CERIAS Tech Report

Similar documents
IMAGE DEBLOCKING IN WAVELET DOMAIN BASED ON LOCAL LAPLACE PRIOR

Data Hiding in Video

A Wavelet Watermarking Algorithm Based on a Tree Structure

Perceptual Watermarks for Digital Images and Video

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Robust Image Watermarking based on DCT-DWT- SVD Method

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

CERIAS Tech Report An Evaluation of Color Embedded Wavelet Image Compression Techniques by M Saenz, P Salama, K Shen, E Delp Center for

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

2009 Conference for Visual Media Production

Multimedia Security: So What s the Big Deal?

A Flexible Scheme of Self Recovery for Digital Image Protection

Sign-up Sheet posted outside of my office HFH 1121

Adaptive Quantization for Video Compression in Frequency Domain

A Statistical Comparison of Digital Image Watermarking Techniques

FRAGILE WATERMARKING USING SUBBAND CODING

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

2 Video Quality Assessment framework for ROI-based Mobile Video Adaptation

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Image and Video Watermarking

Copy Protection for Multimedia Data based on Labeling Techniques

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

CMPT 365 Multimedia Systems. Media Compression - Image

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

CSEP 521 Applied Algorithms Spring Lossy Image Compression

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Improved Content Based Image Watermarking

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Digital watermarking techniques for JPEG2000 scalable image coding

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P

Tracing Watermarking for Multimedia Communication Quality Assessment

Optimized Progressive Coding of Stereo Images Using Discrete Wavelet Transform

TECHNICAL RESEARCH REPORT

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Wavelet Transform (WT) & JPEG-2000

Interactive Progressive Encoding System For Transmission of Complex Images

Scalable Video Watermarking. Peter Meerwald June 25, 2007

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

JPEG IMAGE CODING WITH ADAPTIVE QUANTIZATION

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE

Compression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Improvements on Image Authentication and Recovery Using Distributed Source Coding

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

DCT-Based Image Feature Extraction and Its Application in Image Self-Recovery and Image Watermarking

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Wavelet Image Coding Measurement based on System Visual Human

FAST AND EFFICIENT SPATIAL SCALABLE IMAGE COMPRESSION USING WAVELET LOWER TREES

A 3-D Virtual SPIHT for Scalable Very Low Bit-Rate Embedded Video Compression

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

World Academy of Science, Engineering and Technology International Journal of Electronics and Communication Engineering Vol:4, No:8, 2010

Combined Hashing/Watermarking Method for Image Authentication

A HYBRID DPCM-DCT AND RLE CODING FOR SATELLITE IMAGE COMPRESSION

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Hidden Line and Surface

Reconstruction PSNR [db]

Automatic Video Caption Detection and Extraction in the DCT Compressed Domain

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Embedded Rate Scalable Wavelet-Based Image Coding Algorithm with RPSWS

DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

Compression of Stereo Images using a Huffman-Zip Scheme

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Motion Compensated Frame Interpolation Using Motion Vector Refinement with Low Complexity

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Improved Qualitative Color Image Steganography Based on DWT

Network Image Coding for Multicast

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet

Error Protection of Wavelet Coded Images Using Residual Source Redundancy

Digital Watermarking with Copyright Authentication for Image Communication

Fingerprint Image Compression

A New Psychovisual Threshold Technique in Image Processing Applications

ROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu 1, K. Rajarajeswari 2

DIGITAL watermarking technology is emerging as a

A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Feature Based Watermarking Algorithm by Adopting Arnold Transform

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

A Digital Video Watermarking Algorithm Based on LSB and DCT

Technologies for 3D Model Watermarking: A Survey

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

Pre- and Post-Processing for Video Compression

Three Dimensional Motion Vectorless Compression

Towards a Telltale Watermarking Technique for Tamper-Proofing

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Implementation of ContourLet Transform For Copyright Protection of Color Images

Digital Image Watermarking Scheme Based on LWT and DCT

CERIAS Tech Report

What is multimedia? Multimedia. Continuous media. Most common media types. Continuous media processing. Interactivity. What is multimedia?

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.

Transcription:

CERIAS Tech Report 2001-68 The Effect of Matching Watermark and Compression Transforms in Compressed Color Images by Raymond B. Wolfgang and Christine I. Podilchuk and Edward J. Delp Center for Education and Research in Information Assurance and Security, Purdue Uniersity, West Lafayette, IN 47907-2086

THE EFFECT OF MATCHING WATERMARK AND COMPRESSION TRANSFORMS IN COMPRESSED COLOR IMAGES Raymond B. Wolfgang, Christine I. Podilchuk À, and Edward J. Delp à Video and Image Processing Laboratory (VIPER) School of Electrical and Computer Engineering Purdue Uniersity West Lafayette, Indiana USA Àà Bell Laboratories Lucent Technologies Murray Hill, New Jersey USA ABSTRACT The growth of networked multimedia systems has complicated copyright enforcement relatie to digital images. One way to protect the copyright of digital images is to add an inisible structure to the image (known as a digital watermark) to identify the owner. In particular, it is important for Internet and image database applications that as much of the watermark as possible remain in the image after compression. Image adaptie watermarks are particularly resistant to remoal by signal processing attacks such as filtering or compression. Common image adaptie watermarks operate in the transform domain (DCT or waelet); the same domains are also used for popular image compression techniques (JPEG, EZW). This paper inestigates whether matching the watermarking domain to the compression transform domain will make the watermark more robust to compression. 1. INTRODUCTION Many watermarking schemes hae been introduced for digital images; spatial and transform domain techniques are the most common. Spatial techniques generally adjust the lower-order bits of image pixels to guarantee imperceptibility [1]. Spectral or transform techniques incorporate the watermark into the transform coefficients of an image [2]. Popular transforms include the discrete cosine transform (DCT) and the waelet transform. Transformbased algorithms allow one to easily place the watermark in the perceptually significant parts of an image; this leads to a mark that is more robust to attack, since it is harder to remoe without distorting the image [2]. Since imageadaptie (IA) watermarks not only reside in the significant parts of an image, but also adjust their amplitude to the image being marked, they withstand signal processing attacks particularly well [3]. This work was partially supported by a grant from the AT&T Foundation. Address all correspondence to E.J. Delp, ace@ecn.purdue.ed http://www.ece.purdue.edu/~ace, or +1 765 494 1740. An effectie watermark must withstand image compression, because images placed on the Internet or in databases are almost always compressed sometimes to a ery low data rate. Since compression tends to weaken a watermark in an image, it is important to find ways to maximize the amount of watermark that remains in the image after compression. In this paper two color image compression algorithms will be examined: JPEG, which uses the DCT, and a waelet-based algorithm known as Color Embedded Zero-Tree Waelet (CEZW) compression [4,5,6]. Two image-adaptie watermarking techniques known as IA-DCT and IA-W [7,8] will be compared. IA-DCT marks an image in the DCT domain, where IA-W uses the waelet domain. It is the goal of this paper to determine if using the same domain for both watermarking and compression will presere more of the watermark for a gien data rate. For instance, if two ersions of an IA-DCT watermarked image are compressed at the same data rate one with JPEG, the other with CEZW is the watermark more easily detected in the JPEG image? First the two watermarking schemes are described, after which a brief description of JPEG and CEZW is presented. Test images are then watermarked with both techniques. These images are then compressed with JPEG to 1.5 and 0.5 bits per pixel (bpp). The decompressed images are then tested to see which watermark (IA-DCT or IA-W) more effectiely remained in the image. This experiment is repeated with CEZW. 2. THE IA WATERMARKS The image-adaptie watermarks are based on the robustness of the basic spread-spectrum technique in [2]. The work in [8] shows that using isual models in the watermark embedding scheme can produce an een more robust watermark than [2]. Specifically, isual models allow the user to raise or lower the amplitude of the watermark according to the image content (hence the name, imageadaptie). These isual models proide thresholds for how much a gien transform coefficient can change, before such changes are noticeable under standard iewing con-

ditions. These thresholds are known as just-noticeable difference (JND) alues. The larger the JND alues, the more coarsely a coefficient can be quantized without noticeable isual distortion. In the same way, larger JND alues allow us to imperceptibly add a larger-amplitude watermark to the transform coefficients. More information on the deelopment of the DCT and waelet JND alues can be found in [7,8]. The general IA technique is described below. This technique embeds a normally distributed zero mean pseudorandom sequence into the coefficients (DCT or waelet) of an original luminance image X. The transform of the image X is first obtained to form X, where u and are the transform domain indices. The coefficients for the marked image Y are formed as follows: X + Wu, J, X > J Y = (1) X, otherwise W is the watermark element and J is the justnoticeable-difference alue for the particular transform coefficient. J scales W to ensure that the alue added to X is as large as possible, while still remaining inisible. The inerse transform of Y forms the marked image Y. To erify a (possibly altered) marked image Z, one first obtains the normalized correlation coefficient (the test statistic) between the watermark W and the ersion of the watermark extracted from Z. The extracted ersion of the watermark is W *. W ρ > T ρ T X Z * = (2) J * W W ρ = (3) * * W W Z authentic Z not authentic If W and W * are completely different, ρ will be normally distributed with zero mean and ery small ariance. If W * is a mildly damaged ersion of W, ρ will be near 1. T (0,1), and is a user-defined threshold based on the desired probability of watermark detection (PD) and probability of false alarm (PFA). The IA-DCT test produces a single ρ, which is used as the test statistic. The IA-W testing procedure is performed on a band-by band basis, which produces a different ρ for each band. We would like to choose the IA-W test statistic as a function of these alues in such a way as to maximize the mark s resistance to attacks. Two facts will affect our decision: (4) 1) Certain image processing operations will affect some bands much more than others. For instance, low pass filtering will damage the higher resolution bands more than the low resolution ones. 2) Certain images may hae a lot of energy in a particular waelet orientation. A city-scene, for instance, would hae many horizontal and ertical structures, but weak diagonal features. In such an image the waelet coefficients (and therefore the watermark amplitude) could be much larger in the horizontal and ertical bands than the diagonal ones. To take adantage of both effects, we will use the maximum ρ oer all subbands as the IA-W test statistic. In this way we hae some protection against attacks that leae at least one subband relatiely undisturbed. We also take adantage of any built-in image structures that are faorable to storing large-amplitude watermarks. 3. COLOR IMAGE COMPRESSION The two types of color image compression used in our study are JPEG and CEZW. JPEG compression first segments an image into 8 x 8 blocks, and computes the DCT of each block. The DCT coefficients are then quantized, then source coded to form the compressed bitstream. A quantization table that is specified as an input to the encoder gies the quantizer step size that is used for each coefficient. JPEG compression is fully described in [9]. Shapiro [10] proposed a waelet-based image compression technique known as the Embedded Zero-Tree Waelet algorithm (EZW). EZW exploits the unique nature of the waelet transform to describe a tree-like structure and a successie-refinement quantization scheme for the waelet coefficients. The adantage of this technique is that the compressed data stream contains information in the order of its perceptual significance. The decoding of the compressed data stream may be halted at any time to meet data rate constraints. An extension to color images known as Color Embedded Zero-Tree Waelet (CEZW) compression is presented in [4,5,6]. In CEZW, the tree structure is first obtained for each color component. Then a single tree structure is formed which incorporates the component trees. Quantization and refinement of the coefficients are performed using the new tree. The reader is referred to [4,5,6] for the details of CEZW. IA-W and CEZW both use the 9-7 biorthogonal filters to transform the image into the waelet domain; IA-DCT and JPEG both use the DCT. The experiments below inestigate whether matching the transforms used for watermarking and compression will degrade the watermark less than if different transforms are used.

4. EXPERIMENTAL PROCEDURE To determine the effects of matching the watermarking domain to the compression domain, the following experiments were performed: 1. An original 24-bit color image, X, was transformed into the YUV color space, and the luminance plane was marked according to IA-DCT. The marked image is called Y D. A second copy of X was then marked with IA-W to form Y W. 2. Both Y D and Y W were JPEG compressed and decompressed at 1.5 bpp to form Y DD and Y WD respectiely. (The first subscript corresponds to the watermarking domain, and the second corresponds to the compression transform.) 3. Y D was also compressed with CEZW, then decompressed at 1.5 bpp to form Y DW. This was repeated with Y W to form Y WW. 4. The four compressed images were then tested for the presence of the watermark with their respectie algorithms. 5. This process was performed for three different images: fruit, girls, and peppers. 6. The experiment was repeated for 0.5 bpp. 5. EXPERIMENTAL RESULTS The test statistics obtained from the aboe experiments are shown in Table 1. It was expected that for IA-DCT marked images, the JPEG compressed pictures would yield larger test statistics than the CEZW compressed ones. The CEZW compressed images actually produced larger test statistics than the corresponding JPEG images, although the differences were relatiely small. As expected, CEZW yielded larger test statistics than JPEG for IA-W images; this difference is most noticeable at 0.5 bpp. Image Table 1. Watermark test statistics. IA-DCT marked images 1.5 bpp 0.5 bpp JPEG CEZW JPEG CEZW Fruit 0.88 0.95 0.46 0.56 Girls 0.87 0.96 0.57 0.59 Peppers 0.93 0.96 0.6 0.7 IA-W marked images Fruit 1.0 1.0 0.10 0.94 Girls 0.80 1.0 0.12 0.91 Peppers 0.88 1.0 0.16 0.92 Figure 1 shows the test statistics for the IA-DCT images. The 1.5 bpp images hae test statistics close to one, while the 0.5 bpp images hae an aerage test statistic alue of 0.6. This is a much more graceful degradation of the watermark than shown in Figure 2, which shows the IA-W data. Here the 0.5 bpp JPEG compressed IA-W image has practically no trace of the watermark (test statistic = 0.1). Howeer, the 0.5 bpp CEZW compressed images hae test statistics comparable with the 1.5 bpp images (test statistic = 0.9). 1.2 1 0.8 0.6 0.4 0.2 0 1.2 0.8 0.6 0.4 0.2 CEZW 1.5 JPEG 1.5 CEZW 0.5 JPEG 0.5 fruit girls peppers Figure 1. Test statistics for IA-DCT images. 1 0 CEZW 1.5 JPEG 1.5 CEZW 0.5 JPEG 0.5 fruit girls peppers Figure 2. Test statistics for IA-W images. Figure 3 shows the IA-W watermarked fruit image at the top, the IA-W watermark in the center, and the IA-DCT watermark at the bottom. Figure 4 and Figure 5 show the results from the girls and peppers images respectiely. The IA-W marked images were isually indistinguishable from the original images, and are shown here for illustratie purposes only. The IA-DCT marked images were not in-

cluded because they were also perceptually identical to the originals. watermarking scheme (not only the waelet-based scheme). This is due in part to the fact that since the original image quality is better presered using this compression algorithm, the watermarks which are highly correlated to the original image content are also better presered. At the lower bit rate (0.5 bpp), the correlation alues are quite low for the JPEG compressed IA-W images, but this may not be critical if the compression artifacts at this bit rate destroy the original image quality. Figure 3. Top: image marked with IA-W; center: the IA-W watermark; bottom: the IA-DCT watermark. 6. CONCLUSION Based on our experiments, we find that at low data rates it is beneficial to match the transform framework of the watermarking scheme to the transform framework of the compression scheme. At high data rates, matching the transforms is not critical. We also obsere that the CEZW scheme also results in better watermark detection for either Figure 4. Top: image marked with IA-W; center: the IA-W watermark; bottom: the IA-DCT watermark.

Figure 5. Top: image marked with IA-W; center: the IA-W watermark; bottom: the IA-DCT watermark. An Adobe PDF ersion of this paper, and the images are aailable ia anonymous ftp to skynet.ecn.purdue.edu in the directory /pub/dist/delp/icip98-wmark. [2] I. J. Cox, J. Kilian, F.T. Leighton and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, ol. 6, no. 12, pp. 1673-1687, December, 1997. [3] R. Wolfgang, C. Podilchuk and E. J. Delp, Perceptual watermarks for digital images and ideo, submitted to Proceedings of the IEEE. [4] K. Shen and E. J. Delp, Color image compression using an embedded rate scalable approach, Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, CA, October 26-29, 1997, ol. 3, pp. 34-37. [5] K. Shen, A Study of Real-Time and Rate Scalable Video and Image Compression, Ph.D. Thesis, School of Electrical and Computer Engineering, Purdue Unieristy, December 1997. [6] K. Shen and E. J. Delp, Waelet based rate scalable ideo compression, to appear in the IEEE Transactions on Circuits and Systems for Video Technology, 1998. [7] C. Podilchuk and W. Zeng, Digital image watermarking using isual models, Proceedings of the SPIE Conference on Human Vision and Electronic Imaging II, San Jose, CA, USA, Feb. 10-13, 1997, ol. 3016, pp. 100-111. [8] C. Podilchuk and W. Zeng, Image-adaptie watermarking using isual models, IEEE Journal on Selected Areas in Communications. ol. 10, no. 4, pp. 525-540. [9] W. B. Pennebaker and J. L. Mitchell, JPEG Still Image Data Compression Standard, Van Nostrand Reinhold, 1993. [10] J. M. Shapiro, Embedded image coding using zerotrees of waelet coefficients, IEEE Transactions on Signal Processing, ol. 41, pp. 3445-3462, December, 1993. 7. REFERENCES [1] R. Wolfgang and E. J. Delp, A watermark for digital images, Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, Sept. 16-19, 1996, ol. 3, pp. 219-222.