.3 Discrete Cosine Transform (DCT)
Discrete cosine transform (DCT) is a method that transforms the spatial domain signal to frequency coefficients. DCT is one of the most prominent linear transforms, which is applicable in energy compression. The equation of discrete cosine transform is as the equation
3:(3) 
where
(4) 
The low, moderate, and high frequencies are shown in Fig. 3, respectively, with LF, MF, and HF. Embedding information in LF coefficients provides the highest robustness against attacks such as JPEG compression. However, this will create the most destructive effect on the image. The embedding at the HF frequency has a relatively low robustness, but instead has a slight damage to the image. In this paper, robustness is provided because of the fact that the watermark information is embedded into the approximation subband calculated by FDCuT transform. However, in order to reduce the degradation effect of the embedding, the HF frequency coefficients of approximate subband is used to embed a bit of the watermark in each block.
3.4 Weak correlation noises
In the proposed method, two random pseudonoise strings using the alphabet 1, 0, 1 and to the number of coefficients in the HF frequency of each block (Fig. 3), are constructed as the symbol of the bit 0 and 1. Correlation of this two strings must be weak. The advantage of a weak correlation between the two randomly generated pseudonoise strings shows itself at the extraction stage, since if the correlation not be weak, then due to the damage caused by the watermarking attacks on the image, the correlation of the two randomly embedded pseudonoise strings may be close together and may disturb detection of 0 or 1 of the watermark. Therefore, as far as possible, correlation of two randomly generated pseudonoise strings should be weak. The algorithm for producing two random pseudonoise strings is as the Alg. 1. In the Alg. 1, the Seed input is used to generate the same random values at the embedding and extraction stage. input represents the number of highfrequency coefficients of each block, to which two random pseudonoise strings must be generated. represents the function of calculating the correlation of the two randomly generated pseudonoise strings, which its equation is as Eq. 5. In Eq. 5, and are the mean of the two and matrices.
(5) 
3.5 Watermark Embedding
As stated in the previous subsections, the final location of the embedding watermark is the highfrequency coefficients generated from each 2121 block, as shown in Fig. 3. The value of these coefficients is close to zero, and changing them does not cause much side effects in the original image. In the proposed method, in each 2121 block, only one bit of watermark is embedded. Therefore, based on the 0 or 1 bit of the watermark, one of the two random pseudonoise strings must be embedded. The embedding method used in this paper is replacement method. In other words, the result of the multiplication of random pseudonoise strings in a relatively large gain factor, the random amplified pseudonoise strings are obtained and then one of the pseudonoise strings is replaced in the highfrequency coefficients of each block proportional to 0 or 1 bit of the watermark. The gain factor used in this embedding is much larger than the initial coefficient value and causes a change in the quality of the embedding image. However, as a result of using Arnold Cat map to create a disturbance in the pixel location, the changes from the random amplified pseudonoise string will not be visually recognizable. The embedding algorithm of the 64bit watermark in the host image is shown in Alg. LABEL:algo.embeding.
3.6 Watermark Extraction
After embedding the watermark in the host image, the embedded image may be intentionally or unintentionally attacked, and the extracted watermark is not exactly the same as the embedded watermark. The main parts in the extraction phase are similar to those in the watermark embedding steps. This means that at first the Arnold Cat map must be applied on the image by the keys similar to the embedding stage, and then divided into nonoverlapping 6464 blocks. Then, FDCuT and DCT transforms should be applied to each block to calculate the HF coefficients of each block. An important stage to be followed is to decide on the bit embedded in the desired block. To do this, the correlation between the calculated HF coefficients with the two randomly amplified pseudonoise strings is calculated for both of the 0 and 1 bit of the watermark. If the correlation of the HF coefficients with the amplified random pseudonoise string related to the bit 0 is greater than the amplified random pseudonoise string of bit 1, it indicates that the bit 0 was embedded, otherwise it indicates that the bit 1 was embedded. The watermark extraction algorithm is shown in algorithm 3.
4 Experimental result
In these experiments, 40 standard images of the USCSIPI image database were used ref21. Many of these images such as Lena, Zelda, Baboon, Camera Man, Pepper, etc. have been used repeatedly in watermarking and steganography as a test image. To create different attacks, the Matlab software was used to evaluate the proposed method and attempts were made to provide the more detailed explanations of the attack on the plots. The criterion referred in this paper and most articles is the peak signaltonoise ratio (PSNR). This criterion indicates the amount of noise added to the image by the watermark insertion in it. It is also used in image recovery techniques to evaluate the quality of the extracted image. Although this parameter does not exactly imply the invisibility of the visual watermark in the image, it provides a proper algebraic relationship for the optimal amount of changes in the image. The definition of this evaluating criterion is presented as the equation 6.
(6) 
Equation 6, represents the value of the PSNR in decibel unit. In this equation, is the original image, the watermarked image, the index of the images pixels, and is the number of pixels in each and images. The larger values of this criterion shows the imperceptibility of watermarking method. Regularly, the values of about 40 dB are acceptable values for this criterion in image watermarking 6.
One of the most commonly used criteria for evaluating the extracted watermark is normalized crosscorrelation (NC). The definition of this parameter is as the equation 7.
(7) 
In equation 7, and are respectively the embedded watermark and extracted watermark, and is the size of the watermark bits. The value of the watermark is assumed within , and the NC value will be 1 if there is no error in the extracted watermark. In fact, the closer this criterion to 1, the watermarking method is more robust ref5 .
The Gain factor parameter in this paper is 125 since, with this Gain factor, the average visual quality of the tested images is above 40 dB. As it is observed in Fig. 4b, with such a Gain factor, there are noticeable changes in the watermarked image. However, in Fig. 4c, where Arnold Cat map was used, the changes made in the watermarked image are not visibly observable and tangible. In fact, Arnold Cat map distributes the changes in the entire of image.
In Fig. 5, the output of the proposed method is shown on the 40 selected images in the presence of common image processing attacks. Furthermore, considering the fact that the standard Lena image is important from the standpoint of watermarking articles, the proposed method robustness to this image is shown separately into the plots. As it is observed, the proposed method has a high resistance to all kinds of noise, resizing and JPEG2000 compression. It should be noted that the compression rate used in the JPEG2000 attack indicates that how much the compressed image size is smaller than the original image. For example, the compression rate of 10 means that the compressed image will be a tenth of the original image size. Based on the results of Figure 5, it is concluded that the proposed method is robust against JPEG compression with a quality factor of 10, however, for JPEG compression with a quality factor below 10, the watermark is severely degraded. Additionally, the proposed method is capable of handling the resizing attack to the image to a quarter of the original size easily, however, if the image size is less than a quarter of the original size, the watermark will be degraded and cannot be extracted.
The comparison of the proposed method results with four robust methods presented in recent years is shown in Tables 1 and 2. For this comparison, the same images are used. Moreover, the Gain factor parameter is set to match the quality of the embedded image obtained by the proposed method and the compared methods. In this comparison, it was attempted to evaluate the same attacks on the watermarked images. As it can be seen, the proposed method in most cases has more robustness to attacks than the compared methods, however, the robustness of the proposed method against JPEG compression attack is at the same level of the compared methods or less.
5 Conclusion and future work
In this paper, a robust and blind image watermarking technique was proposed that has the ability to extract embedded watermark after strong attacks such as intense noise, image compression, and image quality enhancements processing. In this method, two pseudonoise strings with weak correlation are constructed as the symbol of each bit 0 and 1 of the watermark. The embedding location in this method is the high frequency coefficients of the approximation subband of FDCuT transform. Arnold Cat map is used to enhance the security and imperceptibility of embedding. Using Arnold Cat map as a preprocessing in this method provides the possibility of amplifying two pseudonoise strings as possible, thereby enhancing the robustness of the proposed method. In order to more accurately evaluate and compare the proposed method with recent robust methods, it was tried to perform the comparison in the same test conditions, such as the same image and the same embedded image quality. Comparison of the proposed method with recent robust methods indicates the high robustness of the proposed method.
As the future work, the proposed method can be evaluated on colorful images, and different subbands and features of the colorful images can be used to increase the robustness of the proposed method. Some methods such as SIFT and SURF can also be used to find the key points and embed the watermark in those locations to make the proposed method robust against rotation attacks.
References
References

(1)
Valandar MY, Ayubi P, Barani MJ. A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications. 2017 Jun 1;34:14251.

(2)
Soleymani SH, Taherinia AH. High capacity image steganography on sparse message of scanned document image (SMSDI). Multimedia Tools and Applications. 2017 Oct 1;76(20):2084767.

(3)
Mohammadi FG, Sajedi H. Region based Image Steganalysis using Artificial Bee Colony. Journal of Visual Communication and Image Representation. 2017 Apr 30;44:21426.

(4)
Shang Z, Ren H, Zhang J. A block location scrambling algorithm of digital image based on Arnold transformation. InYoung Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for 2008 Nov 18 (pp. 29422947). IEEE.

(5)
Candes E, Demanet L, Donoho D, Ying L. Fast discrete curvelet transforms. Multiscale Modeling & Simulation. 2006 Sep 26;5(3):86199.

(6)
Soleymani SH, Taherinia AH. Double expanding robust image watermarking based on Spread Spectrum technique and BCH coding. Multimedia Tools and Applications. 2017 Feb 1;76(3):3485503.

(7)
Cox IJ, Kilian J, Leighton FT, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE transactions on image processing. 1997 Dec;6(12):167387.

(8)
Liu Y, Tang S, Liu R, Zhang L, Ma Z. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications. 2018 May 1;97:95105.

(9)
Verma VS, Jha RK, Ojha A. Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Systems with Applications. 2015 Nov 30;42(21):818497.

(10)
Li C, Zhang Z, Wang Y, Ma B, Huang D. Dither modulation of significant amplitude difference for wavelet based robust watermarking. Neurocomputing. 2015 Oct 20;166:40415.

(11)
Su Q, Chen B. A novel blind color image watermarking using upper Hessenberg matrix. AEUInternational Journal of Electronics and Communications. 2017 Aug 1;78:6471.

(12)
Mehta R, Rajpal N. A hybrid semiblind gray scale image watermarking algorithm based on DWTSVD using human visual system model. InContemporary Computing (IC3), 2013 Sixth International Conference on 2013 Aug 8 (pp. 163168). IEEE.

(13)
Kaur R, Jindal S. Semiblind image watermarking using high frequency band based on DWTSVD. InEmerging Trends in Engineering and Technology (ICETET), 2013 6th International Conference on 2013 Dec 16 (pp. 1924). IEEE.

(14)
Mishra A, Rajpal A, Bala R. Bidirectional extreme learning machine for semiblind watermarking of compressed images. Journal of Information Security and Applications. 2018 Feb 28;38:7184.

(15)
Akter A, Ullah MA. Digital image watermarking based on DWTDCT: Evaluate for a new embedding algorithm. InInformatics, Electronics & Vision (ICIEV), 2014 International Conference on 2014 May 23 (pp. 16). IEEE.

(16)
Garg H, Agrawal S, Varshneya G. A nonblind image based watermarking for 3D polygonal mesh using its geometrical properties. InContemporary Computing (IC3), 2013 Sixth International Conference on 2013 Aug 8 (pp. 313318). IEEE.

(17)
Rasti P, Samiei S, Agoyi M, Escalera S, Anbarjafari G. Robust nonblind color video watermarking using QR decomposition and entropy analysis. Journal of Visual Communication and Image Representation. 2016 Jul 1;38:83847.

(18)
Li LD, Guo BL. Localized image watermarking in spatial domain resistant to geometric attacks. AEUInternational Journal of Electronics and Communications. 2009 Feb 4;63(2):12331.

(19)
Nikolaidis N, Pitas I. Robust image watermarking in the spatial domain. Signal processing. 1998 May 28;66(3):385403.

(20)
Roy S, Pal AK. A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEUInternational Journal of Electronics and Communications. 2017 Feb 1;72:14961.

(21)
Sangeetha N, Anita X. Entropy based texture watermarking using discrete wavelet transform. Optik. 2018 May 1;160:3808.

(22)
Chen L, Zhao J. Robust contourletbased blind watermarking for depthimagebased rendering 3D images. Signal Processing: Image Communication. 2017 May 1;54:5665.

(23)
”SIPI Image Database”. Sipi.usc.edu. N.p., 2016. Web. 25 Mar. 2016.
Comments
There are no comments yet.