Top Banner
NTIT 1 A chaos-based robust wavelet-domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp. 47-54. Authors: Zhao Dawei, Chen Guanrong, Liu Wenbo Speaker: Hao-Cheng Wang( 王王王 ) Date: 2004/9/22
28

A chaos-based robust wavelet-domain watermarking algorithm

Jan 17, 2016

Download

Documents

kylia

A chaos-based robust wavelet-domain watermarking algorithm. Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp. 47-54. Authors: Zhao Dawei, Chen Guanrong, Liu Wenbo Speaker: Hao-Cheng Wang( 王皓正 ) Date: 2004/9/22. Outline. Introduction Watermarking in the wavelet domain - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 1

A chaos-based robust wavelet-domain watermarking algorithm

Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp. 47-54.Authors: Zhao Dawei, Chen Guanrong, Liu WenboSpeaker: Hao-Cheng Wang(王皓正 )Date: 2004/9/22

Page 2: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 2

Outline

Introduction Watermarking in the wavelet domain DWT (Discrete Wavelet Transformation) Chaos and its application to watermarking

The new watermarking algorithm Watermark embedding Watermark detection

Results and analysis Conclusions Comment

Page 3: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 3

Watermarking in the wavelet domain The digital watermarking technology includes

Spatial-domain Transform-domain

DCT, DWT

Page 4: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 4

DWT (Discrete Wavelet Transformation)(1/2) 低頻 (low frequency):像素之間的變化小,影像較平滑,人眼的敏感度高. LL1

高頻 (high frequency):像素之間的差異大,影像較粗糙、模糊,人眼的敏感度較低. HH1

中頻:介於低頻與高頻之間. HL1、 LH1

LH1 HH1

HL1LL1

Page 5: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 5

DWT (Discrete Wavelet Transformation)(2/2)

LH1 HH1

HL1LL1

LH1 HH1

HL1LH2 HH2

HL2LL2

Page 6: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 6

Logistic map

Where

When , the map is in the chaotic state.

Where

Chaos and its application to watermarking

)1(1 kk xx

40

45699456.3

10 kx

Page 7: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 7

Logistic map(1/3)

Example

)1(1 kk xx

4

269

72

18

5

1023

529

868

712

229

963

622.0

10

9

8

7

6

5

4

3

2

1

0

x

x

x

x

x

x

x

x

x

x

x

1023

524

154

40

1014

563

856

720

233

962

623.0

10

9

8

7

6

5

4

3

2

1

0

x

x

x

x

x

x

x

x

x

x

x

45699456.3

Page 8: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 8

Logistic map(2/3)

Example

)1(1 kk xx

5.2

614

614

614

614

615

614

616

611

620

602

622.0

10

9

8

7

6

5

4

3

2

1

0

x

x

x

x

x

x

x

x

x

x

x

45699456.3

614

614

614

614

615

614

616

611

621

601

623.0

10

9

8

7

6

5

4

3

2

1

0

x

x

x

x

x

x

x

x

x

x

x

Page 9: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 9

Logistic map(3/3)

We will use the logistic map twice: To generate a label sequence To generate the watermark

Page 10: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 10

The new watermarking algorithm Apply the wavelet transform locally

Watermarkembedding

Iori (256×256)Isub (128×128)

DWT

IDWT

I’sub (128×128)

I’ori

(256×256)

8×8 block

8×8 block

Page 11: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 11

Watermark embedding(1/7)

1 2

1024

32

993

………………..

………………………………..

………………………………..

………………………………..

………………………………..

………………………..

Original Image (256×256 pixels)

Page 12: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 12

Watermark embedding(2/7)

1024)1(1 kk xx

seqk ix

33, 1023, 112, 36, 77……………96, 1, 64…………………….983, 124, 33

33 1023 112 64196………………………………

Label Sequence (Length=256)

(1)

(2)

Page 13: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 13

Watermark embedding(3/7)

Page 14: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 14

Watermark embedding(4/7)

LH1 HH1

HL1

LH2 HH2

HL2LH3 HH3

HL3LL3

DWT

Page 15: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 15

Watermark embedding(5/7)

Type 1

11111000011001110010……

Type 2

[1, -1]

11111-1-1-111-111-1

Page 16: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 16

Watermark embedding(6/7)

),1(1 kk xx wmk ix

)()()(' iwiCiC bandband , i=1, 2, …, N

Cband are the original wavelet coefficientsC’band are the watermarked wavelet coefficientsαis a global parameter accounting for the watermark strengthw is the watermark signalN is the element number of subband HL1 or HH1 or LH1

band {HL1, HH1, LH1}

(1)

(2)

(3)

Page 17: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 17

Watermark embedding(7/7)

4123.0wmi

)()()(' iwiCiC bandband , i=1, 2, …, N

i 1 2 3 4 5 6 7 8 9 10 …

iwm(i) 0.969 0.119 0.420 0.974 0.099 0.375 0.919 0.297 0.835 0.548 …

w(i) 1 -1 -1 1 -1 -1 1 -1 1 1 …

Cband 10 45 53 32 34 54 65 46 93 64 …

C’band 11 44 52 33 33 53 66 45 94 65 …

1 5.0wT

Page 18: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 18

Watermark detection(1/2)

The detection method we use is similar to the method proposed in [1]

We adopt the Neyman-Pearson criterion to determine the threshold Tp

[1] Barni M, Bartolini F. Improved wavelet-bsed watermarking through pixel-wise masking. IEEE Trans Image Processing 2001;10(5):789-91.

Page 19: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 19

Watermark detection(2/2)

band

N

iband iwiC

N 1

' )()(3

1

if ρ>T ρ: a watermark signal exists; otherwise, a watermark signal does not exist

see [1] for more details

(1)

(2)

Page 20: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 20

Results and analysis(1/3)

Test images: “Lena” and “Barbara”(256×256 pixels)

α=6.0, iseq=0.1564 and iwm=0.4123

Page 21: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 21

Results and analysis(2/3)

PSNR=39.3PSNR=39.300

Page 22: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 22

Results and analysis(3/3)

When we set α=1.0, or smaller, we cannot detect the watermark correctly

Page 23: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 23

Robustness against various attacks α=6, Pf=10-8, iseq=0.1564, iwm=0.4123 Additive noise attacks

Gaussian noise Salt and pepper noise

JPEG compression Geometric manipulations

Cropping, resizing, rotation

Page 24: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 24

Cropping

Page 25: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 25

Resizing and rotation

Resizing Zoom scale m

Zoom in (m>1) Zoom out (m<1)

m >0.625

Rotation 25°

Page 26: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 26

Conclusions

This scheme applies the wavelet transform locally, based on the chaotic logistic map, and embeds the watermark into the DWT domain.

Introduced a blind watermarking detection technique using the Neyman-Pearson criterion.

Highly robust against geometric attacks and signal processing operations and JPEG compression.

Page 27: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 27

Comment(1/2)

結合圖片的浮水印技術

11111000011001110010……

LH1 HH1

HL1

LH2 HH2

HL2LH3 HH3

HL3LL3

c1

c1 mod 2 = 1 or 0 ?c1 ±1

Page 28: A chaos-based robust wavelet-domain watermarking algorithm

NTIT 28

Comment(2/2)

p1

p1 mod 2 = 1 or 0 ?

p1 ±1