DIGITAL IMAGE WATERMARKING Thesis submitted in the fulfillment of the Degree of Doctor of Philosophy by VIKAS SAXENA Department of Computer Science and Engineering JAYPEE INSTITUE OF INFORMATION TECHNOLOGY UNIVERSITY A-10, SECTOR-62, NOIDA, INDIA October, 2008
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
DIGITAL IMAGE WATERMARKING
Thesis submitted in the fulfillment of the Degree of
Doctor of Philosophy
by
VIKAS SAXENA
Department of Computer Science and Engineering JAYPEE INSTITUE OF INFORMATION TECHNOLOGY UNIVERSITY
1. 3 CHARACTERISTICS OF WATERMARKING SCHEMES 10 1. 4 TYPES OF DIGITAL WATERMARKS 11 1. 5 STRUCTURE OF THE THESIS 15
ii
CHAPTER-2
IMAGE WATERMARKING LITERATURE SURVEY 17
2.1 SPATIAL DOMAIN BASED WATERMARKING SCHEMES 18 2.1.1 LSB BASED SCHEMES 18 2.1.2 PATCH WORK BASED SCHEME 18 2.1.3 CORRELATION BASED WATERMARKING SCHEMES 19
2.1.3.1 CORRELATION BASED SCHEMES WITH 1 PN SEQUENCE 19 2.1.3.2 CORRELATION-BASED IMAGE WATERMARKING SCHEMES
WITH 2PN SEQUENCES 19
2.1.3.3 IMAGE WATERMARKING USING PRE-FILTERING 20 2.1.4 CDMA BASED IMAGE WATERMARKING SCHEME 20 2.1.5 OTHER SPATIAL DOMAIN BASED WATERMARKING SCHEMES 21
2.2 TRANSFORMED DOMAIN BASED SCHEMES 22 2.2.1 DFT BASED WATERMARKING SCHEMES 22 2.2.2 DCT BASED WATERMARKING SCHEMES 24
2.2.2.1 THE MIDDLE-BAND COEFFICIENT EXCHANGE SCHEME 26 2.2.2.2 DCT-CDMA BASED IMAGE WATERMARKING 28
2.2.3 DWT BASED WATERMARKING SCHEMES 29 2.2.3.1 CDMA-DWT BASED WATERMARKING SCHEME 30 2.2.3.2 DWT BASED BLIND WATERMARK DETECTION 31 2.2.3.3 DWT BASED NON-BLIND WATERMARK DETECTION 32
2.3 RECENT METHODOLOGIES 33 2.4 PROBLEM STATEMENT FORMULATION 38
2.4.1 JUSTIFICATIONS OF THE PROBLEM STATEMENT CHOSEN 40
3.2.1 PEAK SIGNAL TO NOISE RATIO 56 3.2.2 CORRELATION COEFFICIENT 57
3.3 TEST DATA 58
CHAPTER-4
WATERMARKING OF GRAY IMAGES 61
4.1 INTRODUCTION 61 4.2 INCREASING THE ROBUSTNESS OF IMAGE WATERMARKING SCHEMES
AGAINST JPEG COMPRESSION 62
4.3 INCREASING THE ROBUSTNESS OF IMAGE WATERMARKING SCHEME
AGAINST HISTOGRAM EQUALIZATION ATTACK 64
4.4 DEVISING A COLLUSION ATTACK RESISTANT WATERMARKING
SCHEME FOR IMAGES USING DCT 68
4.4.1 G, THE POLICY GENERATOR ALGORITHM 72 4.4.2 E, THE WATERMARK EMBEDDING ALGORITHM 72 4.4.3 D, THE WATERMARK DETECTION ALGORITHM 74 4.4.4 PERFORMANCE OF THE PROPOSED SCHEME 76
4.4.4.1 PERFORMANCE AGAINST JPEG COMPRESSION 76 4.4.4.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS 77 4.4.4.3 COMPARATIVE STUDY WITH OTHER MECHANISMS 77
4.5 CONCLUSION 79
CHAPTER-5
WATERMARKING of COLOR IMAGES 81
5.1 INTRODUCTION 81 5.2 PERFORMANCE ANALYSIS OF COLOR CHANNEL FOR DCT BASED
IMAGE WATERMARKING SCHEME 81
5.3 DEVISING AN ICAR WATERMARKING SCHEME FOR COLORED BMP
IMAGES 85
iv
5.3.1 G, THE POLICY GENERATOR ALGORITHM 86 5.3.2 COLOR CHANNEL SELECTION 87 5.3.3 E, THE WATERMARK EMBEDDING ALGORITHM 87 5.3.4 D, THE WATERMARK DETECTION ALGORITHM 88 5.3.5 PERFORMANCE OF THE PROPOSED SCHEME 90
5.3.5.1 PERFORMANCE AGAINST JPEG COMPRESSION 91 5.3.5.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS 92 5.3.5.3 COMPARATIVE STUDY RESULTS WITH OTHER SCHEMES 93
5.4 CONCLUSION 96
CHAPTER-6
WATERMARKING OF JPEG IMAGES 97
6.1 INTRODUCTION 97 6.2 DEVELOPMG AN ICAR WATERMARKING ALGORITHM FOR JPEG
IMAGES 97
6.2.1 G, THE POLICY GENERATOR ALGORITHM 99 6.2.1.1 COLOR CHANNEL SELECTION 100
6.2.2 E, THE WATERMARK EMBEDDING ALGORITHM 100 6.2.3 D, THE WATERMARK DETECTION ALGORITHM 102 6.2.4 PERFORMANCE OF THE PROPOSED SCHEME 104
6.2.4.1 COLOR CHANNEL SELECTION AND PERFORMANCE AGAINST
JPEG COMPRESSION 105
6.2.4.2 PERFORMANCE AGAINST IMAGE MANIPULATIONS 106 6.2.4.3 COMPARATIVE STUDY WITH SIMILAR, STATE-OF-THE-ART
SCHEMES
108 6.3 A DWT BASED WATERMARKING SCHEME FOR JPEG IMAGES 111
6.3.1 EXPLORATION OF DWT DOMAIN 112 6.3.1.1 ISSUES IN USING DWT 112
6.3.2 BACKGROUND OF THE PROPOSED SCHEME 114 6.3.3 DUAL WATERMARKING 115
v
6.3.4 THE DWT BASED WATERMARKING 115 6.3.4.1 P, THE POLICY 116 6.3.4.2 G, THE POLICY GENERATOR ALGORITHM 116 6.3.4.3 E, THE WATERMARK EMBEDDING ALGORITHM 118 6.3.4.4 D, THE WATERMARK DETECTION ALGORITHM 120
6.3.5 THE DCT BASED WATERMARKING 121 6.3.6 RESULTS 121
6.3.6.1 THE VALUE OF “T” 122 6.3.6.2 PERFORMANCE AGAINST JPEG COMPRESSION 126 6.3.6.3 PERFORMANCE AGAINST COMMON ATTACKS AND IMAGE
MANIPULATIONS 127
6.3.6.4 COMPARATIVE STUDY WITH DCT BASED SCHEMES 127 6.3.6.5 COMPARATIVE STUDY WITH DWT BASED SCHEMES 129
6.4 CONCLUSION 130
CHAPTER-7
RESULTS AND CONCLUSION 131
7.1 SUMMARY 131 7.2 MAIN CONTRIBUTIONS AND HIGHLIGHTS OF THE RESULTS 131 7.3 FUTURE WORK 132
REFERENCES 135
LIST OF AUTHOR’S PUBLICATION 147
SYNOPSIS
vi
vii
ABSTRACT
Watermarking has been invoked as a tool for the protection of Intellectual Property Rights
(IPR) of multimedia contents. Because of their digital nature, multimedia documents can be
duplicated, modified, transformed, and diffused very easily. In this context, it is important to
develop a system for copyright protection, protection against duplication, and authentication
of contents. For this, a watermark is embedded into the digital data in such a way that it is
indissolubly tied to the data itself. Later on, such watermark can be extracted to prove
ownership to trace the dissemination of the marked work through the network, or simply to
inform users about the identity of the rights-holder or about the allowed use of data.
This thesis deals the developing the watermarking schemes for digital images stored in both,
spatial and transformed domain. In this thesis we mainly focus on the Discrete Cosine
Transform (DCT) based development. To prove its commercial usability, we take special
care so that at least one attack, having huge financial implications, can be sustained due to
the in-built capacity of the watermarking scheme. Apart from this, since JPEG is the most
commonly used image format over WWW, we pay special attention to robustness against
JPEG compression attack.
Apart from developing watermarking schemes, we also discuss the selection of color channel
to be used to carry the watermark data based on the attack that may occur most commonly on
the watermarked images. We propose to increase the robustness against some attacks by pre-
processing the images. In this thesis, we also present a correlation between the performance
of the watermarking scheme against some attacks and the original image characteristics. All
presented watermarking schemes are robust against common image manipulations and
attacks.
viii
ix
ACKNOWLEDGEMENT
I am greatly indebted to my supervisor Prof. J. P. Gupta for his valuable technical guidance
and moral support through out this work. Without his support this thesis would have not been
completed.
I would also like to thank to Prof S.L Maskara, Prof Sanjay Goel and faculty members of the
department who always enlightened me by sharing their research experiences to accomplish
the quality work.
My mother provided me all support I needed to complete this thesis and other family
members specially my wife also helped me a lot in getting me this far.
Vikas Saxena
Department of Computer Science Engineering and Information Technology
Jaypee Institute of Information Technoogy University
Noida, India
x
xi
LIST OF ACCRONYMS CC Correlation Coefficient
CDMA Code Division Multiple Access
DCT Discrete Cosine Transform
DFT Discrete Fourier Transform
DWT Discrete Wavelet Transform
EBCOT Embedded Block Coding with Optimized Truncation
EZW Embedded Zero-tree Wavelet
FFT Fast Fourier Transform
HH High-High Band of DWT
HL High-Low Band of DWT
HVS Human Visual System
ICAR Inherently Collusion Attack Resistant
IPR Intellectual Property Right
JND Just Noticeable Distortion
JPEG Joint Photographic Expert Group
LH Low-High Band of DWT
LL Low-Low Band of DWT
LSB Least Significant Bit
MBCE Middle Band Coefficient Exchange
MSE Mean Square Error
PN Pseudo-random noise
PSNR Peak Signal to Noise ration
PSW Perceptually Shaped Watermarking
REL Run Length Encoding
RGB Red Green Blue
SPIHT Set Partitioning In Hierarchical Trees
SVD Singular Value Decomposition
VQ Vector Quantization
xii
xiii
LIST OF SYMBOLS
D Watermark detection algorithm
E Watermark embedding algorithm
FH High frequency region in an 8 x 8 DCT
FL Low frequency region in an 8 x 8 DCT
FM Middle frequency region in an 8 x 8 DCT
G Policy generator algorithm
K Watermark strength parameter
P Policy
Pi An instance of a policy
Q JPEG quantization factor
S Watermark logo converted into string of ‘0’s and ‘1’s
Sr A single bit of S
T Watermark strength parameter
W Watermark logo
Wi A single bit of the watermark data
X Original cover image
Xi An instance of the cover image
xiv
xv
LIST OF FIGURES
Figure No.
Caption Page No.
1.1 Watermark on the bank currency note 4
1.2 Various classifications of watermarking 12
1.3 Image watermark embedding scheme 13
1.4 Image watermark detection scheme 13
2.1 FIR Edge Enhancement Pre-Filter 20
2.2 A General Frequency domain based watermarking model as presented
by Cox
23
2.3 Frequency regions in 8 x 8 DCT 27
2.4 JPEG Quantization matrix 28
2.5 1-Scale and 2-Scale 2-Dimensional Discrete Wavelet Transform 30
2.6 The Targeted types of to be developed watermarking schemes 43
3.1 JPEG Compression Scheme 45
3.2 An example sub image 46
3.3 Example sub image after subtracting 128 from each pixel 47
3.4 DCT of sub image shown in Figure 3.3 47
3.5 JPEG Quantization matrix 49
3.6 DCT values after quantization 49
3.7 JPEG Decompression Scheme 51
3.8 DCT values regenerated in decompression 51
3.9 (a) Sub image pixel values (still shifted down by 128) 51
3.9 (b) Decompressed sub image pixel values 52
3.10 Error matrix for example sub image 52
3.11 Test images of Lena, Mandrill, Pepper and Barbara (Gray) 58
3.12 Test images of Lena, Mandrill, Pepper and Goldhill (Colored) 59
3.13 Watermark logo used in the proposed schemes
59
xvi
4.1 (a) Extracted watermark logos from test images of Lena, Mandrill and
Pepper by applying DCT based scheme
62
4.1 (b) Extracted watermark logos from test images of Lena, Mandrill and
Pepper by applying DWT based scheme
62
4.2 (a) Extracted watermark logos from test images of Lena, Mandrill,
Pepper and Barbara by applying DCT based scheme
66
4.2 (b) Extracted watermark logos from test images of Lena, Mandrill,
Pepper and Barbara by applying DWT based scheme
66
4.3 Extracted logos from “original image” (left) and “transformed image”
(right) of Lena, Mandrill, Pepper and Barbara’s (Top to Bottom)
histogram equalized images (By applying DCT based scheme)
68
4.4 Swapping of 4 pairs to hide “0” or “1” in conjunction with low
frequency values
71
4.5 Extracted watermark logos after JPEG compression at Q = 20 from
watermarked Lena, Mandrill and Pepper images
77
4.6 Extracted watermark logos from Lena’s image after Horizontal
flipped, scaled, brightness /contrast adjusted and Noising (Left to
Right, Top to bottom)
78
4.7 Percentage decrease in quality of extracted watermark with respect to
JPEG quality factor
79
5.1 Recovered watermarks for Lena.bmp after jpeg attack at Q = 40 82
5.2 Watermarked test images keeping T = 150 91
5.3 Extracted watermark from watermarked Lena, Mandrill and Pepper
images respectively at T = 150
91
5.4 Recovered logos from attacked images 94
5.5 Extracted logos using proposed scheme from highly compressed
watermarked test images
95
6.1 Watermarked test images generated by keeping T = 150 105
6.2 Extracted watermark logos from watermarked Lena, Mandrill, Pepper
and Goldhill test images respectively at T = 150
105
xvii
6.3 Goldhill test image after hiding the watermark logo and the recovered
logo at T = 100
105
6.4 Extracted logos from attacked watermarked images 109
6.5 Comparison of correlation coefficients at Q = 10 110
6.6 Comparison of correlation coefficients at Q = 5 111
6.7 2-D Haar DWT 113
6.8 An example of 2 consecutive DWT blocks 117
6.9 An example of 2 consecutive DWT blocks 117
6.10 Watermark embedding approach 120
6.11 The watermark logo 122
6.12 Graph of the values shown in Table 6.6 123
6.13 Extracted logos from Lena, Mandrill and Pepper’s test images 124
6.14 The extracted logos using DWT based method 125
6.15 The extracted logos using DCT based method 126
6.16 Extracted logos from highly compressed JPEG images 126
6.17 Extracted watermark logos after applying common attacks 128
xviii
xix
LIST OF TABLES
Table No.
Caption
Page No.
4.1 PSNR (in decibel) of extracted watermark logo from JPEG
compressed (Q = 20) watermarked image
65
4.2 PSNR of extracted logos from attacked test images 67
4.3 PSNR of extracted watermarks after JPEG compression 77
5.1 PSNR of Extracted watermark from JPEG compressed watermark test
images
82
5.2 PSNR of extracted watermark from attacked watermarked test images 84
5.3 PSNR of extracted watermark logos after JPEG compression 92
5.4 PSNR of extracted watermark logo from watermarked test images
after attacks
93
5.5 PSNR values of extracted logos from highly compressed watermarked
test images using various schemes
95
6.1 SD values of color channels for test images 106
6.2 PSNR and CC of extracted logo by using BLUE channel for all
images
107
6.3 PSNR and CC of extracted logo by using BLUE and GREEN
channels for images
108
6.4 CC of the extracted logos 108
6.5 PSNR of watermarked image and CC of extracted logo for various
values of T
122
6.6 Revised Table 6.5 122
6.7 CC of extracted logos from JPEG2000 attacked images 124
6.8 Decrement in the PSNR values after the application of DCT based
scheme
125
6.9 CC values of the extracted watermark logos recovered by both
recovery methods
125
xx
6.10 CC of extracted logo from highly compressed jpeg image using DCT
based recovery
126
6.11 CC of the extracted watermark logos 128
6.12 Comparison of CC of Extracted logos from JPEG compressed
(Q = 10) watermarked images
129
6.13 Comparison of CC of Extracted logos from JPEG compressed
(Q = 5) watermarked images
129
1
CHAPTER 1
INTRODUCTION
The growth of high speed computer networks and World Wide Web (WWW) have explored
means of new business, scientific, entertainment and social opportunities in the form of
electronic publishing and advertising, massaging, real-time information delivery, data
sharing, collaboration among computers, product ordering, transaction processing, digital
repositories and libraries, web newspapers and magazines, network video and audio, personal
communication and lots more. The cost effectiveness of selling softwares in the form of
digital images and video sequences by transmission over WWW is greatly enhanced due to
the improvement in technology.
We know that one of the biggest technological events of the last two decades was the
invasion of digital media in an entire range of everyday life aspects. Digital data can be
stored efficiently and with a very high quality, and it can be manipulated very easily using
computers. Furthermore, digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. Digital media offer several
distinct advantages over analog media. The quality of digital audio, images and video
signals are higher than that of their analog counterparts. Editing is easy because one can
access the exact discrete locations that need to be changed. Copying is simple with no loss
of fidelity. A copy of a digital media is identical to the original. With digital multimedia
distribution over World Wide Web, authentications are more threatened than ever due to the
possibility of unlimited copying. The easy transmission and manipulation of digital data
constitutes a real threat for information creators, and copyright owners want to be
compensated every time their work is used. Furthermore, they want to be sure that their
work is not used in an improper way (e. g. modified without their permission). For digital
data, copyright enforcement and content verification are very difficult tasks. One solution
would be to restrict access to the data using some encryption techniques. However,
2
encryption does not provide overall protection. Once the encrypted data are decrypted, they
can be freely distributed or manipulated.
Unauthorized use of data creates several problems. For example, if we visit http:\\www.
wallpaper.com, we observe that all the wallpaper images are created by the owners, which
are their Intellectual Property Right (IPR). Any user can download the wallpapers. Now,
consider that a user downloads the images and posts those images (either after modifying or
original) on his/her website. Three issues may arise in this situation:
1) How will the owner of wallpaper.com know that there is one more web server on
WWW posting their wallpapers?
2) If the owner knows about this fact, where shall he go to make a complaint?
3) The last but very important issue is that even if first two problems are resolved, how
the owner will prove the ownership on the wallpaper images posted on another
server?
The first issue is related to network technologies and involves issues like ‘web crawler’ and
‘pattern matching’ etc. Second issue is related to the international copyright laws and is
another very tricky issue. This thesis does not deal with these 2 issues. This thesis covers
the third issue, the authentication i.e. how to prove the ownership?
The above problem can be solved by hiding some ownership data into the multimedia data,
which can be extracted later to prove the ownership. This idea is implemented in bank
currency notes embedded with the watermark which is used to check the originality of the
note. The same “watermarking” concept may be used in multimedia digital contents for
checking the authenticity of the original content.
To begin with a quick background of watermarking, first we present the history of data
hiding and related terminologies. Then, we will move on to a discussion on the
3
watermarking, requirements that watermarking system must meet, types of the watermarking,
applications and then various attacks on a watermarking system.
1.1 DATA HIDING BACKGROUND The solution of the problem discussed above seems to lie in a technique that dates back to
ancient Egypt and Greece: data hiding or steganography. Steganography deals with the
methods of embedding data within a medium (host or cover medium) in an imperceptible
way. All forms of digital data (still images, audio, video, text documents and multimedia
documents) can be used as a cover medium for information hiding.
The history of steganography goes all the way back to the 5th Century. The earliest known
writings about steganography were by the Greek historian Herodotus. The historian relates
how a slave had a message tattooed on his head by Histiaeus who was trying to get a
message to his son-in-law Aristagoras. Once the slaves’ hair was long enough to cover the
message he was sent to Aristagoras in the city of Miletus [92].
Stegnography has been used in many different ways. The simplest was the use of invisible
inks that a person could use to send a message to another person without anyone else
knowing. Different forms of invisible ink were used to conceal messages. Some of the more
common forms of invisible ink have been lemon juice, milk, and urine to name a few. If
someone wanted to conceal a message, he would simply write a message, using one of these
inks, on a sheet of paper that already had something written on it. The person receiving the
message would then hold the paper over a flame and the transparent message would appear.
Image stegnography was done during the early twentieth century. During the Boer War in
South Africa, the British were using Lord Robert Baden-Powell as a scout. He was scouting
the Boer artillery bases mapping their positions. He took his maps and converted them into
pictures of butterflies with certain markings on the wings that were actually the enemies’
positions [92].
4
During World War II, Nazis introduced a new concept in espionage, which was called the
microdot. This simple device could conceal a full typewritten page within the size of a
common period. A microdot could hold valuable information such as charts, diagrams and
drawings.
Figure 1.1: Watermark on the bank currency note
Thus, stegnography is an area which is, more or less, a Hide-&-Seek game. Some important
data or information is hidden in another medium. The cover medium has no relationship
with the data or information hidden. Data or information which is hidden is not encrypted
also. The key issue in a stegnography system becomes that no one should suspect that a
particular medium is carrying any hidden data or information.
We can extend the stegnography concept for the authentication of digital multimedia data.
Digital multimedia data which has to be protected is now the cover medium and then we can
hide the copyright data into it. In this case, there will be two major requirements as follows:
1) Imperceptibility: After hiding the copyright data, cover medium should not be
affected, and
2) Robustness: No body should be able to remove the data without affecting the cover
medium.
Watermark symbol is added here to prove the originality
5
The copyright data may be termed as digital watermark data. This area of application of
stegnography is known as Digital Watermarking. Therefore, digital watermark is a
message/data/information which is embedded into digital content (audio, video, images or
text) that can be detected or extracted later. Such message/data/information mostly carries
the copyright or ownership information of the content. The process of embedding digital
watermark information into digital content is known digital watermarking.
Before moving further in this discussion, we must first understand the difference of the
digital watermarking with other related terms like stegnography, cryptography and digital
signature.
1.1.1 STEGANOGRAPHY VS WATERMARKING
Watermarking is the subset of Stegnography. In Stegnography, data which is hidden has no
relationship with the cover medium and the requirement from such a system is that no
suspicion should arise that a medium is carrying any hidden data. In watermarking, unlike
stegnography, the data which is hidden has relationship with the cover medium data. Data
hidden is the ownership data of the cover medium and there is no issue like suspecting that a
particular medium is carrying some copyright data.
As the purpose of stegnography is to have a covert communication between two parties i.e.
existence of the communication is unknown to a possible attacker, and a successful attack
shall detect the existence of this communication. On the contrary, watermarking, as opposed
to stegnography, requires a system to be robust against possible attacks. Other requirements
of watermarking are entirely different from stegnography and these are discussed in detail in
Section 1.3.
1.1.2 CRYPTOGRAPHY VS. WATERMARKING
Cryptography can be defined as the processing of information into an unintelligible form
known as encryption, for the purpose of secure transmission. Through the use of a “key”,
the receiver can decode the encrypted message (the process known as decryption) to retrieve
6
the original message. So, cryptography is about protecting the contents of the message. But
as soon as the data is decrypted, all the in-built security and data is ready to use.
Cryptography "scrambles" a message so that it can not be understood by unauthorized user.
This does not happen in watermarking. Neither the cover medium nor the copyright data
changes its meaning. Rather, copyright data is hidden to give the ownership information of
the medium in which it is hidden.
1.1.3 DIGITAL SIGNATURE VS. WATERMARKING
Digital signatures, like written signatures, are used to provide authentication of the associated
input, usually called a "message”. Digital signature is an electronic signature that can be used
to authenticate the identity of the sender of a message or the signer of a document, and
possibly to ensure that the original content of the message or document that has been sent is
unchanged. Digital signatures are easily transportable, cannot be imitated by someone else,
and can be automatically time-stamped. The ability to ensure that the original signed
message arrived means that the sender cannot easily repudiate it later. A digital signature can
be used with any kind of message, whether it is encrypted or not, simply so that the receiver
can be sure of the sender's identity and that the message arrived intact. A digital signature is
apart from the protected message, whereas a digital watermark is inside a multimedia
message. Both, digital signature and watermarking protect integrity and authenticity of a
document. Digital signature system is vulnerable to distortion but a watermark system has to
tolerate a limited distortion level.
So, to conclude, Watermarking is adding“ownership” information in multimedia contents to
prove the authenticity. This technology embeds a data, an unperceivable digital code,
namely the watermark, carrying information about the copyright status of the work to be
protected. Continuous efforts are being made to device efficient watermarking schema but
techniques proposed so far do not seem to be robust to all possible attacks and multimedia
data processing operations. The sudden increase in watermarking interest is most likely due
to the increase in concern over IPR. Today, digital data security covers such topics as access
control, authentication, and copyright protection for still images, audio, video, and
7
multimedia products. A pirate tries either to remove a watermark to violate a copyright or to
cast the same watermark, after altering the data, to forge the proof of authenticity. Generally,
the watermarking of still images, video, and audio demonstrate certain common fundamental
concepts.
1. 2 APPLICATION AREAS OF DIGITAL WATERMARKING Watermarking techniques may be relevant in the following application areas [26]:
1.2.1 COPYRIGHT PROTECTION
The primary use of watermarking is where an organization wishes to assert its ownership of
copyright for digital objects. This application is of great interest to ‘big media’
organizations, and of some interest to other vendors of digital information, such as news and
photo agencies. These applications require a minimal amount of information to be
embedded, coupled with a high degree of resistance to signal modification (since they may
be subjected to deliberate attack). For example, now a days, a news channel “AAJ-TAK” is
showing the animal’s clips (which are already shown on “Discovery” Channel) by hiding the
Discovery channel’s logo on the video clips. As per the law, The AAJ-TAK should show the
curtsey-sign and should pay the copyright fee to the Discovery channel. In such cases,
There is a strong need of watermarking as once the digital data is broadcasted, any body else
can start selling it without paying the IPR value to its owner.
1.2.2 COPY PROTECTION
Watermarking can be used as a strong tool to prevent illegal copying. For example, if an
audio CD has a watermark embedded into it, then any of the system (Hardware like DVD, or
software) can not make a copy of it, and even if it copies, the watermark data will not get
copied to new duplicate audio CD. Now the duplicate CD can be easily found because it
does not have watermark data. Some schemes have attempted to satisfy more complex copy
protection requirements. An early example is the Serial Copy Management System (SCMS),
introduced in the 1980s, which enabled a user to make a single digital audio tape of a
recording they had purchased but prevented the recording of further copies (i.e. second
8
generation) from that first copy. The scheme failed ultimately because not all manufacturers
of consumer equipment were prepared to implement the scheme in their products.
1.2.3 TEMPER DETECTION
In this application area, it is necessary to assure that the origin of a data object is
demonstrated and its integrity is proved. One example of temper detection is photographic
forensic information which may be presented as evidence in the court. Given the ease with
which digital images can be manipulated, there is a need to provide proof that an image has
not been altered. Such a mechanism could be built into a digital camera [29]. For example,
if a cop’s camera catches an over speeding vehicle then when proving the driver guilty in
front of the judge, the accused may claim that the video presented in the court is tempered
and the car shown in the video does not belong to him. A watermarking system which is
embedded in digital cameras may help to resolve the issue. If somebody tries to temper the
data, the watermark will get destroyed indicating that the data is tempered. In our country, a
well-known example is the “Tahalka-Scam”.
1.2.4 BROADCAST MONITORING
There are several types of organizations and individuals interested in monitoring the
broadcast of their interest. For example, advertisers want to ensure that they receive the exact
airtime that they have purchased from broadcasting firms. Musicians and actors want to
ensure that they receive accurate royalty payments for broadcasts of their performances and
copyright owners want to ensure that their property is not illegally rebroadcast by pirate
stations. In 1997, a scandal broke out in Japan regarding television advertising. At least two
stations had been routinely overbooking air time. Advertisers were paying for thousands of
commercials that were never aired [16]. The practice had remained largely undetected for
over twenty years because there were no systems in place to monitor the actual broadcast of
advertisements.
9
This broadcast monitoring can be implemented by putting a unique watermark in each video
or sound clip prior to broadcast. Automated monitoring stations can then receive broadcasts
and look for these watermarks identifying when and where each clip appears.
1.2.5 FINGERPRINTING
If monitoring and owner identification applications place the same watermark in all copies of
the same content, it may create a problem. If out of n number of legal buyers of a content,
one starts selling the contents illegally, it may be very difficult to catch who is redistributing
the contents without permission. Allowing each copy distributed to be customized for each
legal recipient can solve this problem. This capability allows a unique watermark to be
embedded in each individual copy. Now, if the owner finds an illegal copy, he can find out
who is selling his contents by finding the watermark which belongs to only singly legal
buyer. This particular application area is known as fingerprinting. This is potentially
valuable both as a deterrent to illegal use and as a technological aid to investigation.
1.2.6 ANNOTATION APPLICATIONS
In this applications area, watermarks convey object-specific information (“feature tags” or
“captions”) to users of the object. For example, patient identification data can be embedded
into medical images. These applications require relatively large quantities of embedded data.
While there is no need to protect against deliberate tampering. Normal use of the data object
may involve such transformations as image cropping or scaling and will require the use of a
technique that is resistant to those types of modification.
For more details of various watermarking applications, one may refer [20].
10
1. 3 CHARACTERISTICS OF WATERMARKING SCHEMES An effective watermarking scheme should have the following characteristics:
1) Imperceptibility: In terms of watermarking, imperceptibility means that after inserting
the watermark data, cover medium should not alter much. In other words, the
presence of the watermark data should not affect the cover medium being protected.
If a watermarking scheme does not ensure this requirement, it may happen that after
inserting a watermark data in a cover medium (say an image), image quality may alter
which the owner of the image will never like that a protecting mechanism modifies
his work.
2) Robustness: Robustness of the watermark data means that the watermark data should
not be destroyed if someone performs the common manipulations as well as
malicious attacks. It is more of a property and also a requirement of watermarking
and its applicability depends on the application area.
3) Fragility: Fragility means that the watermark data is altered or disturbed up to a
certain extent when someone performs the common manipulations & malicious
attacks. Some application areas like temper detection may require a fragile
watermark to know that some tempering is done with his work. Some application
may require semi-fragility too. The semi-fragile watermark comprises a fragile
watermark component and a robust watermark component i.e. semi-fragile
watermarks are robust to some attacks but fragile to others attacks.
4) Resilient to common signal processing: The watermark should be retrievable even if
common signal processing operations are applied to the watermarked cover medium
data. These operations include digital-to-analog and analog-to-digital conversion (i.e.
taking the printout of an image and then scan it to create another digital copy of the
image), re-sampling, re-quantization (including dithering and recompression), and
common signal enhancements such as image contrast, brightness and color
adjustment, or audio bass and treble adjustment, high pass and low pass filtering,
histogram equalization of an image and format conversion (BMP image to JPEG
image, MPEG movie to WMV movie, mp3 song to mp4 etc.)
11
5) Resilient to common geometric distortions (image and video data): Watermarks in
image and video data should also be immune from geometric image operations such
as rotation, translation, cropping and scaling. This property is not required for audio
watermarking.
6) Robust to subterfuge attacks (collusion and forgery): In addition, the watermark
should be robust to collusion attack. Multiple individuals, who possess a watermarked
copy of the data, may collude their watermark copies to destroy the watermark
presence and can generate a duplicate of the original copy. Further, if a digital
watermark is to be used in litigation, it must be impossible for colluders to combine
their images to generate a different valid watermark.
7) Unambiguousness: Retrieval of the watermark should unambiguously identify the
owner. Furthermore, the accuracy of owner identification should not degrade much
in the case of an attack. The Unzign and Stirmark [97] have shown remarkable
success in removing data embedded by commercially available programs.
Watermarking of watermarked image (re-watermarking) is also a major threat [97].
1.4 TYPES OF DIGITAL WATERMARKS Prof. S. Mohanty presents a very good classification of watermarking areas in his paper [62].
We can classify the types of watermarking based on the cover medium, embedding domain,
perception and application domain. Figure 1.2 shows the various classifications of
watermarking.
Based on their embedding domain, watermarking schemes can be classified as follows:
1) Spatial Domain: The watermarking system directly alters the main data elements (like
pixels in an image) to hide the watermark data.
2) Transformed Domain: The watermarking system alters the frequency transforms of
data elements to hide the watermark data. This has proved to be more robust than the
spatial domain watermarking.
12
3) Feature Domain: The watermarking system takes into account the region, boundary
and object characteristics. It presents better detection and recovery from attacks.
Figure 1.2: Various classifications of watermarking
Watermarking techniques can also be divided into four categories, according to the type of
document to be watermarked, as follows.
1) Image Watermarking: Figure 1.3 and 1.4 represent the general scheme of an image
watermarking, embedding and decoding (specifically key based, invisible and fragile)
13
system respectively. ‘E’ represents the watermarking embedding algorithm and ‘D’
represents the watermarking decoding algorithm.
2) Other types of watermarking, according to the type of document to be watermarked
are Video Watermarking, Audio Watermarking and Text Watermarking.
Figure 1.3: Image watermark embedding scheme
Figure 1.4: Image watermark detection scheme
According to the human perception, the digital watermarks can be divided into 4 different
types: Visible watermark, Invisible-Robust watermark, Invisible-Fragile watermark, and dual
watermark. Visible watermark is a secondary translucent overlaid into the primary image.
The watermark appears visible to a casual viewer on a careful inspection. The invisible-
robust watermark is embedded in such a way that alternations made to the pixel value are
perceptually not noticed and it can be recovered only with appropriate decoding mechanism.
The fragile watermark is embedded in such a way that any manipulation or modification of
the image would alter or destroy the watermark. Dual watermark is a combination of a
visible and an invisible watermark [8].
14
According to application domain, Source-based watermarks are desirable for ownership
identification or authentication where a unique watermark identifies the owner. A source-
based watermark could be used for authentication and to determine whether a received image
or other electronic data has been tampered. The watermark could also be destination based
where each distributed copy gets a unique watermark identifying the particular buyer. The
destination based watermark could be used to trace the buyer in the case of illegal reselling.
This is used in fingerprinting. A watermark is said private if only authorized readers can
detect it. In other words, in private watermarking, a mechanism is envisaged that makes it
impossible for unauthorized people to extract the watermark. A watermarking algorithm is
said blind if it does not resort to the comparison between the original non-marked and the
marked document to recover the watermark. Conversely, a watermarking algorithm is said
non-blind if it needs the original data to extract the information contained in the watermark.
The definition of invertible and quasi-invertible is more technical and can be given as
follows [2]:
If E is the Embedding algorithm, D is detection algorithm, Cδ is Comparator function, I is
original cover image, Î is watermarked image, J is recovered attacked image, S is watermark
signal and S’ is extracted watermark data, then:
1) E (I, S) = Î
2) D (J, I) = S’ or D (J) = S’
3) Comparator Cδ:
A watermarking scheme (E, D, Cδ) is invertible if:
1) Inverse mapping E-1 does exist such that E-1 (Î) = (Î’, S’) &E (Î’, S’) = Î;
2) E-1 is computational feasible;
15
3) S’ is an allowed watermark;
4) Î and Î’ are perceptually similar; and
5) Comparator output Cδ (D (Î, Î’), S’) = 1
Otherwise the watermarking scheme is non-invertible.
A watermarking scheme (E, D, Cδ) is quasi-invertible if:
1) Properties for invertible watermarking schemes apply;
2) Only difference E (Î’, S’) = Î’’ ≠ Î; and
3) Î’’ and Î perceptually similar.
Otherwise the watermarking scheme is non-quasi-invertible. A Non-invertible scheme can
be quasi-invertible and Non-quasi-invertibility implies non-invertibility.
1.5 STRUCTURE OF THE THESIS This thesis comprises of the following chapters:
Chapter 2 describes the image watermarking literature survey and problem statement.
Chapter 3 describes the preliminaries (like background of JPEG compression, 2D–DCT and
DWT, image quality parameter, some standard watermarking techniques which are used to
compare the performances of the proposed techniques etc and test images data). The
watermarking techniques for gray images have been proposed in Chapter 4. Chapter 5
describes the proposed watermarking techniques and issues related to colored BMP images.
In Chapter 6, the proposed watermarking techniques for JPEG images have been given.
Finally the summary of results, conclusions and future work is given in Chapter 7 followed
by references, author’s publications and synopsis at the end.
16
17
CHAPTER-2
IMAGE WATERMARKING LITERATURE SURVEY
Within the field of watermarking, image watermarking particularly has attracted lot of
attention in the research community. Most of the research work is dedicated to image
watermarking as compared to audio and video. There may be 3 reasons for it. Firstly,
because of ready availability of the test images, secondly because it carries enough
redundant information to provide an opportunity to embed watermarks easily, and lastly,
it may be assumed that any successful image watermarking algorithm may be upgraded
for the video also.
Images are represented/stored in spatial domain as well as in transform domain. The
transform domain image is represented in terms of its frequencies; whereas, in spatial
domain it is represented by pixels. In simple terms, transform domain means the image is
segmented into multiple frequency bands. To transfer an image to its frequency
representation, we can use several reversible transforms like Discrete Cosine Transform
(DCT), Discrete Wavelet Transform (DWT), or Discrete Fourier Transform (DFT). Each
of these transforms has its own characteristics and represents the image in different ways.
Watermarks can be embedded within images by modifying these values, i.e. the
transform domain coefficients. In case of spatial domain, simple watermarks could be
embedded in the images by modifying the pixel values or the Least Significant Bit (LSB)
values. However, more robust watermarks could be embedded in the transform domain of
images by modifying the transform domain coefficients. In 1997 Cox et al. presented a
paper “Secure Spread Spectrum Watermarking for Multimedia” [19], one of the most
cited paper (cited 2985 times till April’ 2008 as per Google Scholar search), and after that
most of the research work is based on this work. Even though spatial domain based
techniques can not sustain most of the common attacks like compression, high pass or
RED 4.58561 6.09133 13.5342 17.9727 4.18767 6.06572 10.7443 15.4762
GREEN 7.3024 14.3188 18.4186 20.1702 4.88113 10.393 13.274 16.1883
BLUE 4.00899 4.72608 11.0469 17.8341 3.78916 4.38603 7.24002 13.9242
--------- (5.1)
83
Where Y' is the luminance component and Cb and Cr are the blue and red chrominance
components. Y'CbCr is not an absolute color space. It is a way of encoding RGB
information and the actual color displayed depends on the actual RGB colorants used to
display the signal. It is clear from Equations 5.1 that G is multiplied by relatively larger
coefficient and thus green channel should carry the watermark data for the better
recovery if images are JPEG compressed after the watermarking using the MBCE
scheme.
Now to further validate the concept of ‘preprocessing’ introduced in previous chapter,
color channels of all test images were histogram equalized one at a time, i.e., Lena image
had now 3 copies where in one copy only red channel is equalized, in another copy only
green channel is equalized and in the third copy only blue channel is equalized leading to
12 test images to be watermarked. The watermark logo was embedded in the histogram
equalized color channel for all 12 test images. We performed the following attacks on the
watermarked images:
1) JPEG Attack (low JPEG compression with Q = 20);
2) Noise Attack (adding 10% Gaussian noise in the watermarked images); and
3) Histogram Equalization (equalizing the histogram of the watermarked images).
The watermark logos were recovered from the attacked images and their PSNR values
were calculated. Table 5.2 summarizes the PSNR values of watermark logos recovered. It
may be observed from Table 5.2 that for all cases if a color channel of the image was
HISTOGRAM EQUALIZED before embedding the watermark, recovery of watermark is
better i.e. PSNR values are higher. Therefore, our proposed idea of ‘preprocessing’
worked well for colored BMP images also. It may be further observed that the difference
in the PSNR values of recovered logos from original image and equalized image are high
in the case of “histogram equalization” attack because our preprocessing step is itself the
histogram equalization. These results further prove that a modification in the image such
that the effect after the attack on the watermarked image could be minimized, increases
the robustness against that attack for colored images watermarking algorithm.
84
It is, therefore, concluded that to decide the color channel to carry the watermark data, we
will have to analyze the characteristics of attack itself. If there is high probability that
watermark image may undergo JPEG compression, we should select the GREEN channel
because while converting to JPEG format, green channel’s data has higher impact as
compared to other color channel’s data.
Table 5.2: PSNR of extracted watermark from attacked watermarked test images
LENA.BMP PEPPER.BMP
Color
Channel
Attack
Jpeg
Q20
His
togr
am
Equ
aliz
ati
on
Noi
se
(12.
5%)
Jpeg
Q20
His
togr
am
Equ
aliz
ati
on
Noi
se
(12.
5%)
Original 3.85853 15.5867 4.9277 3.89485 17.4944 6.87319
RED Equalized 4.7334 15.6074 5.13784 4.706 19.4657 7.05068
Original 6.2285 15.7285 5.25512 4.50915 14.7932 6.72312
GREEN Equalized 6.8358 18.7032 5.37656 6.9542 16.9559 7.69791
Original 3.78205 16.8769 4.96932 3.70676 15.503 6.7605
BLUE Equalized 4.1447 23.0387 5.41004 4.1985 18.6343 8.12838
MANDRILL.BMP MONARCH.BMP
Color
Channel
Attack
Jpeg
Q20
His
togr
am
Equ
aliz
ati
on
Noi
se
(12.
5%)
Jpeg
Q20
His
togr
am
Equ
aliz
ati
on
Noi
se
(12.
5%)
Original 4.58561 17.1942 8.9886 4.18767 16.9726 7.712
RED Equalized 5.2266 16.7228 9.36638 4.7169 18.1131 7.86498
Original 7.3024 17.4885 9.2963 4.88113 16.3554 7.65961
GREEN Equalized 11.1118 21.6698 9.81065 6.9542 21.0406 8.14772
Original 4.00899 16.7143 8.75787 3.78916 14.483 7.48674
BLUE Equalized 4.3586 18.3073 8.86063 4.3045 20.213 8.39899
85
It is also clear from Table 5.2 that for attacks other than JPEG Compression, performance
of color channels for all images had no fixed pattern which means that robustness may
depend upon the attack characteristics as well as “image characteristics” also.
Therefore, the goal for the further development was not only to develop an ICAR
watermarking scheme but also to find out some relationship between the performances of
our proposed schemes with the “image characteristics” itself.
5.3 DEVISING AN ICAR WATERMARKING SCHEME FOR COLORED BMP IMAGES
In the previous chapter, we have proposed an ICAR scheme for watermarking gray level
image. Results indicated that this scheme was not only an ICAR scheme but also very
robust to JPEG compression attack and other common image manipulations. Therefore,
we decided to extend the same approach for colored BMP images also. In the earlier
proposed ICAR scheme, we have introduced redundancy in swapping and made the
swapping criterion dependent on low frequency coefficient. To further improve the
robustness, we propose a new swapping criterion with the assurance that no two
watermarked copies of an image have same policy of watermarking. An attacker may
attack on large number of middle band coefficients but if image has to remain
perceptually unchanged, the average value (Av) of all middle band coefficients (total 22
in numbers) will not modify to a great extent. So, unlike the previous scheme where we
swapped 4 pairs, we swapped 4 middle band coefficients (not pair) with the “Av” value.
Details of this swapping mechanism are described in Section 5.3.3.
The proposed watermarking scheme can be defined as a 7-tuple (X, W, P, T, G, E, D)
where:
1) X denotes the set of instances Xi of a particular gray level image, (If N copies of
an image are to be watermarked, then 0 ≤ i ≤ N);
2) W denotes the monochrome watermark logo;
3) P denotes the set of policies Pi, 0 ≤ i ≤ N;
86
4) “T” is the “watermark strength parameter”;
5) G denotes the policy generator algorithm G: Xi Pi, where each Xi will have a
unique Pi, i.e. a different policy to hide the watermark data.
6) E denotes the watermark embedding algorithm, E: Xi x W x Pi Xi’;
7) D denotes the watermark detection algorithm, D: Xi’ x Pi W’, where W’
represents extracted watermark.
The parameter “T” is analogous to “K” of classical MBCE scheme. In classical MBCE
scheme, relative strength of 2 coefficient’s value of FM region decides the decoding of
“1” or “0”. If the relative strength of 2 values has to decide the decoding of “0” or “1”,
then larger value should remain larger even after image manipulations. So, we adjust
these values in such a way that the difference between the 2 values becomes larger than a
certain threshold value. We name this threshold value as “Watermark Strength
Parameter” because this value decides the robustness of watermark data. Certainly, it has
an impact on the image perceptibly. So, we have to decide this threshold value in such a
way that our image does not loose its quality much.
Out of these 7 tuples, last 3 tuples are algorithms which are discussed below:
5.3.1 G, THE POLICY GENERATOR ALGORITHM
Similar to our earlier proposed ICAR watermarking scheme for the gray image
watermarking, we had to watermark each copy Xi of an image X differently. Therefore,
we need a different watermarking policy for each copy of the image to be watermarked.
Here “Policy” means that for every copy of the image, there will be unique combination
of 4 middle band coefficients. To generate a policy, we simply take 8 x 8 DCT of the
input image Xi and randomly select 4 coefficients out of 22 middle band coefficient of
FM region from any of the red, green or blue color channel. So, numbers of policies that
can be generated are 22C 4 = 7315 which means that 7315 copies of a single image can be
watermarked such that no two watermarked images have same policy. This step ensures
that attacker can not conclude the location of watermark data by colluding many
87
watermarked copies of an image. This also depicts that our proposed scheme is an ICAR
scheme.
5.3.2 COLOR CHANNEL SELECTION
Up to the development of this approach, we used only “BLUE” color channel to hide the
watermark data. Bossen et al. [9] have stated that the watermarks should be embedded
mainly in the BLUE color channel of an image. The human eye is least sensitive to
change in BLUE channel. However, the suitability of color channel to hide the watermark
data is dependent on the image itself and therefore, we have discussed some interesting
results related to this issue in the Chapter 6. In this section, we are using BLUE channel
to hide the watermark data.
5.3.3 E, THE WATERMARK EMBEDDING ALGORITHM
In this algorithm, each 8x8 DCT block of an image is used to hide a single bit of
watermark logo. Our embedding algorithm is based on averaging the coefficients of FM
region. We can fight against collusion attack by swapping more than one pair but if
attacker is ready to loose some quality, he/she can disturb all the coefficients in FM
region. Therefore, even if we introduce redundancy with randomness, our watermark data
may still be attacked. So, we propose that an attacker cannot alter the image such that the
“average” of coefficients of FM region changes much. Accordingly, we are hiding “1” or
“0” by using relative value of a coefficients and the average “Av” of coefficients of FM
region. This algorithm is given as below:
1. Repeat steps 2 to 11 for i = 1…..n;
// where ‘n’ is the number of copies of a single image to be watermarked //
2. INPUT (Xi);
3. Take 8x8 block DCT of Xi;
4. INPUT (W);
5. Convert W into a string S = (Sj | Sj = {0,1}, for j = 1…..length of the watermark);
88
6. Let L = STRING_LENGTH (S); // L is the length of watermark data. If L = 1000, then first 1000 DCT block of Xi are used //
7. Pi = CALL (G); // Each generated Pi shall be stored in an author’s database for the detection purpose in future.
Let the Pi for chosen Xi be, Pi = {(5,1), (4,2), (6,3) and (5,4)} in BLUE channel //
8. Calculate the average “Av” of remaining 18 middle band coefficients.
9. Repeat steps 10 to11 for r = 1…..L;
10. Read Sr;
// Now like classical MBCE scheme, relative strength of average “Av” and chosen 4 coefficients
in step 7 will interpret “0” or “1” of watermark data. To hide “0”, for all 4 chosen coefficients
in step 7, we assigned the value of coefficients which is ‘T’ less than the average “Av”. To hide
“1”, for all 4 chosen coefficients in step 7, we assigned the value of coefficients which is ‘T’
greater than the average “Av” //
If (Sr = 0)
DCT (5, 1) = Av - T;
DCT (4, 2) = Av - T;
DCT (5, 4) = Av - T;
DCT (6, 3) = Av - T;
Else
DCT (5, 1) = Av + T;
DCT (4, 2) = Av + T;
DCT (5, 4) = Av + T;
DCT (6, 3) = Av + T;
End;
11. Take IDCT to reconstruct Xi;
12. End.
5.3.4 D, THE WATERMARK DETECTION ALGORITHM Watermark extraction is the reverse procedure of watermark embedding. To extract the
watermark from the watermarked image, we calculated the average “Av” in the same way
as in embedding algorithm. Owner should have a record of all policies used to watermark
89
the image. Based on “policies”, owner of the image can recover watermark using
following rules:
1) If at least 1 out of 4 chosen coefficients are less than average, Interpret “0”; and
2) If at least 1 out of 4 chosen coefficients are greater than average, interpret “1”.
The detection algorithm steps are as follows:
1. INPUT (Xi’); // Xi’ is the attacked copy of a watermarked image //
2. Take 8x8 block DCT of Xi’ and calculate Av;
3. For all Pi in author’s database, repeat the steps 4; // If initially 10 copies were watermarked, then out of 10 policies, for 1 policy, watermark will be
recovered correctly. To explain further steps, we are assuming that now algorithm is in a loop
where Pi is {(5,1) (4,2) (5,4) and ( 6,3)}, which was used to watermarked this particular Xi’ //
4. Repeat the steps 5 for j = 1….L; // L is the length of watermark data. A single bit will be recovered form one 8x8 DCT block//
5. Take jth DCT block to form jth bit of watermark as follows:
If (DCT (5, 1) <= Av)
T1 = 1;
Else T1 = 0;
If (DCT (4, 2) <= Av)
T2 = 1;
Else T2 = 0;
If (DCT (5, 4) <= Av)
T3 = 1;
Else T3 = 0;
If (DCT (6, 3) <= Av)
T4 = 1;
Else T4 = 0;
If ( T1 + T2 + T3 + T4 >= 1)
90
Decode “0”
If (DCT (5, 1) > Av)
P1 = 1;
Else P1 = 0;
If (DCT (4, 2) > Av)
P2 = 1;
Else P2 = 0;
If (DCT (5, 4) > Av)
P3 = 1;
Else P3 = 0;
If (DCT (6, 3) > Av)
P4 = 1;
Else P4 = 0;
If ( P1 + P2 + P3 + P4 >= 1)
Decode “1”
End;
6. Store W’, the recovered watermark;
7. End.
It may be observed from both the algorithms that even if attacker alters the values of the
coefficient of FM region, if “Av” is not changed much, then we can recover the
watermark data correctly and attacker cannot aim to attack the image in such a manner
which modifies “Av”.
5.3.5 PERFORMANCE OF THE PROPOSED SCHEME
Our proposed scheme does not need any testing to check whether or not it is robust
against the collusion attack, as it is designed in such a way that the attacker can not
analyze the pattern by colluding many watermarked copies. We needed to check the
performance of the proposed scheme against the JPEG compression and other common
image manipulations and known attacks. For this, we tested our scheme on 3 test images
91
Lena, Mandrill and Pepper of size 512 x 512 in Windows 24 bit BMP format, shown in
Figure 3.12.
Firstly, we chose an appropriate value of “T” which affects least the image quality as well
as optimizes the recovery of watermark data. Our experiments suggested that if we were
hiding the watermark using T = 150, there was approximately no loss in the perceptual
quality of the images and recovered watermark logos were of very fine quality.
Figure 5.2 shows the watermarked test images after hiding watermark logo by keeping
T = 150. It may be seen that, images are not disturbed at all. Figure 5.3 shows the
extracted watermark logos from these watermarked copies of Lena, Mandrill and Pepper
without performing any attack or manipulations on the watermarked images. This fixed
up the value of T = 150 for further tests.
Figure 5.2: Watermarked test images keeping T = 150
Figure 5.3: Extracted watermark from watermarked Lena, Mandrill and Pepper images respectively at
T = 150
5.3.5.1 PERFORMANCE AGAINST JPEG COMPRESSION: We applied JPEG
compression on watermarked images (generated by keeping T = 150) at different JPEG
quality parameters Q and then recovered the watermark logos. Table 5.3 summarizes the
92
PSNR of extracted watermark logos. It may be observed from Table 5.3 that even at
Q = 20, quality of extracted watermark is very fine and logos are quite detectible.
5.3.5.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS: We
performed the following attacks on the watermarked test images:
Attack-1: Equalize the Histogram;
Attack-2: Apply uniform scaling (Zoom);
Attack-3: Adjust the brightness to +40 and contrast to +25;
Attack-4: Adjust the hue and saturation to +10 each;
Attack-5: Add 10 % Gaussian noise; and
Attack-6: Blur the image using Gaussian blur with 1 pixel radius.
Table 5.3: PSNR of extracted watermark logos after JPEG compression
PSNR (DB)
Quality
factor
Lena
Watermarked
with T = 150
Mandrill
Watermarked
with T = 150
Pepper
Watermarked
with T = 150
Q = 80 39.9987 37.0185 39.9987
Q = 60 39.9987 34.98135 39.9987
Q = 40 24.57225 14.51025 25.20285
Q = 20 21.92385 12.26715 21.3678
Then, we recovered the watermark logos from attacked images and calculated the PSNR
value of watermark logos. Table 5.4 summarizes the PSNR values of extracted logos
recovered from all test images. Our proposed scheme sustained all the attacks and the
quality of the extracted watermark logos is quite good. Figure 5.4 shows the recovered
logos from attacked images.
93
Table 5.4: PSNR of extracted watermark logo from watermarked test images after attacks
5.3.5.3 COMPARATIVE STUDY RESULTS WITH OTHER SCHEMES: We
compared our scheme against JPEG compression with other similar and state-of-the-art
methodologies which are well known for their robustness against JPEG compressions.
The chosen schemes are as follows:
Scheme-A: Correlation based Schemes with 2 PN sequence (Section 2.1.3.2)
Scheme-B: Classical MBCE Scheme (Section 2.2.2.1)
Scheme-C: Scheme proposed in Section 4.4 is also based on Middle Band Coefficient
Exchange (MBCE) scheme and ICAR in nature. So, we decided to compare the
performance of our scheme with this scheme also. This scheme swaps 4 pairs of
coefficients in FM region in correlation with low band coefficients. We are naming this
scheme as Scheme-C.
Then, we re-implemented the chosen schemes for the colored images and hid the
watermark data in BLUE channel.
Scheme-D: We are naming our proposed scheme as Scheme-D.
It is observed that all the above schemes are robust against JPEG compression attack but
if we compress the watermark images by very low quality factors (less then Q = 20), our
proposed scheme outperforms the other schemes. We compressed the watermarked test
PSNR (DB)
His
togr
am
Equa
lizat
ion
Zoom
Brig
htne
ss-
Con
trast
A
djus
tmen
t
Hue
-Sa
tura
tion
Gau
ssia
n N
oise
Gau
ssia
n B
lur
Lena 34.67 34.67 34.67 34.67 34.67 34.67
Mandrill 28.06 28.04 28.04 28.04 28.04 28.04
Pepper 32.25 32.07 30.78 32.48 31.78 31.10
94
images by keeping JPEG quality factor Q = 15, 10, and 5. No scheme, other than the
proposed one, was able to extract the detectible watermark logos.
Figure 5.4: Recovered logos from attacked images
Table 5.5 summarizes the PSNR values of extracted logos from highly compressed
watermark test images using various schemes. Figure 5.5 shows the recovered watermark
logos from highly compressed watermarked images using our proposed scheme. It may
be observed that recovered logos are quite detectible and proposed scheme is more
efficient than the other chosen schemes.
95
Table 5.5: PSNR values of extracted logos from highly compressed watermarked test images using various schemes
PSNR (DB)
Schemes
JPEG
Quality
Factors Lena Mandrill Pepper
Q = 15 8.723 7.89 8.12
Q = 10 7.67 7.12 7.988 Scheme-A
Q = 05 4.5 4.324 4.657
Q = 15 4.222 4.587 3.987
Q = 10 3.45 3.87 3.95 Scheme-B
Q = 05 2.32 2.2 1.97
Q = 15 4.323 4.565 4.33
Q = 10 4.11 4.249 4.12 Scheme-C
Q = 05 2.234 2.229 2.1
Q = 15 16.305 10.845 13.335
Q = 10 15.585 10.62 12.885 Scheme-D
Q = 05 14.13 10.29 11.4
Test Images /
JPEG Q Factor
Lena Mandrill Pepper
Q = 15
Q = 10
Q = 05
Figure 5.5: Extracted logos using proposed scheme from highly compressed watermarked test images
96
Results indicate that proposed scheme recovers the watermark even from an attacked
image which is compressed up to Q = 5 quality factor of JPEG (i.e. after 95 - 99% size
reduction).
This proves that the proposed scheme is not only an ICAR scheme but also very robust to
JPEG compression. In addition to this, the proposed scheme is resisting common image
manipulations like cropping, scaling, flipping, histogram equalization, brightness-
contrast adjustment, Hue-saturation alteration, Gaussian noise and Gaussian blur.
5.4 CONCLUSION
In this chapter, we have discussed the watermarking of the colored images. Since a
colored image has R, G and B color channel, firstly we presented a study to find the
suitability of a color channel to carry the watermark data with respect to the robustness
against an attack. It was found that if an image has to undergo JPEG compression attack,
then the watermark data should be hidden in GREEN color channel to ensure the best
recovery of the watermark logo. Then, we presented an ICAR watermarking scheme
based on the “average” of the FM coefficients. Results indicted that the proposed scheme
is very robust against JPEG compression and common image manipulations and better
then other similar state-of-the-art schemes.
97
CHAPTER-6
WATERMARKING OF JPEG IMAGES
6.1 INTRODUCTION
In the Chapter 4, we have discussed that we can improve the robustness of DCT and
DWT based watermarking schemes against some well known attacks by preprocessing
the images. Since, “Fingerprinting” is the most crucial demand of today, we developed an
ICAR scheme for the watermarking of gray level images also. We further expanded our
scope for the colored images watermarking in Chapter 5 and developed an ICAR scheme
for watermarking of 24-bit colored BMP images. Since, most of the images present on
World Wide Web are in JPEG format, which is a highly compressed image format and
store the images in the transformed domain, i.e. store the frequencies not the pixels
values, we decided to develop an ICAR watermarking scheme for JPEG images. We also
explored a relationship between the robustness and some of the image characteristics.
6.2 DEVELOPMG AN ICAR WATERMARKING ALGORITHM FOR JPEG IMAGES
Most of the images present on WWW are in the Joint Photographic Experts Group
(JPEG) format where as relatively less work is found for watermarking the JPEG images.
Therefore, we decided to extend our earlier proposed ICAR schemes for the
watermarking of JPEG images also. In our earlier proposed ICAR schemes, we inserted
the ICAR nature in by introducing redundancy in the coefficients swapping of FM region.
We also made the swapping criteria dependent on some very robust data elements (in the
scheme presented in Section 4.4, it was the relative value of low frequency coefficient
and in the scheme presented in 5.3, it was the average value of all middle band
coefficients) so that decoding algorithm may perform a good recovery of the watermark
data. But as it may be observed that we deployed the coefficients of FM region which
were generated by taking the 8 x 8 DCT of pixels values. So, to continue the same
98
approach for the JPEG images, we needed to use coefficients belonging to FM region.
More pricelessly, JPEG image format does not store the pixel’s actual value but it stores
the image in frequency domain. So, we need to convert the JPEG image into spatial
domain and then take 8x8 block DCT on its color channels to get the FM region.
To inject the ICAR nature, we need to introduce redundancy in coefficient swapping.
Since JPEG is a very high compressed format, we know that as soon as we convert this
spatial domain image into JPEG format, lots of its coefficients will be changed. This
would create problem in recovering the watermark data by only considering the relative
strengths of coefficients of FM region. We must, therefore, provide extra robustness by
involving some coefficients whose value does not change much during the conversion of
spatial domain to frequency domain and vise versa. To resolve this issue, we decided to
take the advantage of JPEG compression-decompression scheme itself. In an 8x8 DCT
block, large value of the top-left corner is called the DC coefficient. The remaining 63
coefficients are called the AC coefficients. This DC coefficient is the major dominating
value while decompressing. This DC value alone can regenerate the best approximated
image by taking the IDCT. If this value is altered, then image is largely affected. So we
decided to take the contribution of this DC coefficient apart from coefficients from FM
region to interpret the watermark data to make our scheme robust. We have seen that in
our earlier scheme, we developed a swapping criteria based on the average of all 22
coefficients of FM region by claiming that it was difficult for any attacker or for any
image manipulation to alter this value significantly if the image has to remain
perceptually similar. Therefore, for our newly proposed watermarking scheme for JPEG
images, we interpreted the watermark data in FM region based on the average of 22
coefficients from FM region and the DC coefficient. More details of the watermark
embedding algorithms are described in Section 6.2.3. To ensure ICAR property, liker our
earlier proposed schemes, we watermarked each copy of a single JPEG image with a
different policy.
The proposed watermarking scheme can be defined as a 7-tuple (X, W, P, T, G, E, D)
where:
99
1. X denotes the set of instances Xi, of a particular JPEG image, (If N copies of
an image are to be watermarked, then 0 ≤ i ≤ N);
2. W denotes the monochrome watermark logo;
3. P denotes the set of policies Pi, 0 ≤ i ≤ N;
4. “T” is the “watermark strength parameter”;
5. G denotes the policy generator algorithm G: Xi Pi, where
Each Xi will have a unique Pi, i.e. a different policy to hide the watermark
data;
6. E denotes the watermark embedding algorithm, E: Xi x W x Pi Xi’;
7. D denotes the watermark detection algorithm, D: Xi’ x Pi W’, where W’
represents the extracted watermark.
The parameter “T” is analogous to “K” of classical MBCE scheme. In classical MBCE
scheme, relative strength of two coefficients value of FM region decides the decoding of
“1” or “0”. If the relative strength of two values has to decide the decoding of “0” or “1”,
then larger value should remain larger even after image manipulations. So, we adjust
these values in such a way that the difference between the two values becomes larger
than a certain threshold value. We name this threshold value as “Watermark Strength
Parameter” because this value decides the robustness of watermark data. Certainly, it has
an impact on the image perceptibly. So, we need to decide this threshold value in such a
way that our image does not loose its quality much. The value of “T” may differ for each
image.
Out of these 7 tuples, last 3 tuples are algorithms, which are discussed below:
6.2.1 G, THE POLICY GENERATOR ALGORITHM
Similar to our earlier proposed ICAR watermarking scheme for the gray image
watermarking and colored image watermarking, we need to watermark each copy Xi of
an JPEG image X differently. Therefore, we need a different watermarking policy for
100
each copy of the image to be watermarked. Here “Policy” means that, for every copy of
the image, there will be unique combination of 4 middle band coefficients. First we had
to convert the source JPEG image into its equivalent true colored 24-bit BMP image.
Then, to generate a policy, we simply take 8 x 8 DCT of a chosen color channel of the
input image Xi and randomly select 4 coefficients out of 22 middle band coefficient of
FM region from any of the red, green or blue color channel. So, numbers of policies that
can be generated are 22C 4 = 7315 which means that 7315 copies of a single image can be
watermarked such that no two watermarked images have same policy. This step ensures
that attacker can not conclude the location of watermark data by colluding many
watermarked copies of an image. This also depicts that our proposed scheme is an ICAR
scheme. Policy generator algorithm also returns the color channel to be used to carry the
watermark.
6.2.1.1 COLOR CHANNEL SELECTION: Bossen et al. [9] have stated that the
watermarks should be embedded mainly in the BLUE color channel of an image because
human eye is least sensitive to change in BLUE channel. However, the suitability of color
channel to hide the watermark data depends on the image itself. The color channel which
should be used can be found on the basis of the amount of the color present in the image
or on the basis of histogram of each color channel (i.e. color with spreader histogram
should be given priority). We also know that for few images, BLUE channel may not
give the optimum results. We, therefore propose that the color channel with the lowest
“Standard Deviation (SD)” should be selected. More details of this finding and result
related to this issue are given in the Section 6.2.4.1.
6.2.2 E, THE WATERMARK EMBEDDING ALGORITHM
In this algorithm, each 8x8 DCT block of an image is used to hide a single bit of
watermark logo. Our embedding algorithm is based on averaging the coefficients of FM
region and the DC coefficient. As we know that attacker cannot alter this “average (Av)”
of coefficients of FM region and the DC coefficient badly as it will heavily impact the
quality of image, we are hiding “1” or “0” by using the relative values of four coefficients
with this “Av”.
101
This algorithm is given as follows:
1. Repeat steps 2 to13 for i = 1…..n; // where ‘n’ is the number of copies of a single image to be watermarked //
2. INPUT (Xi);
3. Convert the Xi into its equivalent spatial domain 24-bit colored image;
4. Take 8 x 8 block DCT of Xi;
5. INPUT (W);
6. Convert W into a string S = (Sj | Sj = {0,1}, for j = 1…..length of the watermark);
7. Let L = STRING_LENGTH (S); // L is the length of watermark data. If L = 1000, then first 1000 DCT block of Xi are used //
8. Pi = CALL (G); // Each generated Pi shall be stored in an author’s database for the detection purpose in future.
Let the Pi for chosen Xi be, Pi = {(5,1), (4,2), (6,3) and (5,4)} in the chosen color channel //
9. Calculate the average “Av” of remaining 18 middle band coefficients and DC
coefficient.
Av = (DCT (0, 0) + Sum (22 Middle band coefficients) - Sum (4 chosen
coefficients chosen by Pi)) / 19.
10. Repeat steps 11 to13 for r = 1…..L;
11. Read Sr;
// Now like classical MBCE scheme, relative strength of average “Av” and chosen 4 coefficients
in step 7 will interpret “0” or “1” of watermark data. To hide “0” for all 4 chosen coefficients
in step 7, we assigned the value of coefficients which is ‘T’ less than the average “Av”. To hide
“1”, for all 4 chosen coefficients in step 7, we assigned the value of coefficients which is ‘T’
greater than the average “Av” //
If (Sr = 0)
DCT (5, 1) = Av - T;
DCT (4, 2) = Av - T;
DCT (5, 4) = Av - T;
102
DCT (6, 3) = Av - T;
Else
DCT (5, 1) = Av + T;
DCT (4, 2) = Av + T;
DCT (5, 4) = Av + T;
DCT (6, 3) = Av + T;
End;
12. Take IDCT to reconstruct Xi;
13. Convert Xi back to its JPEG format;
14. End.
6.2.3 D, THE WATERMARK DETECTION ALGORITHM
Watermark extraction is the reverse procedure of watermark embedding. To extract the
watermark from the watermarked JPEG image, first we convert it into its equivalent 24
bit colored images and then calculate the average “Av” in a same way, as in embedding
algorithm. Owner has a record of all policies used to watermark the images. Based on
“policies”; owner of the image can recover watermark using following rule:
1) If at least 1 out of 4 chosen coefficients are less then Av, Interpret “0”; and
2) If at least 1 out of 4 chosen coefficients are greater then Av, interpret “1”.
The detection algorithm steps are as follows:
1. INPUT (Xi’); // Xi’ is the attacked copy of a watermarked image//
2. Convert Xi into its equivalent 24 bit colored image;
3. Take 8x8 block DCT of Xi’ and calculate Av;
4. For all Pi stored in author’s database, repeat the steps 5; // If initially 10 copies were watermarked, then out of 10 policies, for 1 policy, watermark will be
recovered correctly. To explain further steps, we are assuming that now algorithm is in a loop
where Pi is {(5, 1) (4, 2) (5, 4) and (6, 3)}, which was used to watermarked this particular Xi’ //
103
5. Repeat the steps 5 for j = 1….L; // L is the length of watermark data. A single bit will be recovered form one 8x8 DCT block.//
Take jth DCT block to form jth bit of watermark as follows:
If (DCT (5, 1) < = Av)
T1 = 1;
Else T1 = 0;
If (DCT (4, 2) < = Av)
T2 = 1;
Else T2 = 0;
If (DCT (5, 4) < = Av)
T3 = 1;
Else T3 = 0;
If (DCT (6, 3) < = Av)
T4 = 1;
Else T4 = 0;
If ( T1 + T2 + T3 + T4 > = 1 )
Decode “0”
If (DCT (5, 1) > Av)
P1 = 1;
Else P1 = 0;
If (DCT (4, 2) > Av)
P2 = 1;
Else P2 = 0;
If (DCT (5, 4) > Av)
P3 = 1;
Else P3 = 0;
If (DCT (6, 3) > Av)
P4 = 1;
Else P4 = 0;
If ( P1 + P2 + P3 + P4 > = 1)
104
Decode “1”;
End;
6. Store W’, the recovered watermark;
7. End.
It may be observed from both the algorithms that even if attacker alters the values of the
coefficient of FM region, if “Av” is not changed much, then we can recover the
watermark data correctly and attacker cannot aim to attack the image in such a manner
which modifies the “Av”.
6.2.4 PERFORMANCE OF THE PROPOSED SCHEME
Our proposed scheme does not need any testing to check whether or not it is robust
against the collusion attack as it is designed in such a way that the attacker can not
analyze the pattern by colluding many watermarked copies. We needed to check the
performance of the proposed scheme against the JPEG compression and other common
image manipulations and known attacks. We have tested our scheme on four JPEG test
images of Lena, Mandrill, Pepper and Goldhill shown in Figure 3.12 and watermark logo
is shown in Figure 3.13. We measured the image quality in terms of Peak Signal to Noise
Ratio (PSNR) and Correlation Coefficient (CC).
Firstly, we choose an appropriate value of “T” which affects least the image quality as
well as optimizes the recovery of the watermark data. Based on our earlier experiences
discussed in Section 5.3.5, we embedded the watermark logo in test images by keeping
T = 150 (in blue color channel) and then recovered watermark logos. Our experiments
suggested that in Lena, Mandrill and Pepper test images, there was, almost no loss in the
perceptual quality of the images (as shown in Figure 6.1) and recovered watermark logos
were of very fine quality. Figure 6.2 shows the watermark logos obtained from Lena,
Mandrill, Pepper and Goldhill. It was observed that for Goldhill test image, recovery was
not good. Therefore, we continued to experiment the same process for the Goldhill test
image at various values of T and we found that at T = 100, Goldhill test image was giving
the best recovered logo without much loosing its perceptibility. Figure 6.3 shows the
105
goldhill test image after the watermark logo was embedded and the recovered logo.
Therefore, considering the “imperceptibility versus Robustness” trade-off, we fixed up
the value of T = 150 for the further tests for Lena, Mandrill, and Pepper JPEG test
images, and T = 100 for the Goldhill test image.
Figure 6.1: Watermarked test images generated by keeping T = 150
Figure 6.2: Extracted watermark logos from watermarked Lena, Mandrill, Pepper and Goldhill test
images respectively at T = 150
Figure 6.3: Goldhill test image after hiding the watermark logo and the recovered logo at T = 100
6.2.4.1 COLOR CHANNEL SELECTION AND PERFORMANCE AGAINST
JPEG COMPRESSION: Standard deviation (SD) depicts the spread of the frequency
values in a range. If the histogram of a chosen color channel of a particular image has less
spread, the image has less number of frequencies of the chosen color channel. Since, it is
the color channel i.e. the particular color frequencies that actually carry the watermark
data, we conclude that SD must play an important role. To explore the relationship
106
between the selection of a color channel to carry the watermark data and the efficiency of
recovery, we decided to experiment on SD of all three color channels. Table 6.1 shows
the standard deviation of all three color channels for test images.
Table 6.1: SD values of color channels for test images
Lena Mandrill Pepper Goldhill
R channel 49.05 55.5 45.17 56.6
G channel 52.88 47.78 75.05 54
B channel 34.06 61.7 44.29 61
First, we hid the watermark data in the BLUE channel of all four test images. Then, we
compressed watermarked images using JPEG technique at various quality factors and
then recovered the watermark logos. We calculated the PSNR and CC values of extracted
logo. Table 6.2 summarizes the results. It was found that extracted watermark from
Mandrill and Goldhill test images were having poor values of PSNR and CC. Therefore,
for these two images, we repeated the above process by using “GREEN’ Channel. The
qualities of the extracted watermark logos from these two images were improved.
Therefore, we have related the performance of our scheme with color channel selection.
As, it may be observed from the Table 6.1 that for Lena’s and Pepper’s test images,
BLUE channel have lesser SD, whereas for Mandrill’s and Goldhill’s images, GREEN
channel has lesser SD. So it was concluded that lesser the SD better is the recovery of the
watermark data. This fixed up the BLUE channel for Lena’s and Pepper’s watermarking
and GREEN channel for rest two images. It is clear from Table 6.2 and Table 6.3 that
after using GREEN channel for Mandrill’s and Goldhill’s images, performance was
increased. It may be further observed from Table 6.3 that our proposed scheme is quite
robust against JPEG compression.
6.2.4.2 PERFORMANCE AGAINST IMAGE MANIPULATIONS: We performed
the following attacks on the watermarked test images:
107
Attack-1: Equalize the Histogram;
Attack-2: Add 10 % Uniform noise;
Attack-3: Adjust the brightness to + 40 and contrast to + 25;
Attack-4: Adjust the hue and saturation to + 10 each;
Attack-5: Flip Horizontal; and
Attack-6: Apply uniform scaling (Zoom).
Our proposed scheme sustained all the attacks and qualities of extracted watermark logos
were very fine. Table 6.4 summarizes the CC of extracted logos from all test images.
Figure 6.4 shows the recovered logos from attacked images.
Table 6.2: PSNR and CC of extracted logo by using BLUE channel for all images
JPEG
Quality
Factor Lena Mandrill Pepper Goldhill
PSNR 20.898 10.53 24.876 12.53
Q = 60 CC 84.78 51.8 90.55 54.8
PSNR 21.672 9.756 25.412 12.11
Q = 40 CC 86.25 46.11 91.16 48.54
PSNR 19.597 9.27 23.508 9.88
Q = 20 CC 82.59 41 88.95 45.76
108
Table 6.3: PSNR and CC of extracted logo by using BLUE and GREEN channels for images
JPEG
Quality
Factor
Lena
(BLUE),
T = 150
Mandrill
(GREEN)
T = 150
Pepper
(BLUE)
T = 150
Goldhill
(GREEN)
T = 100
PSNR 20.898 21.06 24.876 22.31
Q = 60 CC 84.78 85.12 90.55 91.45
PSNR 21.672 20.682 25.412 23.32
Q = 40 CC 86.25 84.98 91.16 92.56
PSNR 19.597 20.682 23.508 21.43
Q = 20 CC 82.59 84.97 88.95 91.45
6.2.4.3 COMPARATIVE STUDY WITH SIMILAR, STATE-OF-THE-ART
SCHEMES: We compared the performance of the proposed scheme against JPEG
compression with other similar schemes which are DCT based and well-known for their
results of “preprocessing” (Sections 4.2) also supported this fact. So, we decided to
explore DWT domain for the watermarking of JPEG images.
6.3.1.1 ISSUES IN USING DWT: Because of their inherent multi-resolution nature,
wavelet-coding schemes are especially suitable for applications where scalability is
important. The use of DWT is gaining popularity in signal processing, image
compression and watermarking. DWT gives extremely good results in the case of lossless
compression. But DWT has a serious issue when it comes to comparison with DCT for
the watermarking purposes. We cannot assume lossless manipulation in images; both in
watermark embedding and while the image is being attacked. In watermarking, one has to
ensure that the watermark data is recoverable even from highly
destroyed/manipulated/compressed/lossy cover image. Now, while using DCT domain, in
most of the cases, we take 8 x 8 DCT and thus have hundreds of DCT blocks. In each
DCT block, there are FL, FM and FH regions, as shown in Figure 2.3. We cannot use FH
because any manipulation operation will attack first on FH. FL has the major dominating
coefficient to recreate the image. If we use FL to hide the watermark data, cover image
perceptibility will be affected seriously. Therefore, we use FM region, or since, there are
so many FL regions, we can work out to devise a watermarking scheme that takes FL
region also into consideration without changing FL coefficient values.
On the other hand, DWT takes the complete image into consideration as shown in
Figure 6.7 and breaks it into four parts, namely LL, HL, LH, and HH region. This policy
may have several advantages but for watermarking, it has a very serious issue. Like DCT
blocks, we should not use HH region. LL region coefficients can also not be altered much
because these will heavily affect the image perceptibility (LL coefficients will alone
113
generate a very good approximated image and we cannot alter these coefficients much).
HL and LH coefficients may be altered seriously by any image manipulation operation.
Unlike DCT based transformation (where there are so many FM regions to hide the
watermark data), there is only one LL region in DWT. Therefore, we have very less space
to hide the watermark data. Either we disturb heavily DWT coefficients and thus affect
the image perceptibility while hiding watermark data or to preserve to image quality, hide
watermark data in those regions which are less susceptible to get modified by image
manipulation operations and thus affecting the robustness of the watermarking scheme.
We thus conclude that if we use DWT for watermarking purpose, “Imperceptibility vs.
Robustness” balance is the new challenge for us. More precisely, the classical CDMA-
DWT based scheme as given in Section 2.2.3.1, a highly referred scheme which is very
robust against JPEG compression, affects the image quality up to a great extent. On the
other hand, if sub-band based technique [36] does not affect the image perceptibility after
hiding the watermark data, we may recover the watermark data from JPEG compressed
image only up to compression ratio 10-15 (Q = 70 approx). So, both the above well-
known schemes do not have a good balance in “Imperceptibility vs. Robustness” trade-
off.
Figure 6.7: 2-D Haar DWT
114
Therefore, in this section, our target is to develop a watermarking scheme which is:
1) ICAR in nature (because it ensures the maximum coverage of financial
implications.)
2) JPEG2000 attack resilient (because it is upcoming DWT based image format).
3) Being a DWT based scheme, achieve a good balance in “Imperceptibility vs.
Robustness” trade-off, as most of the DWT based watermarking scheme do not
satisfy much of this quality.
We decided to explore Haar DWT for watermarking purposes because CDMA-DWT
[42][52] and Sub-band based scheme [36] used Haar DWT and in both these schemes,
use of Haar DWT has shown its robustness against “JPEG compression” as well as
“image imperceptibility” separately.
6.3.2 BACKGROUND OF THE PROPOSED SCHEME
We used a monochrome logo as a watermark data which we first converted into a string
of ‘0’s and ‘1’s. Now, we needed to hide ‘0’ and ‘1’, in our JPEG image, which we
converted into its equivalent RGB image. As we have said above that a single DWT
block of the image does not give us enough space to hide the data, we planned to take 8 x
8 DWT on a specified color channel of JPEG so that we have a large number of DWT
blocks and thus have enough opportunities to hide the watermark data. We used color
channel with lesser Standard Deviation (SD) (as discussed in Section 6.2). We inherited
the idea of classical MBCE scheme i.e. instead of actually embedding any data, we
interpret ‘0’ or ‘1’ by using the relative strength of two values. We claim that the
“average” value of all coefficients of a single LL region is less susceptible to
modification because LL coefficients are the major dominating coefficients and one
cannot change all coefficients much. Even if some of these have been altered after one
pass of coding and decoding (Taking DWT and then IDWT), the altered coefficients will
again try to get their original value (if we are not changing the perceptual quality of the
image). Therefore, “Average of all LL coefficients” may provide us a good robustness.
115
Even if it is slightly modified, it is very less probable that relative values of “Averages”
of two consecutive LL blocks get modified. So we decided to hide “0” or “1” by using
the relative value of average of LL coefficients of two consecutive 8x8 DWT blocks.
6.3.3 DUAL WATERMARKING
Both DCT and DWT encode the image very differently. Since DWT based watermarking
scheme provides coverage against DWT based attack, our watermarking scheme may not
give good result against DCT transformation based attacks as in the case of JPEG
compression. Since we have a very robust DCT based scheme in hand (proposed in
Section 6.2), we decided to watermark the images using both schemes, one after another,
to ensure the maximum coverage against attacks.
So, first we watermark an image (I) using a DWT based approach to generate a
watermarked copy (I’) and the on I’, we again apply a DCT based scheme, presented in
Section 6.2, to generate a final watermarked copy I’’.
6.3.4 THE DWT BASED WATERMARKING
In our proposed dual watermarking, the DWT based watermarking scheme for JPEG
images is defined as a 7-tuple (X, W, P, T, G, E, D) where:
1. X denotes the set of instances Xi, of a particular JPEG image, (If N copies of
an image are to be watermarked, then 0 ≤ i ≤ N);
2. W denotes the monochrome watermark logo;
3. P denotes the set of policies Pi, 0 ≤ i ≤ N;
4. “T” is the “watermark strength parameter”.
5. G denotes the policy generator algorithm G: Xi Pi, where each Xi will have
a unique Pi, i.e. a different policy to hide the watermark data. This ensures the
ICAR nature;
6. E denotes the watermark embedding algorithm, E: Xi x W x Pi Xi’; 7. D denotes the watermark detection algorithm, D: Xi’ x Pi W’, Where W’
represents the extracted watermark.
116
6.3.4.1 P, THE POLICY: P is a set of policies Pi, where each Pi belongs to a unique Xi,
the instance of an image. A Pi is generated by G and is of the form (Starting block (r,s),
offset, color channel). For example, for Lena test image which we used in our
experiments, Pi is (starting block (0,0), offset (1), Blue).
6.3.4.2 G, THE POLICY GENERATOR ALGORITHM: Similar to our earlier
proposed ICAR watermarking scheme for the gray image watermarking and colored
image watermarking, we need to watermark each copy Xi of a JPEG image X differently
to ensure the ICAR nature. Policy generator algorithm is called by E, after taking 8 x 8
DWT of the image. Since average of two consecutive LL blocks have to interpret “0” or
“1”, G ensures that no two copies of the same original image use the same pattern. So, G
achieves this by providing E, the calling routine, a starting block (which is chosen
randomly) and an offset. E can start grouping of 2 consecutive blocks using this data. For
example, consider an image of size 80 x 80. There will be 100, 8 x 8 DWT blocks in each
color channel as shown in Figure 6.8 and 6.9. If G returns the starting block (0,0) and
offset 1 in a specific color channel, then the blocks to be chosen to hide the watermark
data are shown in Figure 6.8. If G returns the starting block (5,5) and offset 2, then blocks
to be chosen to hide the watermark data are shown in Figure 6.9.
We assume the circular queue of the DWT blocks. If our source image is of 512 x 512
size, then there are 4096, 8 x 8 DWT blocks. Using G, we can generate thousands of
policies which ensure that no two watermarked copies will share same way to hide the
watermark data. The overhead of this G is that the author / owner has to record all
policies in his / her database to use in the decoding phase. This depicts that our proposed
scheme is an ICAR scheme.
117
Figure 6.8: An example of 2 consecutive DWT blocks
Figure 6.9: An example of 2 consecutive DWT blocks
These first 2 blocks will hide first bit
These 2 consecutives blocks will hide second bit
These 2 blocks will hide second bit
These 2 blocks, having offset 2, will hide first bit
(5, 5) block
118
Policy generator algorithm also returns the color channel to be used to carry the
watermark data. As discussed in the Section 6.2.4.1, we used the color channel with
lesser Standard Deviation (SD) to hide the watermark data.
6.3.4.3 E, THE WATERMARK EMBEDDING ALGORITHM: To explain the
embedding algorithm, we assume that G returns the DWT (0, 0) block as starting block
with offset as 1. A simple watermark embedding approach is shown in Figure 6.10.
Embedding algorithm steps are as follows:
1. Repeat steps 2 to12 for i = 1…..n;
// where ‘n’ is the number of copies of a single image X to be watermarked//
2. INPUT (Xi); // Xi is the instance of X.
3. Convert the Xi into its equivalent spatial domain 24-bit colored image;
4. Take 8 x 8 block DWT of Xi;
5. INPUT (W);
6. Convert W into a string S = (Sj | Sj = {0,1}, for j = 1…..length of the watermark);
7. Let L = STRING_LENGTH (S); // L is the length of watermark data. If L = 1000, then first 2000 DWT block of Xi are used to hide
the watermark data //
8. Pi = CALL (G); // Each Pi shall be stored in an author’s database for the detection purpose in future. Let the Pi,
for chosen Xi, be Pi = {DWT (0, 0), Offset (1), BLUE} which is shown in Figure 6.8 //
9. Repeat steps 10 to 12 for r = 1…..L;
10. Read Sr; // Based on Pi, the average “AV1” and “AV2” of 2 chosen DWT blocks is calculated as follows: //
AV1 = (Sum of all LL coefficients of DWT (0, 0))/16;
AV2 = (Sum of all LL coefficients of DWT (0, 1))/16;
If (Sr = 0)
If (AV1 - AV2 > 0)
v = (AV1 - AV2) / 16;
119
Subtract v from all coefficients of DWT (0, 0);
Add v in all coefficients of DWT (0, 1);
End;
// Now relative value of AV1 and AV2 reflects the watermark bit. To further increase the
robustness, we adjust the LL coefficients values such that difference of AV1 and AV2 become at
least ‘T’, the watermark strength parameter //
Subtract T / 2 from all LL coefficients of DWT (0, 0);
Add T / 2 in all LL coefficients of DWT (0, 1);
Else If (Sr = 1)
If (AV1 - AV2 < = 0)
v = (AV2 - AV1) / 16;
Subtract v from all coefficients of DWT (0, 1);
Add v in all coefficients of DWT (0, 0);
End;
// Now relative value of AV1 and AV2 reflects the watermark bit. To further increase the
robustness, we adjust the LL coefficients values such that difference of AV1and AV2 become at
least ‘T’, the watermark strength parameter //
Subtract T / 2 from all L coefficients of DWT (0, 1);
Add T / 2 in all LL coefficients of DWT (0, 0);
End;
11. Take IDWT to reconstruct Xi;
12. Convert Xi back to its JPEG format;
13. End.
120
6.3.4.4 D, THE WATERMARK DETECTION ALGORITHM: Watermark
extraction is the reverse procedure of watermark embedding. To extract the watermark
from the watermarked JPEG image, first we converted it into its equivalent 24 bit colored
images, took 8 x 8 DWT and then calculated the average “AV” of consecutive blocks
based on policies stored in author’s database.
The detection algorithm steps are as follows:
LL LL
Divide image in 8x8 block
2 Consecutive 8x8 blocks will hide a single bit “0” or “1”
Take average of these 16 coefficients (AV1)
Take average of these 16 coefficients (AV2)
Adjust AV1 and AV2 (By changing LL coefficients little bit) such that their relative values reflect the watermark bits “0” or ‘1”. If AV1 > AV2 => “1” else “0”.
So, 1000 watermark bits will be hidden using 2000 consecutive 8 x 8 DWT blocks. Then IDWT will be taken. After then, image will be dual watermarked using DCT based watermarking scheme presented in Section 6.2.
Generated using G
Now consider next 2 consecutive blocks to hide next bit and so on
Figure 6.10: Watermark embedding approach
121
1. INPUT (Xi’);
// Xi’ is the attacked copy of a watermarked image //
2. Convert Xi’ into its equivalent 24 bit colored image;
3. Take 8 x 8 block DWT of Xi’ for the specific color channel;
// Based on Pi, author knows which color channel was used to hide the watermark data for a
specific image //
4. Repeat step 5 to step 7 for each Pi;
5. Based on each Pi, group the DWT blocks in pairs;
6. For i = 1 to 2 * (L-1) repeat step 7;
// L is the length of W //
7. For each pair (AV1, AV2) of DWT blocks;
If (AV 1 > AV2)
Decode ‘1’;
Else Decode “0”;
8. Reconstruct W’, the extracted watermark;
9. End.
6.3.5 THE DCT BASED WATERMARKING
After hiding the watermark logo using DWT based watermarking presented above, we
dual watermarked the images using DCT based watermarking presented in Section 6.2.
6.3.6 RESULTS
We applied the proposed dual watermarking scheme on three standard JPEG test images
of Lena, Mandrill and Pepper. In this section, we used a different watermark logo, which
is shown in Figure 6.11.
122
Figure 6.11: The watermark logo
6.3.6.1 THE VALUE OF “T”: Our proposed DWT based scheme takes a watermark
strength parameter as an input. This T itself tries to balance the “Imperceptibility versus
Robustness” trade-off. To decide the optimal value of this parameter, we hid the
watermark data in test images at various values of T and then calculated the PSNR values
of the watermarked images. Some of those values (which will lead us to a final value) are
shown in Table 6.5. After this, the watermark data was recovered and the quality of the
watermark data was measured using Correlation Coefficient.
Table 6.5: PSNR of watermarked image and CC of extracted logo for various values of T
Lena Mandrill Pepper
T
(LL
Band)
PSNR of
color channel
CC of
recovered logo
PSNR of
color
channel
CC of
recovered logo
PSNR of
color
channel
CC of recovered
logo
500 30.23 64.36 31.2844 51.8 31.3257 56.49
600 28.65 71.88 29.7187 60.29 29.7521 63.19
700 27.32 74.7 28.3907 64.5 28.4188 65.76
Table 6.6: Revised Table 6.5
T = 500 T = 600 T = 700
PSNR 75.575 71.625 68.3
Lena CC 64.36 71.88 74.7
PSNR 78.211 74.29675 70.97675
Mandrill CC 51.8 60.29 64.5
PSNR 78.31425 74.38025 71.047
Pepper CC 56.49 63.19 65.76
123
0
10
20
30
40
50
60
70
80
90
PSNR CC PSNR CC PSNR CC
Lena Mandrill Pepper
T=500T=600T=700
Figure 6.12: Graph of the values shown in Table 6.6
Table 6.5 represents the above results. It is obvious that for the higher values of “T”, the
PSNR values of the watermarked images decrease but at the same time, the CC of the
extracted logos increase. To decide the value of T, we first brought the values of PSNR
data in the range of CC data, by multiplying by 2.5 and then reproduced the Table 6.6.
Figure 6.12 shows the graph of the values shown in Table 6.6. It may be observed that
series for T = 600 is always lying between the series of T = 500 and T = 700. It means
that value T = 600 is the best value, under the “Imperceptibility versus robustness trade
off”. Similarly for other values of T, if PSNR value is good, CC value is poor and vice-
versa.
We conducted further tests by using T = 600 for all test images. It may be noted that our
target was to embed the JPEG2000 attack resistant nature using DWT based embedding
without loosing the robustness against those attacks which our DCT based scheme could
sustain. Therefore, first we hid the watermark logo using DWT based scheme, and then
checked its robustness against JPEG2000 attack. As presented in Table 6.6, the quality of
the watermarked image did not decrease considerably. We converted the watermarked
124
JPEG images (without applying DCT based scheme) to JPEG2000 format. Then, we
recovered the watermark logos from these watermarked images (which are converted to
JPEG2000 format). Table 6.7 represents the CC coefficients of extracted logos.
Figure 6.13 shows the extracted logos from JPEG2000 converted watermarked Lena,
mandrill and Pepper’s test images.
Table 6.7: CC of extracted logos from JPEG2000 attacked images
Test Image CC
Lena 67.71
Mandrill 55.45
Pepper 58.94
Figure 6.13: Extracted logos from Lena, Mandrill and Pepper’s test images
It may be observed from Table 6.7 and Figure 6.13 that our proposed DWT based
watermarking scheme is capable of sustaining JPEG2000 format conversion attack.
In order to implement the dual watermarking scheme, we further applied the DCT based
scheme on the watermarked images which were generated by applying DWT based
scheme. Now we had to check the effect on the image perceptibility as well as robustness
against JPEG2000 format conversion attack. Table 6.8 shows the decrement in the PSNR
values after the application of DCT based scheme. Though decrement is natural, it is not
perceptually visible in the PSNR values. It is a compromise with the image quality to
make the watermarked images very robust against more DCT based attacks, which we
will present later in this section.
125
Table 6.8: Decrement in the PSNR values after the application of DCT based scheme
PSNR if only DWT
based scheme is applied
PSNR if both DWT &
DCT based scheme are
applied
Lena 25.69 25.23
Mandrill 25.83 24.97
Pepper 24.15 23.76
After applying dual watermarking scheme, we again conducted the JPEG2000 format
conversion attack on the watermarked images. Now we had a choice. We could recover
the watermark logos either by applying DWT based recovery or by applying DCT based
recovery. Table 6.9 shows the CC values of the extracted watermark logos recovered by
both recovery methods which clearly indicate that DCT based recovery gave better
results.
Figure 6.14 shows the extracted logos using DWT based method and Figure 6.15 shows
the extracted logos using DWT based method.
Table 6.9: CC values of the extracted watermark logos recovered by both recovery methods
CC if DWT based
recovery is applied
CC if DCT based
recovery is applied
Lena 64.7 91.56
Mandrill 52.14 44.1
Pepper 57.4 88.35
Figure 6.14: Extracted logos using DWT based method
126
Figure 6.15: Extracted logos using DCT based method
6.3.6.2 PERFORMANCE AGAINST JPEG COMPRESSION: We have seen in the
previous section that our proposed DCT based scheme is very robust against JPEG
compression attack. We need to check the robustness of the dual watermarking scheme
presented in this section against JPEG compression. We compressed all test images after
applying dual watermark at very low JPEG quality factor Q = 20, 10 and 5 and recovered
the watermark logos using DCT based recovery. Our proposed dual watermarking
sustained this attack very strongly even at Q = 5. Table 6.10 shows the CC of the
extracted logos. Figure 6.16 shows the extracted logos.
Table 6.10: CC of extracted logo from highly compressed jpeg image using DCT based recovery
Q = 20 Q = 10 Q = 5
Lena 94.39 77.36 76.5
Mandrill 55.95 60.73 57.24
Pepper 92.63 80.35 76.37
Q = 20 Q = 10 Q = 5
Lena
Mandrill
Pepper
Figure 6.16: Extracted logos from highly compressed JPEG images
127
6.3.6.3 PERFORMANCE AGAINST COMMON ATTACKS AND IMAGE
MANIPULATIONS: Since we know that transform domain based schemes are very
robust against those attacks which can reduce the size but not the perceptual quality, we
conducted some attacks on our dual watermarked images, which change the perceptual
quality of an image too. The attacks are as follows:
Attack 1: Adding uniform noise (10%),
Attack 2: Adding Gaussian noise (10 %),
Attack 3: Equalizing histogram,
Attack 4: Applying uniform scaling,
Attack 5: Adjusting brightness (+ 40) and contrast (+ 25),
Attack 6: Horizontal flipping, and
Attack 7: Adjustment of hue and saturation (+ 10 each).
Table 6.11 shows the CC of the extracted watermark logos and Figure 6.17 shows the
extracted watermark logos. It may be observed that the proposed dual watermarking
scheme sustained all the above mentioned attacks.
6.3.6.4 COMPARATIVE STUDY WITH DCT BASED SCHEMES: We compared
the performance of the proposed scheme against JPEG compression with other similar
schemes which are DCT based and well known for their robustness against JPEG
compression. We re-implemented these schemes for JPEG images. Schemes chosen
were:
Scheme-A: Correlation based scheme (Section 2.1.3.1)
Scheme-B: The classical Middle Band Coefficient Exchange scheme (Section 2.2.2.1)
Adjustment of hue and saturation (+ 10 each) 93.75 56.78 92.87
Figure 6.17: Extracted watermark logos after applying common attacks
129
We watermarked the test images by using all chosen watermarking schemes and then
conducted very low JPEG compression (up to Q = 5, whereas most of the research papers
presented results only up to Q = 20). Then we calculated the CC of the extracted logos. It
may be observed from Table 6.12 and 6.13 that Scheme-E performs better than Scheme-
A, B and C. As compared to scheme-D, Scheme-E did not lower the performance but at
some point (Lena’s image at both Q = 5 and 10, and Pepper’s image at Q = 5) improves
the CC of the extracted logos.
6.3.6.5 COMPARATIVE STUDY WITH DWT BASED SCHEMES: As compared
to Classical CDMA-DWT based schemes presented in Section 2.2.3.1, our scheme
outperforms in the quality of the watermarked image (refer Table 6.8).
Table 6.12: Comparison of CC of Extracted logos from JPEG compressed (Q = 10) watermarked images
Lena Mandrill Pepper
Scheme-A 5.6 6.5 4.5
Scheme-B 4.5 6.7 6.5
Scheme-C 12.23 12.65 11.65
Scheme-D 71.12 74.53 84.28
Scheme-E 77.36 60.73 80.35
Table 6.13: Comparison of CC of Extracted logos from JPEG compressed (Q = 5) watermarked images
Lena Mandrill Pepper
Scheme-A 3.98 5.34 3.40
Scheme-B 3.47 5.02 4.98
Scheme-C 10.59 11.21 10.24
Scheme-D 72.32 72.33 75.04
Scheme-E 76.5 57.24 76.37
130
Sub-band filtering based watermarking scheme [36] is very good in preserving the
perceptual quality of the watermark images but when it come to the robustness against
JPEG compression, authors presented results only up to the compression ratio 10 to 15
whereas our proposed watermarking scheme can decode the watermark data up to the
quality factor Q = 5 (refer Table 6.13) i.e. the compression ratio 2 to 3.
It further proves that our proposed scheme has achieved a very good balance in
“imperceptibility versus robustness tradeoff while using DWT based watermarking
scheme.
6.4 CONCLUSION
In this chapter, we provided 2 watermarking schemes for watermarking the JPEG images.
The first scheme is DCT based and the other one is a dual watermarking scheme having a
DWT based watermarking as a component. Both schemes are very robust especially
against JPEG compression and other common image manipulation and attacks. Both
schemes also achieve a very good balance in “Image-imperceptibility vs. robustness”
trade-off and are ICAR in nature.
131
CHAPTER 7
RESULTS & CONCLUSIONS
7.1 SUMMARY
This research was taken up with an objective of developing watermarking algorithms for
images. We felt that it is essential to first ensure that all the developed watermarking
schemes are resistant to at least one attack having the most financial implications to
establish a high demand in the commercial market. Therefore, we chose collusion attack
resistant nature to be embedded in all developed watermarking schemes. Finding the
results reported in literatures, we started to develop the watermarking schemes by
choosing classical Middle Band Coefficients Exchange scheme as a base because this
scheme was very robust against JPEG compression attack. Chapter 4 discusses the
development of watermarking algorithm for Gray scale images and “preprocessing” of
the images to add robustness against JPEG compression and histogram equalization
attack. Chapter 5 presented a watermarking algorithm for colored BMP images and a
study to find the appropriate color channels to carry the watermark data to improve the
robustness of the watermarking scheme. In both chapters, the watermarking algorithms
are DCT based. After then, we presented a DCT based and a dual (DWT + DCT) based
watermarking schemes in Chapter 6 for JPEG images.
7.2 MAIN CONTRIBUTIONS AND HIGHLIGHTS OF THE
RESULTS The proposed watermarking schemes have the following characteristics:
1) These are ICAR in nature. This was achieved by introducing randomness and
redundancy in the coefficients exchange criterion in FM region of block DCT and
DWT.
132
2) These are very robust against JPEG compression (even up to JPEG quality factor
Q = 5, compression ratio up to 98 %) and outperform other existing state-of-the-
art watermarking schemes.
3) These are very robust against common image manipulations and known attacks.
4) We introduced the concept of “preprocessing” i.e. minimizing the attack impact
before watermarking of the image so that some known attack can not disturb the
watermarked images very heavily and thus perform better recovery of the
watermark data.
5) We established that if we want to increase the robustness against JPEG
compression, the watermark data should be hidden in the GREEN color channel
(not in BLUE color channel, as reported in most of the research papers even if
poor sensitivity of the eye to the BLUE color channel).
6) We have also correlated image characteristic and watermarking scheme
robustness against some attacks. It was found that for multicolored image, if
watermark data is hidden in the color channel having the lowest “Standard
Deviation”, then the performance against JPEG compression and other common
attacks increases.
7.3 FUTURE WORK
1) Considering the huge financial aspects of the watermarking application areas,
apart from ICAR, more characteristics against some attacks like forgery attack or
multiple watermarking can be embedded.
2) Further studies may be conducted to know the attack impacts on the images and
then watermarking schemes to be developed so that those impacts could be
minimized before the start of watermarking so that a better recovery of the
copyright data could be performed.
3) A watermarking scheme may have some relationship with the image on which it
is going to apply. Performance of the watermarking scheme or selection of the
watermarking scheme or at least few input parameters of the watermarking
scheme must be related to image characteristics.
133
4) More wavelet transforms should be examined for embedding of the watermark
data and robustness against JPEG2000 format conversion.
5) All presented watermarking schemes may be coupled with some special
“Geometrical attack resistant” watermarking schemes and thus developing
watermarking schemes to ensure maximum converge against malicious attacks.
134
135
REFERENCES [1] Ahmidi N., Safa R., “A Novel DCT-based Approach for Secure Color Image
Watermarking”, Proc. Int. Conf. on Information Technology: Coding and Computing (ITCC’04), page 709, IEEE, 2004.
[2] Amon P., “Signal-Processing Attacks on Watermarks”.
www.lnt. de/~su/seminar/ws98/slides/kempf. pdf. [3] Arnold M., Schmucker M., Wolthusen S.D., “Techniques and application of Digital
Watermarking and Content Protection”, Eds. Northwood, Artech House, 2003. [4] Barni M., Bartolini F., Cappellini V., Piva A., “ A DCT-domain system for robust
image watermarking”, Signal Processing, vol. 6, no. 3 , pp. 357-372, May 1998. [5] Barni M., Bartolini F., Cappellini V., Lippi A., Piva A., "A DWT-based technique for
spatio-frequency masking of digital signatures", Proc. SPIE/IS&T Int. Conf. Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, pp. 31-39, Jan. 25-27, 1999.
[6] Bender W., Gruhl D., Morimoto N., "Techniques for data hiding", Proc. SPIE,
Storage and Retrieval for Image and Video Databases III, vol. 2420, San Jose, CA, pp. 165-173, Feb. 1995.
[7] Bender W., Gruhl D., Morimoto N., “Techniques for data hiding”, Proc. SPIE, vol.
2420, page 40, Feb. 1995. [8] Boland F.M., Ruanaidh J.J.K., Dautzenberg C., "Watermarking digital images for
copyright protection", Proc. IEE Int. Conf. on Image Processing and Its Applications, Edinburgh, U.K., pp. 326-330, July 1995.
[9] Bossen F., Kutter M., Jordan F., “Digital signature of color images using amplihlde
modulation”, Proc. of SPlE storage and retrieval for image and video databases, San lose, USA, vol. 3022-5, pp. 518-526, Feb. 1997.
[10] Bounkong S., Toch B., Saad D., Lowe D., “ICA for watermarking digital images”,
The Journal of Machine Learning Research, vol. 4, Publisher: MIT Press, Dec. 2003. [11] Caronni, "Assuring ownership rights for digital images", Proc. Reliable IT Systems,
VIS '95, Germany, pp. 251-263, 1995. [12] Chen T.P.C., Chen T., “Progressive image watermarking”, Proc. IEEE Int. Conf.
on Multimedia and Expo, pp. 1025–1028, July 2000.
136
[13] Christian R., Dugelay J.L., “A Survey of Watermarking Algorithms for Image Authentication”, EURASIP Journal on Applied Signal Processing, Volume 2002, Issue 6, pp. 613-621, 2002.
[14] Chu W.C., “DCT-based image watermarking using subsampling”, IEEE
Transactions on Multimedia, vol. 5, no. 1, pp. 34-38, June 2005. [15] Collusion-resistant watermarking and fingerprinting, US Patent Issued on June 13,
[16] Cox I. J., Miller M., Bloom J., “Digital Watermarking: Principles and Practice”,
Morgan Kaufmann, ISBN-10: 1558607145, Oct. 2001. [17] Cox I.J., Kilian J., Leighton T., Shamoon T., "A secure, robust watermark for
multimedia”, Workshop on Information Hiding, Newton Institute, Univ. of Cambridge, May 1996. http://www.adastral.ucl.ac.uk/~icox/#Anchor-Watermarking-14210.
WATERMARKING”, 14th Int. Conf. on IEEE Digital Signal Processing, vol. 2, pp. 713- 716, 2002.
137
[26] Fred M., Gordon W., Alan E. B., “Opportunities for Watermarking Standards”, Communications of the ACM, vol. 41, no. 7, July 1998.
[27] Fridrich J., "Robust bit extraction from images", Proc. IEEE ICMCS'99 Conference.
vol. 2, pp. 536-540, Florence, Italy, June 7-11, 1999. [28] Fridrich J., “Combing low-frequency and spread spectrum watermarking”, SPIE
Symposium on Optical Science Engineering and Instrumentation, San Diego, USA, pp. 2-12, July 1998.
[29] Friedman G., “The trustworthy digital camera”, IEEE Transactions on Consumer
Electronics, vol. 39, no. 4, pp. 93-103, Nov 1993. http://www. cl. cam. ac. uk/~fapp2/steganography/bibliography/043125. html
[30] Ganic E., Eskicioglu A. M., "Robust digital watermarking: Robust DWT-SVD
domain image watermarking: embedding data in all frequencies", Proc. of the 2004 multimedia and security workshop on Multimedia and Security, pp. 166-174, Sep. 2004.
[31] Gu F., Lu Z.M., Pan J.S., “Multipurpose image watermarking in DCT domain using
subsampling”, IEEE Int. Symposium on Circuits and Systems, vol. 5, pp. 4417-4420, May 2005.
[32] Gupta A., Saxena V., Srivastava M.C, Gupta J.P., “Towards Achieving the Higher
Compression of Images Using Standard JPEG Scheme", [Accepted for publication in “International Journal of Tomography & Statistics”, ISSN 0972-9976 , June 2008 issue], Editor and reviewers comments received.
Proc. 10th International Multimedia Modeling Conference, pp. 72- 78, Jan 2004. [37] Hsu C.T., Wu J.L., "Hidden signatures in images", Proc. ICIP-96, IEEE Int. Conf.
on Image Processing, vol. 3, Lausanne, Switzerland, pp. 223-226, Sept. 16-19, 1996. http://citeseer.ist.psu.edu/mohanty99digital.htm
138
[38] Huang D., Liu J., Huang J., Liu H. “A DWT-based Image Watermarking Algorithm”,
Proc. IEEE Int. Conf. on Multimedia and Expo, pp. 313-316, Aug. 2001. [39] Huang X.Y., Tan M.S., Luo Y., Lin D.Z., “ An image digital watermarking based on
DCT in invariant wavelet domain”, IEEE Int. Conf. on Wavelet Analysis and Pattern Recognition, vol. 1, pp. 458-463, Nov 2007.
[40] Hyv¨arinen A., Karhunen J, Oja E., “Independent Component Analysis”, Wiley-
Interscience, 2001. [41] Hyv¨arinen A., Oja E., “A fast fixed-point algorithm for independent component
analysis”, Neural Computation, 9(7), pp. 1483-1492, 1997. [42] Johnson N., Katezenbeisser S., “A Survey of Steganographic Techniques”, Eds.
[44] Kaewkamnerd N., Rao K.R., "Wavelet based image adaptive watermarking
scheme", IEE Electronics Letters, vol. 36, pp. 312-313, Feb. 2000. [45] Kalker T., Linnartz J.P., Depovere G., “On the reliability of detecting electronic
watermarks in digital images”, Proc. EUSIPCO’98, vol. 1, pp. 13-16, 1998. [46] Kim W., Lee S.H., Jang H.W., Kim J., “Multi-bits Fingerprinting for Image”, SIP
for satellite imagery”, Signal Processing, vol. 88, Issue 4, Publisher: Elsevier North-Holland, Inc, pp. 891-904, April 2008.
[50] Kundur D., Hatzinakos D., "A robust digital image watermarking scheme using
wavelet-based fusion", Proc. ICIP 97, IEEE Int. Conf. on Image Processing, Santa Barbara, CA, pp. 544-547, Oct. 1997.
139
[51] Kundur D., Hatzinakos D., “Towards Robust Logo Watermarking using
Multiresolution Image Fusion", IEEE Transactions on Multimedia, vol. 6, no. 1, pp. 185-198, Feb. 2004.
[52] Langelaar G., Setyawan I., Lagendijk R.L., “Watermarking Digital Image and Video
Data”, IEEE Signal Processing Magazine, vol. 17, pp. 20-43, Sep. 2000. [53] Langelaar G.C., Lubbe J.C.A., Lagendijk R.L., "Robust labeling methods for copy
protection of images", Proc. SPIE Electronic Imaging '97, Storage and Retrieval for Image and Video Databases V, San Jose, CA, pp. 298-309, Feb. 1997.
[54] Langelaar, Setyawan G.C., Lagendijk I., “Watermarking digital image and video
data : A state-of-the-art overview”, vol. 17, Issue 5., pp. 20-46, Sep. 2000. [55] Li X., Xue X., “Improved robust watermarking in DCT domain for color images”,
Proc. IEEE Int. Conf. on Advanced Information Networking and Applications, IEEE-AINA 2004, vol. 1, pp. 53 – 58, 2004.
[56] Li. Z., Drew M.S., “Fundamentals of Multimedia”, Eastern Economy Edition, First
edition, PHI, 2004. [57] Lu C. S., Huang S.K., Sze C.J., Liao H.Y., "A new watermarking technique for
multimedia protection", Multimedia Image and Video Processing, Eds. Boca Raton, FL: CRC, pp 507-530, 2001.
[58] Lu C.S., Liao H.Y., Huang M., Sze S.K., “Combined Watermarking for Images
Authentication and Protection", Proc. 1st IEEE Int. Conf. on Multimedia and Expo, vol. 3, no. 30, pp. 1415 – 1418, Aug. 2000.
[59] Lu Z.M., Xu D.G., Sun S.H., “Multipurpose image watermarking algorithm based
on multistage vector quantization”, IEEE Transactions on Image Processing, vol. 14, pp. 822-831, 2005.
[60] Macq B.M., Quisquater J.J., “Cryptology for digital TV broadcasting”, Proceedings
of IEEE, ISSN: 0018-9219, vol. 83, pp. 944-957, June 1995. [61] Mohanty S.P. et al., “A Dual Watermarking Technique for Images”, Proc. 7th ACM
Int. Conf. on Multimedia, ACM-MM’99, Part 2, Orlando, USA, pp. 49-51, Oct. 1999.
[62] Mohanty S.P., "Digital Watermarking: A Tutorial Review",
http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf [63] Home Page: Network Technology research Center, Nanyang Technological
[69] Pitas I., “A Method for Watermark Casting in Digital Images”, IEEE Transactions
on Circuits and Systems on Video Technology, vol. 8, no.6, pp. 775-780, October 1998.
[70] Pitas I., Kaskalis T.H., "Applying signatures on digital images", Proc. IEEE
Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Thessaloniki, Greece, pp. 460-463, June 20-22, 1995.
[71] Piva A., Barni M., Bartolini F., Cappellini V., "DCT-based watermark recovering
without resorting to the uncorrupted original image", Proc. IEEE Int. Conf. on Image Processing, ICIP 97, Santa Barbara, CA, pp. 520-527, Oct. 1997.
[72] Piva A., Barni M., Bartolini F., Cappellini V., “Threshold Selection for Correlation-
based Watermark Detection”, Proc. COST 254 Workshop on Intelligent Communications, L'Aquila, Italy, pp. 67-72, June 1998.
[73] Podilchuk C. I., Zeng W., “ Image Adaptive Watermarking Using Visual Models”,
IEEE Journal of Selected Areas in Communication”, pp. 1998, 525-539, May 1998. [74] Podilchuk C., Zeng W., "Perceptual watermarking of still images", Proc. IEEE 1st
Workshop on Multimedia Signal Processing, Princeton, NJ, pp. 363-368, June 23-25, 1997.
[75] Podilchuk C., Zeng W., “Image-Adaptive Watermarking Using Visual Models”,
IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525-539, May 1998.
141
[76] Potdar et al., “A survey of digital image watermarking techniques”, Proc. 3rd IEEE Int. Conf. on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, pp. 709-716, Perth, WA, Aug. 2005.
[77] Pröfrock D., Schlauweg M., Müller E., “Video Watermarking by Using Geometric
Warping without Visible Artifacts”, Proc. 8th Workshop on Information Hiding, pp. 99-104, July 2006.
[78] Raval M.S., Rege P.P., "Discrete Wavelet Transform Based Multiple Watermarking
Scheme", Proc. Int. Conf. on Convergent Technologies for Asia-Pacific Region, TENCON 2003, vol. 3, pp. 935 - 938, Oct. 2003.
[79] Rhoads G.B., “Indentification/authentication coding method and apparatus”, World
http://www.cosy.sbg.ac.at/~pmeerw/Watermarking/attack_jpeg2000.html [81] Ruanaidh J.J.K.O., Dowling W.J., Boland F.M., "Watermarking digital images for
copyright protection", Proc. IEE Vision, Image, and Signal Processing, vol. 143, no. 4, pp. 250-256, Aug. 1996.
[82] Safranek R., “Perceptually based prequantization for image compression”, Proc.
SPIE Conf. on Human Vision, Visual Processing and Digital Display V, 1994. [83] Saxena V. et al., “Performance Analysis of Color Channel for DCT Based Image
Watermarking Scheme”, International Journal of Security and its Applications. ISSN: 1738-9976, vol. 1, no. 2, pp. 41-46, Oct 2007. http://www.sersc.org/journals/IJSIA/vol1_no2_2007.php
[84] Saxena Vikas, Gupta J.P, “A Novel Watermarking Scheme for JPEG Images”, to
appear in WSEAS Transaction on Signal Processing (June 2009 issue), ISSN: 1790-5022, Editor and reviewers comments received-Accepted.
for Color Images”, IAENG International Journal of Computer Science, vol. 34, no. 2, ISSN: 1819-656X, pp. 171-177, Dec. 2007. http://www.iaeng.org/IJCS/issues_v34/issue_2/index.html
Images Using DCT”, Published in the Proc. 15th IEEE Int. Conf. on Signal Processing and Communication Applications, Turkey, June 2007. http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4298551&arnumber=4298813&count=322&index=261
142
[87] Saxena V., Gupta J.P., “DWT-DCT based dual watermarking scheme for JPEG images”, Communicated to ACM-SIGGRAPH.
[88] Saxena V., Gupta J.P., “Towards Increasing the Robustness of Image
Watermarking Scheme Against JPEG Compression”, Proc. IAENG Int. Conf. on Imaging Engineering, Hong Kong, vol. 2, ISBN: 978-988-98671-7-1, publisher: Newswood Ltd, pp. 1903-1906, Mar., 2007.
[89] Saxena V., Gupta J.P., “Towards Increasing the Robustness of Image Watermarking
Scheme Against Histogram Equalization Attack”, Published in the Proc. 15th IEEE Int. Conf. on Signal Processing and Communication Applications, Turkey, June 2007. http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4298551&arnumber=4298829&count=322&index=277
[90] Schlauweg M., Pröfrock D., Zeibich B., Müller E., “Dual watermarking for
protection of rightful ownership and secure image authentication”, Proc. 4th ACM Int. workshop on Contents protection and security, MCPS '06, Publisher: ACM , pp. 59-66, Oct. 2006.
[91] Schyndel R.G.V., Tirkel A.Z., Osborne C.F., "A digital watermark", Proc. IEEE Int.
Conf. on Image Processing, Austin, TX, vol. 2, pp. 86-90, Nov. 1994. [92] Sellars, Duncan, “Introduction to Stegnography”.
http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html [93] Shoemaker C., “Hidden bits: A survey of techniques for digital watermarking”
http://www.vu.union.edu/~shoemakc/ watermarking/watermarking.html [95] Smith J.R., Comiskey B.O., "Modulation and information hiding in images", Proc.
Information Hiding, University of Cambridge, U.K., pp. 204-213, Nov. 1994. [96] Steinder S.I.M., Amer., “Progressively authenticated transmission”, Proc. ACM-
http://www.petitcolas.net/fabien/watermarking/stirmark/ [98] Su P.C., Wang H.J.M., Kuo C.C.J., “An Integrated Approach to Image
Watermarking and JPEG-2000 Compression”, Journal of Signal Processing,vol.1, no. 27, pp. 35-53, 2001.
[99] Tao B., Dickinson B., "Adaptive watermarking in the DCT domain", IEEE Int. Conf.
on Acoustics, Speech and Signal Processing, pp. 20-46, Apr.1997.
143
[100] Tao P., Eskicioglu A.M., “A Robust Multiple Watermarking Scheme in the Discrete Wavelet Transform Domain”, Symposium on Internet Multimedia Management Systems V, Philadelphia, PA, pp. 134-144, 2004.
[101] Tripathi S., Jain R.C., Gayatri V., “Novel DCT and DWT based Watermarking
Techniques for Digital Images Pattern Recognition”, 18th IEEE Int. Conf. on Pattern Recognition, vol. 4, pp. 358-361, 2006.
Techniques and Applications”, Technical Report of National Chung Chang University, and National Taichung Institute of Technology, Taiwan, pp. 120-122, 2001.
[103] Voigt M., Yang B., Busch C., “Reversible watermarking of 2D-vector data”, Proc.
ACM Workshop on Multimedia and Security, pp. 160-165, Sep. 2004. [104] Voyatzis G. and Pitas I., “Digital Image Watermarking using Mixing Systems”,
Computer & Graphics, Elsevier, vol. 22, no. 4, pp. 405-416, 1998. [105] Voyatzis G., Nikolaidis N., Pitas I., “Digital watermarking: an overview”, Proc. 9th
European Signal Processing Conf. on Theories and Applications: Eusipco-98, Rhodes, Greece, pp. 9 -12, Sep. 1998.
[106] Voyatzis G., Pitas I., "Digital Image Watermarking using Mixing Systems",
Computer Graphics, Elsevier, vol. 22, no. 4, pp. 405-416, August 1998. [107] Wang J., et al., “Image Watermarking Scheme Based on 3-D DCT”, Proc. 1st IEEE
Conf. on Industrial Electronics and Applications, 2006, pp. 1- 6, May 2006. [108] Watson A.B., “DCT Quantization Matrices Visually Optimized for Individual
Images”, Proc. Human Vision, Visual Processing, and Digital Display IV, Bellingham, WA, SPIE, pp. 202-216, Feb. 1992.
[109] Watson B., “DCT quantization matrices optimized for individual images”, Human
Vision, Visual Processing, and Digital Display IV, SPIE-1913, pp. 202-216, 1993. [110] Weng S.W., Zhao Y., Pan J.S., “Reversible watermarking based on improved
patchwork algorithm and symmetric modulo operation”, Lecture Notes in Computer Science on Knowledge-based Intelligent Information and Engineering Systems, Springer, Berlin/Heidelberg, vol. 3684, 2002.
[113] Wikipedia-JPEG2000. http://www.en.wikipedia.org/wiki/JPEG2000 [114] Wolfgang R.B., Delp E.J., "A watermarking technique for digital imagery: Further
studies", Proc. Int. Conf. on. Imaging Science, Systems and Technology, Las Vegas, NV, vol. 3, pp. 112-118, June 1997.
[115] Wolfgang R.B., Delp E.J., "Fragile watermarking using the VW2D watermark",
Proc. Electronic Imaging '99, San Jose, CA, vol. 3657, pp. 204-213, Jan. 25-27, 1999.
[116] Wolfgang R.B., Delp E.J., "Overview of image security techniques with
applications in multimedia systems", Proc. SPIE Conf. on Multimedia Networks: Security, Displays, Terminals, and Gateways, Dallas, TX, vol. 3228, pp. 297-308, Nov. 2-5, 1997.
[117] Wolfgang R.B., Delp E.J., "A watermark for digital images", Proc. IEEE Int. Conf.
on Image Processing, Lausanne, Switzerland, vol. 3, pp. 219-222, Sep. 1996. [118] Wolfgang R.B., Podilchuk C.I., Delp E.J., "Perceptual watermarks for digital
images and video", Proc. IEEE, vol. 87, pp. 1108-1126, July 1999. [119] Xia X.G., Boncelet C.G., Arce G.R., "A multiresolution watermark For digital
images", Proc. IEEE Int. Conf. on Image Processing, Santa Barbara, CA, pp. 548-551, Oct. 1997.
[120] Xia X.G., Boncelet C.G., Arce G.R., “Wavelet transform based watermark for
digital images”, Optics Express, no. 3, pp. 497–511, Dec. 1998. [121] Xiao W., Ji Z., Zhang J., Wu W., "A watermarking algorithm based on chaotic
encryption", Proc. IEEE Region 10 Conf. on Computers, Communications, Control and Power Engineering TENCON, vol. 1, pp. 545-548, Oct. 2002.
[122] Xing W., Lu Z.M., “Multipurpose image watermarking based on vector
quantization in DCT domain”, Proc. 5th International Symposium on Test and Measurement (ISTM’2003), Shenzhen, China, pp. 2057-2061, 2003.
[123] Yang B. et al., “Reversible image watermarking by histogram modification for
integer DCT coefficients”, Proc. IEEE 6th workshop on Multimedia Signal Processing, pp. 143-146, Oct. 2004.
[124] Yeo K., Kim H.J., “Generalized patchwork algorithm for image watermarking”,
Multimedia Systems, Springer, Berlin-Heidelberg, vol. 9, pp. 261-265, 2003. [125] Zhao Y., Campisi P., Kundur D., "Dual Domain Watermarking for Authentication
and Compression of Cultural Heritage Images", IEEE Transactions on Image Processing, vol. 13, no. 3, pp. 430-448, Mar. 2004.
145
[126] Zhu X., Gao Y., Zhu Y., “Image-adaptive watermarking based on perceptually
shaping watermark blockwise”, Proc. ACM Symposium on Information, computer and communications Security, ASIACCS '06, pp. 175-181, Mar. 2006.
[127] Funda Ergun et.al., "A Note on the Limits of Collusion-Resistant Watermarks ",
Lecture Notes in Computer Science, Springer, vol. 1592/1999, pp. 140-149, Jan 1999.
[128] Lemma, Aweke N., van der Veen, Michiel, "Deterring watermark collusion attacks
using signal processing techniques", Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of the SPIE, vol. 6505, pp. 65050M, 2007.
[129] F.T. Leighton, “Watermarking process resilient to collusion attacks”, United States
Patent 5664018. http://www.freepatentsonline.com/5664018.html [130] M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu, “Collusion Resistant Fingerprinting
for Multimedia”, IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, pp.15-27, 2004.
[131] W. Trappe, M. Wu, Z. Jane Wang and K. J. Ray Liu, “Anti-collusion fingerprinting
for Multimedia”, IEEE Trans. on Signal Processing, vol. 51, pp. 1069-1087, 2003.
146
147
LIST OF AUTHOR’S PUBLICATIONS
[1] Saxena Vikas, Gupta J.P, “A Novel Watermarking Scheme for JPEG Images”, to appear in WSEAS Transaction on Signal Processing (June 2009 issue), ISSN: 1790-5022, Editor and reviewers comments received-Accepted.
[2] Saxena V. et al., “Performance Analysis of Color Channel for DCT Based Image
Watermarking Scheme”, International Journal of Security and its Applications. ISSN: 1738-9976, vol. 1, no. 2, pp. 41-46, Oct 2007.
for Color Images”, IAENG International Journal of Computer Science, vol. 34, no. 2, ISSN: 1819-656X, pp. 171-177, Dec. 2007.
http://www.iaeng.org/IJCS/issues_v34/issue_2/index.html [4] Gupta A., Saxena V., Srivastava M.C, Gupta J.P., “Towards Achieving the Higher
Compression of Images Using Standard JPEG Scheme", [Accepted for publication in “International Journal of Tomography & Statistics”, ISSN 0972-9976 , June 2008 issue], Editor and reviewers comments received.
Using DCT”, Published in the Proc. 15th IEEE Int. Conf. on Signal Processing and Communication Applications, Turkey, pp.1-4, June 2007. http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4298551&arnumber=4298813&count=322&index=261
[6] Saxena V., Gupta J.P., “Towards Increasing the Robustness of Image Watermarking
Scheme Against JPEG Compression”, Proc. IAENG Int. Conf. on Imaging Engineering, Hong Kong, vol. 2, ISBN: 978-988-98671-7-1, publisher: Newswood Ltd, pp. 1903-1906, Mar., 2007.
[7] Saxena V., Gupta J.P., “Towards Increasing the Robustness of Image Watermarking
Scheme Against Histogram Equalization Attack”, Published in the Proc. 15th IEEE Int. Conf. on Signal Processing and Communication Applications, Turkey, pp. 1-4 June 2007. http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4298551&arnumber=4298829&count=322&index=277
148
Synopsis-1
SYNOPSIS
One of the biggest technological events of the last two decades was the invasion of digital
media in an entire range of everyday life aspects. Digital data can be stored efficiently and
with a very high quality, and it can be manipulated very easily using computers.
Furthermore, digital data can be transmitted in a fast and inexpensive way through data
communication networks without losing quality. Digital media offer several distinct
advantages over analog media. The quality of digital audio, images and video signals are
better than that of their analog counterparts. Editing is easy because one can access the exact
discrete locations that need to be changed. Copying is simple with no loss of fidelity and a
copy of a digital media is identical to the original. With digital multimedia distribution over
World Wide Web, Intellectual Property Right (IPR) are more threatened than ever due to the
possibility of unlimited copying . One solution would be to restrict access to the data using
some encryption technique. However encryption does not provide overall protection. Once
the encrypted data are decrypted, they can be freely distributed or manipulated. The above
problem can be solved by hiding some ownership data into the multimedia data, which can be
extracted later to prove the ownership. This idea is implemented in bank currency notes. In
bank currency notes, a watermark is embedded which is used to check the originality of the
note. The same “watermarking” concept may be used in multimedia digital contents for
checking the authenticity of the original content. So, A Watermarking is adding an
“ownership” information in multimedia contents to prove the authenticity. This
technology embeds a data, an unperceivable digital code, namely the watermark, carrying
information about the copyright status of the work to be protected. Continuous efforts are
being made to device an efficient watermarking schema but techniques proposed so far do
not seem to be robust to all possible attacks and multimedia data processing operations.
Considering the enormous financial implications of copyright protection, there is a need to
establish a globally accepted watermarking technique. The sudden increase in watermarking
interest is most likely due to the increase in concern over IPR. Today, digital data security
covers such topics as access control, authentication, and copyright protection for still images,
audio, video, and multimedia products. A pirate tries either to remove a watermark to
Synopsis-2
violate a copyright or to cast the same watermark, after altering the data, to forge the proof of
authenticity. Generally, the watermarking of still image, video, and audio demonstrate
certain common fundamental concepts. Numerous watermarking applications reported in the
literature depend on the services we wish to support. Thus watermarking techniques may be
relevant in various application areas including Copyright protection, Copy protection,
Temper detection, Fingerprinting etc .
Based on their embedding domain, watermarking schemes can be classified either as Spatial
Domain (The watermarking system directly alters the main data elements, like pixels in an
image, to hide the watermark data) or Transformed Domain (the watermarking system alters
the frequency transforms of data elements to hide the watermark data). The latter has proved
to be more robust than the spatial domain watermarking.
To transfer an image to its frequency representation, one can use several reversible
transforms like Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), or
Discrete Fourier Transform (DFT). Each of these transforms has its own characteristics and
represents the image in different ways. Watermarks can be embedded within images by
modifying these values, i.e. the transform domain coefficients. In case of spatial domain,
simple watermarks could be embedded in the images by modifying the pixel values or the
least significant bit (LSB) values. However, more robust watermarks could be embedded in
the transform domain of images by modifying the transform domain coefficients. In 1997
Cox et.al presented a paper “Secure Spread Spectrum Watermarking for Multimedia” , one of
the most cited paper (cited 2985 times till April’ 2008 as per Google Scholar search), and
after that most of the research efforts are based on this work. Even though spatial domain
based techniques can not sustain most of the common attacks like compression, high pass or