Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Similar documents
Image Authentication and Recovery Scheme Based on Watermarking Technique

Robust Image Watermarking based on DCT-DWT- SVD Method

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Adaptive Quantization for Video Compression in Frequency Domain

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Implementation of ContourLet Transform For Copyright Protection of Color Images

Image Authentication and Recovery Using BCH Error-Correcting Codes

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

Digital Watermarking with Copyright Authentication for Image Communication

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved Performance of Watermarking In DWT Domain Using SVD

Digital watermarking techniques for JPEG2000 scalable image coding

Improved Qualitative Color Image Steganography Based on DWT

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

QR Code Watermarking Algorithm based on Wavelet Transform

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Digital Image Watermarking Using DWT Based DCT Technique

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

Combined Hashing/Watermarking Method for Image Authentication

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

FRAGILE WATERMARKING USING SUBBAND CODING

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

A New Approach to Compressed Image Steganography Using Wavelet Transform

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Speech Modulation for Image Watermarking

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition

A reversible data hiding based on adaptive prediction technique and histogram shifting

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A New DCT Based Watermarking Method Using Luminance Component

A new robust watermarking scheme based on PDE decomposition *

Robust copyright protection scheme for digital images using the low-band characteristic

Image Error Concealment Based on Watermarking

Data Hiding in Video

A Survey of Fragile Watermarking-based Image Authentication Techniques

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

Recent Researches in Applied Informatics and Remote Sensing

CHAPTER-4 WATERMARKING OF GRAY IMAGES

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

Robust DWT Based Technique for Digital Watermarking

A new wavelet based logo-watermarking scheme

CHAPTER-5 WATERMARKING OF COLOR IMAGES

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques 1 Ji-Hong Chen and 1 Chin-Hsing Chen

Feature Based Watermarking Algorithm by Adopting Arnold Transform

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

Data Hiding on Text Using Big-5 Code

Implementation of H.264/AVC Video Authentication System Using Watermark

A Robust Image Hiding Method Using Wavelet Technique *

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

CHAPTER-6 WATERMARKING OF JPEG IMAGES

A Robust Watermarking Scheme Based on Steerable Pyramid and Singular Value Decomposition

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Watermarking of Image Using Priority Based On Algorithms

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Comparison of wavelet based watermarking techniques Using SVD

Optimized Watermarking Using Swarm-Based Bacterial Foraging

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

International Journal of Advance Research in Computer Science and Management Studies

Enhancing the Image Compression Rate Using Steganography

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions

A New Spatial q-log Domain for Image Watermarking

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Implementation and Comparison of Watermarking Algorithms using DWT

Efficient Image Steganography Using Integer Wavelet Transform

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

A Robust Watermarking Algorithm For JPEG Images

Transcription:

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto Politecnico Nacional Santa ana # 100 MÉXICO CITY csantiagoa0900@ipn.mx, mnakano@ipn.mx Abstract: - In the security of digital contents, almost all previous works tried to attend either the copyright protection issue or the content authentication issue, however recently some proposals try to solve simultaneously both problems. In this paper, a multipurpose method that tries to solve both problems for color images, using two watermarking algorithms, is proposed. The first algorithm is based on a self-embedding technique which uses the halftone version from the Y, Cr and Cb channels of the original color image as the watermark, then, the Quantization Index Modulation (QIM) method is used to embed in the integer Wavelet transform (IWT) domain. In the second algorithm, the halftone watermark image generated from luminance channel Y is watermarked manipulating their flipabble pixels to embed a bits sequence related to the owner s copyright information. 1 Introduction Nowadays the great popularity of the internet has become easy the exchange of lots of digital files, but the most of these files can be easily modified without any trace. Due to these situations, many schemes based on watermarking technique have been developed to solve either the copyright protection problem or the contents authentication problem. However usually these two problems are happened simultaneously, therefore an efficient multipurpose algorithm to solve at same time the both problems: copyright protection and contents authentication, will be required. In the literature, some multipurpose watermarking algorithms have been proposed. The algorithm proposed by Fan Gu et.al [1] uses sub-sampling to embed two robust watermarks, then, DCT domain is used to exploit the human visual System (HVS) feature. Under unintentional attacks, the watermarks survive even under JPEG compression and its integrity is measure by Normalized Hamming Similarity (NHS) but the intentional attacks, such as contents alteration, are not considered. In [2], Zhe- Ming Lu et al. proposed a novel multipurpose algorithm based on the multistage vector quantizer structure to embed a semi-fragile watermark and robust watermark in different stages. Both watermarks can be extracted without the original image. The principal disadvantage is that the method uses six keys in the extraction process, two of them have to be generated from the well-know iterative clustering algorithm [3] that is often referred to as the generalized Lloyd algorithm (GLA). This paper shows a novel multipurpose watermarking algorithm to embed two different kinds of watermarks into the color image. The first watermark sequence is a halftone version generated from three color channels (Y, Cb and Cr) of the original color image using the Floyd-Steinberg error diffusion method [4]. Then each halftone image is embedded into each corresponded color channel using Quantization Index Modulation (QIM) method [5] in the Integer Wavelet Transform (IWT) domain. These watermark sequences are used for content authentication purpose. Before the watermark embedding stage in the IWT domain, the halftone image from luminance channel Y is modified to embed a binary watermark sequence related to copyright information using watermarking technique proposed in [6]. This watermark is used for copyright protection. The intentional and unintentional attacks were carried out to evaluate the watermark robustness and the detection capability of altered regions. The experimental results have shown a good performance for both purposes: copyright protection and contents authentication. The remainder of this paper is organized as follows. In section 2, the proposed scheme is described and an evaluation results are shown in section 3. Finally some conclusions are remarked. 2. Quantization Index Modulation (QIM) Algorithm QIM algorithm is used to embed the watermark sequence in section 3.1. A binary image is divided into small blocks and a Quantization Step is defined ISSN: 1792-4863 170 ISBN: 978-960-474-231-8

(size and Qs is explained in the following section). The number of pixels per block, is the feature used by QIM. To embed a 0 in a block, some pixels are changed so that the total number of black pixels in that block has to be 2kQs for some integer k, and has to be (2k+1) Qs to embed a 1. A larger Q gives higher tolerance to noise at the expense of decreased image quality. The above approaches can be characterized more generally by (1) where v i is the i th original feature, v is the feature value after embedding, b i is the bit to be embedded in i th feature, and T( )is a prescribed mapping from feature values to hidden data values {0,1}. Detection is done by checking the enforced relationship: 3.1 Watermarking for Copyright protection In [6], a watermarking algorithm for binary images, including document images, is proposed. This algorithm measures the smoothness and the connectivity of each binary pixel to determine the flippable pixels that can be flipped (from back to white and vice versa) without causing any distortion to the binary image. This algorithm is applied to the halftone image generated from only luminance channel Y to embed watermark sequence for copyright protection purpose. Once the flippable pixels are found, the halftone image is divided into blocks of NxN pixels and one bit of the watermark sequence is embedded into each block, using QIM algorithm. Fig. 1 (a) shows flippable pixels and (b) shows halftone image divided into blocks of NxN pixels, where N is computed by watermark bits length LxL. (2) where v i is the feature extracted from the i th block of a test image, and b i is the estimated value of the embedded bit in the i th block. (a) (b) 3 Proposed Algorithm In the proposed algorithm, two watermark sequences are embedded for two purposes: copyright protection and content authentication. The proposed watermarking algorithm is operated in YCrCb color space, therefore the color images with RGB color space firstly must be converted into YCrCb color space. The watermark sequence for content authentication is generated from each color channel (Y, Cr, Cb) using the Floyd-Steinberg error diffusion method [4] to convert into a binary halftone image. The binary halftone image generated from luminance Y channel is modified its flippables pixels using the method reported by [6] for copyright protection purpose. The halftone image of each color channel is embedded in the Integer Wavelet Transform (IWT) domain, because IWT offers better spatial-frequency property than DCT and unlike DWT, lossless forward and inverse transform can be performed. Using IWT, each color channel is decomposed into four subbands with integer elements (LL, LH, HL and HH). The sub-band LL of each color channel is chosen to embed the corresponded watermark sequence. As the watermarking algorithm, QIM method is used [5], which was described in the previous section. Fig. 1 (a) Flippable pixels, (b) Halftoned image divided in blocks. The watermark bit length (LxL) influences directly to the watermark robustness, therefore to obtain an adequate watermark length, the relationship between L and maximum quantification step size is analyzed. Figure 2 shows this relationship. If L is large (i.e 32), the robustness must be sacrificed, on the other hand, if L is small, the method becomes more robust, but the watermark length must be sacrificed. In the proposed algorithm, L=8 is selected as optimal length from robustness point of view. Then the block size N is calculated by N=L/M, where M is width and height of the image. Fig. 2. Relationship between watermark length(lxl) and Maximum quantification step. ISSN: 1792-4863 171 ISBN: 978-960-474-231-8

The watermark is then 64 (8x8) bits sequence, which can be pseudorandom sequence generated by owner s secret key or eight letters related to owner s name, for example ASCII codes of eight letters SEPI-IPN, shown by Fig. 3. Fig. 3. Watermark sequence for copyright purpose In Fig. 4, the original halftone image (a) and the watermarked one with 64 bits sequence (b) are shown. S E P I - E S I M E authentication purpose. In Fig. 5, the general block diagram of the both watermarking schemes is shown. Firstly, the color image must be YCbCr color space, otherwise the color space (for example RGB) must be converted in YCbCr color space. Then each color channel Y, Cb and Cr of a color image is decomposed by IWT. Because the sub-band obtained by the decomposition is the half size of the original image in its width and height, the watermark sequence size must be reduced using down-sampling. For example, if the original image size is 512 x 512, the watermark sequence must be 256 x 256. LL subband is chosen to embed the watermark sequence; here QIM algorithm is also employed. As quantification step, Qs=9 is used, this value is the max possible value for Qs without causing distortion to the watermarked image. Finally Inverse IWT is applied to the four sub-bands to obtain the watermarked image. (a) (b) Fig. 4 Binary halftone image and its watermarked version 3.2 Watermarking for Content Authentication Once each watermark sequence were generated from Y, Cb, and Cr channels using the Floyd-Steinberg error diffusion method and the watermark of luminance channel Y was modified for copyright purpose as shown in the previous section, the three binary watermark sequences are embedded into its corresponded color channel (Y, Cb, Cr) for content Color Image R G Y Cb 3.3 Authentication Process In the authentication process, three color channels (Y, Cr and Cb) of the watermarked and possibly altered color image is decomposed to four sub-bands using IWT, and from LL sub-band of each color channel, the watermark sequence for corresponded color channel is extracted by QIM extraction algorithm. The extracted watermark sequences are binary halftone images with possible distortion, which are converted in color image using wavelet-based inverse halftoning method proposed by [7]. The difference image Fig. 6 (k) is obtained between the watermarked image and the reconstructed image from extracted Halftoning (Floyd) HTY HTCb Watermarking for Copyright Purpose Logo LxL Key 1 B Cr HTCr HTYw IWT Watermarking for content purpose (QIM) IIWT Marked Color Image Pseudoramndom Permutation Key 2 Fig. 5 General Block Diagram ISSN: 1792-4863 172 ISBN: 978-960-474-231-8

(a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) Fig. 6 Evaluation results from watermark imperceptibility and tamper detection points of view. ISSN: 1792-4863 173 ISBN: 978-960-474-231-8

halftone images. This image is subdivided in blocks of 16 x 16 pixels, if the sum of the block is greater than Th=5000 these pixels are determined as altered pixels, otherwise they are authentic. 3 Evaluation Results The proposed multipurpose algorithm is evaluated from several points of view: watermark imperceptibility, tamper detection capability and watermark robustness. Figure 6 (a),(b) and (c) show Y, Cb and Cr channels, respectively of the original image, and (d), (e) and (f) are halftone images of (a), (b) and (c). Fig. 6(g) is original color image and (h) is the watermarked image with two watermarks (copyright protection and authentication purposes). Here PSNR of the watermarked image respect to its original one is 30.55dB. Although this value is not so good, the difference of both images (Fig. 6(g) and (h)) is not perceptible. Fig. 6 (i) is the altered image adding a flower and (j) is a recovered version of (i). Fig. 6(k) is the difference image between (i) and (j), and (l) is shown the detected altered region. From these results, the proposed algorithm can detect correctly the altered region. 0,07 0,06 0,05 0,04 BER 0,03 0,02 0,01 0 1% 2% 3% 5% 10% Alteration % Fig. 7 Relationship between percentage of altered pixels and BER of the extracted watermark sequence. The watermark sequence for copyright protection is extracted from the extracted halftone image of Y channel, using QIM extraction algorithm. The bit error rate (BER) of the extracted watermark sequence is measured when some pixels of the watermarked image is altered. Fig. 7 shows a relationship between percentages of the altered pixels of the image given by (3) and BER of the extracted watermark bits. number of altered pixels Alterration % 100 (3) 2 N When pseudo-random sequence generated by owner s secret key is used as the watermark sequence, the watermark is sufficiently robust after the watermarked image is suffered some alteration shown by Fig. 6 (i), because in Fig. 7, when approximately 10% of pixels are altered, the BER of the extracted watermark is 0.0625, it is sufficiently small. If owner s logotype is used as watermark sequence, shown by Fig. 3, one bit of 64 bits is changed (BER=aprox. 0.016), one letter is not extracted correctly. Therefore depending on application, the watermark sequence for copyright protection must be selected adequately. 4 Conclusions The multipurpose watermarking algorithm for color image is proposed, in which two types of watermark are embedded. The first watermark is for copyright protection using a binary sequence such as owner s logotype or pseudorandom sequence generated by owner s secret key as watermark. This watermark is embedded using flippable pixels of the halftone image generate from luminance channel Y of the color image. The halfone versions from all color channels are the second watermark sequences. The halftone image of each color channel is embedded into LL sub-band of IWT coefficients of respective color channel. Using two watermark sequences, the proposed scheme detect correctly the altered region of the image, when the watermarked image was suffered some alteration, and at same time owner can claim his ownership over the color image. References [1] F. Gu, Z. Ming, J. Pan Multipurpose Image Watermarkingin DCT Domain using Subsampling. Dept. of Autom. & Test, Harbin Inst. of Technol., China. Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on., 23-26 May 2005, pp 4417-4420 Vol. 5, [2] Z. Ming, D. Guo, S. Sun. Multipurpose Image Watermarking Algorithm Base on Multistage Vector Quantization. Department of Automatic Test and Control, Harbin Institute of Technology, Harbin 150001, China. IEEE Trans Image Process. 2005 Jun 14, pp 822-31. [3] Y. Linde, A. Buzo, and R. M. Gray, An algorithm for vector quantizerdesign, IEEE Trans. Commun., vol. 28, no. 1, pp. 84 95, Jan. 1980. ISSN: 1792-4863 174 ISBN: 978-960-474-231-8

[4] N. Venkata, B. Evans, Adaptive Threshold Modulation for Error Diffusion Halftoning, IEEE Trans. on Image Processing, 10(1), pp. 104-116, 2001. [5] B. Chen, G. W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. on Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001. [6] M. Wu, N. Liu. Data hiding in binary images for authentication and annotation. IEEE Trans. on Multimedia, Aug. 2004, Fig. 16 (page 536) [7] R. Neelamani, R. Nowak, R. Baraniuk, Modelbased inverse halftoning with wavelet-vaguelette deconvolution, in: Proceeddings of international Conference on Image Processing, vol. 3, 2000, pp. 973-976. ISSN: 1792-4863 175 ISBN: 978-960-474-231-8