Xiaojie Tian , Shuai Jiao , Gang Wang , Yu Xia , Xuefeng Wei , Qingtang Su
{"title":"A robust blind watermarking scheme for color digital images based on GJO and the maximal connected domain","authors":"Xiaojie Tian , Shuai Jiao , Gang Wang , Yu Xia , Xuefeng Wei , Qingtang Su","doi":"10.1016/j.jisa.2025.104249","DOIUrl":null,"url":null,"abstract":"<div><div>The problem of image piracy is becoming more and more severe in today’s society contemporary society. To resolve this problem of protecting the copyright of color images, a robust color image blind watermarking scheme based on the golden jackal optimization algorithm (GJO) and the maximal connected domain is proposed. GJO is adopted to select the threshold of the maximal connected domain and the quantization step of watermark embedding, and the maximal connected domain of the main image is selected as the embedding region based on a specific threshold. Then, the embedding area is divided into RGB three-layer channels. Each layer of channels is divided into non-overlapping matrix blocks with size of 4×4. Two watermark bits are embedded in each block. Specifically, two watermark bits are quantized and embedded into the first two elements in the first row of the matrix after the Householder transform, and double overflow treatment is applied to the embedded values of the watermark to improve its robustness. The experimental performances are shown as follows: 1) the average values of PSNR and SSIM are above 40 <em>dB</em> and 0.96, respectively; 2) the values of NC are above 0.95 under different attacks; 3) the theoretical maximum capacity for watermark information is four times the actual capacity; 4) The time complexity of embedding a watermark bit is O(<em>n</em><sup>2</sup>). The experimental results indicate that the scheme proposed exhibits good performance in robustness, invisibility, time complexity, watermark embedding capacity, and other aspects.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104249"},"PeriodicalIF":3.7000,"publicationDate":"2025-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002868","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The problem of image piracy is becoming more and more severe in today’s society contemporary society. To resolve this problem of protecting the copyright of color images, a robust color image blind watermarking scheme based on the golden jackal optimization algorithm (GJO) and the maximal connected domain is proposed. GJO is adopted to select the threshold of the maximal connected domain and the quantization step of watermark embedding, and the maximal connected domain of the main image is selected as the embedding region based on a specific threshold. Then, the embedding area is divided into RGB three-layer channels. Each layer of channels is divided into non-overlapping matrix blocks with size of 4×4. Two watermark bits are embedded in each block. Specifically, two watermark bits are quantized and embedded into the first two elements in the first row of the matrix after the Householder transform, and double overflow treatment is applied to the embedded values of the watermark to improve its robustness. The experimental performances are shown as follows: 1) the average values of PSNR and SSIM are above 40 dB and 0.96, respectively; 2) the values of NC are above 0.95 under different attacks; 3) the theoretical maximum capacity for watermark information is four times the actual capacity; 4) The time complexity of embedding a watermark bit is O(n2). The experimental results indicate that the scheme proposed exhibits good performance in robustness, invisibility, time complexity, watermark embedding capacity, and other aspects.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.