Professional Documents
Culture Documents
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04)
0-7695-2108-8/04 $ 20.00 © 2004 IEEE
Authorized licensed use limited to: University Of Kalyani. Downloaded on August 26, 2009 at 05:41 from IEEE Xplore. Restrictions apply.
A benefit of such a scheme is that if the images are
stored as compressed JPEG bit streams, the watermark can
be inserted directly into the partially decompressed bit
stream. (a) (b) (c)
Figure 2. Permuted watermark after p times with Eq. (2),
2.1.Middle -frequency coefficients selection where a) p=20, b) p=50, and c) p=96
DCT concentrates the signal energy in the low-frequency 2.3. Adapting watermark to the original image
bands. So, embedding the watermark in lower frequencies
produces more robust watermarked images with lower For more security and imperceptibility, the watermark
quality. Hence, to meet both the invisibility and robustness strength must depend on the intensity values of the DCT
requirements, middle-frequency coefficients of the coefficients of the original image. In this way, the
transformed blocks are selected in a zigzag order to embed watermark signal will be strengthened in large DCT
the digital watermark in. values, and attenuated in small ones. This adaptation
The total number of selected coefficients in each block, procedure is fulfilled through the following steps:
denoted as t, is determined by Eq. (1) [1]. 1) Since the number of blocks in both the watermark
image and the original images must be equal, the permuted
(1)
t = (8M / N ) 2 watermark is divided into non-overlapping nxn blocks,
where n = 8M / N . Then each block is DCT transformed
The first coefficient is selected randomly using a secret individually to obtain Ŵp .
key K1 as the seed of a pseudo-random number generator
(PRNG). All the selected coefficients compose a 2) A block-based mean is calculated over Ŵp using Eq. (3).
transformed M×M image Ŷmf . Furthermore, by using a seed ( M / n )2
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04)
0-7695-2108-8/04 $ 20.00 © 2004 IEEE
Authorized licensed use limited to: University Of Kalyani. Downloaded on August 26, 2009 at 05:41 from IEEE Xplore. Restrictions apply.
keys K1 and K2, and the zigzag pattern to find the exact higher quality watermark, especially for human eyes. The
place of each coefficient. proposed extraction scheme decreases both false negatives
If the amplitude of such watermarking scheme (α i ) is and false positives.
increased to thwart filtering attacks for a robustness, the
watermark may become visible. The just noticeable
4. Evaluation Process
difference threshold (JND) α i can be used to determine By using W~ and the registered watermark W, the arbitrator
the maximum amount of the watermark signal that can be can verify the ownership of the original image. The
tolerated at each region in the image without affecting its evaluation of the watermarked image invisibility is
visual quality. In an image-dependent adaptation, α i is calculated with Masked Peak Signal to Noise Ratio
calculated based on HVS properties: frequency sensitivity, (MPSNR) that is a perceptual quality metric that exploits
luminance sensitivity and contrast masking. We will show the contrast sensitivity and masking phenomena of the
that α i is independent from the original image. HVS and is based on a multi-channel model of the human
spatial vision [7].
Finally, an 8×8 inverse-DCT is applied to Yˆw to obtain Mc 2
MPSNR (vdB ) = 10 log 10 ( ) ( 6)
NTSC format of the watermarked image ( Yw ). MSE
Consequently, with a color space conversion the where MSE is the Mean Squared-Error between X and X w .
watermarked image ( X w will be obtained.
Values of X are between 0 and Mc.
The extracted watermark robustness is evaluated by
3. Extraction Process ~
Normalized Correlation (NC) ratio between W and W [7].
The detection process proposed in this paper is depicted in In comparing two watermarking systems, the system
~ with higher MPSNR value has better visual quality, and
Fig. 3 . The recovered watermark W is extracted from the
~ using the original image X and under an assumed attack, the system with higher NC value
possibly distorted image X is more robust [7].
the secret keys.
~ 5. Experimental Results
X Y′ Yˆw′ ′
Wˆ paa
YIQ DCT Frequency
selection In our experiments, a RGB-color Miniature (Morning Star
miniature, painted by Mahmud Farshchian) with 512×512
Secret pixels, and a 256-color watermark (Mahmud Farshchian's
keys (K)
Inverse ~ ~ Inverse photo) with 128×128 pixels are used.
Wp W p′
Torus IDCT Adaptation After performing the proposed scheme, the MPSNR
~ value of the watermarked image F ( ig. 4(a)) is equal to
W
~ X 57.9vdB, which indicates a higher quality watermarked
W
Post -process image in terms of human visual system.
The NC value of the extracted watermark form an
Figure 3. The proposed extraction process unattacked watermarked image is equal to 1; i.e. no
Initially, the attacked watermarked image X~ is degradation in the extracted watermark. In Tsai's method
converted to the NTSC color space and then divided into visual quality is 39.65dB and NC value is 0.99.
non-overlapping 8×8 blocks, and each block is DCT
transformed independently to obtain Yˆw′ .
After extracting t coefficients from each block in Yˆw′ ,
~ ~ ,
reverse adaptation will be applied to obtain W′paa and W ′
p
respectively .
Next, the inverse DCT can be applied to each n×n
~ to obtain the spatial-domain watermark image
block in W ′
p (a) (b)
~ Figure 4. (a) Watermarked image, MPSNR=57.9 vdB (b)
W p . Finally, Torus function is performed (R-K4) times over
Extracted watermark, NC=1
~ ~
Wp to obtain the embedded watermark ( W ).
As shown in Fig. 5 , for αi < 0.1 the embedding
A more reliable detection process has lower false
positives and false negatives in the extracted watermark. strength parameter α i increases, the invisibility decreases
So, we propose a post-processing procedure to obtain a and the robustness increases. But for α i > 0.1 , higher
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04)
0-7695-2108-8/04 $ 20.00 © 2004 IEEE
Authorized licensed use limited to: University Of Kalyani. Downloaded on August 26, 2009 at 05:41 from IEEE Xplore. Restrictions apply.
values for α i results in less robust watermarked image. On 1
0.9
the other hand, based on the HVS, an MPSNR value 0.8
Quality
MPSNR
which results in MPSNR=57.9vdB and NC=0.82 for an 0.5
0.4
assumed attack such as 75% cropping over the 0.3
NC
watermarked image. 0.2
0.1
The proposed system was also tested with different 0
original images and with this specific watermark. The 0.001 0.1 0.2 0.3 0.5 1 10
Embedding strength
results were the same as above; so the visual quality of the
proposed scheme is independent of the original image. Figure 5. Embedding strength (α i ) versus visual quality
5.1. The post processing unit advantages (MPSNR*0.01) and robustness (NC) in the proposed
embedding process
The proposed scheme has been tested using a PRNG for
watermark permutation, and an assumed attack such as
image cropping to show the benefits of post-processing.
Images shown in Figs. 6(a) and 6(b) are a watermarked
image after 75% cropping and additive-noise attacks,
respectively. Figs. 6(c) and 6(e) are the extracted
watermarks, using pseudo-random watermark permutation
without post-processing. Figs. 6(d) and 6(f) are the
extracted watermarks using pseudo-random watermark (a) (b)
permutation and post-processing. According to the
calculated NC ratios for each extracted watermark, it is
obvious that performing post-processing over an extracted
watermark improves quality of the outputs, i.e. less false (c) (d) (e) (f)
positives and false negatives in the extracted watermark. Figure 6. Using pseudo-random permutation in the
As shown in Fig. 7, using the embedding process with embedding process , (a) 75% cropped watermarked image,
pseudo-random permutation, the visual quality of a post- (b) noisy watermarked image, (c) extracted watermark from
processed watermark (Rpost) is higher than that of the a, NC=0.75, (d) c after post-processing, NC=0.79, (e)
watermark without post-processing (Rand) in the extracted watermark from b, NC=0.61, (f) e after post-
processing, NC=0.68
extraction algorithm. It shows that even using pseudo-
random watermark, the robustness of the proposed scheme
1
is better than Tsai's method. So, using post-processing 0.95
improves the visual quality of the extracted watermark. 0.9
0.85 Tsai
0.8 Rpost
NC
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04)
0-7695-2108-8/04 $ 20.00 © 2004 IEEE
Authorized licensed use limited to: University Of Kalyani. Downloaded on August 26, 2009 at 05:41 from IEEE Xplore. Restrictions apply.
Figure 1 0 shows the robustness of the proposed scheme Linear Signal and Image Processing, Neos Marmaras, Greece,
under various median-filter sizes in comparison to that of June 1995, pp. 452 -455.
other methods. Experiments show that the watermark is [5] I.J. Cox and M.L. Miller, “Robust digital watermarking,”
United States Patent, patent number 6278792, August 21, 2001.
successfully extracted from the watermarked image even if
[6] J. Fridrich, “Image watermarking for tamper detection,” IEEE
the image undergoes more than once blurring attack. On International Conf. On Image Processing (ICIP’98), Vol. 2,
the average, the proposed method is the most robust 1998, pp. 404-408.
system under median filter attack. Furthermore, the NC [7] M . Kutter and F.A.P. Petitcolas, “Fair evaluation methods for
values do not decrease when size of the filter increases. image watermarking systems,” Journal of Electronic Imaging,
As shown in Fig. 11 , the proposed scheme is the most Vol. 9, No. 4, October 2000, pp. 445-455.
robust method against image cropping attack. [8] G. Voyatzis and I. Pitas, “Chaotic mixing of digital images
and applications to watermarking,” European Conf. on
6. Conclusions Multimedia Applications, Services and Techniques
(ECMAST’96), Vol. 2, 1996, pp. 687–695.
In this paper, we proposed a new block DCT-based digital [9] R.B. Wolfgang, C.I. Podilchuk , and E.J. Delp, “Perceptual
watermarks for digital images and video,” IEEE proc., Vol. 87,
watermarking scheme, which inserts an adapted color-
No. 7, July 1999, pp. 1108-1126.
watermark in the middle-frequency coefficients of the
original color image transform.
The proposed adaptive embedding procedure improved 0.99 Tsai
robustness and invisibility of the watermarked image. 0.97
Koch
Image-dependent adaptations not only take the advantage 0.95
0.93 Fridrich
of HVS frequency sensitivity, but also rely on adapting the
NC
0.91
watermark to local image properties in order to provide Cox
0.89
maximum performance in terms of robustness, while Proposed
0.87
satisfying the invisibility constraint. 0.85
method
For getting higher security and higher robustness, a 2D 0.83
periodic Torus permutation function has been described 90 80 70 60 50 40 30 20
which improved robustness and perceptual quality of the JPEG compression quality
extracted watermark. Consequently, to decrease both false Figure 9. Comparison of robustness between the proposed
positives and false negatives in the extra cted watermark, a scheme and other methods against JPEG lossy
post-processing algorithm was proposed which improved compression attack
the visual quality of the extracted watermark. The visual 1
scheme was the most robust method, especially for higher 0.5 Fridrich
0.4
lossy compression ratios. Also, on the average, it was the 0.3
Cox
most robust system under blurring attacks. Indeed, the 0.2
Propsed
watermarked image robustness did not decrease when 0.1 method
0
blurring increased due to larger filter size. In addition, the 3 5 7 9
proposed scheme was the most robust method under image NxN median filter
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04)
0-7695-2108-8/04 $ 20.00 © 2004 IEEE
Authorized licensed use limited to: University Of Kalyani. Downloaded on August 26, 2009 at 05:41 from IEEE Xplore. Restrictions apply.