4

Click here to load reader

Abstract 1. Introduction 2. Image transformmalay/Papers/Conf/ICAPR2003.pdf · [email protected] [email protected] [email protected] Abstract Most of the digital image watermarking

  • Upload
    hatuong

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Abstract 1. Introduction 2. Image transformmalay/Papers/Conf/ICAPR2003.pdf · spmaity@telecom.becs.ac.in malay@isical.ac.in pkn@cs.becs.ac.in Abstract Most of the digital image watermarking

Robust and low cost watermarking using image characteristics

Santi P. Maity Malay K. Kundu Prasanta K. NandiDept. of E&TC Engg. Machine Intelligence Unit Dept. of CS&Tech.

B. E. College (DU), Howrah Indian Statistical Institute, Kolkata B. E. College (DU), [email protected] [email protected] [email protected]

Abstract

Most of the digital image watermarking techniques usepixel values, frequency or other transform coefficientsto embed information without considering the perceptu-ally significant portion of the cover. The present workselects the perceptually significant region of the coverand embeds data in the transform coefficients in orderto design low-cost robust watermarking scheme. Exper-imental results using several benchmark image samplesare reported.

1. Introduction

Advancement in digital techniques and rapid expan-sion of the Internet have created the need of ownershipprotection, authentication and content integrity verifi-cation of intellectual property etc. and the objectivesare fulfilled using digital watermarking [6]. The essen-tial requirements of digital image watermarking are im-perceptibility, robustness, security of the hidden data,embedding rate i.e. capacity, complexity and compu-tation cost etc. Several watermarking schemes for digi-tal images have been proposed in the literatures wheredata are embedded directly in pixel values or in fre-quency or in other transform coefficients of the cover,in order to meet these requirements [5] .

Robustness requirement of image watermarking isachieved if data is embedded in the region bearing es-sential characteristic information of the image such asedges, texture and high gray level curvature pointsetc [7]. This is due to the fact, so long differentcharacteristics regions of an image are not drasticallychanged, hidden data can be extracted faithfully. Thepresent work selects the watermark embedding regionbased on an edge entropy measure of image block.Data embedding in the low edge blocks of the coverimage is resilient against lossy compression but leadsto a large degree of image visual distortion. On theother hand, distortion due to data embedding in thehigh edge blocks, is less visually perceivable but hid-den information might be lost after lossy compression

attack. Hence, an imperceptible and compression re-silient image watermarking can be achieved if mediumedge blocks of the cover image is selected. Resiliencyis increased further if suitable transform coefficients,rather than pixel values of the regions, are used fordata embedding [8]. Transform domain approach in-creases the computation cost of data embedding andrecovery over spatial domain schemes. The selectionof proper transformation, e.g. Walsh, Hadamard etc.reduces the degree of computation cost. The presentwork embeds data in the suitable Walsh coefficientsof the medium edge blocks. The watermark embed-ding regions are selected using edge entropy value ofa block, as discussed in section 3.1, so as to achieve agood compromise between robustness performance andquality of the embedding process.

2. Image transform

The forward (Equation 1) and inverse (Equation 2)kernels of discrete Walsh transform are identical withsigned integer value and are given as follows

g(x, y, u, v) = 1/Nn−1∏i=0

(−1)bi(x)bi(u)+bi(y)bi(v) (1)

and

h(x, y, u, v) = 1/Nn−1∏i=0

(−1)bi(x)bi(u)+bi(y)bi(v) (2)

where bk(z) is the k-th bit in binary representationof z [3].

The signed integer valued kernel does not requirefloating point multiplication when convolved with digi-tal image, thus yields low-cost watermarking. The ker-nels being identical, a single hardware block can beused to implement the forward and inverse transfor-mation.

Page 2: Abstract 1. Introduction 2. Image transformmalay/Papers/Conf/ICAPR2003.pdf · spmaity@telecom.becs.ac.in malay@isical.ac.in pkn@cs.becs.ac.in Abstract Most of the digital image watermarking

3. Watermark embedding and de-coding

We assume that the cover image I is a gray-level imageof size N×N , where N = 2p and the digital watermarkW is a binary image of size M × M where M = 2n.The values of p and n, indicate the size of the coverand the watermark image respectively where p > n,typically (p/n) ≥ 4. The proposed work considers abinary image of size (16×16) as watermark and (256×256), 8 bits/pixel gray image as cover image.

3.1. Watermark embedding

The block based transform domain algorithm uses themedium edge blocks of the cover to hide the watermarksymbol.

Step 1: The cover image is partitioned into (8× 8)blocks. The edge map for each pixel of the blocksare calculated using the conventional gradient opera-tor. The average edge information of the block is cal-culated as

H = −n∑

i=1

pi logpi (3)

where pi is the probability of occurrence of the partic-ular edge value “i” with 0 ≤ pi ≤ 1 and

∑ni=1pi=1.

The edge entropy values are sorted in ascending or-der and the blocks with the smallest and largest M2

edge entropy values are termed as low and high edgeblocks. The other M2 blocks corresponding to the edgeentropy values lying between [(N2/(p2 ∗ 2)]-M2/2 and[(N2/(p2 ∗ 2)]+M2/2 in the ascending order are calledmedium edge blocks. It is a gratifying attribute of thisspatial domain feature selection that offers the mer-its of transform domain approach, through the use ofgradient computation.

Step 2: Before data embedding, the binary wa-termark is spatially dispersed using a cryptic key k1

generated by a linear feedback shift register [1]. Thespatially dispersed watermark symbol is denoted by L1.

Step 3: Walsh transformation is applied on eachselected block of the cover and the highest Walsh co-efficient (ignoring its sign) other than DC coefficienti.e. max(Hu,v,b)�=H0,0,b is selected where b denotes theblock. The integer part of the coefficient is denoted byHu,v,b. A suitable LSB of Hu,v,b, is replaced by onewatermark pixel value from spatially dispersed water-mark symbol L1. The fractional part of max(Hu,v,b) isnow appended with the modified Hu,v,b value for eachsuch block.

A look up table is formed that contains the locationsof the selected blocks within the cover and also the

positions of the desired highest coefficients within thecorresponding selected blocks.

Step 4: Block-based inverse Walsh transformationis next applied on the set of blocks obtained after wa-termark embedding in step 3. These sets of blocks andnon-watermarked blocks of the cover image are thenplaced in the proper positions of the cover image toobtain the stego image.

3.2 Watermark decoding

The decoding of watermark symbol requires the cryp-tic (LFSR) key k1 and the look up table. The stegoimage with or without external attacks is partitionedinto non-overlapping block of size (8×8) pixels. Block-based Walsh transformation is then applied to all theblocks selected and one watermark pixel value is ex-tracted from the proper bit of the binary representa-tion of the desired Walsh coefficient using the look uptable.

A quantitative estimation of extracted imageW

′(x, y) may be expressed as normalized cross corre-

lation (NCC) where

NCC =

∑x

∑y W (x, y)W

′(x, y)∑

x

∑y[W (x, y)]2

(4)

which is the cross correlation normalized by the water-mark energy to have the maximum value of NCC to beunity [4].

4. Results

The proposed watermark embedding method is ablock-based transform domain approach, where water-mark bits are inserted in Walsh coefficients of differentblocks. It is obvious that after inverse transform wa-termark information will be distributed over all pixelsin a block. Such permeation of information enhancesthe resiliency of the embedding process.

The present paper uses Peak Signal to Noise Ratio(PSNR) as distortion measure. The PSNR is expressedmathematically in the form given below.

PSNR =XY maxP 2(x, y)∑

x,y [P (x, y) − P̃ (x, y)]2 (5)

where P (x, y) represents a pixel value, whose coordi-nates are (x, y) in the original, undistorted image, andP̃ (x, y) represents a pixel value, whose coordinates are(x, y) in the watermarked (stego) image. The numberof rows and columns in the pixel matrix is denoted byX and Y.

Page 3: Abstract 1. Introduction 2. Image transformmalay/Papers/Conf/ICAPR2003.pdf · spmaity@telecom.becs.ac.in malay@isical.ac.in pkn@cs.becs.ac.in Abstract Most of the digital image watermarking

Relative entropy (Kulback Leibler distance) dis-tance between the cover and the watermarked imageis used here as security measure of the embedded data[2]. If pX [x] and pR[x] denote the probability massfunction (PMFs) of random variables X and R respec-tively, the relative entropy measures the “distance” be-tween the mass functions and may be defined as follows:

D(pX [x] ‖ pR[x]) =∑i=χ

pX [x]log(pX [x]/pR[x]) (6)

where χ denotes the support set along withthe convention that 0 log(0/pR[x])=0 and pX [x]log(pX [x]/0) = ∞.

Fishing Boat (Fig.1(a)) shows an original testimage and the watermarked image (Fig.1(c)) usinglogo/hidden symbol M (Fig.1(b)) is shown. Peak Sig-nal to Noise Ratio (PSNR) between the stego imageand the original image is about 37.6174 dB and withsecurity(ε) value is 0.005345. The PSNR values forother test images such as Bear, New York, Opera,Lena and Pills are found to be 36.23dB, 32.34 dB,35.56 dB, 38.32 dB and 31.23 dB respectively with thecorresponding security values of 0.006322, 0.006579,0.007122, 0.005967 and 0.005433.

Figure 1: (a): Test image, (b): Watermark image,Fig.(c): Watermarked image

Mean and Median Filtering

Extracted watermark (Fig.2(a))(NCC=0.81) fromblurred version of the watermarked image (Fig.2(b))(after mean filtering) with PSNR 23.5663 dB isshown. Extracted watermark (Fig.3(b)) (NCC=0.97)from distorted watermarked image (Fig.3(a)) withPSNR=25.70 dB after median filtering (after thirdtimes with window size 3x3) is shown. Similar resultsare obtained for other test images.Change in gray level dynamic range

The watermarked image (Fig.4(a)) (PSNR= 22.85 dB)after changing dynamic range from 255-1 to 200-50

Figure 2: (a): Watermarked image after mean filtering,(b): Extracted watermark

Figure 3: (a):Watermarked image after median filter-ing, (b): Extracted watermark

is shown. Extracted watermark symbol (Fig.4(b)) isshown with NCC=0.92. Similar results are obtainedfor other test images.

Figure 4: (a): Watermarked image after dynamic rangechange, (b): Extracted watermark

JPEG CompressionThe extracted watermark (Fig.5(b))(NCC= 0.85) fromwatermarked image (Fig.5(a)) after JPEG opera-tion (PSNR=18.73dB) with Compression Ratio (C.R.)45.25 is shown. Resiliency of the proposed schemeagainst JPEG operation with high compression ratioare of the same order for all other test images.Manipulation of LSB(s)

The distorted stego image (Fig.6(a)) (PSNR=35.23dB) by simultaneously complementing three least sig-

Page 4: Abstract 1. Introduction 2. Image transformmalay/Papers/Conf/ICAPR2003.pdf · spmaity@telecom.becs.ac.in malay@isical.ac.in pkn@cs.becs.ac.in Abstract Most of the digital image watermarking

Figure 5: (a): Wtermarked image after JPEG com-pression, (b): Extracted watermark

nificant bits of all pixels in the stego image is shown.The extracted watermark symbol (Fig.6(b)) is shownwith an NCC value of 0.89. Similar results are obtainedfor other test images.

Figure 6: (a):Watermarked image after bit manipula-tion, (b): Extracted watermark

Image sharpening

The stego image (Fig.7(a)) (PSNR=18.56 dB ) af-ter image sharpening operation is shown and the ex-tracted watermark symbol (Fig.7(b)) is shown whoseNCC value is 0.82. Similar results are obtained forother test images.

Figure 7: (a): Watermarked image after sharpening,(b): Extracted watermarkAdditive noise

The noisy watermarked image (Fig.8(a))(PSNR=30.56dB ) obtained after changing the gray value by 15 per-cent, for 15 percent randomly selected pixels of the wa-termarked image is shown. The extracted watermark

symbol (Fig.8(b)) is shown with NCC= 0.88. Similarresults are obtained for other test images.

Figure 8: (a): Watermarked image after noise addition,(b): Extracted watermark

5. Conclusions

The present paper proposes a block-based digital im-age watermarking scheme in transform domain withlow computation cost. The scheme is resilient againstdifferent types of unintentional as well as deliberatesattacks. The extraction of hidden data does neitherrequire the cover/the stego nor the symbol except thelook up table and the key. Further research work isgoing on to improve the robustness efficiency againstvarious attacks and hardware design of the proposedscheme.

References

[1] G. R. Cooper. Modern Communications and SpreadSpectrum. McGraw Hill International, 1986.

[2] T. M. Cover and J. A. Thomas. Elements of Informa-tion Theory. John Wiley & Sons, 1991.

[3] R. Gonzalez and R. E. Woods. Digital Image Process-ing. Addison-Wesley, 1992.

[4] C. T. Hsu and J. L. Wu. Hidden digital watermarksin images. IEEE Transactions on Image Processing,8(1):58–68, 1999.

[5] T. L. Ingemer J. Cox, Joe Kilian and T. Shamoon.Secure spread spectrum watermarking for multimedia.IEEE Transactions on Image Processing, 6(12):1673–1687, 1997.

[6] S. Katzenbesser and F. A. P. Petitcolos. InformationHiding Technique for Steganography. Artech House,2000.

[7] S. K. B. M. Kutter and T. Ebrahimi. Towards secondgeneration watermarking schemes. In Proceedings ofthe Sixth International Conference on Image Process-ing, pages 320–323, 1999.

[8] M. Ramkumar and A. N. Akansu. Capacity estimatesfor data hidding in cmpressed images. IEEE Transac-tions on Image Processing, 10(8):1252–1263, 2001.