Image Watermarking Algorithm Based on Multiobjective Ant Colony Optimization and Singular Value Decomposition in Wavelet Domain

We present a new optimal watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) using multiobjective ant colony optimization (MOACO). A binary watermark is decomposed using a singular value decomposition. Then, the singular values are embedded in a detailed subband of host image. The trade-off between watermark transparency and robustness is controlled by multiple scaling factors (MSFs) instead of a single scaling factor (SSF). Determining the optimal values of the multiple scaling factors (MSFs) is a difficult problem. However, a multiobjective ant colony optimization is used to determine these values. Experimental results show much improved performances of the proposed scheme in terms of transparency and robustness compared to other watermarking schemes. Furthermore, it does not suffer from the problem of high probability of false positive detection of the watermarks.


Introduction
With the advent of numeric era at the end of 20th century, the exchange of digital documents became a very easy task.This extraordinary technical revolution from analog to numerical technology was not achieved without generating anxiety in terms of the protection of the authors rights since multimedia documents can be quite easily duplicated, modified, and illegally attacked without deterioration.Affected by significant revenue losses multimedia documents author's are motivated more than ever to secure their documents.In this context digital watermarking was introduced: it consists of inscribing invisible (or visible) data into the multimedia documents.This is done in two stages: embedding and extracting process.Digital watermarking schemes for images can be classified into different classes according to embedding domain, embedding rule, imperceptibility, and permanency.
In terms of robustness, the watermarking algorithm can be classified into three categories: fragile, semifragile, and robust.Fragile watermarking is designed to detect any modification in such a way that slight modifications or tampering on the watermarked image will destroy the watermark.This type is employed to ensure the integrity and image authenticity.Conversely, robust watermarking is designed to be resistant against attacks that attempt to remove or destroy the watermark without degrading the visual quality of the watermarked image significantly.Robust watermarking is typically employed for copyright protection and ownership verification.Semifragile watermarking combines the properties of fragile and robust watermarking in order to detect unauthorized manipulations while still being robust against authorized manipulations.
Generally, watermarking algorithms operate either in the spatial domain or in a transform domain such as discrete wavelet transform (DWT) [1][2][3], discrete Fourier transform (DFT) [4][5][6], and discrete cosine transform (DCT) [7][8][9].Spatial domain watermarking has the advantage of low calculation complexity compared to that in transform domains.However, most watermarking schemes in the scientific literature operate in the transform domain because it provides enhanced imperceptibility and robustness compared to those in spatial domain.However, decomposition of images in a standard basis set using the transform domain does not necessarily leads to the optimal representation of an image.Therefore, different representations were investigated for watermarking: these include nonnegative matrix factorization (NMF) [10][11][12] and singular value decomposition (SVD) [13][14][15].Watermarking schemes based on SVD are advantageous since slight changes in the singular values do not affect significantly the image quality.Unfortunately, several SVD-based watermarking schemes suffer from typically high probability of false positive watermark detection [16][17][18].
According to embedding rule, watermarking algorithm can be classified into three categories: multiplicative, additive, or substitution.In multiplicative and additive embedding schemes, the trade-off between imperceptibility and robustness is controlled by a single scaling factor (SSF).Cox et al. [19] suggest to use multiple scaling factors (MSFs) instead of one.They state that single scaling factor may not be applicable for altering all the pixel values of the original image.Determining the optimal values of the multiple scaling factors can be viewed as optimization problem which is unfortunately a difficult problem.In this paper, a multiobjective ant colony optimization (MOACO) is used to solve this difficult problem and to determine these optimal values.The rest of this paper is organized as follows.Section 2 reviews the basic concepts of the ant colony optimization (ACO).In Section 3, we presented the proposed watermarking algorithm based on discrete wavelet transform (DWT) and singular value decomposition (SVD).The proposed watermarking algorithm using multiobjective ant colony optimization is described in Section 4. The experimental results are provided in Section 5. Finally, the concluding remarks are given in Section 6.

Ant Colony Optimization Principle
The ant colony optimization (ACO) was introduced by Dorigo [20] as solution for hard optimization problems.It is inspired by observation of real ant colonies.Ants explore randomly the area surrounding their nest in order to find food.If an ant finds a food source, it evaluates and carries some food to the nest.During the return travels the ant deposits on the ground a chemical substance called pheromone trail.Other ants can smell the pheromone and follow it with some probability.This way, ants can communicate via pheromone and find the optimal path between the food source and the nest.This capability of real ant colony to find optimal paths has led to the definition of artificial ant colonies that can find the optimal solution for hard optimization problems [21] such as the traveling salesman problem.The outline of the generic ACO algorithm is presented in Figure 1.
The first point to take into account in ant colony optimization is how the colony is represented.For continuous variables, a colony of  ants is represented as  ×  matrix , where is a vector of  design variables that corresponds to a single ant.The second point to consider is how to model the pheromone communication scheme.Socha and Dorigo [21] suggest to use a normal distribution for a continuous model implementation: Define the ACO parameters:

Results
Evaluate the objective function and take it as a path length measure of each ant Perform a complete tour (which mimics path between the nest and the food source) Update the pheromone trail No Yes Stop criterion colony size, initial pheromone trail, dissolving rate Figure 1: Generic ant colony optimization scheme [22].
where  min is the optimal point found within the design space and the standard deviation  as an index of the ants aggregation around the current minimum.To initialize the algorithm,  min is randomly chosen in the design space, using a uniform distribution, and  is taken at least three times greater than the length of the design space, to uniformly locate the ants within it.As shown in Figure 1, at each iteration, the ACO algorithm updates the values of each design variable, and this is for all the ants of the colony; that is, at each iteration each ant sets the values for the trial solution as per the distribution in (1).At the end, the pheromone distribution over the design space is updated by collecting the information acquired throughout the optimization steps.Since the pheromone is modeled by (1), it is necessary only to update  min and  as where std(colony) makes use of the colony of ants (candidate solution) to return a vector containing the standard deviation for each design variable [23].The accumulation of pheromone increases in the vicinity of the candidate towards the optimum solution.However, to avoid premature convergence, negative update procedures are not discarded: for this, a simple method is used, which consists in dissolving the pheromone.The principle is to spread the amount of pheromone by changing the current standard deviation (for each variable) according to where  > 1 is the dissolving rate.

Watermarking Algorithm Based on SVD and DWT
The SVD-DWT watermarking algorithm presented in [14] is described by the following embedding and extraction processes.
3.1.Embedding Process.Consider an original image  of size  × , and let the watermark  be a binary image of size  × .The embedding process is as follows.
(3) Compute the inverse DWT of the selected sub-band (): (4) Apply a singular value decomposition (SVD) of matrix : (5) Encrypt watermark image  using image encryption algorithm to get encrypted watermark denoted by   .
(6) Apply a singular value decomposition to watermark matrix   .
(7) Compute the one-way hash functions for matrices    and    : (8) Matrices    and    and their hash values   and   are stored in the private key.(Steps (5) and ( 7) are necessary to mitigate the problem of false positive detection of watermark.This solution was proposed in [24].)(9) Compute matrix   according to where  is the watermark strength factor that controls the trade-off between imperceptibility and robustness of the watermarking scheme.This parameter can be used as single scaling factor (SSF) or multiple scaling factors (MSFs).
(10) Compute matrix   , according to (11) Compute the discrete wavelet transform of matrix   , (12) The watermarked image   is computed by applying the inverse ℓ-level discrete wavelet transform to the modified sub-band   and the 3ℓ unmodified subbands.

Extracting Process.
The extracting process is summarized by the following steps.
(1) A safety test is first done: hash values of matrices    and    , possibly altered by an attacker as Ũ and Ṽ , are computed to give  Ũ and  Ṽ.These hash values are compared with these stored during the embedding process: (2) Decompose the original and watermarked images,  and   , by applying the ℓ-level discrete wavelet transform.
(3) Select the same sub-band () used in 2 of the watermark embedding process.  and    are, respectively, the subbands selected for the original and watermarked images.

Protection against False Positive Detection.
To protect the proposed image watermarking scheme against false positive detection, two countermeasures have been proposed in [24].The first countermeasure consists of computing a one-way hash function for the matrices   and   .The hash function algorithm such as message digest 5 (MD5) or secure hash algorithm 1 (SHA-1) can be used for this purpose.During embedding process, the hash values of matrices   and   denoted, respectively, by   and   are stored in a private key.In the extracting process, the hash function is first computed from received (and possibly altered by an attacker) matrices  W and  W, denoted by  Ũ and  Ṽ.Thus, if   ̸ =  Ũ or   ̸ =  Ṽ, the watermark extracting process is stopped because  W ̸ =   or  W ̸ =   : otherwise the watermark extracting process is performed.The authors indicate that the hash function test can be also be applied on a combined matrix from   and   such as   +   and   ×   .
The second countermeasure consists in encrypting the watermark before the embedding process.The watermark  is encrypted resulting in an encrypted watermark denoted by   which will then be embedded in the original image .Suppose that for watermark extraction process, an attacker uses his own watermark W. Then matrices  W and  W will be used instead of proper matrices    and    .The first extracted watermark will be the same as W, but the decryption process must be performed since the embedded watermark is encrypted during the watermark embedding process.Therefore, the extracted watermark Ŵ will be a random-like image.Note that, if there is no attack, the first extracted watermark Ŵ will indeed be the encrypted image, but after decryption, the extracted watermark Ŵ will have a high correlation value with the original watermark .Figures 2 and 3 illustrate an example of one-way hash function and encryption countermeasures, respectively, using Lena as original image  and LOGO as watermark .

Watermarking Algorithm Using Multiobjective Ant Colony Optimization
In general, watermarking schemes are either based on an additive or a multiplicative rule.The embedding rules themselves are usually of the following form, where  and   are, respectively, original and watermarked image (or their representation in other domains such as FFT, DCT, and DWT),  is used to control the trade-off between imperceptibility and robustness of an image and generally is used as scaling factor: Cox et al. [19] suggest the use of multiple scaling factors instead of one.They state that a single scaling factor may not be applicable for altering all the values of original image .Determining the optimal values of these multiple scaling factors is a complex computational problem.To solve it, we propose to use a multi-objective ant colony optimization (MOACO).[3] 45.323 1.000 Pai and Ruan [25] 55.186 0.998 Ouhsain and Hamza [12] 52.569 0.999 Figure 4 illustrates block diagram of multiobjective optimization which is closed-loop control system.System input is multiple scaling factors and objective measure as system output; this measure is calculated from original image , watermarked image   , watermark , and the ( + 1) extracted watermarks ( Ŵ and Ŵ , where  = {1, 2, . . ., }) under attacks.
The steps for applying MOACO into SVD-DWT watermarking scheme are enumerated below.
(1) Define the colony size, the initial pheromone trail, the dissolving rate (), the objective function, and a generation number as the algorithm stopping criterion.
(2) Using ( 17), generate randomly an initial population of ants, which constitute a set of potential solutions.Each ant is denoted by  = { 1 ,  2 , . . .,   }, where  *  is the th coordinate of the best point found by optimization within the design space at the current iteration and   is the ants aggregation index for the th coordinate of the design space.At the first iteration,  *  is chosen according a uniform  distribution with   taken as at least 3 times larger than the length of the search interval.
(3) For each ant  of the population, consider the following.
(i) Produce the watermarking image   using embedding process (Section 3.1) using the ant  as the watermark strength factor.Note that (8) in watermark embedding process is transformed into.(Note that,  is changed into multiple scaling factors instead of single scaling factor and diag() is diagonal matrix created from the vector , that is, the ant )   .This leads to  different attacked watermarked images { Î } for each original watermarked image   .
(v) Compute the normalized correlation between the original watermark  and the set of extracted watermarks { Ŵ }, that is, { (, Ŵ )}.
(vi) Construct the vector of objective values, (), defined as (vii) Evaluate the vector of objective values according to the exponential weighted method for multiobjective optimization [26]: where , , and  0 are positive constants.In experiments, we take  = 2,  = 5 et  0 = 10.
(5) Update the pheromone trail distribution using the formula (17); in this step the aggregation index for the th dimension   is given by where y is the th column of the colony matrix ,  is the mean value of the vector y, and  is the number of colony size.
(6) Save the best ant  best between this generation and the old one generation.(7) If the generation number is reached, the optimization process of the multiple scaling factors (MSFs) is terminated, else it goes to the next step.
(8) Using the distribution of ( 17), generate a new population of ants and then go back to 3.

Experimental Results
To show the effectiveness of the proposed watermarking algorithm using multiple scaling factors optimized by multiobjective ant colony optimization instead of single scaling factor in terms of imperceptibility and robustness, a number of tests have been carried out using four 256 × 256 grayscale test images and a 32 × 32 binary watermark, which are depicted in Figure 5.Note that ℓ is set to be equal to 3. We conducted several experiments to compare the imperceptibility and robustness of the proposed watermarking algorithm using multiple scaling factors optimized by multiobjective ant colony optimization (i.e., MSF-MOACO) and single scaling factor (SSF) with Xianghong et al. [1], Liu [3], Pai and Ruan [25], and Ouhsain and Hamza [12] algorithms.For the robustness tests, ten different attacks were selected in conjunction to multiobjective optimization (i.e.,  = 10).These attacks are salt and peppers noise (with a density of 0.05), Gaussian filtering (3 × 3), cropping (1/8 of the image center), JPEG compression ( = 5), sharpening, scaling (256 → 512 → 256), histogram equalization, gray-scale quantization (1 bit), re-watermarking using other watermarks that differ from the watermark (Letter A) and collusion attack using five watermarks, which are denoted by SP, GF, CR, CM, SH, SC, HE, QN, RW, and CA, respectively.The normalized correlation values between embedded and extracted watermarks under these attacks are depicted in Table 2, where the MSF-MOACO algorithm outperforms other algorithms [1,3,12,25].
The effectiveness of the proposed algorithm (MSF-MOACO) is also tested against other attacks such as gamma correction ( = 0.2), dithering, rotation (25 ∘ ), motion blur (45 ∘ ), and translation (25 pixels × 25 pixels), which were denoted by GC, DI, RT, MB, and TR, respectively.Table   depicts the normalized correlation values under these attacks, where one can observe that MSF-MOACO algorithm is more robust against these attacks compared to other algorithms.Figure 6 shows an example of watermarked images under these attacks, while Figure 7 depicts their corresponding extracted watermarks.

Conclusion
In this paper, we present a new watermarking algorithm based on lifting wavelet transform (LWT) and singular value decomposition (SVD) using multiple scaling factors (MSF) optimized by multiobjective ant colony optimization (MOACO).The MSFs are used instead of single scaling factor (SSF) to achieve a highest possible robustness without losing watermark transparency.However, determining the optimal set of multiple scaling factors is a prohibitively complex problem; to solve this problem a multiobjective ant colony optimization is used.Experimental results demonstrate that the proposed watermarking algorithm (MSF-MOACO) outperforms other watermarking algorithms in terms of imperceptibility and robustness.Moreover, MSF-MOACO algorithm showed better imperceptibility and excellent resiliency against a wide range of watermarking attacks such as additive noise, compression, filtering, and geometrical attacks.Furthermore, the problem of false positive detection which affects most SVD watermarking algorithms is resolved using countermeasures based on one-way hash function and watermark encryption proposed in [24].

Figure 2 :Figure 3 :
Figure 2: Example of the first countermeasure based on one-way hash function.

Figure 5 :
Figure 5: Original images and binary watermark.

Table 2 :
Correlation coefficient comparison results between MSF-MOACO and SSF algorithms and other algorithms.

Table 3 :
Correlation coefficient comparison results between the MSF-MOACO algorithms and other algorithms.
Table 1 lists the PSNR values of proposed and other algorithms for the same test images.It is clearly shown