2024 Volume 33 Issue 12
Article Contents

Jialong Zhu, Jiaying Ji, Le Wang, Shengmei Zhao. Optical image watermarking based on orbital angular momentum holography[J]. Chinese Physics B, 2024, 33(12): 124202. doi: 10.1088/1674-1056/ad8cbd
Citation: Jialong Zhu, Jiaying Ji, Le Wang, Shengmei Zhao. Optical image watermarking based on orbital angular momentum holography[J]. Chinese Physics B, 2024, 33(12): 124202. doi: 10.1088/1674-1056/ad8cbd

Optical image watermarking based on orbital angular momentum holography

  • Received Date: 31/08/2024
    Accepted Date: 21/10/2024
    Available Online: 01/12/2024
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Figures(6)  /  Tables(2)

Article Metrics

Article views(359) PDF downloads(0) Cited by(0)

Access History

Optical image watermarking based on orbital angular momentum holography

Abstract: We propose an optical image watermarking scheme based on orbital angular momentum (OAM) holography. Multiple topological charges (TCs, l) of OAM, as multiple cryptographic sub-keys, are embedded into the host image along with the watermark information. Moreover, the Arnold transformation is employed to further enhance the security and the scrambling time (m) is also served as another cryptographic key. The watermark image is embedded into the host image by using the discrete wavelet transformation (DWT) and singular value decomposition (SVD) methods. Importantly, the interference image is utilized to further enhance security. The imperceptibility of our proposed method is analyzed by using the peak signal-to-noise ratio (PSNR) and the histogram of the watermarked host image. To demonstrate robustness, a series of attack tests, including Gaussian noise, Poisson noise, salt-and-pepper noise, JPEG compression, Gaussian low-pass filtering, cropping, and rotation, are conducted. The experimental results show that our proposed method has advanced security, imperceptibility, and robustness, making it a promising option for optical image watermarking applications.

1.   Introduction
  • With the development of digital images, videos, and multimedia assets, the vulnerability of digital content to unauthorized copying, distribution, tampering, and piracy has increased significantly. The security and privacy of these digital information can be enhanced by integrating chaotic systems,[13] machine learning,[4] complex algorithms,[59] and optical encryption technologies.[1012] In recent years, optical encryption technology has been developed rapidly in response to the growing prevalence of these digital information security issues. Among these optical encryption techniques, optical image watermarking techniques have gained increasing attention due to two significant potential advantages.[13] Firstly, optical systems can facilitate high-speed parallel optical information processing to handle large volumes of data.[14] Secondly, optical watermarking can be directly applied to physical objects, whether two-dimensional (2D) case[15] or three-dimensional (3D) case.[16]

    Holographic watermarking is a highly regarded technique in the field of optical image watermarking.[1012] This technique leverages the principles of holography, a method for capturing and reconstructing the watermarking information from light interference patterns. These watermarks are often challenging to detect or remove without the appropriate decryption keys and provide a high level of security and robustness against various attacks. The advantage of holographic watermarking lies in its ability to combine security and imperceptibility effectively.

    Some physical dimensions within an optical system, including wavelength, amplitude, phase, distance, and polarization, can be utilized as the cryptographic keys to enhance the security of holographic watermarking. For example, Chen et al. proposed the utilization of pure phase-only masks and wavelength as cryptographic keys to ensure robust information security.[17] Jiao et al. suggested that complex amplitudes can be employed as cryptographic keys to conceal data.[18] Chen et al. also proposed the use of a double random-phase for hiding information.[19] Sui et al. implemented a watermarking scheme based on computational ghost imaging that uses both the wavelength and the propagation distance as the key.[20] Guo et al. introduced the idea of arbitrary polarization encoding in full-color holography to enhance security and capability.[21]

    Orbital angular momentum (OAM), described by the expression exp(i) with θ representing the azimuthal angle and l denoting the topological charge (TC), is regarded as an independent physical dimension utilized in holography, including optical multiplexed displays,[22,23] optical storage,[24,25] optical communication,[26,27] optical sensors,[28,29] and so on. However, the utilization of OAM’s TC as the cryptographic key to enhance the security of holographic watermarking, especially multiple keys simultaneously embedded in one host image, has been far less discussed and reported.

    In this paper, we propose an optical image watermarking method based on orbital angular momentum holography. The watermark image is converted into a watermark hologram and then combined with an OAM hologram to create an OAM-watermark hologram. Here, multiple TCs and scrambling times are served as the cryptographic keys at the same time. To further enhance security, an Arnold transformation algorithm is performed on the OAM-watermark hologram, resulting in the creation of a cryptographic OAM hologram. Here, multiple TCs and scrambling times are served as the cryptographic keys simultaneously to improve security. The cryptographic OAM hologram is embedded into the host image using the discrete wavelet transformation (DWT) and singular value decomposition (SVD) methods. In the watermark recovery process, the cryptographic OAM hologram is extracted from the watermarked host image using the same DWT and SVD methods. The cryptographic OAM hologram is restored to the OAM-watermark hologram by the anti-Arnold transformation method. The watermark image can be reconstructed by illuminating the OAM-watermark hologram with the inverse OAM beam.

2.   Principle and method
  • The principle of optical image watermarking based on OAM holography is illustrated in Fig. 1, which comprises four main components: the watermark preprocessing process, depicted as in Fig. 1(a); the watermark embedding system, shown in Fig. 1(b); the OAM-watermark hologram recovery system, illustrated in Fig. 1(c); and the optical reconstruction method, presented in Fig. 1(d). The watermark preprocessing process and the watermark embedding system are completed by the encryption side, while the OAM-watermark hologram recovery system and the optical reconstruction method are completed by the decryption side.

  • In the watermark preprocessing process (Fig. 1(a)), the original watermark w(x,y) (for example, “NUPT”) is first sampled into K point watermarks si(x,y) (i = 1,…,K) by multiple sub-sampling arrays, which can be described as

    where (x,y) and Comb(x,y) represent the Cartesian coordinates and a Dirac periodic array, respectively. K point watermarks are converted into K watermark holograms (Wi(u,v), for i = 1,…,K), by employing either the computer-generated hologram (CGH) method[30] or the neural network-based method,[31] which can be expressed as

    where (u,v) and M × M are the spatial frequencies of (x,y) and the size of the watermark hologram, respectively. Then, the K sub-OAM watermark holograms are created by superposing K sub-watermark holograms (Wk(u,v)) with distinct OAM TC values. For instance, for K = 4 in the example, l1 = 2, l2 = 4, l3 = 6, and l4 = 8 are applied for the four sub-watermarks ‘N’, ‘U’, ‘P’, and ‘T’. Finally, all sub-OAM watermark holograms are multiplexed to generate a single OAM watermark hologram, which can be given by

    where all lk can be served as the cryptographic key, Key1, which is composed by l1,…,lK.

  • In the watermark embedding system (Fig. 1(b)), the OAM-watermark hologram is firstly scrambled by using Arnold transformation,[32] where the transformation matrix (A) can be given as

    Here, c and d can be freely specified. The information at each pixel in the OAM-watermark hologram (IO(u0,v0)) is scrambled m times to obtain the cryptographic OAM hologram (IW(um,vm)), which can be represented as

    where m is the scrambling times in the Arnold transformation. It depends on the size (M × M) of the hologram and can serve as another cryptographic key (Key2). (u0, v0) represents the pixel coordinates on the OAM-watermark hologram (IO(u0,v0)). (um, vm) represents the pixel coordinates on the cryptographic OAM hologram (IW(um,vm)). mod(⋅) represents the modulo operation.

    On the other hand, the host image (“cameraman”) is decomposed into four non-overlapping subbands by discrete wavelet transform (DWT): the low-frequency component (ILL), the horizontal component (ILH), the vertical component (IHL), and the diagonal component (IHH). In the proposed watermarking scheme, the cryptographic OAM hologram is embedded within the low-frequency component (ILL) of the host image. This component is selected because it encompasses the primary intensity content, ensuring that the watermark is less susceptible to image manipulations like compression and noise. Embedding in this component also helps maintain the watermark’s visibility and integrity.[5] For enhancing the robustness of the watermark, the low-frequency component (ILL) and the cryptographic OAM hologram (IW) are both decomposed using the SVD method, respectively. The results can be described as

    where UW and ULL represent the left singular matrices. VW and VLL represent the right singular matrices. SW and SLL represent the singular value matrices. Then, the singular value matrix (SW) corresponding to the cryptographic OAM hologram is added to the singular value matrix (SLL) of the low-frequency component with embedding level (p, p > 0) resulting in a new singular value matrix (S′), which can be expressed as

    where p represents the embedding level, which affects the imperceptibility of the watermark. For an excessively smaller p, the amount of the embedded watermark information is not enough for the watermark extraction. The original singular value matrix (SLL) is replaced with the new singular value matrix (S′) to obtain the new low-frequency component (ILL), which can be described as

    Finally, the original low-frequency component (ILL) is replaced with the new low-frequency component (IW), and all four components are transformed into the watermarked host image using the inverse discrete wavelet transform (iDWT).

  • The watermarked host image is transmitted from the encryptor (using computer 1) to the decryptor (using computer 2) via network transmission. Figure 1(c) shows the OAM-watermark hologram recovery system. In the OAM-watermark hologram recovery system, the DWT is employed to decompose the watermarked host image into four non-overlapping subbands: the low-frequency component (ILL), the horizontal component (ILH), the vertical component (IHL), and the diagonal component (IHH). The low-frequency component (ILL) is further decomposed using the SVD method, as

    According to Eq. (7), the singular value matrix of the cryptographic OAM hologram can be obtained as

    where SW and IW represent the singular value matrix of the cryptographic OAM hologram and the recovery-cryptographic OAM hologram, respectively. Then, the OAM-watermark hologram (IO(u0,v0)) is obtained from the recovery-cryptographic OAM hologram (IW(um,vm)) using the anti-Arnold transformation algorithm with decryption key (Key2 = m), which can be given by

    where (u0,v0) represents the pixel coordinates of the OAM watermark hologram (IO(u0,v0)).

  • The optical reconstruction method (Fig. 1(d)) is employed to transform the OAM watermark hologram into the watermark image. Firstly, the key beam with the inverse OAM beam (multiple sub-keys, Key1 = −l1,−l2,−l3, …, −lK) is used to illuminate the OAM watermark hologram, which can be described as

    where the OAM mode in the OAM watermark hologram is converted to Gaussian mode. Then, the frequency domain (W′(u,v)) is tranformed into spatial domain (s′(x,y)) by the inverse Fourier transform (iFT). Hence, the watermark information is recovered through the Fourier lens, which can be given by

    where s′(x,y) and iFT(⋅) represent the recovery sampling watermark image and the inverse Fourier transform, respectively. According to Eq. (13), the matching of all multiple sub-keys is required for decrypting the complete watermark image.

3.   Experimental results
  • To validate the proposed OAM-watermarking method, a proof-of-principle experiment is conducted. Figure 2 illustrates the experimental decryption process, where figures 2(a) and 2(b) represent the optical setup and its experimental results. Firstly, the Key2 is used to obtain the right OAM-watermark hologram by the anti-Arnold transformation algorithm in the decryptor. Then, Computer 2 transmits the OAM hologram with K (here, four) Sub-keys to the spatial light modulator (SLM1, Holoeye PLUTO-2) for the generation of the key beam. Concurrently, Computer 2 dispatches the recovery OAM watermark hologram to SLM2.

    In the optical setup (Fig. 2(a)), a laser operating at a wavelength of 633 nm is employed, and its intensity is adjustable using a variable neutral density filter (NDF). A half-wave plate (HWP) is utilized to align the beam’s polarization direction with SLM1, responsible for generating the OAM beam. SLM2 is used for imprinting the OAM watermark hologram. The OAM beam is directed onto SLM2 via a beam splitter (BS1). The beam reflected from BS2 of SLM2 is subjected to Fourier transformation using a lens with a focal length of 150 mm. Finally, the captured results are captured by a charge-coupled device (CCD). The size of the original host image and the watermark image are both 800 × 800 pixels (M = 800). It should be noted that if there is a long distance between SLM1 and SLM2, it becomes necessary to use an additional lens to control the size of the OAM beam generated by SLM1. Furthermore, precisely aligning the OAM beam with the center of SLM2 is crucial for achieving optimal reconstruction results.

    The reconstruction watermarks are displayed in Fig. 2(b). When the scrambling times (Key2 = m) are employed, the correct OAM-watermark hologram can be achieved. When the matched decoding beam, which contains four sub-keys (Key1 = −l1, −l2, −l3, −l4), illuminates the OAM-watermark hologram, the captured result is shown as a Gaussian mode (solid point array) in four sub-watermarks. The point array is used to filter out the Gaussian mode. The reconstruction watermark is turned out by multiplying the captured result with the point array. However, there is no output from the reconstruction, when the Gaussian beam with no correct OAM mode is utilized as the decoding beam. If the unmatched decoding beam carrying a single or two sub-keys (Key1 = −l4, or Key1 = −l1, −l4), only the corresponding sub-watermarks are transformed into Gaussian points, while the other sub-watermarks still in OAM mode, which they can not appear after the filtering. It is worth noting that the partial watermark information is meaningless for the watermarking. In addition, if the scrambling times (Key2) do not match, the correct OAM-watermark hologram cannot be achieved, leading to an incorrect recovery watermark. Therefore, a sequence of TC (l) values and the scrambling times (m) are utilized as cryptographic keys (Key1 and Key2) in the proposed watermarking scheme. The four sub-keys in Key1 resemble a secret sharing scheme, which provides greater security compared to using a single cryptographic key.

4.   Discussion
  • To further enhance security, we propose adding the interference image to conceal the watermark information, as shown in Fig. 3. Figure 3(a) illustrates the processes of adding the interference image. Figure 3(b) shows a comparison of the captured results without and with the interference image. Firstly, the interference image complements the four sub-watermarks. The interference hologram is obtained using the same steps as for a single sub-watermark with the interference image, with a TC value of 5 (l = 5). Then, the interference hologram and the OAM-watermark hologram are multiplexed to generate the Mux-watermark hologram. Finally, the Mux-watermark hologram is embedded into the host image using the same method as the OAM-watermark hologram.

    The specific steps for multiplexing (MUX) include: Both the OAM-watermark hologram and the interference hologram undergo Fourier transformations (FT). The Fourier-transformed results are then added together. This added result is subjected to an inverse Fourier transform (iFT). From the outcome of this inverse Fourier transform, the phase-only hologram is extracted using the angle algorithm to create the Mux-watermark hologram.

    When the watermarked host image with the OAM-watermark hologram is reconstructed using a single sub-key (such as l = −8), the corresponding sub-watermark appears as Gaussian points and can be successfully reconstructed (Fig. 3(b)). However, other ring-shaped light spots may reveal the sub-watermark information. For the watermarked host image with the Mux-watermark hologram reconstructed using the same sub-key (l = −8), the corresponding sub-watermark is similarly displayed as Gaussian points and is successfully reconstructed. Importantly, the additional ring-shaped light spots from the interference image effectively mask the ring-shaped light spots of the sub-watermarks, thereby enhancing security. Therefore, our proposed method can further enhance security by utilizing the interference image.

  • To evaluate the imperceptibility of our watermarking method, the peak signal-to-noise ratio (PSNR) and the histogram are employed. The PSNR measures the degree of similarity between the watermarked host image and the original host image. It assists in assessing whether the watermarking process affects the visual quality as perceived by human observers. The higher PSNR value indicates better imperceptibility and improved visual quality. The PSNR is defined as[33]

    where n and MSE represent the bit depth of the host image (here n = 8) and the mean square error. f(x,y) and f′(x,y) represent the intensity value of the original host image and the watermarked host image, respectively.

    In addition, the correlation coefficient (CC) is also introduced to compare the similarity between the reconstructed watermark image (s′(x,y)) and the original watermark image (s(x,y)). The CC between the two images is defined as[34]

    where s and s′ represent the original watermark image and the reconstructed watermark image respectively, σ is the standard deviation of the corresponding image. E{⋅} represents the expected value operator.

    The PSNR of the watermarked host image is analyzed under different embedding levels (p), and the sub-watermark number (K), as shown in Fig. 4(a). Generally, PSNR beyond 30 dB is considered to be of good imperceptibility. From the results, it is evident that provided the embedding level and sub-watermark number are not excessively high, the PSNR consistently exceeds 30 dB. When the sub-watermark number is 4 (K = 4), the watermarked host images with different embedding levels (p = 0.01,0.05, and 0.1) and their histograms are shown in Fig. 4(b). The histograms of the watermarked host images with p = 0.01 and p = 0.05 are similar to the original host image. However, the histograms of the watermarked host image with p = 0.1 have a slight difference from the original host image. The intensity distribution of the pixels and the areas within the red circles exhibit noticeable differences. It should be noted that a smaller embedding level leads to a higher PSNR but a lower CC, as illustrated in Fig. 4(c). Thus, based on these data, our proposed image watermarking scheme can achieve good imperceptibility through the embedding level and the sub-watermark number.

  • Additionally, to quantitatively assess the robustness, a series of attack tests on the watermarked host image is conducted by employing various methods, including the noise attacks (Gaussian noise, Poisson noise, salt-pepper noise), JPEG compression, Gaussian low-pass filtering, cropping, and rotation. The embedding level is 0.05 (p = 0.05) and the sub-watermark number is 1 (K = 1). The test results of the attacked watermarked host images, the reconstruction watermarks, and their CC are shown in Fig. 5. The results indicate that the proposed watermarking scheme exhibits high robustness against JPEG compression attacks, Poisson noise, and Gaussian low pass, with all CC exceeding 0.95 (CC > 0.95). In the case of salt-pepper noise, with a noise density of 0.1, its correlation coefficient (CC) is 0.9203 (CC = 0.9203). Regarding cropping, when the cropped area constitutes 5.5% of the host image area, its CC is 0.9077 (CC = 0.9077), and cropping weakens the intensity of the reconstructed watermark. For rotation, at an angle of 10 degrees (10°), its CC is 0.9149 (CC = 0.9149). In the case of Gaussian noise, under a variance of 0.03, its CC is 0.8426 (CC = 0.8426), and the watermark information retrieval becomes unfeasible when the variance exceeds 0.05. It is relatively weaker against Gaussian noise because Gaussian noise introduces a continuous and evenly distributed perturbation into the image data. On the whole, the proposed image watermarking scheme is robust against most attacks, but less against Gaussian noise.

  • We compared the effects of embedding the cryptographic OAM hologram into different components of the host image (ILL, ILH, IHL, and IHH). The number of sub-watermarks is 4 (K = 4), and the embedding level is 0.05 (p = 0.05). The experimental results with various embedding components are shown in Fig. 6. From the histogram results, embedding the cryptographic OAM hologram into the low-frequency components exhibits better consistency with the original host image. (particularly at the four positions marked with red circles). Based on the histogram and CC results, embedding the cryptographic OAM hologram into the low-frequency components is the optimal choice.

    On the other hand, we compared our proposed OAM-image watermarking scheme with several recent and representative image encryption schemes in terms of correlation coefficients (CC) and peak signal-to-noise ratio (PSNR). The results of these comparisons are summarized in Tables 1 and 2, respectively.

    As shown in Tables 1 and 2, the CC values of our method under each type of attack demonstrate a disparity when compared to the other three methods, particularly in response to the Gaussian noise attack. In addition, regarding the PSNR values, our method exhibits comparable performance with no significant disparities observed when contrasted with the three established methods. The primary reason for this disparity is that the other three methods employ computational techniques to restore watermarked images, whereas our method requires optical means for image restoration. The watermark results are captured by a CCD camera, and speckle noise in the optical path significantly impacts the quality of watermark recovery. Although our method demonstrates lower CC values, the combination of algorithmic and optical experimental approaches adds complexity to the watermark reconstruction process, thereby enhancing its security.

5.   Conclusion
  • In conclusion, we have developed an optical image watermarking scheme utilizing OAM holography, in which a sequence of topological charge (TC) values (l) and scrambling times (m) function as cryptographic keys to secure watermark information. Our experimental results demonstrate that the watermark image can be accurately reconstructed using matched keys. Enhanced security is achieved by employing the correct combination of four TC values and scrambling times. Moreover, we optimized the imperceptibility of the watermark by fine-tuning the embedding depth and the number of sub-watermarks. Attack tests further validated the robustness of our scheme and its ability to recover after various disruptions. This work presents a viable method for protecting sensitive data across different sectors, potentially advancing the field of information security.

    For future work, we aim to explore the integration of quantum cryptography principles to further enhance security measures. Additionally, we plan to conduct cross-media watermarking tests to evaluate the scheme’s efficacy in diverse digital formats, extending its applicability. Finally, testing under more aggressive attack scenarios will be crucial to ensure that the watermarking scheme can withstand evolving cyber threats, thereby contributing to its practical implementation in real-world applications.

Figure (6)  Table (2) Reference (34)

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return