11
SPECIAL SECTION ON LATEST ADVANCES AND EMERGING APPLICATIONS OF DATA HIDING Received March 31, 2016, accepted April 12, 2016, date of publication April 25, 2016, date of current version May 9, 2016. Digital Object Identifier 10.1109/ACCESS.2016.2556723 Rank-Based Image Watermarking Method With High Embedding Capacity and Robustness TIANRUI ZONG 1 , YONG XIANG 1 , (Senior Member, IEEE), SONG GUO 2 , (Senior Member, IEEE), AND YUE RONG 3 , (Senior Member, IEEE) 1 School of Information Technology, Deakin University, VIC 3125, Australia 2 Department of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu 965-8580, Japan 3 Department of Electrical and Computer Engineering, Curtin University, Bentley, WA 6102, Australia Corresponding author: Y. Xiang ([email protected]) ABSTRACT This paper presents a novel rank-based method for image watermarking. In the watermark embedding process, the host image is divided into blocks, followed by the 2-D discrete cosine trans- form (DCT). For each image block, a secret key is employed to randomly select a set of DCT coefficients suitable for watermark embedding. Watermark bits are inserted into an image block by modifying the set of DCT coefficients using a rank-based embedding rule. In the watermark detection process, the corresponding detection matrices are formed from the received image using the secret key. Afterward, the watermark bits are extracted by checking the ranks of the detection matrices. Since the proposed watermarking method only uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity. Moreover, our method is free of host signal interference. This desired feature and the usage of an error buffer in watermark embedding result in high robustness against attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method. INDEX TERMS Image watermarking, host signal interference, discrete cosine transform, high embedding capacity. I. INTRODUCTION With the fast growth of communication networks and advances in multimedia processing technologies, multimedia piracy has become a serious problem. In an open network environment, digital watermarking is a promising technology to tackle multimedia data piracy. In digital watermarking, the watermark data (such as publisher information, user identity, file transaction/downloading records, etc.) are hidden into the actual multimedia object without affecting its normal usage. When necessary, the owners or law enforcement agencies can extract the watermark data, by using a secret key, to trace the source of illegal distribution. While digital watermarking can be applied to various multimedia data such as audio, image and video, this paper focuses on image watermarking. In the context of image watermarking, imperceptibility, robustness, embedding capacity and security are of pri- mary concerns. So far, various image watermarking schemes have been reported in the literature and many of them were built upon techniques related to histogram [1], [2], moment [3], [4], spatial feature regions [5], [6], spread spectrum (SS) [7]–[14] and quantization [15]–[21]. In many applications, such as covert communication, high embedding capacity is desired, while robustness against geometric attacks is not mainly concerned. Compared to the water- marking methods in [1]–[6], the methods based on SS and quantization can normally achieve higher embedding capac- ity under given imperceptibility and robustness. The SS-based watermarking methods usually insert watermark bits into the host image as pseudo-random noise either additively or multiplicatively. The idea of SS-based watermarking originated from Cox’s pioneer work [7]. The SS-based watermarking approach has simple watermark embedding and detection structure but it suffers from the problem of host signal interference (HSI). It is known that HSI can greatly degrade the performance of watermark detec- tion, especially in the presence of attacks, and thus lower robustness. Cannons and Moulin used the hash information of the host image in both embedding and detection phases of SS-based watermarking to reject HSI [8] but the method in [8] is not blind. Many efforts have been made to develop blind SS-based methods to cope with HSI. Under the additive SS structure, the method in [9] reduced HSI by modulat- ing the watermark energy based on the correlation between the host image and the watermark sequence. Its detection VOLUME 4, 2016 2169-3536 2016 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. 1689

Rank-Based Image Watermarking Method With High Embedding

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Rank-Based Image Watermarking Method With High Embedding

SPECIAL SECTION ON LATEST ADVANCES AND EMERGING APPLICATIONS OF DATA HIDING

Received March 31, 2016, accepted April 12, 2016, date of publication April 25, 2016, date of current version May 9, 2016.

Digital Object Identifier 10.1109/ACCESS.2016.2556723

Rank-Based Image Watermarking Method WithHigh Embedding Capacity and RobustnessTIANRUI ZONG1, YONG XIANG1, (Senior Member, IEEE), SONG GUO2, (Senior Member, IEEE),AND YUE RONG3, (Senior Member, IEEE)1School of Information Technology, Deakin University, VIC 3125, Australia2Department of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu 965-8580, Japan3Department of Electrical and Computer Engineering, Curtin University, Bentley, WA 6102, Australia

Corresponding author: Y. Xiang ([email protected])

ABSTRACT This paper presents a novel rank-based method for image watermarking. In the watermarkembedding process, the host image is divided into blocks, followed by the 2-D discrete cosine trans-form (DCT). For each image block, a secret key is employed to randomly select a set of DCT coefficientssuitable for watermark embedding. Watermark bits are inserted into an image block by modifying the set ofDCT coefficients using a rank-based embedding rule. In the watermark detection process, the correspondingdetection matrices are formed from the received image using the secret key. Afterward, the watermark bitsare extracted by checking the ranks of the detection matrices. Since the proposed watermarking methodonly uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity.Moreover, our method is free of host signal interference. This desired feature and the usage of an error bufferin watermark embedding result in high robustness against attacks. Theoretical analysis and experimentalresults demonstrate the effectiveness of the proposed method.

INDEX TERMS Image watermarking, host signal interference, discrete cosine transform, high embeddingcapacity.

I. INTRODUCTIONWith the fast growth of communication networks andadvances in multimedia processing technologies, multimediapiracy has become a serious problem. In an open networkenvironment, digital watermarking is a promising technologyto tackle multimedia data piracy. In digital watermarking, thewatermark data (such as publisher information, user identity,file transaction/downloading records, etc.) are hidden into theactual multimedia object without affecting its normal usage.When necessary, the owners or law enforcement agencies canextract the watermark data, by using a secret key, to trace thesource of illegal distribution. While digital watermarking canbe applied to various multimedia data such as audio, imageand video, this paper focuses on image watermarking.

In the context of image watermarking, imperceptibility,robustness, embedding capacity and security are of pri-mary concerns. So far, various image watermarking schemeshave been reported in the literature and many of themwere built upon techniques related to histogram [1], [2],moment [3], [4], spatial feature regions [5], [6], spreadspectrum (SS) [7]–[14] and quantization [15]–[21]. In manyapplications, such as covert communication, high embedding

capacity is desired, while robustness against geometricattacks is not mainly concerned. Compared to the water-marking methods in [1]–[6], the methods based on SS andquantization can normally achieve higher embedding capac-ity under given imperceptibility and robustness.

The SS-based watermarking methods usually insertwatermark bits into the host image as pseudo-random noiseeither additively or multiplicatively. The idea of SS-basedwatermarking originated from Cox’s pioneer work [7]. TheSS-based watermarking approach has simple watermarkembedding and detection structure but it suffers from theproblem of host signal interference (HSI). It is known thatHSI can greatly degrade the performance of watermark detec-tion, especially in the presence of attacks, and thus lowerrobustness. Cannons and Moulin used the hash informationof the host image in both embedding and detection phases ofSS-basedwatermarking to reject HSI [8] but themethod in [8]is not blind. Many efforts have been made to develop blindSS-based methods to cope with HSI. Under the additiveSS structure, the method in [9] reduced HSI by modulat-ing the watermark energy based on the correlation betweenthe host image and the watermark sequence. Its detection

VOLUME 4, 20162169-3536 2016 IEEE. Translations and content mining are permitted for academic research only.

Personal use is also permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

1689

Page 2: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

FIGURE 1. Block diagram of watermark embedding process.

performance was further enhanced in [10] by utilizing theprobability distribution function leakage of the detector.In [11] and [12], two types of new watermark detectorswere proposed to tackle HSI, which exploit the hierarchi-cal spatially adaptive image model and the multi-carrierconcept, respectively. Under the multiplicative SS structure,some SS-based methods have also been developed to combatHSI [13], [14].Whilst themethods in [9]–[14] can reduceHSIto certain extents, their performance deteriorates dramaticallywith the rise of embedding rate.

In quantization based watermarking methods, features areextracted from the host image and quantized to the latticepoints to embed watermark sequences [15]–[17]. Comparedto the SS-based methods, the methods in [15]–[17] do nothave the HSI problem. However, they are vulnerable to theamplitude scaling attack. Pilot signals were used in [18]to tackle the amplitude scaling attack but pilot signals canbe easily detected and thus removed. In [19], the modifiedWatson’s perceptual model, which scales linearly with theamplitude scaling attack, was utilized to adaptively select thequantization amount. Nezhadarya et al. proposed a gradientdirection watermarking method in [20] by uniformly quantiz-ing the direction of gradient vectors. In [21], the host signalwas divided into two parts and quantization was implementedin both parts, respectively. However, similar to the SS-basedwatermarking methods, the quantization based watermark-ing methods do not perform well under high embeddingrates.

In [22], Koch and Zhao proposed a method by modifyingthe relationship between three coefficients to embed onewatermark bit. However, this method can only embed onewatermark bit in each image block, which significantly limitsits embedding capacity. In addition, since the watermarkdetection in [22] depends on a fixed detection threshold, itcannot work under the amplitude scaling attack with a factorsmaller than 1 and is vulnerable to some other commonattacks like noise addition.

In this paper, we present a novel rank-based image water-markingmethod to significantly increase embedding capacitywhile maintaining satisfactory imperceptibility and robust-ness against common attacks. In the proposed method, the2-D discrete cosine transform (DCT) is applied to each imageblock to obtain the corresponding DCT coefficients. A secretkey is utilized to randomly choose a set of DCT coefficients

suitable for embeddingwatermarks. The embedding of water-mark bits is carried out by altering the set of DCT coefficientsusing a rank-based embedding rule, where an error buffer isalso utilized to deal with the errors caused by attacks. At thewatermark detection end, we compute the DCT coefficientsfrom the received image and then construct the detectionmatrices using the same secret key. The embedded watermarkbits can be extracted by checking the ranks of the detectionmatrices. Compared with the existing image watermarkingmethods, the proposed method has much higher embeddingcapacity. At the same time, it has high perceptual quality andis robust against common attacks. The superior performanceof our method is analyzed in theory and demonstrated bysimulation results.

The remainder of the paper is organized as follows.Section II introduces the proposed image watermarkingmethod. The robustness of the proposed method is analyzedin Section III. The simulation results are shown in Section IV.Section V concludes the paper.

II. PROPOSED METHODThe proposed image watermarking method is composed oftwo parts: watermark embedding and watermark detection.Figs. 1 and 2 show the watermark embedding process anddetection process, respectively.

A. WATERMARK EMBEDDINGConsider a gray level host image I of size R × C . Withoutloss of generality, I is partitioned into N non-overlappingblocks I1, I2, . . . , IN , where the size of each block isM ×Mand M is a positive integer power of 2. The 2-D DCT isapplied to each block to obtain the DCT counterparts F {I1} ,F {I2} , . . . , F {IN } of dimension M ×M . Since low fre-quency components carry perceptually important informationand high frequency components are vulnerable to image com-pression attack, it is appropriate and common to use the DCTcoefficients corresponding to the middle frequency range forwatermark embedding [23], [24]. In each block, we use asecret key to randomly select 2K suitable DCT coefficientsto form a DCT coefficient set, where the purpose of usinga secret key is to introduce security. Denote the length-2Kcoefficient set in the nth block by

xn = [xn(1), xn(2), . . . , xn(2K )] (1)

1690 VOLUME 4, 2016

Page 3: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

FIGURE 2. Block diagram of watermark detection.

where n = 1, 2, . . . ,N . From xn, we can obtain K pairs ofDCT coefficients xn,1, xn,2, . . . , xn,K with

xn,k = [xn(2k − 1), xn(2k)] (2)

where k = 1, 2, . . . ,K . Based on (1) and (2), it follows

xn = [xn,1, xn,2, . . . , xn,K ] (3)

where n = 1, 2, . . . ,N . Each pair of DCT coefficients willbe used to hide one watermark bit.

Let

wn = [wn(1),wn(2), . . . ,wn(K )] (4)

be the sequence of K watermark bits to be embeddedinto the nth image block, where the watermark bits wn(k),k = 1, 2, . . . ,K take values from {0, 1}. The total length ofthe watermark sequence isN×K . Define the 2K×2K matrix

An1= {An(i, j)}1≤i,j≤2K (5)

and initiate it as a zero matrix. Let

E0 =

[0.5 0.50.5 0.5

]and E1 =

[1 00 1

]. (6)

Based on the values of the watermark bits, we update someentry values of An as follows:[

An(2k − 1, 2k − 1) An(2k − 1, 2k)An(2k, 2k − 1) An(2k, 2k)

]=

{E0, if wn(k) = 0E1, if wn(k) = 1

(7)

for k = 1, 2, . . . ,K .Also, define the 1× 2K vector

bn1= {bn(i)}1≤i≤2K (8)

and let

Tn(k) = T − |xn(2k − 1)− xn(2k)| (9)

where T is a threshold and | · | denotes the absolute function.For k = 1, 2, . . . ,K , the element values of bn are set asfollows:• If wn(k) = 0 or Tn(k) ≤ 0, then

[bn(2k − 1), bn(2k)] = [0, 0]. (10)

• If wn(k) = 1 and Tn(k) > 0, then

[bn(2k − 1), bn(2k)]

=

{[αTn(k),−βTn(k)], if xn(2k − 1) ≥ xn(2k)[−αTn(k), βTn(k)], if xn(2k − 1) < xn(2k)

(11)

where α and β are weighting parameters satisfyingα ≥ 0, β ≥ 0 and α + β = 1.

Let

xWn = [xWn (1), xWn (2), . . . , xWn (2K )] (12)

be the watermarked counterpart of xn. Given An and bn, thesequence of watermark bits wn are embedded into xn usingthe following embedding rule:

xWn = xnAn + bn (13)

where n = 1, 2, . . . ,N . Here, bn acts as an error bufferin the embedding of watermark bits. By replacing xn inF {In} with xWn , one can get the watermarked counterpartof F {In}, denoted as F

{IWn}. After that, we apply the 2-D

inverse discrete cosine transform (IDCT) to F{IWn}to obtain

the watermarked image block IWn . Finally, the watermarkedimage IW can be constructed by combining all of the water-marked image blocks together.Remark 1: The proposed watermark embedding scheme

uses only two DCT coefficients to hide one watermarkbit. As a result, high embedding capacity can be achieved.In contrast, those image watermarking methods reportedin the literature like [12], [19], and [21] require morecoefficients to embed one watermark bit; Otherwise, poorwatermark detection performance is expected.

B. WATERMARK DETECTIONDenote the received image as I′. Similar to the embed-ding process, I′ is divided into N non-overlapping blocksI′1, I

2, . . . , I′N of dimensionM×M . Applying 2-DDCT to the

received image blocks yields the corresponding DCT com-ponents F

{I′1}, F

{I′2}, . . . , F

{I′N}of dimension M ×M .

In the nth block F{I′n}, the secret key can be used to find the

length-2K DCT coefficient set x′n containing K watermarkbits. Denoting

x′n = [x ′n(1), x′n(2), . . . , x

′n(2K )] (14)

VOLUME 4, 2016 1691

Page 4: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

one can sequentially compute

x̄ ′n(k) = |x′n(2k − 1)− x ′n(2k)| (15)

and

T ′n(k) = max{x̄ ′n(k), T/2

}. (16)

Based on T ′n(k), we construct the following detection matrixfor the extraction of the kth watermark bit in the nth block:

Xn,k =

[T/2 T ′n(k)T ′n(k) T/2

](17)

where k = 1, 2, . . . ,K and n = 1, 2, . . . ,N .In order to use Xn,k to extract the kth watermark bit in

the nth block, let us analyze the property of Xn,k in theabsence of attacks. Since attacks are absent, it is obviousthat I′ = IW , which results in x′n = xWn or x ′n(k) = xWn (k)with k = 1, 2, . . . ,K and n = 1, 2, . . . ,N . The analysis isconducted under two scenarios: the watermark bit is ‘‘0’’ andthe watermark bit is ‘‘1’’.

1) THE CASE OF wn(k) = 0If wn(k) = 0, it follows from (6), (7), (10) and (13) that

[xWn (2k − 1), xWn (2k)]= [xn(2k − 1), xn(2k)] · E0 + [bn(2k − 1), bn(2k)]

=

[xn(2k − 1)+ xn(2k)

2,xn(2k − 1)+ xn(2k)

2

](18)

which means ∣∣∣xWn (2k − 1)− xWn (2k)∣∣∣ = 0. (19)

Since x ′n(k) = xWn (k), it yields from (15) and (19) that

x̄ ′n(k) = 0. (20)

Based on (16) and (20), it follows

T ′n(k) = max {0, T/2}= T/2. (21)

Substituting (21) into (17), we can see that the detectionmatrix Xn,k is rank deficient as its entries have the samevalue T/2.

2) THE CASE OF wn(k) = 1Without loss of generality, we first consider the situation ofwn(k) = 1, Tn(k) > 0 and xn(2k − 1) ≥ xn(2k). From (6),(7), (11) and (13), we have

[x ′n(2k − 1), x ′n(2k)]= [xWn (2k − 1), xWn (2k)]= [xn(2k − 1), xn(2k)] · E1 + [αTn(k),−βTn(k)]= [xn(2k − 1)+ αTn(k), xn(2k)− βTn(k)] . (22)

Recall that α + β = 1. From (9), (15) and (22), it holds that

x̄ ′n(k) = |(xn(2k − 1)+ αTn(k))− (xn(2k)− βTn(k))|= |(xn(2k − 1)− xn(2k))+ (αTn(k)+ βTn(k))|= |T − Tn(k)+ Tn(k)|= T . (23)

Combing (16) and (23), we obtain

T ′n(k) = max {T ,T/2}

= T . (24)

By substituting (24) into (17), one can see that the detectionmatrix Xn,k is of full rank.Also, it can be verified that Xn,k has full rank in the

situation of wn(k) = 1, Tn(k) > 0 and xn(2k − 1) < xn(2k).Furthermore, it can be shown in a similar way that Xn,k hasfull rank when wn(k) = 1 and Tn(k) ≤ 0. In summary,the detection matrix Xn,k is of full rank when wn(k) = 1,regardless of the values of Tn(k), xn(2k − 1) and xn(2k).

Based on the property of Xn,k , the kth watermark bit in thenth block can be extracted using the following detection rule:

w′n(k) =

{1, if Xn,k is of full rank0, otherwise

(25)

where k = 1, 2, . . . ,K and n = 1, 2, . . . ,N . Finally,the extracted watermark sequences w′1,w

2, . . . ,w′N can be

obtained by combining all of the detected watermark bits.Remark 2: In the proposed watermarking method, water-

mark detection is implemented by checking the ranks of thedetection matrices, which makes our method free of HSI.This feature is important for achieving high detection rate.Moreover, the error buffer employed in the embedding pro-cess further enhances the detection performance as it can, toa large extent, tolerate the errors imposed by attacks.

C. SELECTION OF WATERMARKING PARAMETERSIn the proposed watermarking method, α, β and T are threeimportant watermarking parameters and their values need tobe properly chosen. The parameter T is the threshold of theerror buffer, which is primarily introduced to resist Gaussiannoise addition attack. The selection of T will be discussed inthe analysis of robustness against Gaussian noise addition inSubsection III-A. So, we only discuss how to select α and βin this subsection.

The parameters α and β were introduced in (11) under thecondition of wn(k) = 1 and Tn(k) > 0. We investigate theimpact of α and β on perceptual quality. We assume, withoutloss of generality, that xn(2k − 1) > xn(2k). Accordingto (11) and (13), embedding a watermark bit into thekth pair of DCT coefficients in the nth block under the abovecondition results in

xWn (2k − 1) = xn(2k − 1)+ αTn(k) (26)

and

xWn (2k) = xn(2k)− βTn(k). (27)

Alternatively, (26) and (27) can be expressed as

F{IWn (pn(2k − 1), qn(2k − 1))

}= F {In (pn(2k − 1), qn(2k − 1))} + αTn(k) (28)

1692 VOLUME 4, 2016

Page 5: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

and

F{IWn (pn(2k), qn(2k))

}= F {In (pn(2k), qn(2k))} − βTn(k) (29)

where (pn(2k − 1), qn(2k − 1)) and (pn(2k), qn(2k)) are theindices of the DCT coefficients xn(2k−1) and xn(2k), respec-tively, and (pn(2k − 1), qn(2k − 1)) 6= (pn(2k), qn(2k)).Obviously, pn(2k − 1), pn(2k), qn(2k − 1) and qn(2k) are allnonnegative integers.

Applying the 2-D IDCT to F{IWn}, which represents

the DCT coefficients in the nth block, the correspondingwatermarked image block in the spatial domain can beexpressed as

IWn (i, j) =M−1∑u=0

M−1∑v=0

ϑuϑvF{IWn (u, v)

}· cos

(2i+ 1)uπ2M

cos(2j+ 1)vπ

2M(30)

where 0 ≤ i ≤ M − 1, 0 ≤ j ≤ M − 1 and

ϑu =

{√1/M , u = 0√2/M u 6= 0,

ϑv =

√1/M , v = 0√2/M v 6= 0

. (31)

From (28)-(30), it follows:

IWn (i, j) = In(i, j)+ αTn(k)ϑpn(2k−1)ϑqn(2k−1)

· cos(2i+ 1)pn(2k − 1)π

2M

· cos(2j+ 1)qn(2k − 1)π

2M

−βTn(k)ϑpn(2k)ϑqn(2k) cos(2i+ 1)pn(2k)π

2M

· cos(2j+ 1)qn(2k)π

2M= In(i, j)+ αTn(k)Sn,i,j(2k − 1)

−βTn(k)Sn,i,j(2k). (32)

Here, the definitions of Sn,i,j(2k − 1) and Sn,i,j(2k) can beeasily seen from the second equation in (32).

Given the nth host image block In and its watermarkedcounterpart IWn , we define the distortion caused by watermarkembedding as

1n =

M−1∑i=0

M−1∑j=0

[IWn (i, j)− In(i, j)

]2. (33)

By substituting (32) into (33), it yields

1n =

M−1∑i=0

M−1∑j=0

[αTn(k)Sn,i,j(2k − 1)

− βTn(k)Sn,i,j(2k)]2

= α2T 2n (k)

M−1∑i=0

M−1∑j=0

S2n,i,j(2k − 1)

−2αβT 2n (k)

M−1∑i=0

M−1∑j=0

Sn,i,j(2k − 1)Sn,i,j(2k)

+β2T 2n (k)

M−1∑i=0

M−1∑j=0

S2n,i,j(2k). (34)

From the definition of Sn,i,j(2k − 1), we have

M−1∑i=0

M−1∑j=0

S2n,i,j(2k − 1)

= ϑ2pn(2k−1)ϑ

2qn(2k−1)

(M−1∑i=0

cos2(2i+ 1)pn(2k − 1)π

2M

)

·

M−1∑j=0

cos2(2j+ 1)qn(2k − 1)π

2M

=ϑ2pn(2k−1)

ϑ2qn(2k−1)

4

·

(M−1∑i=0

cos(2i+ 1) (pn(2k − 1)+ pn(2k − 1)) π

2M

+

M−1∑i=0

cos(2i+ 1) (pn(2k − 1)− pn(2k − 1)) π

2M

)

·

M−1∑j=0

cos(2j+ 1) (qn(2k − 1)+ qn(2k − 1)) π

2M

+

M−1∑j=0

cos(2j+ 1) (qn(2k − 1)− qn(2k − 1)) π

2M

.=ϑ2pn(2k−1)

ϑ2qn(2k−1)

4

·

(M−1∑i=0

cos(2i+ 1)(2pn(2k − 1))π

2M+M

)

·

M−1∑j=0

cos(2j+ 1)(2qn(2k − 1))π

2M+M

. (35)

As will be shown in (63) and (64),∑M−1

i=0 cos (2i+1)uπ2M = 0

when u 6= 0 and∑M−1

j=0 cos (2j+1)vπ2M = 0 when v 6= 0. Based

on (31), (35), (63) and (64), when (pn(2k − 1), qn(2k − 1)) 6=(0, 0), one has

M−1∑i=0

M−1∑j=0

S2n,i,j(2k − 1) =1M2 · (0+M) · (0+M)

= 1. (36)

Similarly, when pn(2k−1) 6= qn(2k−1) = 0 or qn(2k−1) 6=pn(2k − 1) = 0, we obtain

M−1∑i=0

M−1∑j=0

S2n,i,j(2k − 1) =1

2M2 · (M +M) · (0+M)

= 1. (37)

VOLUME 4, 2016 1693

Page 6: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

And when pn(2k − 1) = qn(2k − 1) = 0, it results in

M−1∑i=0

M−1∑j=0

S2n,i,j(2k − 1) =1

4M2 · (2M) · (2M)

= 1. (38)

From (36)-(38), the first term on the right hand side of (34)can be written as

α2T 2n (k)

M−1∑i=0

M−1∑j=0

S2n,i,j(2k − 1) = α2T 2n (k). (39)

Following the same way, the second term and third term onthe right hand side of (34) can be respectively derived to be

2αβT 2n (k)

M−1∑i=0

M−1∑j=0

Sn,i,j(2k − 1)Sn,i,j(2k) = 0 (40)

and

β2T 2n (k)

M−1∑i=0

M−1∑j=0

S2n,i,j(2k) = β2T 2

n (k). (41)

Substituting (39)-(41) into (34), it follows:

1n = T 2n (k)

(α2 + β2

). (42)

In order to ensure that the perceptual quality degradationcaused by α and β is minimum, 1n should be minimized.Recalling that α ≥ 0, β ≥ 0 and α + β = 1, (42) can beexpanded as

1n = T 2n (k) ·

(α2 + (1− α)2

)= T 2

n (k) ·(2α2 − 2α + 1

). (43)

Minimizing the above 1n yields α = 0.5, which leads toβ = 1 − α = 0.5. Therefore, the desired α and β values areα = β = 0.5 as they cause the minimum perceptual qualitydegradation on the image.

III. ANALYSIS OF ROBUSTNESS AGAINST ATTACKSThe types of attacks considered in [19] include Gaussiannoise addition, amplitude scaling, constant luminance changeand compression. In this section, we analyze the robustnessof the proposed method against these attacks.

A. ROBUSTNESS AGAINST GAUSSIAN NOISE ADDITIONThe robustness of the proposed method against Gaussiannoise addition is facilitated by the error buffer term bnin (13). This can be explained by showing the relationshipbetween the error probability caused by Gaussian noise addi-tion and the buffer threshold T . We assume that in the DCTdomain, the Gaussian noise follows the normal distributionNorm(0, σ 2) whose mean and variance are 0 and σ 2, respec-tively. Under a Gaussian noise addition attack, the kth pair of

DCT coefficients in the nth block of the received image canbe expressed as{

x ′n(2k − 1) = xWn (2k − 1)+ χn(2k − 1)x ′n(2k) = xWn (2k)+ χn(2k)

(44)

where χn(2k − 1) and χn(2k) are the corresponding noisecomponents.

Now, we inspect how noise affects the watermark detectionresult. When wn(k) = 0, one has from (15), (19) and (44) that

x̄ ′n(k) = |χn(2k − 1)− χn(2k)| . (45)

According to (16), the detection error will occur when|χn(2k − 1)− χn(2k)| > T/2, which means χn(2k − 1) −χn(2k) > T/2 or χn(2k − 1) − χn(2k) < −T/2. Sinceχn(2k − 1) ∼ Norm(0, σ 2) and χn(2k) ∼ Norm(0, σ 2),then χn(2k − 1) − χn(2k) ∼ Norm(0, 2σ 2). Hence, whenwn(k) = 0, the detection error probability can be calculated as

80 =1√2π

∫−

T2√2σ

−∞

e−t2/2dt +

1√2π

∫∞

T2√2σ

e−t2/2dt

=2√2π

∫−

T2√2σ

−∞

e−t2/2dt. (46)

In a similar manner, we can show that when wn(k) = 1 andTn(k) ≤ 0, the detection error probability is

81 =1√2π

∫ −T+2Tn(k)2√2σ

−3T+2Tn(k)2√2σ

e−t2/2dt. (47)

And when wn(k) = 1 and Tn(k) > 0, the detection errorprobability is

82 =1√2π

∫ −T2√2σ

−3T2√2σ

e−t2/2dt. (48)

From (46)-(48), it is obvious that the buffer threshold Thas a big impact on the detection error probability caused byGaussian noise addition. In (46), the larger T is, the smaller80 is, which leads to higher robustness against Gaussiannoise addition attack. In (47) and (48), when T is relativelysmall, 81 and 82 will increase with the rise of T . However,after certain T values, 81 and 82 will fall with the growthof T . For illustration purpose, Fig. 3 shows the plots of 80,81 and 82 versus T , where σ = 1 and Tn(k) = −0.5.It can be seen that good resistance against Gaussian noiseaddition can be obtained by setting T to a value much greaterthan T = 1.5. Therefore, by choosing a fairly large T value,the error buffer term bn in (13) makes the proposed methodrobust to Gaussian noise addition attack. On the other hand,it can be seen from (9), (11) and (13) that increasing T willlower perceptual quality. A suitable T value can be chosenexperimentally.

1694 VOLUME 4, 2016

Page 7: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

FIGURE 3. The plots of 80, 81 and 82 versus T , where σ = 1 andTn(k) = −0.5.

B. ROBUSTNESS AGAINST AMPLITUDE SCALINGAssume that the watermarked image block IWn is scaled bya scaling factor η (η > 0). Under an amplitude scalingattack, one can express the kth pair of DCT coefficients in thenth block of the received image as{

x ′n(2k − 1) = η · xWn (2k − 1)x ′n(2k) = η · x

Wn (2k).

(49)

From (15), it follows

x̄ ′n(k) = η ·∣∣∣xWn (2k − 1)− xWn (2k)

∣∣∣ . (50)

When the embedded watermark bit wn(k) = 0, it holdsfrom (19) and (50) that x̄ ′n(k) = 0. Further, from(16) and (17), we obtain T ′n(k) = max {0,T/2} = T/2

and Xn,k =

[T/2 T/2T/2 T/2

], respectively. Obviously, Xn,k is

rank deficient. According to (25), the extracted watermark bitis ‘‘0’’, which is the expected result.

When the embedded watermark bitwn(k) = 1, we can sim-ilarly show that x̄ ′n(k) ≥ T . If η > 0.5, then η · x̄ ′n(k) > T/2.From (16) and (17), it gives T ′n(k) = max

{η · x̄ ′n(k),T/2

}=

η · x̄ ′n(k) and Xn,k =

[T/2 η · x̄ ′n(k)

η · x̄ ′n(k) T/2

]. Since Xn,k is of

full rank, the extracted watermark bit is ‘‘1’’, which is thedesired result. On the other hand, if η ≤ 0.5, there is thepossibility that η · x̄ ′n(k) ≤

T2 . Since T

′n(k) = T/2 in this

case, Xn,k will be rank deficient, which leads to incorrectwatermark detection result. However, a scaling factor of 0.5or even smaller can degrade the perceptual quality of thewatermarked image significantly. Thus, such level of severeamplitude scaling attack is not desirable for the attackers.Therefore, in general, the proposed watermarkingmethod hasgood resistance against amplitude scaling attacks.

C. ROBUSTNESS AGAINST CONSTANTLUMINANCE CHANGEGiven the nth host image block IWn of sizeM×M , the (u, v)thentry of the corresponding DCT counterpart F

{IWn}can be

computed by

F{IWn (u, v)

}=

M−1∑i=0

M−1∑j=0

ϑuϑvIWn (i, j)

· cos(2i+ 1)uπ

2Mcos

(2j+ 1)vπ2M

(51)

where i and j are the indices of pixels, u and v are the indicesof the DCT coefficients, 0 ≤ u ≤ M−1, 0 ≤ v ≤ M−1, andϑu and ϑv are defined in (31). Assume that IWn has undergonea constant luminance change of +δ. Then, the (u, v)th pixelof the nth received image block I′n can be expressed as

I′n(u, v) = IWn (u, v)+ δ. (52)

Applying 2-D DCT to the two sides of (52), one has

F{I′n(u, v)

}= F

{IWn (u, v)

}+ ϑuϑvδ

·

M−1∑i=0

cos(2i+ 1)uπ

2M

M−1∑j=0

cos(2j+ 1)vπ

2M.

(53)

Now, let us have a closer look at the first cosine termin (53). Since M is a positive integer power of 2, M/2 is apositive integer. If u is a nonzero positive odd integer (i.e.,u = 1, 3, 5, . . .), it can be verified that

cos(2i+ 1)uπ

2M

∣∣∣∣i=0,1,...,M/2−1

= − cos(2i+ 1)uπ

2M

∣∣∣∣i=M−1,M−2,...,M/2

. (54)

The verification of the equations in (54) is straightforward, asshown in the following two examples:

cos(2i+ 1)uπ

2M

∣∣∣∣i=0= cos

uπ2M

= − cos(uπ −

uπ2M

)= − cos

(2 · (M − 1)+ 1)uπ2M

= − cos(2i+ 1)uπ

2M

∣∣∣∣i=M−1

and

cos(2i+ 1)uπ

2M

∣∣∣∣i=M/2−1

= cos(M − 1)uπ

2M

= − cos(uπ −

(M − 1)uπ2M

)= − cos

(M + 1)uπ2M

= − cos(2 ·M/2+ 1)uπ

2M

= − cos(2i+ 1)uπ

2M

∣∣∣∣i=M/2

.

VOLUME 4, 2016 1695

Page 8: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

From (54), it followsM−1∑i=0

cos(2i+ 1)uπ

2M= 0, u = 1, 3, 5, . . . . (55)

On the other hand, if u is a nonzero positive even integer(i.e., u = 2, 4, 6, . . .), similar to (54), it can be shown that

cos(2i+ 1)uπ

2M

∣∣∣∣i=0,1,...,M/2−1

= cos(2i+ 1)uπ

2M

∣∣∣∣i=M−1,M−2,...,M/2

(56)

which leads toM−1∑i=0

cos(2i+ 1)uπ

2M= 2·

M/2−1∑i=0

cos(2i+ 1)uπ

2M

. (57)

Since u is a nonzero positive even integer, we can decomposeit as u = 2 · (u/2). If u/2 is also an even integer, we canfurther decompose u as u = 22 · (u/22). In this way, we caneventually obtain

u = 2m · u′ (58)

where m is a nonzero positive integer and

u′ = u/2m (59)

is a nonzero positive odd integer. For example, if u = 56,then the corresponding m and u′ are 3 and 7, respectively.Now, we consider the decomposition of

∑M−1i=0 cos (2i+1)uπ

2M .By repeatedly using (57), it results in

M−1∑i=0

cos(2i+ 1)uπ

2M

= 2 ·

2 ·

(M/2)/2−1∑i=0

cos(2i+ 1)uπ

2M

= 22 ·

M/22−1∑i=0

cos(2i+ 1)uπ

2M

...

......

= 2m ·

M/2m−1∑i=0

cos(2i+ 1)uπ

2M

= 2m ·

M/2m−1∑i=0

cos(2i+ 1) (u/2m) π

2 · (M/2m)

= 2m ·

M ′−1∑i=0

cos(2i+ 1)u′π

2M ′

(60)

where

M ′ = M/2m. (61)

Recall that M is a positive integer power of 2 and 0 ≤ u ≤M − 1. Since u = 2m · u′ and u′ is a nonzero positive

odd integer, it is clear that u ≥ 2m, which leads to 2m ≤ u ≤M − 1 or 2m ≤ u < M . Based on the properties of M and u,it is easy to verify that M ′ is also a positive power of 2 and0 ≤ u′ ≤ M ′ − 1. Moreover, since u′ is a nonzero positive

odd integer, from (55), it holds that∑M ′−1

i=0 cos (2i+1)u′π2M ′ = 0.

In combination with (60), we obtain

M−1∑i=0

cos(2i+ 1)uπ

2M= 0, u = 2, 4, 6, . . . . (62)

Based on (55) and (62), we can conclude that

M−1∑i=0

cos(2i+ 1)uπ

2M= 0 if u 6= 0. (63)

Similarly, it can be shown that

M−1∑j=0

cos(2j+ 1)vπ

2M= 0 if v 6= 0. (64)

Based on (53), (63) and (64), when (u, v) 6= (0, 0),

F{I′n(u, v)

}= F

{IWn (u, v)

}. (65)

This means that constant luminance change does not alter theDCT coefficients of the watermarked image block, exceptfor the DCT coefficient at (u, v) = (0, 0). As mentioned inSubsection II-A, only the DCT coefficients corresponding tothe middle frequency range will be used to embed watermarkbits, i.e., the DCT coefficient at (u, v) = (0, 0) will not beutilized for watermark embedding. Therefore, the proposedmethod is robust against constant luminance change attack.

D. ROBUSTNESS AGAINST COMPRESSIONIt is shown in [23] that image compression attack has moreimpact on the DCT coefficients relating to the region ofhigh frequency. Moreover, the DCT coefficients associatedwith the middle frequency range are considered to be morerobust against image compression attack [24]. In the pro-posed method, the resistance towards image compressionattack results from using the DCT coefficients correspondingto the middle frequency region for watermark embedding.It is expected that increasing embedding rate will decreasethe robustness to compression attacks. The reason is thatin this scenario, some DCT coefficients outside the middlefrequency region might have to be employed to embedwatermarks.

IV. SIMULATION RESULTSIn this section, we evaluate the performance of the proposedimage watermarking method by simulations, in comparisonwith the methods in [12], [19], and [21]. Eight standard512 × 512 8-bit gray scale images Bee, Elaine, Goldhill,Hill, Lena, Lighthouse, Truck, and Zelda are used as hostimages, which are shown in the top two rows of Fig. 4. Thepeak signal-to-noise ratio (PSNR) index and the bit errorrate (BER) index are used to measure perceptual quality

1696 VOLUME 4, 2016

Page 9: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

FIGURE 4. Upper two rows: original images Bee, Elaine, Goldhill, Hill,Lena, Lighthouse, Truck, and Zelda. Lower two rows: watermarkedcounterparts of these images, where PSNR = 40.32 dB.

and robustness, respectively. The performance indicesPSNR and BER are calculated by averaging the resultsobtained from the eight images. Regarding imperceptibil-ity, the larger PSNR value, the better perceptual quality.It is mentioned in [25] that the PSNR value of 40dB indi-cates good perceptual quality. For example, the bottomtwo rows of Fig. 4 show the watermarked counterparts ofthe afore-mentioned eight images by our method, wherePSNR = 40.32 dB. Clearly, there is no visual differencebetween the original images and their watermarked versions.With regard to robustness, a smaller BER value indicatesbetter robustness, and vice versa.

In the simulations, we choose N = 4096 for all images.Two embedding rates: 12288 and 20480 watermark bits perimage are considered, which correspond to K = 3 and 5,respectively. As for T , in order to experimentally choose asuitable value, we embed 20480watermark bits into each hostimage and then apply Gaussian noise addition to the water-marked images. Four different noise variances are considered,which are σ 2

= 1, 4, 7 and 10, respectively. The simulationresults about robustness and perceptual quality are shown inFig. 5. As expected, as T rises, BER decreases (or the resis-tance against Gaussian noise addition increases). Meanwhile,the perceptual quality, measured by PSNR, degrades withthe escalation of T . To achieve satisfactory robustness whilemaintaining good perceptual quality, we choose T = 15 forour method.

The robustness of our method and thosein [12], [19], and [21] is compared under different K values.The comparison is conducted both in the absence and inthe presence of attacks. Same as [19], the Gaussian noise

FIGURE 5. BER (under Gaussian noise addition attack) and PSNRof the proposed method versus T , where the embedding rateis 20480 watermark bits per image.

addition, amplitude scaling, constant luminance change, andJPEG compression attacks are considered in the simulations.In order to have a fair comparison of robustness, we ensurethat the watermarked images produced by our method havehigher perceptual quality than those produced by the methodsin [12], [19], and [21]. The PSNRs of the four watermarkingmethods under different K values are shown in Table 1.

TABLE 1. PSNRs under different K values.

Tables 2-6 show the BERs of the concerned watermarkingmethods. Specifically, Table 2 shows the results when attackis absent. For a watermarkingmethod, its BER value obtainedin the absence of attacks indicates the impact of HSI. SinceHSI does not exist in the proposedmethod, perfect watermarkdetection can be achieved, regardless of the K values orequivalently the embedding rates. The quantization basedmethods [19] and [21] also show nearly perfect and per-fect detection results, respectively. In contrast, the SS-basedmethod [12] cannot reach zero BER due to the impact of HSI.Besides, its BER increases with the rise of K .

TABLE 2. BERs under different K values, in the absence of attack.

Table 3 shows the results when Gaussian noise additionattack presents. We can see that the proposed method per-forms much better than the methods in [12], [19], and [21]

VOLUME 4, 2016 1697

Page 10: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

TABLE 3. BERs under different K values, in the presence of gaussiannoise addition attack.

TABLE 4. BERs under different K values, in the presence of amplitudescaling attack.

TABLE 5. BERs under different K values, in the presence of constantluminance change attack.

TABLE 6. BERs under different K values, in the presence of JPEGcompression attack.

in all situations. Moreover, as K increases, the performancegap between our method and the other methods widens. Thereason is that in the presence of Gaussian noise additionattack, the detection performance of the proposed method isdetermined by the threshold T used in the error buffer, whichis irrelevant to embedding rates. On the contrary, the detectionperformance of the methods in [12], [19], and [21] degradeswith the increase of embedding rates.

The BERs of the four methods against amplitude scalingattacks and constant luminance change attacks are shown

in Tables 4 and 5, respectively. It can be seen that the pro-posed method achieves zero BER under both attacks. Thisresult is not surprising. As we have analyzed theoreticallyin Section III, our method can correctly extract watermarksin the presence of amplitude scaling attacks so long as thescaling factor is greater than 0.5 and in the presence ofconstant luminance change attacks if the DCT coefficient at(u, v) = (0, 0) is not used for watermark embedding. Themethods in [19] and [21], which are specifically designedto tackle the amplitude scaling attack, also achieve almostperfect and perfect detection results, respectively, in the pres-ence of amplitude scaling attacks. However, they are notrobust against constant luminance change attacks. Regardingthe method in [12], it is not robust against either of the twoattacks.

The impact of JPEG compression attack on the proposedmethod and the methods in [12], [19], and [21] is shown inTable 6. One can see that the proposedmethod and themethodin [21] performs much better than the other two methods.Between the proposed method and the method in [21] them-selves, they have comparable BERs when K = 3. However,in the case of K = 5, our method outperforms the latter bylarge margins.

V. CONCLUSIONIn this paper, we proposed a novel method for imagewatermarking in the DCT domain. Thanks to therank-based watermark embedding and detection rules, theproposed watermarking method possesses some desirablefeatures. Firstly, our method can use as little as two DCTcoefficients to embed one watermark bit. Secondly, it is freeof HSI. Thirdly, it can considerably tolerate the errors causedby attacks. The first feature leads to high embedding capacity.The second and third features make the proposed methodrobust against common attacks. The superior performanceof the new method was analyzed theoretically in detail anddemonstrated by simulation results.

REFERENCES[1] S. Xiang, H. J. Kim, and J. Huang, ‘‘Invariant image watermarking based

on statistical features in the low-frequency domain,’’ IEEE Trans. CircuitsSyst. Video Technol., vol. 18, no. 6, pp. 777–790, Jun. 2008.

[2] T. Zong, Y. Xiang, I. Natgunanathan, S. Guo, W. Zhou, and G. Beliakov,‘‘Robust histogram shape-based method for image watermarking,’’ IEEETrans. Circuits Syst. Video Technol., vol. 25, no. 5, pp. 717–729,May 2015.

[3] M. Alghoniemy and A. H. Tewfik, ‘‘Geometric invariance in image water-marking,’’ IEEE Trans. Image Process., vol. 13, no. 2, pp. 145–153,Feb. 2004.

[4] P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Yang, and F. Davoine, ‘‘Dig-ital watermarking robust to geometric distortions,’’ IEEE Trans. ImageProcess., vol. 14, no. 12, pp. 2140–2150, Dec. 2005.

[5] J. S. Seo and C. D. Yoo, ‘‘Image watermarking based on invariant regionsof scale-space representation,’’ IEEE Trans. Signal Process., vol. 54, no. 4,pp. 1537–1549, Apr. 2006.

[6] X. Gao, C. Deng, X. Li, and D. Tao, ‘‘Geometric distortion insensitiveimage watermarking in affine covariant regions,’’ IEEE Trans. Syst., Man,Cybern. C, Appl. Rev., vol. 40, no. 3, pp. 278–286, May 2010.

[7] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, ‘‘Secure spreadspectrum watermarking for multimedia,’’ IEEE Trans. Image Process.,vol. 6, no. 12, pp. 1673–1687, Dec. 1997.

[8] J. Cannons and P. Moulin, ‘‘Design and statistical analysis of a hash-aidedimage watermarking system,’’ IEEE Trans. Image Process., vol. 13, no. 10,pp. 1393–1408, Oct. 2004.

1698 VOLUME 4, 2016

Page 11: Rank-Based Image Watermarking Method With High Embedding

T. Zong et al.: Rank-Based Image Watermarking Method

[9] H. S. Malvar and D. A. F. Florencio, ‘‘Improved spread spectrum:A new modulation technique for robust watermarking,’’ IEEE Trans.Signal Process., vol. 51, no. 4, pp. 898–905, Apr. 2003.

[10] A. Valizadeh and Z. J. Wang, ‘‘Correlation-and-bit-aware spread spectrumembedding for data hiding,’’ IEEE Trans. Inf. Forensics Security, vol. 6,no. 2, pp. 267–282, Jun. 2011.

[11] A. K. Mairgiotis, N. P. Galatsanos, and Y. Yang, ‘‘New additive watermarkdetectors based on a hierarchical spatially adaptive image model,’’ IEEETrans. Inf. Forensics Security, vol. 3, no. 1, pp. 29–37, Mar. 2008.

[12] M. Li, M. K. Kulhandjian, D. A. Pados, S. N. Batalama, and M. J. Medley,‘‘Extracting spread-spectrum hidden data from digital media,’’ IEEETrans.Inf. Forensics Security, vol. 8, no. 7, pp. 1201–1210, Jul. 2013.

[13] Q. Cheng, ‘‘Generalized embedding of multiplicative watermarks,’’ IEEETrans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 978–988, Jul. 2009.

[14] A. Valizadeh and Z. J.Wang, ‘‘An improvedmultiplicative spread spectrumembedding scheme for data hiding,’’ IEEE Trans. Inf. Forensics Security,vol. 7, no. 4, pp. 1127–1143, Aug. 2012.

[15] B. Chen and G. W. Wornell, ‘‘Quantization index modulation: A class ofprovably good methods for digital watermarking and information embed-ding,’’ IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001.

[16] S.-H. Wang and Y.-P. Lin, ‘‘Wavelet tree quantization for copyrightprotection watermarking,’’ IEEE Trans. Image Process., vol. 13, no. 2,pp. 154–165, Feb. 2004.

[17] N. K. Kalantari and S. M. Ahadi, ‘‘A logarithmic quantization index mod-ulation for perceptually better data hiding,’’ IEEE Trans. Image Process.,vol. 19, no. 6, pp. 1504–1517, Jun. 2010.

[18] I. D. Shterev and R. L. Lagendijk, ‘‘Amplitude scale estimation forquantization-based watermarking,’’ IEEE Trans. Signal Process., vol. 54,no. 11, pp. 4146–4155, Nov. 2006.

[19] Q. Li and I. J. Cox, ‘‘Using perceptual models to improve fidelity andprovide resistance to valumetric scaling for quantization index modula-tion watermarking,’’ IEEE Trans. Inf. Forensics Security, vol. 2, no. 2,pp. 127–139, Jun. 2007.

[20] E. Nezhadarya, Z. Wang, and R. K. Ward, ‘‘Robust image watermarkingbased on multiscale gradient direction quantization,’’ IEEE Trans. Inf.Forensics Security, vol. 6, no. 4, pp. 1200–1213, Dec. 2011.

[21] M. Zareian and H. R. Tohidypour, ‘‘A novel gain invariant quantization-based watermarking approach,’’ IEEE Trans. Inf. Forensics Security, vol. 9,no. 11, pp. 1804–1813, Nov. 2014.

[22] E. Koch and J. Zhao, ‘‘Towards robust and hidden image copyright label-ing,’’ inProc. IEEEWorkshop Nonlinear Signal Image Process., Jun. 1995,pp. 452–455.

[23] A. K. Parthasarathy and S. Kak, ‘‘An improved method of content basedimagewatermarking,’’ IEEE Trans. Broadcast., vol. 53, no. 2, pp. 468–479,Jun. 2007.

[24] P.-C. Su, Y.-C. Chang, and C.-Y. Wu, ‘‘Geometrically resilient digi-tal image watermarking by using interest point extraction and extendedpilot signals,’’ IEEE Trans. Inf. Forensics Security, vol. 8, no. 12,pp. 1897–1908, Dec. 2013.

[25] H. Zhang et al., ‘‘Affine Legendremoment invariants for imagewatermark-ing robust to geometric distortions,’’ IEEE Trans. Image Process., vol. 20,no. 8, pp. 2189–2199, Aug. 2011.

TIANRUI ZONG received the B.E. degree inautomation science and electrical engineeringfrom Beihang University, China, in 2009, theM.Sc. degree in signal processing and communi-cations from the University of Edinburgh, U.K.,in 2010, and the Ph.D. degree in image process-ing from Deakin University, Australia. He is cur-rently a Research Assistant with the School ofInformation Technology, Deakin University. Hisresearch interests include digital watermarking,

privacy preservation, and image processing and telecommunication.

YONG XIANG (SM’12) received the Ph.D. degreein electrical and electronic engineering from TheUniversity of Melbourne, Australia. He is cur-rently a Professor and the Director of the ArtificialIntelligence and Image Processing Research Clus-ter with the School of Information Technology,Deakin University, Australia. His research inter-ests include information security and privacy, mul-timedia (speech/image/video) processing, wirelesssensor networks, massive MIMO, and biomedical

signal processing. He has authored over 110 refereed journal and confer-ence papers in these areas. He is an Associate Editor of the IEEE SIGNAL

PROCESSING LETTERS and the IEEE ACCESS. He has served as the ProgramChair, TPC Chair, Symposium Chair, and Session Chair for a number ofinternational conferences.

SONG GUO (M’02–SM’11) received thePh.D. degree in computer science from the Univer-sity of Ottawa. He is currently a Full Professor withthe School of Computer Science and Engineer-ing, The University of Aizu, Japan. His researchinterests are mainly in the areas of wireless com-munication and mobile computing, cloud comput-ing, big data, and cyberphysical systems. He hasauthored more than 250 papers in refereed journalsand conferences in these areas and received three

IEEE/ACM best paper awards. He currently serves as an Associate Editorof the IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, the IEEETRANSACTIONS ON EMERGING TOPICS, and many other major journals. He hasalso been on organizing and technical committees of numerous internationalconferences. He is a Senior Member of the ACM.

YUE RONG (S’03–M’06–SM’11) received thePh.D. (summa cum laude) degree in electri-cal engineering from the Darmstadt Universityof Technology, Darmstadt, Germany, in 2005.He was a Post-Doctoral Researcher with theDepartment of Electrical Engineering, Universityof California at Riverside, from 2006 to 2007.Since 2007, he has been with the Department ofElectrical and Computer Engineering, Curtin Uni-versity, Bentley, Australia, where he is currently

a Professor. His research interests include signal processing for commu-nications, wireless communications, underwater acoustic communications,applications of linear algebra and optimization methods, and statistical andarray signal processing. He has authored over 120 journal and conferencepaper in these areas.

Dr. Rong was a recipient of the best paper award at the 2011 InternationalConference on Wireless Communications and Signal Processing, the bestpaper award at the 2010 Asia-Pacific Conference on Communications, andthe Young Researcher of the Year Award of the Faculty of Science andEngineering at Curtin University in 2010. He is an Associate Editor of theIEEE TRANSACTIONS ON SIGNAL PROCESSING. He was an Editor of the IEEEWIRELESS COMMUNICATIONS LETTERS from 2012 to 2014, a Guest Editor of theIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS of the Special Issueon Theories and Methods for Advanced Wireless Relays, and was a TPCMember of the IEEE ICC, WCSP, IWCMC, and ChinaCom.

VOLUME 4, 2016 1699