Top Banner
776 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression Xiangui Kang, Jiwu Huang, Senior Member, IEEE, Yun Q. Shi, Senior Member, IEEE, and Yan Lin Abstract—Robustness is one of the crucial important issues in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. In this paper, a blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. This algo- rithm improves the robustness via using new embedding strategy, watermark structure, 2-D interleaving, and synchronization technique. A spread-spectrum-based informative watermark with a training sequence are embedded in the coefficients of the LL subband in the DWT domain while a template is embedded in the middle frequency components in the DFT domain. In watermark extraction, we first detect the template in a possibly corrupted watermarked image to obtain the parameters of affine transform and convert the image back to its original shape. Then we perform translation registration by using the training sequence embedded in the DWT domain and finally extract the informative watermark. Experimental works have demonstrated that the watermark generated by the proposed algorithm is more robust than other watermarking algorithms reported in the literature. Specifically it is robust against almost all affine transform related testing functions in StirMark 3.1 and JPEG compression with quality factor as low as 10 simultaneously. While the approach is presented for gray-level images, it can also be applied to color images and video sequences. Index Terms—Affine transformation, geometric attacks, image watermarking, robustness, template matching. I. INTRODUCTION D IGITAL watermarking has emerged as a potentially effec- tive tool for multimedia copyright protection, authentica- tion and tamper proofing [1]. Robustness of watermarking is one of the key issues for some applications. A serious problem constraining some practical exploitations of watermarking tech- nology is the insufficient robustness of existing watermarking algorithms against geometrical distortions such as translation, Manuscript received December 16, 2002; revised March 20, 2003. This work was supported by the National Science Foundation (NSF) of China (69975011, 60172067, 60133020), the “863” Program (2002AA144060), the NSFGD (013164), Funding of China National Education Ministry, the New Jersey Commission of Science and Technology via NJWINS, the New Jersey Commission of High Education via NJ-ITOWER, and the NSF via IUCRC. X. Kang, J. Huang, and Y. Lin are with the Department of Electronics and Communication Engineering, Sun Yat-Sen University, Guangzhou 510275, China (e-mail: [email protected]; [email protected]; [email protected]). Y. Q. Shi is with the Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ 07102 USA (e-mail: [email protected]). Digital Object Identifier 10.1109/TCSVT.2003.815957 rotation, scaling, cropping, change of aspect ratio and shearing. These geometrical distortions cause the loss of geometric syn- chronization that is necessary in watermark detection and de- coding [2]. Vulnerable to geometric distortion is a major weak- ness of many watermarking methods [3]. Although some significant progresses have been made re- cently, these new schemes are normally not robust to JPEG com- pression at the same time as shown below. There are two dif- ferent types of solutions to resisting geometrical attacks: non- blind and blind methods [4]. With the nonblind approach, due to availability of the original image, the problem can be resolved with a good solution by effective search between the geometri- cally attacked and unattacked image [5], [6]. The blind solution, which does not use the original image in watermark extraction, has wider application but is obviously more challenging. Three major approaches to the blind solution have been reported in the literature. The first approach hides a watermark signal in the invariants of a host signal (invariant with respect to scaling, rotation, shifting and etc.), and is somewhat awkward due to the theoretical and practical difficulties in constructing invari- ants with respect to combinations of the above-mentioned op- erations. Specifically, Ruanaidh et al. [7] first proposed a wa- termarking scheme based on transform invariants via applying Fourier-Mellin transform to the magnitude spectrum of an orig- inal image. However, the resulting stego-image quality is poor due to interpolation errors [2]. In [3], instead of a “strong in- variant” domain, the watermark is embedded into the magni- tudes of the DFT coefficients resampled by the LPM. The de- tection process involves a comparison of the watermark with all cyclic shifts of the extracted watermark to cope with rotation. To deal with scaling, the correlation coefficient is selected as the detection metric. Only one bit information is hidden in the image, and the watermark cannot resist the general transforma- tions. The second approach exploits the self-reference principle based on an auto-correlation function (ACF) or the Fourier magnitude spectrum of a periodical watermark [8], [9]. In [8], the watermark is replicated in the image in order to create four repetitions of the same watermark such that the experienced geometrical transformation can be detected by applying au- tocorrelation to the investigated image. Experimental results showed that the algorithm could resist generalized geometrical transformations. However, the watermarking is vulnerable to the lossy coding scheme such as JPEG compression. In [9], the usage of a periodical block allocation of a watermark pattern for recovering from geometrical distortions is proposed. It is 1051-8215/03$17.00 © 2003 IEEE
11

A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

Aug 31, 2018

Download

Documents

tranmien
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

776 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003

A DWT-DFT Composite WatermarkingScheme Robust to Both Affine Transform

and JPEG CompressionXiangui Kang, Jiwu Huang, Senior Member, IEEE, Yun Q. Shi, Senior Member, IEEE, and Yan Lin

Abstract—Robustness is one of the crucial important issuesin watermarking. Robustness against geometric distortion andJPEG compression at the same time with blind extraction remainsespecially challenging. In this paper, a blind discrete wavelettransform-discrete Fourier transform (DWT-DFT) compositeimage watermarking algorithm that is robust against both affinetransformation and JPEG compression is proposed. This algo-rithm improves the robustness via using new embedding strategy,watermark structure, 2-D interleaving, and synchronizationtechnique. A spread-spectrum-based informative watermarkwith a training sequence are embedded in the coefficients of theLL subband in the DWT domain while a template is embeddedin the middle frequency components in the DFT domain. Inwatermark extraction, we first detect the template in a possiblycorrupted watermarked image to obtain the parameters of affinetransform and convert the image back to its original shape. Thenwe perform translation registration by using the training sequenceembedded in the DWT domain and finally extract the informativewatermark. Experimental works have demonstrated that thewatermark generated by the proposed algorithm is more robustthan other watermarking algorithms reported in the literature.Specifically it is robust against almost all affine transform relatedtesting functions in StirMark 3.1 and JPEG compression withquality factor as low as 10 simultaneously. While the approachis presented for gray-level images, it can also be applied to colorimages and video sequences.

Index Terms—Affine transformation, geometric attacks, imagewatermarking, robustness, template matching.

I. INTRODUCTION

D IGITAL watermarking has emerged as a potentially effec-tive tool for multimedia copyright protection, authentica-

tion and tamper proofing [1]. Robustness of watermarking isone of the key issues for some applications. A serious problemconstraining some practical exploitations of watermarking tech-nology is the insufficient robustness of existing watermarkingalgorithms against geometrical distortions such as translation,

Manuscript received December 16, 2002; revised March 20, 2003. Thiswork was supported by the National Science Foundation (NSF) of China(69975011, 60172067, 60133020), the “863” Program (2002AA144060), theNSFGD (013164), Funding of China National Education Ministry, the NewJersey Commission of Science and Technology via NJWINS, the New JerseyCommission of High Education via NJ-ITOWER, and the NSF via IUCRC.

X. Kang, J. Huang, and Y. Lin are with the Department of Electronics andCommunication Engineering, Sun Yat-Sen University, Guangzhou 510275,China (e-mail: [email protected]; [email protected]; [email protected]).

Y. Q. Shi is with the Department of Electrical and Computer Engineering,New Jersey Institute of Technology, Newark, NJ 07102 USA (e-mail:[email protected]).

Digital Object Identifier 10.1109/TCSVT.2003.815957

rotation, scaling, cropping, change of aspect ratio and shearing.These geometrical distortions cause the loss of geometric syn-chronization that is necessary in watermark detection and de-coding [2]. Vulnerable to geometric distortion is a major weak-ness of many watermarking methods [3].

Although some significant progresses have been made re-cently, these new schemes are normally not robust to JPEG com-pression at the same time as shown below. There are two dif-ferent types of solutions to resisting geometrical attacks: non-blind and blind methods [4]. With the nonblind approach, dueto availability of the original image, the problem can be resolvedwith a good solution by effective search between the geometri-cally attacked and unattacked image [5], [6]. The blind solution,which does not use the original image in watermark extraction,has wider application but is obviously more challenging. Threemajor approaches to the blind solution have been reported inthe literature. The first approach hides a watermark signal inthe invariants of a host signal (invariant with respect to scaling,rotation, shifting and etc.), and is somewhat awkward due tothe theoretical and practical difficulties in constructing invari-ants with respect to combinations of the above-mentioned op-erations. Specifically, Ruanaidhet al. [7] first proposed a wa-termarking scheme based on transform invariants via applyingFourier-Mellin transform to the magnitude spectrum of an orig-inal image. However, the resulting stego-image quality is poordue to interpolation errors [2]. In [3], instead of a “strong in-variant” domain, the watermark is embedded into the magni-tudes of the DFT coefficients resampled by the LPM. The de-tection process involves a comparison of the watermark with allcyclic shifts of the extracted watermark to cope with rotation.To deal with scaling, the correlation coefficient is selected asthe detection metric. Only one bit information is hidden in theimage, and the watermark cannot resist the general transforma-tions.

The second approach exploits the self-reference principlebased on an auto-correlation function (ACF) or the Fouriermagnitude spectrum of a periodical watermark [8], [9]. In [8],the watermark is replicated in the image in order to create fourrepetitions of the same watermark such that the experiencedgeometrical transformation can be detected by applying au-tocorrelation to the investigated image. Experimental resultsshowed that the algorithm could resist generalized geometricaltransformations. However, the watermarking is vulnerable tothe lossy coding scheme such as JPEG compression. In [9], theusage of a periodical block allocation of a watermark patternfor recovering from geometrical distortions is proposed. It is

1051-8215/03$17.00 © 2003 IEEE

Page 2: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

KANG et al.: A DWT-DFT COMPOSITE WATERMARKING SCHEME ROBUST TO BOTH AFFINE TRANSFORM AND JPEG COMPRESSION 777

noticed that, however, the watermark estimation is key-inde-pendent, the periodical watermark results in an underlyingregular grid. Hence, the watermark may be detected and maybe destroyed [10], [11]. It has been proposed recently thatthe resulting watermark can be slightly pre-distorted in sucha way that this problem may be resolved [12]. In [12], it isreported that the watermark is robust against local or nonlineargeometrical distortions, such as random bending attack.

The third approach utilizes an additional template (e.g. a sinu-soid or a cross [13], [14]). In [15], Pereira and Pun proposed anaffine resistant image watermark in DFT domain. The informa-tive watermark (the message to be conveyed to the detector/re-ceiver) together with a template is embedded in the middle fre-quency components in DFT domain. The template consists ofintentionally embedded peaks in the Fourier spectrum. That is,the watermark embedder casts extra peaks in some locations ofthe Fourier spectrum. The locations of the peaks are predefinedor selected by a secret key. The strength is adaptively determinedby using local statistics of the Fourier spectrum. In watermarkdetection, all local maxima are extracted by using small win-dows. While resistant to affine transform, the watermark gener-ated with the scheme is not robust enough. In particular, it is notrobust to JPEG compression with the quality factor below 75.

In this paper, a new blind image watermarking algorithm ro-bust against both affine transformations and JPEG compressionis proposed. The proposed DWT-DFT composite watermarkingscheme embeds a message and a training sequence insubband in the DWT domain, and embeds a template in magni-tude spectrum in DFT domain. The watermarking incorporatesDWT/DFT, concatenated coding of direct sequence spreadspectrum (DSSS) and BCH, 2-D interleaving, resynchroniza-tion based on the template and training sequence. Experimentalresults have demonstrated that the watermark is robust againstboth affine transformations and JPEG compression when thequality factor is as low as 10.

The rest of this paper is organized as follows. In Section II,we introduce the watermark embedding. Section III describesthe watermark extraction based on resynchronization. The ex-perimental results are presented in Section IV. A conclusion isdrawn in the last section.

II. WATERMARK EMBEDDING

This algorithm achieves enhanced robustness via improvingembedding strategy and watermark structure, and using anew effective synchronization technique. DWT is playing anincreasingly important role in watermarking, due to its goodspatial-frequency characteristics and its wide applications inthe image/video coding standards. According to Coxet al.[16] and Huanget al. [17], watermark should be embeddedin the DC and low frequency AC coefficients in DCT domaindue to their large perceptual capacity. The strategy can beextended to DWT domain. We embed informative watermarkinto subband in the DWT domain to make it more robustwhile keeping the watermark invisible. When the markedimage undergoes affine transformation ,the matrix can be determined by using a template as ref-erence. The template is embedded into the middle frequency

Fig. 1. Watermark embedding process.

components in the magnitude spectrum to avoid interferingwith the informative watermark. To determine the translationparameter, we embed a training sequence in the DWT domain.To survive all kinds of attacks, we use the concatenatedcoding of BCH and DSSS method to encode the message

( in our work).To cope with bursts of errors which possibly occurred withwatermark, a newly developed 2-D interleaving [18], [19]is exploited. The watermark embedding process is shown inFig. 1.

A. Message Encoding and Training Sequence Embedding inthe DWT Domain

The watermark embedding in the DWT domain is imple-mented through the following procedures.

1) By using the Daubechies 9/7 bi-orthogonal wavelet fil-ters, we apply a four-level DWT to an input image( , in our work), generating 12 subbandsof high frequency ( , , , ) and onelow-frequency subband .

2) The message is first encoded using BCH (72, 60) toobtain the message of length . Then eachbit of is DSSS encoded using an -bit bipolar

-sequence , where “1” iscoded spreadly as , “0” as

, thus obtaining a binary string

3) The training sequence ,, which is a key-based sequence, should

be distributed all over the image in order to survive allkinds of attacks, especially cropping. To this purpose, inour work, the training sequence(63 bits) is embeddedin row 16 and column 16 of the subband. It isnoted that a different combination of row and columncorresponding to the important image portion can also bechosen. The informative watermark is 2-D interleavedand embedded in the leftover portion of the subband(Fig. 2).

In implementation, we allocate the 63 bits of thetraining sequence into row 16 and column 16 of a 32

32 2-D array, we then de-interleave [18] it, resulting ina new 32 32 array. The binary string is embeddedinto the remaining portion of the above-mentioned array.

Page 3: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

778 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003

Fig. 2. Training data set.

By applying 2-D interleaving technique [19] to this array,we obtain another 2-D array. Scanning this 2-D array,say, row by row, we convert it into a 1-D array.

Coefficients of the subband are scanned in thesame way as in the embedding, resulting in a 1-D array,denoted by . Similar to our nonblind watermarkingtechnique [6], we embed the binary data into toobtain according to (1), where is a parameterrelated to the watermark embedding strength,and denote the amplitude of the element in

and , respectively. Note that the difference be-tween and is between and .If , . If ,

. So in the extraction, if the ex-tracted coefficient has , thenthe recovered binary bit . Otherwise, .In order to extract an embedded bit correctly, the absoluteerror (introduced by image distortion) between and

, as in (1), shown at the bottom of the page, mustbe less than . The parameter can be chosen soas to make a good compromise between the contendingrequirements of imperceptibility and robustness. Wechoose to be 90 in our work.

This training sequence helps to achieve synchroniza-tion against translation possibly applied to stego-image. Ifthe correlation coefficient between the training sequence

and the test sequenceobtained from a test image sat-isfies the following condition

, we regard as matched to and con-sider synchronization is achieved. Here, we can calcu-late the corresponding probability of false positive (falsesynchronization) as ,where , andmeans taking the nearest integer. In our work, we choose

(empirically value), thus have

Fig. 3. Template embedding.

, which may be sufficient low for many ap-plications.

4) Performing IDWT on the modified DWT coefficients, weproduce the watermarked image . The PSNR ofthus generated marked images versus the originalimage is higher than 42.7 dB.

B. Template Embedding in DFT Domain

Since the DWT coefficients are not invariant under geometrictransformation, to resist affine transform, we embed a templatein DFT domain of the watermarked image inspired by [15]. Thetemplate embedding is as follows.

1) In order to have a required high resolution, the imageis padded with zeros to a size of 10241024,

the fast Fourier transform (FFT) is then applied.2) 14 template points uniformly distributed along two lines

(refer to Fig. 3) are embedded, seven points each linein the upper half plane in the DFT domain at anglesand with radii varying between and . The an-gles and radii , where , 2, , maybe chosen pseudo-randomly as determined by a key. Werequire at least two lines in order to resolve ambiguitiesarising from the symmetry of the magnitude of the DFT,and we choose to use only two lines because adding morelines increases the computational cost of template detec-tion dramatically. We empirically find that seven pointsper line are enough to lower false positives probability toa satisfactory extent during detection. But to achieve morerobustness against JPEG compression than the techniquereported in [15], a lower frequency band, sayand , is used for embedding the template. Thiscorresponds to 0.2 and 0.3 in the normalized frequency,which is lower than the band of 0.350.37 used in [15].Since we do not embed the informative watermark in themagnitude spectrum of DFT domain, to be more robustto JPEG compression, a larger strength of the templatepoints is chosen than in [15]. Concretely, instead of thelocal average value plus two times of standard deviation[15], we use the local average value of DFT points plus

(1)

Page 4: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

KANG et al.: A DWT-DFT COMPOSITE WATERMARKING SCHEME ROBUST TO BOTH AFFINE TRANSFORM AND JPEG COMPRESSION 779

Fig. 4. Original images,Lena, Baboon, andPlane.

five times of standard deviation. According to our exper-imental results, this larger strength and lower frequencyband have little effect on the invisibility of the embeddedwatermark (refer to Figs. 4 and 5).

3) Correspondingly another set of 14 points are embeddedin the lower half plane to fulfill the symmetry constraint.

4) Calculate the inverse FFT, we obtain the DWT-DFTcomposite watermarked image . The PSNR of

versus the original image is 42.5 dB, which isreduced by 0.2 dB compared with the PSNR ofversus the original image due to the template embedding.The experimental results demonstrate that the embeddeddata are perceptually invisible.

Fig. 5. Watermarked images withPSNRs > 42:5 dB.

III. W ATERMARK EXTRACTION WITH PROPOSED

RESYNCHRONIZATION

In order to extract the hidden information, we extract a datasequence in row 16 and column 16 in theDWT subband of the to-be-checked image , whichis rescaled to the size of the original image at first, in our work,512 512. (We assume that the size of the original image isknown to the detector.) If, , we can then ex-tract the informative watermark and recover the message from

subband directly. Otherwise, we need to resynchronize thehidden data before extracting the informative watermark.

In order to resynchronize the hidden data after geometric dis-tortion, we restore affine transform according to the template

Page 5: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

780 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003

embedded, and then restore translation using the training se-quence. Therefore the procedure of information extraction is di-vided into three phases: template detection, translation registra-tion, and decoding.

A. Template Detection

We first detect the template embedded in DFT domain. Bycomparing the detected template with the originally embeddedtemplate, we can determine the affine transformation possiblyapplied to the test image. To avoid high computational com-plexity, we propose an effective method to estimate the affinetransformation matrix.

A linear transform applied in spatial domain results in a cor-responding linear transform in DFT domain. That is, if a lineartransform is applied to an image in spatial domain as follows:

(2)

then correspondingly the following transform takes place inDFT domain [15]:

(3)

The template detection is conducted in the following way,which is basically the same as in [15] except a more efficientway to estimate the linear transform matrix.

1) Apply a Bartlett window to the to-be-checked imageto produce the filtered image .

2) Calculate the FFT of the image padded with zero to thesize of 1024 1024. A higher resolution in the FFT isexpected to result in a more accurate estimation of theundergone transformations. However, as we increase theamount of zero-padding, we also increase the volume ofcalculations. We find that using a size of 10241024yields a suitable compromise.

3) Extract and record the positions of all the local peaks( , ) in the image. Sort the peaks by angle and dividethem into equally spaced bins in terms of angle.

4) For both lines in the template, perform the following.For each of the equally spaced bins search for a

where such that at least local peakshaving radial coordinate , where , matchthe peaks in the original template having radial coordi-nate along line where , 2. Here, by match itis meant that . If at leastpoints match, we store the set of matched points. (In ourwork, we choose and . The cor-responding scaling factor considered is hence between 2and 0.5.)

5) From all sets of matched points, choose one set matchingto template line 1 and another to template line 2 such thatthe angle between two sets deviates from the differencebetween and as shown in Fig. 3 within a threshold

. Calculate a transformation matrix such that the

mean square error (mse) defined in (4) is minimized asfollows:

......

......

......

......

(4)where ( , ) with subscripts represent a peak point’s co-ordinate, ( , ) with subscripts represent the original(known) template’s coordinate, isthe number of the matching points. We note thatis a 2

2 transformation matrix and the matrix inside

is of . The notation denotes thesum of all of these squared error elements in the error ma-trix. The rows contain the errors in estimating theand

from the original (known) template positions andafter applying the linear transformation.

In the following, we propose a method to estimate thetransformation matrix . It is noted that (5) links the setof matched points ( , ) and the set of the

......

......

......

......

......

......

......

......

...

...

...

...

(5)

original template points ( , ) with , 2;or ; or .

Equation (5) can be rewritten as the following matrix-vector format:

(6)

or

(7)

We seek that minimizes . Thesolution that satisfies the requirement is [20]

(8)

(9)

Since the matrix is a positive definite2 2 matrix, and are 2 1 ma-trices, the above two linear equation systems can

Page 6: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

KANG et al.: A DWT-DFT COMPOSITE WATERMARKING SCHEME ROBUST TO BOTH AFFINE TRANSFORM AND JPEG COMPRESSION 781

Fig. 6. Resynchronization: (a) the to-be-checked imageg(x; y), which is of 512� 512 and is experienced a rotation of 10, scaling, translation, cropping, andJPEG compression with quality factor of 50; (b) the imageg (x; y), which is of 504� 504 and has been recovered from the linear transform applied; (c) the imageI(x; y), which has been padded with 0s to the size of 512� 512; and (d) the resynchronized imageg (x; y), which is of 512� 512 and has been padded withthe mean gray-scale value of the imageg(x; y). The embedded message was finally recovered without error.

be easily solved for and, thus we obtain the candidate

of transformation matrix and the corre-sponding mse according to (4) is

mse

(10)

6) Since we only work on the upper half plane, in order toresolve possible ambiguities, we add 180to the angles inthe sets of matched points corresponding to line 1 of thetemplate (either line can be used), then repeat the previousstep.

7) Choose the that results in the smallest mse.

8) If the minimized error is larger than the detectionthreshold , we conclude that no watermark was em-bedded in the image. Otherwise we proceed to decoding.According to (2) and (3), we can obtain the linear trans-form matrix , described at the beginning of Section II,and . Applying the inverse linear transform,

, to the image , we obtain an image ,that has correct the applied linear transform. One ex-ample is shown in Fig. 6(a) and (b).

B. Translation Registration and Decoding

Assume the linear transform corrected image has sizeof . Padding with 0s to the size of 512 512generates the image [Fig. 6(c)].

One way to restore translation is to search by brute-force forthe largest correlation coefficient between the training sequence

and the data sequenceextracted from the DWT coefficientsin row 16 and column 16 of subband corresponding to the

Page 7: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

782 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003

Fig. 7. Some original images used in our test.

following set of all possible translated images. (Note that weconstruct sequence in the way as we embed thesequencein the subband, refer to Fig. 2)

(11)

where and are the translation parameters in the spatial do-main. This method demands a heavy computational load when

and/or . We dramatically re-

duce the required computational load by performing DWT for atmost 256 cases according to the dyadic nature of the DWT. Thatis, if an image is translated by rows and/or columns( , ), then the subband coefficients of the imageare translated by rows and/or columns accordingly. Thisproperty is utilized to efficiently handle translation synchroniza-tion in our algorithm. That is, we have ,

, where , . In each of the 256 pairsof , we perform DWT on the translated image ,generating the coefficients, denoted by . We thenperform translations on the

(12)

Page 8: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

KANG et al.: A DWT-DFT COMPOSITE WATERMARKING SCHEME ROBUST TO BOTH AFFINE TRANSFORM AND JPEG COMPRESSION 783

Fig. 8. Watermarked images withPSNRs > 42:5 dB.

where , are the translation parameters in thesubband, ,

. Each time, we extract thedata sequence in row 16 and column 16 in the .The synchronization is achieved when or

is largest. For example, for the image in Fig. 6(c), themaximum correlation coefficient is achievedwhen , and , . At last,we obtain the translation parameters ( ,

).After restoring affine transform and translation, and padding

with the mean gray-scale value of the image , we obtain

the resynchronized image [Fig. 6(d)]. The coeffi-cients of are scanned using the same way as in the dataembedding, resulting a 1-D array, . The extracted hidden bi-nary data, denoted by , are extracted as follows:

(13)

De-interleaving [18] the 32 32 2-D array, constructed from, we can obtain the recovered binary data . We segmentby bits per sequence, correlate the obtained sequence

Page 9: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

784 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003

TABLE IEXPERIMENTAL RESULTSWITH STIRMARK 3.1

with the original -sequence . If the correlation value islarger than 0, the recovered bit is “1”, otherwise, “0”. The bi-nary bit sequence can thus be recovered.

The recovered bit sequenceis now BCH decoded. In ourwork, we use the BCH (72, 60). Hence, if there are fewer thanfive errors, the message will be recovered without error, oth-erwise, the embedded message cannot be recovered correctly.

IV. EXPERIMENTAL RESULTS

We have tested the proposed algorithm on images shown inFig. 4 and Fig. 7. The results are reported in Table I. In our work,we choose , , , ,

, , the detection threshold. The PSNRs of the marked images are higher than 42.5

dB (see Fig. 8). The watermarks are perceptually invisible. Thewatermark embedding takes less than 4 s, while the extractiontakes about 238 s on a 1.7-GHz Pentium PC using C language.

Fig. 9 shows a markedLena image that has undergoneJPEG compression with quality factor 50 (JPEG_50) in ad-dition to general linear transform [a StirMark test function:linear_ 1.010_0.013_0.009_1.011, Fig. 9(a)] or rotation 30[auto-crop, auto-scale, Fig. 9(b)]. In both cases, the embeddedmessage (60 information bits) can be recovered with no error.This demonstrates that our watermarking method is able toresist both affine transforms and JPEG compression. Table Ishows more test results with our proposed algorithms byusing StirMark 3.1. In Table I, “1” represents the embedded60-bit message can be recovered successfully while “0” meansthe embedded message cannot be recovered successfully. Itis observed that the watermark is robust against Gaussianfiltering, sharpening, FMLR, rotation (auto-crop, auto-scale),aspect ratio variations, scaling, jitter attack (random removalof rows and/or columns), general linear transform, shearing.In all of these cases, the embedded message can be recovered.We can also see that the watermark can effectively resist JPEGcompression, and cropping. It is noted that our algorithm can

Fig. 9. Watermarked image that have undergone JPEG_50 inaddition to an affine transform (StirMark function). (a) JPEG_50+linear_1.010_0.013_0.009_1.011. (b) JPEG_50+rotation_scale_30.00.

Page 10: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

KANG et al.: A DWT-DFT COMPOSITE WATERMARKING SCHEME ROBUST TO BOTH AFFINE TRANSFORM AND JPEG COMPRESSION 785

TABLE IIPERFORMANCECOMPARISON OF THEPROPOSEDSCHEME WITH THAT IN [15]

recover the embedded message for JPEG compression withquality factor as low as 10. The watermark is recovered whenup to 65% of the image has been cropped. The watermarkcan also resist the combination of RST (rotation, scaling,translation, cropping) with JPEG_50 (Figs. 6 and 9).

We compare the proposed scheme with the scheme in [15]on Lena image using StirMark 3.1. The results are shown inTable II. Both schemes hide a 60-bit message in aimage. It is noted that our scheme performs much better in re-sisting JPEG compression. It is robust against JPEG with qualityfactor as low as 10 instead of 75 in [15]. Table II indicates thatour watermark can be recovered without error against shearingof less than or equal to 5% (shearing_5.00_5.00), while the wa-termark in [15] can only be recovered correctly against shearingof less than or equal to against 0.1% ([15, p. 1127]). Whilethe watermark embedded with our proposed method is morerobust against JPEG and geometric distortions, the PSNR ofthe marked image versus the original image with our methodis higher than 42.5 dB and the PSNR with [15] is not higherthan 38 dB.

We have also tested the proposed algorithm using differentwavelet filters, such as orthogonal wavelet filters Daubechies-N

and other bi-orthogonal wavelet filters (for ex-ample, Daubechies 5/3 wavelet filter). The similar results havebeen obtained.

V. CONCLUSIONS

The main contributions presented in this paper are as follows.

1) We proposed a DWT-DFT composite watermarkingscheme that is robust to affine transforms and JPEGcompression simultaneously. Compared with otherwatermarking algorithms reported in the literature, theproposed technique is more robust and has a higherPSNR of marked image. The proposed watermarkingcan successfully resist almost all of the affine transformrelated test functions in StirMark 3.1 and JPEG compres-sion with quality factor as low as 10.

2) We proposed to use a training sequence embedded in theDWT domain to achieve synchronization against transla-tion. By using the dyadic property of the DWT, we re-duced the number of the DWT implementation dramati-cally, hence lowering the computational complexity.

3) A new method to estimate the affine transform matrix,expressed in (8) and (9), is proposed. It can reduce thehigh computational complexity required in the iterativecomputation.

However, the robustness of the informative watermark againstmedian filtering and random bending needs to be improved.Robustness against median filtering may be improved by in-

creasing the strength of the informative watermark via adaptiveembedding based on perceptual masking [21]–[24]. Moreover,it is noted that the template embedded in the DFT domain maybe removed by the attacker [25]. These issues are our future re-search subjects.

The proposed technique for embedding character strings intogray-scale images may find applications in the intellectual prop-erty protection and anonymous communications. It is noted thatalthough the algorithm is presented for gray-level images, itmay be applied to color images and video sequences in a ratherstraightforward way. For a color image, we can apply the pro-posed algorithm to the luminance component of the image. Fora video sequence, we may treat each frame as a gray-level imageand hide a bit stream into the frame [26]. Another feasible wayis to simply embed a few symbols into each of I-frames in anMPEG-compressed video sequence.

ACKNOWLEDGMENT

The authors are grateful to the constructed review comments,which have helped to enhance the quality of this paper.

REFERENCES

[1] F. Hartung and M. Kutter, “Multimedia watermarking techniques,”Proc.IEEE, vol. 87, no. July, pp. 1079–1107, 1999.

[2] F. Deguillaume, S. Voloshynovskiy, and T. Pun, “A method for the es-timation and recovering from general affine transforms in digital wa-termarking applications,” inProc. SPIE: Security and Watermarkingof Multimedia Contents IV, vol. 4675, San Jose, CA, Jan. 2002, pp.313–322.

[3] C.-Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y.-M.Lui, “Rotation, scale, and translation resilient watermarking for images,”IEEE Trans. Image Processing, vol. 10, pp. 767–782, May 2001.

[4] J.-L. Dugelay and F. A. P. Petitcolas, “Possible counter-attackersagainst random geometric distortions,” inProc. SPIE: Security andWatermarking of Multimedia Contents II, vol. 3971, CA, Jan. 2000.

[5] G. W. Braudaway and F. Minter, “Automatic recovery of invisible imagewatermarks from geometrically distorted images,” inProc. SPIE: Secu-rity and Watermarking of Multimedia Contents I, vol. 3971, CA, Jan.2000.

[6] X. Kang, J. Huang, and Y. Q. Shi, “An image watermarking algorithmrobust to geometric distortion,” inLecture Notes in Computer Science:Proc. Int. Workshop on Digital Watermarking 2002 (IWDW2002), vol.2613, Seoul, Korea, 2002, pp. 212–223.

[7] J. J. K. O’Ruanaidh and T. Pun, “Rotation, scale and translation invariantspread spectrum digital image watermarking,”Signal Processing, vol.66, no. 3, pp. 303–317, 1998.

[8] M. Kutter, “Watermarking resistance to translation, rotation, andscaling,” in Proc. SPIE: Multimedia Systems Applications, vol. 3528,1998, pp. 423–431.

[9] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Content adaptive wa-termarking based on a stochastic multiresolution image modeling,” inProc. 10th European Signal Processing Conf. (EUSIPCO’2000), Tam-pere, Finland, Sept. 2000.

[10] H. J. Shim and B. Jeon, “Rotation, scaling, and translation robust imagewatermarking using Gabor kernels,” inProc. SPIE: Security and Water-marking of Multimedia Contents IV, vol. 4675, San Jose, CA, Jan. 2002,pp. 563–571.

[11] S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun,“Generalized watermark attack based on watermark estimation and per-ceptual remodulation,” inProc. SPIE: Electronic Imaging 2000, Secu-rity and Watermarking of Multimedia Content II, vol. 3971, San Jose,CA, 2000.

[12] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Multibit digital water-marking robust against local nonlinear geometrical distortions,” inProc.IEEE Int. Conf. Image Processing, vol. 3, Thessaloniki, Greece, 2001,pp. 999–1002.

[13] D. J. Fleet and D. J. Heger, “Embedding invisible information in colorimages,” inProc. IEEE Int. Conf. Image Processing, vol. 1, Santa Bar-bara, CA, 1997, pp. 532–535.

Page 11: A DWT-DFT composite watermarking scheme robust to …web.cecs.pdx.edu/~mperkows/CLASS_573/Kumar_2007/01227607.pdf · with a good solution by effective search between the geometri-

786 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003

[14] W. Bender, D. Gruhl, and N. Morimoto, “Techniques for data hiding,”IBM Syst. J., vol. 35, no. 3/4, pp. 313–337, 1996.

[15] S. Pereia and T. Pun, “Robust template matching for affine resistantimage watermarks,”IEEE Trans. Image Processing, vol. 9, pp.1123–1129, 2000.

[16] I. J. Cox, J. Killian, F. T. Leighton, and T. Shamoon, “Secure spread spec-trum watermarking for multimedia,”IEEE Trans. Image Processing, vol.6, pp. 1673–1687, Dec. 1997.

[17] J. Huang, Y. Q. Shi, and Y. Shi, “Embedding image watermarks in DCcomponents,”IEEE Trans. Circuits Syst. Video Technol., vol. 10, pp.974–979, 2000.

[18] G. F. Elmasry and Y. Q. Shi, “2-D interleaving for enhancing the ro-bustness of watermark signals embedded in still image,” inProc. IEEEInt. Conf. Multimedia and Expo, 2000, p. **AUTHOR: PLS. PROVIDEPAGES**.

[19] Y. Q. Shi and X. M. Zhang, “A new two-dimensional interleaving tech-nique using successive packing,”IEEE Trans. Circuits Syst. I, vol. 49,pp. 779–789, June 2002.

[20] G. W. Stewart,Introduction to Matrix Computations. New York: Aca-demic, 1973.

[21] C. I. Podilchuk and W. Zeng, “Image-adaptive watermarking using vi-sual models,”IEEE J. Select. Areas Commun., vol. 16, pp. 525–539,1998.

[22] J. Huang and Y. Q. Shi, “An adaptive image watermarking scheme basedon visual masking,”Electron. Lett., vol. 34, no. 8, pp. 748–750, 1998.

[23] S. Voloshynovskiy, A. Herrigel, N. Baumgärtner, and T. Pun, “A sto-chastic approach to content adaptive digital image watermarking,”Lec-ture Notes in Computer Science, vol. 1768, pp. 212–236, 1999.

[24] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Content adaptive wa-termarking based on a stochastic multiresolution image modeling,” inProc. 10th European Signal Processing Conf. (EUSIPCO’2000), Tam-pere, Finland, Sept. 2000.

[25] S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, “Attack modeling:toward a second generation benchmark,”Signal Processing, vol. 81, no.6, pp. 1177–1214, 2001.

[26] F. Hartung and B. Girod, “Watermarking of uncompressed and com-pressed video,”Signal Processing, vol. 66, no. 3, pp. 283–301, 1998.

Xiangui Kang received the B.S. and M.S. degrees from Peking University,Peking, China, and Nanjing University, Nanjing, China, in 1990 and 1993,respectively. He is currently working toward the Ph.D. degree in the Depart-ment of Electronics and Communication Engineering, Sun Yat-Sen University,Guangzhou, China.

He is with the Department of Electronics and Communication Engineering,Sun Yat-Sen University. His research interests include image processing, datahiding, watermarking, and network security.

Jiwu Huang (SM’00) received the B.S. degree in electronic engineering fromXidian University, Xi’an, China, in 1982, the M.S degree in electronic engi-neering from Tsinghua University, Peking, China, in 1987, and the Ph.D. degreein pattern recognition and information systems from the Chinese Academy ofScience, Peking, China, in 1998.

He is with the Department of Electronics and Communication Engineering,Sun Yat-Sen University, Guangzhou, China. His current research interests in-clude image processing, image coding, data hiding, and watermarking.

Yun Q. Shi (M’90–SM’93) received the B.S. degree in electronic engineeringand the M.S. degree in precision instrumentation from Shanghai Jiao Tong Uni-versity, Shanghai, China, and the Ph.D. degree in electrical engineering fromthe University of Pittsburgh, Pittsburgh, PA.

He has been a Professor with the Department of Electrical and ComputerEngineering, New Jersey Institute of Technology, Newark, NJ, since 1987. Hisresearch interests include motion analysis from image sequences, video codingand transmission, and digital image watermarking.

Yan Lin received the B.E. degree in communication engineering in 2002 fromSun Yat-Sen University, Guangzhou, China, where he is currently working to-ward the Master’s degree in the Department of Electronics and CommunicationEngineering.

His research interests include image watermarking, data hiding, and networksecurity.