27th IEEE International Conference on Consumer Electronics (ICCE 09), Las Vegas, USA, 10-14 January, 2009

Hiding Depth Map of an Object in its 2D Image: Reversible Watermarking for 3D Cameras Asifullah Khan, M. Tariq Mahmood, Asad Ali, Imran Usman, and Tae-Sun Choi*, Senior Member, IEEE

Abstract—3D cameras are capable of capturing image and depth map of an object simultaneously. We propose a method to hide depth map, as a watermark, in its corresponding 2D image. 3D cameras enabled with this functionality could serve two purposes; protection of the captured image and secure transmission of its depth map.

I. INTRODUCTION 3D cameras with depth sensing capabilities are becoming more and more popular and have wide range of applications in consumer electronics community. Web-conferencing, 3D gaming, objects tracking, face detection & tracking, automotive safety, mobile phones, robotics and medical devices are potential areas. These cameras compute depth using various techniques such as time of flight, stereo or triangulation, and monocular scanerless[1]. Embedding of depth map in its 2D image could be highly desirable in many scenarios. An example is the secure communication of classified 3D shape information related to injuries and skin conditions for the purpose of online negotiating interpretation and legal significance [2]. This type of secure transmission of depth information is priceless for forensic pathologists. Likewise, depth map information is very valuable for microsurgery and DNA studies [3]. As far as military applications are concerned, depth information corresponding to the 2D image could be highly confidential and would certainly require secure transmission. However, if it is intelligently embedded and secured through secret keys, no unauthorized person could extract it. After receiving the 2D image, depth map can be extracted and the cover image restored by an authorized person without compromising on its quality. In this paper, we introduce the concept of variable threshold based reversible watermarking for embedding depth map into its 2D image. Unlike conventional watermarking techniques, through reversible watermarking, we can recover original image after extracting watermark. II. REVIEW Depth sensing abilities distinguish 3D cameras from traditional image capturing devices. Broadly, there are two types of depth estimation methods, namely, passive and active. In active techniques, such as time of flight, stereo or This work was supported by the Higher Education Commission of Pakistan under the indigenous PhD scholarship program (17-5-1(Cu204)/HEC/Sch/2004) and Korea Science and Engineering Foundation (KOSEF) grant funded by the Korean government (MOST) (No. R01-2007000-20227-0).

triangulation, light, x-ray or laser are projected. While in passive methods, simply the reflection of light rays is captured. Currently, the active devices are widely used because they achieve high resolution and accuracy [1]. However, these devices are expensive and require high computational time as compared to passive devices [4]. In digital watermarking applications related to multimedia archives, military and medical image processing; only reversible degradation of the original data is favorable. The distortions introduced by conventional watermarking approaches in applications as listed above, can be eradicated by using a reversible or lossless watermarking scheme. Recently, the work by Xuan et al. [5] is based on reversible embedding of the watermark bits into the middle and high frequency integer wavelet coefficients. III. METHOD The proposed data hiding scheme utilizes integer wavelet transform, variable threshold for selective embedding, and histogram modification to avoid possible overflow. To increase bias between 0 and 1 and to avoid round-off error, we use the second generation wavelet transform, such as IDWT [6]. This wavelet transform maps integer to integer and has been adopted by JPEG2000 as well. Embedding is performed only in LH, HL, and HH, subbands. We perform pre-processing before embedding to avoid possible overflow. In order to further enhance imperceptibility of the marked image, we propose the use of variable threshold. We believe that the distribution of HH subband encompasses more high frequency content as compared to the LH and HL subbands. Even, for some images, there might be fair enough difference of frequency content between LH and HL subbands. Embedding is performed in a coefficient if its magnitude is less than the threshold value set for its respective subband. Else, embedding is not performed; however, we do need to push the non-selected coefficients away from the selected ones in terms of magnitude. Let X denotes the frequency domain coefficient in question, T denotes threshold, and b is the bit to be embedded. We can thus mathematically summarize the embedding strategy as:

⎧ 2 ⋅ X + b, if X < T ⎫ ⎪ q ⎪ ⎪ ⎪ X′ = ⎨ X +T , if X ≥ T q q ⎬ ⎪ ⎪ ⎪ X − (T − 1), if X ≤ −T ⎪ q q ⎭ ⎩

(1)

where X ′ represents the modified coefficient, and q=1,2,3 for LH, HL, and HH subbands respectively.The subband, where there is large high-frequency content, embedding of the bits is

encouraged. Therefore, we set high thresholds for subbands having large high-frequency content. This is the essence of our technique for improving the quality of the marked image. Similarly, the extraction stage could be mathematically described as such:

⎧ ′ ′ ⎪ ⎣⎢ X / 2 ⎦⎥ , if − 2Tq + 1 < X < 2Tq ⎪ X = ⎨ X ′−T , if X ′ ≥ 2T q q ⎪ ⎪ X ′ + (T − 1), if X ′ ≤ −2T + 1 q q ⎩

⎫ ⎪ ⎪ ⎬ ⎪ ⎪ ⎭

then easily extract and use the depth map, and recover the image. TABLE I.

PERFORMANCE COMPARISONS

Fixed Threshold PNSR BPP 39.37714 0.400356 37.22321 0.546167 36.04077 0.634967 35.37958 0.687978 34.97053 0.717611 34.84122 0.732722 34.67041 0.740378 34.56637 0.744344 34.55919 0.745944 34.38894 0.746622 34.31683 0.746656

(2)

where symbol ⎢⎣ p ⎦⎥ provides the largest integer value smaller than p. By applying formula (2), we can restore the frequency coefficients to their original values.

Variable Threshold PNSR BPP 42.871674 0.269867 39.238045 0.443700 37.24642 0.555900 36.051215 0.636100 35.374022 0.688133 35.033487 0.717622 34.841083 0.732722 34.670175 0.740378 34.55912 0.745944 34.389006 0.746622 34.316735 0.746656

IV. RESULTS For experimental purpose, we obtained a sequence of 60 images of TFT-LCD by varying distance of camera lens and its depth map is generated by applying Shape From Focus (SFF) method described in [7]. We applied reversible watermarking method described in section-III to secretly hide the depth map into its corresponding image. Fig. 1. shows depth map and the watermarked image. It can be observed that the distortion in watermarked image is hardly noticeable by a human eye. The total amount of watermark bits including the depth map and auxiliary information; such as histogram preprocessing related, is 41552. The size of the cover image is 300×300 in this case. Table I compares the performance of proposed technique with fixed threshold method [5]. It can be observed that the proposed method provides better imperceptibility for the same bit per pixel (bpp) compared to fixed threshold approach. The watermark (depth map) is extracted from the watermarked image. The depth map after extraction is exactly the same as was originally embedded. Figure 2(a) shows the restored image after watermark extraction has been performed. The restored image is the same as the original image. This fact is also indicated by the difference image (figure 2(b)), which is obtained by subtracting the original image from the restored image.

(a) (b) Fig. 2: (a) Restored TFT-LCD color filtor image (b) Difference image.

V. CONCLUSION In this paper, we have introduced the concept of embedding depth map of an object in its 2D image using reversible watermarking. The proposed method is fast, simple and compatible with JPEG 2000 and therefore, it could easily be employed in 3D cameras. REFERENCE [1]

[2]

[3]

[4]

[5]

(a)

(b)

Fig. 1: (a) depth map of TFT-LCD color filter. (b) Watermarked TFT-LCD color filter image. Our watermark embedding and extraction methods are simple and computationally efficient. The embedding module can be employed in the form of a chip in a 3D camera. Similarly, a decoder module can be employed at the receiver side to extract the depth map after transmission [8]. The authorized person knowing the secret keys can

[6]

[7]

[8]

G. Yahav, G. J. Iddan, and D. Mandelboum, “3D Imaging Camera for Gaming Application,” Intl Conference on Consumer Electronics, 2007. ICCE 2007. Digest of Technical Papers. 2007 pp. 1 – 2. W. Schweitzer, M. Häusler, W. Bär and M. Schaepman, “Evaluation of 3D surface scanners for skin documentation in forensic medicine: comparison of benchmark surfaces,” BMC Medical Imaging, vol. 7, no. 1, 2007. K. Ohba, J. C. Pedraza, O.K. Tanie, M. tsuji and S. Yamada, “ Microscopic vision system with all-in-focus and depth images,” Machine Vision and Applications, vol. 15, no. 2, pp. 56-62, 2003. A. S. Malik and T. S. Choi. “Application of Passive Techniques for Three Dimensional Cameras,” IEEE Trans. Consumer Electronics, vol. 53, no. 2, pp. 258-264, 2007. G. Xuan, Q. Y. Shi, C. Yang, Y. Zhen, D. Zou. Peiqi Chai and P. Chai, “Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique,” IEEE International Conference on Multimedia and Expo., July 2005, pp. 1520-1523. R. Calderbank, I. Daubechies, W. Sweldens, B. L. Yeo, “Wavelet transforms that map integers to integers,” Appl. Comput. Harmonic Anal., vol. 5, no. 3, pp. 332-369, 1998. M. T. Mahmood, W. J. Choi and T. S. Choi, “DCT and PCA based method for shape from focus,” ICCSA 2008, part II LNCS, vol. 5073 pp. 1025–1034, 2008. A. Khan, S. F. Tahir, A. Majid, and Tae-Sun Choi, Machine Learning based Adaptive Watermark Decoding in View of an Anticipated Attack, Pattern Recognition, Elsevier Science, 41 (2008) 2594-2610.

Hiding Depth Map of an Object in its 2D Image ...

Web-conferencing, 3D gaming, objects tracking, face detection & tracking, automotive safety, mobile phones, robotics and medical devices are potential areas.

100KB Sizes 0 Downloads 134 Views

Recommend Documents

Separable Reversible Data Hiding in Encrypted Image - International ...
issues, general overview of cryptography approaches and about the different steganographic algorithms like Least. Significant Bit (LSB) algorithm. It also compares those algorithms in means of speed, accuracy and security. Keywords: Data hiding, Data

Separable Reversible Data Hiding in Encrypted Image - International ...
It also compares those algorithms in means of speed, accuracy and security. Keywords: ... reversible data hiding technique is in IPR protection, authentication, military, medical and law .... Engineering Department for their support and help.

An Investigation into Face Recognition Through Depth Map Slicing
Sep 16, 2005 - Face Recognition, Depth Map, Local Binary Pattern, Discrete Wavelet ..... Other techniques, outlined below, can be used to reduce this. The first ...

Robust Semi-Automatic Depth Map Generation in Unconstrained ...
Robust Semi-Automatic Depth Map Generation in ... ideo Sequences for 2D to Stereoscopic 3D Conversion.pdf. Robust Semi-Automatic Depth Map Generation ...

Image Transformation for Object Tracking in High ...
and a wireless data transmitter walks across the field of view of a camera. In case of a ..... Computer Vision, Cambridge Univ. Press, March 2004. [5] S. Park and ...

Reversible Image Data Hiding With Contrast Enhancement ieee.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Reversible ...

Make a map with image data
An online HTML version of this tutorial is available here in the Google Maps ... Now you're ready to upload data to Google Maps Engine! 2. Add attributions.

Unsupervised Image Categorization and Object ...
cal proportions of visual words and have shown promising results. In this paper we will ... Analysis (PLSA)[11], were originally used in the text un- derstanding ...

Chinua.Achebe, "An Image of Africa: Racism in ...
Jan 9, 2008 - superstitions of an African tribe. 1. I propose to draw from these rather trivial encounters rather heavy conclusions which at first .... you just the faintest trace of a response to the terrible frankness of that noise, a dim suspicion

Bundled Depth-Map Merging for Multi-View Stereo
Depth-map merging is one typical technique category for ... model is generated from the optimized 3D point cloud using ..... computer vision, chapter 13.

2D Image Morphing Using Pixels Based Color Transition.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 2D Image ...

How the Object of Affect Guides Its Impact - CiteSeerX
... Charlottesville, VA 22904, USA. Email: [email protected] ...... low, but as a little (inedible) cloud (Mischel, Shoda, &. Rodriguez, 1989). And in a related way, ...

How the Object of Affect Guides Its Impact - CiteSeerX
semantically and evaluatively-linked concepts, thereby facilitat- ... sociated concepts. ...... Martin, L. L., Achee, J. W., Ward, D. W., & Wyer, R. S. (1993). Mood as.

Depth of Knowledge in Music
Jan 30, 2009 - Measures the degree to which the knowledge ... for Science Education. Several .... balance, and expression without the aid of a teacher. 19 ...

Bundled Depth-Map Merging for Multi-View Stereo
Although the back-end techniques are al- ready used in some other .... intra-line results by dynamic programming within the top-. K candidates. This scan-line ...

Bundled Depth-Map Merging for Multi-View Stereo - Semantic Scholar
without loss of result accuracy. To improve convergence of the minimization, the nor- mal direction can be initialized with a rough normal es- timation methods as [12, 13]. This paper adopts the grid search method suggested in [13]. Suppose n0 = −â

PDF PowerShell in Depth: An administrator's guide Full ...
PDF PowerShell in Depth: An administrator's ... world class PowerShell experts * Shows how to solve real-world administrative problems Full description. Related ... Mastering Hyper-V 2012 R2 with System Center and Windows Azure.