Analysis of Digital Image Watermarking Based on Contourlet Transform and DCT in RGB, YCbCr, and YIQ Colour Spaces
DOI:
https://doi.org/10.61769/telematika.v20i2.741Keywords:
digital image, contourlet transform, imperceptibility, robustness, watermarking, color spaceAbstract
This article discusses watermarking techniques for contourlet transform (CT)-based digital images, combined with the discrete cosine transform (DCT). Watermarks are inserted into one of the colour components of the host image's colour space, namely RGB, YCbCr, or YIQ. Level 2 contourlet transformation is applied to the colour component used for watermark insertion. The upper-right subband of the contourlet transform result is selected, divided into 4×4 blocks, and then DCT and zigzag scanning are applied to each block. The watermark used is a black-and-white (binary) image. To improve security and reduce spatial correlation, the watermark is scrambled using Arnold scrambling. The watermark is embedded in the host image by inserting a PN sequence corresponding to each watermark bit into the midband DCT coefficients of the 4×4 block. Test results show that the inserted image has a high level of imperceptibility (PSNR> 30 dB). The watermark is robust against JPEG compression with a minimum quality factor of 8, scaling of 75% and 125%, rotation of 180°, cropping of 20% with different cropping positions, and the addition of up to 5% Gaussian noise, but is not robust against 90° rotation and median filtering. Watermarks embedded in the YCbCr colour space in the Cb or Cr components, or in the YIQ colour space in the I or Q components, achieve optimal imperceptibility and robustness.
References
Z. Li, H. Zhang, X. Liu, C. Wang, and X. Wang, “Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT–DCT,” Digital Signal Processing, vol. 115, Art. no. 103062, 2021, doi: 10.1016/j.dsp.2021.103062.
L. Zhang and D. Wei, “Robust and reliable image copyright protection scheme using downsampling and block transform in integer wavelet domain,” Digital Signal Processing, vol. 106, Art. no. 102805, 2020, doi: 10.1016/j.dsp.2020.102805.
X. Zhang, Q. Su, Z. Yuan, and D. Liu, “An efficient blind color image watermarking algorithm in spatial domain combining discrete Fourier transform,” Optik, vol. 219, Art. no. 165272, Oct. 2020, doi: 10.1016/j.ijleo.2020.165272.
A. K. Abdulrahman and S. Öztürk, “A novel hybrid DCT and DWT based robust watermarking algorithm for color images,” Multimedia Tools and Applications, vol. 78, no. 12, pp. 17027–17055, 2019, doi: 10.1007/s11042-018-7085-z.
I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. Amsterdam, The Netherlands: Elsevier, 2008, doi: 10.1016/B978-0-12-372585-1.X5001-3.
S. W. Byun, H. S. Son, and S. P. Lee, “Fast and robust watermarking method based on DCT specific location,” IEEE Access, vol. 7, pp. 123441–123454, 2019, doi: 10.1109/ACCESS.2019.2931039.
Z. Yuan, D. Liu, X. Zhang, and Q. Su, “New image blind watermarking method based on two-dimensional discrete cosine transform,” Optik, vol. 204, Art. no. 164152, 2020, doi: 10.1016/j.ijleo.2019.164152.
V. M. Potdar, S. Han, and E. Chang, “A survey of digital image watermarking techniques,” in Proc. 3rd IEEE Int. Conf. Industrial Informatics, Perth, Australia, 2005, pp. 709–716, doi: 10.1109/INDIN.2005.1560462.
A. R. Amirgholipour and A. R. Naghsh-Nilchi, “Robust digital image watermarking based on joint DWT–DCT,” International Journal of Digital Content Technology and its Applications, vol. 3, no. 2, pp. 42–54, 2009.
C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469–474, 2004, doi: 10.1016/j.patcog.2003.08.007.
M. El-Gayyar and J. von zur Gathen, “Watermarking techniques in spatial domain,” Tech. Rep., University of Bonn, Bonn, Germany, 2006.
M. Cedillo-Hernandez, F. Garcia-Ugalde, M. Nakano-Miyatake, and H. Perez-Meana, “Robust watermarking method in DFT domain for effective management of medical imaging,” Signal, Image and Video Processing, vol. 9, no. 5, pp. 1163–1178, 2015, doi: 10.1007/s11760-013-0555-x.
N. Jimson and K. Hemachandran, “DFT-based coefficient exchange digital image watermarking,” in Proc. 2nd Int. Conf. Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2018, pp. 1292–1297, doi: 10.1109/ICCONS.2018.8663122.
K. Fares, K. Amine, and E. Salah, “A robust blind color image watermarking based on Fourier transform domain,” Optik, vol. 208, Art. no. 164562, Apr. 2020, doi: 10.1016/j.ijleo.2020.164562.
J. Li and C. Zhang, “Blind and robust watermarking scheme combining bimodal distribution structure with iterative selection method,” Multimedia Tools and Applications, vol. 79, no. 1–2, pp. 1239–1260, 2020, doi: 10.1007/s11042-019-08213-9.
M. Moosazadeh and G. Ekbatanifard, “A new DCT-based robust image watermarking method using teaching–learning-based optimization,” Journal of Information Security and Applications, vol. 47, pp. 28–38, Aug. 2019, doi: 10.1016/j.jisa.2019.04.001.
M. Lebcir, S. Awang, and A. Benziane, “Robust blind watermarking approach against compression for fingerprint image using 2D-DCT,” Multimedia Tools and Applications, vol. 81, no. 15, pp. 21417–21437, 2022, doi: 10.1007/s11042-022-12365-6.
K. J. Giri and R. Bashir, “A block-based watermarking approach for color images using discrete wavelet transformation,” International Journal of Information Technology, vol. 10, no. 2, pp. 227–234, 2018, doi: 10.1007/s41870-017-0075-y.
C. Pradhan, “Robust and blind watermarking using Arnold 4D cat map in discrete wavelet,” International Journal of Information Technology, vol. 12, no. 2, pp. 457–466, 2020, doi: 10.1007/s41870-019-00341-7.
Y. Yuan, J. Li, J. Liu, U. A. Bhatti, Z. Liu, and Y.-W. Chen, “Robust zero-watermarking algorithm based on discrete wavelet transform and daisy descriptors for encrypted medical image,” CAAI Transactions on Intelligence Technology, vol. 9, no. 1, pp. 124–136, 2024, doi: 10.1049/cit2.12282.
Y. Hua, X. Xi, C. Qu, J. Du, M. Weng, and B. Ye, “An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformation,” KSII Transactions on Internet and Information Systems, vol. 18, no. 1, pp. 217–236, 2024, doi: 10.3837/tiis.2024.01.011.
Y. Zhang, Z. M. Lu, and D. N. Zhao, “A blind image watermarking scheme using fast Hadamard transform,” Information Technology Journal, vol. 9, no. 7, pp. 1369–1375, 2010, doi: 10.3923/itj.2010.1369.1375.
E. S. Fami, S. Samavi, H. R. Kaviani, and Z. M. Radani, “Adaptive watermarking in Hadamard transform coefficients of textured image blocks,” in Proc. 16th CSI Int. Symp. Artificial Intelligence and Signal Processing (AISP), Shiraz, Iran, 2012, pp. 503–507, doi: 10.1109/AISP.2012.6313799.
J. R. Hernández, M. Amado, and F. Pérez-González, “DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure,” IEEE Transactions on Image Processing, vol. 9, no. 1, pp. 55–68, Jan. 2000, doi: 10.1109/83.817598.
M. N. Do and M. Vetterli, “The contourlet transform: An efficient directional multiresolution image representation,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2091–2106, Dec. 2005, doi: 10.1109/TIP.2005.859376.
S. Zhou and F. Li, “Watermark algorithm based on chaotic encryption and contourlet domain,” in Proc. IEEE Int. Conf. Computer Science and Automation Engineering (CSAE), Zhangjiajie, China, 2012, pp. 168–171, doi: 10.1109/CSAE.2012.6272751.
R. M. Hadi and P. Ayubi, “Blind digital image watermarking based on CT-SVD and chaotic cellular automata,” in Proc. 2nd Int. eConf. Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 2012, pp. 301–306, doi: 10.1109/ICCKE.2012.6395396.
J. George, S. Varma, and M. Chatterjee, “CT-SVD and Arnold transform for secure color image watermarking,” International Journal of Innovative Research in Information Security, vol. 1, no. 2, pp. 59–65, 2014.
D. Setiadikarunia, R. A. Saragih, and Y. Susanthi, “Watermarking citra digital menggunakan contourlet transform, discrete cosine transform, dan noise visibility function,” Jurnal TELKA, vol. 8, no. 1, pp. 24–35, 2022.
J. Sarvaiya, S. Patnaik, and H. Goklani, “Image registration using NSCT and invariant moment,” International Journal of Image Processing, vol. 4, no. 2, pp. 119–132, 2010.
I. A. El Rube, M. A. El Nasr, M. M. Naim, and M. Farouk, “Contourlet versus wavelet transform for a robust digital image watermarking technique,” International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 3, no. 12, pp. 2303–2307, 2009.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Daniel Setiadikarunia, Agus Setiawan

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.









