 Research
 Open Access
 Published:
Adaptive reversible image watermarking algorithm based on IWT and level set
EURASIP Journal on Advances in Signal Processing volume 2017, Article number: 15 (2017)
Abstract
In order to improve the robustness, imperceptibility, and antimalicious extraction capability of reversible image watermarking, an adaptive reversible image watermarking algorithm based on IWT and level set is proposed in this paper. Firstly, the stable edge profile is extracted by using the Laplace operator and the level set methods. Secondly, the unit circle in the stable edge profile is determined. Finally, the inscribed square area of the determinate unit circle is divided into nonoverlapping blocks. Each subblock is performed by IWT, and the HVS is used to embed the watermark adaptively. The simulation results show that the algorithm has good invisibility and can resist various attacks. The algorithm not only has strong robustness but also can lossless recover the original image.
Introduction
As an effective means of copyright protection, the digital watermarking technology has attracted wide attention. Traditional digital watermarking [1] can cause some distortion of the original image after embedding some information. But in some special applications, it is required to restore the original image; thus, the reversible digital watermarking [2] emerges as the times require. Different from traditional digital watermarking method, reversible watermarking technology can recover the original host information without distortion after extracting the watermark information, which is badly needed in the area of military intelligence, medical records, and legal argumentation demanding, so it has been widely developed in recent years.
Reversible image watermarking can be traced back to Barton’s patent in 1997 [3] and Honsigner’s patents in 1999 [4]. Barton algorithm obtains additional available space to carry watermark load through lossless compression of original data. The algorithm improves the authentication ability of digital media including image and video after digital image compression encoding standard JPEG and MPEG encoding. Honsigner’s patents are the second lossless data hiding schemes for vulnerable authentication. They use the modular addition operation in the spatial domain. Its disadvantage is that pepper noise phenomenon exists in the watermarked image. These two patented technologies use reversible embedding method to embed the watermark in the image; the extraction algorithm can not only extract the previously embedded watermark but also completely restore the original image. Reversible watermarking has been widely and deeply studied in recent years. It is mainly divided into three categories: (1) reversible watermarking based on data compression, (2) reversible watermarking based on difference expansion, and (3) reversible watermarking based on histogram translation.
An ideal reversible watermarking algorithm for copyright protection should have good imperceptibility, considerable capacity of embedding, and strong robustness against various attacks. At present, the vast majority of reversible image watermarking is fragile watermarking [5], which is mainly used for image authentication and secret communication. The robust reversible image watermarking has robustness of watermark extraction [6], which is badly needed in some applications, such as those who want to verify the authenticity and integrity of the carrier and need to reversibly record the copyright information application of carrier owner. A robust reversible watermarking algorithm with good performance can perfectly complete the functions of authentication and copyright information recording. In terms of reversible image watermarking, robust reversible watermarking technology against various attacks plays an increasingly important role in the reversible watermarking research. Attacks, especially geometric attacks, can destroy the synchronization relationship of the watermark embedding and extraction, causing difficulties in detecting and extracting watermark. The antiattack reversible image watermarking algorithm has become the important and difficult points of research in recent years.
In order to improve the robustness, imperceptibility, antiattack ability, and antimalicious extraction ability of reversible image watermarking, we propose an adaptive reversible image watermarking algorithm based on IWT and level set. Firstly, we find the stable edge profile by using the Laplace operator and the level set methods. Secondly, the unit circle in the stable edge profile is determined. Finally, the inscribed square area of the determinate unit circle is divided into nonoverlapping blocks. Each subblock is performed by IWT, and the HVS is used to embed the watermark adaptively. The experimental results show that the algorithm has good visual quality, which not only can effectively resist geometric attacks but also has strong robustness to the conventional signal processing.
Related research
In general, the watermark will cause some distortion of the original image in the process of embedding or extraction, but in some areas where higher requirements on image quality is needed and any changes of the original image in the watermark extraction are not allowed, lossless reconstruction of the original image is essential. Given this, researches in the early reversible image watermarking are mainly focused on algorithm embedding rate and perceptibility, such as those based on histogram shifting algorithm [7, 8], compression algorithm [9, 10], and the difference expansion algorithm [11–13]. Ni et al. [7] proposed an algorithm to embed the watermark by adjusting the image histogram. This algorithm utilizes the zero or the minimum points of the histogram of an image and slightly modifies the pixel grayscale values to embed watermark into the image. The algorithm is simple and fast and embedding image distortion is small, but the watermark embedding capacity will be affected by the original carrier image characteristics. Li et al. [8] proposed a reversible data hiding scheme based on histogram shifting of nbit planes (nBPs). This scheme extracts nBPs from an 8bit plane for each pixel to generate the bit plane truncation image (BPTI), and then, block division is used in the BPTI. These operations can make the peak point of the block histogram more concentrated and improve the probability of the zero point in the block histogram. This proposed scheme achieves higher hiding capacity than previous histogrambased schemes, and its visual quality is very satisfactory. Mohammad Awrangjeb [10] used the arithmetic of encoding to compress the recovery information and then connected it with the watermark information, both of which were embedded into the original image. Tian [11] proposed a reversible data embedding algorithm based on difference expansion. The algorithm can provide larger embedding capacity. This difference expansion technique has good plasticity and can be used for the different difference such as the integer Haar wavelet coefficients and image prediction errors. It could transform into embedding algorithms suitable for different purposes. Literature [12] proposed a method of combination of difference expansion and difference histogram shifting technique. This method greatly improves image quality under the same embedding rate. It discusses the difference expansion and the prediction error expansion method from five versions in detail. The algorithm can depend on the size of the load to choose the appropriate threshold T and adjust the embedding capacity, so that the image quality can reach the best under current load. The algorithm needs to store the lowest bit of the external pixels, and the pixels are replaced by LSB. The substitution reduces the quality of the carrier image but does not bring any capacity increases. Literature [13] presented a novel algorithm that improved a generalized integer transformbased reversible watermarking scheme. In this algorithm, two main improvements have been achieved: adaptive thresholding and efficient location map encoding. With regard to adaptive thresholding, suitable threshold t is selected adaptively, which ensures enough embedding capacity for the watermark while keeps the distortion introduced as low as possible. Moreover, efficient location map encoding helps in reducing the location map size, which downs to 0.4 of the one unmodified in average. The algorithm has higher embedding capacity and better visual quality, but it is not robust. In addition, Xiang et al. [14] proposed a noninteger expansion embedding technique which can proceed noninteger prediction errors (NIPE) for embedding data into an audio or image file by only expanding integer element of a prediction error while keeping its fractional element unchanged. The advantage of the NIPE embedding technique is that the NIPE technique can really bring a predictor into full play by estimating a sample/pixel in a noncausal way in a single pass since there is no rounding operation. A new noncausal image prediction method to estimate a pixel with four immediate pixels in a single pass is included in the proposed scheme. The experimental results have shown that the NIPE technique with the new noncausal prediction strategy can reduce the embedding distortion for the same embedding payload, but it is not robust.
Because the robust reversible image watermarking has robustness, it is very important for some applications. A robust reversible watermarking algorithm with good performance can perfectly complete the function of authentication and copyright protection, and its research is of great significance.
In research on robust image reversible watermarking, the representative is de vleeschouwer [15] who proposed a reversible watermarking scheme based on Hash theory. The scheme has certain ability to resist joint photographic expert group (JPEG) loss compression, but there will be a pixel jump, and vision will produce disturbing phenomenon which is similar to salt and pepper noise.
Ni et al. [16] proposed a robust reversible image watermarking scheme, which was based on the arithmetic mean value of the block, and the watermark was embedded into the image. Compared with the scheme in literature [14], the proposed scheme has strong robustness and high peak signal to noise ratio. Zeng et al. [17] proposed a robust reversible image watermarking scheme, which divided the image into nonoverlapping image blocks, and calculated the arithmetic difference of each block. When embedding the information bit “1,” the arithmetic difference of the block is modified; when the information bit “0” is embedded, the arithmetic difference of the block is not modified. The scheme can obtain some robustness. Compared with the above robust watermarking algorithm, the robust performance of the proposed algorithm is improved. An et al. [18–20] further studied several robust reversible image watermarking schemes. Among them, literature [18] was to embed the watermark by the frequency domain technique and the modified block wavelet coefficient’s average. This scheme effectively improves the robustness. Literature [19] presented a novel statistical quantity histogram shifting and clusteringbased robust lossless data hiding (RLDH) method or SQHSC for short. The proposed scheme is completely reversible and has a strong robustness against loss compression and random noise as well as good imperceptibility and high capacity.
Sahraee et al. [21] proposed a robust blind watermarking algorithm based on quantization of distance among wavelet coefficients for copyright protection. Wavelet coefficients are divided into some blocks, and the first, second, and third maximum coefficients in each block are obtained. Then, the first and second maximum coefficients are quantized according to binary watermark bits. Using the blockbased watermarking, the watermark can be extracted without using the original image or watermark. The experimental results show that the proposed method is quite robust under either nongeometry or geometry attacks. The algorithm overcomes the defect of the traditional algorithm, but the algorithm is not reversible.
Gu et al. [22] proposed a novel reversible robust watermarking algorithm based on chaotic system. This algorithm can realize robust reversible watermark embedding by looking for the best position and the threshold value of embedding watermark. In this algorithm, the watermarking reversibility is very dependent on the selection of threshold, and the inappropriate threshold may directly lead to the watermarking irreversible.
Agoyi et al. [23] proposed a novel watermarking scheme based on the discrete wavelet transform (DWT) in combination with the chirp ztransform (CZT) and the singular value decomposition (SVD). Firstly, the image is decomposed into its frequency subbands by using 1level DWT. Then, the highfrequency subband is transformed into zdomain by using CZT. Afterward by SVD, the watermark is added to the singular matrix of the transformed image. Finally, the watermarked image is obtained by using inverse of CZT and inverse of DWT. This algorithm combines the advantages of all three algorithms. The algorithm is imperceptible and robust to several attacks and signal processing operations, but the algorithm is not reversible.
Thabit et al. [24] presented a novel robust reversible watermarking scheme based on the Slantlet transform matrix to transform small blocks of the original image and hid the watermark bits by modifying the mean values of the carrier subbands. The problem of overflow/underflow has been avoided by using histogram modification process. Extensive experimental tests based on 100 general images and 100 medical images demonstrate the efficiency of the proposed scheme. The proposed scheme has robustness against different kinds of attacks, and the results prove that it is completely reversible with improved capacity, robustness, and invisibility.
Choi et al. [25] proposed a robust lossless digital watermarking scheme based on a generalized integer transform in spatial domain. In the proposed method, data bits are hidden into the cover media by a reversible generalized integer transform with bit plane manipulation. With the reversible transform, data can be hidden in the cover media, and the stego media can be restored to its original form after extraction of the hidden data. In embedding procedure, adaptive bit plane manipulation is applied to increase robustness of the algorithm while keeps good visual quality. To further increase the robustness of the algorithm, watermark bits are repeatedly embedded and majority voting is used to decode the hidden information in extraction procedure. Furthermore, a threshold is introduced in the algorithm, which helps in choosing regions that would result lower variance for embedding, as regions with lower variance are more robust against JPEG compression.
Ansari et al. [26] proposed a robust reversible watermarking scheme based on Slantlet transform and artificial bee colony. This scheme utilizes the mean value coefficients of HL and LH bands for the watermark embedding, which provides a very good imperceptibility and robustness. The study further suggested that there is a need to find an optimal value of embedding strength to obtain a tradeoff between the imperceptibility and robustness. So it utilizes artificial bee colony optimization to find the optimal values of embedding strength. The proposed scheme is completely reversible and has a high capacity of data hiding as well as antiattack ability.
On the whole, reversible image watermarking technologies have made continuous progress in recent years, but the researches are not very adequate. Reversible image watermarking algorithms still exist such as reversible image watermarking performance (especially the robustness) needs to be further improved, and poor ability of antiattack in legal geometric problems should be solved and potential application fields of reversible image watermarking also need to be further widened.
Preliminary
This paper is a study of reversible image watermarking algorithm, and we focus on robustness and antiattack ability. Specifically speaking, in order to improve the robustness and antiattack ability of the image watermarking, the watermark embedding capacity and better visual quality can be guaranteed. Based on this, the main preparation works of this paper are as follows.
Image feature analysis based on HVS
The human vision system (HVS) has the texture masking effect, the frequency masking effect, the spatial masking effect, the luminance masking effect, and so on [27]. For an image, the sensitivity of HVS to different location information is not the same. In this paper, based on the masking effect of HVS, the image is divided into different categories by the combination of texture masking effect and high luminance masking effect. According to the complexity of the texture image, the image can be divided into texture smooth area G1, texture moderately complex area G2, and texture complex area G3. Texture masking effect shows that the HVS of complex texture region is not sensitive to change. The higher its visual threshold is, the more the secret information is embedded. In the smooth region of high sensitivity, the visual threshold is low and can only be embedded in a small amount of secret information.
According to the gray characteristics of the image, the image can be divided into low gray area H3, middle gray area H2, and high gray area H1. Luminance masking effect shows that the human eye has different sensitivity to the pixels of different gray values, which is the most sensitive to medium gray area, but the embedded secret information is fewer, and the resolution ability of high gray area and low gray level is decreased, and the change of pixel value is not easy to distinguish.
In summary, G3 can be embedded more secret information, G2 is the second, and G1 is embedded less secret information, embedded capacity G3 > G2 > G1; H1 and H3 can be embedded more secret information, and H2 is embedded less secret information, embedded capacity H1 > H2 and H3 > H2.
According to the above two kinds of visual masking effect, the cover image is divided into nonoverlapping subblock of m × n, and different amount of secret information is embedded in different subblocks. By calculating the information entropy of each block, the block will be distinguished as a smooth area or texture complex area. The maximum entropy of 50 and 75% can be divided as thresholds of smooth block, medium complex block, and complex texture block. According to the nonlinear characteristics of the two curves of the gray level, low gray block, middle gray block, and high gray block are divided. For the 256 gray level images, 80 is considered to be the boundary between low gray level and middle gray level, and the 180 is the boundary between middle and high gray level.
For size 4 × 4 subblock image, in order to obtain a higher visual quality, it is assumed that a smooth texture block can embed 1bit watermark, a medium complex texture block can embed 2bit watermark, a complex texture block can be embedded 3bit watermark, a low gray block can embed 2bit watermark, a middle gray block can embed 1bit watermark, and a high gray block can embed 2bit watermark. Therefore, the watermark bits are embedded in the corresponding subblock, as shown in Table 1.
Image contour extraction
The edge is the most basic feature of an image and concentrates most of the image information. Edge detection is the most basic treatment of all edgebased segmentation methods [28]. The Laplace operator is the secondorder differential operator independent of the edge direction [29] and is a commonly used secondorder derivative operator. For a continuous function f(x, y), its Laplace operator expression at the position (x, y) is
The Laplace operator is a scalar rather than a vector and features linear characteristic and rotational invariance. It produces a steep zerocrossing at the edge. The advantage of the Laplace operator is to highlight the angular line and acnode of an image, as shown in Figs. 1 and 2. Upon completion of the image edge detection, the level set can be used for image segmentation.
The level set method was first coined by Osher and Sethian [30]. It is a geometric deformation model. It is a numerical method for contour tracking and surface evolution. The basic idea is not to operate the contour directly but set the ndimensional contour as the (n + 1dimensional) zerolevel set of a higher dimensional function. This highdimensional function is called level set function φ(X, t), denoted by the differential equation. At time t, the motion contour can be obtained by extracting the zero level set from the differential equation c((X), t) = {φ(X, t) = 0}. Even though this way makes the problem a little more complicated, there are many advantages for solutions. The main advantage of using the level set is that it can deal well with the topological structural changes (merger or division) occurring in the closed curve implied in the level set function and can get the only weak solution to satisfy the entropy condition.
In the twodimensional case, for example, the level set method is to view the closed curve C(t) in the twodimensional plane as a {φ = 0} zerolevel plane in the continuous function surface φ in the threedimensional space, namely
where t represents time. Resolve the partial derivative of time on both sides of the equation.
In order to solve this equation, suppose the movement speed function in the normal direction of the surface is F(x, y)
where n is the unit normal vector.
∇φ is the gradient of φ in the twodimensional plane, then
Hence,
The equation is the level set equation. Finally, to solve the problem of curve evolution is to solve Eq. (8), and the initial condition is
In Eq. (9), d(x, y) is the signed distance function, signifying the shortest distance from the pixel (x, y) to the closed curve C(t). The symbol is determined according to the position of the pixel. If it falls outside of the closed curve, it is positive; otherwise, it is negative. At any moment, the points on the curve are a set of points that the distance function value is 0, which is the zero level set.
When pixels fall within C(t), φ(x, y, t) > 0;
When pixels fall outside of C(t), φ(x, y, t) < 0;
When pixels fall upon C(t), φ(x, y, t) = 0.
Finally, the image segmentation contour is acquired by the zero level set on the level set function surface (Fig. 3).
Unit circle position determination
Traditional digital watermarking algorithms have not found the effective way to find the unit circle. For example, in the scheme proposed by Kim [31], using the inscribed circle of images as a unit circle, when subjected to a shear attack, an accurate unit circle cannot be found, leading to the failure of watermark extraction. In the scheme proposed by Xin [32], both embedding and extracting need to store the location information of the unit circle. When extracting the watermark, it is necessary to use the search algorithm to extract the location information of each unit circle. If the position information is matched with the position of the original embedding unit circle, it is proved that the unit circle is the unit circle used in embedding, and then, the watermark is extracted. This method not only reduces the watermark extraction efficiency but also affects the watermark embedding rate. In this paper, a method of determining the position of a unit circle by using the level set method is proposed, and it can make up for the above defects.
Because the image’s stable edge contour is determined by the image content, its shape is affected less by the rotation and cropping attacks. Figure 4 shows the geometric shape of the different types of images when they are subjected to a horizontal set. Figure 5 is the stable edge contour by using the geometric contour model iteration when 512 × 512 Lena images are subject to rotation of 10°, 30°, and 45° and a variety of shear attacks. As can be seen from the graph, the shape of the iteration results is still stable when the geometric shape is rotated around different types of images and different angles.
Therefore, with the help of image’s stable edge contour, the circle center and radius of the unit are determined. Firstly, the Gauss filter is used to filter the weak edge of the image and preserve the stable edge of the image. Then, described in Section 3.2, based on level set method, a stable edge profile is obtained. The barycenter of contour is calculated as the circle center of the unit circle. The barycenter of image is geometric invariance under scaling, translation, and rotation attacks, so if the stable edge contour of the image is viewed as a subimage, when the outline shape remain unchanged under geometric attacks, the barycenter of contour also remains unchanged. The formula for calculating the barycenter of contour is as follows:
M is p + q order geometric moments of image edge contour Ω in the formula (10). Its definition is as follows:
where f(x, y) represents the gray value of the point (x, y).
Finally, according to the distance between the barycenter and the edge profile, the radius of the unit circle is determined. Through many experiments, it is found that the iteration results of the geometric contour model will produce a small error under attack. So in the calculation of the unit circle radius, firstly, the longest distance and nearest distance between the barycenter and the contour edge distance are calculated, and the average value r is obtained. Then, to exclude the decimal part of r, the single digit of r is operated with rounding. Finally, the unit circle radius R is got. Table 2 is the calculation results of the average r and the unit circle radius R under rotation attack and cropping attack for Lena image. As can be seen from this table, after being attacked by different attacks, it is still able to accurately calculate the radius R of the unit circle.
Algorithm design
In this paper, the carrier image is transformed into a lowfrequency subband and three detail subbands by IWT, and then, the three detail subbands are fused to get the detail image. The contour of the detail image is extracted by means of level set to better determine the unit circle. In the determination of the unit circle, the watermark embedding and extraction are finally achieved. This watermarking algorithm mainly includes two parts: watermark embedding and watermark extraction.
Watermark embedding
Assuming the carrier image I is 8bit grayscale image of size 512 × 512, the watermark W is binary image of size 32 × 32. In this paper, the image watermark embedding process is shown in Fig. 6.

1.
Arnold transform is used to scramble the watermark information W, and the scrambled watermark W′ is transformed into a onedimensional vector.
The traditional Arnold scrambling transform is simple [33]. When subjected to malicious attacks, it is easy to decrypt to restore the original watermark. The confidentiality and robustness of the traditional Arnold transform are not strong enough. In order to enhance the robustness and security of the digital image watermarking system, this paper improves the traditional Arnold scrambling transform. The improved scrambling method is as follows:
$$ \begin{array}{cc}\hfill \left(\begin{array}{c}\hfill x\hbox{'}\hfill \\ {}\hfill y\hbox{'}\hfill \end{array}\right)={\left(\begin{array}{c}\hfill \begin{array}{cc}\hfill 1\hfill & \hfill 1\hfill \end{array}\hfill \\ {}\hfill \begin{array}{cc}\hfill 1\hfill & \hfill 2\hfill \end{array}\hfill \end{array}\right)}^c{\left(\begin{array}{c}\hfill \begin{array}{cc}\hfill 2\hfill & \hfill 1\hfill \end{array}\hfill \\ {}\hfill \begin{array}{cc}\hfill 1\hfill & \hfill 1\hfill \end{array}\hfill \end{array}\right)}^d\left(\begin{array}{c}\hfill x\hfill \\ {}\hfill y\hfill \end{array}\right) mod\ M\hfill & \hfill x\hbox{'}, y\hbox{'}\in \left\{0,1,2,\cdots, N1\right\}\hfill \end{array} $$(12)where (x, y) and (x′, y′) are the pixel positions in the image before and after transform, M denotes the order of image matrix, and c and d denote scrambling times. The above scrambling of the image is conducted in two directions. In the horizontal direction and vertical direction, the image are scrambling c times and d times, respectively. The Arnold transform is a onetoone mapping, and the transform parameters c and d are randomly generated. Compared with the traditional Arnold transform, it is not easy to be decoded, which enhances the robustness and security of the whole digital image watermarking system.

2.
In order to improve the accuracy of image contour extraction, the carrier image I is transformed into a lowfrequency subband LL and three detail subbands HL, LH, and HH by onelevel IWT. Then, the three detail subbands are fused to get the detail image I _{1} (0 ≤ I _{1}(x, y) ≤ 255). This is shown in Fig. 7b.

3.
The edge detection of the detail subimage of the carrier image is carried out by the Laplace operator (shown in Fig. 7c). The image contour of the detail subimage after the edge detection is extracted based on the idea of the level set (shown in Fig. 7d).
By fusing the three detail subbands to form a highfrequency image and by Laplace operator to detect the edge of the highfrequency image, the image contour can be extracted more accurately by level set, and the computation time is reduced.

4.
With the aid of the extracted stable edge contour in detail subimage and the method described in Section 3.3, the circle center (C _{ x }, C _{ y }) and radius R of the unit circle are determined.

5.
The inscribed square area of the original carrier image corresponding to the unit circle is selected as the watermark embedding domain. The inscribed square area is divided into nonoverlapping blocks of size 4 × 4. If the block is not enough to be divided, then the region edge fills with zero. Assuming that the inscribed square area is N × N, the block number is \( S=\left\lceil \raisebox{1ex}{$ N$}\!\left/ \!\raisebox{1ex}{$4$}\right.\right\rceil \cdot p\ \left\lceil \raisebox{1ex}{$ N$}\!\left/ \!\raisebox{1ex}{$4$}\right.\right\rceil \). ⌈⌉ denotes rounding up.

6.
The method described in Section 3.1 is used to analyze the characteristics of human visual system (HVS) of each subblock in inscribed square region so as to determine the best embedding capacity of each subblock.

7.
Each subblock of the watermark information to be embedded is carried out by IWT, and then, each subband obtained is carried out by singular value decomposition (SVD). The watermark is embedded in a series of connected singular values of four subbands by the parity quantization method. The watermark information is embedded by the parity quantization method, and the new image singular values of IWT coefficients are obtained. In order to embed the watermark by comparing the first singular value and the remaining singular value of each subblock, successively, the remaining singular value string is taken out. Due to using the singular values of four subband coefficients LL, HL, LH, and HH to embed the watermark, the watermark can be embedded in a total of 7 bits. According to the HVS characteristic analysis of each subblock, we learn that the maximum embedding capacity of each subblock is 5 bits, so we use the singular value of LL, HL, and LH to embed the watermark. The assumption is that the singular values s _{1}, s _{2}, s _{3},…,s _{6} are generated in series of the order of LL, HL, and LH (if the rank of the 2 × 2 coefficient matrix is two, there are two singular values; if the rank is smaller than two, this paper will still use two singular values and assign zero for the second singular value), then
When ⌊αs _{ i }/s _{1}⌋ is an even,
$$ {s}_i=\left\{\begin{array}{cc}\hfill \left\lceil \raisebox{1ex}{${s}_1\left(\left\lfloor {\scriptscriptstyle \frac{\alpha {s}_i}{s_1}}\right\rfloor +1\right)$}\!\left/ \!\raisebox{1ex}{$\alpha $}\right.\right\rceil \hfill & \hfill {W}_i=1\hfill \\ {}\hfill \left\lceil \raisebox{1ex}{${s}_1\left(\left\lfloor {\scriptscriptstyle \frac{\alpha {s}_i}{s_1}}\right\rfloor \right)$}\!\left/ \!\raisebox{1ex}{$\alpha $}\right.\right\rceil \hfill & \hfill {W}_i=0\hfill \end{array}\right. $$(13)When ⌊αs _{ i }/s _{1}⌋ is an odd,
$$ {s}_i=\left\{\begin{array}{cc}\hfill \left\lceil \raisebox{1ex}{${s}_1\left(\left\lfloor {\scriptscriptstyle \frac{\alpha {s}_i}{s_1}}\right\rfloor \right)$}\!\left/ \!\raisebox{1ex}{$\alpha $}\right.\right\rceil \hfill & \hfill {W}_i=1\hfill \\ {}\hfill \left\lceil \raisebox{1ex}{${s}_1\left(\left\lfloor {\scriptscriptstyle \frac{\alpha {s}_i}{s_1}}\right\rfloor +1\right)$}\!\left/ \!\raisebox{1ex}{$\alpha $}\right.\right\rceil \hfill & \hfill {W}_i=0\hfill \end{array}\right. $$(14)In (13) and (14), ⌊⌋ denotes the floor function, W _{ i } denotes the watermark information, α is an embedding adjustment factor, and Si denotes the first i singular value (the value range of i is selfadaptively determined by the HVS features of the subblock). α value is determined by the ratio of S _{1} and the selected minimum singular value. Assuming that S_{ ai } is the minimum singular value (except for the singular value of 0), the value of the alpha is \( \left\lceil \raisebox{1ex}{${s}_1$}\!\left/ \!\raisebox{1ex}{${s}_{ai}$}\right.\right\rceil \). For each subblock, the value of the embedding strength factor α is not the same.

8.
By the inverse SVD and inverse IWT, each subblock of containing watermark information is obtained. Removing the region by zero filling of each subblock edge, in combination with other parts of the image that is not processed in the carrier image, the final watermarked image is obtained.
Watermark extraction
Watermark extraction can be regarded as the inverse process of watermark embedding process. In this paper, the image watermark extraction process is shown in Fig. 8.

1.
The watermarked image I is transformed into a lowfrequency subband LL and three detail subbands HL, LH, and HH by onelevel IWT, and then, the three detail subbands are fused to get the fused details image I _{1} (0 ≤ I _{1}(x, y) ≤ 255) of watermarked image.

2.
The edge detection of the detail subimage of the watermarked image is carried out by the Laplace operator. The image contour of the detail subimage after the edge detection is extracted based on the idea of the level set.

3.
With the aid of the extracted stable edge contour in detail subimage and the method described in Section 3.3, the circle center (C _{ x }, C _{ y }) and radius R of the unit circle are determined.

4.
The inscribed square area of the original watermarked image corresponding to the unit circle is selected to be watermark embedding domain. The inscribed square area is divided into nonoverlapping blocks of size 4 × 4. If the block is not enough to be divided, then the region edge fills with zero. It is assumed that the inscribed square area is N × N, the block number is \( S=\left\lceil \raisebox{1ex}{$ N$}\!\left/ \!\raisebox{1ex}{$4$}\right.\right\rceil \cdot p\ \left\lceil \raisebox{1ex}{$ N$}\!\left/ \!\raisebox{1ex}{$4$}\right.\right\rceil \). ⌈⌉ denotes rounding up.

5.
The method described in Section 3.1 is used to analyze the characteristics of human visual system (HVS) of each subblock in inscribed square region as so as to determine the best embedding capacity of each subblock.

6.
Each subblock is carried out by IWT, and then, the singular value decomposition of each subband is obtained. The watermark is extracted from a series of connected singular values of four subbands by the parity quantization method.
In order to extract the watermark by comparing the first singular value and the remaining singular value of each subblock, successively, the remaining singular value string is taken out. The watermark information “0” is extracted when ⌊αs _{ i }/s _{1}⌋is even. The watermark information “1” is extracted when ⌊αs _{ i }/s _{1}⌋ is odd. According to the HVS of each subblock, the embedded watermark information is adaptively selected to extract the watermark information of each subblock.

7.
The extracted watermark information is transformed into the original watermark information by reverse Arnold scrambling.

8.
The new singular value is obtained after extracting the watermark information by parity quantization. Then, the new LL, HL, and LH values are obtained by inverse SVD. The inscribed square area is restored by reverse IWT.

9.
Finally, combining the restored square area and other parts of the watermarked image that is not processed, the original image is recovered.
Experimental results and analysis
In this paper, Lena, Girl, and other standard images are used as test images. The image size is 512 × 512, as shown in Fig. 9. The watermark image is binary image of size 32 × 32, as shown in Fig. 10. All experiments are carried out in the windows XP operating system, and MatlabR2012b is taking as the experimental platform.
Integrity assessment
Generally, reversible watermarking algorithm requires carrier image can completely recover after extracting watermark. Therefore, it is measured by the normalized correlation (NC) of the original carrier image and the restored carrier image after the watermark is extracted. The calculation formula is shown as Eq. (15):
where I(i, j) and I′(i, j), respectively, denote the pixel value at (i, j) of the original image and the restored carrier image after the watermarking is extracted. L and K denote, respectively, the rows and columns of the image. For the original carrier image and the restored carrier image, the NC_{1} value is required to be 1, namely, the carrier image is generally required to complete recovery.
Table 3 denotes the integrity of the results of the four different types of watermarked images without any attacks based on this algorithm. It shows that the original images can be recovered completely without the attacks. This indicates that the algorithm is reversible.
Robustness experiment of unit circle
The key to effectiveness of the algorithm is that the edge profile of the image is extracted by using the level set and then the robustness of the unit circle is determined. In this experiment, the average r and the unit circle radius R of Fig. 8a–d are calculated, respectively, under rotation attack. The calculation results are shown in Table 2. It can be seen from Table 4 that the calculation of the unit circle radius R of each image is still accurate after a rotation attack. So it is illustrated that the determination algorithm of the unit circle is robust in the Section 3.3.
Scale invariance
In this experiment, the watermarked image Lena subjects to scaling attack. Scale scaling factor’s range is from 0.4 to 2. Before extracting the watermark, the watermarked image is recovered to 512 × 512. The experimental results are shown in Fig. 11.
In this paper, the bilinear interpolation method is used to scale the image [34]. The amount of calculation of bilinear interpolation method is large, but the image quality is high after scaling, and discontinuity pixel value does not appear. The bilinear interpolation has lowpass filter nature of the damage to the highfrequency components, so it may make the image contour blurred to a certain extent. In this way, the edge contour extracted by the Laplace operator and the level set theory will be less affected under the image scaling. In this paper, according to the distance between the barycenter and the edge profile, the radius of the unit circle is determined. In the calculation of the unit circle radius, firstly, the longest distance and nearest distance between the barycenter and the contour edge distance are calculated, and the average value r is obtained. Then, to exclude the decimal part of r, the single digit of r is operated with rounding. Finally, the unit circle radius R is got. In the scaling process of the scaling factor which is [0.4, 2], except for the special conditions, the image unit circle radius obtained will not change. In special conditions such as the original image using the level set idea to get the average value of r is 75.6, the unit circle radius R is 80. If under the scaling attack, the average value of r can be changed to 74.6, the unit circle radius R is 70. At this time, the extracted watermark is greatly affected.
The quality of image itself will be affected when the image in the unit circle is scaled. For scaling factors [0.4, 2], based on the derivation of the bilinear difference method, when the scaling factor is larger, the image quality is almost not affected, and the watermark can be extracted very well (due to the limitation of the length of the article, the derivation process is omitted). When the scaling factor is smaller, the image quality has a little effect on the image quality.
To sum up, with scaling attacks on different types of images, the relationships between scale scaling factor and bit error rate are different. The experimental results show that the extracted watermark is completely correct when the scale scaling factor is greater than or equal to 0.85 when the watermarked image Lena subjects to scaling attacks.
Other signal processing attacks
This paper takes Lena image as an example and executes cutting, filtering, and other signal processing. Because these processing attacks (except a larger degree of shear) have little influence on the shape of the edge contour, it does not affect the normal extraction of the watermark.
The data in Table 5 shows that the scheme has strong robustness when the attack does not affect the extraction of the image edge contour.
Algorithm performance evaluation
This algorithm embeds 32 × 32 binary images into the 512 × 512 carrier images. The watermark embedding is carried out by this algorithm and algorithm in literature [21], respectively. The PSNR and SSIM are shown in Table 6 (the average of data taken 20 tests).
Currently, the peak signal to noise ratio (PSNR) is one of the main indicators to evaluate the visual quality of the reversible watermarking. The greater PSNR value is, the less the representative image distortion is. Correspondingly, the visual quality of watermarked image is better. The smaller PSNR is, the more the representative image distortion is, and the loss of watermarked image visual quality is more serious. The calculation formula of PSNR is shown as Eq. (16):
where I(i, j) and I′(i, j), respectively, denote the pixel values at (i, j) of the original image and the watermarked image. M and N, respectively, represent the rows and columns of the image. It is generally believed that if the lost image quality is partial and PSNR value on the visual quality of reconstruction is not less than 30 dB, its visual quality is still acceptable.
Although the PSNR has been widely used in stego image quality assessment, its mathematical definition has some limitations, and the pixel correlations and human visual system characteristics are not taken into account. The structural similarity (SSIM) has been used to evaluate the quality of the stego images. It is defined as (17)
where C _{1} and C _{2} are the small constants, \( {\overline{w}}_x \) is the mean value of the region w _{ x }, and \( {\overline{w}}_y \) is the mean value of the region w _{ y }. \( {\sigma}_{w_x}^2 \) is the variance of w _{ x }, and \( {\sigma}_{w_x{w}_y} \) is the covariance between the two regions. The higher value of the SSIM implies a higher quality level for the stego image.
The value range of SSIM is [0, 1]. SSIM = 0 indicates that the corresponding two images are completely different. SSIM = 1 indicates that the corresponding two images are exactly the same. In the evaluation of the reversible information hiding algorithm, the SSIM value of the hidden image is close to 1 as much as possible.
Compared with the algorithm in literature [21], the highest PSNR of the above four original carrier images in this algorithm is 49.34 dB. This means that this algorithm has better invisibility. At the same time, the SSIM is also higher than the results in literature [22]. From Table 6, it is easy to note that the proposed algorithm outperforms that in literature [21] in terms of same payload capacity with good SSIM and PSNR values. The results presented here demonstrate that the proposed algorithm significantly increases the quality of stego images. Specific effects of visual and extraction are shown in Table 7:
As observed from the figures, we find that human eyes do not feel the existence of watermark information in watermarked images. The corresponding PSNR value shows that images have better imperceptibility by using different types of algorithms. When the watermarked image has a good visual effect, the average PSNR value can be as high as 48.18 dB. From Tables 6 and 7, we can see that this algorithm has a good imperceptibility for different texture images and can meet the requirements of visual perception.
Table 8 denotes the performance results of the four watermarked images with conventional attacks based on this algorithm. The PSNR value of the watermarked image and the NC_{2} value of extracted watermark are all listed.
As can be seen from Table 8, when the watermarked image is not subject to any attacks, it has a high visual quality. Special Pepper’s watermarked image, the PSNR runs up to 49.34 dB. When the watermarked image is subjected to a variety of attacks, it still has a high visual quality and a good imperceptibility.
The NC_{2} (normalized correlation, NC) is a measure of the watermarking robustness. The watermarked image will be disturbed inevitably by the noise; then, the quality and the accuracy of watermark extraction will be affected in the process of transmission. This requires the use of digital watermarking has a certain ability to resist noise. Experiment uses NC as a measure of the watermarking robustness.
Define w(i, j) and w′(i, j) as the pixel values at (i,j) of the original watermark image and the extraction watermark image, respectively. L and K, respectively, denote the rows and columns of the image. Its computation formula is shown as Eq. (18):
NC_{2} is used to describe the quality of the extracted watermark. The closer to 1 NC_{2} value is, the more robust of watermarking algorithm is. When NC_{2} < 0.5, it is thought this extraction algorithm is failure and almost could not extract the watermark information.
Table 8 shows that this algorithm has good robustness against common geometric attacks. The results of Table 8 can be used to objectively evaluate the performance of the algorithm. This paper shows that the method can resist common attack effectively. Especially, when the watermarked image Lena subjects to gauss filter, PSNR is 47.24 dB, and the watermark NC_{2} is 0.982 under corresponding attack. This algorithm not only has the strong robustness but also can accurately extract the watermark.
In Table 9, the performance results can be obtained after the common geometric attacks (rotation, cropping, scaling) are conducted on the four different types of the watermarked images using the algorithm in this paper. Its PSNR value of the watermarked image and the NC_{2} value of extraction watermark have been listed as follows.
As can be seen from Table 9, this algorithm has a high robustness against common geometric attacks. Especially when Lena enlarges 20%, the PSNR is 47.81 dB, and the watermark NC_{2} is 1 under corresponding attack. It shows that the algorithm has strong robustness and can extract the watermark completely and accurately in some geometric attacks.
For the same embedding capacity, the robustness of the proposed algorithm is superior to those in literatures [25] and [22]. Under the premise of keeping good visual quality, the literature [25] improves the robustness of the algorithm by using adaptive bit plane operation to repeat embedding watermark data bits in the input process and using majority voting strategy to extract the hidden watermark information in the extraction process. The literature [22] enhances the robustness of the algorithm through finding the best position of the embedded watermark and the threshold value for embedding watermark. But such algorithm is very dependent on the selection of the threshold, and inappropriate threshold may directly lead to the watermarking irreversible. In this paper, the algorithm is adopted to select the stable unit circle, in which the watermark is embedded by IWT and SVD. This paper algorithm is less affected by the attack and has stronger antiattack ability.
In addition, the literature [24] algorithm also has high robustness. The algorithm uses the Slantlet transform matrix to transform small blocks of the original image and hides the watermark bits by modifying the mean values of the carrier subbands. The scheme has robustness against different kinds of attacks, but its robustness is slightly lower than that of this paper algorithm. Additionally, when the watermark is embedded in the same capacity, the visual quality of our algorithm is much higher than that in literature [24].
Under the same embedding capacity, the imperceptibility of our algorithm is equivalent to the literature [25] algorithm. In this paper, we use the HVS characteristics of the image to embed the watermark adaptively and get a better visual effect. The algorithm is mainly to improve the robustness of the watermarking algorithm as far as possible under the premise of ensuring better visual quality, and the emphasis is on improving the ability of antiattack algorithm. The key point is that the visual quality of this algorithm has achieved very good results, and on this basis, further improving the algorithm’s imperceptibility is not significant.
Conclusions
In order to make the reversible image watermarking more robustness and imperceptibility, an adaptive reversible image watermarking scheme based on IWT and level set is proposed. The main contributions are illustrated as follows. A stable edge contour is obtained by using the geometric active contour model based on level set method, and the image stability edge contour extracted is determined by image content, so the contour shape has less impact with some attacks, and has strong robustness; since IWT has good timefrequency localization and multiresolution analysis characteristic and SVD has the stability and antiinterference ability, the watermark embedding and extraction are implemented based on HVS feature of image by using IWT and SVD. This effectively improves the stability and robustness of the algorithm and guarantees better visual quality.
The experimental results show that the scheme not only makes up for the shortcomings of the traditional scheme which needs to be embedded the unit circle location information but also has better invisibility. This algorithm can not only resist various attacks with strong robustness but also restore the original image with lossless.
The algorithm needs to consume a certain amount of time with using the level set idea to find a stable edge profile. How to further reduce the running time under the premise of ensuring the algorithm with high performance will be the next step to study.
References
 1.
W Lu, S Wei, L Hongtao, Novel robust image watermarking based on subsampling and DWT. Multimed Tools Appl 60, 31–46 (2012)
 2.
S Weng, JS Pan, Reversible watermarking based on multiple prediction modes and adaptive watermark embedding. Multimed Tools Appl 72, 3063–3083 (2014)
 3.
JM Barton, Method and apparatus for embedding authentication information within digital data [P]. US: 5646997, 1997.
 4.
CW Honsigner, PW Jones, M Rabbanl, Lossless recovery of an original image containing embedded data US, 6278791[P]. 2001 0821.
 5.
S Priyanka, A Suneeta, An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimed Tools Appl 75(14), 8165–8194 (2016)
 6.
Y Navneet, S Kulbir, Robust imageadaptive watermarking using an adjustable dynamic strength factor. SIViP 9, 1531–1542 (2015)
 7.
ZC Ni, YQ Shi, N Ansari, Reversible data hiding. IEEE Trans on Circuits Syst for Video Technol 16(3), 354–362 (2006)
 8.
L Li, C ChinChen, W Anhong, Reversible data hiding scheme based on histogram shifting of nbit planes. Multimed Tools Appl 75(18), 11311–11326 (2016)
 9.
J Fridrich, M Golijan, R Du, Invertible authentication. Proc SPIE 4314, 197–208 (2001). Society of PhotoOptical Instrumentation Engineers, Bellingham
 10.
M Awrangjeb, MS Kankanhalli, Lossless watermarking considering the human visual system [EB/OL]. http://link.springer.com/chapter/10.1007%252F9783540246244_47. Accessed 20 Nov 2009.
 11.
TIAN Jun, Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8), 890–896 (2003)
 12.
DM THODI, JJ RODRIGUEZ, Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3), 721–730 (2007)
 13.
CM Pun, KC Choi, Generalized integer transform based reversible watermarking algorithm using efficient location map encoding and adaptive thresholding. Computing 96, 951–973 (2014)
 14.
X Shijun, W Yi, Noninteger expansion embedding techniques for reversible image watermarking. EURASIP Journal Adv in Signal Processing 2015, 56 (2015). doi:10.1186/s136340150232z
 15.
C de Vleeschouwer, Delaigle J F, Macq B, Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5(1), 97–105 (2003)
 16.
ZC Ni, YQ Shi, N Ansari, W Su, QB Sun, X Lin, Robust lossless image data hiding designed for semifragile image authentication. IEEE Trans Circuits Syst Video Technol 18(4), 497–509 (2008)
 17.
TZ Zeng, LD Ping, XZ Pan, A lossless robust data hiding scheme. Pattern Recogn 43(4), 1656–1667 (2010)
 18.
LL An, XB Gao, XL Li, Robust reversible watermarking via clustering and enhanced pixelwise masking. IEEE Trans Image Process 21(8), 3598–3611 (2012)
 19.
LL An, XB Gao, Y Yuan, DC Tao, Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing 77(1), 1–11 (2013)
 20.
LL An, XB Gao, Y Yuan, Content adaptive reliable robust lossless data embedding. Neurocomputing 79(3), 1–11 (2012)
 21.
MJ Sahraee, S Ghofrani, A robust blind watermarking method using quantization of distance between wavelet coefficients. SIViP 7, 799–807 (2013)
 22.
QL Gu, TG Gao, A novel reversible robust watermarking algorithm based on chaotic system. Digital Signal Processing 23(1), 213–217 (2013)
 23.
A Mary, C Erbug, A Gholamreza, A watermarking algorithm based on chirp ztransform, discrete wavelet transform, and singular value decomposition. SIViP 9(3), 735–745 (2015)
 24.
R Thabit, BE Khoo, Robust reversible watermarking scheme using Slantlet transform matrix. J Syst Softw 88(1), 74–86 (2014)
 25.
C KaCheng, P ChiMan, Robust lossless digital watermarking using integer transform with bit plane manipulation. Multimed Tools Appl 75(11), 6621–6645 (2016)
 26.
IA Ansari, M Pant, CW Ahn, Artificial bee colony optimized robustreversible image watermarking. Multimedia Tools and Applications. (2016). doi:10.1007/s110420163680z.
 27.
T Sridevi, SS Fathima, Watermarking algorithm based using genetic algorithm and HVS. Int J of Comput Appl 74(13), 26–30 (2013)
 28.
P Melin, CI Gonzalez, JR Castro, Study on semifragile edgedetection method for image processing based on generalized type2 fuzzy logic. IEEE Trans Fuzzy Syst 22(6), 1515–1525 (2014)
 29.
H Shijie, W Meng, H Richang, Spatially guided local Laplacian filter for nature image detail enhancement. Multimed Tools Appl 75(3), 1529–1542 (2014)
 30.
S Osher, J Sethian, Fronts propagating with curvature dependent speed: algorithms based the Hamilton Jacobi formulation. J Comput Phys 79(1), 12–49 (1998)
 31.
HS Kim, HK Lee, Invariant image watermark using Zernike moments. IEEE Trans Circuits Syst Video Technol 13(8), 766–775 (2003)
 32.
YQ Xin, S Liao, M Pawlak, Circularly orthogonal moments for geometrically robust image watermarking. Pattern Recogn 40(12), 3740–3752 (2007)
 33.
N Anil Kumar, M Haribabu, C Hima Bindu, Novel image watermarking algorithm with DWTSVD. Int J Comput Appl 106(1), 12–17 (2014)
 34.
L YuChi, W HsienChu, Y ShyrShen, Adaptive DEbased reversible steganographic technique using bilinear interpolation and simplified location map. Multimed Tools Appl 52(2), 263–276 (2011)
Acknowledgements
This work is supported by the Jiangsu province Natural Science Foundation of China (no. BK20131069). At the same time, this work is also supported by the National Natural Science Foundation of China (NSFC) (no.61402192).
Authors’ contributions
ZWZ and LFW conceived and designed the study; ZWZ and SZX performed the experiments; LFW, SZX, and SBG analyzed the data; and ZWZ, SZX, and SBG jointly prepared the manuscript. All authors read and approved the final manuscript.
Competing interests
The authors declare that they have no competing interests.
Author information
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Zhang, Z., Wu, L., Xiao, S. et al. Adaptive reversible image watermarking algorithm based on IWT and level set. EURASIP J. Adv. Signal Process. 2017, 15 (2017). https://doi.org/10.1186/s1363401704507
Received:
Accepted:
Published:
Keywords
 Reversible image watermarking
 IWT
 Level set
 HVS
 Contour extraction