Electronic & Electrical Engineering. Communications Research Group. Digital watermarking techniques for JPEG2000 scalable image coding Deepayan Bhowmik The University of Sheffield, Sheffield, UK
Contents Introduction Digital watermarking: properties and applications Discrete wavelet transform and its applications Scalable image coding and its application in multimedia signal processing Research techniques for image watermarking for JPEG2000 content adaptation Recent developments and open questions in this field
Contents Introduction Digital watermarking: properties and applications Discrete wavelet transform and its applications Scalable image coding and its application in multimedia signal processing Research techniques for image watermarking for JPEG2000 content adaptation Recent developments and open questions in this field
Introduction A digital watermark is the copyright or author identification information which is embedded directly in the digital media in such a way that it is imperceptible, robust and secure. Audio watermarking Image watermarking Video watermarking
Digital watermarking: properties and applications + =
Example
Example
Example
Digital watermarking : properties Imperceptibility Measurement metrics: RMSE, PSR, SSIM etc.
Digital watermarking : properties Imperceptibility Measurement metrics: RMSE, PSR, SSIM etc. Robustness Measurement metric: Hamming distance, Correlation etc.
Digital watermarking : properties Imperceptibility Measurement metrics: RMSE, PSR, SSIM etc. Robustness Measurement metric: Hamming distance, Correlation etc. Fragility Tamper-resistance Data payload
Applications Copyright protection. Owner identification. Content authentication. Broadcast monitoring. Transaction tracking. Media digital rights management (DRM) in content supply chain. Tamper proofing.
Contents Introduction Digital watermarking: properties and applications Discrete wavelet transform and its applications Scalable image coding and its application in multimedia signal processing Research techniques for image watermarking for JPEG2000 content adaptation Recent developments and open questions in this field
Discrete Wavelet Transform (DWT) and applications
DWT I G 0 G 1 2 2 H L G 0 G 1 G 0 G 1 2 2 2 2 HH HL LH LL 2D wavelet decomposition
DWT LL2 HL2 HL1 LH2 HH2 LH1 HH1 2 level decomposition
DWT Applications Compression JPEG-2000 image compression MC-EZBC video compression De-noising Edge-detection Image retrieval Gait analysis Digital communication and many others
Contents Introduction Digital watermarking: properties and applications Discrete wavelet transform and its applications Scalable image coding and its application in multimedia signal processing Research techniques for image watermarking for JPEG2000 content adaptation Recent developments and open questions in this field
Scalable image coding
JPEG2000 image coding using DWT
JPEG2000
JPEG2000 image coding
Bit plane JPEG2000 image coding LH1 LH2 LL2 HH2 HL2 HH1 1 HL1 Most significant Bit plane -1 0 Bit plane -2 1 LH2 LL2 HH2 HL2 HL1 Least significant Bit plane 0 LH1 HH1 0
JPEG2000 image coding Quarter Resolution LL2 LH2 HL2 HH2 Half Resolution LL1 HL1 Full Resolution LH1 HH1
Resolution scalability
Resolution scalability
Resolution scalability
Quality scalability
Quality scalability
Quality scalability
Example
Contents Introduction Digital watermarking: properties and applications Discrete wavelet transform and its applications Scalable image coding and its application in multimedia signal processing Research techniques for image watermarking for JPEG2000 content adaptation Recent developments and open questions in this field
Robust watermarking techniques for scalable coding
Watermarking techniques Original Image (I) Watermark (W ) Embedding () Watermarked Image (I') Test Image (I') Extraction () Extracted watermark (W ') Authentication Watermark detection decision Original Image (for non-blind type) (I) Original watermark (W )
Watermarking techniques Embedding Domain Pixel Domain Transform Domain Fourier DCT Wavelet on-blind Blind
Watermarking techniques Host Image DWT Coefficient selection and watermark embedding IDWT Watermarked Image Attack including content adaptation Watermark Test image Authentication Decision Comparison of original and extracted watermark Extracted Watermark Watermark Extraction (Blind / on-blind) DWT
Watermarking techniques C ' m, n Embedding C C m w m, n, n m, n, Extract C' C w ext C, where C m,n = modified coefficient, C m,n = wavelet coefficient to be modified, w m,n = watermark information, α = watermark strength parameter, w ext = extracted watermark.
C q Wavelet based image compression (Bit-plane discarding): C Q, where C q = quantised coefficient, C = original coefficient, Q = quantisation parameter, Cˆ Q. C q Q 1 2, Cˆ = decoded coefficient Q = 2 k ±1, ±2, ±3 C k = Center point value ( k 1). 2 k. 2 ( k 1). 2 C k ( k ( 1) 1).2 2 1 2 C k k.2 2 1 2 C 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK
Algorithm 1: Embed 1: C & C in different cluster: k.2 C k.2. 1 w 1 w 1 = value to embed 1. ( k 1). 2 k. 2 ( k 1). 2 C( k 1) C k C' C k.2 1 w 1
Robustness Analysis : Embed 1: C & C in same cluster: k.2 Ck C. 1 T T = Threshold for watermark detection. ( k 1). 2 k. 2 ( k 1). 2 C( k 1) Ck C' C C k T 1
Robustness Analysis : Embed 1: combined: k.2 Ck C 1 w1 1 T. ( k 1). 2 k. 2 ( k 1). 2 C( k 1) C k C' C k.2 1 w 1 C k 1 T
Robustness Analysis : Embed 0: C & C in different cluster: k.2 1 w 0 C k.2. w 0 = value to embed 0. ( k 1). 2 k. 2 ( k 1). 2 C( k 1) k.2 1 w 0 Ck C' C
Robustness Analysis : Embed 0: C & C in different cluster: C ( k 1) k.2 C. 1 T 1 w0 ( k 1). 2 k. 2 ( k 1). 2 C' C( k 1) 1 T C( k 1) k.2 1 w 0 Ck C
Robustness Analysis : Embed 1 or 0 for correct watermark extraction: k.2 k.2 C 1 w 1 1 w 0. ( k 1). 2 k. 2 ( k 1). 2 C( k 1) 1 T C( k 1) C k C k.2 1 w 1 k.2 1 w 0 C k T 1
Simulation results : Map of original coefficient values (C) to retain the watermark information.
Hamming Distance Simulation results : Effect of coefficient selection on JPEG2000 compression for different. CR = 64:1 0.35 0.3 0.25 0.2 0.15 Image 1 Image 2 Image 3 Image 4 Image 5 Image 6 0.1 0 1 2 3 4 5 6 7 8 9 Effect of bit-plane based coefficient selection procedure against JPEG2000 quality scaling considering 64:1 compression ratio. Quantisation steps: Q = 2 0 to Q = 2 9.
C q Wavelet based image compression (Bit-plane discarding): C Q, where C q = quantised coefficient, C = original coefficient, Q = quantisation parameter, Cˆ Q. C q Q 1 2, Cˆ = decoded coefficient Q = 2 k ±1, ±2, ±3 C k = Center point value ( k 1). 2 k. 2 ( k 1). 2 C k ( k ( 1) 1).2 2 1 2 C k k.2 2 1 2 C 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK
Algorithm 2: ( n 1)%2 n% 2 0 1 0 1 C 0 2 3 ( n 1) (n) ( n 1) 0 C 1 2( n) / 2 ( 2n 1) / 2 2( n 1) / 2 M 2 0 1 C 4( n) / 4 ( 4n 1) / 4 2(2n 1) / 4 0 C 1 2(4n 1) /8 ( 8n 3) /8 4(2n 1) / 8 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK
Embedding algorithm n% 2 1 0 1 0 1 0 1 Tree depth d 0 1 0 1 Tree for C: b( C) ( n%2)011 1011 b i C 2 i %2, i 0,1,2,3..., C 142 2 5 32 b( C) 01000 d 6 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK
Tree based watermarking rule Symbols Binary Tree Watermark association Embedded Zero (EZ) 000xxxx 0 Embedded Zero (EZ) 001xxxx 0 Cumulative Zero (CZ) 010xxxx 0 Weak One (WO) 011xxxx 1 Weak Zero (WZ) 100xxxx 0 Cumulative One (CO) 101xxxx 1 Embedded One (EO) 110xxxx 1 Embedded One (EO) 111xxxx 1 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK
Experimental Results Existing Algorithm Proposed Algorithm PSR Data capacity (L) PSR Data capacity (L) Boat (704x576) 86.40 53.74 2112 84.13 47.43 6336 Barbara (704x576) 80.64 55.12 2112 81.71 49.13 6336 Blackboard (704x576) 69.12 56.45 2112 69.12 50.51 6336 Light House (768x512) 84.48 55.36 2048 82.43 48.78 6144
Experimental Results Hamming Distance Hamming Distance Robustness against bit plane discarding: Blackboard d=5 ( =31) 0.5 d=5 ( =329) d=6 ( =112) d=6 ( =1278) 0.4 d=7 ( =466) d=7 ( =4980) 0.3 0.2 0.1 0 0 1 2 3 4 5 6 7 p 0.35 0.3 0.25 Robustness against JPEG2000: Blackboard d=5 ( =31) d=5 ( =329) d=6 ( =112) d=6 ( =1278) d=7 ( =466) d=7 ( =4980) 0.2 0.15 0.1 0.05 0 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK 0 5 10 15 20 25 30 35 40 45 50 JPEG2000 compression Ratio
Experimental Results Hamming Distance Hamming Distance Robustness against bit plane discarding: Light House d=5 ( =31) 0.5 d=5 ( =335) d=6 ( =125) d=6 ( =1358) 0.4 d=7 ( =482) d=7 ( =5129) 0.3 0.2 0.1 0 0 1 2 3 4 5 6 7 p 0.4 0.35 0.3 0.25 Robustness against JPEG2000: Light House d=5 ( =31) d=5 ( =335) d=6 ( =125) d=6 ( =1358) d=7 ( =482) d=7 ( =5129) 0.2 0.15 0.1 0.05 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK 0 0 5 10 15 20 25 30 35 40 45 50 JPEG2000 compression Ratio
Experimental Results Hamming Distance Hamming Distance 0.3 Robustness against JPEG2000: Blackboard 0.25 0.2 0.15 0.1 Proposed algorithm Existing algorithm 0.05 0 10 20 30 40 50 60 JPEG2000 compression Ratio 0.25 Robustness against JPEG2000: Light House 0.2 0.15 0.1 0.05 Proposed algorithm Existing algorithm 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK 0 0 10 20 30 40 50 60 JPEG2000 compression Ratio
Experimental Results Hamming Distance Hamming Distance 0.3 Robustness against JPEG2000: Blackboard 0.25 0.2 0.15 0.1 Proposed algorithm Existing algorithm 0.05 0 10 20 30 40 50 60 JPEG2000 compression Ratio 0.25 Robustness against JPEG2000: Light House 0.2 0.15 0.1 0.05 Proposed algorithm Existing algorithm 05/12/2012 @ IET/IPR 2012 The University of Sheffield, UK 0 0 10 20 30 40 50 60 JPEG2000 compression Ratio
Contents Introduction Digital watermarking: properties and applications Discrete wavelet transform and its applications Scalable image coding and its application in multimedia signal processing Research techniques for image watermarking for JPEG2000 content adaptation Recent developments and open questions in this field
Demo Watermarking demo.
Open questions in this field and comments Watermarking a growing research area for digital copyright protection and other applications. Scalable coded contents are being used for various applications including mobiles. Watermarking for scalable coded contents are challenging and needs more research. Video watermarking is a promising research area to explore.
Pointers WEBCAM Framework developed by The University of Sheffield. http://svc.group.shef.ac.uk/webcam.html
Pointers
Electronic & Electrical Engineering. Communications Research Group. Questions and Answers:
Electronic & Electrical Engineering. Communications Research Group. Thank You All d.bhowmik@sheffield.ac.uk www.bhowmik.net/publication.html