DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Similar documents
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Digital Video Watermarking Algorithm Based on LSB and DCT

Image Authentication and Recovery Scheme Based on Watermarking Technique

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Data Hiding in Video

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Robust Image Watermarking based on DCT-DWT- SVD Method

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Implementation of ContourLet Transform For Copyright Protection of Color Images

A Semi-Fragile Watermarking Scheme for Color Image Authentication

Data hiding technique in JPEG compressed domain

A Robust Image Hiding Method Using Wavelet Technique *

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

A New DCT based Color Video Watermarking using Luminance Component

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A New Approach to Compressed Image Steganography Using Wavelet Transform

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Improved Qualitative Color Image Steganography Based on DWT

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Digital Watermarking with Copyright Authentication for Image Communication

A DUAL WATERMARKING USING DWT, DCT, SVED AND IMAGE FUSION

An Improved Performance of Watermarking In DWT Domain Using SVD

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Speech Modulation for Image Watermarking

EMBEDDING WATERMARK IN VIDEO RECORDS

A new robust watermarking scheme based on PDE decomposition *

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

Digital Image Watermarking Using DWT Based DCT Technique

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

A Survey of Fragile Watermarking-based Image Authentication Techniques

Robust copyright protection scheme for digital images using the low-band characteristic

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Copy Protection for Multimedia Data based on Labeling Techniques

Multilayer Data Embedding Using Reduced Difference Expansion

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Robust biometric image watermarking for fingerprint and face template protection

A New DCT Based Watermarking Method Using Luminance Component

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Robust DWT Based Technique for Digital Watermarking

Chaotic-Correlation Based Watermarking Scheme for Still Images

A Robust Watermarking Algorithm For JPEG Images

Fingerprint Image Compression

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Digital Image Watermarking Scheme Based on LWT and DCT

Combined Copyright Protection and Error Detection Scheme for H.264/AVC

Image and Video Watermarking

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Design and Development of BFO Based Robust Watermarking Algorithm for Digital Image. Priyanka*, Charu Jain** and Geet Sandhu***

DIGITAL WATERMARKING OF VIDEO USING DCT AND EXTRACTION FROM ATTACKED FRAMES

A Video Watermarking Algorithm Based on the Human Visual System Properties

Use of Local Minimization for Lossless Gray Image Compression

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

QR Code Watermarking Algorithm based on Wavelet Transform

A blind Wavelet-Based Digital Watermarking for Video

Digital Watermarking using Integration of DWT & SVD Techniques

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

A Blind Wavelet-Based Digital Watermarking for Video

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Analysis of Information Hiding Techniques in HEVC.

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Multiple Binary Images Watermarking in Spatial and Frequency Domains

Hybrid DCT-CT Digital Image Adaptive Watermarking

Efficient Image Steganography Using Integer Wavelet Transform

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Reversible Data Hiding VIA Optimal Code for Image

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Digital watermarking techniques for JPEG2000 scalable image coding

CHAPTER-4 WATERMARKING OF GRAY IMAGES

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

Transcription:

DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer Science, The University of Sydney, NSW 26, Australia Abstract Digital watermarking has recently emerged as an important area of research to protect the copyright of multimedia and internet data. Most of other literatures focus on the algorithms of embedding one-dimensional watermarks or twodimensional binary digital watermarks. In this work, a robust method of embedding a gray-level digital watermark into an is proposed. A gray-level digital watermark is decomposed into a series of binary digital s for implementing multiple watermark. This watermark is self-extractable.. Introduction A digitally watermarked is obtained by invisibly hiding a signature information into the host. The signature is recovered using an appropriate decoding process. The challenge is to ensure that the watermarked is perceptually indistinguishable from the original and that the signature be recoverable even when the watermarked has been compressed or transformed by standard processing operations. Many other works have been presented for the one-dimensional watermarks [][2] and twodimensional watermarks [3][4]. A onedimensional watermark is a set of ID numbers which has less perception and information of copyright ownership when compared to twodimensional watermark. This paper describes a novel gray-level digital watermark embedding algorithm that provides more perceptual information compared with a binary digital watermark. A gray-level digital watermark will first be decomposed into a series a binary digital s for implementing multiple watermarking. The multiple watermarks can be inserted into any region of an original. The discrete cosine transform (DCT) coding is one of the common algorithms used in watermarking based on one-dimensional watermarks or two-dimensional binary digital watermarks. The multiple watermarks will then be inserted into the DCT transform of the original s. Binary bits of watermark are embedded directly into the Least Significant Bit (LSB) [5][6] of DCT coefficients in an. By using the duplication of copies of watermark, it can further robust the attacks of signal processing techniques. To extract the watermark, we can take the LSB out and replace by watermark bit streams. This method is self-extractable. Section II describes the decomposition techniques of gray-level digital s, Section III gives a brief description about the watermarking procedures. Section IV and V give the experimental result and conclusion respectively. Page

DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. 2. The bit decomposition of graylevel digital s The bit decomposition algorithm is described as follows: Let X(m,n) be a 2 L gray of size MxN and X p (m,n) be a pixel value of the x p l if ( Integer[ xp( m, n) / 2 ]) mod 2 = ( m, n) = l if ( Integer[ xp ( m, n) / 2 ]) mod 2 = (I= m= M, I= N= N). Then the bit decomposition of the s is described as: x l (m,n) = B l (X p (m,n) ) where B l (. ) represents the operator of the bit decomposition, and x l (m,n) {,}. Also, the composition of the x l (m,n) is: L X m n x l l (, ) = ( m, n) 2 l= Figure shows an example of how the bit decomposition can be applied to an 8 bit graylevel of 2 x 2 size. We can apply this decomposition techniques into a 256 graylevel watermarked s with size M x N. 3. The embedding and extraction of Gray-level digital watermarking a. Embedding digital watermark procedure According to section II figure, a gray-level digital watermark is decomposed into a series of binary bit planes by bit decomposition. The 8- bit gray-level has been divided into 8 planes (b7, b6, b5, b4, b3, b2, b and b), each binary bit plane of the watermark can implement multiple watermarking. In figure 2, the embedding procedure first segments the eight original s (I, I 2, I 3, I 4, I 8 ) into 8 x 8 pixels blocks and each block is DCT transformed independently. The eight planes decomposed gray-level digital watermark will be embedded into the eight host transformed s. The output eight s from multiple watermarks embedding process will have the inverse DCT transform. The output eight s (I, I 2, I 3, I 4, I 8 ) are the watermarked s. The embedding procedure is as follow:. Eight s (I, I 2, I 3,.I 8 ) will be divided into 8x8 blocks and have the DCT transform independently. 2. Eight bits gray-level watermark is divided into 8 planes (b7, b6, b5, b). 3. The LSB of each modified DCT coefficients is replaced by the watermark bit streams in each block. 4. The output s from step 3 will have IDCT transform. 5. The output s from step 4 are the watermarked s (I, I 2, I 3, I 8 ). Original 8-bit Gray-level 2 78 49 62 b7 b6 2 bit decompostion with b7 (MSB) and b (LSB) b5 Figure Two bit decomposition of an 8-bit gray level b4 b3 b2 b b Page 2

DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. 8M Original 8-bit Gray-level 8N DCT Segmentation into 8x8 blocks Multiple watermarks embedding bit decomposition Gray-level Watermark Image IDCT Watermarked I' I3' I2' I4' I8' I7' I6' I5' Figure 2 Data embedding scheme for gray level digital watermark During multiple watermark process in figure 2, we first decide the embedding position. The watermark block is embedded into its corresponding block by replacing the least significant (LSB) of DCT coefficient. Figure 3 shows the detail of how the LSB can be replaced by the watermark information. We have done some testing on replacing second LSB, third LSB, forth LSB, fifth LSB or sixth LSB. Table and table 2 in section IV show the result of replacing different bits instead of LSB. b. Extracting digital watermark procedure The algorithm can extract the watermark in selfextractable way. The extracting method is as follows: 2. Copy the LSB of each modified DCT coefficients in each transformed from step. 3. The 8 bits watermark data from step 2 will be combined together to form a gray level watermark output. 4. The host s (I, I 2, I 3, I 8 ) can be obtained after the IDCT transform process. Figure 4 is the block diagram of the watermark extraction. The eight watermarked s from part (a) (embedding digital watermark) output will first be segmented into 8 x 8 block size. After the DCT transform, the multiple watermarks are extracted and the gray-level watermark is composed from each block of the eight s.. Eight s (I, I 2, I 3,.I 8 ) will be divided into 8x8 blocks and have the DCT transform independently. Page 3

DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. b6 (2x2 watermark block) st 2nd 3rd 4th (binary of 4) (binary of 3) 4 3 2 DCT coefficients (binary of 5) (binary of 2) 5 2 2 insert bit into the LSB of the DCT coefficient Figure 3 The detailed embedding process for b6 (2 nd MSB plane) 8M Watermarked I' I3' I2' I4' I5' I6' I7' I8' 8N divide each I' into 8x8 blocks DCT Original host I I2 I3 I4 I5 I6 I7 I8 IDCT Extracting multiple watermarks from 8 Images (I',I2',...I8') 8 bits composition combine 8 bits to form a gray level Figure 4. extracted 8 bit gray level watermark Data extraction scheme for gray-level digital watermark Page 4

DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. 4. Results and discussion The Peak Signal to Noise Ratios (PSNR) is used to measure the distortion of watermarked. PSNR = log [ Where x i,j and x ij denote the pixels of the original and reproduced s and the s are the size M x N. Table and table 2 show the result of replacing different bits (2 nd lsb, 3 rd lsb, 4 th lsb, 5 th lsb and 6 th lsb) in host by watermark information. Table shows the result for recovered host and table 2 shows the result for the extracted watermark. Figure 5a shows the original Elaine of size 52 x 52 with 256 gray levels, and figure 5b is the watermark Lenna of size 64 x 64 with 256 gray levels. The PSNR of watermarked Lenna with 8 bit planes is 44.6dB and the PSNR of recovered host Elaine with 45.834dB. Figure 6a shows the recovered host Elaine, figure 6b shows the extracted watermarked Lenna. In order to test and verify the robustness of our watermarking algorithm, the JPEG compression and other signal processing attacks will be further tested. Position PSNR (in db) M N RMSE Root MSE NMSE Normalized 2 nd lsb 54.58.479.23.9 3 rd lsb 5.855.73.534.252 4 th lsb 45.834.3.689.796 5 th lsb 4.65 2.5 6.26.295 6 th lsb 34.245 4.946 24.46.53 Table The recovered host with different bit replacement Position PSNR (in db) RMSE Root i = j= i, j i, j MSE NMSE Normalized 2 nd lsb 24.345 5.46 239..57 3 rd lsb 34.383 4.869 23.73.43 4 th lsb 44.6.598 2.553.2 5 th lsb 34.6 4.74 22.5.989 6 th lsb 5.839.653.426.87 Table 2 The extracted watermark with different bit replacement M 2 255 ] N ' 2 ( x x ) 5. Conslusion In this paper, we have presented a novel digital watermarking technique which can embed the gray level. In our proposed method, the digital watermark is decomposed into a series of binary digital s for implementing multiple watermarks. The decomposed watermark is embedded into the DCT domain by modifying DCT coefficient values. Section IV shows the result of embedding watermarked into different bits. The recovered s Elaine and Lenna have high PSNR value and good visual quality. We will further test our watermark algorithm with JPEG compression and other signal processing attacks. 6. Acknowledge This research is supported by the VPAC (Victorian Partnership for Advanced Computing Expertise Program) Grants Scheme. 7. References [] R. B. Wolfgang, C. I. Podilchuk, I. J. Delp, Perceptual Watermarks for Digital Images and Video, Proceedings of the IEEE, Vol. 87, No.7, pp.8-26, July 999. [2] G. Voyatzis, I. Pitas, The Use of Watermarks in the Protection of Digital Multimedia Products, Proceedings of IEEE, Vol.87, No.7, pp.97-27, July 999. [3] C.T. Hsu, J. L. Wu, Hidden Digital Watermarks in s, IEEE Trans. On IP, Vol.8, No., pp58-68, Jan. 999. [4] C.T. Hsu, J. L. Wu, Multiresolution Watermarking for Digital Images, IEEE Trans. On Circuits and System (II), Vol.45, No.8, pp97-. [5] G.Voyatzias and I.Pitas, Chaotic mixing of digital s and applications to watermarking, in Proceedings of European Conference on Multimedia Applications, Services and Techniques (ECMAST 96), vol. 2, pp 687-695, May 996. [6] R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne, A Digital Watermark, in Proc. 994 IEEE Int. Conf. On Image Proc,. Vol II, (Austin, TX), pp86-9, 994. Page 5

DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. Figure 5a Original host Elaine with 52 x 52 pixels Figure 5b Original watermark Lenna with 64 x 64 pixels Figure 6a Recovered host Elaine after DCT watermark with 45.834dB (PSNR) Replacing 4 th lsb in table Figure 6b Extracted watermark Lenna with 44.6db (PSNR) Replacing 4 th lsb in table 2 Page 6