This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Similar documents
Robust Image Watermarking based on DCT-DWT- SVD Method

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Data Hiding in Video

On domain selection for additive, blind image watermarking

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A new robust watermarking scheme based on PDE decomposition *

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

QR Code Watermarking Algorithm based on Wavelet Transform

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Feature Based Watermarking Algorithm by Adopting Arnold Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform

Image and Video Watermarking

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Digital Watermarking with Copyright Authentication for Image Communication

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Performance Improvement by Sorting the Transform Coefficients of Host and Watermark using Unitary Orthogonal Transforms Haar, Walsh and DCT

MRT based Fixed Block size Transform Coding

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Speech Modulation for Image Watermarking

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Audio Watermarking using Empirical Mode Decomposition

Image Error Concealment Based on Watermarking

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Digital Image Watermarking Using DWT Based DCT Technique

CHAPTER-6 WATERMARKING OF JPEG IMAGES

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Robust Digital Image Watermarking based on complex wavelet transform

Copy Protection for Multimedia Data based on Labeling Techniques

A Robust Image Hiding Method Using Wavelet Technique *

DIGITAL watermarking technology is emerging as a

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Digital Image Watermarking Scheme Based on LWT and DCT

Robust DWT Based Technique for Digital Watermarking

A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation

Enhancing the Image Compression Rate Using Steganography

Digital Watermarking Using 2-DCT

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Image Tamper Detection Scheme Using QR Code and DCT Transform Techniques 1 Ji-Hong Chen and 1 Chin-Hsing Chen

Invisible Watermarking Using Eludician Distance and DWT Technique

Audio Watermarking using Colour Image Based on EMD and DCT

An SVD-based Fragile Watermarking Scheme With Grouped Blocks

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Improved Content Based Image Watermarking

Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

A reversible data hiding based on adaptive prediction technique and histogram shifting

Implementation of ContourLet Transform For Copyright Protection of Color Images

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Improved Qualitative Color Image Steganography Based on DWT

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Chapter 4 Face Recognition Using Orthogonal Transforms

An Improved Blind Watermarking Scheme in Wavelet Domain

Watermarking of Image Using Priority Based On Algorithms

IMAGE COMPRESSION USING HYBRID TRANSFORM TECHNIQUE

A Cryptographic Watermark Embedding Technique

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Robust Watermark Algorithm using Genetic Algorithm

CHAPTER 6 A SECURE FAST 2D-DISCRETE FRACTIONAL FOURIER TRANSFORM BASED MEDICAL IMAGE COMPRESSION USING SPIHT ALGORITHM WITH HUFFMAN ENCODER

International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS)

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Block Mean Value Based Image Perceptual Hashing for Content Identification

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Computer Vision 2. SS 18 Dr. Benjamin Guthier Professur für Bildverarbeitung. Computer Vision 2 Dr. Benjamin Guthier

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

A Robust Image Watermarking Scheme using Image Moment Normalization

Robust Image Watermarking using DCT & Wavelet Packet Denoising

A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Optimized Watermarking Using Swarm-Based Bacterial Foraging

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106

A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Chaotic-Correlation Based Watermarking Scheme for Still Images

Image Authentication and Recovery Scheme Based on Watermarking Technique

Transcription:

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform Author(s) Aung, Aye; Ng, Boon Poh; Raharda, Susanto Citation Aung, A., Ng, B. P. & Raharda, S. (2010). A robust phase watermarking algorithm using conugate symmetric sequency-ordered complex Hadamard transform. 2010 Asia Pacific Signal and Information Processing Annual Summit and Conference, Biopolis, Singapore, pp.153-156. Date 2010 URL http://hdl.handle.net/10220/7203 Rights 2010 APSIPA. This paper was published in Proceedings of the Second APSIPA Annual Summit and Conference and is made available as an electronic reprint (preprint) with permission of APSIPA. The published version is available at: [http://www.apsipa.org/proceedings_2010/authorindex.ht m]. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper is prohibited and is subect to penalties under law.

A Robust Phase Watermarking Algorithm Using Conugate Symmetric Sequency-Ordered Complex Hadamard Transform Aye Aung, Boon Poh Ng and Susanto Raharda School of Electrical & Electronic Engineering, NTU, Singapore 639798 E-mails: aye aung@pmail.ntu.edu.sg, ebpng@ntu.edu.sg Institute for Infocomm Research, A*STAR, Singapore 138632 E-mail: rsusanto@i2r.a-star.edu.sg Abstract This paper presents a novel watermarking algorithm based on a newly developed transform known as conugate symmetric sequency-ordered complex Hadamard transform (CS- SCHT). The algorithm is performed in the sequency domain where the phases of the CS-SCHT coefficients are altered to convey the watermark information using the phase-shift-keying (PSK) modulation. The amplitude boost (AB) method is employed to improve the robustness of the watermarking scheme and the spread spectrum (SS) technique is adopted to increase the security of the watermark against various attacks. The robustness of the proposed scheme is investigated by various types of image attacking operations such as JPEG compression, resizing, cropping and low-pass filtering. I. INTRODUCTION The proliferation of mobile multimedia devices and social networks coupled with exponential increase in capabilities of high-speed internet and communication technologies have led to an explosion in the amount of digital media content that are readily available. Such ease of distribution has caused violation of copyright and intellectual property rights. Owing to this, there is an increasing need for protection of intellectual properties through digital watermarking and other techniques that could allow tracking of usage of the digital multimedia works. Such a method is popular as in general it s able to prevent or discourage unauthorized copying of multimedia content. By and large, a digital watermark is embedded in the digital data permanently to identify the source or ownership of the information. In the literature, several methods have been developed for image watermarking. In general, they can be classified into two categories, one is processed in the spatial domain and the other in the transform domain. But the watermarks embedded in the spatial domain are not robust to tampering as compared to that concealed in the transform domain [1]. One obvious disadvantage of the spatial domain watermarking is that a common picture cropping operation may deteriorate the watermark easily [2]. On the other hand, the transform domain watermarking schemes have several desirable features. For example, one can insert the watermarks into the host image based on the least perceptual significance of different transform coefficients. This will enhance the imperceptibility of the marks and lead to less visual degradation of the watermarked image. Besides, since the watermark is distributed over the transform coefficients irregularly, it is difficult for the attackers to remove the watermark. Various discrete transforms such as the discrete cosine transform (DCT) [2], [3], the discrete Fourier transform (DFT) [4], [5], [6], the discrete wavelet transform (DWT) [6], and the discrete fractional random transform (DFRNT) [1] have been used to transform the host image into an alternative domain. After transforming, the watermark is embedded using some robust algorithms. Finally, inverse transformation is performed to convert back to the spatial domain to obtain the watermarked images. In this paper, we propose a novel robust image watermarking algorithm based on a newly introduced transform known as conugate symmetric sequency-ordered complex Hadamard transform (CS-SCHT) [7]. The algorithm is processed in the sequency domain. The CS-SCHT is a complex Hadamard transform whose row vectors are arranged in an ascending order of sequencies (sequency is analogous to frequency in the DFT). Hence, sequency-based image analysis could be performed for watermarking (like frequency-based analysis for the DFT) with simpler implementation. The CS-SCHT matrix consists of four complex elements {±1, ±}, hence, its transformation is very simple as compared to the DFT. Only additions or subtractions are needed to compute the transform. Besides, the CS-SCHT coefficients are complex numbers comprised of both amplitudes and phases so they are well suited to adopt phase modulation techniques [4], [5] to encode the watermark information. The complex Hadamard transform with sequency ordering (known as the SCHT) has been shown to be useful in image watermarking [8]. In fact, both SCHT and CS-SCHT show sequency ordering but the spectrum obtained by the CS-SCHT is conugate symmetric (whereas the SCHT spectrum is not) so only half of the coefficients are needed for analysis. In our proposed scheme, two dimensional binary pattern watermark is used since such kinds of visually recognized pattern are more intuitive to represent one s identity than a sequence of random numbers is. First, the watermark is prepermuted into noises using the chaotic sequence to disperse the 10-0101530156 2010 APSIPA. All rights reserved. 153 Proceedings of the Second APSIPA Annual Summit and Conference, pages 153 156, Biopolis, Singapore, 14-17 December 2010.

spatial relationship. Then, each watermark bit is expanded by spread spectrum and embedded by PSK modulation. The paper is organized as follows. In Section 2, we provide the basic definition of the CS-SCHT. Section 3 presents the proposed embedding algorithm. Section 4 describes the watermark extraction process. The simulation results are discussed in Section 5. Finally, this paper is concluded in Section 6. II. DEFINITION OF THE CS-SCHT In this section, we shall provide a brief introduction to the CS-SCHT. The row vectors of this transform matrix are orthogonal to each other in the complex domain (unitary transform). The construction of the CS-SCHT matrix is described in the following [7]. Firstly, we define conugate symmetric natural-ordered complex Hadamard transform (CS-NCHT). Let H N be any CS-NCHT matrix of dimension N N. Then it is defined as H N W N A n 1,n 1 A 2,2 A 1,1 (1) where N 2 n, denotes the direct block matrix operator [7], W N is the N N WHT matrix, and A 1,1 [I 2 n 1, S 2 n 1] T A 2,2 [I 2 n 2, S 2 n 2, I 2 n 2, I 2 n 2]T. A n 1,n 1 [I 2, S 2, I 2, I 2,, I 2, I 2] T (2) [ ] I2 n r 1 0 where S 2 n r, 1 r n 1, 0 I 2 n r 1 [ ] I I2 n k 1 0 2, 2 k n 1 and n k 0 I 2 n k 1 ( ) T represents the transpose. As such any CS-NCHT matrix of dimension N N where N 2 n can be obtained. Since the CS-SCHT is a bit-reversed version of the CS- NCHT, it can be constructed as follows. Let H N be any CS-SCHT matrix of size N N. Then it is defined as H N (p, k) H N (b(p),k) where 0 p, k N 1 and b(p) is the decimal number obtained by the bit-reversed operation of the decimal p. The CS-SCHT of an N-point complex signal vector x N [x(0),x(1),...,x(n 1)] T is defined as X N 1 N H N x N (3) where X N [X(0),X(1),,X(N 1)] T is the transformed complex column vector and ( ) denotes the complex conugate. The data sequence can be uniquely recovered from the inverse transform, that is, x N H T N X N. The two dimensional (2-D) transform for an N N image matrix can be obtained by applying 1-D transform on the rows followed by the columns of the image matrix. III. WATERMARK EMBEDDING ALGORITHM A novel transform domain based watermark embedding algorithm for grey-scaled images is presented in this section. A robust watermarking scheme must withstand several kinds of attacks, plus it should preserve the visual quality of the original image after embedding the watermark. Besides, it must be secure enough in order to protect the watermark from being stolen. Fig. 1 summarizes the steps for watermark embedding process. The details of some steps are presented further in the following. PN2 Original image Z Segmentation into 8x8 blocks Forward 2-D CS-SCHT Y Random block selection Ae A e Amplitude Boost Original watermark W Watermark permutation W p Spread Spectrum m, d Embedding of watermark using PSK A e Y Inverse 2-D CS-SCHT R Watermarked image Fig. 1. The flow chart of watermark embedding process. A. Permutation of Watermark In our approach, the watermark is pre-permuted into noises using a chaotic sequence obtained from the Logistic map in order to increase the security of the watermark. Logistic map is one of the simplest maps, defined by x k+1 μx k (1 x k ) [9] where 0 μ 4 and x k+1 (0, 1). When μ (3.5699, 4], the map is in the chaotic state. The sequences generated by the Logistic map are non-periodic, non-convergent and very sensitive to the initial conditions. First, the 2-D binary watermark is converted into 1-D sequence according to the row scanning method. Then, the chaotic sequence is obtained using K 1 as the initial value and K 2 as the value for μ (K 1 and K 2 are saved as Key 1 for future detection purpose as shown in Fig. 1). The generated sequence is sorted according to a descending order, which gives rise to the stochastic index (label) sequence. The 1-D binary watermark sequence is permuted according to this label sequence to obtain the corresponding 2-D scrambled watermark W p which becomes chaotic as shown in Fig. 2. Hence, it will disperse the spatial relationship of the watermark as well as enhance its security against the attackers. Fig. 2. The watermark permuted by a chaotic sequence, (a) the original watermark, and (b) the permuted watermark. B. Spread Spectrum The pseudo-noise (PN) sequence based spread spectrum (SS) method [3] is used in our system. SS ensures a large measure of security against various attacks as well as enhances the robustness of the system. In the PN-based SS system, each information bit is expanded into several bits using the PN Key1 PN1 154

sequence. To accomplish the ob, first W p is converted into a polar bit sequence, d(i), where i 1, 2,...,n by mapping 0 to 1 and 1 to 1. Second, we generate a total of n different PN sequences, p i () {±1}, with the same length of l where 1, 2,...,l using a user s secret key (which is PN 1 ). By multiplying d(i) with p i (), each information-bearing bit is spread into l bits and the whole expanded polar bit sequence m is expressed as m i () d(i) p i () where 1, 2,...,l and i 1, 2,...,n. C. Random Block Selection The image is transformed into the sequency domain using the CS-SCHT based on the 8 8 blocks. We embed one watermark bit into each 8 8 transformed block. Since the number of transformed blocks is more than the size of spread watermark bit sequence, the random block selection (RBS) is used to select the required number of blocks based on the PN sequence (which is expressed as PN 2 in Fig. 1). To make the watermarking scheme robust, the watermark bits should be inserted in the most significant components of an image because this portion of the host data is robust to the attacks and also highly sensitive to alteration. By doing so, it will increase the robustness of the watermarking scheme. We select B(1, 1) as the location to embed the secret bit where B is the selected block. The amplitude and phase of B(1, 1) are denoted as A and φ respectively as mentioned in Fig. 1. D. Amplitude Boost The purpose of amplitude boost (AB) strategy is to enhance the robustness. As mentioned earlier, the watermark information is inserted into the phases of the selected CS-SCHT coefficients. It has been known that the phase distortion due to an additive Gaussian noise is inversely proportional to the amplitude of the coefficient [1], [4], [5]. In order to keep the phase distortion below a certain level, the amplitude should be maintained at one defined level. Hence, the amplitude of a selected CS-SCHT coefficient is boosted to a fixed threshold value th if its value is below th. That is, { A th, if A th (4) A, if A>th. E. PSK Modulation In the PSK modulation, the phase φ is modified into φ according to the following rule: { φ π/2, if m(r) 1 (5) 3π/2, if m(r) 1 where m(r) is the spread polar watermark bit sequence and r 1, 2,...,l n. IV. WATERMARK EXTRACTION ALGORITHM Fig. 3 shows the steps for the watermark extraction process. It should be noted that the original host image is not needed during the recovering process. But it is important that the watermark bits are decoded from the same positions where they have been embedded previously. Therefore, the set of PN2 Watermarked image R Segmentation into 8x8 blocks Forward 2-D CS-SCHT Random block selection Watermark Extraction using PSK demodulation Inverse spread spectrum Reversed permutation W R Extracted watermark Fig. 3. The flow chart of watermark detection process. user s keys (Key 1,PN 1,PN 2 ) is reused in the extraction process as well. The PSK demodulation, inverse SS and reversed permutation are performed in the extracting process in order to inverse the operations of PSK modulation, SS and watermark permutation during the embedding process, respectively. As such the recovered watermark W R is obtained. V. SIMULATION RESULTS In this paper, peak signal-to-noise (PSNR) [1], [4] is used to measure the degree of transparency of the watermarked image. In order to avoid the influence of subective measurement (since the watermark is visually recognizable pattern), an obective udgement for the extracted fidelity is provided. In this paper, we use the bit-error-rate (BER) to measure the similarity between the extracted and referenced watermarks, which is defined as BER (e/t ) 100% where e is the number of error bits detected and T represents the total number of watermark bits inserted. In order to evaluate our proposed scheme, we use the grey-scaled Lena image of 512 512 pixels shown in Fig. 4, and a watermark image (pattern of NTU) of 32 32 pixels as shown in Fig. 2. We have tested on other standard images (Peppers, Barbara, Goldhill, etc) as well as a randomly generated bit string as a watermark. It is found that the results are consistent. The values of parameters used in the simulation are: K 1 0.9 and K 2 3.8 for the Logistic map, and l 3, th 12. The threshold for the BER value is set as 20% in order to decide the extracted fidelity of the watermark. The block size used is 8 8. The length of watermark bit sequence is 32 32 1024 and after spreading, it becomes 1024 3 3072. Therefore, RBS selects 3072 blocks from a total of available blocks, which is (512 512) (8 8) 4096 blocks as one secret bit is inserted into each 8 8 transformed block. Fig. 4 shows the original Lena image, and its watermarked versions using the proposed scheme based on the CS-SCHT and the DFT. Their PSNRs are 38.16 db and 37.67 db, respectively. Both watermarked images do not contain any visible artifacts as shown in the figure and the watermark is invisible. Various attacks are considered in order to demonstrate the robustness of the proposed watermarking scheme where the Lena image is used as the test image again. Attacks include JPEG compression, resizing, cropping and filtering. For the JPEG compression attack, the watermarked image is compressed using the standard JPEG encoding at various PN1 Key1 155

TABLE I COMPARISON OF THE BER VALUES (%) FOR THE CS-SCHT AND DFT BASED SCHEMES UNDER DIFFERENT KINDS OF ATTACKS (a) (b) Fig. 4. (a) The original image of Lena, the watermarked images of Lena using (b) the CS-SCHT with PSNR38.16 db, and (c) the DFT with PSNR37.67 db. (c) Attack type Parameters CS-SCHT DFT JPEG Compression Quality level-60% 0.00 0.00 50% 0.00 0.00 40% 0.19 0.98 30% 5.96 15.04 24% 18.46 26.27 Resizing 7 times reduced 1.27 0.10 Cropping Cropping 1/4 7.62 7.81 Low-pass Filtering Filter size 3 3 0.00 0.00 quality levels. For the image resizing, the watermarked copy is scaled down to 192 192 pixels (7.11 times reduced). The reduced image is re-scaled back to the original dimension before the extraction process. For the cropping attack, the watermarked image is cropped (1/4) at the top-left corner. For the low-pass filtering, the watermarked image is filtered by using the rotationally symmetric Gaussian low-pass filter with the standard deviation σ of 0.5. Table I shows the comparison of the BER values of the extracted watermarks from various attacked watermarked images between the proposed methods using the CS-SCHT and the DFT. It can be seen from the table that both schemes are able to recover the watermark from the resizing, cropping and filtering attacks as the extracted watermarks are clearly identified by human vision as shown in Fig. 5-b, c, d, f, g and h. The corresponding BER values are under the threshold as shown in the table. For the JPEG compression, the scheme using the CS-SCHT provides lower BER values than that using the DFT. Particularly, at 24% quality level, the BER value for the CS-SCHT based scheme is 18.46% (under the threshold) whereas it is 26.27% (above the threshold) for the DFT based scheme. As a result, the extracted watermark is more visually recognizable for the CS-SCHT based scheme as compared to that of the DFT (see Fig. 5-a and e). Besides, the PSNR value of the CS-SCHT watermarked image is even higher than the corresponding value of the DFT watermarked image as mentioned earlier. Another additional advantage of the CS-SCHT based scheme over the DFT based scheme is the reduced computational complexity. Only addition/subtractions are required to perform the CS-SCHT computation. For example, in order to compute an 8-point CS-SCHT, it requires 24 complex addition/subtractions using the fast algorithm [7]. This is equal to the number of complex addition/subtractions required to compute an 8-point DFT using the radix-2 FFT algorithm. But 2 additional complex multiplications with the twiddle factors (i.e., W8 1 and W 8 3 nk 2πnk where WN exp( N )) are required to perform the 8-point DFT operation, which is not needed in the CS-SCHT computation. Hence, if an image of 512 512 pixels is considered for image watermarking, an additional saving of 2 16 4096 131072 complex multiplications can be obtained in the operation of watermark embedding. This will reduce the hardware requirement (the multipliers) when we actually implement the algorithm in hardware. The same is applied to the operation of watermark extraction as well. In fact, this is really significant in real-time implementation. (a) (b) (c) (d) (e) (f) (g) Fig. 5. The extracted watermarks: (a) the JPEG encoded at 24% quality level, (b) the resized, (c) the cropped, (d) the filtered for the CS-SCHT and the corresponding (e), (f), (g), (h) for the DFT. VI. CONCLUSION A robust phase domain watermarking scheme for greyscaled images based on the CS-SCHT is presented in this paper. The AB method and PSK modulation are adopted in order to enhance the robustness of the proposed scheme. In addition, the spread spectrum (SS) technique and watermark permutation based on the chaotic sequence are incorporated into the scheme to provide an enhanced security for the watermark. The simulation results reveal that the proposed scheme is robust to various kinds of attacks such as JPEG lossy compression, resizing, cropping and low-pass filtering. Moreover, comparison between the proposed schemes using the CS-SCHT and the DFT shows that the CS-SCHT can be considered as a suitable candidate for such applications to replace the DFT with simpler implementation and less computational cost. REFERENCES [1] J. Guo, Z. Liu, and S. Liu, Watermarking based on discrete fractional random transform, Optics Comm., vol. 272, no. 2, pp. 344 348, 2007. [2] C. T. Hsu and J. L. Wu, Hidden digital watermarks in images, IEEE Trans. Image Processing, vol. 8, no. 1, pp. 58 68, 1999. [3] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673 1687, 1997. [4] W. Y. Chen and C. H. Chen, A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection, Pattern Recognition, vol. 38, no. 4, pp. 587 598, 2005. [5] J. J. K. Ó Ruanaidh, W. J. Dowling, and F. M. Boland, Phase watermarking of digital images, in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 3, pp. 239 242. [6] R. C. Gonzalez and R. E. Woods, Digital Image Processing, Pearson Prentice Hall, International edition, 2002. [7] A. Aung, B. P. Ng, and S. Raharda, Conugate symmetric sequencyordered complex Hadamard transform, IEEE Trans. Signal Process., vol. 57, no. 7, pp. 2582 2593, 2009. [8] A. Aung, B. P. Ng, and S. Raharda, Sequency-ordered complex Hadamard transform: Properties, computational complexity and applications, IEEE Trans. Signal Process., vol. 56, no. 8, pp. 3562 3571, 2008. [9] R. Wang, Q. Li, and D. Yan, A high robust audio watermarking algorithm, in Proc. IEEE 6th World Cong. Intelligent Control Automation, Dalian, China, 2006, pp. 4171 4174. (h) 156