Professional Documents
Culture Documents
to improve visual quality. One of the four trees is quantized difference is greater than the adaptive threshold value;
according to the binary value of the two embedded otherwise, a watermark bit 0 is extracted. Experimental
watermark bits. But these methods [9-11] cannot effectively results show that the proposed method is very efficient for
resist the attacks of low-pass filtering for JPEG resisting various kinds of attacks.
compression. In this paper, propose a blind watermarking
method based on wavelet tree quantization. 2. Watermarking by Quantization of Wavelet
Trees
the local second maximum wavelet coefficient of the ith Otherwise, the embed a watermark bit 0 according to Eq. (7)
wavelet tree, 1≤ i ≤ Nw. If the embedded watermark bit is 1, as follows:
the local maximum coefficient is not quantized under if (seci < 0 ), than maxinew = 0, secinew = 0;
Maximum (ε ,T) Δi ≥ ε and is quantized under Δi <
Maximum (ε ,T) . If the embedded watermark bit is 0, the otherwise maxinew = seci (7)
local maximum coefficient is quantized by setting the local
maximum coefficient = local second maximum coefficient. Where secinew denotes the new second maximum coefficient
in the ith wavelet tree after embedding the watermark bit 0.
When embedding a watermark bit 1, the maximum local
2.3 Watermark Embedding
Let maxi and seci be the local maximum wavelet significant coefficient is quantized and added by an
incremental β if Δi < Maximum (ε, T); otherwise (i.e., Δi ≥
coefficient and the local second maximum wavelet
Maximum (ε, T)), it is kept the same as before. The reason
coefficient in a wavelet tree; the difference between both of
for not quantizing the maximum local significant coefficient
them is named as the local significant difference. The select is that we won’t increase the distortion of the image. Some
a threshold value β as an increment for quantization. The images having small ε imply that their significant difference
larger the β is, the better robustness but the worse distortion is not obvious. We need an extra parameter T to improve the
of the watermarked image will be. Each time at embed a robustness. The larger the T is, the higher probability the
watermark bit and quantize the maximum coefficient in a maxi is quantized to a larger value; but, in the meanwhile,
wavelet tree. the more distortion of the image will be as well. For
example, let ε =12 and Δi = 13. Suppose T is set to be less
if (maxi < 0), then maxi = 0 (2) than ε, such as T =11, maxi will not be quantized as Δi >ε
=12. On the other hand, if T is set to be larger than ε, such
Δi = maxi − seci, (3) as T =14, maxi will be quantized and increased by β as Δi
<T=14. On the contrary, when embedding a watermark bit
Where Δi denotes the significant difference between the 0, the value of maxi is quantized by decreasing to the local
maximum coefficient and the second maximum coefficient second maximum seci and hence the new Δi will be equal to
in the ith wavelet tree of Nw. Because some maximum 0. Based on this strategy, there exists a large 91 energy
coefficients in a wavelet tree may be a negative value, and a difference between embedding watermark bit 1 and
positive value has higher robustness than a negative value watermark bit 0.
under attacks, it will result in Δi more significant if we
modify the maximum coefficient from a negative value to a 3. Design of Watermark Decoder
positive value. When the Δi is more significant, it will be
more accurate at extracting watermark. To achieve the new 3.1 The Decoder Design
maximum coefficient be positive and to decrease the In the proposed method, neither an original image nor an
original watermark image is required for the extraction
distortion of watermarked image due to quantization, the
process. During the embedding process, embed a watermark
new maximum coefficient is set to a smallest positive value
bit 1 by adding an energy β (or β × γ ) to the local maximum
zero here.
wavelet coefficient in the wavelet tree, and embed a
When embed a watermark bit 1, the maxi is quantized by watermark bit 0 by setting maxi = seci Hence, if the
wavelet tree was embedded a watermark bit 0, the local
maxinew = maxi ,if (Δi ≥ Maximum (ε, T)) (4) significant difference between the largest two coefficients
will be close to zero; otherwise, if the wavelet tree was
maxinew = maxi + β, if (Δi < Maximum (ε ,T) embedded a watermark bit 1, the local significant difference
and maxi is root) (5) between the largest two coefficients will be greater than β.
In order to extract watermark bits correctly and the value
maxinew = maxi + β × γ , if (Δi < Maximum(ε ,T) of y by Eq. (8).
and maxi is root) (6)
1 Nw × α
Where maxinew denotes the new maximum coefficient in y = --------- ∑ ϕ j ------ (8)
the ith wavelet tree after embedding the watermark bit. The Nw × α j = 1
maxi located at lower resolution level (child node) is less
robust than those located at higher resolution levels (root Where φ = {max1 - sec1 ,max2 - sec2 ,…..,maxi - seci }, for
node). The reason has been stated in Section II-B. i=1,2,…,N; the sorted φ is denoted as ϕ (φ) = { ϕ1,ϕ 2
According to the band sensitivity, the coefficients quantized ...ϕ Nw }, ϕ1 < ϕ 2 < .... < ϕ Nw ; α is the scale
at different resolution level are given different weights. The parameter, 0 < α ≤ 1; α is crucial to y and is used to
quantized coefficient at the lower resolution level is given a determine how many percentages of the significant
heavier weight than that at the higher resolution level. difference in φ can be used for the average. Hence, α marks
Hence, if the maxi does not locate at the highest resolution the minimal y value for extracting the watermark. The
level, we will quantize the maxi by adding γ times of β larger α is, the larger the y will be. Suppose all embedded
energy, here γ is a scale parameter and we set γ =1.5. watermark bits are 1 in the watermark. This means that the
(IJCNS) International Journal of Computer and Network Security, 53
Vol. 2, No. 3, March 2010
difference between the maximum wavelet coefficients and The peak signal-to-noise ratio (PSNR) to evaluate the
the second maximum wavelet coefficients for any embedded quality between the attacked image and the original image.
wavelet tree is greater than β. The value of α should be set After extracting the watermark, the normalized correlation
as small as possible to avoid extraction errors (see Eq. coefficient (NC) is computed using the original watermark
(9),(10)); the reason for this is that it can exclude those big and extracted watermark to judge the existence of the
significant differences of the embedded wavelet trees in Eq. watermark. The value of the NC coefficient is defined as
(8). On the other hand, if all embedded watermark bits are 0 follows:
in the watermark, the value of α must be set as large as
possible. Therefore, α is sensitive to the content of the 1 w h -1 w w -1
watermark. NC = ----------- ∑ ∑ w (i, j) × w ' (i, j) (11)
wh ×ww i = 0 j = 0
3.2 Watermark Extraction
Following Eqs. (8),(9) and (10), it would be easy to extract Where wh and ww are the height and width of the
the watermark. If the local significant difference is greater watermark. w (i, j) and w' (i, j) are the values of the
than or equal to y, where 0 < y ≤ β, then the embedded coordinate (i, j) in the original watermark and the extracted
watermark bit could be 1; otherwise, the embedded watermark, respectively. Here w (i, j) is set to 1 if it is a
watermark bit could be 0. The watermark bit can be watermark bit 1; otherwise, it is set to -1. w' (i, j) is set in
extracted based on Eq. (9) and (10) as follows: the same way. So the value of w(i, j) × w' (i, j) is either -1 or
1.
watermark bit = 1, if (maxi - seci ) > y (9)
Table 1: Normalized Correlation Coefficients (NC) after
watermark bit = 0, otherwise (10) Attacks by JPEG Compression with the Quality Factors
(QF) 10, 20, 30, 40, 50, 60, 70, 80, 90, AND 100.
Normalized
Quality Factors Correlation Extracted
(QF) Coefficients Watermark
(NC)
10 0.33
20 0.65 E
30 0.78 ES
40 0.82 E A
ESHA 50 0.89 ES
(a) (b)
60 0.96 ESH
Figure 3. (a) The original image of Lena of size 512×512.
(b) The original binary watermark of size 32×16. 70 1 ESHA
80 1 ESHA
90 1 ESHA
100 1 ESHA
decreased. The less the quality factor is, the more vague the In this paper, propose a wavelet-tree-based blind
extracted watermark is. watermarking method by quantizing the maximum wavelet
coefficient in a wavelet tree. Embed a watermark bit by
quantizing the maximum wavelet coefficient in a wavelet
tree. The trees are so quantized that they exhibit a
4.1 Experiment Analysis sufficiently large enough energy difference between a
Compare the proposed method with BKL [9], EL [10], watermark bit 0 and a watermark bit 1, which difference,
and SHW [11] using the Lena image. The watermark denoted as significant difference, is then useful for later
consists of 256 bit 1and 256 bit 0. The results are shown in watermark extraction. During extraction, an adaptive
Table 2. From Table 2, the PSNR of the proposed method is threshold value is designed. The magnitude of the
better than those of [11]. In this method, it is not so good for significant difference in a wavelet tree is compared to the
the rotation attacks with degree greater than ± 0.70; but it is adaptive threshold value. Furthermore, regarding each
far better than the listed methods; especially for low pass wavelet tree embedded with a watermark bit, we not only
filtering attacks for JPEG compression. can embed more bits in an image but can extract the
watermark without any need of the original image and
Table 2: Comparison of the Proposed Method and the watermark. Moreover by designing an adaptive threshold
Methods in [9], 10] and [11]. value in the extraction process. In addition to the copyright
protection, the proposed method can also be applied to data
hiding and image authentication.
Attacks / SHW EL BKL Proposed
NC PSNR = PSNR= PSNR= Method
38.2dB 40.6dB 41.54dB PSNR =
References
41.88dB
[1] D. P. Mukherjee, S. Maitra, and S. T. Acton, "Spatial
JEPG NA 0.15 0.17 0.33 domain digital watermarking of multimedia objects for
(QF = buyer authentication," IEEE Trans. Multimedia, vol. 6,
10) pp. 1-15, Feb. 2004.
[2] N. Nikolaidis and I. Pitas, "Robust image watermarking
JEPG NA 0.34 0.61 0.65 in the spatial domain," Signal Processing, vol. 66, pp.
(QF = 385-403, 1998.
20)
[3] A. K. Mahmood and A. Selin,"Spatially adaptive
JEPG 0.15 0.52 0.79 0.78
wavelet thresholding for image
(QF = watermarking,"presented at Proc.IEEE ICME, Toronto,
30) 2006 of Conference.
[4] J. R. Hernandez, M. Amado, and F. Perez- Gonzalez,
JEPG 0.23 0.52 0.83 0.82 "DCT- omain watermarking techniques for still images:
(QF = detector performance analysis and a new structure,"
40) IEEE Trans.Image Processing, vol. 9, pp.55- 68, Jan.
2000.
JEPG 0.28 0.52 0.89 0.89 [5] L. Sin-Joo and J. Sung-Hwan, "A survey of
(QF =
watermarking techniques applied to multimedia," in
50)
Proc. IEEE ISIE 2001, pp. 272-277
JEPG 0.46 0.59 0.94 0.96 [6] V. M. Potdar, S. Han, and E. Chang,"A survey of digital
(QF = image watermarking techniques,"presented at Proc.
60) IEEE INDIN 2005 of Conference.
[7] H. J. Wang, P. C. Su, and C. C. J. Kuo, "Wavelet-based
JEPG 0.57 0.63 0.97 1 digital image watermarking," Optics Express,vol.3, pp.
(QF = 491- 496, Dec. 1998.
70) [8] M. Hsieh, D. Tseng, and Y. Huang, "Hiding digital
watermarks using multiresolution wavelet transform,"
JEPG 0.89 0.71 0.99 1
IEEE Trans. Ind. Electron., vol. 48, pp. 875-882, Oct.
(QF =
80)
2001.
[9] B. K. Lien and W. H. Lin,"A watermarking method
JEPG 1 0.78 1 1 based on maximum distance wavelet tree
(QF = quantization," presented at 19th Conf. Computer
90) Vision, Graphics and Image Processing, 2006 of
Conference.
JEPG 1 0.88 1 1 [10] E. Li, H. Liang, and X. Niu,"An integer wavelet based
(QF = multiple logo-watermarking scheme," presented at
100) Proc. IEEE WCICA, 2006 of Conference.
[11] S. H. Wang and Y. P. Lin, "Wavelet tree quantization
5. Conclusion for copyright protection watermarking," IEEE Trans.
(IJCNS) International Journal of Computer and Network Security, 55
Vol. 2, No. 3, March 2010
Image Processing, vol. 13, pp. 154-165, Feb. 2004. Guide Award” five times from Tamil Nadu state Government. He
[12] G. C. Langelaar and R. L. Lagendijk, "Optimal is also the recipient of “Best Outstanding Fellow Corporate
differential energy watermarking of DCT encoded Member Award” by Institution of Engineers (IE),India -2004 and
“Jewel of India” Award by International Institute of Education and
images and video,"IEEE Trans. Image Processing,
Management, New Delhi–2004 and “Bharatiya Vidya Bhavan
vol. 10, pp. 148-158, Jan.2001. National Award for Best Engineering College Principal 2005” by
Indian Society for Technical Education (ISTE). “Education
[13] F. A. P. Petitcolas, Weakness of existing watermark Excellence Award” by All India Business& Community
Scheme 1997[online] Available: Foundation, New Delhi.
http://www.petitcolas.net/fabien/watermarking/stirma
rk/index.html.
[14] PhotoImpact 11 software, http://www.ulead.com,
Ulead system, Inc.
Authors Profile