A Novel Scrambling Digital Image Watermark Algorithm Based on Double Transform Domains

Digital watermark technology is a very good method for protecting copyright. In this paper, in terms of requisition of imperceptibility and robustness of watermarking, the multidirectional, multiscale, and band-pass coefficient features of Curvelet transform are introduced and a novel image watermark scheme based on Curvelet and human visual system is proposed. Digital watermark information is embedded into the first 16 directions with larger energy in the fourth layer. Experimental results indicate that the proposed watermark scheme is feasible and simple. Simultaneously, the embedded watermark images just have tiny difference with the original images and the extracted watermark is accurate.Moreover, it is imperceptible and robust against various methods of signals processing such as cropping, noise adding, and rotating and altering.


Introduction
With the development of multimedia technology and network communications, digital products are increasingly popular.Due to illegal copying and tampering of digital product, traditional encryption technology is not sufficient to protect legitimate rights of digital media copyright.Digital watermarking which is hidden in digital products can play an important role.Recently, the digital watermarking has become one of research hotspots in the field of signal processing and information security.Its key is to embed the unremovable watermarking into the protected original signal without affecting data availability.Simultaneously, the watermarking can be completely and exactly extracted or detected, to satisfy solving the copyright disputes such as piracy tracking, and so forth.Therefore, the embedded digital watermarking must possess the following characteristics [1,2]: (1) imperceptibility: embedded watermarking should not lead to obvious visual difference and hidden information cannot be perceived easily; (2) robustness: the carrier image is attacked or processed; the embedded digital watermark information also can be extracted exactly; (3) maximum of information: the embedded watermark information should be capacity as much as possible in the digital products to achieve the largest hidden information volume of carrier object; (4) determinacy: the copyright of digital watermark information could uniquely determine the owner of the digital products even via certain damage.
According to the difference of embedding watermark technology, the algorithms were divided into watermarking in spatial domain and watermarking in transform domain [3].For watermarking in spatial domain, the amplitude of sample points of original image was changed directly and its representative algorithm was the Least Significant Bit algorithm [4].Changing coefficients of carrier image via embedding watermark information was called watermarking in transform domain.In general, the main idea of watermark algorithm in transform domain is changing the image transform domain coefficients to embed watermarking which adopts the spread spectrum communication principle.Digital watermark technology in transform domain has obvious advantages [5,6]: (1) The watermark information can be distributed into all pixels of spatial domain and ensure the imperceptibility of watermarking.(2) Centralization of energy distribution can embed large quantity of watermark data and guarantee better imperceptibility, stronger robustness, and higher security.(3) It is compatible with the existed image compression method and can embed watermarking into the compressed image.(4) It is compatible with human visual system and can hide the watermarking easily.The existed watermark algorithms in transform domain mainly include Discrete Fourier Transform (DFT) [7], Discrete Cosine Transform (DCT) [8], and Discrete Wavelet Transform (DWT) [9].They can effectively represent point singularity and deficiency for linear or curve singularity of natural images.Recently, with the development of the multiscale geometric transform, the approximation abilities of signal and image are continually enhanced, which is gradually correspondent to the human visual system and has been widely applied in many fields.There are plenty of researches in the field of information security, such as watermark algorithm based on Ridgelet Domain [10] and Curvelet Domain [11]; they can further improve the imperceptibility and robustness of watermark algorithm.According to various transforms and HVS, the capacity of the watermark insertion was introduced in some literatures [12][13][14].
In this paper, we study an algorithm in transform domain.According to the requirement of digital watermarking robustness and imperceptibility, the multidirectional, multiscale, and band-pass coefficient features of Curvelet transform are introduced and a novel image watermark scheme based on Curvelet and human visual system is proposed.At first, the scrambling digital watermark image via a layer of wavelet decomposition.Then, the original carrier image is transformed via Curvelet.At last, we embed low frequency components of watermark image into the larger 16-directional coefficient matrix of fourth layer of carrier image.Experimental results show that the proposed algorithm is simple and effective.The difference between the original image and the embedded watermark image is tiny.Simultaneously, the embedded watermarking can be extracted easily and accurately.Moreover, the algorithm has good imperceptivity and robustness for various attacks such as cropping, noise adding, and rotating and altering.

Curvelet Transform
2.1.The Theory of Curvelet Transform.Wavelet theory emerged in the mid-1980s.The good capability of time and frequency analysis is the important reason for its rapid development.However, wavelet transform cannot ideally achieve the optimal approximation order of signal for twodimensional or higher "line of singularity."So, Ridgelet theory was arisen at the historic background of theory.The basic theories of Ridgelet transform are given by Candès in 1998 [15].It transforms "line of singularity" in the twodimensional function into "point of singularity," and then wavelet transform can obtain the optimal nonlinear approximation order for the "line of singularity" of two-dimensional or high dimensional function.Monoscale Ridgelet transform [16] and Curvelet transform [17] are developed based on the Ridgelet transform.They derive from function localization and frequency band splitting, respectively, and both can approximately represent line and curve singularity.Differently, the basic scale  of monoscale Ridgelet transform is fixed; the basic scale  of Curvelet transform is arbitrary and can be decomposed in any possible scale.Curvelet transform is a mixture of special filter process and multiscale Ridgelet transform as follows.Achieving Curvelet transform requires a series of filters:  0 ,  2 ( = 0, 1, 2, . ..).The filter maps the function  as follows: The coefficients of Curvelet transform are as follows: Curvelet transform maps arbitrary mean square integrable function  as transform coefficient   ( ∈ ), where the parameter set of   is  and   = Δ   , is called Curvelet.The set of Curvelet constitutes a compact framework of  2 ( 2 ) and can be decomposed as Support interval of Curvelet bases is the most core relationship of Curvelet transform and satisfies the following: It denotes anisotropy scaling relationship.Curvelet is a kind of directional basis atom and Curvelet transform is a kind of multidirectional, multiresolution, and band-pass function analysis method.USFFT and WRAP algorithm for Curvelet transform are presented by Candès [18].

Analysis of Curvelet Coefficients Characteristics.
The coefficients of {}{}( 1 ,  2 ) structure can be obtained via Curvelet transform, where , , and ( 1 ,  2 ) denote scale, direction, and th direction matrix coordinate in scale layer , respectively.Lena image (Figure 1) with the size of 512 × 512, for example, is divided into six-scale layer via Curvelet transform.Its innermost layer, namely, the first layer, is called Course scale layer, which is a matrix made up of low frequency coefficient and occupies the vast majority of energy of the coefficients, including the general picture of  image.The outermost layer, namely, the 6th layer, is called fine scale layer, which is a matrix composed of high frequency coefficient, and shows image edges and details.The 2∼5 layer in the middle is called the detail scale layers.Coefficient of each layer is stratified into four broad directions and each broad direction is divided into 8, 8, 16, and 16 small directions.Each small direction is a matrix composed of medium and high frequency coefficients and the matrix is called subband coefficients matrix.Figure 2 shows coefficient matrix images of the first five layers; Figure 3 shows the coefficient matrix image of different directions in the 4th layer.Figure 4 is the outermost layer coefficient matrix image.The transform coefficient format of matrix coordinate ( 1 ,  2 ) in th direction of th layer is shown in Table 1.

Wavelet Transform
Wavelet analysis, as a mathematical theory and method, was developed from the mid-1980s.It is proposed by the French scientists Grossma and Morlet during their analysis of the seismic signals [19].Wavelet analysis was regarded as a breakthrough of Fourier analysis and has good localization performance in time-frequency domain and solved many difficult problems that cannot be solved by the Fourier transform.The wavelet transform is known as the "mathematical microscope," which is a milestone in the history of harmonic analysis development.The main idea of wavelet transform is to perform a detailed frequency separation for image, known as the multiresolution transform.Image can be stratified into the low frequency domain (on behalf of the general picture of the image) and the high frequency domain (on behalf of the image detail) via wavelet transform.And then, the high frequency part can be divided into three parts: HL, LH, and HH, which represents horizontal, vertical, and diagonal direction of the image, respectively.The low frequency coefficient represents average brightness of the corresponding wavelet blocks and high frequency coefficient represents the image texture and edges.If low frequency region is further subdivided via wavelet transform, it will generate a higher order of low frequency and higher  frequency order in accordance with the above recursion principle.Figure 5 denotes the structure diagram of the twoorder wavelet decomposition and Figure 6 shows the colored Lena image via two-order wavelet decomposition.The scrambling methods, such as Fass curve, Graycode, Arnold transform, and magic square, have been used.According to intuitionism and periodicity of the Arnold transform, we preprocessed the watermark image via the transform [20].Arnold transform, known as Arnold's Cat Map, is an ergodic theory.From the view of the theory of sampling, digital image is a two-dimensional discrete sampling array, namely, an image matrix.Discrete Arnold transform can be operated for a square digital image:

Watermark Algorithm and Evaluation Criterion
where (, ) and (  ,   ) denote the anterior pixel location and posterior pixel location via Arnold transform, respectively.The scrambling image can be produced via Arnold transform.
According to the structure of the human eye and knowledge of human visual system, human eyes are more sensitive to low frequency signal than to high frequency information.Taking into account robustness and imperceptibility of watermark information, watermark information is embedded into the detail scale level.The first 16-direction subbands with higher energy are chosen for watermark embedded site.Concrete steps of embedding watermark information are as follows.
Step 2. Turn each of the coefficient matrixes of 64 small directions in the 4th layer into 1 * 1408 row vectors and compute the energy value in each direction.The formula is as follows: (2)  4, (1, )      2 ,  = 1, 2, . . ., 64. (6) Step 3. Select the first 16 directions with larger energy as the watermark carrier site.
Step 5. Turn the low frequency matrix (32 * 32) into 1 * 1024 row vectors, which is used as watermark information.
Step 6. Embed watermark information into the first 16 directions with larger energy vector coefficient in Step 3, and change them into direction matrix respectively: Step 7. Execute Curvelet reconstruction to obtain the embedded watermark image (Figure 8).
The extraction of the watermark is implemented via inverse process of the watermark embedding; specific steps are as follows.
Step 1. Execute Curvelet decomposition for Lena image which have been embedded with watermark information.
Step 2. Turn the coefficient matrix of 64 small directions in the fourth layer into 1 * 1408 row vectors, respectively.Then subtract coefficient matrix row vector corresponding to  original Lena image and multiply the reciprocal of 16 times embedding strength factor: Step 3. Turn the first 1024 elements of vector  1, into the 32 * 32 matrix, which is extracted watermark information.
Step 4. Combine extracted watermark information with high frequency component obtained by a layer of wavelet decomposition of the original watermark and make a wavelet reconstruction.
Step 5. Execute inverse Arnold scrambling for the reconstructed image and watermark image is thus extracted (Figure 8).
The human eye which acts as the digital image processing terminal is the most accurate method for the subjective evaluation.However, subjective evaluation methods are all complex, time-consuming, and difficult to quantify.So the limitations of subjective evaluation promote the development of objective evaluation method.The traditional objective evaluation methods such as Peak Signal to Noise Ratio (PSNR) and Mean Square Estimation (MSE) are widely used in image quality evaluation [21].However, they are not combined with the human visual system and cannot accurately measure the watermarked image visual quality.Therefore, it is necessary to seek a more objective and accurate evaluation.Recently, the structural similarity index (SSIM) which acts as a novel objective evaluation of two-image similarity index is gradually applied [22].It comes from the improvement of the universal image quality.Structural similarity of images consists of comparison of brightness, contrast, and structure information; their expression is as follows: They form evaluation method: where , ,   ,   represent, respectively, the original image blocks and the degraded image blocks and denote, respectively, their corresponding variance and are all small positive constants and   is covariance of  and .In order to adjust the proportion of three parts, given parameters , ,  are greater than zero and  1 ,  2 ,  3 are all small constant to avoid the denominator is zero, where  1 = ( 1 ) where ,  represents the original image block and degraded image blocks, respectively,  is the total account of image subblocks, and   ,   denotes the th subblock of the original image and the distortion image, respectively.In this paper, MSSIM index is an objective measure of the hidden watermark.To quantify consequent, using more concrete form of MSSIM index, In order to eliminate the effect of subjective and objective factors such as experience, physical condition of the observers, and experimental conditions, Normalized Cross-Correlation (NC) is adopted to quantitatively evaluate the similarities between extracted watermark W and the original watermark  [23], which is defined as follows: Generally, if the extracted watermark W and the original watermark  satisfy the relationship NC(, W) > 0.85, it is shown that the extracted watermark has good similarity with original one and the watermarking satisfies the requirements of robustness.The greater the relative value, the better the robustness.

Watermark Attack Analysis.
In order to detect the imperceptibility of watermark information and robustness of the algorithm, cutting edge attack, Gaussian noise attack, a quarter of the clipping attack, and rotating and altering attack are simulated to test the Lena image.All kinds of attack effects are shown in Figures 9-24.
As can be seen from Table 2, the embedded watermark image has very good imperceptibility and can resist various attacks.Moreover, the extracted watermark image and the original one have much correlation, satisfying the requirement of the watermark robustness.Furthermore, the proposed algorithm in the paper is better robustness to the rotational attack than other transforms; Table 3 is the test results of the spinning processing attack ( = 30 ∘ ) for various transforms.

Conclusions
In this paper, the basic principles of Curvelet transform have been analyzed.Compared with wavelet transform and Ridgelet transform, Curvelet transform shows better performance in signal processing.We take full advantage of multidirection, multiresolution, and band-pass features of Curvelet transform and the characteristics of human visual system.The scrambling digital watermark information is embedded into the first 16 directions with larger energy in the fourth layer.All kinds of attack are simulated on embedded watermark image.Experimental results show that the algorithm has good robustness and imperceptibility and better robustness to the spinning processing attack than other transforms.In the future, we will do a further study on the

Figure 2 :Figure 3 :
Figure 2: The coefficient matrix image of the first five layers via Curvelet transform.

Figure 4 :
Figure 4: The coefficient matrix image in 6th layer of Lena image via Curvelet transform.

Figure 5 :
Figure 5: The structure diagram of the two-order wavelet decomposition.

4. 1 .
Image Scrambling Transform.Image scrambling transform which is an algorithm via messing image pixel sequence is a kind of image encryption technology.The number of pixels and the histogram of the image are not changed.The scrambling watermark can eliminate the spatial interdependency of watermark pixels.So it enhances the robustness of watermark image for clipping operation.

Figure 7 :
Figure 7: The original watermark image, Arnold scrambling image, and wavelet decomposition image.

Figure 8 :
Figure 8: The original image, the original watermarking, embedded watermark image, and the extracted watermarking.

Figure 15 :
Figure 15: Cropping edges attack image and extracted image.

Figure 16 :
Figure 16: Graffiti attack image and extracted image.

Figure 17 :
Figure 17: Montage attack image and extracted image.

Figure 18 :
Figure 18: Half brightness attack image and extracted image.

Figure 19 :
Figure 19: Double brightness attack image and extracted image.

Figure 23 :
Figure 23: Sharp filtering attack image and extracted image.

Figure 24 :
Figure 24: Mosaic attack image and extracted image.

Table 1 :
The coefficient structure of Curvelet transformation.