Professional Documents
Culture Documents
1. Introduction
As we know, the multimedia becomes an important form of information exchange; such large number of digital products are created and transmitted via the Internet. There are one characteristics of digital products is that they are very easy to create, store, duplicate, transmit and modify. It also make unauthorized using, copying, or modification of the products becomes very easy. How to protect the intellectual property of digital products is a serious problem that the issuers have to face. To address this issue, digital watermarking techniques have been developed to protect the copyright of media signals [2]. Many research efforts over the past decade have enabled digital watermarking to establish itself as a potential solution for the protection of ownership rights and policing information piracy of multimedia elements like images, audio and video[5]. Digital watermarking is divided into two main categories: visible watermark and invisible watermark. They can be categorized based on the domain used for watermarking embedding process. Then they can be grouped into two main classes: Spatial domain
978-0-7695-3507-4/08 $25.00 2008 IEEE DOI 10.1109/CSIE.2009.150 280
watermark binary sequence will be mapped as wij {1,-1}. From the human visual system, we know the human eye more sensitive to brightness than chroma. So, in JPEG compression processing, the chroma, Cb(blue) and Cr(red) components will be reduced to achieve compress images with few image quality decline. In JPEG standard compression processing, the down sampling ratios of components of YUV model, Y(luminance): Cb: Cr, can be dealt generally as 4:4:4 (no down sampling), 4:2:2, and most commonly 4:2:0 in JPEG compression processing. From this, we notice the Y channel of the image will be kept perfectly after any down sampling of JPEG compression. In this paper, the watermark embedded algorithm is optimized especially for against JPEG compressing through considering the characteristics of JPEG image compression algorithm; Embed the watermark into the Y channel, luminance channel in the YUV color model to ensure the watermark information will be retained more after JPEG image lossy compression. From the principle of DWT decomposition, we know the information of image will concentrate in low frequency. So, the high frequency information will be discarded after JPEG lossy compression. Based on the results of above, in our scheme, the Y channel will be transformed into DWT domain and a watermark is embedded only at diagonal component at 2-level decomposition. It is shown in the figure 1; the area is cH2, cV2 and cD2. And the Human Visual System studies also show that visual perception on the horizontal and vertical direction stimulation most sensitive to the direction of the 45o. For keeping embedded watermark invisible and still retained in host image after compression. Further, only the diagonal component cD2 was chosen to embed watermark. So both the greater invisibility and stronger robust of the watermark in the watermarked image is achieved.
cA2 cV2 cV1 cH2 cD2 cD1 cH1
Channel separating
Y channel
DWT transform
Watermarked image
Figure 2. Watermark embedding process The relation of embedding process is given as (1):
F = F +k | F | w , F < F
ij ij ij ij
'
ij
mean
'
(1)
The relation there is a little change with formula used in [6] which presents the original relation is Fij=Fij+k|Fij|Wij. Where i and j is range over all selected coefficients in cD2 region. Fij, Fij denote the DWT coefficient of the Y channel of the original image and the watermarked image respectively, Wij is the watermark signal and k is a very important parameter which scale is determined by experiment. Fmean is the mean of absolute coefficients value of cD2 region. Compared with paper [6], the algorithm can increase strength K to ensure the embedded watermark easy to recover, and avoid affecting the quality of host image, because the largest amplitude coefficients will be limited when the small amplitude coefficients increase as increasing K.
Figure 1. 2-D discrete wavelet transforms Contrast, the authors of literature [6] proposed imbedded the watermark into the blue channel of the RGB color model. The reason is that the human visual system is least sensitive to the range of high frequency [4]. Among three channels of the RGB image, the blue
281
group, and compute the mean value T of them. The formula is: Where FW is the chosen coefficients sequence, they are assumed embedded watermark. The other coefficients as No.2 group, and then compute its mean value To and multiplies a coefficient alpha as a threshold. The formula is:
(3-2) Threshold = T 0 Here Fnon is the coefficients sequence of No.2 group. d) Compare the No.1s mean value with the mean value of No.2. The target image is considered embedded watermark if the T >To. Where is another important parameter.
Key( seed) Y channel of Watermarke d image DWT Original watermark Calculate Mw *Nw
T = mean ( F w )
(2)
= mean
non
(3-1)
luminance, Median of luminance of original image and the watermarked image for different values of K. Luminance is a measure of the amount of energy an observer perceives from a light source. The change of high luminance pixel is harder be detected by the human eyes than at the lower luminance pixel. From the Table 1 we see that, the mean amplitude of luminance almost no change from K=0.6 to K=2.4, For stronger watermark robust, the K scale take around 2.0, and it also under satisfy imperceptibility at mean of luminance and median luminance test. Table 1. Impact to images on different scale of embedding parameter K
Mean of luminance Images lenna baboon goldhill original 128.23 126.46 110.74 181.86 K=0.6 K=1.2 K=1.8 Median of luminance K=2.4 original k=0.6 K=1.2 K=1.8 K=2.4 119 121 103 201 119 121 103 201 119 121 103 201 119 121 103 201 119 122 103 201
128.23 128.23 128.23 128.22 126.46 126.46 126.46 126.46 110.75 110.75 110.75 110.75 181.85 181.85 181.85 181.85
Calculate threshold To
airplane
T>T o N Y
Watermarked
Non-watermarked
The figure 4 shows Coefficients amplitude of cD2(Y channel) of the original image (lenna.jpg) compare with after watermarked (watermark1, k=2.0). We can see they are almost same. This result further explanation watermark embedding little impact on the host image.
(a)
(b)
Figure 4. Coefficients amplitude of cD2(Y channel) of the original image (lenna.jpg); (b) Coefficients amplitude of cD2(Y channel) of the watermarked image (watermark1, k=2.0).
3. Experimental results
There are four 512512 standard images work as host images and two binary images work as watermark images in the experiments.
(4)
282
Where TPR is True Positive Ration, also be called sensitivity. TP is the times of watermarked images are detected correct; FN is the times of watermarked images cant be detected. And the abscissa of ROC curve can be presented by formula (5). TNR=1-FPR FP FPR = TN + FP
(5-1) (5-2)
Here FPR is False Positive Ratio. TNR is called specificity. FP is the times of watermark are detected in non-watermarked images. TN is the times of did not detect watermark in non-watermarked images. Testing samples have 150 images, there are 50 images embedded watermark among them which have been attacked with random JPEG compression ratio. The detecting result shows as table 2. The figure 5 is the ROC curve. Table 2. Watermark detected result at different alpha
Alpha()
5
TP
50
FN
0
FP
13
TN
87
TPR
1
TNR
0.87
10
15 20 25 30
46
42 37 33 32
4
8 23 27 28
4
3 0 0 0
96
97 100 100 100
0.92
0.84 0.74 0.66 0.64
0.96
0.97 1 1 1
The result shows that the method proposed by paper [6] against scaling attack no more than 1.6 of scaling size. The proposed scheme in this paper has strong robust against scaling attack. Especially, the results indicate the watermark extracting almost no any sensitive for scaling attack when the scale more than 1.
TPR
Figure 5. ROC curve The perfect curve is TNR always keep 1. From the table and curve above, we know =10 is the best choice.
baboon
goldhill
airplane
283
T lenna Threshold (10*To) T baboon Threshold(10*To) T goldhill Threshold (10*To) T airplane Threshold (10*To)
In this paper a watermark method against some familiar attacks were presented. We obtained good results in most of these attacks. Further improvements may be done in the watermark detecting and recovering of cropped watermarked images. The problem is how to determine the initial coefficient of cropped image. The result conduce the remains watermark information in cropped images can be extracting and recovering. Another future work is improving the algorithm to enhance the capacity of proposed scheme.
5. References
[1] J. Alberto Mndez-Polanco, &A. Cristina Palacios Garca, Ral Rodrguez-Coln, and Claudia Feregrino-Uribe, Digital Watermarking Based on Image Centroid Resistant to Rotation and Scaling. 17th International Conference on Electronics, Communications and Computers. IEEE 2007. [2] Lu, Chun-Shien, A. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, Idea Group Publishing, 2005, pp. 1-41. [3] Puech W., Rodrigues J.J. A new cryptowatermarking method for medical images safe transfer. In Proceedings of the 12th European Signal Processing Conference, Vienna Austria, 2004, pp.1481-1484. [4] R.C Gonzalez and R.E. Woods, Digital image processing, Wesley, 1993, PP. 21-25, 191-195, [5] Saraju P.Mohanty, K.R Ramakrishnan, Mohan S Kankanhalli. A DCT Domain Visible Watermarking Technique for Images, IEEE International Conference on Multimedia and Expo, 2002 [6] S.M. Mohidul Islam, Rameswar Debnath, S.K Alamgir Hossain, DWT Based Digital Watermarking Technique and its Robustness on Image Rotation, Scaling, JPEG compression, Cropping and Multiple Watermarking, International Conference on Information and Communication Technology, ICICT 2007, March 2007, Dhaka, Bangladesh. P.246-249
The testing result is shown in table 6. The watermarked images after four times sharpen operation have vastly different with the original watermarked images, but the watermark detection almost unaffected. From the result we can see the sharpen attack is does not work to proposed scheme.
284