2. The Proposed Watermarking Scheme

advertisement
Multi-Layer Multiple-Key Digital Image Watermarking Scheme
Lim Say Yarn, Khoo Bee Ee
School of Electrical & Electronic Engineering
University Sains Malaysia, Engineering Campus,
14300 Nibong Tebal, Seberang Perai Selatan, Penang
Tel: +604-5937788, Fax: +604-5941023
{eeyarn@eng.usm.my, beekhoo@eng.usm.my}
Abstract
As the result of the rapid usage of internet, the issue of
Intelligent Property Right (IPR) becomes more and more
important. The widespread distribution of digital media and
imagery over internet makes the protection of copyright
become increasingly significant. Watermarking technique was
introduced to protect the owner’s copyright on their media.
This paper introduces a new watermarking scheme which
embeds the watermark into the digital images for the protection
of owner’s copyright. The proposed watermarking scheme
embeds multiple watermarks into the digital image and
therefore generates multiple key to extract the watermarks. The
image is first decomposed into frequency domain using
stationary wavelet transform and the watermark is embedded
into selected location of frequency coefficients using
significant key. The watermark embedding algorithm takes into
account the contrast of the frequency coefficients when
embedding the watermark information in order to reduce the
effects of the modifications that can be perceived by the human
eyes. This new watermarking scheme shows its robustness
against some common signal processing attacks.
Keywords---Digital image watermarking, Copyright protection.
1. Introduction
Nowadays, most of the data are saved in digital format.
The advantages of saving the data in digital format are easy for
creation, modification and distribution. The rise of Internet
usage over the past few years has produced a diverse range of
dynamic and highly interactive environment for this digital
information exchange. However, the efficiency of information
exchange and manipulation results the issue of copyright
protection become increasingly significant. The possibility of
unlimited copying of digital media without any loss of quality
may cause the media producers and content providers a
considerable financial loss. Watermarking technique was
introduced to protect the owner’s copyright on their media
[Hartung and Kutter. 1999].
Digital watermarking is a technique that hides the owner’s
copyright information, also called watermark, imperceptibly
into the digital media before distributed it in the internet [Cox
et al. 2002]. This copyright information can be extracted out for
verification when it is required. The performance of
watermarking schemes can be evaluated based on a set of
defining properties [Cox et al. 2002]. For copyright protection,
these properties include:

Perceptual invisibility, where the watermarks are
imperceptible after embedded into the image.

Robustness to common signal processing operation,
such as lossy compression, halftoning, spatial
filtering, printing and scanning, and geometric
distortion.

Accurate detection of a correct watermark from a
watermarked image. It also refers as false positive
rate.

Ability to determine the true owner of the image
based on the security key and the extracted
watermark information.
Early work on digital watermarking for still image focused
on information hiding on spatial domain. For example, ChangHsing Lee, and Yeuan-Kuen Lee in [Chang-Hsing and YeuanKuen. 1999] embed the watermark by modifying the image
intensity value. In [Van Schyndel et al. 1994], R. G. van
Schyndel et al. proposed a watermarking scheme which embed
the watermark by changing the least significant bit (LSB) of the
image intensity value. However, watermark that is embedded in
spatial domain are claimed that not robust enough for the use of
copyright protection [Wolfgang et al. 1999], [Cox et al. 1997].
The watermarks that are embedded in spatial domain will easily
be removed by common filtering process. Besides that, some of
the spatial domain watermarking scheme are unable to detect
the embedded watermark when the watermarked image
underwent geometrical distortion like additional of noise.
Therefore, recent watermarking research focused on embedding
watermark in frequency domain. Cox et al. in [Cox et al. 1997]
proposed a well-known frequency domain watermarking
scheme called spread spectrum watermarking technique. He
firstly decomposed the host image into frequency domain using
Discrete Cosine Transform (DCT). His watermark was a
construction of independent and identically Gaussian random
vector watermark. The watermark is embedded in a spreadspectrum-like fashion of the perceptually most significant
spectral component of the DCT coefficients of host image. The
watermarked image was more robust against common signal
processing operations as compared with spatial domain
watermarking scheme because the watermark spread all over
the frequency coefficients. Xia, Boncelet, and Arce [Xia et al.
1997] used the Discrete Wavelet Transform (DWT) to
decompose the host image and embedded the modeled
Gaussian noise watermark into the middle and high frequency
bands of DWT coefficients. The decoding process calculated
the cross correlation between the DWT coefficients of host
image and watermarked image. Muhammad Shafique Shaikh
and Yasuhiko Dote in [Muhammad Shafique Shaikh and
Yasuhiko Dote. 2003] proposed a similar DWT watermarking
scheme. They transform the watermark and host image into
frequency domain and embed the watermark coefficients at
different transformation level with a novel procedure.
Watermark is extracted by inverse transformation at every level
and by feeding the residual marked image to the subsequent
level. Extracted watermark is then estimated by taking mean
value of the watermarks obtained from every level. The
watermarking scheme proposed by Kunder and Hatzinakos
[Kundur and Hatzinakos. 1997] also embedded the watermark
in the wavelet domain. The strength of the embedded
watermark was based on the contrast sensitivity value of the
host image. The result was robust to additive noise, rescanning
and JPEG compression.
In this paper, we proposed a new wavelet transformation
watermarking scheme for digital images. This watermarking
scheme was motivated from the watermarking scheme
proposed by Chang-Hsing Lee, and Yeuan-Kun Lee in [ChangHsing and Yeuan-Kuen. 1999]. Unlike their watermarking
scheme, our watermark was embedded in frequency domain.
Most of the network-based images are stored in compressed
format and that wavelets play an important role in the
upcoming compression standards such as JPEG2000. Therefore,
in our watermarking scheme, we implement wavelet transform,
which is using stationary wavelet transform (SWT) [Nason and
Silverman. 1995] on the host image. We transform the host
image into SWT coefficients before the watermark is
embedded. Embedding the watermark in high-pass wavelet
coefficients will not impact the watermarked image visual
fidelity [Cox et al. 1997].
Besides that, to solve the draw back of symmetric
watermarking scheme which is mentioned in [Scott Craver and
Katzenbeisser. 2001], there are more than one watermark will
be embedded into the host image in our watermarking scheme.
Embedding multiple watermarks into the host images generates
multiple security keys for the watermark extraction process. An
attacker may remove one or two of the embedded watermark if
he knows the watermark extraction key. However, the attacker
may not be able to remove all the embedded watermarks if he
lacks of all the watermark extraction keys. Closet point attack
may remove all the embedded watermarks [Mauron Barni et al.
2003]. Unfortunately, it is hard to remove the watermarks
without degrading of the perceptual quality of the image.
Therefore, in our watermark extraction process, the correct
security key is required to extract a particular watermark. In
real application process, client will receive only one
watermarking key for the verification process so that the
disclosure of that watermarking key will not remove all the
embedded watermarks. Thus, the image’s copyright is still
under protection.
In the following section, we describe the proposed
watermarking scheme in detail. We also test the watermarking
scheme against some common signal processing distortion. The
experimental result shows that the watermark still can be
extracted and correctly identified after the attacks.
The embedded watermark is a visually recognizable
binary logo rather than a randomly generated sequence bits.
Thus, in watermark extraction process, the extracted watermark
can easily be identified by human eyes. The watermark
embedding algorithm adaptively modifies some selected SWT
coefficients of host image and these modifications are not
noticeable to human eyes.
In the following subsection, we describe the watermark
permutation process, watermark embedding and extraction
process. General block diagram of the proposed watermarking
scheme is shown in Figure 1.
2.1. Watermark Permutation Process
The original watermark is a binary logo. The watermark
logo is first permuted into scrambled data before insertion
process. This watermark permutation process prevents the
watermark from tampering or unauthorized access by attackers.
The watermark permutation process is same as that proposed in
[Hsu and Wu. 1999]. Initial random seed of this permutation
process was saved as a part of the security key in watermark
extraction process.
2.2. Watermark Embedding Process
The host image is first decomposed into frequency domain
using stationary wavelet transform (SWT). The advantage of
using SWT is the size of the decomposed coefficients is
equivalent to the size of the host image. Thus, the number of
coefficients that can embed one bit watermark is increased. To
keep the invisibility of watermark on watermarked image, the
watermark is embedded into the middle and high frequency
band of SWT coefficients. A bit of watermark pixel value (0 or
1) is embedded in a block of SWT coefficients. SWT
coefficients in the block are adaptively modified to maximize
the robustness. The watermark insertion method is described as
follows:
1. Decompose host image using Stationary Wavelet
Transform (SWT).
2. Select a block, P of size nxn SWT coefficients. It is
done by generate a pseudo-random number sequence
using a seed value k.
3.
Compute the average coefficient
p mean , maximum
p max , minimal coefficient p min and
standard deviation  p of the block P .
Classify every coefficient in block P into 2
categories, Z H and Z L , using p mean :
cij  Z H if cij  pmean
coefficient
4.
cij  Z L
where
c ij
block
P.
if cij  pmean ,
represents the SWT coefficient of the
mH and m L of
2. The Proposed Watermarking Scheme
5.
Compute the mean values,
categories.
The proposed wavelet-based watermark embedding and
extraction scheme is similar to the watermarking scheme which
is proposed in [Chang-Hsing and Yeuan-Kuen. 1999].
However, instead of embedding the watermark into the spatial
domain, we embedded the watermark into the stationary
wavelet transform coefficients of host image.
6.
Given the value of watermark
the SWT coefficients in
rules:
these 2
bw is 0 or 1, modify
block P according to the
if bw  1;
T
cij  p max
if cij  m H ,
cij  p mean
if m L  cij  p mean ,
'
'
cij  cij   p otherwise,
'
where
if bw  0;
if cij  m L ,
cij  p mean
if p mean  cij  m H ,
'
cij  cij -  p otherwise,
'
where
7.
8.
9.
cij
'
is the modified SWT coefficient.
The modified block of SWT coefficients,
Pnew is
then positioned back to the same location as from the
host image.
Repeat the process to embed another watermark by
changing different seed value k. This seed value k is
saved as a part of the security key besides the key
that used in watermark permutation process.
Reconstruct the new set of SWT coefficients to get
the watermarked image.
From the embedding algorithm, the watermark bit is
embedded depending on the content of each block of SWT
coefficients. The larger the contrast value (
p max , and p min ),
the more the SWT coefficients is modified. Besides that, the
sum of SWT coefficients of original block P will be larger
than that of modified block
value
bw is
Pnew
mn
m


 A Bmn  B
if the inserted watermark

n



2 
2

  Amn  A   Bmn  B 
 m n
 m n

Amn and A represent the extracted watermark value and
its average value respectively, and
cij  p min
'
 A
Bmn and B represent
the
original watermark value and its average value respectively.
We calculate the two dimensional correlation coefficient
between the extracted logo and the original logo and compare it
with a threshold value to decide if the watermarks match. The
threshold value was chosen as T = 0.50 based on the fine
tuning experimental result.
3. Performance Evaluation
In our experiment, we have chosen a three-level stationary
wavelet transform using Haar filter for a size 512x512 Lena
image and our watermark logo size is 55x55. The block P was
chosen as size 4x4. Therefore, the minimum number of
watermark that can be embedded was four. In this paper, we
just embed three same watermark logos into the selected
location of the host image. Figure 2 shows the output images of
the proposed watermarking scheme and the differences
between host image and watermarked image. Watermarked
image retained the quality of the host image while keeping the
embedded watermark imperceptible. Table 1 shows the
correlation coefficient measurement for the watermark logo
extraction process. As shown in Table 1, the correlation
coefficient value for the extracted watermarks from a
watermarked image without any attacks are all above the
threshold value.
1. On the other hand, if the inserted watermark
value is 0, the sum of coefficients of block
Pnew
will be
smaller than that of P .
2.3. Watermark Extraction Process
The watermark extraction process is the reverse order of
the embedding process. The original image is required for the
extraction process. Based on the security key, the block that
embedded watermark was extracted. The sum of the SWT
coefficients of host image and watermarked image,
Sw
So
and
respectively, in the block are computed. The retrieved
watermark bit value is determined by comparison of the two
resultant values:
bw  1
if S w  S o ,
bw  0 otherwise.
The decoded watermark bit values,
bw
'
s, are then inversely
permuted to get the reconstructed watermark. The decision as
whether there is a watermark in the image is based on the
correlation coefficient measurement, using the formula:
Figure 2 Watermarking Scheme Output Images
Performance of the proposed approach is evaluated under
‘Salt & Pepper’ noise attack and JPEG compression. Figure 3
shows the attacked watermarked images while Figure 4 shows
one of the extracted watermark logo from the JPEG
compression 90%. The watermarked image was undergoes
‘Salt & Pepper’ noise attack with noise density (ND) 0.005 and
0.01. The extracted watermark logo’s correlation coefficient
values are shown in Table 1. From the result, the correlation
coefficient values are above the threshold value except two
watermark logo for noise density 0.01 of ‘Salt & Pepper’ noise
attack. Therefore, we may conclude that our watermarked
images are robust to a level of ‘Salt & Pepper’ noise attack.
References
Hartung, F. and Kutter, M. 1999. Multimedia Watermarking
Techniques. Proc. IEE, vol. 87, IEEE Press, Piscataway,
N.J., pp. 1079-1107, July.
Cox, I. J., Matthew L. Miller, Jeffrey A. Bloom. 2002. Digital
Watermarking. Morgan Kaufmann Publishers.
Figure 3 Watermarked Images with Noise Attack
and JPEG Compression
Chang-Hsing, Lee and Yeuan-Kuen, Lee. 1999. An Adaptive
Digital Image Watermarking Technique for Copyright
Protection. IEEE Transactions on Consumer Electronics
Vol. 45, No. 4, November.
Van Schyndel, R. G., Tirkel, A. Z., and Osborne, C. F. 1994. A
Digital Watermark. In Proc. Int. Conf. Image Processing
(ICIP), vol. 2, pp. 86-89.
Wolfgang, R. B., Podilchuk, C. I. and Delp, E. J. 1999.
Perceptual Watermarks for Digital Images and Video.
Proceedings of the IEEE, vol. 87, no. 7, pp. 1108-1126.
July.
Figure 4 Extracted Watermark Logo for JPEG
Compression 90%
Lena image also compressed with quality 95%, 90% and
85% after the watermark logo is embedded. From Table 1, all
the correlation coefficient values are above the threshold value,
except the correlation coefficient value for Logo 1. Although
one of the embedded watermark logo cannot be detected, the
others two watermark logos can successfully be detected. Thurs,
we may conclude that the watermark is positively detected after
the watermarked image has been undergone JPEG compression.
Images
Watermarked
Image
‘S&P’ Noise
( ND=0.005)
‘S&P’ Noise
( ND=0.01)
JPEG 85%
JPEG 90%
JPEG 95%
Correlation Coefficient Value (T=0.45)
Logo 1
Logo 2
Logo 3
0.6975
0.6114
0.6585
0.6544
0.5352
0.5486
0.6245
0.4430
0.4709
0.3158
0.3856
0.4977
0.5164
0.5541
0.5933
0.5000
0.5541
0.6304
Table 1 Correlation Coefficient Measurement
4. Conclusions
We described a stationary wavelet transform
watermarking scheme where the embedding algorithm can
embed multiple watermarks into one image. To extract each of
the watermarks, the correct security key is required. Therefore,
our watermarking scheme offers extra security feature compare
to others well-known watermarking schemes. Besides that, the
embedded watermark was imperceptible under human visual
inspection and the produced watermarked image closely
retained the quality of the original image. Robustness of the
proposed algorithm is evaluated and the embedded watermark
is successfully detected.
Cox, I. J., Joe Kilian, Tom Leighton, and Talal Shamoon. 1997.
Secure Spread Spectrum Watermarking for Multimedia. In
IEEE Transaction on Image Processing, 6, 12, 1673-1687.
Xia, X., Boncelet, C., and Arce, G. 1997. A Multiresolution
Watermark for Digital Images. Proc. IEEE Int. Conf. on
Image Processing, vol. I, pp. 548-551. Oct.
Muhammad Shafique Shaikh and Yasuhiko Dote. 2003. A
Watermarking Scheme for Digital Images Using Multilevel
Wavelet Decomposition. Malaysian Journal of Computer
Science, vol. 16 No. 1, June. pp. 24-36.
Nason, G. P. and Silverman, B. W. 1995. The stationary
wavelet transform and some statistical applications. Lecture
Notes in Statistics, 103, pp. 281-299.
Scott Craver and Katzenbeisser. 2001. Security Analysis of
Public-key Watermarking Schemes. Proceedings of the
SPIE vol. 4475, Mathematics of Data/Image Coding,
Compression, and Encryption IV, pp. 172-182, July.
Hsu, C.-T., and Wu, J.-L. 1999. Hidden Digital Watermarks In
Images. IEEE Transaction on Image Processing. Vol. 8, No
1, pp. 58-68.
Mauron Barni, Franco Bartolini, and Teddy Furon. 2003. A
General Framework for Robust Watermarking Security.
Signal Processing, vol. 83, Issue 10, pp. 2069-2084, Oct.
Kundur, D. and Hatzinakos, D. 1997. A Robust Digital Image
Watermarking Method Using Wavelet-Based Fusion. ICIP,
Oct. Vol. I, pp. 544-547.
Embedding
Attacks
Security Key
Extraction
Security Key
Original
Image
Watermarked
Image
SWT
Watermark
Insertion
ISWT
Original
Image
SWT
Scrambling
Process
Watermark
Extraction
SWT
De-scrambling
Process
Correlation
Measurement
Figure 1 Block Diagram of Proposed Watermarking Scheme
Download