Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Alessandra Lumini DEIS - CSITE-CNR - Universit di Bologna viale Risorgimento 2,40136 Bologna - Italy. alumini@deis.unibo.it Abstract
A wavelet-based image watermarking scheme is proposed, based on the insertion of pseudo-random codes in the frequency domain. The original image is required for the watermark detection. The strength of the signature to be embedded depends on the image to be marked, thus fitting signal capacity. The experimental results prove that the method is more tamper resistant and less perceptible for any type of images than other well-known private methods in the frequency domains.
Dario Maio DEIS - CSITE-CNR - Universit di Bologna viale Risorgimento 2,40136 Bologna - Italy. dmaio@deis.unibo.it
The experimental results prove that the method is more tamper-resistant and is less perceptible for any type of images, include cartoons, that are usually hard to be marked, and requires lower computational costs in comparison with the COX approach. The paper is structured as follows. In section 2 the main watermarking approaches in the literature are reported; particular emphasis is given to the COX method that is described in section 3. In section 4, a detailed analysis of the new method to insert a watermark in the wavelet domain is reported. Experimental results and some comparisons with COX are included in section 5. Finally, section 6 draws some concluding remarks and includes proposals of future work.
1. Introduction
With the coming and the expansion of the World Wide Web an increased amount of digital information, such as documents, images audio and video data become available to a large number of people. Since the digital network is often used to offer digital media for profit, there is a strong need for copyright protection and a considerable interest in methods for inserting in a multimedia document a visible, or preferably invisible, mark to identify the owner. A watermark (or digital signature) is an identification code that can be embedded in a multimedia document, in particular in images, video or audio sequences or directly in a text. It can be used to identify the document owner, to discourage unauthorized document copying and distribution, and, possibly, to earn royalties. To be effective a watermark scheme should be imperceptible, easily extractable and reliable, unambiguous and robust against common signal transformations and tampering. In this work we describe a new watermarking technique directed to images. Our approach is derived from the method proposed by Cox et al.[1] (called COX in the following), which was, in our opinion, one of the most promising approaches to insert the watermark in the frequency domain. Our scheme is based on the discrete wavelet transformation of the image, and encodes the signature by an inserting function depending on the image to be marked, thus able to fit signal capacity.
2. Related work
Existing digital watermarking schemes can be classified into private and public (also called blind) depending on the requirement of the original image during the detection process; most existing methods are private and typically they subtract the original image from the watermarked one before a detection algorithm is applied. Of course, blind watermarking techniques are less robust and are therefore more suitable for applications requiring lower security than copyright protection, such as authorized copying distribution in electronic commerce. Another classification criterion distinguishes schemes into spatial domain techniques and transform domain techniques depending on whether the watermark is encoded by directly modifying pixels or by altering some frequency bins obtained by transforming the image in the frequency domain [2]. Spatial domain techniques [4][5][5] are simple to implement and often require a lower computational cost, although they can be less robust against tampering than methods which place the watermark in the most perceptually significant components of a transform domain (Fourier, Wavelet, Cosine) [6][7][8][9]. A typical formulation [10] of watermark insertion and detection in the frequency domain of a digital image is the following. The insertion is procedure encoding a signature
into an image I to obtain a marked image , the detection is a decoding procedure in which a signature T is extracted from an image J (possibly different from ) and compared to the searched one W (figure 1). The signature W is assumed to be present in J if the value of a similarity function C(T,W), used to compare the extracted signature T and the original one, is greater than a fixed threshold .
counterfeit original. Barni et al. [11] present a public watermarking algorithm similar to COX that does not need the original for extracting watermarks.
ENCODING
I E W
:70
DECODING
Yes J D I T C No
W
9 0 ,9072,7 574.088 8 , 0.4/ 3 9 2, 0 -
,
%
3.4/ 3 9 0 2, 0 5488 -
574.088 -
394
/ 1107039 1742 3,
,3/ 9 03 .425,70/
1:3.9 43 % 0 47
scheme based on wavelets more robust against geometric attacks, such as cropping and scaling. The watermark transform requires a lower computational cost O(n) than the Fourier or the Cosine transform O(nlog(n)), where n is in the length of the signal to be transformed. The image is decomposed into several bands with a pyramid structure using the Daubechies wavelet family [13], and the watermark is inserted in the most perceptually significant region of the image, spreading the signature over the middle-low frequency coefficients. In such a way an attempt to remove the watermark would cause a strong degradation of the image itself. Only four decomposition steps are performed and the signature is embedded in some frequency bins chosen inside the bands L2 and L3 , highlighted in figure 3. The choice of the frequencies to be altered will be explained in section 4.2; here it is important to remark that we exclude the residual band to make the watermark less perceptible and we do not consider the first high frequencies (bands L1 and L0) to reduce the computational cost of the selection procedure.
inherent large capacity to contain and convey information as opposed to highly incoherent signals, such as white noise, which have little or no capacity to hold information. The concept of coherence has been applied to the noise suppression problem [14]: the noise, considered as incoherence with respect to a set of basis functions, is removed by a thresholding operation that resets the smaller magnitude coefficients. In analogy with this approach we adopt a threshold method to select the coefficient to be modified in the watermark insertion procedure. Consequently, it is expected that a different number of coefficients, depending on the signals degree of coherence, will be modified. The rationale of this scheme lies in the expectations that by embedding the signature in the coherent part of the signal, it is probably less sensitive to noise and it can be removed only at the cost of a deep modification of the original image. A different threshold should be chosen for each image in order to preserve the contribution due to the coherent portion among different images. In fact, by adopting a fixed threshold a large number of coefficients would be modified in images characterized by high frequency values, and a too small number in images with low frequency values. In order to avoid such problems, the threshold has been chosen equal to the average value of the frequency coefficients inside the bands L2 and L3 : = avg L 2 ,L 3
PSNR = 20 log
255 RSME
RMSE =
1 N M
N M
large homogeneous regions the signature remains perceptible, while very detailed images could tolerate a more impressive signature. In order to adapt the coding process to different image typologies, a better estimate of the parameter is given by means of the concept of image local variance. The image local variance is a measure of how much the image is detailed, obtained by evaluating the luminance variations characterizing its pixels.
80 70 60 50 40 30 20 10 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0
sim() PSNR
The watermark recovery process is exactly the inverse of the inserting one and it performs the detection phase by applying the correlation function sim() already introduced in section 3 for the COX method.
5. Experimental results
Experiments are directed to measuring both contrasting quantities that are of direct interest in terms of watermarking performance: Robustness to attacks: the resistance of a watermark to attacks is evaluated by means of the correlation function sim() which gives a confidence value to the effective watermark presence in the image. Perceptual visibility: the distortion produced in the original image by the watermark is calculated by the previously defined PSNR ratio; low values of the PSNR attest high distortion. We have implemented the COX approach and we have compared the performance of the two schemes subjected to some common image distortions: JPEG compression, scaling, cropping, blurring, and sharpening. The test images (256256 gray and color images) have been classified into four groups according to their perceptual characteristics: Detailed images (D): these images are characterized by many details and are more suitable for watermarking, because a more impressive signature can be hidden without degrading the image. Homogeneous images (H): these images are characterized by large zones without color variations and a small amount of details. These are difficult to watermark because the signature is often visible. Normal images (N): these represent most images and they contain both homogeneous regions and details Cartoon images (C): these represent the limit case of homogeneous images; watermarking is very difficult because the watermark has nowhere to hide. Modified bins Watermarked image
:70
,9072,7
74-:893088 ,3/ ; 8 -
;,7
03, 9 0 ;, :0 41 9 0
94 9 0 2, 0
The point local variance for a pixel k is calculated by means of the following formula: d I (x )2 I (x ) xB xB locVk = d2 where B represents a window centered in k with dimensions dd and I(x) represents the luminance value of the pixel x. The number Vs of pixels whose local variance exceeds a fixed threshold (experimentally set to 255) is determined to yield an estimation of as: if < 0.1 0.1 Vs = v = if 0.1 0.5 given NM 0.5 if > 0.5 where N and M are the image dimensions, and v is a weighting factor fixed to 0.45. Figure 3 shows a functional scheme of the method. Original image Local variance
2
Watermark
3 , / 9, 2, 0
Several tests have been carried out to prove the efficacy of our method: Test I: robustness analysis. The images chosen are watermarked by 100 different signature. The average PSNR index and the average value of the sim() function after common image distortion are evaluated. Test II: watermark uniqueness. To prove that the algorithm has very low false positive the response of the detector to 100 randomly generated watermarks of which only one is present in the image is shown. Test III: resistance to collusion. A collusion attack is simulated by averaging five versions of an image each watermarked by a different signature. The presence of the five signatures is evaluated on the resulting image also after common image distortions.
(a)
40 35 30 25 20 15 10 5 0
PSNR
N1 N2 N3 N4 N5 N6 D1 D2 H1 H2 C1 C2
(b)
:70
/ 894790/ ,
Our
090.947 70854380 3 ,-8. 88, 003 9 0 47
Cox
,;07, 0 43 -09 2, 08 3 003 4:7
.42243 ,99,. 8 $ 2 ,7 9
147 9 0
2, 08 -0 43
20,8:70/ -
9 0 !$# ,9072,7 0/
30
20
10
0 ORIG
:70
;07, 0
/090.947
70854380
,1907
3 ,-8. 88,
147 / 1107039
2, 0 570; 4:8
sim()
/090.9 43 1:3.9 43
In figure 5 the performance of our method compared to the COX one shows that the new method is more robust against attacks even with higher values of the PSNR.
:70
,9072,7 8 2, 0 ,3/
,9072,7 9 0
, 38 , ;, :0
experimental results that the proposed method is robust against common image distortions and image compression which do not degrade the image perceptually. Moreover, the proposed method is able to cast watermarks in any kind of image, included cartoon images, which have a very low perceptual capacity, therefore only a little information can be hidden. Finally the DWT approach proposed in this paper requires a low computational cost with respect to other DCT approaches. Future work will be dedicated to the definition and the experimentation of a public method derived from this private one. Research will focus on the search for some features invariant with respect to a large set of image transformations, where a signature can be embedded and subsequently extracted without requiring a comparison between the marked image and the original one.
References
1 3
Sim ()
(a)
16 14 12 10 8 6 4 2 0
11
13
15
17
19
21
23
25
SH
MED
BL
J20
J10
J05
STR
CR
(b)
Our
, 1742 ,9072,7 9 0 1 789 . ,9072,7 8 9 0
Cox
070 02-0//0/ 3 9 0 2, 0 ,8 -003
:70
2, 08 -49 -09 4-9, 30/
,9072,7 8
94 , .4 :8 ;0 ,99,.
6. Conclusions
In this work we have dealt with the problem of inserting a digital watermark in an image for copyright protection and document authentication. We followed the idea of inserting a watermark into most perceptually significant coefficients of the frequency domain. In particular, a sequence of pseudorandom numbers with a gaussian distribution is embedded in selected wavelet coefficients. The contribution of our approach is the idea of making both the length and the strength of the wavelet sequence dependent on the image to be marked, by means of the concepts of perceptual capacity. In such a way a better fidelity of the watermarked image to the original one is achieved, ensuring, at the same time, a strong resistance against attacks. It has been demonstrated by
[1] I. Cox, J. Kilian, T. Leighton and T. Shamoon. Secure Spread Spectrum Watermarking for Multimedia, NEC Research Inst. Tech. Report, 95-10, 1995. [2] I. Cox, M.L. Miller. A review of watermarking and the importance of perceptual modeling. In Proc. of SPIE Human Vision and electronic imaging II, v. 3016, pp92-99, 1997. [3] G. B. Rhoads. Identification/authentication coding method and apparatus. World Intellectual Property Organization, WIPO WO 95/14289, 1995. [4] W. Bender, D. Gruhl, N. Morimoto. Techniques for data hiding. In Proceedings of SPIE, vol. 2420, pp. 40, Feb 1995. [5] G. Caronni. Assuring ownership rights for digital images. In Proceedings Reliable IT System, VIS95. Vieweg Publishing Company, pp. 251-263, 1995. [6] F. M. Boland, J. J. K. Ruanaidh and W. J. Dowling. Watermarking digital images for copyright protection. In IEEE Proceedings on Vision, Signal and Image Processing, v. 143, n. 4, pp. 250-256, 1996. [7] I. Pitas. A method for signature casting on digital images. In Proc. of the International Conference on Image Processing, v. 3, pp 215 - 218, 1996. [8] E. Koch and J. Zhao. Towards robust and hidden image copyright labaleing. In Proc. of IEEE Workshop of Nonlinear Signal and Image Processing, Halkidiki, Greece, 1995. [9] D Kundur and D Hatzinakos. Digital watermarking using multiresolution wavelet decomposition. In International Conference on Acoustic, Speech and Signal Processing (ICASP), Seattle, USA, v 5 pp. 2969-2972, 1998. [10] S. Craver, N. Memon, B. Yeo and M. Yeung. Can Invisible Watermarks Resolve Rightful Ownerships?. IBM Research Report, RC 20509, 1996. [11] M. Barni, F. Bartolini, V. Cappellini and A. Piva, A DCTdomain system for robust image watermarking, Signal Processing, v. 66, n. 3, pp. 357-372, 1998 (Special Issue on Watermarking). [12] A. Teolis. Computational Signal Processing with Wavelets. Birkhauser, 1998. [13] I. Daubechies. Wavelets. Philadelphia. S.I.A.M. 1992. [14] D.L. Donoho, De-noising by soft thresholding, IEEE Trans. Information Theory, v. 41, n. 3, pp. 613-627, 1995.
20
Sim()