Skip to main content
PLOS One logoLink to PLOS One
. 2025 Aug 25;20(8):e0323447. doi: 10.1371/journal.pone.0323447

Music score copyright protection based on mixed low-order quaternion Franklin moments

Qizheng Huang 1,#, Jiayi Zhu 2,*,#, Yuanjie Xian 2,, Jiyou Peng 2,
Editor: Sadiq H Abdulhussain3
PMCID: PMC12377592  PMID: 40853925

Abstract

Due to the rapid growth of the digital music industry, music copyrights have become valuable intangible assets for businesses, offering exclusivity and profitability. This article takes music copyrights as an example and designs a copyright protection method for music score digital images. The zero-watermarking algorithm offers an effective and lossless means of copyright protection. Owing to their geometric invariance, orthogonal moments exhibit superior robustness, positioning them as one of the mainstream methods in the research of zero-watermarking algorithms. The current zero-watermarking algorithms based on orthogonal moments face a trade-off between robustness and discriminability. In this paper, we propose a mixed low-order moments method based on quaternion-type fractional-order moments (QTFM), which balances the global information and texture details of color image contained in QTFM. Experimental results show that the mixed low-order moments method based on QTFM exhibits superior performance in terms of robustness. In the context of using mixed low-order moment features for image analysis, Franklin moments achieve higher average structural similarity (SSIM) values than other QTFMs.

1 Introduction

The development of the internet has not only fueled economic growth but also introduced challenges in copyright protection in the digital age. While the online environment could have provided greater benefits to copyright holders through the broader distribution of music, any emerging phenomenon comes with dual aspects. As copyright holders enjoy the profits generated by online music, the distribution of their works has increasingly spiraled out of control, leading to more widespread infringements compared to the traditional music environment. Digital watermarking technology has emerged in recent years as an effective solution for copyright protection, addressing issues such as copyright disputes in digital images. This technique embeds copyright information directly into the original image, allowing for the extraction of the embedded information later, thus ensuring the protection of digital image copyrights [1,2].

Zero-watermarking algorithms can be categorized into three main types: spatial domain zero-watermarking algorithms [3], frequency domain zero-watermarking algorithms [4], and moments domain zero-watermarking algorithms [5]. Spatial domain features are directly used to extract image characteristics. However, when geometric and image processing attacks occur, spatial domain features show significant sensitivity, regardless of whether edge or texture information is employed [6]. Features in the frequency domain lack invariance to rotation and scaling, leading to poor performance in scenarios where such transformations occur [7]. Orthogonal moments which are used to extract and represent local and global features can describe images without information redundancy compared to non-orthogonal moments [8,9]. Therefore, it is widely used in image analysis [10], pattern recognition [11], image watermarking processing [12]. Reference [13] proposes an image moment domain steganography algorithm based on orthogonal polynomials. Reference [14] introduces a face recognition method using hybrid orthogonal polynomials. Abdulhussain et al. [15] employs embedded image kernel technique and support vector machine (SVM) classification for multi-font handwritten numeral recognitinon. In addition, orthogonal moments can be extended to three-dimensional moments [16], enabling their application in the representation of 3D objects.

Quaternions have become a widely used approach in color image processing by decomposing the image into three distinct channels [17]. Examining the development of quaternion-based orthogonal moments, quaternion-type fractional moments (QTFM) can be divided into discrete and continuous moments based on the continuity of the basis function. Discrete moments include Krawtchuk moments (KM) [18], fractional Tchebyshev moments (FrTM) [19], Hahn moments (HM) [20], Dual Hahn moments (DHM) [21], Racah moments (RM) [22], and Mountain Fourier moments (MFM) [23]. Continuous orthogonal moments are grouped by coordinate system: those defined in the Cartesian coordinate system include Legendre moments (LM) [24], Gaussian Hermite moments (GHM) [25], and Chebyshev moments (CM) [26]; while those defined in the polar coordinate system include Zernike moments (ZM) [27], pseudo Zernike moments (PZM) [28], Legendre Fourier moments (LFM) [29], exponent Fourier moments (EFM) [30], log-polar Exponent-Fourier moments (LEFM) [31], polar harmonic Fourier moments (PHFM) [32], and ternary radial harmonic Fourier moments (TRHFM) [33]. Discrete moments do not involve any approximation errors, making them more suitable for high-precision image processing tasks, such as image reconstruction, compression, and denoising. In comparison, polar continuous moments demonstrate superior rotation invariance, making them more suitable for applications requiring higher degree of robustness.

The Franklin function series, notable for its unique construction and properties resembling Haar and Schauder function systems [3437], has attracted considerable attention in mathematics. It has also been applied in signal and image processing [38,39]. The implicit construction of the classical Franklin function imposes specific constraints on its applicability. Therefore, the development of efficient and accurate computational methods for orthogonal polynomials remains a prominent focus of contemporary research. By optimizing the initial functions and partitioning the discrete Racah polynomials plane into asymmetric parts, reference [40] successfully achieves accurate recursive computation of higher-order Racah orthogonal polynomials. Asli et al. introduced a new four-term recurrence relation to compute Krawtchouk polynomials [41]. Reference [42] implements the efficient computation of Tchebichef polynomials using adaptive threshold along with x and n-directions recurrence algorithms. Mahmmod et al. [43] proposed a method for calculating Charlier polynomials using multi-threaded parallel computation. This threading approach involves distributing independent coefficients across different threads to address performance bottlenecks.

Through the analysis of the above content, the following conclusions can be drawn: (1) Zero-watermarking algorithms based on orthogonal moments have certain advantages over other methods in term of robustness. However, when watermark image has large sizes, some existing zero-watermarking algorithms require the computation of higher-order orthogonal moments to increase the capacity of the algorithm. In practical applications, high-order moments typically correspond to local features of the image, which means they exhibit lower robustness compared to low-order moments. (2) Recursive algorithms are often effective for computing orthogonal polynomials with invariant definition intervals. However, the piecewise intervals of the Franklin polynomials change as the order of the function increases. Therefore, while general recursive algorithms have advantages in terms of calculation accuracy, it results in significant time complexity when computing the Franklin function.

The main contributions of this paper can be summarized as follows:

  • The paper employs non-recursive matrix operations to implement the orthogonalization process of Franklin polynomials, avoiding the high time complexity and computational errors associated with numerical integration by directly solving for the elements.

  • Construction method of mixed low-order moments feature is used to arrange and quantize QTFM, effectively enhancing the robustness and discriminability of the zero-watermarking algorithm.

  • The zero-watermarking algorithm constructed using quaternion Franklin moments achieves a balance between global and local image information, enhancing the algorithm’s stability against various types of image attacks.

The rest of the paper is organized as follows: Sect 2 introduces the classical Franklin system and discuss the quaternion type moments. Sect 3 proposes the accurate computation algorithm for quaternion fractional Franklin moments (QFFM). Sect 4 specifies the proposed zero-watermarking algorithm. Experiments and analysis are provided in Sect 5. Finally, Sect 6 concludes the paper.

2 Preliminaries

This section will introduce the definition of the classical Franklin function and presents a method for its fast and accurate computation. In addition, the quaternion type fractional-order moments (QTFM) is defined and explained.

2.1 Classical Franklin polynomials

Consider a sequence 𝒯={tn:n0} if t0=0,t1=1,tn(0,1), 𝒯 is everywhere dense in [0,1] and each point appears in 𝒯 at most twist, it is called an admissible sequence on [0,1]. By means of a non-decreasing permutation, η is obtained from 𝒯n.

ηn={τin:τinτi+1n,0in1}, (1)

where Sn denote the space of functions defined on [0,1], which is left-continuous and linear on (τin,τi+1n) and continuous at τin if τi1n<τin<τi+1n. It is clear that dimSn=n+1 and Sn1Sn, hence there exists a unique function fnSn which is orthogonal to Sn−1 and fn2=1.

The classical Franklin system [44] {fn:n0} corresponding to Haar collocation points is defined as follows:

f0=1,f1=3(2x1). (2)

For n2,fn is the nth Franklin function corresponding to the partition 𝒯, where tn=2m12t+1, n = 2t + m, t=0,1,2,, m=1,2,,2t.

2.2 Fast and accurate computation of Franklin polynomials

Over the years, the computational complexity of orthogonalization process for piecewise functions has limited their practical application [45]. The Franklin system, which consists of continuous piecewise linear functions, faces similar difficulties.

Considering the following linear independent groups:

{v0=1,0x1v1=x,0x1vn={0,0x<anxan,anx1, (3)

where an=(2n12k)2k, k is the maximum integer that satisfies 2k<2n−1.

To propose a rapid computation method for the Franklin system, the non-recursive form of the orthogonalization process is given in Eq (4), where D0 = 1, for n1, Dn is the Gram determinant. Throughout the paper, the following notation is used: vr and vc denote two basis functions forming the element in the r-th row and c-th column. ar and ac represent nodes in sequence 𝒯 corresponding to vr and vc, respectively. amax represents the maximum value between ar and ac.

fn=ΨnDnDn1,whereDn=|v1,v1v2,v1...vn,v1v1,v2v2,v2...vn,v2v1,vnv2,vn...vn,vn|Ψn=|v1,v1v2,v1...vn,v1v1,v2v2,v2...vn,v2v1,vn1v2,vn1...vn,vn1v1v2...vn|. (4)

The element drc=vr,vc at any position in the matrix Ψn and Dn can be represented as:

drc={1r=1c=112(1amax2)amax(1amax)r=1c=113(1amax3)12(ar+ac)(1amax2)+arac(1amax)else, (5)

where ‘’ and ‘’ represents ‘Exclusive or’ and ‘Logical conjunction’ which are logical operator. This method circumvents errors from numerical integration, especially the ill-conditioned matrices appearing in LU decomposition. Fig 1 illustrates the computation process for Franklin polynomials.

Fig 1. Computation process for Franklin polynomials.

Fig 1

2.3 Quaternion type fractional-order moments

A quaternion q has one real part and three imaginary parts, which is given by [46]:

q=a+bi+cj+dk, (6)

where a, b, c, d are real numbers, if a = 0, q corresponds to a pure quaternion and can be given by q^=bi+cj+dk.

A RGB color image hC(r,θ) defined in polar coordinates can be represented as:

hC(r,θ)=hR(r,θ)i+hG(r,θ)j+hB(r,θ)k, (7)

where hR(r,θ),hG(r,θ),hB(r,θ) are three channels of the color image respectively. To present QTFM, it is imperative to ensure that applying fractional orders to radial basis functions neither compromises their orthogonality nor incurs significant computational complexity. Let α be a non-zero real number, r[0,1], then the fractional-order radial basis functions {ϕnm(r,α),n,m} can be represented as follow:

ϕnm(r,α)=αrα22ϕnm(rα). (8)

As the multiplication of quaternion does not comply with the commutative law, there are two types of QTFM with repetition m and order n:

ΦnmR=Ωϕnm(r,α)hC(r,θ)eμmθrdrdθ. (9)
ΦnmL=ΩeμmθhC(r,θ)ϕnm(r,α)rdrdθ, (10)

where Ω is the definition domain of color image, μ is a pure quaternion satisfying ||μ||=1. Due to the similar properties of ΦnmR and ΦnmL, in the following chapters, we will only discuss ΦnmR.

3 Accurate quaternion Franklin moments

In this section, the computational process of Franklin moments and necessity of precise calculation are presented. Accurate computation methods for Franklin moments are proposed using Gaussian integration and wavelet integration.

3.1 Definitions

For gray-level image, fractional-order Franklin moments (FFM) defined in polar coordinates is represented as:

nm=12π02π01h(r,θ)fn(r,α)ejmθrdrdθ, (11)

where h(r,θ) represents a channel of hC(r,θ), nN is the order of fn(r,α), mZ is the repetition. The Fractional-order Franklin polynomials are orthogonal over the range [0,1]. Let θ^=θω, where ω denotes the rotation angle of the original image, we have:

nm=12π02π01h(r,θω)fn(r,α)ejmθrdrdθ
=ejmω12π02π01h(r,θ^)fn(r,α)ejmθ^rdrdθ^
=nmejmω. (12)

Eq (12) demonstrates rotation invariance of FFM. Assume that the image h(xi,yi) has dimensions [M×N], the discrete form of nm are shown as follows:

nm=12πi=0M1j=0N1h(xi,yi)fn(rij,α)ejmθij, (13)

where rij=xi2+yj2, θij=arctan(yixi), QFFM can be defined as:

nmR=12π02π01hC(r,θ)fn(r,α)eμmθrdrdθ. (14)

For digital images, the double integral in Eq (14) is replaced by a double summation and its discrete form of zero-order approximation is given by the following formula:

nmR=12πi=0M1j=0N1hC(rij,θij)fn(rij,α)eμmθij. (15)

In practice, the infinite series must be truncated at the finite number P. Thus, the inverse transform of Eq (14) is given by:

hC~(r,θ)=n=0Pm=nnfn(r,α)nmReμmθ, (16)

where μ is a unit pure quaternion, for μ=bi+cj+dk, substituting it into Eq (14), we have:

nmR(hC)=AnmR+iBnmR+jCnmR+kDnmR, (17)

where

AnmR=bIm(nmR(hR))cIm(nmR(hG))dIm(nmR(hB)),BnmR=Re(nmR(hR))+dIm(nmR(hG))cIm(nmR(hB)),CnmR=Re(nmR(hG))+bIm(nmR(hB))dIm(nmR(hR)),DnmR=Re(nmR(hB))+cIm(nmR(hR))bIm(nmR(hG)). (18)

Here, nmR(hR)), nmR(hG)), and nmR(hB)) respectively represent nm corresponding to red, green, and blue channels. Eq (16) can be expressed as:

h~C(r,θ)=n=0Pm=nnnmRfn(r,α)eμmθ=hA(r,θ)+hB(r,θ)i+hC(r,θ)j+hD(r,θ)k, (19)

where

hA(r,θ)=Re(Anm)[bIm(Bnm)+cIm(Cnm)+dIm(Dnm)]hB(r,θ)=Re(Bnm)+[bIm(Anm)cIm(Dnm)+dIm(Cnm)]hC(r,θ)=Re(Cnm)+[cIm(Anm)+bIm(Dnm)dIm(Bnm)]hD(r,θ)=Re(Dnm)+[dIm(Anm)bIm(Cnm)+cIm(Bnm)], (20)

where hA(r,θ) is theoretically a zero matrix, hB(r,θ), hC(r,θ), hD(r,θ) represent the red, green, and blue channels of the reconstructed color image, respectively. Anm, Bnm, Cnm, Dnm are the gray-level reconstructed image of AnmR, BnmR, CnmR, DnmR.

3.2 Accurate computation

As shown in Fig 2, information loss occurs during the numerical computation of orthogonal moments. To ensure accurate computation of QFFM, we employ Gaussian and wavelet integration methods.

Fig 2. Pixel information loss during the conversion of an image from Cartesian coordinates to polar coordinates.

Fig 2

3.2.1 Gaussian integration.

The zeroth order approximation of double integration results in numerical integration errors. This numerical instability occurs when computing QFFM for high values of n and m. If f(x) represents a 1-D function, its gaussian numerical integration over the interval [a,b] is expressed as:

abf(x)dx(ba)2i=0g1wlf(a+b2+ba2ti), (21)

where wi and ti denote the weight and position of the image sampling points, g denotes the order of Gaussian integration. The 2-D formulation of Gaussian numerical integration of f(x,y) is expressed as:

abcdf(x,y)dxdy(ba)(dc)4l=0g1h=0g1wlwh×f(a+b2+ba2tl,c+d2+dc2th). (22)

We achieve accurate computation of QFFM by employing Gaussian numerical integration for the double integration outlined in the following:

nmR=1MNl=0h1h=0h1wlwh(i=0M1j=0N1hC(xij,yij)Fnm*(α,xij,yij)), (23)

where xij=tl+2i+1MM, yij=th+2j+1NN, xij2+yij21 and Fnm*(α,xij,yij)=fn(rij,α)eμmθij.

3.2.2 Wavelet integration.

Let f(x) be an 1-D function, the wavelet numerical integration over the interval [a,b] is defined as [47]:

abf(x)dx(ba)2Wl=12Wf(a+(ba)(l0.5)2W), (24)

where W = 2u and u=0,1,2,, the integer u represents the level of the wavelet. The 2-D formulation of wavelet numerical integration of f(x,y) is expressed as:

abcdf(x,y)dxdy(ba)(dc)4W2l=12Wh=12Wf(a+(ba)(l0.5)2W,c+(dc)(h0.5)2W). (25)

We now accurately compute the QFFM by resorting to wavelet numerical integration of the double integration given in Eq (13):

nmR=1W2MNl=12Wh=12W(i=0M1j=0N1hC(xij,yij)Fnm*(α,xij,yij)), (26)

where xij=2iWMW+l0.5WM,yij=2jWNW+h0.5WN, xij2+yij21 and Fnm*(α,xij,yij)=fn(rij,α)eμmθij.

4 Zero-Watermarking algorithm process

In this section, the construction method of mixed low-order moments feature and the processes of zero-watermarking algorithm are described.

4.1 Asymmetric tent map

Chaos theory primarily studies the behavior of dynamical systems that are highly sensitive to initial conditions. In cryptography, the sensitivity of chaotic systems to initial values is often utilized to design secure pseudo-random number generators. Asymmetric tent map [48] is defined as:

qi={qi1/μ0qi1μ(1qi1)/(1μ)μ<qi11, (27)

where μ(0,1) and qi(0,1) are control parameters. As shown in Fig 3, let n = 500 and taking the last 100 items of qn, it can be observed that the values in the blue region do not exhibit a uniform distribution in the interval [0,1]. In contrast, the values in the red region with μ[0.3,0.85] better meet the requirements.

Fig 3. The red region represents the appropriate parameter space for the asymmetric tent mapping.

Fig 3

4.2 Mixed low-order moments feature

Low-order orthogonal moments represent the global features of an image, while high-order moments are more sensitive to image details. Therefore, to enhance the robustness of feature representation, mixed low-order moments method is an effective approach. Mixed low-order moments feature for any images hC can be defined as:

w(f)={|nmR|:(n,m),α+}, (28)

where nmR represents moments feature given in Eq (17) and α is fractional-order parameter. The feature processing workflow for mixed low-order moments is shown in Fig 4.

Fig 4. Generating mixed low-Order moments feature.

Fig 4

bwi={0|wi|<T1|wi|T,T=s𝒮median(w(f))/|α| (29)

For different values of the parameter α, the features are arranged horizontally and quantized as given in Eq (29), where |α| represents the number of the elements within the set α; median(·) represents the median of a discrete sequence w(f). Vector shift operations used in [49] is adopted to generate encryption feature image.

4.3 Zero-watermarking generation and extraction

The procedure of zero-watermarking generation is shown in Fig 5 and described as follow.

Fig 5. Procedure of zero-watermarking generation.

Fig 5

Step 1: Applying the QTFMs on the host image. The QTFMs is performed on the host image hC to obtain the corresponding feature ΦnmR. The fractional-order parameter |α|={0.5,1,2,3}.

Step 2: Generating the Mixed low-order moments feature.

Assuming the size of watermarking image Wc is [Nc×Nc×3], for the QTFM with n,m, the maximum order K=2Nc+13|α|. For the QTFM with n,m, the maximum order K=Nc|α|12. Substituting it in Eq (28) and Eq (17), we get quantization feature.

STEP 3: Generating the encryption image.

Assuming that the key1={q0=0.5,μ=0.625,n=Nc}, where n is iterations, μ and q0 are control parameters. Then substituting key1 in the process given in Fig 4 to generate encryption image.

STEP 4: Scrambling the encryption feature image and watermarking image.

The Arnold transform is used for scrambling images which is defined as:

(xy)=(1baab+1)(xy)mod(Nc), (30)

where a and b are scrambling parameters and (x,y) represents the positions of the pixels (x,y) after transforming. We set that key2={a=2,b=3,iter=10} and key3={a=1,b=2,iter=5}, where iter represents the number of iterations.

STEP 5: Constructing the zero-watermarking.

The zero-watermarking image is generated by performing XOR(·) operation which represents ’Exclusive OR’.

STEP 6: Certifying. The copyright owner can certify using zero-watermarking image, the key1, key2, and key3. The procedure of zero-watermarking verification is given in Fig 6. Performing the XOR of the scrambled feature image and the zero-watermarking, retrieved watermark can be obtained by inverse Arnold transform.

Fig 6. Procedure of zero-watermarking verification.

Fig 6

(xy)=(ab+1ba1)(xy)mod(Nc), (31)

where a,b is obtained from key2 and key3.

5 Experimental results and discussions

In this section, a set of numerical experiments are conducted to evaluate the performance of the proposed zero-watermarking algorithm and compare it with that of the existing methods for real RGB images. The dataset used in this paper is composed of both computer-generated dataset [50] and music score images collected from the internet [58] (https://imslp.org/) which is a publicly available music databases.

5.1 Effectiveness of the Franklin polynomial calculation method

As shown in Fig 7, the time complexity of recursive method, non-recursive method, and the proposed method are compared.

Fig 7. The time complexity of recursive method, non-recursive method, and the proposed method.

Fig 7

The classical Gram-Schmidt process has a time complexity of O(CR2) [51], where R is the number of column vectors and C is the dimensionality of the vectors. The time complexity of recursive orthogonalization process is O(kn5), depending on the number of nodes in sequence 𝒯. The time complexity of the non-recursive form in Eq (4) is approximately O(Dn3), where D represents the grid density for numerical integration. Since all elements in the matrix correspond to the partition η2, the time complexity of proposed method given in Eq (5) is O(3n3).

5.2 Image reconstruction

Using higher-order moments for image reconstruction is an effective method for assessing the accuracy of quaternion moments, where the reconstructed image can be evaluated using the mean squared reconstruction error (MSRE) [52]:

MSRE=x2+y2<1[hC(r,θ)h~C(r,θ)]2dxdyx2+y2<1[hC(r,θ)]2dxdy, (32)

where hC(r,θ) represents original color image and h~C(r,θ) represents reconstructed color image.

The proposed QFFM, FLFM, and FPCET are used to reconstruct the “Baboon” color image of size 128×128 using both direct and accurate computation methods. The computed results of MSRE are displayed in Fig 8. As given in the comparison in Fig 9, when the maximum order is less than 20, the direct computation method does not introduce significant computational errors compared to the exact computation method. However, when the maximum order exceeds 30, the direct computation method are instable. In contrast, the Gaussian integration, wavelet integration, and FFT-based methods are more suitable for tasks requiring high-precision calculation. Fig 10 illustrates the comparison of time complexity between the direct computation method and the exact computation method. Since the Gaussian integration and wavelet integration methods directly increase the grid density of the discrete numerical integration, their time complexity increases significantly. Therefore, the direct computation method is used in the zero-watermarking algorithm to obtain the mixed low-order moments.

Fig 8. Reconstructed image of ‘Baboon’ of size 128×128 using FFT-based method, Gaussian numerical integration and wavelet numerical integration method.

Fig 8

Fig 9. Comparative study of different QTFM-based methods with Gaussian integration, wavelet integration, direct computation and FFT-based methods.

Fig 9

Fig 10. The processing time of different QTFM methods based on Gaussian integration, wavelet integration, direct computation, and FFT.

Fig 10

5.3 Robustness of proposed QFFM

Since the zero-watermarking algorithm does not affect the original image, imperceptibility is not a concern; only robustness needs to be considered. Structural similarity (SSIM) [53] used to evaluate the robustness of algorithm is defined as:

SSIM(x,y)=[l(x,y)]α·[c(x,y)]β·[s(x,y)]βwherel(x,y)=2μxμy+C1μx2+μy2+C1,c(x,y)=2σxσy+C2σx2+σy2+C2,s(x,y)=σxy+C3σxσy+C3, (33)

where μx,μy,σx,σy, and σxy are the local means, standard deviations, and cross-covariance for images x,y. The value closer to 1 indicates better image quality. The similarity between the original watermark image and the extracted watermark image is evaluated using SSIM as the assessment metric. The Peak Signal-to-Noise Ratio (PSNR) [54] can be used to assess the distortion level of the attacked image, which is defined as:

PSNR=10×log102552MSE, (34)

where MSE denotes the mean square error:

MSE=1MNx=1My=1N[h(x,y)h*(x,y)]2, (35)

where h(x,y) and h*(x,y) represent the original image and attacked image, respectively, with dimensions of M×N. The higher PSNR value, the lower distortion degree.

In this section, the robustness of the proposed algorithm is evaluated for the common geometric attacks, image processing attacks, and mixed image attacks. In the conducted experiments , the “saxophone” image of size 1500×1200 is selected from the collected musical score images as an example. The “flower” image of size 128×128 from Fig 11 is selected as the watermark image. Fig 12 shows the parameter settings for each attack, the PSNR values of the attacked images, and the SSIM values of the watermark images retrieved using the proposed algorithm. The obtained results shows that the SSIM values of the proposed algorithm are all greater than 0.99, indicating that the retrieved watermarks are still recognizable despite the original color image being seriously distorted.

Fig 11. Original 7 images and Logo image.

Fig 11

a) ‘Dragonice’ (b) ‘Tambourin’ (c) ‘Klavierstucke’ (d) ‘Fest’ (e) ‘Snow child’ (f) ‘Dvorak’ (g) ‘Saxophone’ (h) Watermark image.

Fig 12. Attacked images and the verified watermark image under: Blurring with PSNR = 16.8789, Gaussian noise 0.5 with PSNR = 13.8986, Cutting with PSNR = 17.9834, Rotation 30 with PSNR = 8.1672, JPEG compression 0.5 with PSNR = 39.3218.

Fig 12

The seven color images in Fig 11 are subjected to single-type image attacks with various parameters. Table 1 provides a summary of the robustness of the proposed algorithm against these image attacks. Table 2 summarizes the robustness of the algorithm against single-type image attacks and mixed image attacks, with the specific parameters provided in Table 3. Table 2 calculates the average test results for 50 collected music score images. The results show that the SSIM values for the proposed algorithm are greater than 0.99 for single-type image attacks and exceed 0.98 for mixed image attacks.

Table 1. SSIM values of 7 images under common attacks with different parameters.

Attack Parameters ‘Dragnonice’ ‘Snow Child’ ‘Tambourin’ ‘Fest’ ‘Klavierstucke’ ‘Dvorak’ ‘Saxophone’
Blurring ‘motion’ with {15,15} 0.9981 0.9991 1 0.9988 0.9997 0.9997 1
Blurring ‘motion’ with {50,25} 0.9942 0.9982 1 0.9980 0.9973 0.9997 1
Blurring ‘motion’ with {25,45} 0.9979 0.9991 1 0.9991 0.9992 1 0.9999
Scaling 1.25 0.9835 0.9991 1 0.9995 0.9997 1 0.9992
Scaling 1.5 1 0.9991 1 0.9995 0.9994 1 1
Scaling 0.25 0.9997 0.9839 1 0.9997 0.9977 1 0.9874
Cutting 390×390 0.9903 0.9950 0.9997 0.9924 0.9926 0.9948 0.9950
Cutting 290×290 0.9904 0.9920 0.9995 0.9899 0.9852 0.9908 0.9939
Cutting 90×90 0.9927 0.9956 1 0.9936 0.9934 0.9948 0.9998
Gaussian noise 0.2 0.9992 0.9979 0.9997 1 0.9985 1 0.9991
Gaussian noise 0.25 0.9988 0.9975 0.9997 0.9997 0.9985 1 0.9991
Gaussian noise 0.1 0.9994 0.9985 0.9997 1 0.9995 1 0.9995
Rotation 5 0.9910 0.9968 0.9999 0.9951 0.9966 0.9992 0.9975
Rotation 15 0.9864 0.9958 0.9962 0.9924 0.9950 0.9961 0.9961
Rotation 45 0.9848 0.9898 0.9856 0.9889 0.9916 0.9890 0.9887
JPEG 10 0.9994 0.9999 1 0.9995 0.9991 1 1
JPEG 30 0.9997 0.9996 1 0.9997 0.9988 1 1
JPEG 70 1 1 1 1 0.9992 1 1

Table 2. SSIM values of 7 images and the mean values of 50 images under mixed attacks.

Attack ‘Dragnonice’ ‘Snow Child’ ‘Tambourin’ ‘Fest’ ‘Klavierstucke’ ‘Dvorak’ ‘Saxophone’ Average
Blurring 0.9990 0.9988 1 0.9984 0.9981 0.9999 0.9994 0.9992
Scaling 1 0.9839 1 1 0.9994 1 1 0.9993
Gaussian noise 0.9971 0.9963 0.9997 0.9988 0.9959 0.9997 0.9985 0.9982
Cutting 0.9896 0.9933 0.9995 0.9924 0.9920 0.9948 0.9968 0.9936
Rotation 0.9885 0.9924 0.9911 0.9899 0.9929 0.9896 0.9942 0.9903
JPEG 0.9997 1 1 1 0.9992 1 1 0.9998
Stretch 1 0.9839 1 1 0.9997 1 1 0.9972
Squeeze 1 0.9839 1 1 0.9997 1 1 0.9973
Blurring+Gaussian noise 0.9896 0.9953 0.9996 0.9907 0.9934 0.9991 0.9979 0.9926
Blurring+Cutting 0.9903 0.9933 0.9995 0.9924 0.9920 0.9936 0.9963 0.9934
Blurring+Rotation 0.9900 0.9917 0.9904 0.9891 0.9929 0.9888 0.9936 0.9905
Gaussian noise+Cutting 0.9947 0.9926 0.9941 0.9924 0.9929 0.9933 0.9947 0.9931
Gaussian noise+Rotation 0.9927 0.9923 0.9873 0.9892 0.9935 0.9899 0.9927 0.9891
Cutting+Rotation 0.9835 0.9893 0.9809 0.9899 0.9872 0.9886 0.9921 0.9863

Table 3. Comparative study of average SSIM values between the proposed method and similar zero-watermarking algorithms.

Attack Parameters Proposed method QLFM QRHFM QCHFM [55] [56] [57]
Blurring {50,45} 0.9994 0.9997 0.9993 0.9995 0.9968 0.9921 0.9945
Scaling 0.5 0.9996 0.9987 0.9997 0.9993 0.9979 0.9981 0.9990
Gaussian noise 0.5 0.9985 0.9977 0.9990 0.9988 0.9947 0.9926 0.9962
Cutting 200×200 0.9968 0.9972 0.9965 0.9963 0.9927 0.9928 0.9915
Rotation 30 0.9942 0.9935 0.9929 0.9944 0.9924 0.9919 0.9916
JPEG 50 0.9999 0.9999 0.9998 0.9999 0.9996 0.9948 0.9994
Stretch 1.5 0.9989 0.9991 0.9988 0.9989 0.9982 0.9983 0.9979
Squeeze 0.5 0.9991 0.9990 0.9991 0.9989 0.9981 0.9978 0.9988
Blurring+Gaussian noise {50,45}, 0.5 0.9979 0.9974 0.9988 0.9985 0.9933 0.9912 0.9928
Blurring+Cutting {50,45}, 200×200 0.9963 0.9981 0.9959 0.9960 0.9917 0.9908 0.9936
Blurring+Rotation {50,45}, 30 0.9941 0.9931 0.9926 0.9947 0.9907 0.9909 0.9901
Gaussian noise+Cutting 0.5, 200×200 0.9956 0.9961 0.9955 0.9973 0.9916 0.9911 0.9921
Gaussian noise+Rotation 0.5, 30 0.9929 0.9923 0.9939 0.9927 0.9913 0.9905 0.9907
Cutting+Rotation 200×200, 30 0.9931 0.9935 0.9932 0.9902 0.9881 0.9907 0.9903
Average 0.99688 0.99681 0.99679 0.99681 0.99408 0.99313 0.99418

5.4 Comparison with other methods

To obtain more reliable experimental results, Table 3 compares the proposed method with the existing similar zero-watermarking algorithms [5557] and other QTFMs. The average SSIM values are calculated using 30 test color images. The results demonstrate the robustness of the proposed method, which performs well against various types of image attacks and mixed image attacks. When using the mixed low-order moments method, the average SSIM value increases around 7×105 compared to other types of orthogonal moments. Compared to references [5557], the improvement is around 2.7×103. The stability of the experimental results can be attributed to the following factors: (1) The mixed low-order moments method is used to extract low-frequency information from color images, making it is robust to image attacks that alter pixel values, such as noise, blurring, and cutting. (2) References [56,57] embed watermarking image information into the original image by altering the moments amplitudes. This method makes the algorithm sensitive to variations in image pixel values. The method employed in reference [55] requires the computation of high-order moments when the embedded watermark image has a large size, which increases the time complexity and results in relatively poor robustness. (3) The QFFM demonstrates a smaller MSRE in image reconstruction experience, indicating that, at the same maximum order, the QFFM method retains more image texture information. This enhances its robustness against geometric transformations, including scaling, stretching, and compression. (4) Excessive image texture information will lead to increased sensitivity of the algorithm to local pixel changes. Therefore, combining QFFM with the mixed low-order moments method achieves a balance between global and local image information, enhancing the stability of the proposed algorithm against various types of image attacks.

Although the proposed method has several advantages, it also has some limitations. Compared to other QTFM methods that also utilize mixed low-order moments, Franklin moments demonstrate superior average SSIM values in resisting various types of image attacks. However, for specific types of image attacks, it is possible to identify better QTFM methods, indicating that Franklin moments lack specificity in certain scenarios. Additionally, since Franklin functions are composed of piecewise linear functions, they exhibit higher time complexity as shown in Fig 10.

6 Conclusion

A zero-watermarking algorithm based on mixed low-order Franklin moments is proposed for to address issue of copyright protection for digital music score images. The algorithm is constructed based on a set of fractional-order parameters, which are varied within a specific range. Subsequently, a quantization scheme is applied to the extracted features to generate a binary sequence for watermark generation and extraction. The algorithm combines the ability of mixed low-order moments method to effectively extract global image features with the capacity of Franklin moments to capture detailed local information in color images, thereby enhancing its robustness against various types of image attacks. Numerical experiments obviously show that our proposal is much more robust compared to the other considered methods and QTFMs. These results clearly demonstrate that our proposed method can be effectively against common image processing operations and mixed image attacks.

Although the proposed fast computation approach for Franklin functions has achieved certain success, numerical instability issues persist when dealing with high-order (order >200) Franklin polynomials. Therefore, developing a numerically stable construction of Franklin functions is a crucial direction for future work. Furthermore, the derivatives of classical Franklin functions demonstrate discontinuities at the boundaries of the segments. Consequently, the development of a smoother generalization of the Franklin functions represents a significant objective for future research.

Supporting information

S1 Dataset. Music score dataset is used in this paper.

We obtained the music score images from publicly available music databases, specifically from the IMSLP (International Music Score Library Project). This platform offers a vast collection of music scores that are in the public domain, as well as some modern works with explicit permission. The music score images can be accessed through the following link: https://imslp.org/

The majority of the music score images are sourced from the public domain, and therefore do not have any copyright restrictions. Specifically, the scores selected in our study belong to works in the public domain on the IMSLP platform, which are not protected by current copyright laws

(ZIP)

pone.0323447.s001.zip (4.2MB, zip)

Data Availability

All relevant data are within the paper and its Supporting information files.

Funding Statement

The author(s) received no specific funding for this work.

References

  • 1.Zhao J, Zong T, Xiang Y, Gao L, Zhou W, Beliakov G. Desynchronization attacks resilient watermarking method based on frequency singular value coefficient modification. IEEE/ACM Trans Audio Speech Lang Process. 2021;29:2282–95. doi: 10.1109/taslp.2021.3092555 [DOI] [Google Scholar]
  • 2.Darwish MM, Farhat AA, El-Gindy TM. Convolutional neural network and 2D logistic-adjusted-Chebyshev-based zero-watermarking of color images. Multimed Tools Appl. 2023;83(10):29969–95. doi: 10.1007/s11042-023-16649-3 [DOI] [Google Scholar]
  • 3.Xi X, Hua Y, Chen Y, Zhu Q. Zero-watermarking for vector maps combining spatial and frequency domain based on constrained Delaunay triangulation network and discrete Fourier transform. Entropy. 2023;25. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.Bai Y, Li L, Zhang S, Lu J, Emam M. Fast frequency domain screen-shooting watermarking algorithm based on ORB feature points. Mathematics. 2023. [Google Scholar]
  • 5.Wang X, Wang L, Lin TJ, Pan NP, Yang H. Color image zero-watermarking using accurate quaternion generalized orthogonal fourier–Mellin moments. J Math Imaging Vision. 2021;63:708–34. [Google Scholar]
  • 6.Ali M, Kumar S. A robust zero-watermarking scheme in spatial domain by achieving features similar to frequency domain. Electronics. 2024. [Google Scholar]
  • 7.B D, Rupa Ch, D H, Y V. Privacy preservation of medical health records using symmetric block cipher and frequency domain watermarking techniques. In: 2022 International Conference on Inventive Computation Technologies (ICICT). 2022. p. 96–103. doi: 10.1109/icict54344.2022.9850736 [DOI] [Google Scholar]
  • 8.Yamni M, Daoui A, Ogri OE, Karmouni H, Sayyouri M, Qjidaa H. Fractional Charlier moments for image reconstruction and image watermarking. Signal Process. 2020;171:107509. [Google Scholar]
  • 9.Wang X, Zhang Y, Niu P, Yang H. IPHFMs: fast and accurate polar harmonic fourier moments. Signal Process. 2023;211:109103. [Google Scholar]
  • 10.He B, Cui J, Peng Y, Yang T. Image analysis by fast improved radial harmonic‐Fourier moments algorithm. Int J Imaging Syst Tech. 2020;30(4):1033–45. doi: 10.1002/ima.22426 [DOI] [Google Scholar]
  • 11.Wang C, Ma B, Xia Z, Li J, Li Q, Shi Y-Q. Stereoscopic image description with trinion fractional-order continuous orthogonal moments. IEEE Trans Circuits Syst Video Technol. 2022;32(4):1998–2012. doi: 10.1109/tcsvt.2021.3094882 [DOI] [Google Scholar]
  • 12.Sheng T, Zeng W, Yang B, Fu C. Adaptive multiple zero-watermarking based on local fast quaternion radial harmonic Fourier moments for color medical images. Biomed Signal Process Control. 2023;86:105304. [Google Scholar]
  • 13.Radeaf HS, Mahmmod BM, Abdulhussain SH, Al-Jumaeily D. A steganography based on orthogonal moments. In: Proceedings of the International Conference on Information and Communication Technology. 2019. p. 147–53. [Google Scholar]
  • 14.Abdulhussain SH, Mahmmod BM, AlGhadhban A, Flusser J. Face recognition algorithm based on fast computation of orthogonal moments. Mathematics. 2022;10(15):2721. [Google Scholar]
  • 15.Abdulhussain SH, Mahmmod BM, Naser MA, Alsabah MQ, Ali R, Al-Haddad SAR. A robust handwritten numeral recognition using hybrid orthogonal polynomials and moments. Sensors. 2021;21. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 16.Mahmmod BM, Abdulhussain SH, Naser MA, Alsabah M, Hussain A, Al-Jumeily D. 3D object recognition using fast overlapped block processing technique. Sensors (Basel). 2022;22(23):9209. doi: 10.3390/s22239209 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 17.Zhou H, Zhang X, Zhang C, Ma Q. Quaternion convolutional neural networks for hyperspectral image classification. Eng Appl Artif Intell. 2023;123:106234. [Google Scholar]
  • 18.Zhang Q, Liu J, Tian Y. Krawtchouk moments and support vector machines based coal and rock interface cutting thermal image recognition. Optik. 2022. [Google Scholar]
  • 19.Duan C, Zhou J, Gong L, Wu JY, Zhou N. New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Optics Lasers Eng. 2022. [Google Scholar]
  • 20.Mahmmod BM, Abdulhussain SH, Suk T, Hussain AJ. Fast computation of Hahn polynomials for high order moments. IEEE Access. 2021;PP:1–1. [Google Scholar]
  • 21.Daoui A, Karmouni H, Yamni M, Sayyouri M, Qjidaa H. On computational aspects of high-order dual Hahn moments. Pattern Recogn. 2022;127:108596. doi: 10.1016/j.patcog.2022.108596 [DOI] [Google Scholar]
  • 22.Alami AE, Mesbah A, Berrahou N, Berrahou A, Qjidaa H. Quaternion discrete racah moments convolutional neural network for color face recognition. In: 2022 International Conference on Intelligent Systems and Computer Vision (ISCV). 2022. p. 1–5. [Google Scholar]
  • 23.Sahmoudi Y, Ogri OE, Mekkaoui JE, Idrissi BJ, Hjouji A. Improving the machine learning performance for image recognition using a new set of mountain fourier moments. Image Anal Stereol. 2024. [Google Scholar]
  • 24.Bustacara-Medina C, Ruiz-García E. Accuracy of legendre moments for image representation. Comput Sci Res Notes. 2023. [Google Scholar]
  • 25.Yang B, Shi X, Chen X. Image analysis by fractional-order Gaussian-Hermite moments. IEEE Trans Image Process. 2022;31:2488–502. doi: 10.1109/TIP.2022.3156380 [DOI] [PubMed] [Google Scholar]
  • 26.Pallotta L, Cauli M, Clemente C, Fioranelli F, Giunta G, Farina A. Classification of micro-Doppler radar hand-gesture signatures by means of Chebyshev moments. In: 2021 IEEE 8th International Workshop on Metrology for AeroSpace (MetroAeroSpace). 2021. p. 182–7. doi: 10.1109/metroaerospace51421.2021.9511751 [DOI] [Google Scholar]
  • 27.Chen S, Malik A, Zhang X, Feng G, Wu H. A fast method for robust video watermarking based on zernike moments. IEEE Trans Circuits Syst Video Technol. 2023;33(12):7342–53. doi: 10.1109/tcsvt.2023.3281618 [DOI] [Google Scholar]
  • 28.Agilandeeswari L, Prabukumar M, Alenizi FA. A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication. Multimed Tools Appl. 2023:1–53. doi: 10.1007/s11042-023-15177-4 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 29.Noriega-Escamilla A, Camacho-Bello CJ, Ortega-Mendoza RM, Arroyo-Núñez JH, Gutiérrez-Lazcano L. Varroa destructor classification using Legendre-Fourier moments with different color spaces. J Imaging. 2023;9(7):144. doi: 10.3390/jimaging9070144 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 30.Qiu XZ, Peng WC, Ma B, Li Q, Zhang H, Wang M. Geometric attacks resistant double zero-watermarking using discrete Fourier transform and fractional-order exponent-Fourier moments. Digit Signal Process. 2023;140:104097. [Google Scholar]
  • 31.Yang H, Qi S, Wang C, Yang S, Wang X. Image analysis by log-polar Exponent-Fourier moments. Pattern Recogn. 2020;101:107177. doi: 10.1016/j.patcog.2019.107177 [DOI] [Google Scholar]
  • 32.Wang C, Zhang Q, Ma B, Xia Z, Li J, Luo T, et al. Light-field image watermarking based on geranion polar harmonic Fourier moments. Eng Appl Artif Intell. 2022;113:104970. [Google Scholar]
  • 33.Wang C, Wang X, Qiu X, Zhang C. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Information Sciences. 2019;470:109–20. [Google Scholar]
  • 34.Gevorkyan GG, Keryan KA. On a generalization of general Franklin system on R. J Contemp Mathemat Anal. 2014;49(6):309–20. doi: 10.3103/s1068362314060077 [DOI] [Google Scholar]
  • 35.Gevorkyan GG, Navasardyan KA. On uniqueness of series by general Franklin system. J Contemp Mathemat Anal. 2018;53(4):223–31. doi: 10.3103/s1068362318040040 [DOI] [Google Scholar]
  • 36.Gevorkyan GG. On the uniqueness of series in the Franklin system. Sbornik: Mathematics. 2016;207:1650–73. [Google Scholar]
  • 37.Gevorkyan GG, Hakobyan LA. Uniqueness theorems for multiple Franklin series converging over rectangles. Math Notes. 2021;109(1–2):208–17. doi: 10.1134/s0001434621010247 [DOI] [Google Scholar]
  • 38.He B, Cui J, Xiao B, Wang X. Image analysis by two types of Franklin-Fourier moments. IEEE/CAA J Automat Sinica. 2019;6:1036–51. [Google Scholar]
  • 39.Zhu J, Huang K, Gao G, Yu D. Accurate and fast quaternion fractional-order Franklin moments for color image analysis. Digit Signal Process. 2024. [Google Scholar]
  • 40.Mahmmod BM, Abdulhussain SH, Suk T, Alsabah M, Hussain A. Accelerated and improved stabilization for high order moments of Racah polynomials. IEEE Access. 2023. [Google Scholar]
  • 41.Asli BHS, Rezaei MH. Four-term recurrence for fast Krawtchouk moments using Clenshaw algorithm. Electronics. 2023. [Google Scholar]
  • 42.Abdulhussain SH, Mahmmod BM, Baker T, Al‐Jumeily D. Fast and accurate computation of high‐order Tchebichef polynomials. Concurr Comput. 2022;34(27). doi: 10.1002/cpe.7311 [DOI] [Google Scholar]
  • 43.Mahmmod BM, Flayyih WN, Abdulhussain SH, Sabir FA, Khan B, Alsabah M, et al. Performance enhancement of high degree Charlier polynomials using multithreaded algorithm. Ain Shams Eng J. 2024;15(5):102657. doi: 10.1016/j.asej.2024.102657 [DOI] [Google Scholar]
  • 44.Mikayelyan VG. The Gibbs phenomenon for general Franklin systems. Journal of Contemporary Mathematical Analysis. 2017;52:198–210. [Google Scholar]
  • 45.Mourrain B. Polynomial–exponential decomposition from moments. Found Comput Math. 2016;18:1435–92. [Google Scholar]
  • 46.Wang C, Hao Q, Ma B, Wu X, Li J, Qiu X i a Z. Octonion continuous orthogonal moments and their applications in color stereoscopic image reconstruction and zero-watermarking. Eng Appl Artif Intell. 2021;106:104450. [Google Scholar]
  • 47.Camacho-Bello C, Toxqui-Quitl C, Padilla-Vivanco A, Báez-Rojas JJ. High-precision and fast computation of Jacobi-Fourier moments for image description. J Opt Soc Am A Opt Image Sci Vis. 2014;31(1):124–34. doi: 10.1364/JOSAA.31.000124 [DOI] [PubMed] [Google Scholar]
  • 48.Kopets E, Rybin V, Vasilchenko O, Butusov D, Fedoseev P, Karimov A. Fractal tent map with application to surrogate testing. Fractal Fract. 2024;8(6):344. doi: 10.3390/fractalfract8060344 [DOI] [Google Scholar]
  • 49.Yang H, Qi S, Niu P, Wang X. Color image zero-watermarking based on fast quaternion generic polar complex exponential transform. Signal Process: Image Commun. 2020;82:115747. doi: 10.1016/j.image.2019.115747 [DOI] [Google Scholar]
  • 50.Lin Y, Dai Z, Kong Q. MusicScore: a dataset for music score modeling and generation. arXiv preprint. 2024. doi: abs/2406.11462 [Google Scholar]
  • 51.Siewert J. On orthogonal bases in the Hilbert-Schmidt space of matrices. J Phys Commun. 2022;6(5):055014. doi: 10.1088/2399-6528/ac6f43 [DOI] [Google Scholar]
  • 52.Abdulhussain SH, Mahmmod BM. Fast and efficient recursive algorithm of Meixner polynomials. J Real-Time Image Proc. 2021;18(6):2225–37. doi: 10.1007/s11554-021-01093-z [DOI] [Google Scholar]
  • 53.Sharma S, Zou JJ, Fang G, Shukla P, Cai W. A review of image watermarking for identity protection and verification. Multimed Tools Appl. 2023;83(11):31829–91. doi: 10.1007/s11042-023-16843-3 [DOI] [Google Scholar]
  • 54.Xia Z, Wang C, Ma B, Li Q, Zhang H, Wang M, et al. Geometric attacks resistant double zero-watermarking using discrete Fourier transform and fractional-order Exponent-Fourier moments. Digital Signal Process. 2023;140:104097. doi: 10.1016/j.dsp.2023.104097 [DOI] [Google Scholar]
  • 55.Hosny KM, Darwish MM, Fouda MM. New color image zero-watermarking using orthogonal multi-channel fractional-order legendre-fourier moments. IEEE Access. 2021;9:91209–19. [Google Scholar]
  • 56.Niu P, Wang P, Liu Y, Yang H, Wang X. Invariant color image watermarking approach using quaternion radial harmonic Fourier moments. Multimed Tools Appl. 2015;75(13):7655–79. doi: 10.1007/s11042-015-2687-1 [DOI] [Google Scholar]
  • 57.Hosny KM, Darwish MM. Resilient color image watermarking using accurate quaternion radial substituted Chebyshev moments. ACM Trans Multimed Comput Commun Appl. 2019;15(2):1–25. [Google Scholar]
  • 58.Guo EW. A librarian’s guide to IMSLP. Fontes Artis Musicae. 2014;267–74. [Google Scholar]

Decision Letter 0

Sadiq Abdulhussain

26 Dec 2024

PONE-D-24-52606Music Score Copyright Protection based on Mixed Low-order quaternion Franklin MomentsPLOS ONE

Dear Dr. Zhu,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

==============================

Please submit your revised manuscript by Feb 09 2025 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Sadiq H. Abdulhussain, Ph.D.

Academic Editor

PLOS ONE

Journal requirements: When submitting your revision, we need you to address these additional requirements. 1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf. 2. Please update your submission to use the PLOS LaTeX template. The template and more information on our requirements for LaTeX submissions can be found at http://journals.plos.org/plosone/s/latex. 3. Please note that PLOS ONE has specific guidelines on code sharing for submissions in which author-generated code underpins the findings in the manuscript. In these cases, we expect all author-generated code to be made available without restrictions upon publication of the work. Please review our guidelines at https://journals.plos.org/plosone/s/materials-and-software-sharing#loc-sharing-code and ensure that your code is shared in a way that follows best practice and facilitates reproducibility and reuse. 4. We noticed you have some minor occurrence of overlapping text with the following previous publication(s), which needs to be addressed: https://www.sciencedirect.com/science/article/abs/pii/S1051200424003816?via%3Dihub In your revision ensure you cite all your sources (including your own works), and quote or rephrase any duplicated text outside the methods section. Further consideration is dependent on these concerns being addressed. 5. We note that your Data Availability Statement is currently as follows: [All relevant data are within the manuscript and its Supporting Information files.] Please confirm at this time whether or not your submission contains all raw data required to replicate the results of your study. Authors must share the “minimal data set” for their submission. PLOS defines the minimal data set to consist of the data required to replicate all study findings reported in the article, as well as related metadata and methods (https://journals.plos.org/plosone/s/data-availability#loc-minimal-data-set-definition). For example, authors should submit the following data: - The values behind the means, standard deviations and other measures reported;- The values used to build graphs;- The points extracted from images for analysis. Authors do not need to submit their entire data set if only a portion of the data was used in the reported study. If your submission does not contain these data, please either upload them as Supporting Information files or deposit them to a stable, public repository and provide us with the relevant URLs, DOIs, or accession numbers. For a list of recommended repositories, please see https://journals.plos.org/plosone/s/recommended-repositories. If there are ethical or legal restrictions on sharing a de-identified data set, please explain them in detail (e.g., data contain potentially sensitive information, data are owned by a third-party organization, etc.) and who has imposed them (e.g., an ethics committee). Please also provide contact information for a data access committee, ethics committee, or other institutional body to which data requests may be sent. If data are owned by a third party, please indicate how others may request data access.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #2: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: I Don't Know

Reviewer #2: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: No

Reviewer #2: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: Title: “Music Score Copyright Protection based on Mixed Low-order quaternion Franklin Moments”

This article takes music copyrights as an example and designs a copyright protection method for musical score digital images. To enhance the robustness of the algorithm, a new zero-watermarking method based on mixed low-order Franklin moments is proposed. The work is good and well presented. However, there are some major points need to be addressed which are as follows:

1-In general, the Abstract needs to specify the specific problem statements should be mentioned clearly to show the main contribution of this work. Besides, how the robustness has been increased using the new zero-watermarking method based on mixed low-order Franklin moments?

In addition, based on the experimental results, how the proposed algorithm has strong resistance to mixed attacks? What measures have been used and what is the rate of improvement that has been achieved?

2- What is the difference between discrete and continuous moments in QTFM? Which one is preferable to use in color image processing? Why?

3- The introduction section is weak and should be improved, more research should be added in this area. In addition, why does the ability of zero-watermarking algorithms based on orthogonal moments to resist geometric attacks remain limited? In addition, it is required to include some applications of orthogonal polynomials to show their importance such as:

i) "A steganography based on orthogonal moments." Proceedings of the international conference on information and communication technology. 2019.

ii) "Face recognition algorithm based on fast computation of orthogonal moments." Mathematics 10.15 (2022): 2721.

iii) "3D object recognition using fast overlapped block processing technique." Sensors 22.23 (2022): 9209.

Moreover, it is required to mention the main gaps that are handled in the proposed work. please list the main contributions of this work clearly.

4- It is recommended to add the section of the related works to provide a clear vision of the proposed work and its actual contribution in the context of other recent related papers.

5- There are many grammatical and typo errors that should be checked in the entire manuscript.

6- Please cite any specific figures, dataset, equation, and measurements (such as SSIM and PSNR) with reliable sources unless they are related to the authors.

7- The mathematical formula of the time complexity of recursive and non-recursive orthogonalization process are given in section 2.2. However, it is not mentioned for the proposed one. Please clarify.

Besides, it is preferable to put Fig 2 with the section of the Experimental results and discussions.

8- How Gaussian and wavelet integration methods provide an accurate computation of GKS-QFFM. Please give more explanations.

9- In general, the figures and results need more discussion with more explanation about each Tables.

10- The conclusion section is good, but it needs more improvement. It should restart the problem statement, summarize the key findings, and demonstrate the significance of the current work.

Reviewer #2: This paper addresses the challenge of designing a copyright protection method for musical score digital images. To this end, a zero-watermarking approach based on mixed low-order Franklin moments is proposed. The paper uses an invariant moments against image attacks and the consistency of global image features. The paper is well written and well organized. However, I have the following points that need to be addressed.

1. The author use some incomplete senescence. For example, the author mentioned Experimental results demonstrate that the algorithm has strong resistance to mixed attacks. The author need to mentioned the which algorithm.

2. The paper contributions need to be highlighted in the introduction. I would suggest using bullet points to make it clear to the reader.

3. Spacing should be exist between the text and reference. Please consider this point. For example � ng[12].

4. After eq 1 the author mentioned By Sn denotes. I would suggest using where Sn denotes

5. After each section, at the beginning of each section, the author needs to mention what this sections stands for. What are the contents of the section. It would be more clear to reader. Please address this issue.

6. The authors should tell the reader about the computational overhead and latency introduced by the proposed method. Just clarification is needed.

7. What are the imitations of the proposed approach. Could you please clarify this.

8. The author use ‘’Where’’ after equation 4. It should be where small letter and no spacing at the beginning of the line.

9. Dot should be placed after fig 8 caption.

10. The author should state a future work and what can be carried out in the future. This would be really helpful and open the potential for future work.

11. Some relevant references are missing. For example [R1] and [R2]

[R1] Mahmmod, Basheera M., Sadiq H. Abdulhussain, Tomáš Suk, Muntadher Alsabah, and Abir Hussain. "Accelerated and improved stabilization for high order moments of Racah polynomials." IEEE Access (2023).

[R2] Abdulhussain, Sadiq H., Basheera M. Mahmmod, Marwah Abdulrazzaq Naser, Muntadher Qasim Alsabah, Roslizah Ali, and S. A. R. Al-Haddad. "A robust handwritten numeral recognition using hybrid orthogonal polynomials and moments." Sensors 21, no. 6 (2021): 1999.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

PLoS One. 2025 Aug 25;20(8):e0323447. doi: 10.1371/journal.pone.0323447.r002

Author response to Decision Letter 1


25 Feb 2025

We are very grateful to reviewers’ critical comments and thoughtful suggestions. Based on these comments and suggestions, we have made careful modification on the original manuscript. All changes made to the text are in red in the revised manuscript so that they may be easily identified. Some of your questions were answered in response letter.

Once again, we acknowledge your comments and constructive suggestions very much, which are valuable in improving the quality of our manuscript.

Attachment

Submitted filename: Response_Letter.pdf

pone.0323447.s002.pdf (109.6KB, pdf)

Decision Letter 1

Sadiq Abdulhussain

9 Apr 2025

Music Score Copyright Protection based on Mixed Low-order quaternion Franklin Moments

PONE-D-24-52606R1

Dear Dr. Zhu,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice will be generated when your article is formally accepted. Please note, if your institution has a publishing partnership with PLOS and your article meets the relevant criteria, all or part of your publication costs will be covered. Please make sure your user information is up-to-date by logging into Editorial Manager at Editorial Manager® and clicking the ‘Update My Information' link at the top of the page. If you have any questions relating to publication charges, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Sadiq H. Abdulhussain, Ph.D.

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #2: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: I Don't Know

Reviewer #2: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: Most of the comments in the revised version have been properly addressed and no further comments are needed.

Reviewer #2: The author addressed all the issues. The paper is now ready for consireation to be published. The currect format is fine I would recommand accepting this paper.

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

**********

Acceptance letter

Sadiq Abdulhussain

PONE-D-24-52606R1

PLOS ONE

Dear Dr. Zhu,

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now being handed over to our production team.

At this stage, our production department will prepare your paper for publication. This includes ensuring the following:

* All references, tables, and figures are properly cited

* All relevant supporting information is included in the manuscript submission,

* There are no issues that prevent the paper from being properly typeset

You will receive further instructions from the production team, including instructions on how to review your proof when it is ready. Please keep in mind that we are working through a large volume of accepted articles, so please give us a few days to review your paper and let you know the next and final steps.

Lastly, if your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

If we can help with anything else, please email us at customercare@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Sadiq H. Abdulhussain

Academic Editor

PLOS ONE

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    S1 Dataset. Music score dataset is used in this paper.

    We obtained the music score images from publicly available music databases, specifically from the IMSLP (International Music Score Library Project). This platform offers a vast collection of music scores that are in the public domain, as well as some modern works with explicit permission. The music score images can be accessed through the following link: https://imslp.org/

    The majority of the music score images are sourced from the public domain, and therefore do not have any copyright restrictions. Specifically, the scores selected in our study belong to works in the public domain on the IMSLP platform, which are not protected by current copyright laws

    (ZIP)

    pone.0323447.s001.zip (4.2MB, zip)
    Attachment

    Submitted filename: Response_Letter.pdf

    pone.0323447.s002.pdf (109.6KB, pdf)

    Data Availability Statement

    All relevant data are within the paper and its Supporting information files.


    Articles from PLOS One are provided here courtesy of PLOS

    RESOURCES