4
Analysis on Perceptibility and Robustness of Digital Image Watermarking Using Discrete Wavelet Transform Yusnita YUSOF 1 and Othman O. KHALIFA 2 1 Kulliyyah of Engineering, International Islamic University Malaysia, Gombak, P.O Box 10, Kuala E-mail: [email protected] 2 Kulliyyah of Engineering, International Islamic University Malaysia, Gombak, P.O Box 10, Kuala E-mail: [email protected] Abstract: Digital watermarking is distinctive depending on the techniques used and its intended applications. This paper concentrates on invisible digital image watermarking using discrete wavelet transform. The work flow involves watermark embedding, attacks and watermark extraction. Two methods are proposed and analyzed to imply the perceptibility and robustness, among the most important criteria of digital watermarking, using three types of attacks – JPEG compression, blurring and histogram equalization. The results are compared through subjective visual inspections and calculative measurements using PSNR for image perceptibility and SSIM Index for watermark robustness. Keywords: Digital watermarking, wavelet transform, balance multiwavelets (BMW), human visual system (HVS). 1. INTRODUCTION Digital watermarking has been inspired from security concerns over multimedia contents due to the advances of computer technology. Nowadays, it is easy to obtain, manipulate, distribute and store these contents due to evolution of Internet, excellent multimedia tools and low- cost storage devices. Research community and industry has shown extensive interests in developing and implementing digital watermarking. Watermarking techniques can be classified into many types, depending on various aspects. For examples, classification may be based on type of content to be watermarked (i.e. image, audio or video), working domain being used (i.e. spatial or transform), information type (i.e. blind, semi-blind or non-blind) and many others which actually determines its intended applications. Several applications are described by Cox et al. in [1] and Katzenbeisser and Petitcolas in [2]. In earlier days, watermarking techniques are commonly implemented in spatial domain. Over the years, more techniques are being implemented in transform domain including DCT, DFT and DWT. In [3], the authors have made extensive analysis of the watermarking scheme proposed in [4]. Based on their analysis of [4], two different watermarks are embedded in DWT domain by modifying both low and high frequency coefficients. It is observed that the advantages and disadvantages of embedding the watermark in low and middle-to-high frequencies are complement to each other by performing different kind of attacks. As claimed by authors in [3], the scheme has its flaws as it used the same scaling factor for both bands which leads to visible degradation in the image. Thus they generalized the scheme by embedding the same visual watermark in all four bands using first and second level decompositions with different scaling factors. Both [3] and [4] used grayscale cover image and binary visual watermark. In [5], a scheme is proposed by embedding grayscale watermark DWT coefficients into grayscale host image coefficients by using first level decomposition. The scheme enables using watermark size as much as 25% of host image size and provides simple control parameter which is scaling factor to tailor between data hiding and watermarking purposes, with respect to JPEG compression attack. In this paper, two methods are generalized based on the three schemes mentioned above. First level DWT coefficients of grayscale watermark are embedded into second level DWT coefficients of cover image in all subbands. The size of watermark is one forth the size of cover image. Embedding gain is used as control variable to compensate between cover image perceptibility and watermark robustness, by performing three types of attacks –JPEG compression, blurring and histogram equalization. The results are compared and analyzed for three different grayscale images–baby, boat and hill images. 2. PROPOSED METHODS In two-dimensional DWT, each decomposition level yields four bands of data, one low pass band (LL), and International Journal of Computer Sciences and Engineering Systems Vol. 9 No. 1 (June, 2015)

Analysis on Perceptibility and Robustness of Digital Image

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Analysis on Perceptibility and Robustness of Digital Image

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 2, No. 4, October 2008CSES International © 2008 ISSN 0973-4406

Manuscript received May 25, 2008Manuscript revised August 15, 2008

Analysis on Perceptibility and Robustness of Digital ImageWatermarking Using Discrete Wavelet Transform

Yusnita YUSOF1 and Othman O. KHALIFA2

1Kulliyyah of Engineering, International Islamic University Malaysia, Gombak, P.O Box 10, KualaE-mail: [email protected]

2Kulliyyah of Engineering, International Islamic University Malaysia, Gombak, P.O Box 10, KualaE-mail: [email protected]

Abstract: Digital watermarking is distinctive depending on the techniques used and its intended applications. This paperconcentrates on invisible digital image watermarking using discrete wavelet transform. The work flow involves watermarkembedding, attacks and watermark extraction. Two methods are proposed and analyzed to imply the perceptibility androbustness, among the most important criteria of digital watermarking, using three types of attacks – JPEG compression,blurring and histogram equalization. The results are compared through subjective visual inspections and calculativemeasurements using PSNR for image perceptibility and SSIM Index for watermark robustness.

Keywords: Digital watermarking, wavelet transform, balance multiwavelets (BMW), human visual system (HVS).

1. INTRODUCTION

Digital watermarking has been inspired from securityconcerns over multimedia contents due to the advances ofcomputer technology. Nowadays, it is easy to obtain,manipulate, distribute and store these contents due toevolution of Internet, excellent multimedia tools and low-cost storage devices. Research community and industry hasshown extensive interests in developing and implementingdigital watermarking.

Watermarking techniques can be classified into manytypes, depending on various aspects. For examples,classification may be based on type of content to bewatermarked (i.e. image, audio or video), working domainbeing used (i.e. spatial or transform), information type (i.e.blind, semi-blind or non-blind) and many others whichactually determines its intended applications. Severalapplications are described by Cox et al. in [1] andKatzenbeisser and Petitcolas in [2].

In earlier days, watermarking techniques are commonlyimplemented in spatial domain. Over the years, moretechniques are being implemented in transform domainincluding DCT, DFT and DWT.

In [3], the authors have made extensive analysis of thewatermarking scheme proposed in [4]. Based on theiranalysis of [4], two different watermarks are embedded inDWT domain by modifying both low and high frequencycoefficients. It is observed that the advantages anddisadvantages of embedding the watermark in low and

middle-to-high frequencies are complement to each otherby performing different kind of attacks. As claimed byauthors in [3], the scheme has its flaws as it used the samescaling factor for both bands which leads to visibledegradation in the image. Thus they generalized the schemeby embedding the same visual watermark in all four bandsusing first and second level decompositions with differentscaling factors. Both [3] and [4] used grayscale cover imageand binary visual watermark.

In [5], a scheme is proposed by embedding grayscalewatermark DWT coefficients into grayscale host imagecoefficients by using first level decomposition. The schemeenables using watermark size as much as 25% of host imagesize and provides simple control parameter which is scalingfactor to tailor between data hiding and watermarkingpurposes, with respect to JPEG compression attack.

In this paper, two methods are generalized based on thethree schemes mentioned above. First level DWTcoefficients of grayscale watermark are embedded intosecond level DWT coefficients of cover image in allsubbands. The size of watermark is one forth the size ofcover image. Embedding gain is used as control variable tocompensate between cover image perceptibility andwatermark robustness, by performing three types of attacks–JPEG compression, blurring and histogram equalization.The results are compared and analyzed for three differentgrayscale images–baby, boat and hill images.

2. PROPOSED METHODS

In two-dimensional DWT, each decomposition levelyields four bands of data, one low pass band (LL), and

International Journal of Computer Sciences and Engineering SystemsVol. 9 No. 1 (June, 2015)

Page 2: Analysis on Perceptibility and Robustness of Digital Image

234 IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 2, No. 4, October 2008

three high-pass bands (horizontal HL, vertical LH anddiagonal HH).

The proposed methods are illustrated as Method A andMethod B.

As for extraction, the process is reversed for bothmethods.

3. EXPERIMENTS AND RESULTS

Three different images of size 512x512 are used as coverimage with a watermark of size 256x256. The range ofembedding gain used is from 2 to 8.

Figure 2: Method B–embedding

Figure 1: Method A–embedding

Cover image WM

1-level DWT 1-level DWT

2-level DWT Multiply with gain, k

For each cover image’s 1-level subbandcA1, cH1, cV1 and cD1:cA2(i,j) + (k × wmA1 (i,j))cH2(i,j) + (k × wmH 1(i,j))cV2(i,j) + (k × wmV (i,j))cD2(i,j) + (k × wmD1 (i,j)

2-level IDWT

1-level IDWT

WatermarkedImage

Cover image WM

1-level DWT 1-level DWT

2-level DWT Select wmA1 and multiplywith gain, k

For cover image’s 1-level subbandcA1: cA2(i,j) + (k × wmA1 (i,j)cH1: cH2(i,j) + (k × wmA 1(i,j)cV1: cV2(i, j) + (k × wmA 1(i,j)

and cD 1: cD2(i, j) + (k × wmA 1(i,j))

2-level IDWT

1-level IDWT

WatermarkedImage

Figure 3: Cover Images (Baby, Boat and Hill) and Watermark Image

Three types of attacks are performed on thewatermarked images with different embedding gain values.These attacked-watermarked images are then used to extractthe watermark and compared with the original. It is assumedthat the scheme is non-blind where the extraction processrequires original cover image and original watermark.

For qualitative visual inspections, the results of bothmethods are shown only for JPEG compression with k=2and k=8.

Page 3: Analysis on Perceptibility and Robustness of Digital Image

Analysis on Perceptibility and Robustness of Digital Image Watermarking using Discrete Wavelet Transform 235

For quantitative measurements, the cover imageperceptibility is determined using PSNR values while thewatermark robustness is computed using SSIM Index.Detailed information of SSIM Index is explained in [6]. Theresults are shown as graphs.

Figure 4: Watermarked Images and Attacked-Watermarked Images

Figure 5: Extracted Watermark in all Subbands

Figure 6: PSNR and SSIM Index for JPEG Quality 75 Attack

Figure 7: PSNR and SSIM Index for Blurring Attack

Page 4: Analysis on Perceptibility and Robustness of Digital Image

236 IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 2, No. 4, October 2008

Figure 8: PSNR and SSIM Index for Histogram Equalization Attack

4. DISCUSSIONS AND CONCLUSION

Two methods are proposed and presented. The differencebetween the two is in the embedding process where methodA embeds each watermark 1-level coefficients into eachcover image’s 2-level DWT coefficients for all foursubbands, respectively. While method B embeds watermark1-level low-pass (LL) coefficients into chosen 2-level DWTcoefficients based on 1-level subband for all four subbands,accordingly.

Unlike the previous papers, this analysis used threedifferent images to see the effects of image’s characteristicson perceptibility and robustness. With careful inspections,more visible distortions are detected at smooth regions of

the cover image (example baby image) compared to regionswith more textures (example hill image).

Based on the graphs, it is observed that differentembedding gain yields different outcomes of theperceptibility (PSNR) and robustness (SSIM Index). Smallergain reflects with good cover image’s perceptibility but withless robust watermark extraction and vice versa.

Attacks commonly alter either low frequencies or highfrequencies, thus embedding watermark in both bands givesadvantages in terms of robustness. Low frequencieswatermark is robust to attacks with low pass characteristicssuch as compression and blurring, while high frequencieswatermark is robust to modifications such as histogramequalization. Both methods could survive a wide range ofattacks as these watermarks might be destroyed in one band,but could still be extracted from the other bands.

Embedding gain acts as control variable tocounterbalance between image perceptibility and watermarkrobustness in finding the best possible results.

Further improvement includes more attacks to beperformed on both methods to analyze and summarize itsperformance in terms of perceptibility and robustness, beingthe two most important criteria in any watermarking system.

REFERENCES

[1] I. J. Cox, M. L. Miller and J. A. Bloom, DigitalWatermarking, Morgan Kaufmann Publishers, 2002.

[2] S. Katzenbeisser and F. A. P. Petitcolas, InformationHiding Techniques for Steganography and DigitalWatermarking, Artech House, 2000.

[3] P. Tao and A. M. Eskicioglu, “A Robust MultipleWatermarking Scheme in the Discrete Wavelet TransformDomain”, Optics East 2004 Symposium, InternetMultimedia Management Systems Conference V,Philadelphia, PA, USA, Oct. 25-28, 2004.

[4] R. Mehul and R. Priti, “Discrete Wavelet Transform BasedMultiple Watermarking Scheme,” Proc. of IEEE Region10 Technical Conference on Convergent Technologies forthe Asia Pasific, Bangalore, India, Oct. 14-17, 2003.

[5] J. J. Chae and B. S. Manjunath, “A Robust EmbeddedData from Wavelet Coefficients”, Proc. of the SPIEInternational Conference on Storage and Retrieval forImage and Video Databases VI, San Jose, CA, Jan. 28-30, 1998, Vol. 3312, pp. 308-317.

[6] Z. Wang, A. C. Bovik, H. R. Sheikh and E. P. Simoncelli,“Image Quality Assessment: From Error Visibility toStructural Similarity”, IEEE Transactions on ImageProcessing, 13(4), 600-612, 2004.