Wireless Personal Communications

, Volume 98, Issue 2, pp 2223–2250 | Cite as

An SVD Based Location Specific Robust Color Image Watermarking Scheme Using RDWT and Arnold Scrambling

  • Soumitra RoyEmail author
  • Arup Kumar Pal


In recent times, effectiveness of the robust image watermarking scheme almost successfully solves the authenticity and copyright protection problem of images. Among several existing robust watermarking schemes, very few have been designed for color images. In this paper, the authors have proposed a redundant discrete wavelet transform (RDWT) and singular value decomposition based hybrid robust color image watermarking method where scrambled watermark is used for embedding purpose to provide extra security to authentic logo. At first, RGB color image is converted to YCbCr color image and then the Y component of YCbCr color space is used to insert Arnold scrambled grayscale watermark. In the next step, Y component of the YCbCr color model is decomposed into non overlapping blocks and subsequently RDWT are applied to each block. For better imperceptibility and effectiveness, in this proposed algorithm some singular values of RDWT transformed Y component blocks are modified by non overlapping decomposed and scrambled watermark blocks. Robustness of the proposed method is experimented against common geometric transformation attacks (like rotation, flip operation, cropping, scaling, shearing and deletion of lines or column operation etc.), common enhancement technique attacks (like lowpass filtering, histogram equalization, sharpening, gamma correction, noise addition etc.), jpeg compression attacks, some combinational attacks and satisfactory results are achieved. For better evaluation, proposed scheme is verified against standard benchmark software “Checkmark”.


Arnold scrambling Color image watermarking RDWT Robustness SVD YCbCr color space 


  1. 1.
    Swanson, M. D., Kobayashi, M., & Tewfik, A. H. (1998). Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 86(6), 1064–1087.CrossRefGoogle Scholar
  2. 2.
    Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.CrossRefGoogle Scholar
  3. 3.
    Hernandez, J. R., Amado, M., & Perez-Gonzalez, F. (2000). DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1), 55–68.CrossRefGoogle Scholar
  4. 4.
    Kusyk, J., & Eskicioglu, A. M. (2005). A semi-blind logo watermarking scheme for color images by comparison and modification of DFT coefficients. In Optics east, international society for optics and photonics.Google Scholar
  5. 5.
    Campisi, P., Kundur, D., & Neri, A. (2004). Robust digital watermarking in the ridgelet domain. IEEE Signal Processing Letters, 11(10), 826–830.CrossRefGoogle Scholar
  6. 6.
    Barni, M., Bartolini, F., & Piva, A. (2001). Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 10(5), 783–791.CrossRefzbMATHGoogle Scholar
  7. 7.
    Hien, T. D., Nakao, Z., & Chen, Y. W. (2006). Robust multi-logo watermarking by RDWT and ICA. Signal Processing, 86(10), 2981–2993.CrossRefzbMATHGoogle Scholar
  8. 8.
    Mabtoul, S., Ibn-Elhaj, E., & Aboutajdine, D. (2006). A blind image watermarking algorithm based on dual tree complex wavelet transform. In Proceeding of 2nd international symposium on communication, control and signal process. Google Scholar
  9. 9.
    Barni, M., Bartolini, F., & Piva, A. (2002). Multichannel watermarking of color images. IEEE Transactions on Circuits and Systems for Video Technology, 12(3), 142–156.CrossRefzbMATHGoogle Scholar
  10. 10.
    Su, Q., Niu, Y., Wang, Q., & Sheng, G. (2013). A blind color image watermarking based on DC component in the spatial domain. Optik-International Journal for Light and Electron Optics, 124(23), 6255–6260.CrossRefGoogle Scholar
  11. 11.
    Shi, H., Lv, F., & Cao, Y. (2014). A blind watermarking technique for color image based on SVD with circulation. Journal of Software, 9(7), 1749–1756.Google Scholar
  12. 12.
    Dharwadkar, N. V., & Amberker, B. B. (2010). An efficient and secured non blind watermarking scheme for color images using DWT and Arnold transform. International Journal of Computing, 9(2), 183–191.Google Scholar
  13. 13.
    Gonzalez, R. C., & Woods, R. E. (2007). Digital image processing (2nd ed.). London: Pearson Education.Google Scholar
  14. 14.
    Su, Q., Niu, Y., Liu, X., & Yao, T. (2013). A novel blind digital watermarking algorithm for embedding color image into color image. Optik-International Journal for Light and Electron Optics, 124(18), 3254–3259.CrossRefGoogle Scholar
  15. 15.
    Chen, B., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J. L., & Shu, H. (2014). Full 4-D quaternion discrete Fourier transform based watermarking for color images. Digital Signal Processing, 28, 106–119.CrossRefGoogle Scholar
  16. 16.
    Ouyang, J., Coatrieux, G., Chen, B., & Shu, H. (2015). Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping. Computers & Electrical Engineering, 46, 419–432.CrossRefGoogle Scholar
  17. 17.
    Kalra, G. S., Talwar, R., & Sadawarti, H. (2015). Adaptive digital image watermarking for color images in frequency domain. Multimedia Tools and Applications, 74(17), 6849–6869.CrossRefGoogle Scholar
  18. 18.
    Ward, D. L. (2003). Redundant discrete wavelet transform based super-resolution using sub-pixel image registration (No. AFIT/GE/ENG/03-18). Air Force Inst Of Tech Wright-Patterson AFB Oh School of Engineering and Management.Google Scholar
  19. 19.
    Moonen, M., Van Dooren, P., & Vandewalle, J. (1992). A singular value decomposition updating algorithm for subspace tracking. SIAM Journal on Matrix Analysis and Applications, 13(4), 1015–1038.MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Ali, M., Ahn, C. W., & Pant, M. (2014). A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-International Journal for Light and Electron Optics, 125(1), 428–434.CrossRefGoogle Scholar
  21. 21.
    Konda, T., & Nakamura, Y. (2009). A new algorithm for singular value decomposition and its parallelization. Parallel Computing, 35(6), 331–344.MathSciNetCrossRefGoogle Scholar
  22. 22.
    Sadek, R. A. (2012). SVD based image processing applications: State of the art, contributions and research challenges. arXiv preprint arXiv:1211.7102.
  23. 23.
    Aslantas, V. (2009). An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Optics Communications, 282(5), 769–777.CrossRefGoogle Scholar
  24. 24.
    Su, Q., Niu, Y., Wang, G., Jia, S., & Yue, J. (2014). Color image blind watermarking scheme based on QR decomposition. Signal Processing, 94, 219–235.CrossRefGoogle Scholar
  25. 25.
    Su, Q., Niu, Y., Zou, H., & Liu, X. (2013). A blind dual color images watermarking based on singular value decomposition. Applied Mathematics and Computation, 219(16), 8455–8466.MathSciNetCrossRefzbMATHGoogle Scholar
  26. 26.
    Zhang, X. P., & Li, K. (2005). Comments on” An SVD-based watermarking scheme for protecting rightful Ownership”. IEEE Transactions on Multimedia, 7(3), 593–594.CrossRefGoogle Scholar
  27. 27.
    Rykaczewski, R. (2007). Comments on “An SVD-based watermarking scheme for protecting rightful ownership”. IEEE Transactions on Multimedia, 2(9), 421–423.CrossRefGoogle Scholar
  28. 28.
    Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J. J., & Su, J. K. (2001). Attacks on digital watermarks: Classification, estimation based attacks, and benchmarks. IEEE Communications Magazine, 39(8), 118–126.CrossRefGoogle Scholar
  29. 29.
    Kutter, M., & Petitcolas, F. A. (1999). Fair benchmark for image watermarking systems. In Electronic imaging ‘99 (pp. 226–239). International Society for Optics and Photonics.Google Scholar
  30. 30.
  31. 31.
    Pereira, S., Voloshynovskiy, S., Madueño, M., Marchand-Maillet, S., & Pun, T. (2001). Second generation benchmarking and application oriented evaluation.In Information hiding workshop III, Pittsburgh, PA, USA (pp. 340–353).Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringDr. B. C. Roy Engineering CollegeDurgapurIndia
  2. 2.Department of Computer Science and EngineeringIndian Institute of Technology (Indian School of Mines)DhanbadIndia

Personalised recommendations