24
IMAGE WATERMARKING OPTIMIZATION ALGORITHMS IN TRANSFORM DOMAINS AND FEATURE REGIONS HAI TAO Thesis submitted in fulfilment of the requirements of the award of the degree of Doctor of Philosophy (Computer Science) Faculty of Computer Systems and Software Engineering UNIVERSITI MALAYSIA PAHANG April 2012

HAI TAO - UMP Institutional Repositoryumpir.ump.edu.my/5573/1/CD6154.pdf · HAI TAO Thesis submitted in ... boleh melawan kedua-dua serangan geometri dan serangan pemprosesan isyarat

  • Upload
    vudieu

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

IMAGE WATERMARKING OPTIMIZATION ALGORITHMS IN TRANSFORM

DOMAINS AND FEATURE REGIONS

HAI TAO

Thesis submitted in fulfilment of the requirements of the award of the degree of

Doctor of Philosophy (Computer Science)

Faculty of Computer Systems and Software Engineering

UNIVERSITI MALAYSIA PAHANG

April 2012

vi

ABSTRACT

Digital watermarking techniques have been explored considerably since its first

appearance in the 1990s. The achieved tradeoffs from these techniques between

imperceptibility and robustness are controversial. To solve this problem, this study

proposes the application of artificial intelligent techniques into digital watermarking

by using discrete wavelet transform (DWT) and singular value decomposition (SVD).

To protect the copyright information of digital images, the original image is

decomposed according to two-dimensional discrete wavelet transform. Subsequently

the preprocessed watermark with an affined scrambling transform is embedded into

the vertical subband (HLm) coefficients in wavelet domain without compromising the

quality of the image. The scaling factors are trained with the assistance of Particle

Swarm Optimization (PSO). A new algorithmic framework is used to forecast

feasibility of hypothesized watermarked images. In addition, the novelty is to

associate the Hybrid Particle Swarm Optimization (HPSO), instead of a single

optimization, as a model with SVD. To embed and extract the watermark, the singular

values of the blocked host image are modified according to the watermark and scaling

factors. A series of training patterns are constructed by employing between two

images. Moreover, the work takes accomplishing maximum robustness and

transparency into consideration. HPSO method is used to estimate the multiple

parameters involved in the model. Unfortunately, watermark resistance to geometric

attacks is the most challenge work in traditional digital image watermarking

techniques which causes incorrect watermark detection and extraction. Recently, the

strategy of researchers has introduced image watermarking techniques using the

invariant transforms for their rotation and scale invariant properties. However, it

suffers from local transformations which make watermarks difficult to recover. This

thesis will introduce a set of content based image watermarking schemes which can

resist both local geometric attacks and traditional signal processing attacks

simultaneously. These schemes follow a uniform framework, which is based on the

detection of feature points which are commonly invariant to Rotation, Scaling and

Translation (RST), therefore they naturally accommodate the framework of

geometrically robust image watermarking. As a result, it will first introduce the

theories about the feature extraction and the basic principles on how feature points can

act as locating resynchronization between watermark insertion and extraction

discussed in detail. Subsequently, it will present several content-based watermark

embedding and extraction methods which can be directly implemented based on the

synchronization scheme. Further detailed watermarking schemes which combine

feature regions extraction with counter propagation neural network-based watermarks

synapses memorization are then presented. The performance of watermarking

schemes based on framework of feature point shows the following advantages: (a)

Good imperceptibility. It is obvious that the watermarking schemes show a little

influence on watermark invisibility; (b) Good robustness. The proposed scheme is not

only robust against common image processing operations as sharpening, noise adding,

and JPEG compression etc, but also robust against the desynchronization attacks such

as rotation, translation, scaling, row or column removal, cropping, and local random

bend etc.

vii

ABSTRAK

Teknik watermarking digital telah diterokai sejak kemunculan pertamanya pada tahun

1990-an. Pengimbangan yang dicapai ini menjadi kontroversi antara kebolehlihatan

dan keteguhan teknik-teknik tersebut. Untuk menyelesaikan masalah ini, kajian ini

mencadangkan teknik kepintaran buatan ke dalam watermarking digital dengan

menggunakan diskret koncah mengubah (DWT) dan penguraian nilai singular (SVD).

Untuk melindungi maklumat hak cipta imej digital, imej asal terurai mengikut koncah

diskret mengubah dua dimensi. Seterusnya pra proses watermarking dengan

mengubah affined rawak yang tertanam di dalam subband menegak (HLm) pekali

dalam domain ombak kecil tanpa menjejaskan kualiti imej. Faktor-faktor scaling

dilatih dengan bantuan Particle Swarm Optimization (PSO). Satu rangka kerja

algoritma baru digunakan untuk meramal kemungkinan imej hipotesis watermarking.

Di samping itu, pembaharuan ini adalah untuk mengaitkan Hybrid Particle Swarm

Optimization (HPSO), dan bukannya pengoptimuman satu, sebagai satu model dengan

SVD. Untuk menerapkan dan cabutan watermarking, nilai-nilai tunggal imej tuan

rumah yang telah disekat telah diubah suai mengikut watermarking dan faktor-faktor

penskalaan. Satu siri corak latihan yang dibina dengan menggunakan antara dua imej.

Selain itu, penyelidikan ini mencapai tahap keteguhan maksimum dan kebolehlihatan.

Kaedah HPSO digunakan untuk menganggar parameter berbilang yang terlibat dalam

model. Malangnya, rintangan watermarking yang berupa serangan geometri di dalam

teknik tradisional watermarking imej digital yang menyebabkan pengesanan dan

pengestrakan watermarking salah. Strategi penyelidik semasa telah memperkenalkan

teknik imej watermarking yang menggunakan perubahan yang tidak berubah kepada

ciri-ciri putaran dan skala tak berubah. Walau bagaimanapun, ia mengalami

transformasi tempatan yang membuatkan watermarking susah untuk pulih. Tesis ini

akan memperkenalkan satu set imej kandungan berasaskan skim watermarking yang

boleh melawan kedua-dua serangan geometri dan serangan pemprosesan isyarat

tradisional secara serentak. Skim ini mengikut satu rangka kerja yang seragam, yang

berasaskan pengesanan ciri-ciri penting dimana kebiasaannya tidak membawa

perubahan kepada putaran, penskalaan dan penterjemahan, maka mereka secara

semulajadi akan menampung rangka kerja geometri watermarking imej teguh. Oleh

itu, ia akan memperkenalkan teori-teori tentang pengekstrakan ciri dan prinsip-prinsip

asas bagaimana ciri-ciri penting boleh bertindak sebagai penempatan penyelarasan

semula antara penyisipan dan pengekstrakan watermarking dibincangkan secara

terperinci. Kemudian, ia akan menghuraikan beberapa kaedah pembenaman dan

pengekstrakan watermarking muatan asas yang boleh terus dilaksanakan berdasarkan

skim penyelarasan. penerangan selanjutnya mengenai skim watermarking yang

menggabungkan pengekstrakan ciri kawasan dengan rangkaian neural perambatan

kaunter berasaskan watermarking sinaps hafalan kemudiannya dibentangkan. Prestasi

skim watermarking yang berdasarkan rngka kerja ciri penting menunjukkan kelebihan

berikut: (a) Baik dalam keadaan tidak ketara. Ia jelas bahawa bahawa skim

watermarking menunjukkan pengaruh yang kecil ke atas keadaan tidak ketara

watermarking; (b) Keteguhan yang baik. Skim yang dicadangkan bukan sajaha teguh

terhadap operasi pemprosessan imej biasa sebagai penajam, penambahan bunyi bising,

pemampatan JPEG dan sebagainya, tetapi juga teguh terhadap serangan penyelarasan

semula seperti putaran, penterjemahan, penskalaan, penyingkiran lajur dan baris,

pemotongan, pembengkokkan rawak tempatan dan lain-lain.

viii

TABLE OF CONTENTS

Page

SUPERVISOR’S DECLARATION ii

STUDENT’S DECLARATION iii

DEDICATION iv

ACKNOWLEDGEMENTS v

ABSTRACT vi

ABSTRAK vii

TABLE OF CONTENTS viii

LIST OF TABLES xii

LIST OF FIGURES xiii

LIST OF NOMENCLATURES xv

LIST OF ABBREVIATIONS xvi

CHAPTER 1 INTRODUCTION

1.1 Background 1

1.2 Definition of Watermarking 2

1.3 Problem Statements 4

1.4 Research Objectives 6

1.5 Research Contributions 7

1.6 Scope of the Thesis 8

1.7 Thesis Organization 9

CHAPTER 2 BACKGROUNDS AND LITERATURE REVIEW

2.1 Introduction 10

2.2 History of Watermarking 11

2.3 Watermarking Background 13

2.4 Image Watermarking Framework 15

2.4.1 Encoder 16

2.4.2 Detector 16

2.5 Characteristics of Watermarking Systems 17

ix

2.5.1 Imperceptibility 17

2.5.2 Robustness 17

2.5.3 Capacity 18

2.5.4 Security 19

2.5.5 False Positive 19

2.6 Classification Of Digital Watermarking

Applications

20

2.6.1 Digital Watermarking For Copyright

Protection

20

2.6.2 Fingerprinting 21

2.6.3 Copy Control 21

2.7 Attacks Operators 22

2.7.1 Removal Attacks 23

2.7.1.1 Denoising And Lossy

Compression Attacks

23

2.7.1.2 Remodulation Attacks 23

2.7.1.3 Averaging And Collusion Attacks 24

2.7.2 Geometrical Attacks 25

2.7.3 Cryptographic Attacks 26

2.7.4 Protocol Attacks 26

2.7.5 Image Shifting And Line Deletion 26

2.8 Geometric Invariant Watermarking 27

2.8.1 Exhaustive Watermark Search 27

2.8.2 Template-Based Approach and Self-

Synchronizing

28

2.8.3 Invariant Domain 29

2.8.4 Feature Watermarking 30

2.9 Summary 33

CHAPTER 3 METHODOLOGIES

3.1 Introduction 34

3.2 Frequency Domain Transform 34

3.2.1 Singular Value Decomposition 35

3.2.2 Discrete Wavelet Transform 36

3.3 Corner Points Detection 37

3.3.1 Harris Corner Detectors 39

3.3.2 Harris Corner Detection in Scale–Space 42

3.3.3 Harris–Laplace Detector 43

3.3.4 Maximum Features Selection 44

3.3.5 Affine Invariant Detectors 45

3.3.6 Selecting Affine-Harris Detector 47

3.3.7 Affine Second Moment Matrix 48

x

3.3.8 Affine Transformation of Second Moment

Matrix

49

3.3.9 Isotropy Measure 51

3.4 Artificial Intelligence Algorithms 52

3.4.1 Particle Swarm Optimization 53

3.4.2 Hybrid Particle Swarm Optimization 54

3.4.3 Counter Propagation Neural Network 55

3.5 Summary 60

CHAPTER 4 WATERMARKING ALGORITHMS IN TRANSFORM

DOMAIM

4.1 Introduction 62

4.2 Singular Value Decomposition Based on Hybrid

Particle Swarm Optimization

62

4.2.1 Watermark Preprocessing 65

4.2.2 Watermark Embedding Scheme 66

4.2.3 Watermarking Extracting Scheme 66

4.2.4 Parameters setting 67

4.2.5 Experimental results 70

4.2.6 Experimental Results of Imperceptibility 73

4.2.7 Experimental Results of Robustness 74

4.2.8 Computational Efforts Reflecting 78

4.3 Particle Swarm Optimization And Discrete Wavelet

Transform Applied To Watermarking

78

4.3.1 Proposed Scheme using DWT and PSO 80

4.3.2 Watermark Embedding using DWT and

PSO

81

4.3.3 Watermark Extraction using DWT and

PSO

82

4.3.4 Proposed Optimization Process using

DWT and PSO

83

4.3.5 Experimental Results 89

4.3.6 Imperceptibility Using DWT and PSO 89

4.3.7 Robustness Using DWT and PSO 90

4.4 Conclusions 91

CHAPTER 5 WATERMARKING ALGORITHMS IN FEATURE DOMAIN

5.1 Introduction 93

xi

5.2 Image Normalization 94

5.3 Invariant Watermarking in Local Circular Regions 95

5.3.1 Feature Regions Extraction By Harris-

Laplace Detectors

95

5.3.2 Synchronization In Circular Regions 97

5.3.3 Proposed Watermarking Scheme In Local

Circular Regions

99

5.3.4 Watermark Embedding in Local Circular

Regions

100

5.3.5 Watermark Detecting in Local Circular

Regions

101

5.3.6 Experimental Results in Local Circular

Regions

102

5.3.7 Imperceptibility Tests in Local Circular

Regions

102

5.3.8 Robustness Tests in Local Circular Regions 104

5.4 Invariant Watermarking in Affine Circular Regions 105

5.4.1 Feature Regions Extraction By Harris-

Affine Detectors

106

5.4.2 Synchronization in Affine Circular Regions 107

5.4.3 Proposed Watermarking Scheme in Affine

Circular Regions

110

5.4.4 Watermark Embedding in Affine Circular

Regions

111

5.4.5 Watermark Detecting in Affine Circular

Regions

112

5.4.6 Experiments in Affine Circular Regions 113

5.4.7 Imperceptibility Test in Affine Circular

Regions

114

5.4.8 Robustness Test in Affine Circular Regions 114

5.5 Gray-Level Watermarks Insertion and Extraction 116

5.5.1 Grouping Selection 117

5.5.2 Proposed Watermarking Scheme Using

Gray-Level Watermarks

120

5.5.3 Watermarks embedding Using Gray-Level

Watermarks 119

5.5.4 Watermarks extracting Using Gray-Level

Watermarks 121

5.5.5 Imperceptibility Test for Gray-Level

Watermarks

122

5.5.6 Robustness Test for Gray-Level

Watermarks 123

5.6 Summary 127

CHAPTER 6 CONCLUSION AND RECOMMENDATIONS

xii

6.1 Introduction 129

6.2 Contributions 129

6.3 Conclusions 131

6.4 Opportunities for Further Research 132

6.4.1 Feature Theory and Digital Watermarking 132

6.4.2 E-Government Security 133

6.4.3 Smartphone Application and Development 134

6.4.3.1 Launch Multimedia Contents 134

6.4.3.2 Smartphone Wallet Application 135

REFERENCES

APPENDICES

A The summary of literature review

LIST OF PUBLICATIONS

137

148

154

xiii

LIST OF TABLES

Table No. Title Page

4.1 NC value obtained by scaling factors (SF) of the three

images

75

4.2 Fitness values for different population sizes (PS) 75

4.3 The NC values comparison of extracted watermarks with

existing schemes

90

5.1 Watermark Detection Results under General Image

Operations

103

5.2 Watermark Detection Results under Geometric Distortions 104

5.3 Watermark Detection Results under General Image

Operations

116

5.4 Watermark Detection Results under Geometric Distortions 116

xiv

LIST OF FIGURES

Figure No. Title Page

2.1 Nonblind watermarking framework 15

2.2 Blind watermarking framework 16

3.1 (a) Three-level wavelet transform of the „Lena‟ image 37

3.1 (b) three-level wavelet transform of the image 37

3.2 The relationship between eigenvalues and image structure 41

3.3 Structure of counter propagation neural network 56

3.4 The structure of the thesis 61

4.1 The Proposed Method (Watermarking Based On HPSO) 71

4.2 The original image: (a) Lena. (b) Barbara. (c) Mandrill. and the

original watermark (d)

72

4.3 The imperceptibility comparison of watermarked images 73

4.4 Experiment results of the attacked watermarked images and

extracted watermarks using (a) Rotation (RT) (in degree 10) (b)

Resize (RS) (100% to 50% to 100%) (c) Dithering (DT) (d)

Gaussian noise (GN) (0, 0.01) (e) Tampering (TP) (f) Cropping

(CP)(10%) (g) JPEG compression (QF 40) (h) Low pass filtering

(LP) (33) (i) Salt and pepper noise (SP) (0, 0.01)

76

4.5 Fitness values for different population sizes 77

4.6 Diagram for proposed scheme 85

4.7 The original images of (a) Lena; (b) Baboon; (c) watermark and

(d) scrambled watermark

86

4.8 The watermarked images of (a) Lena and (b) Baboon in the

proposed scheme and the watermarked images of (c) Lena and

(d) Baboon in Hsieh scheme

86

4.9 Several attacks on “Lena” and “Baboon” images and their

corresponding extracted watermarks

88

5.1 Illustration of selection local circle regions in Baboon, Lena, and

Peppers images: (a) the original local circle regions, (b) the local

circle regions in middle scale band, and(c) the final chosen local

98

xv

circle regions

5.2 Partition the local circle region 99

5.3 (a) Original image, (b) watermarked image, and (c) difference

image in Lena and Peppers

103

5.4 Illustration of selection affine circle regions in Lena, Baboon,

and Peppers images: (a) the original affine circle regions, (b) the

affine circle regions in middle scale band, and(c) the final chosen

affine circle regions.

108

5.5 Partition the affine circle region 109

5.6 Rotation invariant of partition the normalized affine circle

regions

110

5.7 (a) Original image, (b) watermarked image, and (c) difference

image in Baboon and Lena

113

5.8 (a) Original image, (b) Watermarks embedded regions, and (c)

difference image watermarked image in Lena

122

5.9 (a) Original watermark, (b) Watermarks extracted from six

feature regions

123

5.10 Gray-level watermarks detection from attacked watermarking

image in Lena

127

xvi

LIST OF SYMBOLS

X Input Training Vectors X=(X1, X2,… Xn)

Y Input Training Watermarks Y= (Y1, Y2,… Ym)

D Neuron Vectors Of The Kohonen Layer D=( D1, D2,… Dl)

W Weight Interconnecting Between X Input Layer To

Neuron Unit Di W=( W1i, W2i,… Wni)

V Weight Interconnecting Between Y Input Layer To

Neuron Unit Di V=( V1i, V2i,… Vmi)

X* Output Vectors In The Grossberg Layer X=(X1, X2,… Xn)

Y* Output Watermarks In The Grossberg Layer Y= (Y1,

Y2,… Ym)

T Weight Interconnecting Between Host Image X Output

Layer To Ith Neuron Unit Di T=( T1i, T2i,… Tni)

U Weight Interconnecting Between Watermark Y Output

Layer To Ith Neuron Unit Di U=( U1i, U2i,… Umi)

( )k Learning Parameters During Kohonen Learning

( )k Learning Parameters During Grossberg Learning

xvii

LIST OF ABBREVIATIONS

ACR Affine circular regions

BCD Binary Coded Decimal

CR Cirque regions

LCR Local circular regions

LoG Laplacian-of- Gaussians

NFC Near field communication

SR Subregions

PDA Personal digital assistant

DVD Digital Versatile Disc

SVD Singular Value Decomposition

DWT Discrete Wavelet Transform

PNN Probabilistic Neural Network

AI Artificial Intelligence

NC Normalized Correlation

UQI Universal Quality Index

DCT Discrete Cosine Transform

CHAPTER 1

INTRODUCTION

1.1 BACKGROUND

Due to the rapid and comprehensive development of network technologies,

digital multimedia contents can be delivered with maintained good quality, almost

immediate transmission protection and low price of multimedia contents has recently

developed into a significant problem because of purchaser's insufficient recognition of

the possession of intellectual property. Therefore, over the past a couple of decades,

digital multimedia technology has turned up to search for responses to the question: can

researchers ensure tamper-resistance and protect the copyright of digital contents by

processing, communicating and storing digital information encoded in procedures

where digital media content be able to effortlessly be distributed through

communication channels? Today it is fully apprehended that the answer is positive, and

numerous researchers all over the world are studying towards the considerably

progressive technical target of protecting the ownership of digital contents. The efforts

would dramatically protect inventions represented in digital form for being vulnerable

to illegal possession, duplication and dissemination. Digital watermarking (Cox I.J.,

et.al. 1997) is the process of embedding or hiding digital information called watermark

into a multimedia product, and then the embedded data can later be extracted or

detected from the watermarked product. The technique can protect digital content

copyright and ensure tamper-resistance, which is indiscernible and hard to remove by

unauthorized persons.

Up to now, two traditionally-used strategies, spatial-domain (Takahashi A., et al.

2005) and transform domain (Kim T.Y., et al. 2004) techniques have been developed

2

for digital image watermarking. The former category is designed to insert directly a

watermark into the original image by a factor, which would lead to fair-quality

watermarked images. The latter approach, for taking advantage of perceptual properties,

is devised to embed a watermark into transform domains of the original images. The

types watermarking schemes have good performances of robustness to the most

common signal processing manipulations such as JPEG compression, filtering, and

addition of noise (Cox I.J., et al. 1997; Cox I.J., et al. 2001; Lu C.S., et al. 2000). The

common image processing operators are applied to watermarked images for removing

the watermark or decreasing its energy, and the result is that the extracted watermark is

unrecognizable or insufficient as the validate evidence.

Unfortunately, the ineffectiveness of existing traditional watermarking

algorithms is described by the robustness against unintentional or malicious geometric

attacks (Licks V. and Jordan R., 2005). Especially, geometrical attacks cause

synchronization errors between the original watermark and the extracted one through

the extraction procedure. In other words, the watermark still includes in watermarked

images, but its positions have been changed. Therefore, traditional watermarking

systems need to be extended for the resilience to watermarked data geometrical

modifications. In the developed frameworks, synchronization errors correction is now

possible. Besides facilitating more efficient copyrighted protection and robustness

against common image processing operators and desynchronization attacks, adaptation

of geometrically invariant image features can potentially offer a greater robust capacity

to detect watermarks without synchronization errors, especially when applied to survive

local distortions such as Random bending attacks. The development of such framework

is an essential starting point for organizations that wish to improve, or replace currently

existing watermarking algorithms based pixels, frequency or other transform

coefficients for watermarks embedding and to develop a set of means to establish and

maintain feature-based watermarking of geometric distortions correction.

1.2 DEFINITION OF WATERMARKING

A great number of multimedia information is now being generated, distributed

and stored with digital forms, Newspapers, and magazines. For example, these have

3

published online to provide real-time coverage of stories with high-quality audio, still

images, and even video sequences. The explosive accretion in using public networks

such as the Internet has further encouraged the online presence of publishers by

providing an inexpensive and quick way to distribute their work. However, the great

growth of digital media is not limited to news organizations. Commercial music may be

downloaded off of the Internet and purchased, stock photography vendors digitize and

sell photographs in electronic form, and Digital Versatile Disc (DVD) systems provide

movies with clear images and CD-quality sound. Unfortunately, media stored in digital

form are vulnerable in a number of ways. First of all, digital media may be redistributed

and copied simply, either legally or illegally, at low cost and with no loss of

information. In addition, today's fast computers allow digital media to be easily

manipulated, so it is possible to incorporate portions of a digital signal into one's own

work without regard for copyright restrictions placed upon the work.

Digital watermarking is considered as a partial solution to the problem of

protecting copyright ownership. Essentially, watermarking is defined as the process of

embedding sideband data directly into the samples of a digital audio, image, or video

signal. Sideband data is typically ―extra‖ information that must be transmitted along

with a digital signal, such as block headers or time synchronization markers. It is

important to realize that a watermark is not transmitted in addition to a digital signal,

but rather as an indispensable part of the signal samples. The value of watermarking

comes from the fact that regular sideband data may be modified or lost when the digital

signal is converted between formats, but the samples of the digital signal are typically

unchanged.

To elucidate this concept further, it is helpful to consider an analogy between

digital watermarks and paper watermarks. Watermarks have traditionally been used as a

form of authentication for paper currency and legal documents. A watermark is

embedded within the fibers of paper when it is first constructed, and it is essentially

invisible unless held up to viewed at a particular angle or a special light. More

importantly, a watermark is very difficult to remove without destroying the paper itself,

and it is not transferred if the paper is photocopied. The targets of digital watermarking

4

are similar, and it will be shown in the next section that digital watermarks require

similar properties.

Before the concept of watermarking can be explored further, three important

definitions must first be established. A host signal is a raw digital audio, image, or

video signal that will be used to contain a watermark. A watermark itself is loosely

defined as a set of data, usually in binary form, that will be stored or transmitted

through an original signal. The watermark may be as small as a single bit, or as large as

the number of samples in the host signal itself. It may be a copyright notice, a secret

message, or any other information. Watermarking is the process of embedding the

watermark within the host signal. Finally, a secret key may be necessary to embed a

watermark into a host signal, and it may be needed to extract the watermark data

afterwards (Cox et al., 1997).

1.3 PROBLEM STATEMENTS

Digital watermarking algorithms are effectively applied to associated broadcast

monitoring systems and copy control applications. In combination with digital rights

management systems, these techniques can solve the bottleneck of the intellectual

property dilemma in audio- and image-related business areas. In an early stage of

watermarking, users considered resisting to geometric attacks as an advantage of one

technique over alternative implementations. For feature-based watermarking schemes,

however, surviving geometric attacks is a precondition. The past 10 years have

witnessed a important advancement in people recognizing of geometrical attacks and

methods for surviving them. Some approach proposed particular types of attacks,

although just a few of watermarking methods, in fact, survived the huge set of potential

variations of combined approaches. Even afterwards, many researchers identifying of

these threats, which the attacks compel on the performance of existent and upcoming

methods are limited. It may just reflect the limitations of efficient benchmarking

procedures and theoretical grounds for evaluating them..

(Cox et al. 1997) proposed a spread spectrum watermarking scheme based on

discrete cosine transform (DCT). The scheme aims to hide Gaussian distributed noise-

5

style watermarks. But these noisy style watermarks may not offer any resistance for

compressing the image data or for low-pass filtering attacks. (Lee et al. 2006) presented

a Genetic Algorithm-Based watermarking algorithm in the discrete wavelet transform

domain. Wavelet-domain low-frequency region watermark insertion and genetic

algorithm-based watermark extraction are possible in the algorithm. However, the

major deficiency is the higher degree of visual distortion which is similar to the results

shown in (Hisashi I., 2000). Additionally, GA suffers from important limitations of

high computational costs which eventually results in low convergence speed. (Ziqiang

et al., 2007) integrated DWT with particle swarm optimization (PSO) for watermarking

digital images. The technique embeds watermark into coefficients of DMT that holds

value larger than some threshold value. Subsequently the extraction is performed

through PSO. However, an obvious limitation of their proposed method is that the

application of PSO was simply done for evaluating the feasibility of the extracted

watermarks.

Additionally, (Chung et al. 2007) gave a guideline to embed the watermark into

both U and V components of the images using SVD. However, it was important to

mention that the previously cited watermarking schemes based on singular vectors

cannot preserve the orthgonalization of the U and V matrices. (Aslantas V 2008, 2009)

presented two optimized watermarking scheme using genetic algorithm (GA) and

differential evolution algorithm to obtain multiple scaling factors for embedding

watermark based on SVD-based watermarking method of (Liu and Tan, 2002).

However, (Zhang and Li 2005) noted that the watermarking algorithm was

fundamentally flawed in that the extracted watermark was not the embedded one but

decided by the reference watermark. The reference watermark generated the pair of

SVD matrices used in the watermark detector. In the watermark detection process, the

fact that the exploited SVD matrices relied on the reference watermark biased the false

positive detection rate such that it had a probability of one. Therefore, any reference

watermark that is being explored in an arbitrary image can be detected. However, less

research work has been reported so far on the corrected optimal SVD-based image

watermarking scheme.

6

Furthermore, while the common image processing operations reduce watermark

energy, desynchronization attacks induce synchronization errors between the original

and the extracted watermark during the detection process. Most of the previous

watermarking schemes are robust to common image processing operations, but show

severe problems to de-synchronization attacks. Today, most watermarking methods

cannot reach the main approach which is efficiently insensitive to various attacks. It is

still a wide and attractive field for further research in which innovative methods and

techniques may be established. In this thesis, it propose geometrically invariant digital

image watermarking approaches to construct watermark synchronization using neural

networks and local feature detectors to achieve its goals.

Watermark resistance to geometric attacks is the most challenge work in

traditional digital image watermarking techniques which causes incorrect watermark

detection and extraction. Recently, the strategy of researchers has introduced image

watermarking techniques using the invariant transforms for their rotation and scale

invariant properties. However, it suffers from local transformations which make

watermarks difficult to recover. For solving these problems, researchers proposed a

series of feature-based geometrically invariant watermarking algorithms simplifying to

synchronization deformation. Basically, any given watermarking system should be able

to have good performance of robustness, fidelity and data payload. Robustness ensures

that the retriever is still able to extract the watermark information even if the

watermarked image is deformed by various attacks. Fidelity deals with whether a

watermark was inappropriately embedded according to the perceptual between the

original and watermarked image. Finally, payload refers to the amount of efficient bits

that can be embedded in original images and retrieved reliably under normal operations.

1.4 RESEARCH OBJECTIVES

To acquire accomplishing maximum robustness and transparency into

consideration in transform domain.

To obtain the highest possible level of robustness while maintain the perceptual

transparency in feature regions.

7

1.5 RESEARCH CONTRIBUTIONS

This work provides the following set of original contributions:

In transform domain, the corrected SVD-based optimal watermarking technique

is proposed for ownership protection based on hybrid particle swarm optimization

(HPSO). Experimental results show both the significant improvement in transparency

and the robustness under attacks. Simulation results demonstrate that the proposed

scheme can effectively improve the quality of the watermarked image and resist to

common image manipulations such as adding noise, resizing compression, tempering,

etc. and some geometric attacks.

In addition, the algorithm is devoted to introduce a novel algorithmic framework

for solving an optimal embedding and extracting problem in DWT domain. In the

proposed technique, the retrieval of watermark is distinguished with three important

features: i) it does not depend upon the availability of the original image; ii) it makes an

effective use of PSO for parameters estimation; iii) it possesses an appreciative

capability for simultaneously optimizing multiple scaling factors for obtaining the

highest possible level of robustness while maintaining the perceptual transparency in

embedding watermark images.

In feature regions, the algorithm is devoted to propose a novel geometrically

invariant watermarking method for solving an optimal embedding and extracting

problem using Harris-Laplace operators and counter propagation neural networks.

Sufficient experiments demonstrate the better robustness of this approach than others‘

scheme in the same level of imperceptibility, especially in resisting geometry attacks

and combined attacks.

In addition, the second method first proposes a geometrically invariant digital

image watermarking technique to construct watermark synchronization using synapses

memorization and affine covariant region. The comparison of the presented approach

with previous algorithms in terms of robustness and imperceptibility is also provided.

8

The experimental results show that the proposed scheme has the remarkable

performance in resistant to common image processing operations survival the

desynchronization attacks.

Finally, to design gray-level watermark extraction scheme against

desynchronization attacks, the third method proposed a novel geometrically invariant

watermarking scheme based on grouping Harris-Laplace detector and the counter

propagation neural network with low computational complexity, good visual quality

and reasonable resistance toward desynchronization attacks. In the simulation results, it

demonstrates that the proposed image watermarking is not only imperceptibility and

robust against common image processing operations such as sharpening, noise adding,

and JPEG compression etc, but also robust against the geometric distortions such as

rotation, translation, scaling, row or column removal, cropping, and local random bend

etc.

1.6 SCOPE OF THE THESIS

To devoted to introduce a novel algorithmic framework for solving an optimal

embedding and extracting problem. The optimal algorithm achieves this by using a

forecasted feasibility for parameters evaluation in DWT domain.

To correct and propose SVD-based optimal watermarking technique for

ownership protection based on hybrid particle swarm optimization (HPSO). The

singular values of the host image are modified by embedding the watermark into the

blocked host images according to employing multiple scaling factors. The HPSO,

individuals and new generation are created, not only by crossover and mutation

operators as in GA, but also by PSO.

To develop a feature-based watermarking framework for attempting to reacquire

synchronization, allowing for complicated tradeoff between the three aforementioned

properties. To do so, the next part first investigates and develops feature selection

procedures which can be employed as a set of nonoverlapped and stable regions within

the framework including: Harris–Laplace detector and affine covariant region detectors

9

and other improved feature detectors. Specifically, the counter propagation neural

network is applied to watermarks detection and extraction. It is not so much a new

discovery as it is a novel combination of previously existing network types. Hecht-

Nielsen synthesized the architecture from a combination of a structure known as a

competitive network and Grossberg structure. The operation of the network is quite

straightforward. The existence of a reset mechanism will remove the current input

pattern if another is stored. And this storage effect appears to be permanent. This long-

term memory behavior applies the efficient evidence for extracting watermarks from

seriously distorted watermarking images. And it handles low computational complexity,

good visual quality and reasonable resistance toward desynchronization attacks, in

particular the issues of bit error probability.

1.7 THESIS ORGANIZATION

The remainder of this dissertation is organized as follows. Chapter 2 provides a

summary of related work regarding the typical framework of image watermarking,

characteristics, applications and attacked techniques of watermarking systems, and

existing geometrically invariant watermarking. Chapter 3 describes specific

methodologies in the areas of transform domains images feature selection and artificial

intelligent techniques. Chapter 4 presented an optimal robust image watermarking

technique based on Discrete Wavelet Transform (DWT), and presents a novel optimal

robust image watermarking technique based on HPSO which is robust against a variety

of common image-processing attacks and some geometric attacks. Chapter 5 provides

three algorithms which the watermarks are embedded in the synapses of counter

propagation Neural Network. Experiments demonstrates that the proposed image

watermarking framework is not only imperceptibility and robust against common image

processing operations such as sharpening, noise adding, and JPEG compression etc, but

also robust against the geometric distortions such as rotation, translation, scaling, row

or column removal, cropping, and local random bend etc. Finally, Chapter 6 concludes

the work by providing a summary of the accomplishments as well as future directions

for research.

10

CHAPTER 2

BACKGROUNDS AND LITERATURE REVIEW

2.1 INTRODUCTION

In this chapter reviews the appropriate background literature and describes the

concept of watermarking, characteristics of watermarking systems, the classification of

digital watermarking applications and attacked operators. Scientific publications

included into the literature survey have been chosen in order to build a sufficient

background that would help out in solving the research problems stated in Chapter 1. In

addition, Chapter 2 presents general concepts and definitions used and developed in

more details in Chapters 3, 4 and 5. The thesis is decided to divide the feature point

theoretical background, methodologies and experiments into three parts, presented in

Chapters 3, 4 and 5 because of the specific structure of the thesis, which presents three

different algorithms for geometric invariant image watermarking, contrary to the usual

schemes with the valued-added cover images in the special regions. Therefore, the

theoretical background and literature review in subjunction to the particular concept is

given as a separate chapter in the respective chapters. In this manner, it much easier for

the reader to follow the presented concepts, and the chapters themselves can also be

read as standalone readings.

In the first section, the properties of the general watermarking frameworks that

are exploited in the process of encoding and detecting watermarking are shortly

reviewed. A survey of the key digital image watermarking algorithms and techniques is

presented subsequently. The characteristics of watermarking systems are described for

evaluating the performance of watermarking systems. There are five important issues

that are usually considered in the most practical application; they are highlighted in the

11

following subsections. In addition, digital watermarking is described as an efficient

method for the protection of ownership rights of digital audio, image, video and other

data types. It can be applied to different applications including digital signatures,

fingerprinting, broadcast and publication monitoring, authentication, copy control, and

secret communication. Watermarking attacks can be classified into two broad

categories: destruction attacks: including image compression, image cropping, spatial

filtering, etc., and synchronization attacks: including image rotation, image shifting and

pixelhine deletion. The chapter lists and describes some of these conventional attacks in

the following sections.

For constructing geometric invariant watermarking, four mainstream schemes

are introduced by literature reviews on watermarking algorithms robust to the

geometrical distortions. Most of these efforts confine to theoretically analyzing and

quantifying the effect of the global and local affine transform to the performance of the

watermarking algorithms.

2.2 HISTORY OF WATERMARKING

The thought to communicate secretly is as ancient as communication itself. First

stories appeared in the old Greek literature, which can be explained as early records of

covert communication, for example, in Homer‘s Iliad, or in tales by Herodotus. The

word ―steganography,‖ which is still used until today, derives from the Greek language

and means covert communication. In (Kobayashi M., 1997; Petitcolas F.A.P., et

al.1999), they have investigated the historical facts of covert communication in detail,

including the broad use of methods for covert and secret communication before and

during the two World Wars, and steganographic methods for analog signals. Although

the historical background is very interesting, this part does not cover it here in detail.

Please refer to (Kobayashi M., 1997; Petitcolas F.A.P., et al.1999) for an in-depth

inquisition of historic aspects.

Paper watermarks arose in the art of handmade papermaking about 700 years

ago. The oldest watermarked paper discovered in archives dates back to 1292 and has

its origin in Fabriano, Italy, which is considered the birthplace of watermarks. At the