Chaotic-Correlation Based Watermarking Scheme for Still Images

Similar documents
ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Robust Image Watermarking based on DCT-DWT- SVD Method

Image Error Concealment Based on Watermarking

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Robust biometric image watermarking for fingerprint and face template protection

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Robust copyright protection scheme for digital images using the low-band characteristic

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Feature Based Watermarking Algorithm by Adopting Arnold Transform

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A New Spatial q-log Domain for Image Watermarking

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

A new robust watermarking scheme based on PDE decomposition *

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

FRAGILE WATERMARKING USING SUBBAND CODING

Combined Hashing/Watermarking Method for Image Authentication

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Image Authentication and Recovery Scheme Based on Watermarking Technique

A New Approach to Compressed Image Steganography Using Wavelet Transform

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Speech Modulation for Image Watermarking

Block-based Watermarking Using Random Position Key

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Data hiding technique in JPEG compressed domain

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

On domain selection for additive, blind image watermarking

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

An Improved Performance of Watermarking In DWT Domain Using SVD

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Digital Image Watermarking Scheme Based on LWT and DCT

A new wavelet based logo-watermarking scheme

International Journal of Advance Research in Computer Science and Management Studies

Digital Watermarking with Copyright Authentication for Image Communication

CHAPTER-6 WATERMARKING OF JPEG IMAGES

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

A Robust Image Watermarking Scheme using Image Moment Normalization

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Watermarking Moble Phone Color Images With Error Correction Codes

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Digital Image Watermarking Using DWT Based DCT Technique

Image Tamper Detection based on Edge Image and Chaotic Arnold Map

A wavelet-based watermarking for digital images of different size

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Robust DWT Based Technique for Digital Watermarking

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

An Improved Blind Watermarking Scheme in Wavelet Domain

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

Sign-up Sheet posted outside of my office HFH 1121

Digital Image Steganography Techniques: Case Study. Karnataka, India.

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

CHAPTER-5 WATERMARKING OF COLOR IMAGES

3D DWT-DCT and Logistic MAP Based Robust Watermarking for Medical Volume Data

QR Code Watermarking Algorithm based on Wavelet Transform

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

Improved Qualitative Color Image Steganography Based on DWT

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

A Semi-Fragile Watermarking Scheme for Color Image Authentication

A Fragile Watermarking Scheme for Color Image Authentication

Robust Digital Image Watermarking based on complex wavelet transform

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Transparent Data Hiding for True Color Images

A Flexible Scheme of Self Recovery for Digital Image Protection

A Reversible Data Hiding Scheme for BTC- Compressed Images

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Comparison of wavelet based watermarking techniques Using SVD

Attack Detection in Watermarked Images with PSNR and RGB Intensity

Patch-Based Color Image Denoising using efficient Pixel-Wise Weighting Techniques

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

A reversible data hiding based on adaptive prediction technique and histogram shifting

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

Rohit Chhabra 1, Dr. R R Sinha 2

Watermarking Attack (BOWS contest)

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

An Oblivious Image Watermarking Scheme Using Multiple Description Coding and Genetic Algorithm

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

Transcription:

Chaotic-Correlation Based Watermarking Scheme for Still Images E. Chrysochos 1, V. Fotopoulos 1, M. Xenos 1, M. Stork 2, A. N. Skodras 1, J. Hrusak 2 1 Digital Systems & Media Computing Laboratory, School of Science and Technology, Hellenic Open University, 13-15 Tsamadou st., GR-26222, Patras, Greece phone: + (30) 2610367535, fax: + (30) 2610367520 Email: {e.chrysochos, vfotop1, skodras, xenos}@eap.gr 2 Department of Applied Electronics and Telecommunications, University of West Bohemia P.O. Box 314, 30614 Plzen, Czech Republic Email: {hrusak, stork}@kae.zcu.cz Abstract In this work, a new blind watermarking scheme in frequency domain is presented. The proposed scheme is based on a chaotic function for embedding, and a correlation method for detection. Three-dimensional maps of PSNR and correlation are used for better selection of embedding parameters according to a quality threshold. The scheme shows increased robustness against JPEG compression and cropping. The watermark is also detectable after filtering attacks like low pass filtering, median filtering and Gaussian blur, noise attacks, as well as some geometrical attacks. 1 INTRODUCTION In recent years digital media have overcome analogue ones. Since playing records were substituted by Compact Disks the digital era has begun. Media industry, as expected, has turned its attention to acquiring the best digital technology to provide better quality products and distribute them world around. Digital era has brought many conveniences to consumers and media producers but some problems have risen too [1]. The bigger problem media industry faces today is copyright control, since it suffers from huge economic losses due to unauthorized copies. The distribution of media through internet, as well as the nature of digital data, facilitates unauthorized copy and distribution of proprietary media like pictures, songs or movies. Therefore media industry has turned to authentication and copyright protection as necessary practices [2]. The most common technique for authentication and copyright control is Digital Watermarking [3]. Digital Image Watermarking stands for embedding a signature signal, called watermark, in a digital image, in order to prove ownership, or check authenticity or integrity of a certain image. We refer to robust watermarking when the watermark is still detectable after various attacks (unintended or malicious), whereas we refer to fragile watermarking, when the slightest alteration of the image, would be noticeable in the context of the watermark. Robust watermarking is usually used for copyright control, whereas fragile watermarking is usually used for integrity check and authentication. One category of digital watermarking is based on chaos theory and two dimensional chaotic functions, known as chaotic maps. Voyatzis and Pitas [4] first introduced chaos theory in digital watermarking. Zhao et al [4] presented a watermarking algorithm in wavelet domain which used a chaotic map, called logistic map. The image is divided in non overlapping 8x8 blocks and some of them are selected to create a sub image. The selection of the blocks is based on the chaotic logistic map. The sub image is then transformed in the DWT domain where a watermark sequence, created also by the logistic map, is embedded. Yeh and Lee [5] proposed a block-based, fragile watermarking technique in spatial domain. An authentication signature, along with a relation signature, which is for recovery purposes, is embedded in the two least significant bits of each pixel, for every block. Toral automorphism is applied, in this case, in order to create block relations. Therefore recovery and authentication data (recovery and authentication signature), of each block can be spread to other blocks by using a chaotic map as a spreading function. Wu and Shih [7] proposed an algorithm based on a chaotic map and a reference register, for enlarging watermarking capacity, by breaking local spatial similarity and generating more significant coefficients in the frequency domain. In the proposed scheme a two dimensional chaotic map is applied to images creating scrambled images which are then transformed to frequency domain through DCT transform. A random generated sequence is embedded in some of the DCT coefficients. In order to decide which coefficients are more suitable for embedding, 3d maps of PSNR and correlation are used. Given a PSNR threshold, used as a quality

metric, the coefficients that give the maximum correlation are selected. For detection, a correlation method is used in order to decide if a test image is watermarked or not. The rest of this paper is organized as follows. In section 2.1, the chaotic function and its properties are described. In section 2.2 and 2.3, the proposed watermarking scheme, based on chaotic function and correlation is presented. In section 3 experimental results are presented, while conclusions are drawn in section 4. 2.2 EMBEDDING PROCEDURE Lena 1 iteration 2 iterations 2 PROPOSED IMAGE WATERMARKING SCHEME T iterations T-1 iterations 5 iterations 2.1 CHAOTIC FUNCTION Chaotic systems are deterministic systems (predictable if you have enough information) that are governed by non-linear dynamics. These systems show deterministic behaviour which is very sensitive to its initial conditions, in a way that the forthcoming results are uncorrelated and seem random. One category of chaotic systems is chaotic maps. A chaotic map, which can be considered a two dimension chaotic function, is also a tool that could relocate the pixels of an image and break spatial continuity. If we transform the resulting chaotic image in the frequency domain, the significant coefficients are highly increased in comparison with the respective transformed image as has been shown in [7]. Therefore the transformed chaotic image is richer in frequency content, a desirable property in watermarking, as there are more suitable candidate coefficients for manipulation and information embedding. Voyatzis and Pitas in [4] presented a watermarking scheme based on a two dimensional chaotic function, called toral automorphism. This cyclic chaotic function, each time applied on a square image rearranges its pixels. After applied T times, where T is the period of the function, the pixels are found in their initial location. If (x, y) are the initial coordinates of a pixel, the outcome coordinates of the chaotic function (x, y ) are given by x' 1 = y' λ 1 x mod N λ+ 1 y (1) Where N denotes the width of the image and λ is an integer parameter that affects the period T of the chaotic function. The effect of the chaotic map (1) on Lena image is shown in figure 1. After T iterations, where T depends on image size, the image is restored to its original status. Figure 1 Application of chaotic map on Lena image In order to embed the information in the host image certain parameters must be specified. These parameters are embedded in one integer number called key. The key consists of five parts. The first part denotes the starting coefficient (start) from where the embedding procedure begins. The second part denotes the total number of DCT coefficients to be altered (N). The third part denotes the seed, an integer from which the random sequence derives. The fourth part (two digits N2, N3) denotes the length of the second and third part respectively, while the fifth part (iter) determines how many times the chaotic function is applied on the image, before the embedding procedure takes place. The strength of the embedding procedure (a), as well as the PSNR threshold (PSNRthres) considered acceptable, are needed. The steps of the embedding algorithm for a grayscale image are the following: a. A random sequence (w) is generated according to seed. The sequence consists of N random numbers which are normally distributed with zero mean and unit variance. b. The period T of the chaotic function for the particular image is calculated. c. The chaotic function is applied T / iter times to the host image creating the chaotic image. The chaotic image seems more like noise, as shown in figure 1. d. The DCT coefficients of the chaotic image, as a whole, are calculated formulating the respective DCT matrix. e. A vector is produced by zigzag scanning the DCT matrix. f. Each DCT coefficient from start to start+n-1 is altered according to the following rule: C = C+ a w C (2) where C denotes the altered coefficient, C denotes the initial coefficient, and w denotes the respective element of the random sequence.

g. The altered coefficients form the watermarked DCT matrix by inverse zigzag scanning. h. The watermarked chaotic image is generated by applying inverse DCT function on the watermarked DCT matrix. i. The chaotic function is applied T T / iter times to the watermarked chaotic image, producing the final watermarked image. In order to achieve higher correlation factor, i.e. higher robustness to attacks, the above procedure is repeated many times for different start and N parameters. For each combination of start and N, PSNR and correlation values are calculated producing respective three-dimensional maps, as shown in figures 2 and 3. correlation factor with respect to PSNRthres. The parameters used for embedding generate the key. The watermarking algorithm described, could also be applied to color pictures. The only difference is that instead of gray scale intensity values, some or all of the other color components are used [8]. Therefore the watermark could be embedded more than once, achieving higher robustness. 2.3 WATERMARK EXTRACTION In order to detect whether an image is watermarked or not, the key, used in the embedding procedure is required. The steps, of the detecting algorithm in a grayscale image are the following: a. Parameters start, N, seed and iter are calculated by key as following: = ( key mod100)div100 (3) N 2 N 3 = ( key mod100)div10 (4) N2 + N3 + 3 start = key div(10 ) (5) N2 + N3 + 3 rem1 = key mod(10 ) (6) N 3 +3 N = rem1div(10 ) (7) N 3 +3 rem2 = rem1mod(10 ) (8) seed = rem2div1000 (9) iter = key mod10 (10) Figure 2 Application of chaotic map on Lena image for strength=0,5 b. The period (T) of the chaotic function for the specified image is calculated. c. The chaotic image is generated by applying the chaotic function T / iter times to the initial image. d. The DCT coefficients of the chaotic image are calculated, as a whole, formulating the respective DCT matrix e. A vector is produced by zigzag scanning the DCT matrix. f. According to seed a random sequence (w) is generated. g. The correlation between the random sequence and the respective coefficients of the DCT vector is calculated. h. If the output is higher than a predefined threshold (corthres), the image is considered to be watermarked; otherwise the image is considered not watermarked. 3 EXPERIMENTAL RESULTS Figure 3 3D correlation map with regard to N and start for strength=0,5 For the final embedding, the better combination of start and N according to PSNR threshold is selected. That is the values of start and N that give higher The robustness of the watermark depends on the strength parameter (strength) used during the embedding procedure. As the strength increases the robustness of the scheme raises respectively. Nevertheless, the quality of the watermarked image is conversely proportional to strength parameter and robustness.

The correlation method is based on the fact that the sequence (w) generated by seed, is normally distributed with zero mean and unit variance. The correlation factor varies depending on the starting coefficient (start) and the number of coefficients affected (N). In our experiments the acceptable PSNR threshold (PSNTthres) was set to 40, while the correlation threshold (corthres) which determines whether an image is watermarked or not was set to 4. Strength parameter for the embedding procedure was set to 0,5 and a series of images were used for experimentation. For most images the results were similar, therefore due to limited space, only the results regarding Lena are presented in this work, for comparisons with other methods. Three-dimensional maps for PSNR and correlation values, with regard to N and start, were generated for Lena image as shown in figure 2 and 3 respectively. With respect to PSNTthres the automated scheme selected parameters N=1000, start=11002 as optimal for embedding, achieving correlation factor of 15,098 with PSNR value of 40,00dB. The proposed chaotic-correlation based scheme shows robustness against filtering attacks like low pass filtering, median filtering and Gaussian blur. The watermark was also detectable after JPEG attack, as low as 5% quality, as depicted in figure 4b. In Lena s 512x512 case that corresponds to a compression ratio of 46:1. The watermark was also not compromised by noise attacks like dust and speckles, Gaussian and uniform noise. The scheme exhibits increased robustness against cropping attack. The watermark was detectable after 75% of the image was cropped, as showed in figure 4a. The scheme also shows robustness against geometrical attacks like aspect ratio changes, resizing and rotation, given image synchronization. 20 (with PSNR=35,24dB), opposed to JPEG compression with quality factor 5 and PSNR=40,00dB, presented in this work. 4 CONCLUSIONS A robust watermarking scheme for images, in DCT domain, is presented. The embedding procedure is based on a chaotic function, while the detection of the watermark is based on correlation comparison. In order to select the optimum parameters of start and N, three-dimensional maps of PSNR and correlation are used. The proposed scheme shows robustness against filtering attacks like low pass filtering, median filtering and Gaussian blur. The watermark was detectable after JPEG compression, as low as 5% quality, and was not compromised by noise attacks like dust and speckles, Gaussian and uniform noise. The watermark was also robust against up to 75% cropping. The scheme shows robustness to geometrical attacks like aspect ratio changes, resizing and rotation, given image synchronization. ACKNOWLEDGEMENTS This work was funded by the European Union - European Social Fund (75%), the Greek Government - Ministry of Development - General Secretariat for Research and Technology (25%) and the Private Sector in the frames of the European Competitiveness Programme (Third Community Support Framework - Measure 8.3 - programme ΠΕΝΕ - contract no.03ε 832). It was also funded by the General Secretariat for Research and Technology in the frames of the Czech-Greece Joint Research and Technology Programmes 2005-2007 (grant 4.3.6.1γ-220). REFERENCES a) Cropping attack 75% Correlation = 4,05 b) JPEG attack with quality factor=5 Correlation = 4,138 Figure 4 Attacks against watermarked Lena image The proposed scheme is more robust compared to [6] and [4], as [6] is a fragile implementation and [4] is based on subjective visual observation for detection, and stands up to 6:1 JPEG compression. The method of [5] seems to be more robust against geometrical attacks (due to wavelets features) but no explicit measurements for compression or filtering attacks are mentioned. The method of [7] is outperformed, as it merely withstands JPEG compression down to quality [1] Berghel H. and O Gorman L., Protecting ownership rights through digital watermarking, IEEE Computer Mag, pp.101-103, July 1996. [2] Fotopoulos V. and Skodras A., Digital image watermarking: An overview, in EURASIP Newsletter, ISSN 1687-1421, Vol. 14, No. 4, Dec. 2003, pp. 10-19, 2003. [3] Cox J. and Miller L., The first 50 Years of electronic watermarking, EURASIP Journal on Apllied Signal Processing, pp. 126-132, Feb 2002. [4] Voyatzis G. and Pitas I., Applications of toral automorphisms in image watermarking, in Proc IEEE International Conf. on Image Processing, Lausanne, Switzerland, Sep 1996, vol2, pp.237-240. [5] Zhao D., Guanrong C. and Wenbo L., A chaosbased robust wavelet-domain watermarking algorithm, Chaos, Solitons and Fractals, vol. 22, pp. 47-54, 2004.

[6] Yeh G.H. and Lee G.C., Toral fragile watermarking for localizing and recovering tampered image, in IEEE Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong, Dec 2005, pp. 321-324. [7] Wu, Y.T. and Shih, F.Y. Digital watermarking based on chaotic map and reference register, Pattern Recognition, vol.40, no. 12, pp. 3753-3763, Dec 2007. [8] Gilani S.A.M., Kostopoulos I. and Skodras A., Color image-adaptive watermarking, in Proc. 14th Int. Conf. on Digital Signal Processing (DSP2002), Vol. 2, pp. 721-724, Santorini, Greece, 1-3 July 2002.