IEEE Access (Jan 2022)

Spatial Domain-Based Robust Watermarking Framework for Cultural Images

  • Samrah Mehraj,
  • Subreena Mushtaq,
  • Shabir A. Parah,
  • Kaiser J. Giri,
  • Javaid A. Sheikh,
  • Amir H. Gandomi,
  • Mohammad Hijji,
  • Khan Muhammad

DOI
https://doi.org/10.1109/ACCESS.2022.3217920
Journal volume & issue
Vol. 10
pp. 117248 – 117260

Abstract

Read online

Heritage multimedia, which include photographs, customs, knowledge, arts, rituals, audio, cultural information, and music, are valuable artifacts of any region. The most important attribute of heritage media is the transmission of important features of past generations, which reflect their way of living, innovative attitude, and diversity in archaeological and historical perspectives. However, the proliferation of the Internet has made such data exchange more challenging than ever, allowing unauthorized users to easily access such information. Under such circumstances, securing cultural heritage (CH) media is essential. In that regard, herein, we present a spatial domain-based blind and robust watermarking scheme for the ownership verification of colored CH images; this scheme uses DC coefficient modification. In this scheme, the “Y” element of the YCbCr space is used for inserting a watermark. The “Y” element of a host image is divided into non-overlapping blocks with sizes of $8\times8$ . Each $8\times $ 8 block is then divided into two $4\times $ 8 subblocks. Instead of calculating the DC coefficients using the discrete cosine transform, we independently calculate the DC coefficient of every $4\times $ 8 subblock in the spatial domain. We test our method based on standard test images obtained from the USC-SIPI dataset and a self-created dataset of cultural images. Our scheme demonstrates improved robustness and lower computational complexity than frequency-domain-based techniques. The average peak signal-to-noise ratio of the proposed technique for test images is 40.0830 dB, and the structural similarity index matrix value is closer to one under no attack, ensuring the imperceptibility of the technique. Further, we prove the resilience of the proposed algorithm by comparing it with various state-of-the-art techniques.

Keywords