A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

Similar documents
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Watermarking Moble Phone Color Images With Error Correction Codes

Index Mapping based Hybrid DWT-DCT Watermarking Technique for Copyright Protection of Videos Files

A Robust Watermarking Technique Using Video Compression Standard H.264 Integer Discrete Cosine Transformation

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

A new robust watermarking scheme based on PDE decomposition *

Robust Image Watermarking based on DCT-DWT- SVD Method

Image Steganography (cont.)

Enhancing the Image Compression Rate Using Steganography

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Image Authentication and Recovery Scheme Based on Watermarking Technique

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Image Error Concealment Based on Watermarking

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain

Data Hiding in Video

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Digital Image Watermarking Scheme Based on LWT and DCT

ROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu 1, K. Rajarajeswari 2

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Digital Video Watermarking Algorithm Based on LSB and DCT

Optimized Watermarking Using Swarm-Based Bacterial Foraging

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A New Approach to Compressed Image Steganography Using Wavelet Transform

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

A New DCT Based Watermarking Method Using Luminance Component

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Implementation of ContourLet Transform For Copyright Protection of Color Images

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Digital watermarking techniques for JPEG2000 scalable image coding

An Improved Performance of Watermarking In DWT Domain Using SVD

Combined Hashing/Watermarking Method for Image Authentication

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

CHAPTER-4 WATERMARKING OF GRAY IMAGES

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

Image Compression Algorithm and JPEG Standard

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME

A Novel Approach for Deblocking JPEG Images

CHAPTER-5 WATERMARKING OF COLOR IMAGES

Digital Image Watermarking Using DWT Based DCT Technique

CHAPTER-6 WATERMARKING OF JPEG IMAGES

Multiple Binary Images Watermarking in Spatial and Frequency Domains

Improved Qualitative Color Image Steganography Based on DWT

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Sign-up Sheet posted outside of my office HFH 1121

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Performance Improvement by Sorting the Transform Coefficients of Host and Watermark using Unitary Orthogonal Transforms Haar, Walsh and DCT

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Robust Blind Digital Watermarking in Contourlet Domain

Digital Fragile Watermarking Scheme For Authentication Of. JPEG Images

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS)

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

International Journal of Advance Research in Computer Science and Management Studies

A New DCT based Color Video Watermarking using Luminance Component

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Digital Watermarking Using 2-DCT

Volume 2 No. 1 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Compression of Stereo Images using a Huffman-Zip Scheme

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

FRAGILE WATERMARKING USING SUBBAND CODING

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Robust biometric image watermarking for fingerprint and face template protection

QR Code Watermarking Algorithm based on Wavelet Transform

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

A Cryptographic Watermark Embedding Technique

A Robust Watermarking Algorithm For JPEG Images

Digital Watermarking with Copyright Authentication for Image Communication

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

Interactive Progressive Encoding System For Transmission of Complex Images

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Block-based Watermarking Using Random Position Key

Invisible Watermarking Using Eludician Distance and DWT Technique

Robust DWT Based Technique for Digital Watermarking

Multimedia Security: So What s the Big Deal?

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Metamorphosis of High Capacity Steganography Schemes

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Comparison of wavelet based watermarking techniques Using SVD

OVERVIEW OF DIGITAL WATERMARKING CATEGORIES AND TECHNIQUES

A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Transcription:

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function Walid Alakk Electrical and Computer Engineering Department Khalifa University of Science, technology and Research Sharjah, UAE 100032288@kustar.ac.ae Hussain Al-Ahmad Electrical and Computer Engineering Department Khalifa University of Science, technology and Research Sharjah, UAE alahmad@kustar.ac.ae This paper deals with the development and assessment of a watermarking technique which is suitable for scanned PDF documents. The watermark will serve two purposes. The first one is a logo to protect the copyright ownership. This watermark should be invisible and secure and can be extracted even if the document has gone through slight image manipulations. The second watermark will be used to authenticate the document. A slight editing in the document will change the second watermark and indicate forgery. The algorithm was tested successfully on a variety of scanned documents and the performances of the algorithm were assessed. 1. INTRODUCTION Key words: Watermarking, DCT, Hash function, Hash-key, LSB, PSNR, PDF file Watermarking algorithms are used to insert digital data or digital signatures in the original media file to prove the owner s identity of that file and prevent copyright violation. Several commercial companies around the world offer copyright protection services to their customers. The inserted watermark can be visible (Wang-2009) where it can be seen by anyone who is viewing the file, or it can be imperceptible and invisible where it can be only detected by the one who created the watermark using some decoding algorithms. For imperceptible watermark, there is a need for it to be robust so that it cannot be destroyed or lost by modifying the digital media file. There is another requirement for watermarking for copyright protection which is that the algorithm should be blind. That means that the original media file is not needed to extract the watermarking information. However, in non-blind techniques, the original file is needed to extract the embedded watermark (Al-Mansouri-2012). Moreover, Watermarking techniques can be applied either in the frequency domain or in the spatial domain. Frequency domain techniques proved to be more immune and survive different attacks. In contrast, spatial domain watermarks are more sensitive and fragile and can be used to authenticate the copyright of the watermarked file (Al-Gindy-2007). The distortion in the watermarked file after the watermarking process is analysed and assessed objectively using the peak signal to noise ratio (PSNR). In addition, the watermarking effect is assessed subjectively by viewing the watermarked file (Wang-2004). This paper introduces a way to watermark PDF files containing grey images in both frequency and spatial domain by converting the PDF file into an image file. The watermark will be inserted in the spatial domain using hash function and in the frequency domain using the Discrete Cosine Transform (DCT). Five sections are included in this paper. Section 2 discusses the algorithm for embedding the watermark signals. Section 3 illustrates the extraction process. Section 4 demonstrates the results of watermarking and the effects of watermarking on the original PDF file and the extracted watermark. Finally, section 5 concludes the work. 2. EMBEDDING THE WATERMARK SIGNALS The watermarked PDF file will have two watermarks. One of them is robust and used for copyright protection. The first watermark is inserted in the frequency domain of the converted PDF file using DCT coefficients. The second watermark is fragile and used for authentication and discovering changes in the watermarked file. This watermark is inserted in the spatial domain of the file using the least significant bit (LSB) method. The fragile The Authors. Published by BCS Learning and Development Ltd. Proceedings of the 2014 BCS International IT Conference 1

watermark is generated by using SHA-256 hash function (Cannons-2004). Fig. 1 represents a block diagram for the operation of the algorithm. Fig 1: A block diagram of the algorithm 2.1 DCT algorithm The PDF file is first converted into an image file. Then the image is divided into 8x8 blocks and then converted into the frequency domain using 2D DCT. The image is then screened to determine the best low frequency coefficients to insert the bits of the logo. If the logo is smaller than the number of available blocks then it can be repeated several times. The chosen coefficients in each block are the first four coefficients other than the DC component as illustrated in the zig-zag method. The insertion process in the coefficients is done by using Even/Odd technique. Fig. 2 shows a diagram that summarizes the DCT embedding process. The equation for the Even/Odd process is shown as follows: = DCT {f k (i, j)} 1 u, v 8, 1 k N HB (1) if w(i, j) = 1 then = { Q o ( F k(u, k) ) u, v H k 1 k N HB u, v H k 1 k N HB if w(i, j) = 0 then = { Q e ( F k(u, k) ) u, v H k 1 k N HB u, v H k 1 k N HB Fig 2: The DCT embedding In the previous equations, f k (i, j) indicates an (8x8) blocks of the original image and is its Discrete Cosine Transform (DCT). w(i, j) is the watermarked image. Moreover, Q e represents an even quantization while Q o represents an odd quantization to the nearest integer number. The H k points to the chosen coefficient locations and is the quantization scaling factor. 2.2 Hash function algorithm The process of embedding the hash-key is shown in Fig. 3. Step 1: the watermarked image, with the robust watermarks using DCT, is divided into two parts. One of them is the whole image excluding the first row. The other part is the selected row. Step 2: The hash-key using SHA256 is extracted from the first divided part of the image that is represented in Fig. 4 by region 1. Region 2 represents the first row of the DCT watermarked image. Then, the extracted Hash-key from region 1 is converted to binary number to have 256 binary bits. Step 3: The extracted 256 bits are inserted in the first row of the DCT watermarked image. In fact they are inserted in the first 256 pixels of the first row. The method that is used is inserting the hash-key using LSB method in the spatial domain. Step 4: The image is reconstructed by combining the row with the rest of the image. This results in an image that is watermarked with robust logos and fragile hash-key. Finally, the image is converted back into PDF file. 2

Fig 3: The embedding of the hash-key Fig 4: Regions of extracting & embedding the hash-key 3. EXTRACTION OF WATERMARKS 3.1 Hash function extraction The process of extracting the hash key begins with converting the watermarked PDF file into an image file. Then, the first row of the image is cropped and taken to extract the embedded hash-key using the LSB process in the spatial domain. The hash-key is compared to the embedded one that was extracted from region 1 in Fig. 4. If they are equal, the file is authenticated. 3.2 DCT extraction algorithm After extracting the hash-key, the robust logo watermark is extracted from the multi watermarked PDF file. It is first converted into an image file. Then it is divided into 8x8 blocks and converted into frequency domain using DCT. The watermark logos are extracted using the following equation: Q ( F k(u, v) ) (2) if odd, then w(i, j) = 1 if even, then w(i, j) = 0 In the previous equation, Q points to the nearest quantization value and shows the scaling factor. Then the logos are extracted, but one logo is needed. So, they are summed to give one logo after deciding a threshold as equation 3 shows: W(i, j) = w1(i, j) + w2(i, j) + w3(i, j) + w4(i, j) (3) if W(i, j) 3 W(i, j) = 1 if W(i, j) < 3 W(i, j) = 0 Fig. 6 shows the diagram for the DCT extraction process of the robust watermark. 4. RESULTS The new algorithm was implemented and tested on a PDF file containing a grey image of Lena and a PDF file containing a scanned Ottoman Painting. After converting the PDF files into an image files, the image file of Lena was found to have the dimensions of 512x512 and the image of the Painting had the dimensions of 1244x972. The inserted logos were numbered as four logos, each one of them has the dimensions of 64x64. Moreover, the hash-key was embedded in the border and extracted from the hash part of the image (region 1) using SHA-256 hash function. Fig. 7 and Fig. 8 show the original PDF file and the converted into image of Lena and the Painting respectively. The Peak Signal to Noise Ratio (PSNR) is used to show the difference between the original file and the watermarked one. Moreover, the following scaling factors were tested: 4 and 8. The used scaling factor in this paper is 4. Tables 1 and 2 show some analysis. Table 1: Performance of multi-watermarked file DCT robust watermark, scaling factor =4 Multi watermarked image Grey image Hash SHA-256 IMAGE PSNR PSNR LENA 50.4974 49.9044 PAINTING 57.5862 56.9474 Table 2: Performance of multi-watermarked file with different scaling factors DCT scaling factor DCT robust watermark PSNR PSNR 4 (LENA) 50.4974 49.9044 8 (LENA) 44.5636 44.4053 4 (PAINTING) 57.5862 56.9474 8 (PAINTING) 51.7518 51.9328 Multi watermarked image 3

extracted from region 1 in Fig. 4. Any small or big change or attack on the watermarked file will change the Hash-key of the region 1, making it different from the hash-key inserted in the border. Table IV shows the difference in the hash-key. Table 3: Hash-key using SHA-256 Fig 5: The extraction process of the hash-key Hash function SHA- 256 Hash size 64 HEX Image LENA PAINTING Hash-key C919DA648876B0D 2F569F42FEE7A5F ED4B2F917BA939F B588FCCB39A6FF9 4A92 DD621A82148AC24 AEB97F70040D4AE F11D0CC0414A78A D5687135DF826618 1AF Table 4 shows that any change or attack on the watermarked image will cause a change in the hash-key that is regenerated from the image. Table 4: change in the Hash-key Image regenerated extracted LENA C919DA648876B 0D2F569F42FEE 7A5FED4B2F917 BA939FB588FCC B39A6FF94A92 57 PAINTING DD621A82148AC 24AEB97F70040 D4AEF11D0CC0 414A78AD56871 35DF8266181AF 7F59D0947ED6E377 BC9D95AF67B0EAC 437C8540C2CACB7 DB0E84052339F9A9 D785F3773305057A9 C160404B0B3BF7C5 62E40446F217E59F9 22E340CEC24858 Fig 6: The extraction process of the logo Fig 7: PDF file and the image file The robustness of the logo watermarks has been tested under different types of attacks such as JPEG compression and cropping. That means if the PDF file was compressed or cropped, the watermark will still survive the attack. Fig. 9 and Fig. 10 show the extracted watermark that survives different degrees of the JPEG compression for the Lena and Paining files respectively. Moreover, Fig. 12 shows the extracted watermark after cropping the PDF files. That means the files have been cropped four times, each time the files were cropped from different quarter as shown if Fig. 11. Fig 8: PDF file and the converted image file of the scanned painting The obtained Hash-key using SHA-256 Hash function represents a number with a size of 64 hexadecimal. Table 3 shows the Hash-key Fig 9: Extracted Watermark logo from different compression degrees from Lena 4

Cannons, J., and Moulin, P. (2004). Design and Statistical Analysis of a Hash-Aided Image Watermarking System, IEEE transaction on image processing, Vol.13, No.10, pp. 1393-1408. Fig 10: Extracted Watermark logo from different compression degrees from Painting Wang, Z., Bovic, A., Sheikh, H. and Simoncelli, E. (2004). Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing, pp. 600-612. Wang, F., Pan, J. and Jain, C. (2009). Innovations in Digital Watermarking Techniques, Springer. Fig 11: Regions of Cropping for both files Fig 12: Extracted watermark from different cropping Lena and Painting files respectively 4. CONCLUSION The new algorithm introduces a method of digital watermarking PDF files that uses two different types of watermark signals to embed them in the document. One is robust and is used to prove the ownership of the PDF file. The second watermark is fragile and changed by any type of attacks imposed on the PDF file. This type of watermarking is used to authenticate the file and to detect attacks on the file. The algorithm was tested successfully on several PDF files. 5. REFERENCES Al-Gindy, A., Al-Ahmad, H., Qahwaji, R. and Tawfik, A. (2007) A New Blind Image Watermarking of Handwritten Signatures Using Low-Frequency Band DCT Coefficients. In proceeding of ICSPC, the IEEE International Conference on Signal Processing and Communications. Dubai, UAE, 1367-1370. Al-Mansoori, S., and Kunhu, A. (2012). Robust Watermarking Technique based on DCT to Protect the Ownership of DubaiSat-1 Images against Attacks, IJCSNS International Journal of Computer Science and Network Security, Vol.12 No.6, pp. 1-9. 5