PRN BASED WATERMARKING SCHEME FOR COLOR IMAGES



Similar documents
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

CHAPTER 7 CONCLUSION AND FUTURE WORK

A Digital Audio Watermark Embedding Algorithm

Image Authentication Scheme using Digital Signature and Digital Watermarking

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

WATERMARKING FOR IMAGE AUTHENTICATION

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Security and protection of digital images by using watermarking methods

Multi-factor Authentication in Banking Sector

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Security Based Data Transfer and Privacy Storage through Watermark Detection

Sachin Patel HOD I.T Department PCST, Indore, India. Parth Bhatt I.T Department, PCST, Indore, India. Ankit Shah CSE Department, KITE, Jaipur, India

Reversible Data Hiding for Security Applications

Multimedia Document Authentication using On-line Signatures as Watermarks

Using fractal compression scheme to embed a digital signature into an image


Automatic Stereoscopic Video Object-Based Watermarking Using Qualified Significant Wavelet Trees

Image Compression through DCT and Huffman Coding Technique

An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

CHAPTER 2 LITERATURE REVIEW

Redundant Wavelet Transform Based Image Super Resolution

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

Introduction to Medical Image Compression Using Wavelet Transform

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION

Video-Conferencing System

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

A comprehensive survey on various ETC techniques for secure Data transmission

Turgut Ozal University. Computer Engineering Department. TR Ankara, Turkey

Admin stuff. 4 Image Pyramids. Spatial Domain. Projects. Fourier domain 2/26/2008. Fourier as a change of basis

Resolution Enhancement of images with Interpolation and DWT-SWT Wavelet Domain Components

A Secure Data Transmission By Integrating Cryptography And Video Steganography

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 9, September 2012)

Modeling the Print-Scan Process for Resilient Data Hiding

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Combating Anti-forensics of Jpeg Compression

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

Generating Robust Digital Signature for Image/Video Authentication

Algorithms for the resizing of binary and grayscale images using a logical transform

A Concept of Digital Picture Envelope for Internet Communication

FCE: A Fast Content Expression for Server-based Computing

Source Class Identification for DSLR and Compact Cameras

Experimental DRM Architecture Using Watermarking and PKI

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR

Jpeg2000 Encryption and Its Advantages

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201

Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

A Wavelet Based Prediction Method for Time Series

Wavelet analysis. Wavelet requirements. Example signals. Stationary signal 2 Hz + 10 Hz + 20Hz. Zero mean, oscillatory (wave) Fast decay (let)

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

Friendly Medical Image Sharing Scheme

Introduction to image coding

Simultaneous Gamma Correction and Registration in the Frequency Domain

Technical aspects of Digital Rights Management

Lossless Medical Image Compression using Predictive Coding and Integer Wavelet Transform based on Minimum Entropy Criteria

Safer data transmission using Steganography


Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)

An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding

Enhancement of scanned documents in Besov spaces using wavelet domain representations

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

COMPRESSION OF 3D MEDICAL IMAGE USING EDGE PRESERVATION TECHNIQUE

Triple Security of Information Using Stegnography and Cryptography

Printed Circuit Board Defect Detection using Wavelet Transform

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

WAVELETS AND THEIR USAGE ON THE MEDICAL IMAGE COMPRESSION WITH A NEW ALGORITHM

Performance Analysis of medical Image Using Fractal Image Compression

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition

IMPACT OF COMPRESSION ON THE VIDEO QUALITY

Transcription:

İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Yıl: 5 Sayı:10 Güz 2006/2 s.119-131 PRN BASED WATERMARKING SCHEME FOR COLOR IMAGES Ersin ELBAŞI *, Ahmet M. ESKİCİOĞLU ** ABSTRACT Robust image watermarking is the process of embedding an invisible watermark in an image in order to make it very difficult to remove the watermark after intentional attacks and normal audio/visual processes. A recent DWT-based semi-blind image watermarking scheme leaves out the low pass band, and embeds the watermark in the other three bands into the coefficients that are higher than a given threshold T 1. During watermark detection, all the high pass coefficients above another threshold T 2 (T 2 > T 1) are used in correlation with the original watermark. In our extension to the DWT-based approach, we embed the same watermark in two bands (LL and HH) using different scaling factors for each band. In the watermark detection algorithm, the watermarked RGB (and possibly attacked) image is converted to the YUV model. After computing the DWT of the luminance layer, all the DWT coefficients higher than a given threshold T2 in the LL and HH bands are selected. The next step is to compute the sum Z, where i runs over all DWT coefficients higher than a given threshold T2 in the LL and HH bands. In each band, if Z exceeds T, the watermark is present. Experimental results indicate that detection in the LL band is robust for one group of attacks, and detection in the HH band is robust for another group of attacks. Keywords: Semi-Blind Image Watermarking, Discrete Wavelet Transform, LL Band, HH Band, Attacks PRN a BAĞLI RENKLİ RESİM DAMGALAMA METODU ÖZET Dayanikli resim damgalama gorunmeyen damganin kasitli saldiri ve goruntu islemlerinden sonra damganin silinmesini oldukca zorlastiran resimlere gomulmesi islemidir. DWT ile yapilan yari-kor resim damgalama yontemi LL bantini disari atip, digger uc bandin daha onceden belirlenen basmaktan buyuk katsayilarina gomme yapilir. Damga Ortaya cikarma esnasinda ise, uc banttaki T2 den buyuk katsayilarin gercek damga ile korelasyonu hesaplanir. Bizim genisletilmis DWT algoritmamizda ayni damgayi LL ve HH bantlarina farkli katsayilar kullanarak gommekteyiz. Damga tespitinde ise damgalanmis RGB (ve saldirilmis olmasi mumkun) resim YUV resim modeline cevrilir. Luminance tabakasi DWT ye cevrildikten sonra T2 den buyuk LL ve HH bantlari katsayilari secilir. Sonraki adimda ise toplam Z degeri hesaplanir bu katsayilar icin. Eger Z degeri T degerinden buyuk ise resim damgalanmis, aksi takdirde damgalanmamis demektir. Deney sonuclarimiz LL bantta gommek bir grup saldiriya karsi dayanikli olurken, HH banta gomme diger bir grup saldiriya karsi dayanikli olmaktadir. Anahtar Kelimeler: Yarı- Kör Resim Damgalama, DWT, LL Bant, HH Bant, Saldırılar * The Graduate Center, The City University of New York 365 Fifth Avenue, New York, NY 10016 eelbasi@gc.cuny.edu ** Professors, Department of Computer and Information Science, Brooklyn College The City University of New York, 2900 Bedford Avenue, Brooklyn, NY 11210 eskicioglu@sci.brooklyn.cuny.edu

Ersin ELBAŞI, Ahmet M. ESKİCİOĞLU 1. INTRODUCTION Content owners (e.g., movie studios and recording companies) have identified two major technologies for the protection of multimedia data: encryption and watermarking (Eskicioğlu and Delp, 2001). A digital watermark is a pattern of bits inserted into a multimedia element such as a digital image, an audio or video file. In particular, watermarking appears to be useful in plugging the analog hole in consumer electronics devices. The most important properties of a watermarking system are robustness, invisibility, data capacity, and security. An embedded watermark should not introduce a significant degree of distortion in the cover multimedia element. Robustness is the resistance of the watermark against normal A/V processes or intentional attacks (Elbasi and Eskicioğlu, 2006). Data capacity refers to the amount of data that can be embedded without affecting perceptual transparency. The security of a watermark can be defined to be the ability to thwart hostile attacks such as unauthorized removal, unauthorized embedding, and unauthorized detection. There are basically two approaches to embed a watermark: spatial domain and transform domain (e.g., DCT, DFT, or DWT). In the spatial domain, the watermark is embedded by modifying the pixel values in the original image. Transform domain watermarking is similar to spatial domain watermarking; in this case, the coefficients are modified. Both methods have advantages and disadvantages: One disadvantage of spatial domain watermarking is that the cropping attack might remove the watermark. In a classification of image watermarking schemes, several criteria can be used. Three of such criteria are the type of domain, the type of watermark, and the type of information needed in the detection or extraction process. According to the domain type, we have pixel domain and transform domain watermarking schemes. In the pixel domain, the pixel values are modified to embed the watermark. In the transform domain, the transform coefficients are modified to embed the watermark. Two-dimensional DWT can be implemented using digital filters and downsamplers. Each level of decomposition produces four bands of data denoted by LL, HL, LH, and HH. The LL subband can further be decomposed to obtain another level of decomposition. This process is continued until the desired number of levels determined by the application is reached (Dugad et al., 1998). Another criteria in watermarking is the watermark type: Visual watermark and PRN sequence. The visual watermark is actually reconstructed, and its visual quality is evaluated. The PRN sequence allows the detector to statistically check the presence or absence of a watermark. A PRN sequence generated by feeding a linear or nonlinear generator with a secret key. However, embedding a meaningful watermark is essential in some applications. This watermark could be a binary image, stamp, logo or label. 120

İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Güz 2006/2 2. EMBEDDING and DETECTION In a recent DCT-domain semi-blind image watermarking scheme (Piva et al., 1997) a pseudo-random number (PRN) sequence is embedded in a selected set of DCT coefficients. The watermark is consisted of a sequence of real numbers X = {x 1,x 2,,x M }, where each value x i is chosen independently according to N(0,1). N(µ,σ 2 ) denotes a normal distribution with mean µ and variance σ 2. In particular, after reordering all the DCT coefficients in a zig-zag scan, the watermark is embedded in the coefficients from the (L+1)st to the (M+L)th. The first L coefficients are skipped to achieve perceptual transparency. A DWT-based semi-blind image watermarking scheme follows a similar approach (Dugad et al., 1998). Instead of using a selected set of DWT coefficients, the authors leave out the low pass band, and embed the watermark in the other three bands into the coefficients that are higher than a given threshold T 1. During watermark detection, all the high pass coefficients above another threshold T 2 (T 2 T 1 ) are used in correlation with the original watermark. In both of the above papers, the value of α is chosen as 0.2. In our extension to the DWT-based approach, we embed the same watermark in two bands (LL and HH) using different scaling factors for each band. Two-dimensional DWT can be implemented using digital filters and downsamplers. Each level of decomposition produces four bands of data denoted by LL, HL, LH, and HH. The LL subband can further be decomposed to obtain another level of decomposition. This process is continued until the desired number of levels determined by the application is reached. Figure 2 shows two levels of decomposition luminance layer of Lena to be watermarked. LL2 LH2 HL2 HH2 HL1 LH1 HH1 (a) Figure 1. (a) Second Level DWT Decomposition, (b) Second Level DWT Decomposition of Lena (b) 121

Ersin ELBAŞI, Ahmet M. ESKİCİOĞLU Proposed watermark embedding and detection algorithms can be summarized as follows: Watermark embedding procedure: 1. Convert the NxN RGB image to YUV. 2. Compute the DWT of the luminance layer. 3. Embed the same PRN sequence into the DWT coefficients higher than a given threshold T 1 in the LL and HH bands: T = {t i }, t i = t i + α t i x i, where i runs over all DWT coefficients > T 1. 4. Replace T = {t i } with T = {t i } in the DWT domain. 5. Compute the inverse DWT to obtain the watermarked image I. Watermark detection procedure: 1. Convert the NxN watermarked (and possibly attacked) RGB image to YUV. 2. Compute the DWT of the luminance layer. 3. Select all the DWT coefficients higher than T 2 in LL and HH bands. 4. Compute the sum z = 1 M = i 1 y i t * i, where i runs over all DWT coefficients > T 2, y i represents either the real watermark or a fake watermark, watermarked and possibly attacked DWT coefficients. α * 5. Choose a predefined threshold T z = 2 t i. M i= 1 * t i represents the 6. In each band, if z exceeds T z, the conclusion is that the watermark is present. 3. EXPERIMENTS Several orthogonal wavelet filters such as the Haar filter or the Daubechies filters can be used to compute the DWT. In our experiments, we obtained the first level decomposition using the Haar filter. The values of α and the threshold for each band are given in Table 1. Table 1. Scaling Factor a and Threshold T Parameters/Bands LL HH α 0.4 3.5 T 1 15 45 T 2 25 55 122

İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Güz 2006/2 Original Lena Watermarked Lena psnr = 46.26 The difference Figure 2. Embedding two Watermarks into an Image Matlab was used for all attacks. The chosen attacks were JPEG compression, resizing, adding Gaussian noise, low pass filtering, rotation, histogram equalization, contrast adjustment, gamma correction, and cropping. JPEG compression psnr = 30.21 (Q=25) Resizing psnr = 31.42 (512 256 512) Gaussian noise psnr = 29.32 (mean = 0, variance = 0.001) Low pass filtering psnr = 33.51 (window size=3x3) Rotation (5 0 ) psnr = 13.81 Histogram equal. psnr = 17.71 (automatic) Contrast adjustment psnr = 15.55 ([l=0 h=0.8],[b=0 t=1]) Gamma correction psnr = 19.77 (1.5) Cropping on both sides psnr = 8.31 123

Ersin ELBAŞI, Ahmet M. ESKİCİOĞLU Scaling psnr=31.25 Collusion psnr=29.41 Rewatermarking psnr=33.62 Jpeg Comp.+gamma Corr. psnr=25.36 Gaussian Noise+Contrast adj. psnr=22.49 Multiple Watermarking psnr=31.08 Figure 3. Attacks on Watermarked Lena In Figures 4-20 we display the detector responses for the real watermark, and 99 randomly generated watermarks. In each figure, the correlation with the real watermark is located at 80 on the x-axis, and the dotted line shows the value of the threshold. LL band (T=0.0035) HH band (T=0.0027) Figure 4. Detector Response for Unattacked Watermarked Lena 124

İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Güz 2006/2 LL band (T=0.0037) HH band (T=0.0015) Figure 5. Detector Response for JPEG Compression: Q=25 LL band (T=0.0040) HH band (T=0.0059) Figure 6. Detector Response for Gaussian Noise LL band (T=0.0054) HH band (T=0.0037) Figure 7. Detector Response for Resizing 125

Ersin ELBAŞI, Ahmet M. ESKİCİOĞLU LL band (T=0.0024) HH band (T=0.0028) Figure 8. Detector Response for Cropping LL band (T=0.0038) HH band (T=0.0057) Figure 9. Detector Response for Low Pass Filtering LL band (T=0.0033) HH band (T=0.0044) Figure 10. Detector Response for Histogram Equalization 126

İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Güz 2006/2 LL band (T=0.005) HH band (T=0.004) Figure 11. Detector Response for Contract Adjustment LL band (T=0.0029) HH band (T=0.0031) Figure 12. Detector Response for Gamma Correction Figure 13. Detector Response for Rotation (5 0 ) 127

Ersin ELBAŞI, Ahmet M. ESKİCİOĞLU Figure 14. Detector Response for Scaling Figure 15. Detector Response for Collusion Figure 16. Detector Response for Rewatermarking 128

İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Güz 2006/2 Figure 17. Detector Response for jpeg Compression Gamma Corr. Figure 18. Detector Response for Gausian Noise + Contrast Adj. detector response 0.012 0.008 0.004 0.000-0.004 1 10 19 28 37 46 55 64 73 82 91 100-0.008-0.012 watermarks detector response 0.006 0.003 0.000 1 10 19 28 37 46 55 64 73 82 91 100-0.003-0.006 w atermarks Figure 19. Detector Response for Gausian Noise + Histogram Equ. 129

Ersin ELBAŞI, Ahmet M. ESKİCİOĞLU detector response 0.012 0.008 0.004 0.000-0.004 1 10 19 28 37 46 55 64 73 82 91 100-0.008-0.012 watermarks Figure 20. Detector Response for Multiple Watermarking 4. CONCLUSIONS In this paper, we have extended the idea by embedding the same watermark in two bands (LL and HH) using different scaling factors and thresholds for each band in RGB color images. In a DWT-based semi-blind image watermarking paper, a watermark is embedded in three bands, leaving out the low pass subband, using coefficients that are higher than a given threshold T 1. During watermark detection, all the high pass coefficients higher than another threshold T 2 (T 2 T 1 ) are chosen for correlation with the original watermark. Our experiments show that for one group of attacks (JPEG compression, resizing, adding Gaussian noise, low pass filtering, and rotation), the correlation with the real watermark is higher than the threshold in the LL band, and for another group of attacks (histogram equalization, contrast adjustment, gamma correction, and cropping), the correlation with the real watermark is higher than the threshold in the HH band. 5. REFERENCES Caldelli R., Barni M., Bartolini F. and Piva A., (2000), Geometric-Invariant Robust Watermarking through Constellation Matching in the Frequency Domain, Proceedings of the 2000 International Conference on Image Processing (ICIP 2000), Vancouver, BC, Canada, September 10-13, 2000, Vancouver, Vol. II, 65-68. Cox I. J., Kilian J., Leighton T. and Shamoon T., (1997), Secure Spread Spectrum Watermarking for Multimedia, IEEE Transactions on Image Processing, 6 (12), 1673-1687. 130

İstanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Güz 2006/2 Dugad R., Ratakonda K., and Ahuja N., (1998), A New Wavelet-Based Scheme for Watermarking Images, Proceedings of 1998 International Conference on Image Processing (ICIP 1998), Chicago, IL, Vol. 2, 419-423. Elbasi E. and Eskicioglu A.M., (2006), A DWT-based Robust Semi-blind Image Watermarking Algorithm Using Two Bands, IS&T/SPIE s 18th Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII Conference, San Jose, CA. Eskicioglu A.M. and Delp E.J., (2001), Overview of Multimedia Content Protection in Consumer Electronics Devices, Signal Processing: Image Communication, 16 (7), 681-699. Eskicioglu A. M., Town J. and Delp E. J., (2003), Security of Digital Entertainment Content from Creation to Consumption, Signal Processing: Image Communication, Special Issue on Image Security, 18 (4), 237-262. Langelaar G.C. and Lagendijk R.L., (2001), Optimal Differential Energy Watermarking of DCT Encoded Images and Video, IEEE Transactions on Image Processing, 10 (1), 148-158. Lee C.H. and Lee Y.K., (1999), An Adaptive Digital Image Watermarking Technique for Copyright Protection, IEEE Transactions on Consumer Electronics, 45 (4), 1005-1015. Lin C.Y., Wu M., Bloom J.A., Cox I. J., Miller M. L. and Lui Y. M., (2001), Rotation, Scale, and Translation Resilient Watermarking for Images, IEEE Transactions on Image Processing, 10 (5), 767-782. Liu R. and Tan T., (2002), A SVD-Based Watermarking Scheme for Protecting Rightful Ownership, IEEE Transactions on Multimedia, 4 (1), 121-128. Pereira S. and Pun T., (2000), Robust Template Matching for Affine Resistant Image Watermarks, IEEE Transactions on Image Processing, 9 (6), 1123-1129. Piva A., Barni M., Bartolini F. and Cappellini V., (1997), DCT-based Watermark Recovering without Resorting to the Uncorrupted Original Image, Proceedings of the 1997 International Conference on Image Processing (ICIP 97), Washington, DC, USA. Zhu W., Xiong Z. and Zhang Y.Q., (1999), Multiresolution Watermarking for Images and Video, IEEE Transactions on Circuits and Systems for Video Technology, 9 (4), 545-550. 131