Improving Watermark Performance by Using Bipolar Split

Transcription

Improving Watermark Performance by Using Bipolar Split
國立臺南大學
「理工研究學報」第 卷第 期(民國 ):
44
1
99.4
83-102
Improving Watermark Performance by Using
Bipolar Split
Jiann-Shu Lee
Department of Computer Science and Information Engineering,
National University of Tainan
Abstract
In this paper, we propose a so-called bipolar split scheme to promote watermarking robustness
while not at the expense of imperceptibility which is desired to be resolved in the research area. The
watermark is split up into bipolar parts such that we can enhance the watermarked image quality by
3dB without loss of the watermark robustness. The experimental study shows our method can gain
about 3dB benefit in PSNR beyond the single watermark with double strength method. And, our
method can even compete in the extracted watermark quality with the latter.
: watermarking, attack simulation, bipolar split.
Keywords
83
Improving Watermark Performance by Using Bipolar Split
1. Introduction
The protection of intellectual property rights for digital media has become an important issue
due to the rapid and extensive growth of the Internet, popular digital recording and storage devices
such that digital content can be replicated, transmitted and distributed in an effortless way. In the
decade, digital watermarking proposed to protect the copyright of the legal owners and providers
has become an active research area. A qualified watermark technique should possess several
properties such as robustness, imperceptibility, security and unambiguity. For still image
watermarking, many techniques (Wolfgang, 1999; Voloshynovskiy, 1999; Kutter, 1997; Delaigle,
1998; Cheng, 2001; Barni, 2001; Depovere, 1998; Karybali, 2003; Delaigle, 2002; Pereira, 2001;
Cox, 1997; Swanson, 1996; Podilchuk, 1998; Watson, 1992; Chou, 1995; Lee, 2006; Amornraksa,
2006; Hsieh, 2007; Hsu, 1999; Hsu, 1998) have been proposed. Generally speaking, they can be
divided into spatial domain and frequency domain approaches.
Spatial domain approaches are apt to achieve imperceptibility while sustaining low robustness.
On the contrary, the frequency domain approaches are more robust because the watermark has been
spread to the whole image and hence is resistant to cropping attack. Hence, the lately proposed
watermarking approaches almost belong to this category. In the literature, (Cox, Kilian, Leighton, &
Shamoon, 1997)proposed a global DCT-based approach to hide watermarks. An independent and
identically distributed Gaussian random vector is constructed as a watermark and is inserted in a
spread-spectrum-like fashion into the perceptually most important spectral components of the data.
(Swanson, Zhu, & Tewfik, 1996) integrated the human visual system (HVS) model to watermarks
hiding. For each DCT transformed block, a frequency mask is computed like the low bit rate coding
algorithms. The mask is scaled and multiplied by the DCT of the watermark under imperceptible
constraint. (Podilchuk & Zeng, 1998) proposed two perceptually based watermarking schemes, i.e.
the block-based discrete cosine transform and the wavelet transform. The Watson’s perceptual
model (Watson, 1992) is adopted in both schemes. The watermark values are generated from a
normal distribution with zero mean and unit variance. If the frequency component magnitude is
larger than the corresponding contrast masking threshold (treated as JND), the watermark value is
weighted by the JND (Chou & Li, 1995) (just noticeable differences) and then is added to the
frequency component. (Lee, Tsai, & Ko, 2006) designed the watermark embedding from the attack
perspective. They developed a new JND in the DCT domain based on an attack simulation scheme
84
理工研究學報
that reversely derives the maximum modification amount embedded in the DCT domain under a
condition of imperceptibility. (Amornraksa & Janthawongwilai, 2006) proposed new watermarking
methods by balancing the watermark bits around the embedding pixels in the watermark preparing
process, by properly tuning the strength of watermark in the embedding process, and by modifying
the linear combination of nearby pixel values around the embedded pixels in the retrieval process.
(Hsieh & Liao, 2007) designed three corresponding detectors based on three attacks. The detectors
remove the unreliable DCT coefficients in the attacked image and only reliable coefficients are used
for the extraction of the watermark embedded. In (Hsu & Wu, 1999), watermarks are embedded by
modifying the middle-frequency coefficients within each image block of the original image in
considering the effect of quantization to survive the cropping of an image, image enhancement and
the JPEG lossy compression. In (Hsu & Wu, 1998) both the watermark and the host image are
composed of multiresolution representations with different structures and then the decomposed
watermarks of different resolution are embedded into the corresponding resolution of the
decomposed images. This approach can preserve the corresponding low resolution components of
the image in case of image quality degradation.
For image watermarking, how to promote the watermarking robustness while not at the
expense of imperceptibility is an important research issue. In this paper, we try to solve this
problem by using bipolar split. The underlying concept comes from the properties that the quality
degradation of the watermarked image reflects in energy, e.g. the PSNR, while the watermark
robustness is determined by the embedded strength of DCT coefficients (for DCT based
watermarking). Since the DCT is a unitary transformation, we can explain the idea by the following
scenario. Suppose a watermark is embedded by increasing one DCT coefficient magnitude Δ and
results in square error E. If we split the watermark into two ones with magnitudes Δ /2 and - Δ /2
respectively, the total square error will become E/2 while the relative watermark strength is still Δ .
This means that if we split the watermark strength into a bipolar manner, the watermarked image
quality can be enhanced by 3dB not at the cost of watermark robustness. Equivalently, if we retain
the image quality at the original level, the watermark robustness will can be further promoted. For
signal processing attacks, e.g. smoothing and sharpening, the induced disturbances on the DCT
coefficients are locally correlated. Hence, the bipolar watermarks are embedded at neighboring
DCT coefficients to take the advantage from this correlation. The experimental study shows that the
85
Improving Watermark Performance by Using Bipolar Split
bipolar watermarks split approach can gain about 3dB benefit in PSNR beyond the single
watermark with double strength method. And, the former can even compete in the extracted
watermark quality with the latter.
The bipolar split benefit is proven in section 2. Section 3 introduces the attacking simulation
approach. The bipolar watermarks insertion and extraction are addressed in section 4. Section 5
depicts the experimental results. Finally, Section 6 gives the concluding remark of this paper.
2. The advantage of bipolar split
Let f and F be a 2-D image with M’s rows and N’s columns and its corresponding 2-D discrete
cosine transform, respectively. Their corresponding DCT pairs are shown in the following.
F (u v ) =
,
and
f (i, j ) =
4
MN
M −1 N −1
fi j
∑∑
i j
C (u )C (v )
(
=0
,
cucvFu v
∑∑
u v
(
,
) cos
=0 =0
where C (u ) =
2
if u
2
i + )uπ
M
(2
1
2
=0
M −1 N −1
( ) ( )
) cos
cos
(2
j + )vπ
N
1
2
(2 j + 1)vπ
i + 1)uπ
cos
2M
2N
(2
(1)
(2)
= 0, otherwise C (u ) = 1 . Suppose a watermark coefficient w(p, q) is
inserted into the DCT coefficient F(m, n), where m*n≠0, by adding Δ to it. The modified F is
denoted as F d and its corresponding image is written as f d . Now, we can calculate the PSNR of
the distorted image, i.e. PSNR( f d ) = 10log10 (2552/ v d ).
vd =
1
N
2
∑∑ f i j − f
N −1 N −1
i =0 j =0
∑∑
( , )
d
i j
( , )
Δ2 N −1 N −1 (2i + 1)mπ
cos
N 2 i =0 j =0
2N
2
Δ
= 2
4N
=
2
cos
(2
j + 1)nπ
2N
2
(3)
On the contrary, suppose we insert the watermark w(p, q) by adding Δ /2 to F(m, n) and
subtracting Δ /2 from F(r, s). The modified F is denoted as F s and its corresponding image is
written as f . We can calculate the PSNR of the distorted image, i.e. PSNR( f ) =
s
s
10log10(2552/ v ).
s
86
理工研究學報
vs =
N
∑∑ f i j − f
N −1 N −1
1
2
Δ
= 2
4N
Δ2
= 2
8N
2
( , )
i =0 j =0
∑∑
N −1 N −1
i =0 j =0
cos
s
i j
( , )
i + 1)mπ
2N
(2
Hence, we can find that
f
2
cos
s
(2
(2i + 1)rπ
j + 1)nπ
+ cos
2N
2N
improves the PSNR of the
cos
f
d
(2
j + 1)sπ
2N
2
(4)
by 3dB. This proves that the
bipolar split approach indeed can enhance the watermarked image quality. Because the relative
strength of the both modified DCT coefficients of F is equal to the strength of the modified
coefficient of F d , the effective robustness of the both strategies are equivalent from the theoretical
view.
This bipolar split scheme can be combined with the existing watermark insertion and
extraction approaches to achieve an effective watermarking system. Here, for demonstrating the
effectiveness of this scheme, we take the attacking simulation method (Barni, Bartolini, De Rosa, &
Piva, 2001) as an instance.
s
3. The attacking simulation approach
This method takes the positive and the negative attacks to the original image to derive the
acceptable modification amount for each DCT coefficient. Based on the constraint that the image
quality degradation of the factitiously attacked image must be imperceptible, the spatial JND model
is applied to limit the modification amount.
The flow chart of the DCT domain JND computing is shown in Fig.1. The factitiously negative
attack and positive attack are described as follows. For factitiously negative attack, the image is first
−−
divided into eight by eight non-overlapping blocks. For each block, the average intensity P and
every pixel’s JND value JND( x, y) are calculated. Then, each pixel in every block is adjusted
−−
toward P just like contrast suppression to simulate the negative attacks. For each pixel, the
maximum adjustment amount is less than JND( x, y) and the adjusted result cannot cross the
−−
average intensity P . Let P ( x, y ) and JND ( x, y) denote the intensity value and the JND value
j
j
of the pixel at location (x, y) in the block j, respectively. The average intensity of the block j is
−−
represented as P . And, let P − ( x, y) be the adjusted result after the factitiously negative attack.
j
j
We can express the process by equations (5) to (7):
87
Improving Watermark Performance by Using Bipolar Split
if P ( x, y ) > P
otherwise
⎩
A = P ( x, y ) + B − * JND ( x, y )
⎧− 1,
B− = ⎨
1,
j
(5)
j
j
(6)
j
⎧max(A, P ),
P − ( x, y) = ⎪⎨
if P ( x, y) > P
otherwise
j
j
⎪
⎩ min(A, P ),
j
j
(7)
j
Similarly, the factitiously positive attack is achieved by adjusting each pixel value P ( x, y )
−−
backward the average intensity P just like the contrast enhancement. Let P + ( x, y) be the
j
adjusted result in the block j after the factitiously positive attack. This process can be expressed
explicitly by equations (8) to (10):
if P ( x, y ) > P
otherwise
j
(8)
A = P ( x, y ) + B + * JND ( x, y )
(9)
⎧ 1,
B+ = ⎨
⎩− 1,
j
j
j
⎧min(A,255),
if P ( x, y) > P
otherwise
P + ( x, y) = ⎨
j
⎩max(A,0),
j
(10)
j
Meanwhile, the additional constraints, i.e. P + ( x, y ) − P ( x, y ) ≤ JND ( x, y ) and
P − ( x, y) − P ( x, y) ≤ JND ( x, y) are added to the both factitious attacks respectively to ensure
j
j
j
j
j
j
that the modified result is imperceptible to human eyes.
We derive the DCT domain JND by computing the difference between the original image’s
DCT and the attacked image’s DCT. The DCT coefficients of the original image and the factitiously
positive and negative attacked images are calculated block by block. And, the corresponding DCT
coefficients of the jth blocks are denoted as c (u, v) , c + (u, v) , and c − (u, v) , accordingly. We
j
j
j
calculate the absolute differences of these coefficients and let
+
+
dctjnd (u, v) = | c (u, v) - c (u , v ) |
j
j
(11)
j
and
−
= | c − (u, v) - c
Then, the DCT domain JND
dctjnd (u, v)
j
and
j
j
(u , v )
|.
(12)
dctjnd (u, v)
j
−
dctjnd (u, v) .
j
88
is defined as the minimum of
dctjnd
+
j
(u , v)
理工研究學報
4. Inserting and extracting the watermark
4.1 Inserting method
Let be the host image with size x , and the digital watermark be a binary image
with size x . In the watermark, the marked pixels are valued as one’s, and the others are
zeros. There are , i.e. /8 x /8, image blocks with size 8 x 8 in the host image . To obtain
the same number of blocks as the image , the watermark is decomposed into blocks with size
( x 8/ ) x ( x 8/ ). The inserting algorithm is expressed as follows.
Step 1 :The host image is divided into 8×8 non-overlapping blocks. To survive picture cropping,
the torus automorphism algorithm is used to permute the watermark to disperse its spatial
relationship. After permutation, the th watermark in the block is denoted as ( ).
Step 2 : Each block in the host image is
transformed independently.
Step 3 : Computing the
domain
as described in the section 3.
Step 4 : For each image block, there are ( x 8/ ) x ( x 8/ ) watermark coefficients and
( x 8/ ) x ( x 8/ ) complementary watermark coefficients needed to be
embedded. The former are called master watermarks and the latter are called slave
watermarks. We choose the position ( , ) of the largest
( , ) from those unvisited
positions to embed the master watermark in the block . And, then these positions are
labeled as visited. If ( ) = 1, the
coefficient c (u, v) is updated by using Eq. (13)
I
N1
N2
W
M2
M1
NI
N1
N2
I
I
M1
N1
M2
W
N2
I
i
j
wj i
DCT
DCT
JND
M1
M1
N1
M2
N1
M2
N2
N2
u
v
dctjndj u
v
j
wj i
where 1 ≤ ≤ ( x 8/ ) x (
to modify c (u, v) .
i
i
M1
N1
DCT
j
x 8/ ). On the contrary, if ( ) = 0, Eq. (14) is applied
M2
N2
wj i
j
c (u, v) = c (u, v) + dctjnd (u, v)
(13)
c (u, v) = c (u, v) − dctjnd (u, v)
(14)
*
j
j
j
*
j
j
j
Step 5 : For the slave watermark insertion, we select the position ( , ) from the 3*3
neighborhood of the master watermark, which possesses the same sign with c (u, v) . If
( ) = 1, the
coefficient c (u, v) is updated by using Eq. (14). On the contrary, if
( ) = 0, the equation (13) is applied to modify c (u, v) .
y
z
j
wj i
DCT
j
wj i
Step 6 : Take the inverse
j
DCT
of the modified result to obtain the embedded image.
89
Improving Watermark Performance by Using Bipolar Split
4.2 Extracting method
The watermark extraction can be modeled as the hypothesis testing problem concerning
two-valued observations and :
M
S
H : ( M , S ) = (ε M , ε S ) + ( μ M
0
versus
H : ( M , S ) = (ε M , ε S ) + ( μ M
1
,0
, μ S ,0 )
(15)
,1
, μ S ,1 )
.
Here, we assume that the noises ε M and ε S are Gaussian random variables with zero
means. In terms of distributions on the observation space, the hypothesis pair of (15) can be
rewritten as
H : ( M , S ) ~ N ( μ M , μ S , Σ)
0
,0
,0
versus
H : ( M , S ) ~ N ( μ M , μ S , Σ)
1
,1
(16)
,1
where N ( μ M i , μ S i , Σ) denotes two-dimensional Gaussian distribution with means μ M i
and μ S i and covariance matrix Σ . The likelihood ratio for (16) is given by
,
,
,
,
L(m, s) =
p1 (m, s)
p0 (m, s)
−
Σ
1/ 2
=
π
2
−1 / 2
Σ
exp[
π
2
= exp[
1
2
−
1
−
1
exp[
(
2
2
(
(
X − C ) Σ − ( X − C )]
t
1
1
1
X − C ) Σ− ( X − C
t
1
0
0
)]
X − C0 ) Σ −1 ( X − C0 ) − 1 ( X − C1 ) Σ −1 ( X − C1 )]
t
t
2
90
(17)
理工研究學報
where X
⎡m⎤
= ⎢ ⎥,
⎣s⎦
C
⎡μm ⎤
=⎢
⎥,
⎣ μs ⎦
,0
0
C
,1
1
,0
⎡μm ⎤
=⎢
⎥,
⎣ μs ⎦
L is the likelihood ratio and p0 and p1 are
,1
two probability distributions corresponding to H0 and H1, respectively. Thus a Bayes test for (16)
is given by
⎧
1
⎪
⎪
δ B ( m, s ) = ⎨
⎪0
⎪
⎩
where
τ
=
if
exp[
if
exp[
1
2
1
2
(
X − C0 )t Σ −1 ( X − C0 ) −
1
(
X − C0 ) Σ ( X − C 0 ) −
1
t
−1
2
2
(
X − C1 )t Σ −1 ( X − C1 )]≥ τ
(
X − C1 ) Σ ( X − C1 )]< τ
t
−1
(18)
π 0 (C10 − C00 )
, π is the prior probability of the occurrence of hypothesis
π 1 (C01 − C11 )
i
and C is the cost incurred by choosing hypothesis H when hypothesis
ij
i
case, we let C00 = C11 = 0 and C01 = C10 = 1 . The ratio
H
i
H is true. In our
j
π0
is equal to the ratio of the white
π1
pixel number to the black pixel number of the embedded watermark. To get explicit threshold
value for the master and slave watermark pair some assumptions should be made. We assume that
the probability distributions of ε m and ε are independent and the variances of ε m and ε
s
s
are the same and equal to σ . Then, the watermark detection rule can be rewritten as
⎧
⎪1
⎪
δ B ( m, s ) = ⎨
⎪0
⎪⎩
if
m − s≥
if
m − s<
2
σ
2
σ
2
dctjnd (um , vm )
2
dctjnd (um , vm )
log(τ )
log(τ )
,
(19)
where (um , vm ) means the location of the master watermark. Let DTV (um , vm ) denote the
decision threshold value of the master watermark at frequency (um , vm ) in block j, i.e.
j
DTV (um , vm ) =
j
⎧1
δ B (m, s ) = ⎨
⎩0
σ
2
2 dctjnd j (u m , vm )
if
if
log(τ )
. Then Eq. (19) can be rewritten as:
m − s≥ DTV j (um , vm )
m − s< DTV j (um , vm ) .
91
(20)
Improving Watermark Performance by Using Bipolar Split
However, there still exists one problem that is how to estimate the noise variance σ 2 . We
know that the embedded watermark value is decided by comparing the relative modification
values of the master and the slave watermarks. For the two watermarks, the common part of the
attack disturbances does not cause threat. So, we can estimate the noise variance by calculating
the overshoot or the undershoot amount from the noise-free case, i.e.
σ 2 = 2dctjnd j (um , vm ) − [(C ∗j (um , vm ) − C j (um , vm )) − (C ∗j (u s , vs ) − C j (u s , vs ))] .
(21)
The extraction steps are described as follows.
Step 1 : Both the host image and the image in question are DCT transformed to obtain
coefficients C and C*, respectively.
Step 2 : The same as the insertion step, we can find out the embedded master and slave
watermark positions (xm, ym) and (xs, ys), respectively.
Step 3 : According to equations (22) and (23) the master watermark wjm(i) and the slave
watermark wjs(i) can be extracted, individually.
⎧1
w jm (i) = ⎨
⎩0
w js (i )
if (C ∗j ( xm , ym ) − C j ( xm , ym )) − (C ∗j ( xs , ys ) − C j ( xs , ys )) ≥ DTV j ( xm , ym )
(22)
otherwise
(23)
= w jm (i )
Step 4 : The original watermark is obtained by further permuting the extracted watermark to
complete one whole cycle.
5. The experimental results
To verify the performance of the proposed watermarking scheme two experimental series
adopting the image-type and the random-sequence-type watermarks are conducted, respectively.
The first experimental series focuses on the image-type watermark. Various general attacks
including JPEG compression, blurring, sharpening, noise contamination, cropping, scaling and
rotation are tested to examine the survival rate of the embedded watermark. The NC value (Hou,
1998; Chen, 2000) defined in Eq. (24) is applied to measure the similarity between the referenced
watermark W and the extracted watermark W*.
92
理工研究學報
M1 M 2
NC =
∑
∑ w(i, j ) × w (i, j )
i= j=
1
1
M1 M 2
∑ ∑ w (i, j )
i =1 j =1
M1 M 2
*
2
×
∑∑
i j
=1
=1
(1
− w(i,
M1 M 2
∑∑
i j
=1
(1
=1
j ))
× (1 − w * (i,
− w(i,
j ))
2
j ))
(24)
The JPEG compression attacks on the watermarked image are shown Table 1. Observing Table
1, we can find that if the compression quality is better than 20%, the embedded watermark is almost
not threatened. Even when the compression quality is down to 5% the extracted watermark is still
faintly visible. The blurring and sharpening attacks on the watermarked images are shown in Fig. 2
and Table 2. We note that our method is very robust to such types of attack. This owes to that the
neighboring insertion of the master and the slave watermarks can take advantage of the local
coherence of the DCT coefficient disturbance coming from blurring and smoothing. As to noise
attacks, we can find that even the noise variance grows to 25 and the corresponding image quality
PSNR is down to 20, the extracted watermark is still visible. These results are demonstrated in Table
3. Table 4 depict the results when the watermarked images are attacked by crop of different ratios.
Because the embedded watermark coefficients are almost uniformly distributed on the whole image,
the NC values of the extracted watermarks are almost proportional to the crop ratios. For scaling
attack, we test the reduction to one quarter of the original size. The detected NC value is 0.8055.
This means that the proposed scheme is insensitive to scaling attacks. For rotation attacks, the
detected watermarks and the corresponding NC values are listed in Table 5. These results show our
scheme is also robust to rotation attacks. In addition to the general attacks, some special
image-processing attacks are also examined. Table 6 shows various image-processing attacks such
as ripple, facet, film grain, print and scan, brightness/contrast adjustment and texturization. For
print-and-scan attack, the watermarked image was printed out first by
printer and then scanned by
scanner. As can be seen, all these detected
watermarks are recognizable. This reflects that the proposed scheme is robust to these
image-processing attacks, too. To understand if the proposed bipolar split scheme can achieve
comparable performance to embedding double-strength watermark without bipolar split, we
conduct another experimental series, which uses single watermark with double strength in the
watermark insertion step. Tables 7 to 12 depict the tested results. From these results, we can find
that the robustness of our method approaches to that of the double-strength scheme for compression
and noise attacks. And, their performance looks almost the same for rotation and cropping attacks.
Surprisingly, it can be noted that our method is even superior to the double-strength scheme for
EPSON Stylus Color 480
Microtek ScanMaker v310
93
Improving Watermark Performance by Using Bipolar Split
blurring, sharpening, scaling and print-and-scan attacks. This proves that our bipolar split scheme
can achieve comparable robustness to the double-strength scheme. However, remember that our
method can get 3dB better in PSNR than the double-strength scheme. The following test belongs to
image quality test. Twenty blocks were randomly picked out from the test image. These selected
blocks are embedded bipolar watermarks and double-strength watermarks in turn. Fig. 3 shows the
corresponding PSNR for the twenty blocks. As might be expected, our bipolar split scheme can gain
about 3dB quality superiority over the double-strength method.
The second experimental series focuses on the random-sequence-type watermark. We compare
the proposed watermarking schemes to the image-adaptive approach (Podilchuk & Zeng, 1998)
through examining watermark robustness to JPEG2000 compression, JPEG compression, blurring,
sharpening, noise contamination, cropping, rotation, rescaling and print-and-scan attacks. Here, the
normalized correlation coefficient between the embedded watermark and the detected watermark
(Cox et al., 1997) is employed to measure the similarity, denoted as SIM. Table 13 shows the
detected results after JPEG2000 compression. And, Tables 14 to 19 show the detected results after
various attacks. The detection results using our energy reallocation scheme are consistently better
than that using the image-adaptive approach for all these attacks. In other words, there are gains in
using energy reallocation watermarking scheme even for JPEG2000 compression – a tougher
challenge.
6. Conclusions
In this paper, we propose a new image watermarking scheme to promote the watermarking
robustness without sacrificing the imperceptibility. This profit results from splitting the watermark
strength into a bipolar manner. To take advantage from the locally correlated attacks, e.g. smoothing
and sharpening, the bipolar watermarks are embedded at neighboring DCT coefficients. The
experimental results show that the proposed method indeed gain about 3dB benefit in PSNR
compared with the single watermark with double strength method. For random-sequence-type
watermark, our method can also outperform the traditional appraches.
Acknowledgements
This work was partially supported by the National Science Council under grant number NSC 96-2221-E-024-016.
The author also would like to thank Mr. Ko-Chian Hsu for his assistance in designing the code.
94
理工研究學報
References
Wolfgang, R. B., Podilchuk, C. I., & Delp, E. J. (1999). .Perceptual watermarks for digital images
and video. Proc. IEEE, 87(7), 1108–1126.
Voloshynovskiy, S., Herrigel, A., Baumgaertner, N., & Pun, T. (1999,September). A stochastic
approach to content adaptive digital image watermarking. Proc. 3rd Int. Workshop
Information Hiding. Dresden, Germany.
Kutter, M., Jordan, F., & Bossen, F. (1997,February). Digital signature of color images using
amplitude modulation. Proc. SPIE Electronic Imaging, Storage Retrieval for Image Video
Databases V. San Jose, CA..
Delaigle, J. F., Vleeschouwer, C. D., & Macq, B. (1998). Watermarking algorithm based on a
human visual model. Signal Processing 66(3), 319–335.
Cheng, Q., & Huang, T. S. (2001). An additive approach to transform-domain information hiding
and optimum detection structure. IEEE Trans. Multimedia, 3(3), 273–284.
Barni, M., Bartolini, F., De Rosa, A., & Piva, A. (2001). A new decoder for the optimum recovery of
nonadditive watermarks. IEEE Trans. Image Processing 10(5), 755–766.
Depovere, G., Kalker, T., & Linnartz, J. P. (1998,October). Improved watermark detection using
filtering before correlation. Proc. IEEE Int. Conf. Image Processing. Chicago, IL
Karybali, I., & Berberidis, K. (2003,December). Blind image-adaptive watermarking. Proc. 10th
IEEE Int. Conf. Electronics Circuits Systems. Sharjah, United Arab Emirates.
Delaigle, J.F., Devleeschouwer, C., Macq, B., & Langendijk, I. (2002). Human visual system
features enabling watermarking. Proc. of IEEE ICME, 489–492.
Pereira, S., Voloshynovskiy, S., & Pun, T. (2001). Optimal transform domain watermark embedding
via linear programming. Signal Processing 81, 1251–1260.
Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure Spread Spectrum Watermarking
for Multimedia. IEEE transactions on Image Processing, 6(12), 1673-1687.
Swanson, M. D., Zhu, B., & Tewfik, A. H. (1996). Transparent Robust Image Watermark. IEEE Int.
Conf. on Image Proc., 3, 211-214.
Podilchuk, C. I., & Zeng, W. (1998). Image Adaptive Watermarking using Visual Models. IEEE
Journal on Selected Areas in Communication 16, 523-539.
95
Improving Watermark Performance by Using Bipolar Split
Watson, A. B. (1992). DCT Quantization Matrices Visually Optimized for Individual Images. Proc.
SPIE conf. Human Vision, Visual Processing, and Digital Display IV, 202-216.
Chou, C.H., & Li, Y. C. (1995). A perceptually tuned subband image coder based on the measure of
just-noticeable-distortion profile. IEEE Transactions on Circuit and Systems for Video
Technology 5(6), 467-476.
Lee, J. S., Tsai, C. T., & Ko, T. H. (2006). Image Watermarking Through Attacking Simulation.
Optical Engineering 45(2), 027001-1~027001-11.
Amornraksa, T., & Janthawongwilai, K. (2006). Enhanced images watermarking based on
amplitude modulation. Image and Vision Computing 24, 111–119.
Hsieh, C. H., & Liao, C. J. (2007). Anovel imagewatermarking scheme based on amplitude attack.
Pattern Recognition 40, 1342–1354.
Hsu, C. T., & Wu, J. L. (1999). Hidden Digital Watermarks in Images. IEEE Trans. Image
Processing, vol. 8, no. 1, pp. 58-68.
Hsu, C. T., & Wu, J. L. (1998). Multiresolution Watermarking for Digital Images. IEEE Trans.
Circuits and Systems II, vol. 45, no. 8, pp. 1097-1101.
Hou, Y. C., Chen, P. M., & Chiao, Y. F. (1998). Steganography: An Efficient Data Hiding Method.
Proc. of CVPRIP, 4, 211-214.
Chen, P. M. (2000). A Robust Digital Watermarking based on A Statistic Approach. IEEE Int. Conf.
on Information Technology: Coding and Computing, 116-121.
Submission Date:2010/02/11
Revision Date:2010/03/15
Acceptance Date:2010/04/09
96
理工研究學報
DCT transformation Cj(u,v)
averaging
original image
8×8
block
partition
spatial JND
calculation
Pj(u,v)
attacking
simulation
DCT
Cj-(u,v)
frequency JND
calculation
Cj+(u,v)
DCTJND (u,v)
JNDj(x,y)
j
Fig. 1. The derivation process of the
domain
.
Table 1. The values of the extracted watermarks using the proposed method for
compression attacks.
Quality
80%
40%
20%
10%
5%
36.24
33.92
32.18
29.98
27.16
DCT
JND
NC
JPEG
PSNR
Extracted
Watermark
1.00
NC
(a)
0.95
0.81
(b)
0.60
0.41
(c)
(d)
(e)
(f)
Fig. 2 the images after blurring and sharpening, where (a) to (c) correspond to blurring attacks
of different levels and (d) to (f) correspond to sharpening attacks of different levels.
97
Improving Watermark Performance by Using Bipolar Split
Table 2. The values of the extracted watermarks using the proposed method for blurring
and sharpening attacks.
Corresponding
(a)
(b)
(c)
(d)
(e)
(f)
to Fig. 2
37.65
33.91
31.15
32.60
22.33
18.01
NC
PSNR
Extracted
Watermark
1.00
NC
0.96
0.77
1.00
0.96
0.89
Table 3. The values of the extracted watermarks using the proposed method for noise
contamination attacks.
Variance
5
10
15
20
25
33.46
28.05
24.67
22.20
20.32
NC
PSNR
Extracted
Watermark
0.95
NC
Table 4. The
Ratio
NC
0.83
0.70
0.62
0.57
values of the extracted watermarks using the proposed method for cropping.
80%
60%
50%
40%
20%
Extracted
Watermark
0.83
NC
0.61
0.51
0.41
0.20
Table 5. The values of the extracted watermarks using the proposed method for rotation
attacks.
Degrees
20
30
40
50
60
0.87
0.84
0.83
0.83
0.84
Extracted
Watermark
NC
NC
98
理工研究學報
Table 6. The values of the extracted watermarks using the proposed method for various
special image-processing attacks
NC
Ripple
Facet
=30.1
Film Grain
=30.8
PSNR
=16.2
PSNR
=0.81
=0.85
NC
Print and Scan
=17.3662
=0.56
NC
Brightness/Contrast
adjustment
=12.2832
PSNR
PSNR
NC
Texturization
=19.183
PSNR
PSNR
=0.52
=0.71
NC
=0.64
NC
NC
Table 7. The values of the extracted watermarks using single watermark with double
strength method for JPEG compression attacks.
Quality
80%
40%
20%
10%
5%
34.74
33.01
31.59
29.63
26.95
NC
PSNR
Extracted
Watermark
NC
1.00
0.99
0.90
99
0.73
0.48
Improving Watermark Performance by Using Bipolar Split
Table 8. The values of the extracted watermarks using single watermark with double
strength method for blurring and sharpening attacks.
Attack
Blur_1
Blur_2
Blur_3 Sharpen_1 Sharpen_2 Sharpen_3
36.06
33.32
30.95
31.53
22.03
17.75
NC
PSNR
Extracted
Watermark
0.99
NC
0.93
0.71
0.99
0.93
0.82
Table 9. The values of the extracted watermarks using single watermark with double
strength method for noise contamination attacks.
Variance
5
10
15
20
25
32.62
27.83
24.55
22.15
20.28
NC
PSNR
Extracted
Watermark
0.99
NC
0.91
0.81
0.73
0.68
Table 10. The values of the extracted watermarks using single watermark with double
strength method for cropping.
Ratio
80%
60%
50%
40%
20%
NC
Extracted
Watermark
0.83
NC
0.61
0.51
0.41
0.20
Table 11. The values of the extracted watermarks using single watermark with double
strength method for rotation attacks.
Degrees
20
30
40
50
60
NC
Extracted
Watermark
NC
0.87
0.84
0.83
100
0.83
0.85
理工研究學報
Table 12. The values of the extracted watermarks using single watermark with double
strength method for scaling and print-and-scan attacks.
Attack
Quarter-size Print-and-scan
NC
Extracted
Watermark
NC
0.78
0.48
Fig. 3 Watermarked image quality comparison for the proposed method and the
double-strength scheme, where ‘×’: the former, ‘•’: the latter, the X-axis: different blocks
and the Y-axis: PSNR.
Table 13. The comparison of the extracted watermark similarity for JPEG2000 compression
attacks, where (1): Podilchuk’s scheme, (2): the proposed method.
Compression
80%
40%
20%
10%
Quality
SIM of (1)
0.99
0.94
0.66
0.26
SIM of (2)
0.99
0.97
0.78
0.35
Table 14. The comparison of the extracted watermark similarity for JPEG compression attacks,
where (1): Podilchuk’s scheme, (2): the proposed method.
Compression
80%
40%
20%
10%
5%
Quality
SIM of (1)
1.00
1.00
0.98
0.94
0.79
SIM of (2)
1.00
1.00
0.99
0.97
0.91
101
Improving Watermark Performance by Using Bipolar Split
Table 15. The comparison of the extracted watermark similarity for blurring and sharpening
attacks, where (1): Podilchuk’s scheme, (2): the proposed method.
Blur_1
Blur_2
Blur_3 Sharpen_1 Sharpen_2 Sharpen_3
SIM of (1)
0.98
0.86
0.54
0.96
0.83
0.68
SIM of (2)
0.99
0.94
0.73
0.98
0.93
0.83
Table 16. The comparison of the extracted watermark similarity for noise attacks,
where (1): Podilchuk’s scheme, (2): the proposed method.
Noise
5
10
15
20
25
Variance
SIM of (1)
0.99
0.98
0.96
0.93
0.90
SIM of (2)
1.00
0.99
0.98
0.97
0.95
Table 17. The comparison of the extracted watermark similarity for cropping attacks,
where (1): Podilchuk’s scheme, (2): the proposed method.
Cropping
80%
60%
50%
40%
20%
Ratio
SIM of (1)
0.95
0.88
0.82
0.77
0.56
SIM of (2)
0.95
0.86
0.79
0.75
0.55
Table 18. The comparison of the extracted watermark similarity for rotation attacks,
where (1): Podilchuk’s scheme, (2): the proposed method.
Rotation
20
30
40
50
60
Degrees
SIM of (1)
0.60
0.51
0.49
0.53
0.55
SIM of (2)
0.69
0.59
0.63
0.66
0.68
Table 19. The comparison of the extracted watermark similarity for scaling and print-and-scan
attacks, where (1): Podilchuk’s scheme, (2): the proposed method.
Attacks Quarter size Print and scan
SIM of (1)
0.66
0.68
SIM of (2)
0.83
0.78
102