Final Thesis_6 March Vikas Saxena

Embed Size (px)

Citation preview

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    1/182

     

    DIGITAL IMAGE WATERMARKING

    Thesis submitted in the fulfillment of the Degree of  

    Doctor of Philosophy 

     by

    VIKAS SAXENA

    Department of Computer Science and EngineeringJAYPEE INSTITUE OF INFORMATION TECHNOLOGY UNIVERSITY

    A-10, SECTOR-62, NOIDA, INDIA 

    October, 2008

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    2/182

     

    © JAYPEE INSTITUE OF INFORMATION TECHNOLOGY UNIVERSITY,  NOIDA, INDIAOctober, 2008

    ALL RIGHT RESERVED

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    3/182

     

    SCHOLAR’S CERTIFICATE

    This is to certify that the work reported in the Ph.D. thesis entitled “Digital Image

    Watermarking”  submitted at Jaypee Institute of Information Technology University, 

    Noida, India is an authentic record of my work carried out under the supervision of

    Prof. J.P.Gupta. I have not submitted this work elsewhere for any other degree or diploma.

    (Vikas Saxena)

    Department of Computer Science and Engineering

    Jaypee Institute of Information Technology University, Noida, India

    October 10, 2008 

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    4/182

     

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    5/182

     

    SUPERVISOR’S CERTIFICATE

    This is to certify that the work reported in the Ph.D. thesis entitled “Digital Image

    Watermarking” submitted by Vikas Saxena  at Jaypee Institute of Information

    Technology University, Noida, India is a bonafide record of his original work carried out

    under my supervision. This work has not been submitted elsewhere for any other degree or

    diploma.

    (Prof. J. P. Gupta)

    Vice Chancellor

    Jaypee Institute of Information Technology University, Noida, India

    October 10, 2008 

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    6/182

     

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    7/182

     i

    TABLE OF CONTENTS 

    PageNo. 

    ABSTRACT vii

    ACKNOWLEDGEMENT ix

    LIST OF ACCRONYMS xi

    LIST OF SYMBOLS xiii

    LIST OF FIGURES xv

    LIST OF TABLES xix

    CHAPTER-1

    INTRODUCTION  1

    1. 1 DATA HIDING BACKGROUND 3

    1.1.1 STEGANOGRAPHY VS. WATERMARKING 5

    1.1.2 CRYPTOGRAPHY VS. WATERMARKING 5

    1.1.3 DIGITAL SIGNATURE VS. WATERMARKING 6

    1. 2 APPLICATION AREAS OF DIGITAL WATERMARKING 71.2.1 COPYRIGHT PROTECTION 7

    1.2.2 COPY PROTECTION 7

    1.2.3 TEMPER DETECTION 8

    1.2.4 BROADCAST MONITORING 8

    1.2.5 FINGERPRINTING 9

    1.2.6 ANNOTATION APPLICATIONS 9

    1. 3 CHARACTERISTICS OF WATERMARKING SCHEMES 10

    1. 4 TYPES OF DIGITAL WATERMARKS 11

    1. 5 STRUCTURE OF THE THESIS 15

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    8/182

     ii

    CHAPTER-2

    IMAGE WATERMARKING LITERATURE SURVEY  17

    2.1 SPATIAL DOMAIN BASED WATERMARKING SCHEMES 182.1.1 LSB BASED SCHEMES 18

    2.1.2 PATCH WORK BASED SCHEME 18

    2.1.3 CORRELATION BASED WATERMARKING SCHEMES 19

    2.1.3.1 CORRELATION BASED SCHEMES WITH 1 PN SEQUENCE 19

    2.1.3.2 CORRELATION-BASED IMAGE WATERMARKING SCHEMES

    WITH 2PN SEQUENCES

    19

    2.1.3.3 IMAGE WATERMARKING USING PRE-FILTERING 20

    2.1.4 CDMA BASED IMAGE WATERMARKING SCHEME 20

    2.1.5 OTHER SPATIAL DOMAIN BASED WATERMARKING SCHEMES 21

    2.2 TRANSFORMED DOMAIN BASED SCHEMES 22

    2.2.1 DFT BASED WATERMARKING SCHEMES 22

    2.2.2 DCT BASED WATERMARKING SCHEMES 24

    2.2.2.1 THE MIDDLE-BAND COEFFICIENT EXCHANGE SCHEME 26

    2.2.2.2 DCT-CDMA BASED IMAGE WATERMARKING 28

    2.2.3 DWT BASED WATERMARKING SCHEMES

    292.2.3.1 CDMA-DWT BASED WATERMARKING SCHEME 30

    2.2.3.2 DWT BASED BLIND WATERMARK DETECTION 31

    2.2.3.3 DWT BASED NON-BLIND WATERMARK DETECTION 32

    2.3 RECENT METHODOLOGIES 33

    2.4 PROBLEM STATEMENT FORMULATION 38

    2.4.1 JUSTIFICATIONS OF THE PROBLEM STATEMENT CHOSEN 40

    CHPATER-3

    PRELIMINARIES  45

    3.1 IMAGE ENCODING STANDARDS 45

    3.1.1 JPEG ENCODING 45

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    9/182

     iii

    3.1.2 JPEG2000 ENCODING 53

    3.2 IMAGE QUALITY MEASURES  56

    3.2.1 PEAK SIGNAL TO NOISE RATIO 56

    3.2.2 CORRELATION COEFFICIENT 57

    3.3 TEST DATA 58

    CHAPTER-4

    WATERMARKING OF GRAY IMAGES 61

    4.1 INTRODUCTION 61

    4.2 INCREASING THE ROBUSTNESS OF IMAGE WATERMARKING SCHEMES

    AGAINST JPEG COMPRESSION

    62

    4.3 INCREASING THE ROBUSTNESS OF IMAGE WATERMARKING SCHEME

    AGAINST HISTOGRAM EQUALIZATION ATTACK

    64

    4.4 DEVISING A COLLUSION ATTACK RESISTANT WATERMARKING

    SCHEME FOR IMAGES USING DCT

    68

    4.4.1 G, THE POLICY GENERATOR ALGORITHM 72

    4.4.2 E, THE WATERMARK EMBEDDING ALGORITHM 72

    4.4.3 D, THE WATERMARK DETECTION ALGORITHM 74

    4.4.4 PERFORMANCE OF THE PROPOSED SCHEME 76

    4.4.4.1 PERFORMANCE AGAINST JPEG COMPRESSION 76

    4.4.4.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS 77

    4.4.4.3 COMPARATIVE STUDY WITH OTHER MECHANISMS 77

    4.5 CONCLUSION 79

    CHAPTER-5

    WATERMARKING of COLOR IMAGES 815.1 INTRODUCTION 81

    5.2 PERFORMANCE ANALYSIS OF COLOR CHANNEL FOR DCT BASED

    IMAGE WATERMARKING SCHEME

    81

    5.3 DEVISING AN ICAR WATERMARKING SCHEME FOR COLORED BMP

    IMAGES

    85

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    10/182

     iv

    5.3.1 G, THE POLICY GENERATOR ALGORITHM 86

    5.3.2 COLOR CHANNEL SELECTION 87

    5.3.3 E, THE WATERMARK EMBEDDING ALGORITHM 87

    5.3.4 D, THE WATERMARK DETECTION ALGORITHM 88

    5.3.5 PERFORMANCE OF THE PROPOSED SCHEME 90

    5.3.5.1 PERFORMANCE AGAINST JPEG COMPRESSION 91

    5.3.5.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS 92

    5.3.5.3 COMPARATIVE STUDY RESULTS WITH OTHER SCHEMES 93

    5.4 CONCLUSION 96

    CHAPTER-6

    WATERMARKING OF JPEG IMAGES 97

    6.1 INTRODUCTION 97

    6.2 DEVELOPMG AN ICAR WATERMARKING ALGORITHM FOR JPEG

    IMAGES

    97

    6.2.1 G, THE POLICY GENERATOR ALGORITHM 99

    6.2.1.1 COLOR CHANNEL SELECTION 100

    6.2.2 E, THE WATERMARK EMBEDDING ALGORITHM

    1006.2.3 D, THE WATERMARK DETECTION ALGORITHM 102

    6.2.4 PERFORMANCE OF THE PROPOSED SCHEME 104

    6.2.4.1 COLOR CHANNEL SELECTION AND PERFORMANCE AGAINST

     JPEG COMPRESSION

    105

    6.2.4.2 PERFORMANCE AGAINST IMAGE MANIPULATIONS 106

    6.2.4.3 COMPARATIVE STUDY WITH SIMILAR, STATE-OF-THE-ART

    SCHEMES 108

    6.3 A DWT BASED WATERMARKING SCHEME FOR JPEG IMAGES 111

    6.3.1 EXPLORATION OF DWT DOMAIN 112

    6.3.1.1 ISSUES IN USING DWT 112

    6.3.2 BACKGROUND OF THE PROPOSED SCHEME 114

    6.3.3 DUAL WATERMARKING 115

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    11/182

     v

    6.3.4 THE DWT BASED WATERMARKING 115

    6.3.4.1 P, THE POLICY 116

    6.3.4.2 G, THE POLICY GENERATOR ALGORITHM 116

    6.3.4.3 E, THE WATERMARK EMBEDDING ALGORITHM 118

    6.3.4.4 D, THE WATERMARK DETECTION ALGORITHM 120

    6.3.5 THE DCT BASED WATERMARKING 121

    6.3.6 RESULTS 121

    6.3.6.1 THE VALUE OF “T” 122

    6.3.6.2 PERFORMANCE AGAINST JPEG COMPRESSION 126

    6.3.6.3 PERFORMANCE AGAINST COMMON ATTACKS AND IMAGE

     MANIPULATIONS

    127

    6.3.6.4 COMPARATIVE STUDY WITH DCT BASED SCHEMES 127

    6.3.6.5 COMPARATIVE STUDY WITH DWT BASED SCHEMES 129

    6.4 CONCLUSION 130

    CHAPTER-7

    RESULTS AND CONCLUSION  131

    7.1 SUMMARY

    1317.2 MAIN CONTRIBUTIONS AND HIGHLIGHTS OF THE RESULTS 131

    7.3 FUTURE WORK 132

    REFERENCES 135

    LIST OF AUTHOR’S PUBLICATION 147

    SYNOPSIS

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    12/182

     vi

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    13/182

     vii

    ABSTRACT

    Watermarking has been invoked as a tool for the protection of Intellectual Property Rights(IPR) of multimedia contents. Because of their digital nature, multimedia documents can be

    duplicated, modified, transformed, and diffused very easily. In this context, it is important to

    develop a system for copyright protection, protection against duplication, and authentication

    of contents. For this, a watermark is embedded into the digital data in such a way that it is

    indissolubly tied to the data itself. Later on, such watermark can be extracted to prove

    ownership to trace the dissemination of the marked work through the network, or simply to

    inform users about the identity of the rights-holder or about the allowed use of data.

    This thesis deals the developing the watermarking schemes for digital images stored in both,

    spatial and transformed domain. In this thesis we mainly focus on the Discrete Cosine

    Transform (DCT) based development. To prove its commercial usability, we take special

    care so that at least one attack, having huge financial implications, can be sustained due to

    the in-built capacity of the watermarking scheme. Apart from this, since JPEG is the most

    commonly used image format over WWW, we pay special attention to robustness against

    JPEG compression attack.

    Apart from developing watermarking schemes, we also discuss the selection of color channel

    to be used to carry the watermark data based on the attack that may occur most commonly on

    the watermarked images. We propose to increase the robustness against some attacks by pre-

     processing the images. In this thesis, we also present a correlation between the performance

    of the watermarking scheme against some attacks and the original image characteristics. All

     presented watermarking schemes are robust against common image manipulations and

    attacks.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    14/182

     viii

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    15/182

     ix

    ACKNOWLEDGEMENT

    I am greatly indebted to my supervisor Prof. J. P. Gupta for his valuable technical guidance

    and moral support through out this work. Without his support this thesis would have not been

    completed.

    I would also like to thank to Prof S.L Maskara, Prof Sanjay Goel and faculty members of the

    department who always enlightened me by sharing their research experiences to accomplish

    the quality work.

    My mother provided me all support I needed to complete this thesis and other family

    members specially my wife also helped me a lot in getting me this far.

    Vikas Saxena

    Department of Computer Science Engineering and Information Technology

    Jaypee Institute of Information Technoogy University

     Noida, India

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    16/182

     x

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    17/182

     xi

    LIST OF ACCRONYMS

    CC Correlation CoefficientCDMA Code Division Multiple Access 

    DCT Discrete Cosine Transform

    DFT Discrete Fourier Transform

    DWT Discrete Wavelet Transform

    EBCOT Embedded Block Coding with Optimized Truncation

    EZW Embedded Zero-tree Wavelet

    FFT Fast Fourier Transform

    HH High-High Band of DWT

    HL High-Low Band of DWT

    HVS Human Visual System

    ICAR Inherently Collusion Attack Resistant

    IPR Intellectual Property Right

    JND Just Noticeable Distortion

    JPEG Joint Photographic Expert Group

    LH Low-High Band of DWT

    LL Low-Low Band of DWT

    LSB Least Significant Bit

    MBCE Middle Band Coefficient Exchange

    MSE Mean Square Error

    PN Pseudo-random noise

    PSNR Peak Signal to Noise ration

    PSW Perceptually Shaped Watermarking

    REL Run Length Encoding

    RGB Red Green Blue

    SPIHT Set Partitioning In Hierarchical Trees

    SVD Singular Value Decomposition

    VQ Vector Quantization

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    18/182

     xii

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    19/182

     xiii

    LIST OF SYMBOLS

    D Watermark detection algorithmE Watermark embedding algorithm

    FH High frequency region in an 8 x 8 DCT

    FL Low frequency region in an 8 x 8 DCT

    FM Middle frequency region in an 8 x 8 DCT

    G Policy generator algorithm

    K Watermark strength parameter

    P Policy

    Pi An instance of a policy

    Q JPEG quantization factor

    S Watermark logo converted into string of ‘0’s and ‘1’s

    Sr A single bit of S

    T Watermark strength parameter

    W Watermark logo

    Wi A single bit of the watermark data

    X Original cover image

    Xi An instance of the cover image

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    20/182

     xiv

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    21/182

     xv

    LIST OF FIGURES

    Figure

    No.

    Caption Page

    No.

    1.1 Watermark on the bank currency note 4

    1.2 Various classifications of watermarking 12

    1.3 Image watermark embedding scheme 13

    1.4 Image watermark detection scheme 13

    2.1 FIR Edge Enhancement Pre-Filter 20

    2.2 A General Frequency domain based watermarking model as presented

     by Cox 23

    2.3 Frequency regions in 8 x 8 DCT 27

    2.4 JPEG Quantization matrix 28

    2.5 1-Scale and 2-Scale 2-Dimensional Discrete Wavelet Transform 30

    2.6 The Targeted types of to be developed watermarking schemes 43

    3.1 JPEG Compression Scheme 45

    3.2 An example sub image 46

    3.3 Example sub image after subtracting 128 from each pixel 47

    3.4 DCT of sub image shown in Figure 3.3 47

    3.5 JPEG Quantization matrix 49

    3.6 DCT values after quantization 49

    3.7 JPEG Decompression Scheme 51

    3.8 DCT values regenerated in decompression 51

    3.9 (a) Sub image pixel values (still shifted down by 128) 51

    3.9 (b) Decompressed sub image pixel values 52

    3.10 Error matrix for example sub image 523.11 Test images of Lena, Mandrill, Pepper and Barbara (Gray) 58

    3.12 Test images of Lena, Mandrill, Pepper and Goldhill (Colored) 59

    3.13 Watermark logo used in the proposed schemes 59

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    22/182

     xvi

    4.1 (a) Extracted watermark logos from test images of Lena, Mandrill and

    Pepper by applying DCT based scheme 62

    4.1 (b) Extracted watermark logos from test images of Lena, Mandrill and

    Pepper by applying DWT based scheme 62

    4.2 (a) Extracted watermark logos from test images of Lena, Mandrill,

    Pepper and Barbara by applying DCT based scheme 66

    4.2 (b) Extracted watermark logos from test images of Lena, Mandrill,

    Pepper and Barbara by applying DWT based scheme 66

    4.3 Extracted logos from “original image” (left) and “transformed image”

    (right) of Lena, Mandrill, Pepper and Barbara’s (Top to Bottom)

    histogram equalized images (By applying DCT based scheme) 68

    4.4 Swapping of 4 pairs to hide “0” or “1” in conjunction with low

    frequency values 71

    4.5 Extracted watermark logos after JPEG compression at Q = 20 from

    watermarked Lena, Mandrill and Pepper images 77

    4.6 Extracted watermark logos from Lena’s image after Horizontal

    flipped, scaled, brightness /contrast adjusted and Noising (Left to

    Right, Top to bottom) 784.7 Percentage decrease in quality of extracted watermark with respect to

    JPEG quality factor 79

    5.1 Recovered watermarks for Lena.bmp after jpeg attack at Q = 40 82

    5.2 Watermarked test images keeping T = 150 91

    5.3 Extracted watermark from watermarked Lena, Mandrill and Pepper

    images respectively at T = 150 91

    5.4 Recovered logos from attacked images 94

    5.5 Extracted logos using proposed scheme from highly compressed

    watermarked test images 95

    6.1 Watermarked test images generated by keeping T = 150 105

    6.2 Extracted watermark logos from watermarked Lena, Mandrill, Pepper

    and Goldhill test images respectively at T = 150 105

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    23/182

     xvii

    6.3 Goldhill test image after hiding the watermark logo and the recovered

    logo at T = 100 105

    6.4 Extracted logos from attacked watermarked images 109

    6.5 Comparison of correlation coefficients at Q = 10 110

    6.6 Comparison of correlation coefficients at Q = 5 111

    6.7 2-D Haar DWT 113

    6.8 An example of 2 consecutive DWT blocks 117

    6.9 An example of 2 consecutive DWT blocks 117

    6.10 Watermark embedding approach 120

    6.11 The watermark logo 122

    6.12 Graph of the values shown in Table 6.6 123

    6.13 Extracted logos from Lena, Mandrill and Pepper’s test images 124

    6.14 The extracted logos using DWT based method 125

    6.15 The extracted logos using DCT based method 126

    6.16 Extracted logos from highly compressed JPEG images 126

    6.17 Extracted watermark logos after applying common attacks 128

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    24/182

     xviii

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    25/182

     xix

    LIST OF TABLES

    Table

    No.

    Caption Page

    No.4.1 PSNR (in decibel) of extracted watermark logo from JPEG

    compressed (Q = 20) watermarked image 65

    4.2 PSNR of extracted logos from attacked test images 67

    4.3 PSNR of extracted watermarks after JPEG compression 77

    5.1 PSNR of Extracted watermark from JPEG compressed watermark test

    images 82

    5.2 PSNR of extracted watermark from attacked watermarked test images 84

    5.3 PSNR of extracted watermark logos after JPEG compression 92

    5.4 PSNR of extracted watermark logo from watermarked test images

    after attacks 93

    5.5 PSNR values of extracted logos from highly compressed watermarked

    test images using various schemes 95

    6.1 SD values of color channels for test images 106

    6.2 PSNR and CC of extracted logo by using BLUE channel for all

    images 1076.3 PSNR and CC of extracted logo by using BLUE and GREEN

    channels for images 108

    6.4 CC of the extracted logos 108

    6.5 PSNR of watermarked image and CC of extracted logo for various

    values of T 122

    6.6 Revised Table 6.5 122

    6.7 CC of extracted logos from JPEG2000 attacked images 124

    6.8 Decrement in the PSNR values after the application of DCT based

    scheme 125

    6.9 CC values of the extracted watermark logos recovered by both

    recovery methods 125

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    26/182

     xx

    6.10 CC of extracted logo from highly compressed jpeg image using DCT

     based recovery 126

    6.11 CC of the extracted watermark logos 128

    6.12 Comparison of CC of Extracted logos from JPEG compressed

    (Q = 10) watermarked images 129

    6.13 Comparison of CC of Extracted logos from JPEG compressed

    (Q = 5) watermarked images 129

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    27/182

     1

    CHAPTER 1

    INTRODUCTION 

    The growth of high speed computer networks and World Wide Web (WWW) have explored

    means of new business, scientific, entertainment and social opportunities in the form of

    electronic publishing and advertising, massaging, real-time information delivery, data

    sharing, collaboration among computers, product ordering, transaction processing, digital

    repositories and libraries, web newspapers and magazines, network video and audio, personal

    communication and lots more. The cost effectiveness of selling softwares in the form ofdigital images and video sequences by transmission over WWW is greatly enhanced due to

    the improvement in technology.

    We know that one of the biggest technological events of the last two decades was the

    invasion of digital media in an entire range of everyday life aspects. Digital data can be

    stored efficiently and with a very high quality, and it can be manipulated very easily using

    computers. Furthermore, digital data can be transmitted in a fast and inexpensive way

    through data communication networks without losing quality. Digital media offer several

    distinct advantages over analog media. The quality of digital audio, images and video

    signals are higher than that of their analog counterparts. Editing is easy because one can

    access the exact discrete locations that need to be changed. Copying is simple with no loss

    of fidelity. A copy of a digital media is identical to the original. With digital multimedia

    distribution over World Wide Web, authentications are more threatened than ever due to the

     possibility of unlimited copying. The easy transmission and manipulation of digital data

    constitutes a real threat for information creators, and copyright owners want to becompensated every time their work is used. Furthermore, they want to be sure that their

    work is not used in an improper way (e. g. modified without their permission). For digital

    data, copyright enforcement and content verification are very difficult tasks. One solution

    would be to restrict access to the data using some encryption techniques. However,

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    28/182

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    29/182

     3

    watermarking, requirements that watermarking system must meet, types of the watermarking,

    applications and then various attacks on a watermarking system.

    1.1  DATA HIDING BACKGROUND

    The solution of the problem discussed above seems to lie in a technique that dates back to

    ancient Egypt and Greece: data hiding or steganography. Steganography deals with the

    methods of embedding data within a medium (host or cover medium) in an imperceptible

    way. All forms of digital data (still images, audio, video, text documents and multimedia

    documents) can be used as a cover medium for information hiding.

    The history of steganography goes all the way back to the 5th Century. The earliest known

    writings about steganography were by the Greek historian Herodotus. The historian relates

    how a slave had a message tattooed on his head by Histiaeus who was trying to get a

    message to his son-in-law Aristagoras. Once the slaves’ hair was long enough to cover the

    message he was sent to Aristagoras in the city of Miletus [92].

    Stegnography has been used in many different ways. The simplest was the use of invisible

    inks that a person could use to send a message to another person without anyone elseknowing. Different forms of invisible ink were used to conceal messages. Some of the more

    common forms of invisible ink have been lemon juice, milk, and urine to name a few. If

    someone wanted to conceal a message, he would simply write a message, using one of these

    inks, on a sheet of paper that already had something written on it. The person receiving the

    message would then hold the paper over a flame and the transparent message would appear.

    Image stegnography was done during the early twentieth century. During the Boer War in

    South Africa, the British were using Lord Robert Baden-Powell as a scout. He was scouting

    the Boer artillery bases mapping their positions. He took his maps and converted them into

     pictures of butterflies with certain markings on the wings that were actually the enemies’

     positions [92].

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    30/182

     4

    During World War II, Nazis introduced a new concept in espionage, which was called the

    microdot. This simple device could conceal a full typewritten page within the size of a

    common period. A microdot could hold valuable information such as charts, diagrams and

    drawings.

    Figure 1.1: Watermark on the bank currency note

    Thus, stegnography is an area which is, more or less, a Hide-&-Seek game. Some important

    data or information is hidden in another medium. The cover medium has no relationship

    with the data or information hidden. Data or information which is hidden is not encrypted

    also. The key issue in a stegnography system becomes that no one should suspect that a

     particular medium is carrying any hidden data or information.

    We can extend the stegnography concept for the authentication of digital multimedia data.

    Digital multimedia data which has to be protected is now the cover medium and then we can

    hide the copyright data into it. In this case, there will be two major requirements as follows:

    1)  Imperceptibility: After hiding the copyright data, cover medium should not be

    affected, and

    2)  Robustness: No body should be able to remove the data without affecting the cover

    medium.

    Watermarksymbol isadded here to prove theoriginality

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    31/182

     5

    The copyright data may be termed as digital watermark data. This area of application of

    stegnography is known as Digital Watermarking. Therefore, digital watermark is a

    message/data/information which is embedded into digital content (audio, video, images or

    text) that can be detected or extracted later. Such message/data/information mostly carries

    the copyright or ownership information of the content. The process of embedding digital

    watermark information into digital content is known digital watermarking.

    Before moving further in this discussion, we must first understand the difference of the

    digital watermarking with other related terms like  stegnography,  cryptography  and digital

     signature.

    1.1.1 STEGANOGRAPHY VS WATERMARKING

    Watermarking is the subset of Stegnography. In Stegnography, data which is hidden has no

    relationship with the cover medium and the requirement from such a system is that no

    suspicion should arise that a medium is carrying any hidden data. In watermarking, unlike

    stegnography, the data which is hidden has relationship with the cover medium data. Data

    hidden is the ownership data of the cover medium and there is no issue like suspecting that a

     particular medium is carrying some copyright data.

    As the purpose of stegnography is to have a covert communication between two parties i.e.

    existence of the communication is unknown to a possible attacker, and a successful attack

    shall detect the existence of this communication. On the contrary, watermarking, as opposed

    to stegnography, requires a system to be robust against possible attacks. Other requirements

    of watermarking are entirely different from stegnography and these are discussed in detail in

    Section 1.3.

    1.1.2 CRYPTOGRAPHY VS. WATERMARKING

    Cryptography can be defined as the processing of information into an unintelligible form

    known as encryption, for the purpose of secure transmission. Through the use of a “key”,

    the receiver can decode the encrypted message (the process known as decryption) to retrieve

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    32/182

     6

    the original message. So, cryptography is about protecting the contents of the message. But

    as soon as the data is decrypted, all the in-built security and data is ready to use.

    Cryptography "scrambles" a message so that it can not be understood by unauthorized user.

    This does not happen in watermarking. Neither the cover medium nor the copyright data

    changes its meaning. Rather, copyright data is hidden to give the ownership information of

    the medium in which it is hidden.

    1.1.3  DIGITAL SIGNATURE VS. WATERMARKING

    Digital signatures, like written signatures, are used to provide authentication of the associated

    input, usually called a "message”. Digital signature is an electronic signature that can be used

    to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is

    unchanged. Digital signatures are easily transportable, cannot be imitated by someone else,

    and can be automatically time-stamped. The ability to ensure that the original signed

    message arrived means that the sender cannot easily repudiate it later. A digital signature can

     be used with any kind of message, whether it is encrypted or not, simply so that the receiver

    can be sure of the sender's identity and that the message arrived intact. A digital signature is

    apart from the protected message, whereas a digital watermark is inside a multimediamessage. Both, digital signature and watermarking protect integrity and authenticity of a

    document. Digital signature system is vulnerable to distortion but a watermark system has to

    tolerate a limited distortion level.

    So, to conclude, Watermarking is adding“ownership” information in multimedia contents to

     prove the authenticity. This technology embeds a data, an unperceivable digital code,

    namely the watermark, carrying information about the copyright status of the work to be

     protected. Continuous efforts are being made to device efficient watermarking schema but

    techniques proposed so far do not seem to be robust to all possible attacks and multimedia

    data processing operations. The sudden increase in watermarking interest is most likely due

    to the increase in concern over IPR. Today, digital data security covers such topics as access

    control, authentication, and copyright protection for still images, audio, video, and

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    33/182

     7

    multimedia products. A pirate tries either to remove a watermark to violate a copyright or to

    cast the same watermark, after altering the data, to forge the proof of authenticity. Generally,

    the watermarking of still images, video, and audio demonstrate certain common fundamental

    concepts.

    1. 2 APPLICATION AREAS OF DIGITAL WATERMARKING

    Watermarking techniques may be relevant in the following application areas [26]:

    1.2.1 COPYRIGHT PROTECTION

    The primary use of watermarking is where an organization wishes to assert its ownership of

    copyright for digital objects. This application is of great interest to ‘big media’

    organizations, and of some interest to other vendors of digital information, such as news and

     photo agencies. These applications require a minimal amount of information to be

    embedded, coupled with a high degree of resistance to signal modification (since they may

     be subjected to deliberate attack). For example, now a days, a news channel “AAJ-TAK” is

    showing the animal’s clips (which are already shown on “Discovery” Channel) by hiding the

    Discovery channel’s logo on the video clips. As per the law, The AAJ-TAK should show the

    curtsey-sign and should pay the copyright fee to the Discovery channel. In such cases,There is a strong need of watermarking as once the digital data is broadcasted, any body else

    can start selling it without paying the IPR value to its owner.

    1.2.2 COPY PROTECTION

    Watermarking can be used as a strong tool to prevent illegal copying. For example, if an

    audio CD has a watermark embedded into it, then any of the system (Hardware like DVD, or

    software) can not make a copy of it, and even if it copies, the watermark data will not getcopied to new duplicate audio CD. Now the duplicate CD can be easily found because it

    does not have watermark data. Some schemes have attempted to satisfy more complex copy

     protection requirements. An early example is the Serial Copy Management System (SCMS),

    introduced in the 1980s, which enabled a user to make a single digital audio tape of a

    recording they had purchased but prevented the recording of further copies (i.e. second

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    34/182

     8

    generation) from that first copy. The scheme failed ultimately because not all manufacturers

    of consumer equipment were prepared to implement the scheme in their products.

    1.2.3 TEMPER DETECTION

    In this application area, it is necessary to assure that the origin of a data object is

    demonstrated and its integrity is proved. One example of temper detection is photographic

    forensic information which may be presented as evidence in the court. Given the ease with

    which digital images can be manipulated, there is a need to provide proof that an image has

    not been altered. Such a mechanism could be built into a digital camera [29]. For example,

    if a cop’s camera catches an over speeding vehicle then when proving the driver guilty in

    front of the judge, the accused may claim that the video presented in the court is temperedand the car shown in the video does not belong to him. A watermarking system which is

    embedded in digital cameras may help to resolve the issue. If somebody tries to temper the

    data, the watermark will get destroyed indicating that the data is tempered. In our country, a

    well-known example is the “Tahalka-Scam”.

    1.2.4  BROADCAST MONITORING

    There are several types of organizations and individuals interested in monitoring the broadcast of their interest. For example, advertisers want to ensure that they receive the exact

    airtime that they have purchased from broadcasting firms. Musicians and actors want to

    ensure that they receive accurate royalty payments for broadcasts of their performances and

    copyright owners want to ensure that their property is not illegally rebroadcast by pirate

    stations. In 1997, a scandal broke out in Japan regarding television advertising. At least two

    stations had been routinely overbooking air time. Advertisers were paying for thousands of

    commercials that were never aired [16]. The practice had remained largely undetected for

    over twenty years because there were no systems in place to monitor the actual broadcast of

    advertisements.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    35/182

     9

    This broadcast monitoring can be implemented by putting a unique watermark in each video

    or sound clip prior to broadcast. Automated monitoring stations can then receive broadcasts

    and look for these watermarks identifying when and where each clip appears.

    1.2.5  FINGERPRINTING

    If monitoring and owner identification applications place the same watermark in all copies of

    the same content, it may create a problem. If out of n number of legal buyers of a content,

    one starts selling the contents illegally, it may be very difficult to catch who is redistributing

    the contents without permission. Allowing each copy distributed to be customized for each

    legal recipient can solve this problem. This capability allows a unique watermark to be

    embedded in each individual copy. Now, if the owner finds an illegal copy, he can find outwho is selling his contents by finding the watermark which belongs to only singly legal

     buyer. This particular application area is known as fingerprinting. This is potentially

    valuable both as a deterrent to illegal use and as a technological aid to investigation.

    1.2.6  ANNOTATION APPLICATIONS

    In this applications area, watermarks convey object-specific information (“feature tags” or

    “captions”) to users of the object. For example, patient identification data can be embedded

    into medical images. These applications require relatively large quantities of embedded data.

    While there is no need to protect against deliberate tampering. Normal use of the data object

    may involve such transformations as image cropping or scaling and will require the use of a

    technique that is resistant to those types of modification.

    For more details of various watermarking applications, one may refer [20].

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    36/182

     10

    1. 3 CHARACTERISTICS OF WATERMARKING SCHEMES

    An effective watermarking scheme should have the following characteristics:

    1)   Imperceptibility: In terms of watermarking, imperceptibility means that after inserting

    the watermark data, cover medium should not alter much. In other words, the

     presence of the watermark data should not affect the cover medium being protected.

    If a watermarking scheme does not ensure this requirement, it may happen that after

    inserting a watermark data in a cover medium (say an image), image quality may alter

    which the owner of the image will never like that a protecting mechanism modifies

    his work.

    2)   Robustness: Robustness of the watermark data means that the watermark data should

    not be destroyed if someone performs the common manipulations as well as

    malicious attacks. It is more of a property and also a requirement of watermarking

    and its applicability depends on the application area.

    3)   Fragility:  Fragility means that the watermark data is altered or disturbed up to a

    certain extent when someone performs the common manipulations & malicious

    attacks. Some application areas like temper detection may require a fragile

    watermark to know that some tempering is done with his work. Some applicationmay require semi-fragility too. The semi-fragile watermark comprises a fragile

    watermark component and a robust watermark component i.e. semi-fragile

    watermarks are robust to some attacks but fragile to others attacks.

    4)   Resilient to common signal processing: The watermark should be retrievable even if

    common signal processing operations are applied to the watermarked cover medium

    data. These operations include digital-to-analog and analog-to-digital conversion (i.e.

    taking the printout of an image and then scan it to create another digital copy of the

    image), re-sampling, re-quantization (including dithering and recompression), and

    common signal enhancements such as image contrast, brightness and color

    adjustment, or audio bass and treble adjustment, high pass and low pass filtering,

    histogram equalization of an image and format conversion (BMP image to JPEG

    image, MPEG movie to WMV movie, mp3 song to mp4 etc.)

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    37/182

     11

    5)   Resilient to common geometric distortions (image and video data): Watermarks in

    image and video data should also be immune from geometric image operations such

    as rotation, translation, cropping and scaling. This property is not required for audio

    watermarking.

    6)   Robust to subterfuge attacks (collusion and forgery): In addition, the watermark

    should be robust to collusion attack. Multiple individuals, who possess a watermarked

    copy of the data, may collude their watermark copies to destroy the watermark

     presence and can generate a duplicate of the original copy. Further, if a digital

    watermark is to be used in litigation, it must be impossible for colluders to combine

    their images to generate a different valid watermark.

    7)  Unambiguousness: Retrieval of the watermark should unambiguously identify theowner. Furthermore, the accuracy of owner identification should not degrade much

    in the case of an attack. The Unzign and Stirmark [97] have shown remarkable

    success in removing data embedded by commercially available programs.

    Watermarking of watermarked image (re-watermarking) is also a major threat [97].

    1.4  TYPES OF DIGITAL WATERMARKS

    Prof. S. Mohanty presents a very good classification of watermarking areas in his paper [62].

    We can classify the types of watermarking based on the cover medium, embedding domain,

     perception and application domain. Figure 1.2 shows the various classifications of

    watermarking.

    Based on their embedding domain, watermarking schemes can be classified as follows:

    1)  Spatial Domain: The watermarking system directly alters the main data elements (like

     pixels in an image) to hide the watermark data.

    2)  Transformed Domain: The watermarking system alters the frequency transforms of

    data elements to hide the watermark data. This has proved to be more robust than the

    spatial domain watermarking.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    38/182

     12

    3)  Feature Domain: The watermarking system takes into account the region, boundary

    and object characteristics. It presents better detection and recovery from attacks.

    Figure 1.2: Various classifications of watermarking

    Watermarking techniques can also be divided into four categories, according to the type ofdocument to be watermarked, as follows.

    1)  Image Watermarking: Figure 1.3 and 1.4 represent the general scheme of an image

    watermarking, embedding and decoding (specifically key based, invisible and fragile)

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    39/182

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    40/182

     14

    According to application domain, Source-based watermarks are desirable for ownership

    identification or authentication where a unique watermark identifies the owner. A source-

     based watermark could be used for authentication and to determine whether a received image

    or other electronic data has been tampered. The watermark could also be destination based

    where each distributed copy gets a unique watermark identifying the particular buyer. The

    destination based watermark could be used to trace the buyer in the case of illegal reselling.

    This is used in fingerprinting. A watermark is said  private if only authorized readers can

    detect it. In other words, in private watermarking, a mechanism is envisaged that makes it

    impossible for unauthorized people to extract the watermark. A watermarking algorithm is

    said blind if it does not resort to the comparison between the original non-marked and the

    marked document to recover the watermark. Conversely, a watermarking algorithm is saidnon-blind if it needs the original data to extract the information contained in the watermark.

    The definition of invertible and quasi-invertible is more technical and can be given as

    follows [2]:

    If E is the Embedding algorithm, D is detection algorithm, Cδ  is Comparator function, I is

    original cover image, Î is watermarked image, J is recovered attacked image, S is watermarksignal and S’ is extracted watermark data, then:

    1)  E (I, S) = Î

    2)  D (J, I) = S’ or D (J) = S’

    3)  Comparator Cδ: 

    A watermarking scheme (E, D, Cδ) is invertible if:

    1)  Inverse mapping E-1 does exist such that E-1 (Î) = (Î’, S’) &E (Î’, S’) = Î;

    2)  E-1 is computational feasible;

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    41/182

     15

    3)  S’ is an allowed watermark;

    4)  Î and Î’ are perceptually similar; and

    5)  Comparator output Cδ (D (Î, Î’), S’) = 1

    Otherwise the watermarking scheme is non-invertible.

    A watermarking scheme (E, D, Cδ) is quasi-invertible if:

    1)  Properties for invertible watermarking schemes apply;

    2)  Only difference E (Î’, S’) = Î’’ ≠ Î; and

    3)  Î’’ and Î perceptually similar.

    Otherwise the watermarking scheme is non-quasi-invertible. A Non-invertible scheme can

     be quasi-invertible and Non-quasi-invertibility implies non-invertibility.

    1.5 STRUCTURE OF THE THESIS

    This thesis comprises of the following chapters:

    Chapter 2 describes the image watermarking literature survey and problem statement.

    Chapter 3 describes the preliminaries (like background of JPEG compression, 2D–DCT and

    DWT, image quality parameter, some standard watermarking techniques which are used to

    compare the performances of the proposed techniques etc and test images data). The

    watermarking techniques for gray images have been proposed in Chapter 4. Chapter 5

    describes the proposed watermarking techniques and issues related to colored BMP images.

    In Chapter 6, the proposed watermarking techniques for JPEG images have been given.

    Finally the summary of results, conclusions and future work is given in Chapter 7 followed

     by references, author’s publications and synopsis at the end.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    42/182

     16

     

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    43/182

     17

    CHAPTER-2

    IMAGE WATERMARKING LITERATURE SURVEY

    Within the field of watermarking, image watermarking particularly has attracted lot of

    attention in the research community. Most of the research work is dedicated to image

    watermarking as compared to audio and video. There may be 3 reasons for it. Firstly,

     because of ready availability of the test images, secondly because it carries enough

    redundant information to provide an opportunity to embed watermarks easily, and lastly,

    it may be assumed that any successful image watermarking algorithm may be upgraded

    for the video also.

    Images are represented/stored in spatial domain as well as in transform domain. The

    transform domain image is represented in terms of its frequencies; whereas, in spatial

    domain it is represented by pixels. In simple terms, transform domain means the image is

    segmented into multiple frequency bands. To transfer an image to its frequency

    representation, we can use several reversible transforms like Discrete Cosine Transform

    (DCT), Discrete Wavelet Transform (DWT), or Discrete Fourier Transform (DFT). Each

    of these transforms has its own characteristics and represents the image in different ways.

    Watermarks can be embedded within images by modifying these values, i.e. the

    transform domain coefficients. In case of spatial domain, simple watermarks could be

    embedded in the images by modifying the pixel values or the Least Significant Bit (LSB)

    values. However, more robust watermarks could be embedded in the transform domain of

    images by modifying the transform domain coefficients. In 1997 Cox et al. presented a

     paper “Secure Spread Spectrum Watermarking for Multimedia” [19], one of the most

    cited paper (cited 2985 times till April’ 2008 as per Google Scholar search), and after thatmost of the research work is based on this work. Even though spatial domain based

    techniques can not sustain most of the common attacks like compression, high pass or

    low pass filtering etc., researchers present spatial domain based schemes. Firstly, brief

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    44/182

     18

    introductions of some classical well-known spatial domain based schemes are being

    given as follows [19]:

    2.1 SPATIAL DOMAIN BASED WATERMARKING SCHEMES

    2.1.1  LSB BASED SCHEMES

    In their paper, Macq and Quisquater [60] briefly discussed the issue of watermarking

    digital images as part of a general survey on cryptography and digital television. The

    authors provided a description of a procedure to insert a watermark into the least

    significant bits of pixels located in the vicinity of image contours. Since it relies on

    modifications of the least significant bits, the watermark is easily destroyed. Further, their

    method is restricted to images, in that it seeks to insert the watermark into image regions

    that lie on the edge of contours.

    Rhoads [79] described a method that adds or subtracts small random quantities from each

     pixel. Addition or subtraction is determined by comparing a binary mask of bits with the

    LSB of each pixel. If the LSB is equal to the corresponding mask bit, then the random

    quantity is added, otherwise it is subtracted. The watermark is subtracted by first

    computing the difference between the original and watermarked images and then by

    examining the sign of the difference, pixel by pixel, to determine if it corresponds to the

    original sequence of additions and subtractions. This method does not make use of

     perceptual relevance, but it is proposed that the high frequency noise be prefiltered to

     provide some robustness to lowpass filtering. This scheme does not consider the problem

    of collusion attacks.

    2.1.2 PATCH WORK BASED SCHEMES 

    Another, well known spatial domain based scheme is patchwork-based technique given

     by Bender et al. [7]. They described two watermarking schemes. The first is a statistical

    method called  patchwork . Patchwork randomly chooses pairs of image points, and

    increases the brightness at one point by one unit while correspondingly decreasing the

     brightness of another point. The second method is called “texture block coding” wherein

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    45/182

     19

    a region of random texture pattern found in the image is copied to an area of the image

    with similar texture. Autocorrelation is then used to recover each texture region. The

    most significant problem with this scheme is that it is only appropriate for images that

     possess large areas of random texture. The scheme could not be used on images of text.

    Other Patchwork based algorithm can be found in [110, 124].

    2.1.3 CORRELATION BASED WATERMARKING SCHEMES

    The most straightforward way to add a watermark to an image in the spatial domain is to

    add a pseudorandom noise pattern to the luminance values of its pixels. Many methods

    are based on this principle [6, 11, 27, 33-34, 53, 68, 70, 91, 95, 114-117].

    2.1.3.1 CORRELATION BASED SCHEMES WITH 1 PN SEQUENCE:  A well

    known technique for watermark embedding is to exploit the correlation properties of

    additive pseudo-random noise patterns as applied to an image [42, 52]. A Pseudo-random

     Noise (PN) pattern W (x, y) is added to the cover image I (x, y), according to the

    Equation 2.1 given below:

    ),(*),(),(  y xW k  y x I  y x I w   += ……………………………………………………… (2.1)

    In Equation 2.1, k   denotes a gain factor and IW  the resulting watermarked image.

    Increasing k  increases the robustness of the watermark at the expense of the quality of the

    watermarked image. To retrieve the watermark, the same pseudo-random noise generator

    algorithm is seeded with the same key, and the correlation between the noise pattern and

     possibly watermarked image is computed. If the correlation exceeds a certain threshold T,

    the watermark is detected, and a single bit is set. This method can easily be extended to a

    multiple-bit watermark by dividing the image into blocks and performing the above

     procedure independently on each block.

    2.1.3.2 CORRELATION-BASED IMAGE WATERMARKING SCHEMES WITH

    2PN SEQUENCES: This basic algorithm, as given in previous section, can be improved

    in a number of ways. First, the notion of a threshold being used for determining a logical

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    46/182

     20

    “1” or “0” can be eliminated by using two separate pseudo-random noise patterns. One

     pattern is designated a logical “1” and the other a logical “0”. The above procedure is

    then performed once for each pattern, and the pattern with the higher resulting correlation

    is used. This increases the probability of correct detection, even after the image has been

    subject to attack [42, 52].

    2.1.3.3 IMAGE WATERMARKING USING PRE-FILTERING:  We can further

    improve the basic algorithm by pre-filtering the image before applying the watermark. If

    we can reduce the correlation between the cover image and the PN sequence, we can

    increase the immunity of the watermark to additional noise. By applying the edge

    enhancement filter shown below in Figure 2.1, the robustness of the watermark can be

    improved with no loss of capacity and very little reduction of image quality [42, 52].

    −−−

    −−

    −−−

    =

    111

    1101

    111

    2

    1edge F   

    Figure 2.1: FIR Edge Enhancement Pre-Filter

    2.1.4  CDMA BASED IMAGE WATERMARKING SCHEME 

    Rather than determining the values of the watermark from “blocks” in the spatial domain,

    we can employ CDMA spread-spectrum schemes to scatter each of the bits randomly

    throughout the cover image, thus increasing capacity and improving resistance to

    cropping. The watermark is first formatted as a long string rather than a 2D image. For

    each value of the watermark, a PN sequence is generated using an independent seed.

    These seeds could either be stored or themselves generated through PN methods. The

    summation of all of these PN sequences represents the watermark, which is then scaledand added to the cover image [42, 52].

    To detect the watermark, each seed is used to generate its PN sequence which is then

    correlated with the entire image. If the correlation is high, that bit in the watermark is set

    to “1”, otherwise a “0”. The process is then repeated for all the values of the watermark.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    47/182

     21

    CDMA improves on the robustness of the watermark significantly but it requires more

    computation. 

    2.1.5  OTHER SPATIAL DOMAIN BASED WATERMARKING SCHEMES

    In [104], a method that embeds a binary watermark image in the spatial domain is

     proposed. A spatial transform that maps each pixel of the watermark image to a pixel of

    the host image, is used. Chaotic spread of watermark image pixels in the host image is

    achieved by “toral automorphisms”. For watermark embedding, the intensity of the

    selected pixels is modified by an appropriate function that takes into account

    neighborhood information in order to achieve watermark robustness to modifications. For

    detection, a suitable function is applied on each of the watermarked pixels to determine

    the binary digit (0 or 1) that has been embedded. The inverse spatial transform is thenused to reconstruct the binary watermark image.

    In the method proposed in [69], the image is split into two random subsets A and B and

    the intensity of pixels in A is increased by a constant embedding factor k. Watermark

    detection is performed by evaluating the difference of the mean values of the pixels in

    subsets A and B. This difference is expected to be equal to k for a watermarked image

    and equal to zero for an image that is not watermarked. Hypothesis testing can be used todecide for the existence of the watermark. The above algorithm is vulnerable to lowpass

    operations. Extensions to above algorithm are proposed in [64]. According to this

     paper, the robustness of the method can be increased by grouping pixels so as to form

     blocks of certain dimensions to enhance the low pass characteristics of the watermark

    signal. Alternatively, one can take advantage of the fact that different embedding factor

    can be used for each pixel, to shape appropriately the watermark signal. An optimization

     procedure that calculates the appropriate embedding value for each pixel so that the

    energy of the watermark signal is concentrated at low frequencies is proposed.

    Constraints that ensure that the watermark signal is invisible can be incorporated in the

    optimization procedure.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    48/182

     22

    In [45] the authors derived analytical expressions for the probabilities P-, P+ of false

    negative and false positive watermark detection. Their model assumes an additive

    watermark and a correlator-based detection stage. Both, the white watermarks and

    watermarks having low pass characteristics, are considered. The host image is treated as

    noise, assuming a first order separable autocorrelation function. The probabilities P-, P+

    are expressed in terms of the watermark to image power ratio. The authors conclude that

    detection error rates are higher for watermarks with low pass characteristics.

    In last 12 years, number of publications in this area is increasing very rapidly and no

    survey can cover all the presented schemes, but there are some very good survey papers

    and interested reader may explore the papers [3, 13, 54, 76]. We are limiting the

    discussion of the spatial domain based schemes here.

    2.2  TRANSFORMED DOMAIN BASED SCHEMES

    As presented in literature, transformed domain based watermarking schemes are more

    robust as compared to simple spatial domain watermarking schemes. Such algorithms are

    robust against simple image processing operations like low pass filtering, brightness and

    contrast adjustment, blurring etc. However, they are difficult to implement and are

    computationally more expensive. We can use either of Discrete Fourier Transform(DFT), Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) but

    DCT is the most exploited one. A General transformed domain based scheme, as

     presented by Cox, is shown in Figure 2.2. A very good discussion on DCT/DWT/DFT

     based watermarking schemes is given in [76].

    2.2.1  DFT BASED WATERMARKING SCHEMES

    We start from DFT. There are few algorithms that modify these DFT magnitude and

     phase coefficients to embed watermarks. Ruanaidh et al. proposed a DFT watermarking

    scheme in which watermark is embedded by modifying the phase information within the

    DFT. It has been shown that phase based watermarking is robust against image contrast

    operation [114]. Later Ruanaidh and Pun showed how Fourier Mellin transform could be

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    49/182

     23

    used for digital watermarking. Fourier Mellin transform is similar to applying Fourier

    Transform to log-polar coordinate system for an image.

    This scheme is robust against geometrical attacks [116]. De Rosa et al. proposed a

    scheme to insert watermark by directly modifying the mid frequency bands of the DFT

    magnitude component [115]. Ram kumar et al. also presented a data hiding scheme based

    on DFT, where they modified the magnitude component of the DFT coefficients. Their

    simulations suggest that magnitude DFT survives practical compression which can be

    attributed to the fact that most practical compression schemes try to maximize the PSNR.

    Hence using magnitude DFT is a way to exploit the hole in most practical compression

    schemes.

    Figure 2.2: A General Frequency domain based watermarking model as presented by Cox [19]

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    50/182

     24

    The proposed scheme is shown to be resistant to Joint Photographic Expert Group

    (JPEG) and (Set Partitioning In Hierarchical Trees) SPIHT compression [68]. Lin et al.

     presented a RST resilient watermarking algorithm. In their algorithm, the watermark is

    embedded in the magnitude coefficients of the Fourier transform re-sampled by log-polar

    mapping. The scheme is, however, not robust against cropping and shows weak

    robustness against JPEG compression (Q = 70) [53]. Solachidis and Pitas presented a

    novel watermarking scheme. They embed a circularly symmetric watermark in the

    magnitude of the DFT domain [8]. Since the watermark is circular in shape with its centre

    at image center, it is robust against geometric rotation attacks. The watermark is centered

    around the mid frequency region of the DFT magnitude. Neighborhood pixel variance

    masking is employed to reduce any visible artifacts. The scheme is computationally not

    expensive to recover from rotation. Robustness against cropping, scaling, JPEGcompression, filtering, noise addition and histogram equalization is demonstrated. A

    semi-blind watermarking scheme has been proposed by Ganic and Eskicioglu [30]. They

    embed circular watermarks with one in the lower frequency while the other is in the

    higher frequency.

    2.2.2  DCT BASED WATERMARKING SCHEMES

    DCT domain watermarking can be classified into Global DCT watermarking and Block

     based DCT watermarking. One of the first algorithms presented by Cox et al. [19] used

    global DCT approach to embed a robust watermark in the perceptually significant portion

    of the Human Visual System (HVS). Embedding in the perceptually significant portion of

    the image has its own advantages because most compression schemes remove the

     perceptually insignificant portion of the image. In spatial domain it represents the LSB.

    However in the frequency domain it represents the high frequency components.

    As described in [76], steps in DCT Block Based Watermarking Algorithm are:

    1)  Segment the image into non-overlapping blocks of 8x8;

    2)  Apply forward DCT to each of these blocks;

    3)  Apply some block selection criteria (e.g. HVS);

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    51/182

     25

    4)  Apply coefficient selection criteria (e.g. highest);

    5)  Embed watermark by modifying the selected coefficients; and

    6)  Apply inverse DCT transform on each block.

    Most DCT based algorithms differ with each other on account of step 3 and 4 i.e. they

    differ either in the block selection criteria or coefficient selection criteria. Initially, Koch,

    Rindfrey, and Zhao [7] proposed a method for watermarking images. In that method, they

     break up an image into 8x8 blocks and compute discrete cosine transform (DCT) of each

    of these blocks. A pseudorandom subset of the blocks is chosen and then in each such

     block, a triplet of frequencies is selected from one of 18 predetermined triplets and

    modified so that their relative strengths encode a ‘1’ or ‘0’ value. The 18 possible triplets

    are composed by selection of three out of eight predetermined frequencies within the 8x8DCT block. The choice of the eight frequencies to be altered within the DCT block is

     based on a belief that the “middle frequencies have moderate variance,” i.e. they have

    similar magnitude. This property is used to allow the relative strength of the frequency

    triplets to be altered without requiring a modification that would be perceptually

    noticeable.

    Several DCT based schemes are presented in [8, 17-19, 21, 37, 71, 74, 81, 99, 118].

    Using the DCT, an image can easily be split up in pseudo frequency bands so that the

    watermark can conveniently be embedded in the most important middle band frequencies.

    Furthermore, the sensitivity of the HVS to the DCT based images has been extensively

    studied, which resulted in the recommended JPEG quantization Table [112]. These

    results can be used for predicting and minimizing the visual impact of the distortion

    caused by the watermark. Finally, the block-based DCT is widely used for image and

    video compression. By embedding a watermark in the same domain as the compression

    scheme used to process the image (in this case in the DCT domain), we can anticipate

    lossy compression because we are able to anticipate which DCT coefficients will

     be discarded by the compression scheme. Furthermore, we can exploit the DCT

    decomposition to make real-time watermark applications.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    52/182

     26

    Further improvements for DCT-domain correlation-based watermarking systems'

     performance could be achieved by using watermark detectors based on generalized

    Gaussian model instead of the widely used pure Gaussian assumption [35]. By

     performing a theoretical analysis for DCT-domain watermarking methods for images, the

    authors in [35] provided analytical expressions which could be used to measure

     beforehand the performance expected for a certain image and to analyze the influence of

    the image characteristics and system parameters (e.g. watermark length) on the final

     performance. Furthermore, the result of this analysis may help in determining the proper

    detection threshold T  to obtain a certain false positive rate. The authors in [35] claimed

    that by abandoning the pure Gaussian noise assumption, some substantial performance

    improvements could be obtained.

    In [4], the authors embedded a watermark signal domain by modifying a number of

     predefined DCT coefficients. They used a weighting factor to weight the watermark

    signal in the spatial domain according to HVS characteristics. In [75] authors embedded

    watermark data in DCT Difference (JND) as predicted domain in perceptually meaningful

    way and used the Just Noticeable by model reported in [108].

    2.2.2.1 THE MIDDLE-BAND COEFFICIENT EXCHANGE SCHEME [42, 52]:

    The middle-band frequencies (FM) of an 8x8 DCT block are shown in Figure 2.3. In this

    Figure, FL is used to denote the lower frequency components of the block and FH is used

    to denote the higher frequency components. FM is chosen as embedding region to

     provide additional resistance to lossy compression techniques, while avoiding significant

    modification of the cover image. First, 8x8 DCT of an original image is taken. Then, two

    locations DCT (u1, v1) and DCT (u2, v2) are chosen from the FM region for comparison of

    each 8 x 8 block. These locations are selected based on the recommended JPEG

    quantization table shown in Figure 2.4. If two locations are chosen such that they have

    identical quantization values, then any scaling of one coefficient will scale the other by

    the same factor to preserve their relative strength. It may be observed from Figure 2.4,

    that coefficients at location (4, 1) and (3, 2) or (1, 2) and (3, 0) are more suitable

    candidates for comparison because their quantization values are equal. The DCT block

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    53/182

     27

    will encode a “1” if DCT (u1, v1) > DCT (u2, v2); otherwise it will encode a “0”. The

    coefficients are swapped if the relative size of coefficients does not agree with the bit that

    is to be encoded [42, 52].

    Thus, instead of embedding any data, this scheme is hiding watermark data by means of

    interpreting “0” or “1” with relative values of two fixed locations in middle frequency

    region.

    FL

    FM  

    FH  

    Figure 2.3: Frequency regions in 8 x 8 DCT

    Swapping of such coefficients will not alter the watermarked image significantly, as it is

    generally believed that DCT coefficients of middle frequencies have similar magnitudes.

    Further, the robustness of the watermark can be improved by introducing a watermark

    “strength” constant k , such that DCT (u1, v1) – DCT (u2, v2) > k . If coefficients do not

    meet these criteria, they are modified by the use of random noise to satisfy the relation.

    Increasing k   thus reduces the chance of detection errors at the expense of additional

    image degradation. By increasing k, larger coefficients remain larger even after lot of

    compression and thus help in decoding because their relative values decide the decodingof the watermark data.

    While extracting the watermark, again the 8x8 DCT of image in taken in which “1” is

    decoded if DCT (u1, v1) > DCT (u2, v2); otherwise a “0” is decoded.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    54/182

     28

     

    Figure 2.4: JPEG Quantization matrix

     Limitation of middle-band coefficient exchange scheme: Experimental results show that

    Middle-Band Coefficient Exchange is quite efficient against JPEG compression,

    Cropping, Noising and other common image manipulation operations. But above scheme

    has one serious drawback. If only one pair of coefficient is used (say (4, 1) and (3, 2)) tohide the watermark data, then it is vulnerable to collusion attack. By analyzing four or

    five watermarked copies of an image, one can easily find out that these coefficients

    always have a certain pattern and attacker can predict the watermark as well as destroy it.

    2.2.2.2 DCT-CDMA BASED IMAGE WATERMARKING [42, 52]:  In this

    technique authors embedded a PN sequence W into the middle frequencies of the DCT

     block. A DCT block can be modulated using the Equation 2.2.

    ∈+=

     M 

     M  y x y x

     y xW   F vuvu y Ix

     F vuvuW k vu I vu I 

    ,),,(,

    ,),,(*),(),( ,,, ………………………………………….. (2.2)

    For each 8 x 8 block of the image, the DCT for the block is first calculated. In that block,

    the middle frequency components FM are added to the PN sequence W, multiplied by a

    gain factor k. Each block is then inverse-transformed to give the final watermarked imageIW.

    The watermarking procedure is made somewhat more adaptive by slightly altering the

    embedding process to the method shown in Equation 2.3.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    55/182

     29

    ∈+=

     M 

     M  y x y x

     y xW  F vuvu y Ix

     F vuvuW k vu I vu I 

    ,),,(,

    ,)),,(*1(*),(),( ,,, ……………………………... (2.3)

    This slight modification scales the strength of the watermarking based on the size of the

     particular coefficients being used. Larger values of k can thus be used for coefficients of

    higher magnitude; in effect strengthening the watermark in regions that can afford it;

    weakening it in other regions.

    For detection, the image is broken up into same 8x8 blocks and a DCT is taken. The same

    PN sequence is then compared to the middle frequency values of the transformed block.

    If the correlation between the sequences exceeds some threshold T, a “1” is detected for

    that block; otherwise a “0” is detected. Again k denotes the strength of the watermarking,

    where increasing k increases the robustness of the watermark at the expense of quality.

    2.2.3  DWT BASED WATERMARKING SCHEMES

    If watermarking techniques can exploit the characteristics of the Human Visual System

    (HVS), it is possible to hide watermarks with more energy in an image, which makes

    watermarks more robust. From this point of view, the DWT is a very attractive transform,

     because it can be used as a computationally efficient version of the frequency models forthe HVS [5]. For instance, it appears that the human eye is less sensitive to noise in high

    resolution DWT bands and in the DWT bands having an orientation of 45° (i.e.,  HH  

     bands). Furthermore, DWT image and video coding, such as embedded zero-tree

    wavelet (EZW) coding, are included in the upcoming image and video compression

    standards, such as JPEG2000 [112]. Thus DWT decomposition can be exploited to

    make a real-time watermark application. 

    Many approaches apply the basic schemes described at the beginning of this section

    to the high resolution DWT bands, LH , HH , and HL [35, 40]. A large number of

    algorithms operating in the wavelet domain have been proposed till date.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    56/182

     30

     

    Figure 2.5: 1-Scale and 2-Scale 2-Dimensional Discrete Wavelet Transform 

    2.2.3.1 CDMA-DWT BASED WATERMARKING SCHEME: This scheme is the

    most straightforward scheme which is similar to embedding scheme to that used in the

    DCT-CDMA scheme. The embedding of a CDMA sequence in the frequency bands is

    shown in Equation 2.4.

    ∈+=

     HH  LLvuW 

     LH  HLvu xW W  I 

    i

    iii

    vuW  ,,

    ,,,,

    α 

    ………………………………………………. (2.4)

    where Wi denotes the coefficient of the transformed image, xi the bit of the watermark to

     be embedded, and α  a scaling factor. To detect the watermark, same pseudo-randomsequence used in CDMA generation is generated and its correlation is determined with

    the two transformed frequency bands. If the correlation exceeds some threshold T, the

    watermark is detected.

    This can be easily extended to multiple bit messages by embedding multiple watermarks

    into the image. In the spatial version, a separate seed is used for each PN sequence,

    which are then added to the frequency coefficients. During detection, if the correlationexceeds T for a particular sequence a “1” is recovered; otherwise a “0”. The recovery

     process then iterates through the entire PN sequence until all the bits of the watermark

    have been recovered.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    57/182

     31

    DWT based watermarking schemes follow the same guidelines as DCT based schemes,

    i.e. the underlying concept is the same; however, the process to transform the image into

    its transform domain varies and hence the resulting coefficients are different. Wavelet

    transforms use wavelet filters to transform the image. There are many available filters,

    although the most commonly used filters for watermarking are Haar Wavelet Filter,

    Daubechies Orthogonal Filters and Daubechies Bi-Orthogonal Filters. Each of these

    filters decomposes the image into several frequencies. Single level decomposition gives

    four frequency representations of the images. In their paper [76], authors presented a

    survey of wavelet based watermarking algorithms. They classify algorithms based on

    decoder requirements as Blind Detection or Non-blind Detection. As mentioned earlier

     blind detection doesn't require the original image for detecting the watermarks; however,

    non-blind detection requires the original image.

    2.2.3.2 DWT BASED BLIND WATERMARK DETECTION: Lu et al. [58]

     presented a novel watermarking technique called as "Cocktail Watermarking". This

    technique embeds dual watermarks which compliment each other. This scheme is

    resistant to several attacks, and no matter what type of attack is applied; one of the

    watermarks can be detected. Furthermore, they enhance this technique for image

    authentication and protection by using the wavelet based Just Noticeable Distortion

    (JND) values. Hence this technique achieves copyright protection as well as content

    authentication simultaneously. Zhu et al. [126] presented a multi-resolution watermarking

    scheme for watermarking video and images. The watermark is embedded in all the high

     pass bands in a nested manner at multiple resolutions. This scheme doesn't consider the

    HVS aspect; however, Kaewkamnerd and Rao [43-44] improve this scheme by adding

    the HVS factor in account. Voyatzis and Pitas [104], who presented the "toral

    automorphism" concept, provide a technique to embed binary logo as a watermark which

    can be detected using visual models as well as by statistical means. So, in case the image

    is degraded too much and the logo is not visible, it can be detected statistically using

    correlation. Watermark embedding is based on a chaotic (mixing) system. Original image

    is not required for watermark detection. However, the watermark is embedded in spatial

    domain by modifying the pixel or luminance values.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    58/182

     32

    A similar approach is presented for the wavelet domain [121], where the authors

     proposed a watermarking algorithm based on chaotic encryption. Zhao et al.[125]

     presented a dual domain watermarking technique for image authentication and image

    compression. They used the DCT domain for watermark generation and DWT domain for

    watermark insertion. A soft authentication watermark is used for tamper detection and

    authentication while a chrominance watermark is added to enhance compression. They

    use the orthogonality of DCT-DWT domain for watermarking [125].

    2.2.3.3 DWT BASED NON-BLIND WATERMARK DETECTION:  This technique

    requires the original image for detecting the watermark. Most of the schemes found in

    literature use a smaller image as a watermark and hence cannot use correlation based

    detectors for detecting the watermark; as a result they rely on the original image forinformed detection. The size of the watermark image (normally a logo) normally is

    smaller compared to the host image. Xia et al. presented a wavelet based non-blind

    watermarking technique for still images where watermarks are added to all bands except

    the approximation band. A multi-resolution based approach with binary watermarks is

     presented here [37].  Here, both the watermark logo as well as the host image isdecomposed into sub bands and later embedded. Watermark is subjectively detected by

    visual inspection; however, an objective detection is employed by using normalized

    correlation. Lu et al. presented another robust watermarking technique based on image

    fusion. They embedded a grayscale and binary watermark which is modulated using the

    "toral automorphism" described in [106]. Watermark is embedded additively. The

    novelty of this technique lies in the use of secret image instead of host image for

    watermark extraction and use of image dependent and image independent permutations to

    de-correlate the watermark logos [57]. Raval and Rege presented a multiple

    watermarking scheme. The authors argued that if the watermark is embedded in the low

    frequency components, it is robust against low pass filtering, lossy compression and

    geometric distortions. On the other hand, if the watermark is embedded in high frequency

    components, it is robust against contrast and brightness adjustment, gamma correction,

    histogram equalization and cropping and vice-versa. Thus, to achieve overall robustness

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    59/182

     33

    against a large number of attacks, the authors proposed to embed multiple watermarks in

    low frequency and high frequency bands of DWT [78].

    Kundur and Hatzinakos [50]  presented image fusion watermarking scheme. They usedsalient features of the image to embed the watermark. They used a saliency measure to

    identify the watermark strength and later embedded the watermark additively.

     Normalized correlation is used to evaluate the robustness of the extracted watermark.

    Later the authors proposed another scheme termed as FuseMark [51] which includes

    minimum variance fusion for watermark extraction. Here, they propose to use a

    watermark image whose size is a factor of the host by 2xy. Tao and Eskicioglu presented

    an optimal wavelet based watermarking scheme. They embedded binary logo watermark

    in all the four bands. But they embedded the watermarks with variable scaling factor indifferent bands. The scaling factor is high for the LL sub band but for the other three

     bands it is lower. The quality of the extracted watermark is determined by Similarity

    Ratio measurement for objective calculation [100]. Ganic and Eskicioglu inspired by

    Raval and Rege [78] proposed a multiple watermarking scheme based on DWT and

    Singular Value Decomposition (SVD). They argued that the watermark embedded by

    Raval and Rege [78] scheme was visible in some parts of the image especially in the low

    frequency areas, which reduced the commercial value of the image. Hence they

    generalized their scheme by using all the four sub bands and embedding the watermark in

    SVD domain. The core technique is to decompose an image into four sub bands and then

    applying SVD to each band. The watermark is actually embedded by modifying the

    singular values from SVD [30].

    2.3  RECENT METHODOLOGIES

     Now-a-days, researchers are focusing on mixing of spatial and transformed domains (i.e.

    combinations of DFT, DWT and DCT) concepts and also applying more and more

    mathematical and statistical model, and other interdisciplinary approaches in

    watermarking: for example use of chaotic theory, fractal image coding etc. In this section

    we are presenting the brief of few recent watermarking algorithms.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    60/182

     34

     

    In [103], authors presented a reversible watermarking scheme for the 2D-vector data

    (point coordinates), which are used in geographical information related applications. This

    reversible watermarking scheme exploits the high correlation among points in the same

     polygon in a map and achieves the reversibility of the whole scheme by an 8-point

    integer DCT, which ensures that the original 2D-vector data can be watermarked during

    the watermark embedding process and then perfectly restored during the watermark

    extraction process. In this scheme, author used an efficient highest frequency coefficient

    modification technique in the integer DCT domain to modulate the watermark bit “0” or

    “1”, which can be determined during extraction without using any additional information.

    To alleviate the visual distortion in the watermarked map caused by the coefficient

    modification, they proposed an improved reversible watermarking scheme based on theoriginal coefficient modification technique. Combined with this improved scheme, the

    embedding capacity could be greatly increased while the watermarking distortion is

    reduced as compared to the original coefficient modification scheme presented in [103].

    In [65], authors presented zero-knowledge watermark detectors. Current detectors are

     based on a linear correlation between the asset features and a given secret sequence. This

    detection function is susceptible of being attacked by sensitivity attacks for which zero-

    knowledge does not provide protection. In this work, a new zero-knowledge watermark

    detector robust to sensitivity attacks is presented, using the generalized Gaussian

    Maximum Likelihood (ML) detector as the basis. The inherent robustness that this

    detector presents against sensitivity attacks, together with the security provided by the

    zero-knowledge protocol that conceals the keys that could be used to remove the

    watermark or to produce forged assets, results in a robust and secure protocol.

    Additionally, two new zero-knowledge proofs for modulus and square root calculation

    are presented. They serve as building blocks for the zero-knowledge implementation of

    the Generalized Gaussian ML detector, and also open new possibilities in the design of

    high level protocols.

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    61/182

     35

    If digital watermarking is to adequately protect content in systems which provide

    resolution and quality scalability, then the watermarking algorithms must provide both

    resolution and quality scalability. Although there exists a trade off between resolution

    and quality scalability, it has been demonstrated that it is possible to achieve both types

     by taking advantage of human visual system characteristics to increase quality scalability

    without compromising resolution scalability. Watermarking algorithms considering this

     problem have been proposed; however, they tend to focus on a single type of scalability,

    resolution [96, 120] or quality [12, 98]. Peng et al. [66] considered both types, but their

    algorithm deals exclusively with authentication and is not a watermarking algorithm. In

    their work [67] authors focused on providing a spread spectrum watermarking algorithm

    which had both resolution and quality scalability demonstrated through experimental

    testing using the JPEG2000 compression algorithm. To alleviate this trade off, they beganwith a non-adaptive resolution scalable algorithm and exploited the contrast sensitivity

    and texture masking characteristics of the HVS to construct an HVS adaptive algorithm

    that has good quality scalability. Their algorithm is specifically designed to concentrate

    on textured regions only, avoiding the visible distortions, which may occur when strength

    increases are applied to edges. Furthermore, this texture algorithm is applied in the

    wavelet domain but uses only a single resolution for each coefficient to be watermarked.

    In their work [126], authors presented a new image adaptive watermarking scheme based

    on perceptually shaping watermark block wise. Instead of the global gain factor, a

    localized one is used for each block. Watson’s DCT-based visual [109] model is adopted

    to measure the distortion of each block introduced by watermark, rather than the whole

    image. With the given distortion constraint, the maximum output value of linear

    correlation detector is derived in one block, which demonstrated the reachable maximum

    robustness in a sense. Meanwhile, an EXtended Perceptually Shaped Watermarking (EX-

    PSW) is acquired through making detection value which approaches to upper limit. It is

     proved mathematically that EX-PSW outputs higher detection value than Perceptually

    Shaped Watermarking (PSW) with the same distortion constraint. Authors used this idea

    and also discussed the adjustment strategies of parameters in EX-PSW, which were

  • 8/16/2019 Final Thesis_6 March Vikas Saxena

    62/182

     36

    helpful for improving the local image quality. Experimental results show that scheme

     provides very good results both in terms of image transparency and robustness.

    In [10], authors presented an Independent Component Analysis (ICA) [40-41] based

    watermarking method. This watermarking scheme is domain-independent ICA-based

    approach. This approach can be used on images, music or video to embed either a robust

    or fragile watermark. In the case of robust watermarking, the method shows high

    information rate and robustness against malicious and non-malicious attacks while

    inducing low distortion. Another version of this scheme is a fragile watermarking scheme

    which shows high sensitivity to tampering attempts while keeping the requirement for

    high information rate and low distortion. The improved performance is achieved by

    employing a set of statistically independent sources (the independent components) as thefeature sp