FRAGILE WATERMARKING USING SUBBAND CODING

Similar documents
Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Robust Image Watermarking based on DCT-DWT- SVD Method

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Image Authentication and Recovery Scheme Based on Watermarking Technique

Data Hiding in Video

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

Watermarking Moble Phone Color Images With Error Correction Codes

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Implementation of ContourLet Transform For Copyright Protection of Color Images

Feature Based Watermarking Algorithm by Adopting Arnold Transform

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Attack Detection in Watermarked Images with PSNR and RGB Intensity

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A blind Wavelet-Based Digital Watermarking for Video

A Robust Image Hiding Method Using Wavelet Technique *

Speech Modulation for Image Watermarking

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Tracing Watermarking for Multimedia Communication Quality Assessment

Image Error Concealment Based on Watermarking

Towards a Telltale Watermarking Technique for Tamper-Proofing

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Multimedia Security: So What s the Big Deal?

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

A Semi-Fragile Watermarking Scheme for Color Image Authentication

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

arxiv: v1 [cs.cr] 31 Dec 2018

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

Combined Hashing/Watermarking Method for Image Authentication

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Robust DWT Based Technique for Digital Watermarking

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Enhancing the Image Compression Rate Using Steganography

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

DATA hiding [1] and watermarking in digital images

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Robust biometric image watermarking for fingerprint and face template protection

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Keywords: Semi-fragile watermarking, ROI, JPEG2000 compression, content integrity verification, HVS-based perceptual models

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Digital watermarking techniques for JPEG2000 scalable image coding

Comparison of DWT-CRT And TLDCT-CRT Methods In Digital Watermarking

Adaptive Quantization for Video Compression in Frequency Domain

A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

Improved Qualitative Color Image Steganography Based on DWT

A Blind Wavelet-Based Digital Watermarking for Video

A Wavelet-Based Watermarking for Still Images

Fingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication

Implementation and Comparison of Watermarking Algorithms using DWT

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Robust copyright protection scheme for digital images using the low-band characteristic

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Image Steganography (cont.)

Hiding Fingerprint Minutiae in Images

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

EXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

Reversible Authentication Watermark for Image

Digital Watermarking Using 2-DCT

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Quality Estimation of Video Transmitted over an Additive WGN Channel based on Digital Watermarking and Wavelet Transform

Multiple Binary Images Watermarking in Spatial and Frequency Domains

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

Digital Watermarking with Copyright Authentication for Image Communication

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Multilayer Data Embedding Using Reduced Difference Expansion

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Frequency Band Coding Mode Selection for Key Frames of Wyner-Ziv Video Coding

A New Color Image Watermarking Frame through Dwt and Alpha Channel

Current classification and introduction of Watermarking Techniques in Digital Images

Wavelet Transform (WT) & JPEG-2000

Quality Access Control of a Compressed Gray Scale Image

QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD

Transcription:

ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING Abstract The paper deals with a new technique of fragile image watermarking. Proposed technique exploits inter-subband dependencies in order to minimize the influence of inserted watermark on the host image quality. Using the unique watermark based on the low-frequency subband, proposed scheme is resistant against attacks based on series of images analysis. Tampering detection ability of the proposed technique has been examined for a several types of image manipulation. keywords : fragile watermarking, subband coding, tamper proofing 1 INTRODUCTION Digital watermarking is an adaptation of the watermark security technique well known from the paper documents, bills and money. As in the paper world, this technique consist of placing some additional information to the original data in a way, that in normal conditions changes of data are imperceptible. Only in specific conditions by using the specialized software the embedded watermark can be visualized. Good example of using embedding scheme comes from Divx system. Each player of that system embedded a unique watermark that supported transaction tracking intended to deter piracy. [Cox02] Second area of interests is data authentication which has applicability in law, commerce and journalism. Some examples are [Lin99]: watermarking of databases resources to detect any tampering trials; ensuring news agencies that presented material is not fabricated or edited to falsify events (so called trustworthy camera ); courtroom evidence (for example shields number photo authentication). Last but not least, watermarking has been used not only for the security purposes, like authenticity verification or intellectual rights proof but also for such far from original concept solutions like error detection. [Chen01] and [Robi02] reported that by embedding 1/6 02-09-30

R. Świerczyński a watermark on the quantized DCT coefficients and examining its integrity on the decoder side, the error detection capability of video decoders is significantly increased compared to widely used syntax-based error detection schemes. Depending on the type of application, the watermark has to be robust or fragile. When watermark is resist to manipulations of the data (for example lossy compression) it is called robust and well suited for the copyright protection applications. [Liu02, Srik01] On the other hand - when authenticity of given data is a prime question the watermark should act in an opposite way. Any manipulation of original data should destroy watermarked signal. Such watermark is called fragile and is expected to have ability to show not only that the tampering process has occurred, but also where. There exist also so called semi-fragile watermarking techniques, where some manipulations are allowed (for example JPEG compression to a predefined quality factor [Delp00, Lin00]) but other data manipulations are detected as tampering. A good overview of all areas of digital watermarking is presented in [Barn00, Peti99,Voya00]. 2 PROPOSED TECHNIQUE 2.1 Subband coding using inter-subband dependencies Subband coding (SBC) is a well established technique used in a variety of applications. The basic idea of SBC is to split up the two-dimensional frequency band of an image into subsampled channels. It is well known that most of the input image energy is concentrated in the low-frequency band ( subband). The high-frequency bands exhibit low energy and mostly small values associated with pixels in corresponding sub-images. Therefore it is a very good place to embed a watermark its influence on image quality is relatively small. Moreover since almost all nowadays applications use mentioned above properties for compression by removing the higher frequency information the higher subbands are ideally suited for inserting a fragile watermark. It is also well known that there exist a some kind of dependency between subbands. Usually the high energy pixels in higher subbands are present in areas where in subband rapid changes occur. In some previous works [Dom94, Świe97] we have presented that affecting these pixels may introduce a visible artifacts in decoded image. Thus we use a simple method of detecting such active pixels which can be omitted in watermarking process. We define a pixel at position (x,y) to be active if: max ( I ( x, y) I ( x, y 1), I ( x, y) I ( x 1, y), I ( x, y) I ( x 1, y 1) ) T > where I (, ) is the intensity of a pixel in a low-frequency subimage at given position and T is a predefined threshold. Figure 1 shows a quality of reconstructed, watermarked image for a given threshold for boats and clown static images and a frame from flower garden sequence. See also figure 2 showing percentage of changed i.e. watermarked points in HH subimage versus the threshold for the same images. From the two figures one can see that threshold values in range 60-80 give over 90% percent of watermarked pixels and quality over 48 db. Figure 3 shows the active point of the test image flower garden and T=75. One can see that the edges are well protected against changing.

Fragile watermarking using subband coding 100 Watermarked [%] 90 80 70 60 50 Flower Boats Clown 40 30 52 5 15 25 35 45 55 65 75 85 95 105 115 125 135 145 155 165 175 Threshold PSNR [db] Fig. 1 Percentage of watermarked points versus threshold T 51,5 51 50,5 50 49,5 Flower Boats Clown 49 48,5 48 5 15 25 35 45 55 65 75 85 95 105 115 125 135 145 155 165 175 Threshold Fig. 2 Quality of watermarked image versus the threshold T Fig. 3 Active pixels for flower garden and T=75 A method based on activity considerations is also presented in [Yama01], but the authors have embedded watermark into subband, obtaining robust watermarking scheme. Another way of choosing pixels for embedding (in this case randomly) in the higher subbands is presented in [Kund99].

R. Świerczyński 2.2 Watermarking The proposed method consist of the following steps. First the host image is divided into four subbands, using perfect reconstruction Haar filter bank. These filters are usually not used in subband coding area, since they produce a strong aliasing effect in case of compression. Since in this solution compression is not considered, the high frequency information is preserved, and as a result aliasing is not present. Next the activity of the pixels in the subband is examined, as described in previous section. The non-active pixels in higher subband are watermarked. In experiments we have used a simple LSB changing method, i.e. each LSB of the non-active pixel in higher subband takes an LSB value of the subband pixel located on the same position. Since LSB plane of the subband is different for each image, this proposed scheme is resistant against attacks based on series of images analysis. By omitting some pixels in embedding process we do not provide tampering detection ability for whole image. But looking at picture 3, one can see that the non-protected pixels do not gather in any larger objects, since any practical manipulation will still be detected. An example is shown on figure 4. The original frame from test sequence has been manipulated by: erasing one of the person; copying the second person to different position; adding falsified date of creation. Points detected as changed are shown in figure 5 (left). These points are nonlinear filtered to obtain more compact areas and superimposed into host image (fig. 5 right). All manipulations has been detected. Fig. 4 Original (left) and tampered (right) frame from flower garden sequence

Fragile watermarking using subband coding Fig. 5 Tampered points (left) and tampering detection result (right) 3 CONCLUSIONS This paper presents a new method of fragile watermarking of images. Proposed method is based on subband technique. It concerns the subbands properties in such way, that errors introduced by watermarking process are minimized. It is also show by example, that proposed method has a good ability of detecting which areas of original image has been tampered. By using unique watermark this technique is also resistant into series of images analysis attack. REFERENCES [Barn00] M. Barni, F. Bartolini, A. Piva, Digital watermarking of visual data: state of the art and new trends, Proceedings of the Eusipco, Tampere 2000, pp. 1657-1664 [Chen01] M. Chen, Y. He, R. L. Lagendijk, Error detection by fragile watermarking, Proceedings of the Picture Coding Symposium 2001, Seoul, Korea, pp. 287-290; [Cox02] I. Cox, M. Miller, The first 50 years of electronic watermarking, Eurasip Journal on Applied Signal Processing, vol 2002, no. 2, Feb. 2002, pp. 126-132; [Delp00] E. Lin, Ch. Podlichuk, E. Delp, Detection of image alternations using semi-fragile watermarks, Proceedings of the SPIE Int. Conf. on Security and Watermarking of Multimedia Content II, vol. 3971, San Jose, Jan 2000; [Dom94] M. Domański, R. Świerczyński, Subband coding of images using hierarchical quantization, Proceedings of the Eusipco 1994, Signal Processing VII: Theories and Applications, 1994, pp. 1218 1221; [Kund99] D. Kundur, D. Hatzinakos, Digital watermarking for telltale tamper proofing and authentication, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, vol. 87, no. 7, July 1999, pp. 1167-1180;

R. Świerczyński [Lin99] E. Lin, E. Delp, A review of fragile image watermarking, Proceedings of Multimedia and Security Workshop (ACM Multimedia 99), Orlando 1999, pp. 25-29; [Lin00] Ch-Y. Lin, S-F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, Proceedings of the SPIE Int. Conf. on Security and Watermarking of Multimedia Content II, vol. 3971, San Jose, Jan 2000, pp. 140-151; [Liu02] R. Liu, T. Tan, An SVD-based watermark scheme for protecting rightful ownership, IEEE Transactions on Multimedia, vol. 4, no.1, March 2002, pp. 121-128; [Peti99] F. Petitcolas, R. Anderson, M. Kuhn, Information hiding a survey, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, vol. 87, no. 7, July 1999, pp. 102-1078; [Robi02] D. Robie, R. Mersereau, Video error correction using steganography, Eurasip Journal on Applied Signal Processing, vol 2002, no. 2, Feb. 2002, pp. 164-173; [Srik01] R. Srikumar, C. Malarvizhi, Strong encryption using steganography and digital watermarking, Proceedings of the Picture Coding Symposium 2001, Seoul, Korea, pp. 425-428; [Świe97] R. Świerczyński, Efficient techniques of subband image coding (in polish), Ph.D. Thesis, Poznań University of Technology, 1997; [Voya00] G. Voyatzis, I. Pitas, Image watermarking for copyright protection and authentication, Handbook of Image and Video Processing (ed. A. Bovik), Academic Press 2000, pp. 733-745; [Yama01] T. Yamada, T. Onuki, M. Hasegawa, S. Kato, Study on digital watermarking method for still images using wavelet transform, Proceedings of the Picture Coding Symposium 2001, Seoul, Korea, pp. 109-112;