A Strong Robust Zero-Watermarking Scheme Based on Shearlets’ High Ability for Capturing Directional Features

Zero-watermarking is a blind digital watermarking method. It has reached the point where the robustness and the imperceptibility can arrive at a good balance. In this paper, a strong robust zero-watermarking scheme is proposed which employs multiresolution and multiscale representation characteristics of nonsubsampled shearlet transform to analyze the direction features of the given image. The effectiveness of the proposed scheme for dealing with many kinds of attack such as compression, noise addition, and scaling is demonstrated by the experimental results. When compared with other zero-watermarking schemes using counterpart transforms like discrete wavelet transform, the experimental results show that the proposed watermarking scheme can get better performance.


Introduction
Digital watermarking techniques [1][2][3][4] are effective means to protect copyright of the digital media.It has attracted a lot of attention in the last decade.However, traditional digital watermarking system which modifies the host image to some extent has been studied for a long time.There still remain such problems about watermarks as robustness, imperceptibility, or unavailability of the host image in the extracting process.A zero-watermarking system is a type of watermarking schemes that is encrypted with the host image [5] instead of hiding information inside the host image.It can be a good alternative watermarking method for its bringing no distortion to the host image.Thus, the quality of the host image can be ensured.
The crucial step in the zero-watermarking system is to extract stable internal feature information from the host image.As a higher dimensional signal, images are governed by anisotropic directional features [6], such as edges or textures.How to efficiently represent images with rich direction feature information is a central problem in image processing fields.The wavelet transform is well known for capturing the geometry of image edges because it provides a good multiresolution representation of one-dimensional piecewise smooth signals [7,8], but it is restricted by the limited directionality in its filtering structures.
These disappointing behaviors indicate that more powerful representation methods are needed.Thus, numerous approaches for efficiently representing direction features in images have been proposed, including directional filter banks [9], Contourlet [10][11][12], and shearlets [6,10,13,14].Among all these representation systems, shearlets exhibit many outstanding properties: the potential ability to use the power of multiscale to capture geometry of multidimensional data, optimally sparse approximation of anisotropic features.It is an affine system containing a single mother function that is parameterized by scaling, shearing, and translating parameters [15].It is argued that shearlets can capture direction features more precisely and efficiently [13,15].All these brilliant advantages make shearlets the most successful and versatile representation system.
Zero-watermark algorithm was proposed by Wen et al. [16], which does not change the original image.And the most important step is to construct a zero-watermark with the essential characteristics of the host image.In previous literatures [17], though NSST was applied in zero-watermarking algorithms.It was not clearly stated what kind of essential parts of the images should be considered and why NSST is a Mathematical Problems in Engineering better tool for representing images.Based on former studies [18], a novel zero-watermarking scheme is proposed through using shearlets and matrix norm to analyze image direction features and transform domain coefficients respectively.In this paper, image directionality is taken into account as a kind of essential property.And direction information intensity is defined to quantify the measurements.The experimental results demonstrate that the proposed algorithm can get remarkable robust ability.The comparison with latest methods proves that the zero-watermarking scheme that use shearlets is superior to those based on DWT.[6,13,14,19].2-dimensional affine system with composite dilations is as follows:

Basic Theory of Shearlets
If  , () forms a Parseval frame, the elements of this system are called composite wavelets.Shearlets are a special example of composite wavelets in  2 ( 2 ).There are collections of the form (1) where  is the anisotropic dilation matrix and  is the shear matrix: for any  = ( 1 ,  2 ),  1 ̸ = 0, let where for  ≥ 0, from the supporting condition ψ1 and ψ2 ,  ,, in frequency domain is supported with That is, each element ψ,, () is supported on a pair of trapezoids, of approximate size 2 2 × 2  , oriented along lines of the slope 2 − .Nonsubsampled shearlet transform (NSST) is implemented by two steps.Firstly, apply Laplace Pyramid scheme to decompose the host image  into a low-pass image   and several different scale levels, namely, high-pass component   .Secondly, the high-pass part is decomposed by discrete shearlet transform to get direction subbands.Because the image is decomposed without either downsampling or upsampling, the outputs have the same size as the original image.Figure 1(a) shows the illustration of LP decomposition succession and shearlet directional filtering.Figure 1(b) shows the tilling of frequency plane of shearlets.

Matrix Norm.
If  is a nonnegative matrix, its singular value decomposition (SVD) is defined as follows: where  is minimum of  and ,   is the singular value of matrix ,  1 >  2 >  3 ≥ ⋅ ⋅ ⋅ ≥   ,  is left singular value Input: matrices  and  Let  be a new matrix of the appropriate size For  from 1 to : For  from 1 to : Let sum = 0 For  from 1 to : vector, and  is right singular value vector.Spectrum norm and -norm of nonnegative matrix  are defined as follows: Matrix's spectrum norm is maximal singular; -norm is the square sum of all singular values.From formula (8), when  = 2, the matrix 2-norm is equivalent to the largest singular value.SVD is widely applied to digital watermarking technologies [20,21] and it effectively reveals that the larger singular values of an image do not change significantly when common image processing attacks are performed on this image.However, SVD calculating will increase algorithm's complexity and computing cost, since the SVD process has matrix product.The definition of matrix multiplication is that if  =  for an  ×  matrix  and an  ×  matrix , then  is an  ×  matrix with entries.
From this, a simple algorithm can be constructed which loops over the indices  from 1 through  and  from 1 through , computing the above using a nested loop in Algorithm 1.
This algorithm takes time ().A common simplification for the purpose of the algorithm analysis is to assume that the inputs are all square matrices of size  × , in which case the running time is ( 3 ).The intimate relationship between matrix 2 norm and singular value is that matrix 2norm is equivalent to the largest matrix singular value.Here we compared the calculating costs of SVD and matrix 2norm.Table 1 shows the time costs when calculating SVD and 2-norm of a matrix by Matlab, R2013b.The CPU is Intel5 Core6 2, 3.00 GHz, 32 bit.
From Table 1, calculating 2-norms is faster than calculating SVD.When matrixes size become larger, like Lena (256 × 256), the advantage of using 2-norm instead of SVD to acquire largest singular value becomes much more explicit.For the sake of time consuming, therefore, in this paper, matrix 2-norm is used instead of singular values to zero-watermarking embedding because of the intimate relationship between matrix norm and singular values.

Image Multidirection Features.
There exist many kinds of directional components in the host image like textures or edges.A large number of literatures [22,23] talked about methods to portray texture and edge directionality.Inspired by this special characteristic, in the proposed algorithm, multidirectionality of an image is regarded as a stable feature that should be given more attention in digital watermarking techniques.
Since the direction feature of an image is diverse, however, it is undisputable that only a few directions that DWT or DCT provides may not be sufficient enough to represent the direction information of an image [24].Thus, high direction sensitivity becomes the most important property of the tool selected for image direction analysis.According to the discussion of shearlets in Section 2, NSST is suitable for dealing with this task because of its direction sensitivity and sparse approximation of anisotropic features.Figure 2 illustrates the two-level NSST of the Zoneplate image.The first scale-level is decomposed into 4 directional subbands, and the second scale-level is decomposed into 8-directional subbands.In the following, NSST is used to illustrate the method to extract direction feature information.
Let artificial image (a) in Figure 3 be denoted as , and then perform the forward NSST to obtain multidirection and multiscale representation: where NSST + denotes forward NSST and  = { , } denotes the NSST coefficient matrix set of  at scale , direction .As is shown in Figure 3, when single direction coefficients are reconstructed to the time domain, specific image direction features can be seen clearly.However, as is shown in Figure 4, there are many kinds of direction components existing in real images, such as geometrical lines, edges, and textures.Direction information intensity here is adopted to measure how much feature information the subband has in given direction.Direction information intensity is defined by the following rule:  where NSST − denotes inverse NSST,  . indicates the direction coefficients in the time domain.The larger the   is, the richer the direction information the subband has at scale , direction .
This direction feature information can be used for selecting watermark embedding position.To obtain the robustness, the directional subband with the largest direction feature information intensity will be selected to construct zerowatermark.Table 2 shows direction feature information intensity values   of image Lena.
In this paper, the size of watermark is 32 × 32, the size of the host images is 512 × 512.That is,  =  = 16.
(1) Watermark Embedding Step 1. Apply forward NSST to decompose the host image  to gain multiscale and multiresolution representation.
Step 2. Reconstruct coefficients of 8 direction subbands to the time domain.All these 8-direction subbands are marked from  1 to  8 .
Step 3. Calculate direction feature information intensity of each subband according to formula (9) to determine embedding position   .
Step 4. Divide the selected subband into nonoverlapping × blocks followed by calculating 2-norms of each block and the largest 2-norm is ; the minimum 2-norm is .Then, compare all these 2-norms with the threshold  defined as below: When the 2-norm is larger than , (, ) = 1; otherwise, (, ) = 0.  Step 5.The zero-watermarking  is obtained from the binary embedding key  and the actual watermarking  based on the exclusive-or (XOR) operation: At last, can be used to assert the copyright of the image when needed.
Step 2. The extracting position and embedding position must be the same; thus, the extracting position is also   .
Step 3. Divide the selected subband into nonoverlapping × blocks followed by calculating 2-norms of each block and the largest 2-norm is   , the minimum 2-norm is   .Then, compare 2-norms with the threshold   defined below like (12).When the 2-norm is larger than     (, ) = 1,   (, ) = 0: Step 4. The extracted watermark   can be obtained based on the following XOR operation

Performance Evaluation and Analysis
To verify the effectiveness of the proposed algorithm, a series of experiments were conducted using images from USI-SIPI image database.Here six 512 × 512 sized grayscale images, which are shown in Figure 5, are taken as host images to quantify analysis of the proposed watermarking scheme.Structural similarity (SSIM) [25], which is used to measure the perceived quality of two images, and normalized correlation (NC), which is used to measure the resemblance between extracted and actual watermark, are applied.The SSIM index is calculated on various windows of an image.The measure between two windows  and  of common size where   and   are the averages of  and ,  2  and  2  are the variances of  and , and   is the covariance of  and . 1 and  2 are constants, where  1 = ( 1 ) 2 ,  2 = ( 2 ) 2 ,  1 = 0.01,  2 = 0.03 by default, and  is the dynamic range of the pixel-values.
NC is calculated as where  and   are the original and extracted watermark signals, respectively.Figure 6 shows the extracted watermark from original images before attacking and it turns out that the watermark can be perfectly extracted.
In the following subsection,, various attacks, like JPEG compression, adding noise, median filtering et al., are performed on the original images to test the robustness of the proposed scheme.

Robustness to JPEG Compression. JPEG compression is
one of the common attacks in image processing realm.Table 3 shows the values of SSIM and NC after JPEG compressing with various quality factors.It reveals that no matter what compressing factor is, NC values are all above 0.96.Therefore, the proposed algorithm is very robust against jpeg compressing.And three extracted watermarks are selected to show visual quality in Figure 7 with the compressing factor  = 30.It is not hard for anyone to notice that the watermarks can be perfectly extracted.

Robustness to Median
Filtering.Figure 8 gives the results of extracted watermarks after median filtering.From the figures, it can be concluded that the performance of the proposed algorithm in anti-median filtering is different among different host images.For example, the SSIM values of the host image Baboon show that the image is easily distorted by median filtering.And thus, it cannot get strong robustness like other host images.Table 4 shows the SSIM and NC values after three kinds of median filtering.And three extracted watermarks are selected to show visual quality in Figure 8 after 5 × 5 median filtering.

Robustness to Gaussian Noise and Salt and Pepper Noise.
Adding noise is carried out to test antiattacking capacity with different standard deviations.Tables 5 and 6 show SSIM values of distorted host images and NC values under different variances of Gaussian noise and Salt and Pepper noise when the noise means are all set to 0. And the standard deviations are set at 0.001, 0.005, 0.01, 0.05, and 0.1.Figures 9 and 10 show the quantitative results of extracted watermarks.From the figures, though noise brings perceptibility distortion to the host images, the extracted watermarks can be seen clearly.are 1/2, 1/4, 2, and 4. Table 7 shows the values of SSIM and NC at different scaling parameters.And Figure 11 shows the attacked images and extracted watermarks at scaling parameter = 1/4.From the SSIM values, it shows that the scaling attack brings little distortion to host images except that when scaling parameter is 1/2.But the extracted watermark is still pretty similar to the original watermark according to NC values.

Robustness to Rotating.
No matter images are rotated by which angle, the inherent image direction information cannot be altered.In conventional DWT based algorithms, images are only decomposed in horizontal, vertical, or diagonal direction.Direction shortness in DWT leads to poor performance in analyzing rotated images.However, this kind of disadvantage can be perfectly resolved by NSST.Both transform directions and bases structure can be adjusted to adapt rotated images.Table 8 shows SSIM and NC values in experiments of six images rotated in 5 kinds of angles.And from Figure 12, the watermarks can be extracted without too much distortion.

The Comparison of Related Algorithm.
Comparative experiments are implemented in order to verify the antiattacking capacity between the proposed algorithm in this paper and the other two schemes in paper [5], which use the counterpart transform, DWT.The scheme-1 first divide the host image into overlapping blocks.Each block is further decomposed up to level-one using DWT followed by singular value decomposition.Scheme-2 first applies DWT on the

NC Attacking style
Scheme-1 in paper [5] Scheme-2 in paper [5] Scheme in this paper whole image and LL subband is then selected for the following processing.
Figures 13 and 14 demonstrate NC values comparing results and seven kinds of attacking style are listed in Table 9.The host images are Peppers and Barbara, respectively.It can be easily seen from these two figures that the proposed scheme in this paper generally outperforms the other two zero-watermarking methods.From Figure 13, the antiattacking ability of the proposed scheme is higher than other two methods, except that NC value of the third attacking is a bit lower.From Figure 14, NC values of our scheme are lower than the scheme-1 when attacking is resizing (512-256-512), median filtering (5 × 5), and average filtering (7 × 7).But according to the experimental data, NC values of our scheme are all above 0.96.That is to say, the proposed scheme is also a good method.
However, it cannot be ignored that DWT based methods are slightly better than the proposed algorithm in antiresizing.DWT has been widely used in watermarking mainly owing to its good ability in modeling the human visual system.The most important feature of NSST is its appropriate representation of direction feature parts, like textures or edges.When images are resized from 512 × 512 to 256 × 256, some direction feature information may be missing to some extent.This is the main reason why extracted watermark is slightly different from the original.However, it cannot be overlooked that the proposed algorithm shows the strong Scheme-1 in paper [5] Scheme-2 in paper [5] Scheme in this paper robustness ability significantly against rotating than the other two methods.
From the above analysis, the proposed algorithm takes more advantage in robustness performance and, therefore, it gets a higher security than the other two zero-watermarking algorithms.

Conclusions
A digital watermarking scheme based on NSST has been described in this paper.Experimental results demonstrate that the NSST improves the digital watermarking performance considerably when compared to other methods based on DWT.The results show the good robustness against common attacks.In conclusion, it can be argued that a NSST-based watermarking scheme has a good perspective for effective digital right management.

Figure 1 :
Figure 1: (a) The illustration of the succession of LP decomposition and shearlet directional filtering.(b) The tiling of shearlets in the frequency domain.

Figure 2 :
Figure 2: An illustration of NSST.(a) Original image (b) low-pass coefficients.Image of the detail shear coefficients are shown in (c) and (d) with 4 and 8 directions, respectively, corresponding to the different directional bands illustrated in Figure 1(a).

Figure 4 :
Figure 4: (a) is Lena.(b) Eight Shearlet direction coefficients in the time domain.

4. 4 .
Robustness to Scaling.Four scaling operations are utilized to deteriorate the host images and scaling parameters

Figure 6 :
Figure 6: The extracted watermark from all host images before attacking (NC = 1.0000).

Figure 7 :
Figure 7: The attacked host images and extracted watermarks from Boats, Barbara, and Peppers after JPEG compressing ( = 30).

Figure 8 :
Figure 8: The attacked host images and extracted watermarks from Boats, Barbara, and Peppers after 5 × 5 median filtering.

Figure 9 :
Figure 9: The attacked host images and extracted watermarks from Boats, Barbara, and Peppers under Gaussian noise (V = 0.01).

Figure 10 :
Figure 10: The attacked host images and extracted watermarks from Boats, Barbara, and Peppers under Salt and Pepper noise (V = 0.01).

Figure 13 :
Figure 13: Similarity comparison statistics of watermark extracted from Peppers.

Figure 14 :
Figure 14: Similarity comparison statistics of watermark extracted from Barbara.

Table 1 :
Time costs comparison when calculating SVD and 2-norm of different matrix.

Table 2 :
The eight direction feature information intensity values of image Lena.

Table 3 :
The SSIM values of distorted host images and NC values of extracted watermarks after JPEG compressing.

Table 4 :
The SSIM values of distorted host images and NC values of extracted watermarks after median filtering.

Table 9 :
Seven kinds of attacking style.