Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Similar documents
Feature Based Watermarking Algorithm by Adopting Arnold Transform

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on DCT-DWT- SVD Method

Digital watermarking techniques for JPEG2000 scalable image coding

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

QR Code Watermarking Algorithm based on Wavelet Transform

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Invisible Watermarking Using Eludician Distance and DWT Technique

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Comparison of Digital Water Marking methods

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

On domain selection for additive, blind image watermarking

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A Survey: Digital Image Watermarking Techniques

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

A Robust Image Hiding Method Using Wavelet Technique *

Research Article DCT-PCA Based Watermarking on E-governance Documents

A New Approach to Compressed Image Steganography Using Wavelet Transform

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Comparison of wavelet based watermarking techniques Using SVD

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

A new robust watermarking scheme based on PDE decomposition *

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

Speech Modulation for Image Watermarking

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Digital Image Watermarking Scheme Based on LWT and DCT

Digital Image Watermarking Using DWT Based DCT Technique

Robust biometric image watermarking for fingerprint and face template protection

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

A New Spatial q-log Domain for Image Watermarking

An Improved Blind Watermarking Scheme in Wavelet Domain

Digital Watermarking with Copyright Authentication for Image Communication

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

ROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu 1, K. Rajarajeswari 2

Implementation of ContourLet Transform For Copyright Protection of Color Images

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

An Improved Performance of Watermarking In DWT Domain Using SVD

Robust Image Watermarking using DCT & Wavelet Packet Denoising

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A DWT Based Steganography Approach

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Data Hiding in Video

Fingerprint Image Compression

Robust DWT Based Technique for Digital Watermarking

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

Final Review. Image Processing CSE 166 Lecture 18

Digital Image Watermarking: An Overview

Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Implementation and Comparison of Watermarking Algorithms using DWT

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

Improved Qualitative Color Image Steganography Based on DWT

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Wavelet Based Blind Technique by Espousing Hankel Matrix for Robust Watermarking

A blind watermarking algorithm based on DWT-DCT using gold sequence generator

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

A New DCT based Color Video Watermarking using Luminance Component

Multiple Binary Images Watermarking in Spatial and Frequency Domains

Digital Watermarking: Combining DCT and DWT Techniques

A DUAL WATERMARKING USING DWT, DCT, SVED AND IMAGE FUSION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

Chaotic-Correlation Based Watermarking Scheme for Still Images

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

A Statistical Comparison of Digital Image Watermarking Techniques

A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration

Transcription:

Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014

Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental Results Conclusion

Introduction Can be considered as a kind of a signature that reals the owner of the multimedia object. Used for copyright protection, content authentication, tamper detection. Three different types: visible watermark, invisible-robust watermark and invisible-fragile watermark Three main requirements: transparency (or fidelity), robustness and capacity.

Evaluation Criteria Peak Signal to Noise Ratio (PSNR) Normalized Cross-Correlation (NC)

Classical Methods for Digital Image Watermarking Spatial Domain: Least Significant Bit (LSB) Substitution Frequency Domain: Discrete Cosine Transform (DCT) based watermarking Discrete Wavelet Transform (DWT) based watermarking Discrete Fourier Transform (DFT) based watermarking Discrete Hartley Transform (DHT) based watermarking etc.

LSB based watermarking Watermark Embedding Algorithm For each pixel in base, watermark and watermarked image 1. set n least significant bits to zero for base image 2. shift right by 8-n bits for watermark 3. add values from base and watermark for the watermarked image.

LSB based watermarking Watermark Extraction Algorithm For each pixel in watermarked image and extracted image 1. shift left by 8-n bits for watermarked image 2. set to the shifted value of watermarked image for extracted image

DCT based watermarking The DCT transform and its inverse manner can be expressed as where C w = 1 2, when w=0; C w = 1, when w = 1, 2, 3,, n-1 An image is usually divided into non-overlapped m*m block. In general, a block always consists of 8*8 components. The zigzag scanning implies (1) low frequency to high frequency (2) high energy distribution to low energy distribution

DCT based watermarking Watermark Embedding Algorithm 1. Sequentially extract out every 8-bit data from watermark-bit-stream. 2. Obtain a random number, generated by pseudo random system, which points to one of n blocks of host image. 3. Embed extracted the 8-bit watermarking data into the 8 lower-band coefficients in the block pointed by previous step. 4. Repeat step 1 to step 3, until the watermark bit stream is run out. 5. The proposed employee replace bit to embedded watermark bit stream, and it was hidden at position bit 3 in the selected 8-bit coefficient. If the watermark bit is 1, then bit 3 to 1 otherwise 0.

DCT based watermarking Watermark Extraction Algorithm 1. Transform the watermarked image to frequency domain by DCT. 2. Use the same set of random numbers, which is applied in the embedding process. 3. Apply the random number to find the exact location of the DCT block in the watermarked image. 4. Extract 8-bit watermark data from each DCT block by means of the inverse embedded. The watermark bit is 1 when bit 3 is 1 of selected DCT-block coefficient otherwise the watermark bit is 0. 5. Repeat the 8-bit data into watermark image.

DWT based watermarking A signal can be split into two parts, usually high frequency and low frequency. Edge components are largely confined to the high frequency part. Low frequency can be split again into two parts of high and low frequencies.

DWT based watermarking Low pass filter: H ω = k h k e jkω High pass filter: G ω = k g k e jkω A signal can be decomposed recursively as c j 1,k = d j 1,k = n h n 2k c j,n g n 2k c j,n n A signal can be reconstructed from its DWT coefficients recursively c j,n = k h n 2k c j 1,k + g n 2k d j 1,k We often use Haar wavelet filters: H ω = 1 2 + 1 2 e jw, and G ω = 1 2 1 2 e jw k

DWT based watermarking Watermark Embedding algorithm 1. Decompose the original image into several bands with a pyramid structure. 2. Add a pseudo-random sequence (Gaussian noise) to the largest coefficients. Specifically, let y[m,n] denote the DWT coefficients, N[m,n] is a Gaussian noise sequence with mean 0 and variance 1. y m, n = y m, n + αy 2 m, n N[m, n] where α is a parameter to control the level of the watermark, the square indicates the amplification of the largest DWT coefficients. 3. Take the two dimensional IDWT of the modified DWT coefficients y and the unchanged DWT coefficients at the lowest resolution.

DWT based watermarking Watermark Extraction Algorithm 1. Decompose the watermarked image into four bands. 2. Compare the watermark added in the HH 1 band and the difference of the DWT coefficients in HH 1 bands of the watermarked and the original images by calculating their cross correlations. If there is a peak, watermark is detected. 3. If 2 is not satisfied, do that in HH 1 and LH 1 bands, respectively. 4. If watermark is still not detected, compose the signals in the LL 1 band into four additional subbands LL 2, LH 2, HL 2, and HH 2 and repeat 2-3. 5. Several times later, we assume watermark cannot be detected.

DFT based watermarking Watermark Embedding Algorithm 1. Take the Fourier transform of the original image and move the low frequency to magnitude coefficients to the center. 2. Use the pseudo-random (PRND) number generator to obatin the row vector v with l binary elements. 3. Determine the watermark: W x i, y i = v j 1 9 l l s= 1 t= 1 M x i + s, y i + t x i = m 2 + 1 + floor(r 0cos( jπ l )) y i = n 2 + 1 + floor(r 0sin( jπ l )) 4. Calculate the magnitude coefficients M w x, y = M x, y + α W(x, y) 5. Take the inverse Fourier Transform.

DFT based watermarking Watermark Extracting Algorithm 1. Take the Fourier transform of the watermarked image. 2. Extract the row vectors form radius r min to r max and resize and normalize for the adjustment. 3. Calculate the cross covariance between the extracted vector and the generated vector. If the maximum value of cross covariance exceeds a threshold, we say the watermark is detected.

Experimental Results Take DCT for example. PSNR = 35.6360; NC =1;

Experimental Results Take DCT for example. PSNR = 21.8958; NC = 0.9687;

Experimental Results Take DCT for example. PSNR = 29.4418; NC = 1;

Experimental Results Take DCT for example. PSNR = 42.9229; NC =1;

Experimental Results Take DCT for example. PSNR = 42.9559; NC = 0.8591;

Experimental Results Take DCT for example. PSNR = 42.9267; NC =0.4810;

Experimental Results Image Processing Operations Geometric Attacks Noise Low Pass Filtering Blurring Rotation Scaling Cropping LSB N N N N N N DCT Y Y Y N N N DWT Y N N Y Y Y DFT N N N Y Y Y

Conclusion Digital image watermarking is an important tool for copyright protection, content authentication and tamper detection. Can implement watermarking in both spatial domain and frequency domain. Different algorithms are focusing on different effects, but in general the result of frequency domain is better. Can combine different algorithms to obtain better results.

Reference V. Potdar, S. Han, E. Chang, A Survey of Digital Image Watermarking Techniques, IEEE International conference on Industrial Informatics (INDIN), pp. 709-716, 10-12 Aug., 2005 J. Huang, Y. Q. Shi, Y. Shi, Embedding Image Watermarks in DC Components, IEEE Transactions on Circuits and System for Video Technology, vol. 10, no. 6, pp. 974-979, Sept. 2000 X. Kang, J. Huang, Y. Q. Shi, Y. Lin, A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression, IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 776-786, Aug. 2003 C.K. Chan, L.M. Cheng, Hiding data in images by simple LSB substitution, Pattern Recognition, vol. 37, pp. 469-474, Mar. 2004 X.G. Xia, C.G. Boncelet, G.R. Arce, Wavelet transform based watermark for digital images, Optics Express, vol. 3, no. 12, pp. 497-511, Dec. 1998 V. Solachidis, I. Pitas, Circularly symmetric watermark embedding in 2-D DFT, IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, Nov. 2001