2007 IEEE International Symposium on Signal Processing and Information Technology

A Robust High Capacity Watermarking Based on DCT and Spread Spectrum Nasrollah Moghaddam Charkari, Mohammad Ali Zare Chahooki Computer Science, Department Faculty of Engineering, Tarbiat Modares University. Tehran, P. 0. Box: 14115-143 I. R. Iran. [email protected] . ir, mo_zare @modares.ac.ir Abstract- Digital watermarking defined as invisible information hiding in a digital medium such as image, video, or audio mainlyfor ownership proving or information transmission. Watermarking is generally carried out in two forms namely spatial domain and

frequency domain. Some algorithms require original image for extracting. There are other types of algorithm, called blind algorithms, which do not require any original image for extracting. In this paper, we apply blind algorithm to embed a high volume of hidden information by DCT method. Moreover, in order to increase the robustness we use spread spectrum to embed hidden information within DCT coefficients, where, the visibility of the image is ideally maintained. In order to demonstrate the robustness of the method against some common image processing operations such as compression, change in brightness and contrast, addition of noise, sharpening, blurring, filtering and etc, we have used Stirmark benchmark. In comparison with other researches the results show the validity of the method [4, 5, 8].

we are able to embed a high volume of information and blind recovery. Taking use of spread spectrum entails robustness and its combination with DCT frequency domain increases the robustness of the method. This method is of a proper acceleration and high visibility. Section 2 offers the method for embedding a message, t of for ectin message Section gives section 3 gives an account of recovery, section 4 gives the experimental results and an evaluation of the method; and finally section 5 includes conclusion and further research. 3

4

2. DATA EMBEDDING M

We suppose M as the message for embedding, then:

M =

Where M

w 1 . . MLength I1 . . Mwidth J (1) {O,1}, MLength is the message

length and

Keywords- Watermarking; Data hiding; Image processing; Spread spectrum

MWldth is the message width respectively.

1. INTRODUCTION

H = IH j l < i < HLength l < j < HWi. t (2) WhileHj E {O,1,...,255}, HLength is the image length and H the width of image.

Watermarking is simply the embedding of a message in a digital medium to prove ownership of the medium or hidden transmission of data by it. In this direction, the media such as image, video and audio may be used. In an initial classification, watermarking methods are classified into two parts namely those based on spatial domain [1] and those based on frequency domain [4]. The information embedded in an image should be properly recovered after a series of attacks such as JPEG compression, transmission, rotation, scaling, digital- analog conversion, and the vice versa i.e., printing, scanning, cropping, different filtering operations such as median, mean, high-pass and low-pass, addition of noise etc. The objective, in this research, is to provide a robust system to embed and recover the information in the frequency domain. In this method, first the DCT components are extracted and the hidden information are then embedded in frequency domain spectrum in the form of binary images and based on a spread spectrum technique. Finally, the watermarked image shall be obtained by conversion of frequency domain to spatial domain, The fact that distinguishes the above-said method from the other existing DCT methods is the use of the spread spectrumst and Hadamard Matrix to provide the spectrum. In this case,

The original host image considered as H:

Width

The original image is divided in to blocks of N x N size. The message image is also converted into the blocks with proper sizes in a way that the number of the blocks obtained from the message image should be equal to that of the blocks obtained from the original image. BH is the set of blocks obtained from the original image and BM is the blocks obtained from the image of message. When the original image and the image of message are divided into equal numbers of blocks, each block of message shall be embedded in a block of the original image. The embedding process made by spread spectrum method [2] then, a one-by- one correspondence shall be established between BH and BM sets.

We embed the block No. s of the message in the block No. image; as the embedding is made in DCT coefficients, DCT conversion is made on the block No. t of the image and the coefficients are placed in matrix. Hence, matrix TNXN is t of the

the matrix obtained by the DCT conversion of BH1 .

S = BM~ T = DCT(BH ) (6)

978-1 -4244-1 835-0/07/$25.00 ©2007 IEEE Authorized licensed use limited to: Tarbiat Modares University. Downloaded on July 14, 2009 at 00:00 from IEEE Xplore. Restrictions apply.

194

We derive the vector WLxL out of the matrixSLxL. The size of this vector is corresponding with the length of spread spectrum. The process for generating W is explained in the

following manner:

1. Vector B is made out of the matrix S; this is the conversion of a two-dimensional Matrix to a vector shown as: B = b ¢ ¢bLxLb },b E {0,1} (7) B (1' = 2' ' LxL)' ~ (7) 2. The new vector B is defined with each element of B, defined asb1 = 2b -1, thereforeb 1 E {1,-1}. In the case t t , that there are equal numbers of 0's and l's in the vector B, B is the vector with a zero mean. 3. Hadamard matrix is obtained by the function Hadamard(R) with dimensions Rx R. 4. The set P is considered as an aggregate of L x L patterns with any single pattern of the same corresponding with an element of the setB . P = Hadamard(2: 1 + L x L,:) = {P1 , P2, ... ' 'LxL (8) ( P1 = P2i,***, PR}

{b

.

l{P',

Asallthemmbersinthefirstrowo Hadamard matr

n hefistro o Hadam ard matrix asralehemebes equal to 1, then we might omit it and define Px,R

new matrix. 5. The vector B withLxL bits is spread in the vector W LxL in the following manner: W y biPj (9) J=1

When the vector W of the block No. s from the message M is obtained, the vector I, with the size equal to the vector W, should be established out of the block No. t of the image H. The following steps discuss the procedure [3]: 1. CnsidrmarixTNXNwithits lemnts being eingDCT 1. Consider matrix TNxNfwith itS elements DCT conversion coefficients on block No. t of the image H. 2. Vector Z is created by scanning the elements of Matrix T. 3. The vector Z is a vector with Nx N elements and the vector I is made out of the vector Z in the following

{Zk manner:*1=

k'NJ

manner: I = {Zk,(NxN-R+1) N X N} (NxN-R+I) .< k < Nx ( 10)

made to obtain BHwt which is watermarked block corresponding with BH1. t

As Hadamard matrix is used in creation of spectrum and due to the lack of use of the first row in hadamard matrix "as the elements in the first row are 1", there is a proportion between the block sizes of the message and spectrum length. So that, the relation L x L < R / 2 should exist between spectrum length R and block size in the image of message (LxL). The process explained for the block No. t is repeated for other blocks and each block embeds a block of message matrix in itself. So that every image block is watermarked. At the end, the process is reversed in order to obtain watermarked image of HW. 3 DATA EXTRACTION

As stated before, there is no need for the original image in the extraction. The watermarked image is divided into the blocks of N x N size and each N x N block shall provide a message block of L x L size. The process of extraction for the block No. t of watermarked image is explained in the following manner so that the corresponding block No. s of message image is obtained. This is repeated for other watermarked blocks so that the image of message is completely extracted. 1. Matrix Tw including the DCT coefficients of the block No. t of the watermarked image is considered as

Tw = DCT(BHwt).

2. The elements of the

selection of the last R elements of the coefficient is its least effects in human visual system. When the vectors W and I, are obtained then the vector Iw which is a watermarked form of I, is founded by:

are scanned

in zigzag

form so that the vector Zw is obtained. 3. The vector ZW, is a vector with N x N elements and is used in creation of the vectorIw

I

(10)R

I, is also a vector with the length R. The reason for the

matrix Tw

{ZWk(NXN-R+1).
(12)

is the length of the spread spectrum known upon extraction, 4. Matrix P is repeatedly created in the same way as used in embedding stage. 5. Extracting process is made based on cross correlation [2]. The variable di is obtained out of Iw and Pi in this

di =KP' -ml (Pi), Iw -ml(Iw))(O) (13)

IW = I +c * W (11)

way:

This value should be in a way that the optimal results could be obtained both from robustness and visibility points of view. Iw is the watermarked coefficient, which replaces I to obtaining the watermarked block and a reverse process is

m ( elements A. In case elements A are defined as ak, k = 1, ,R

a is the coefficient that indicates the effect of W on I.

11

R

/

A

te:m 1( A)

a k (4 R The function applied to the two vectors P1 and Iw is defined in the following way:

195 Authorized licensed use limited to: Tarbiat Modares University. Downloaded on July 14, 2009 at 00:00 from IEEE Xplore. Restrictions apply.

Suppose A and B are two vectors with the length R and the elements Ak, Bk . Then the cross-correlation of the two vectors iS defined at zero in the following manner: 1 R (A,B)(O) =R- AkBk (15) R

bi

4. EXPERIMENTAL RESULTS

k=1

BW, is recognized as zero in di <0 and is recognized as one icasase di >0

6.the bit

Further, we may use as in method discussed in [6], of a pseudorandom sequence generator. If the message is 32 x 32, a 10-bit generator is used to provide 1024 random numbers.

out of the vector

case 7. The matrix

SW

which is the block number s of the

extracted message, is obtained from the vector

BW.

In the caewentepatrs ssdinte spread spectrum watermarking, have the following features, then identification process is improved: The following conditions may be considered for them [2]: i,P i = 1, R Should be a sequence with a zero mean 2. Spatial correlations i j, Pi, P,), ideally, Pj and P, sequences should have a zero product in the relation (15) while i j should be minimal., The tecniuemotluedinoterpaerfrh

production of pattern Pi is pseudorandom sequences technique produced by Rand(. Despite the fact that the above-said procedure is very simple and accelerated, it may not optimally satisfy the two properties stated for Pi patterns. The method we have selected for the production of pseudorandom sequences is the use of Hadamard transmission matrix. The main point to be paid attention in this transmission is the dimensions of hadamard matrix which should be the power of two. Hence, the length of spread spectrum vector is always an exponent two in the tests concerning method evaluation. It is possible to increase the security of watermarking methods by using a key or a hidden algorithm. The message is encrypted and then using a key decrypts the extracted message. The technique used here is similar to the technique used in [1]. Whereas the message is in the form of a binary image, the key used for watermarking shall be composed of two numbers. Using the two numbers the image of message is moved from leftward and downward so that the total image of the message is formed in the form of a one-dimensional vector. The vector created is converted into a bi-dimensional matrix so that it takes part in embedding as a binary image. Upon extraction the binary image is converted to a onedimensional vector and the scanning by the two numbers is reversed to obtain the original message.

We have used three standard images Lena, Boat and Opera to evaluate the system realized. The message of a binary image with the size of 128 x 128 pixels has been considered and is embedded in the three images as stated above. Original image and the message are divided each in blocks of 64 x 64 and 16 x 16 and each block of image is embedded in a block of the original image. The length of spread spectrum is considered to be 512 that is of a proper status both from the viewpoint of brightness and quick resolution. In order to evaluate the method we have used Stirmark benchmark [7]. But, there are other miscellaneous attacks having been indicated during the tests carried out against which our algorithm is robust and hence we have applied these attacks to the waternarked image. To measure the error from the original to the extracted watermark, normalized correlation (NC) is used and to specify the difference between the watermarked image and the original image Power Signal-to-Noise Ratio (PSNR) is used [4]. The comparison of the proposed algorithm with the other algorithms is given under to Table 1, Table 2 shows the 31 different attacks, Table 3 shows the robustness of the algorithm against scaling and Table 4 shows PSNR values for different watermark size. 5. CONCLUSION & FURTHER RESEARCH A robust, visible and rapid method is presented with spread spectrum technique in DCT coefficients in this paper. This method is able to embed a considerable volume of data in DCT domain and to extract them without any need to the original image. During different tests the method is exposed to noise, change in brightness and contrast, JPEG compression, negation of image, blurring and filtering. The results obtained show the high robustness of the method against attacks. The information is extracted in destination in O(MLengthxMWldth+HL,ngHWidthxR)where M is message, H is host image and R is length of spread spectrum.

The function we are continuing is addition of a technique in this or in other method in the spatial domain so that using the same visibility and robustness embeds a higher volume of

data.

Tablet. Comparison the proposed algorithm with the other algorithms By NC values LPF: Low Pass Filter, MF: Median Filter, GN: Gausian 10% addition noise. Algorithm JPG 80 [8]: Novel robust image watermarking using difference correlation detector 0.90 12 This Research (PSNR= 51.70) 1 Embedding 32 X 32 binary watermark at 512 X 512 Lena Host Image.

JPG 60 0.685 1 0.9872

JPG 40 0.30 17 0.7583

LPF 0.5971 0.8154

0.94

MF 1 0.9695

GN 1

196 Authorized licensed use limited to: Tarbiat Modares University. Downloaded on July 14, 2009 at 00:00 from IEEE Xplore. Restrictions apply.

Algorithm [5]: Hidden digital watermarks in images [4]: Genetic watermarking based on transform-domain techniques This Research Embedding 128 X 128 binary watermark at 512 X 512 Lena Host Image.

LPF 0.5261 0.6624

MF 0.5759 0.7134

JPG 80 1 1

PSNR 0.3019 32.52

0.7511

0.81321

0.98933

31.1411

Table 2. This table gives a list of the attacks to be applied for measurement of robustness to the three watermarked images and the NC values obtained upon extraction. The original image for watermarking with a size of 512 X 512 and watermark is binary image with a size 128 X 128. In the tests, Lena, Boat and Opera have the PSNR of 31.2344, 32.4532 and 32.1456 respectively. Lena NC 1 1 0.98933 0.91133 0.87566 0.8233

Boat NC 1 0.99943 0.98485 0.91751 0.8676 0.82333

Opera NC 1 0.99984 0.98779 0.91727 0.8768 0.83039

JPEG with Quality Level 40 Add Noise At Level 5 Add Noise At Level 10 Add Noise At Level 15 Add Noise At Level 20

0.72437

0.7387

0.74057

0.82322 0.6712 0.60769 0.58147

0.81679 0.67983 0.61371 0.57398

0.82795 0.66208 0.59849 0.57691

Sharpening

1 0.7511 1 1 0.98608

1 0.7011 1 1 0.97981

1 0.6842 1 1 0.98266

Attack Type

JPEG Quality Level 100 JPEG Quality Level 90 JPEG Quality Level 80 JPEG Quality Level 70 JPEG Quality Level 60 JPEG Quality Level 50

Low Pass Filter PSNR Test with Value 50 PSNR Test with Value 100 Add 5% GausianNoise

Attack Type

Add 10% Gausian Noise Add 20% Gausian Noise Brightness from 0 to 25 Contrast from 0 to 100 Gamma from I to 2 Brightness 0 to 25 & Gamma 1 to 2 & Contrast 0 to 100 Brightness from0to 40

Brightness from 0 to 50 Contrast from 0 to -100 Gamma from I to 0.1 Brightness 0 to 40 & Gamma I to 0.1 & Contrast 0 to -100 Gausian Blur Motion Blur Median Filtering Negative

Lena NC 0.85425 0.7032 0.9908 0.99593 1 0.96914

NC 0.85343 0.70434 0.99821 0.98046 1 0.9736

Opera NC 0.85018 0.70581 0.99495 0.99699 1 0.97044

0.96515

0.98681

0.96564

0.90742 0.83853 0.84749 0.82966

0.95204 0.7146 0.8768 0.69367

0.87403 0.77388 0.79391 0.74717

0.99878 0.00472 0.81321 0

0.99862 0.00635 0.7511 0

0.99862 0.00496 0.7023 0

Boat

Table 3. Robustness against scaling. Host Image is Lena 512 X 512 and watermark is TMU logo binary image with a size 128 X 128.

Original watermark

Extracted after 0.50 scaling. NC=0.4441

Extracted after 0.25 scaling. NC=0.5896

Extracted after 0.75 scaling. NC=0.5010

Table 4. PSNR Table for Different watermark sizes. Host Images are 512 X 512 Lena Boat

Opera

16 X 16 52.0734 53.2853 52.4574

32 X 32 51.7017 45.6924 46.4368

REFERENCES [1] Phen-Lan Lin, "Robust transparent image watermarking system with spatial mechanisms," The Journal of Systems and Software, vol. 50, pp. 170116, 2000. [2] Joceli Mayer et al., "On the design of pattern sequences for spread spectrum image watermarking," International Telecommunication Symposium, 2002. [3] A. Piva et al., "DCT-based watermark recovering without restoring to uncorrupted original image," IEEE Transactions on Image Processing, vol.

128 X 128 64X64 49.2029 38.3215 39.6718 32.3009 40.4162 32.3009 [4] Chin - Shiuh Shieh et al, "Genetic watermarking based on transformdomain techniques," Pattern Recognition, vol.37, pp. 555-567, 2004. [5] C. T. Hsu and J. L. Wu, "Hidden digital watermarks in images," IEEE Transaction Image Processing, vol. 8, no. 1, pp.58-68, 1999. [6] Shinfeng D .Lin and Chin - Feng Chen, "A robust DCT-based watermarking for copyright protection," IEEE Transactions on Consumer Electronics. vol. 46, no. 3, August 2000. [7] http://www.cl.cam.ac.uk/-fapp2/steganography. [8] Wei Lu et al., "Novel robust image watermarking using difference correlation detector," Computer Standards & Interfaces, vol. 29, pp. 132-137, 2007.

6, no. 4, August 1998.

197 Authorized licensed use limited to: Tarbiat Modares University. Downloaded on July 14, 2009 at 00:00 from IEEE Xplore. Restrictions apply.

message

hiding in a digital medium such as image, video, or audio mainlyfor recovery. Taking use of spread ... Keywords- Watermarking; Data hiding; Image processing; Spread. MWldth is the ... Downloaded on July 14, 2009 at 00:00 from IEEE Xplore.

687KB Sizes 2 Downloads 260 Views

Recommend Documents

MESSAGE
your labor from long years of acquiring basic knowledge and skills from your dear Alma Mater. Let me be with you' giving ... ardor and diligence. Don't be scared.

Message Mate
God's grace filled the church and became a bridge of respect and trust ... of what writer Howard Snyder calls kingdom people rather than church people.

Message Mate
The word channels refers to canals or irrigation ditches that run in various ... We can stretch to its breaking point this tension between divine sovereignty and ...

Message Mate
the family of God . . . yet how rare! ... GROWING UP IN GOD'S FAMILY ... copyright © 1985 and Message Mate copyright © 2016 by Charles R. Swindoll, Inc.

Message Mate
Original outline copyright © 1985 and Message Mate copyright © 2016 by Charles .... TEXT: Martin Luther (1483–1546); translated (1852) by Frederick H. Hedge ...

Message Mate
Duplication of copyrighted material for commercial use is strictly prohibited. Committed to Excellence in Communicating Biblical Truth and Its Application. MM07.

Message Mate
Spiritually: Tender — hungry, ready to believe, quick to respond, creative. 2. The Difficult Part: Childishness (Isaiah 30:1 – 2, 8 – 9). We must curb and control ...

Message Mate
After arriving in Jerusalem, Nehemiah's first order of business was to seek silence and ... line the reputation of the promise-keeping God of Israel. Nehemiah had a ... For these and related resources, visit www.insightworld.org/store or call USA ...

message - Calabarzon
Page 1 ... Website: depedcalabarzon.ph Facebook: DepEd Calabarzon. M E S S A G E. The school year is once ... in building a productive society. We salute the ...

Message Mate
leadership or the skills and experiences we bring to the table, we can learn ... of excellent leadership must be placed on a foundation of God's Word and ... service, Nehemiah received devastating news concerning Jerusalem's broken walls ...

Message Mate
Duplication of copyrighted material for commercial use is strictly prohibited. Committed to Excellence in Communicating Biblical Truth and Its Application. MM09.

Google Message Security
This “network effect” automatically identifies and tracks internet protocol (IP) addresses that are issuing attacks such as spam, viruses, denial of service (DoS), etc. As soon as a threat is identified, it is blocked for all Google Message Secur

Google Message Security
Google Docs & Spreadsheets (online document hosting and collaboration),. Google Page Creator (web page creation and publishing), Start Page. (a single ...

Google Message Security
(instant messaging and voice over IP),. Google Docs & Spreadsheets (online document hosting and collaboration),. Google Page Creator (web page creation ...

Google Message Consolidation
Are you prepared to search historical data in the event of a lawsuit or regulatory inquiry and ... Google Message Consolidation consolidates historical customer data from a wide variety of media into .... security functionality provides customers wit

Google Message Filtering - PDFKUL.COM
ABOUT GOOGLE APPS. Google Apps is a suite of applications that includes Gmail, Google Calendar. (shared calendaring), Google Talk. (instant messaging and voice over IP),. Google Docs & Spreadsheets (online document hosting and collaboration),. Google

Google Message Encryption
Google Message Encryption service, powered by Postini, provides on-demand message encryption for your organization to securely communicate with business partners and customers according to security policy or on an “as needed” basis. Without the c

Google Message Security
Google Message Security is delivered in a Software-as-a-Service (SaaS) model, saving money and IT resources because there is no hardware or software to install ... Google Docs & Spreadsheets (online document hosting and collaboration),. Google Page C

message
Allow me to share with your happiness and excitement asyou Move Up from Junior ... your own HOPE.. make your own DREAMS... and whatever your beliefs is, ...

Google Message Security
are assured of having effective and reliable protection for their email at all times. .... confidential data in outbound email messages and their attachments.

ZMQ Message Format - PDFKUL.COM
Video Messages. ○ Sensor Messages. Command Messages. A ZMQ Command Message consists of 2 Frames: ○ Robot ID. ○ Data. The Robot ID always has to be the first Frame. It is used as a SubscribeFilter to determine from which Robot the message was sent or

Google Message Consolidation
document hosting and collaboration),. Google Page ... with you throughout the process to achieve your business objectives and timeline. ... Most Common Email.

Google Message Consolidation
Google Message Consolidation consolidates historical customer data from a wide ... easy as it is based on total disk capacity and does not require the need for .... customers to manage storage and retention as well as monitor all activities that ...

ZMQ Message Format - GitHub
Camera Images on an android smartphone are oriented in landscape mode. We assume however that the smartphone is used in portrait mode. So in order to ...