You are on page 1of 6

Watermarking with Wavelets: Simplicity Leads to Robustness

Evelyn Brannock Michael Weeks


Computer Science Department Computer Science Department
Georgia State University Georgia State University
Atlanta, Georgia, USA 30303 Atlanta, Georgia, USA 30303
evelyn@cs.gsu.edu mweeks@ieee.org

Robert Harrison
Computer Science Department
Georgia State University
Atlanta, Georgia, USA 30303
rharrison@cs.gsu.edu

Abstract 1. Introduction

The protection of creative digital content poses a


difficult challenge to those who wish to retain control
of their work. Historically, U.S. copyright law has tried
With ubiquitous computing comes the access of copy- to provide protection for this intellectual property. The
righted work across computing platforms. One may improvements in digital technologies continue to ease
have the same image (or video) on an iPod, as well and increase the ways in which consumers can inno-
as a laptop and desktop computer. Safeguarding cre- cently use and enjoy creative content, for example, by
ative content and intellectual property in a digital form copying music files from a CD to store on a computer
has become increasingly difficult as technologies, such or portable music device. However, many cases are
as the Internet, broadband availability and mobile ac- not so innocent and the media in digital form are flaw-
cess, advance. It has grown to be progressively easier to lessly and inexpensively reproduced in great volumes
copy, modify and redistribute digital media, resulting in and instantaneously distributed worldwide for more ne-
great declines in business profits. Digital watermarking farious purposes such as digital piracy for profit. There-
is a steganographic technique that has been proposed fore, creators and owners of the work are concerned
as a possible solution to this problem. This paper exam- that unauthorized copying and redistribution of their
ines a technique for digital watermarking which utilizes copyrighted works will cause their economic returns to
properties of the Discrete Wavelet Transform (DWT). decline. Consequently, the study of technological ap-
The digital watermarking algorithm uses a database of proaches to solve this problem has become increasingly
multiple images with various properties. Eight fami- important and popular. One such approach is digital wa-
lies of wavelets, both orthogonal and biorthogonal, are termarking. Watermarks serve to identify the source of
compared for efficacy. To objectively measure the suc- the content and thus aid in investigating abusive dupli-
cess of the algorithm and the influence of the mother cation.
wavelet, the PSNR for each wavelet family and image The impact of the size and nature of the data on the
is obtained. Noise is introduced to simulate various at- robustness of the embedded watermark will be investi-
tacks. Objective measures are used to determine the gated, in an extension of [1]. An uncomplicated key will
performance of the algorithm. We find that the simpler be used. The size of the key will not have any effect on
wavelet transforms, e.g. the Haar wavelet, outperform the visibility of the watermark, but as in other crypto-
the more complex ones. graphic systems, for commercial applications it should
be large enough to make extensive search attacks more

978-1-4244-1884-8/08/$25.00 ©2008 IEEE 587

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
difficult. All of the test images are grayscale. (also asymmetric marking or private), in which the wa-
In this paper, the next section will cover the back- termark is embedded in the original host, and is inten-
ground and digital watermarking principles, section 3 tionally visible to the human observer. The original data
will cover wavelets, and then section 4 will discuss the is required for watermark extraction [1] [2]. The blind
method used. Section 5 presents results, and section 6 watermark has many more applications than the visible
concludes the paper. watermark. The subject of this paper is a blind water-
mark.
2. Digital Watermarking There are various watermarking applications for
images, as listed below [2] [5] [7].
2.1. Definition • Copyright protection is probably the most com-
mon use of watermarks today. Copyright owner
According to Hartung and Kutter, a digital water- information is embedded in the image in order to
mark is “a digital code unremovably, robustly, and im- prevent others from alleging ownership of the im-
perceptibly embedded in the host data and typically age.
contains information about origin, status, and/or des-
tination of the data” [2]. It is a form of steganogra- • The fingerprint embeds information about the le-
phy, because it hides the embedded data, often without gal receiver in the image. This involves embedding
the knowledge of the viewer or user. Since the purpose a different watermark into each distributed image
of steganography is the secret communication between and allows the owner to locate and monitor pirated
two persons, the watermark can be considered to have images that are illegally obtained.
been successfully attacked if its existence is determined.
When contrasting with steganography, watermarks add • Prevention of unauthorized copying is accom-
the property of robustness, which is the ability to with- plished by embedding information about how of-
stand most common attacks [1]. Attacks usually include ten an image can be legally copied. An ironic ex-
two types: removing the watermark and rendering the ample in which the use of a watermark might have
watermark undetectable [3]. Attack categorization may prevented the wholesale pilfering of an image is in
include (but are not limited to) [3] [4] [5]: the ubiquitous “Lena” image, which has been used
without the original owner’s permission.
• Adding noise such as Gaussian.
• In an image authentication application the intent
• Using linear filtering such as low-pass filtering. is to detect modifications to the data. The charac-
teristics of the image, such as its edges, are em-
• Compressing the image, such as JPEG does. bedded and compared with the current images for
differences.
• Applying transforms such as translation, rotation
and scaling.
2.3. Requirements
• Permuting the original signal by rerecording or
recapturing so that extracting the watermark is Obviously, an implicit requirement for a blind wa-
nearly impossible. termark is that it is invisible to the naked eye and should
look indistinguishable from the original. There are also
Even though the rise in popularity as a research other requirements for successful watermarking tech-
topic does not appear to have begun until the early niques. Literature lists the following common require-
1990’s, the watermark has a long and distinguished his- ments: robustness, imperceptible to statistical methods,
tory. The oldest watermarked paper has been dated back recovery with or without the original data, extraction or
to the 13th century when papermaking artisans needed verification of a given watermark, security issues and
to protect their provenance [6]. The analogy can be seen use of keys, speed, and capacity [1] [2] [4] [7].
to today’s watermarks; only the media is different. How can each of these requirements be scored and
evaluated? The ideal would be to gather a large sam-
2.2. Types and Applications ple of people to view the original host image, the wa-
termark, the host image containing the embedded wa-
There are two main types of watermarks. A blind termark, and the extracted watermark under excellent
(or public) watermark is invisible, and is extracted circumstances (good lighting, no distractions, etc.) be-
“blindly” without knowledge of the original host im- cause evaluation of the watermark involves the subjec-
age or the watermark itself. The second is non-blind tive judgment of the distortion introduced through the

588

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
process. (In general, there is a trade-off between wa- regions allow us to increase the robustness of our
termark robustness, watermark perceptibility and water- watermark, at little to no additional impact on image
mark payload) [8]. However, since this was not possi- quality [10]. The fact that the DWT is a multi-scale
ble for the paper, the Peak Signal-to-Noise Ratio was analysis can be used to the watermarking algorithm’s
utilized. The quality of an N × M host image ( f (x, y)) benefit. Multi-resolution is the process of taking a
is compared to the image containing the watermark filter’s output and putting through another pair of
(g(x, y)) using the formula, analysis filters. The first approximation will be used
as a “seed” image and recursively apply the DWT a
max pixel value second and third time (or however many times it is
PSNR(g, f ) = 20 × log10 
∑x,y ( f (x,y)−g(x,y))
2
necessary to perform to find all of the areas of interest)
size
[9]. See [14] for more background on wavelets, and
[13] for wavelet history.
2.4. Watermarking Techniques

All watermarking methods share a watermark em-


bedding system and a watermark extraction system [1] 4. Implementation
[2]. There are two main watermarking techniques avail-
able: spatial domain and frequency domain. The tech- A simple watermark raster bitmap image was em-
nique used in this paper will embed the watermark using bedded in each of the images. It was created by cutting
the Discrete Wavelet Transform, utilizing a frequency and pasting the word “Watermark” from a Microsoft
domain method. Word document into Adobe Photoshop. This exhibits
the use of text, such as the owner’s name, as a water-
mark image.
3. Wavelets

The Discrete Wavelet Transform (DWT) is cur-


rently used in a wide variety of signal processing ap-
plications, such as in audio and video compression, re- Figure 1. Watermark bitmap embedded
moval of noise in audio, and the simulation of wireless
antenna distribution. Wavelets have their energy con- There are numerous wavelets to choose from. Out
centrated in time and are well suited for the analysis of of the box, MATLAB offers a plethora of choices [11].
transient, time-varying signals. Since most of the real- This paper focuses on the question: Is there a best se-
life signals encountered are time varying in nature, the lection that can be made for an application? Since a
Wavelet Transform suits many applications very well unique answer to this question was not discovered, eight
[9]. differing popular wavelets were used to implement for
We use the DWT to implement a simple water- comparison and contrast; the Haar wavelet, the or-
marking scheme. The 2-D discrete wavelet transform thogonal, 4-coefficient, Daubechies wavelet (e.g. db2),
(DWT) decomposes the image into sub-images, 3 de- the 32nd order Daubechies wavelet (e.g. db32), three
tails and 1 approximation. The approximation looks just biorthogonal wavelets, including a reverse biorthogo-
like the original; only on 1/4 the scale. nal wavelet (bior2.2, bior5.5, rbio6.8), the symlet 8-
The 2-D DWT is an application of the 1-D DWT coefficient wavelet and the 4th order coiflet wavelet.
in both the horizontal and the vertical directions.
The DWT separates an image into a lower resolution 4.1. Images Used
approximation image (LL) as well as horizontal (HL),
vertical (LH) and diagonal (HH) detail components. Varying sizes, complexity and types of images
The low-pass and high-pass filters of the wavelet were chosen. All images are grayscale. The image
transform naturally break a signal into similar (low- database consists of:
pass) and discontinuous/rapidly-changing (high-pass)
• “Barbara” - 512 x 512 pixels
sub-signals. The slow changing aspects of a signal are
preserved in the channel with the low-pass filter and • “Boat” - 512 x 512 pixels [15]
the quickly changing parts are kept in the high-pass
filter’s channel. Therefore we can embed high energy • “Box” - 256 x 256 pixels
watermarks in the regions that human vision is less • “Cameraman” - 256 x 256 pixels (available at [15])
sensitive to, such as the high resolution detail bands
(LH, HL, and HH). Embedding watermarks in these • “Cell” - 190 x 158 pixels

589

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
• “Circuit” - 272 x 280 pixels horizontal and vertical details is found, and if that corre-
lation exceeds a threshold (the mean of the correlation),
• “Dog on Porch” - 256 x 256 pixels [9] a pixel in the watermark is located. yi is a candidate
• “Eight Coins” - 242 x 308 pixels pixel of the watermark and M is the length of the water-
mark.
• “Filopodia” - 640 x 480 pixels (thanks to Dr. Vin- 1
cent Rehder at Georgia State University)
z= ∑ Wi∗ × yi [12]
M 1,M

• “France” - 672 x 496 pixels (a converted Power- Finally the extracted watermark is written and the
Point slide [15]) PSNR is calculated.

• “Frog” - 620 x 498 pixels [15]


5. Results
• “Gold Hill” - 512 x 512 pixels [15]
The following images (figure 2 and 3) are the
• “Lena” - 512 x 512 pixels results of the watermarking implementation in this
project. For brevity, the watermarked images have been
• “Mandrill” - 512 x 512 pixels (available at [15])
resized from their original size and not all of the re-
• “Moon” - 358 x 536 pixels covered watermarks are pictured. Twenty pristine orig-
inal images, with eight wavelet families, and three types
• “Mountain” - 640 x 580 pixels [15] of noise introduced results in 640 watermarked images
and 640 recovered watermarks. The watermarks in fig-
• “MRI” - 128 x 128 pixels
ure 2 are all from the Lena image, encoded from left to
• “Peppers” - 512 x 512 pixels [15] right with the Haar wavelet, Daubechies-4 coefficient
wavelet, and the biorthogonal 2.2 wavelet. In figure
• “Pout” - 240 x 290 pixels 3, we see the recovered watermarks from the Frog im-
age [15], with Gaussian noise, and encoded from left
• “Zelda” - 512 x 512 pixels [15]
to right with the Haar wavelet, the biorthogonal 5.5,
and the symlet 8 coefficient wavelet. Clearly, the wa-
4.2. Algorithm
termarks encoded with the Haar wavelet were the best
The 2-D DWT is applied to the image, giving four ones recovered. These recovered watermarks are repre-
quadrants 1/4 the size of the original image, and produc- sentative; each image in the database had corresponding
ing the two matrices of coefficients that will be manip- visual results.
ulated, the horizontal details (HL) and vertical details
(LH). A pseudo random noise pattern is generated us-
ing the secret key image as a seed, and each of the bits
of the watermark are embedded in the horizontal (HL)
and vertical (LH) coefficient sub-bands using this pat-
tern. The equation used to embed the watermark is: Figure 2. Watermark Images Recovered from
Lena: Haar, DB2, and Bior2.2
Wi = Wi + α Wi xi for all pixels in LH, HL

Wi = Wi for all pixels in HH, LL[12]


Wi is the watermarked image, Wi is the original image,
and α is a scaling factor. Increasing α increases the ro- Figure 3. Watermark Images Recovered from
bustness of the watermark, but decreases the quality of Frog (with Gaussian noise): Haar, Bior5.5, and
the watermarked image. We use the same α (the con- Symlets8
stant 2 on a scale of 1 to 5) as used in [12]. Finally, we
write the image, and calculate the PSNR. The five tables shown represent the statistics ob-
To extract the watermark, we apply the 2-D inverse tained. The first table examines the watermark embed-
DWT to the possibly corrupted watermarked image Wi∗ . ding process, showing the average, minimum and max-
The same secret key is used to seed the random function imum PSNRs. The second table shows, for the entire
and to generate the pseudo random noise pattern. The image database, the average PSNR obtained for each
correlation, z, between the pseudo random noise and the type of noise, including Gaussian, salt and pepper, and

590

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
Table 1. Watermark Embedding Table 3. Sample Data for Watermark Extraction

Average Minimum Maximum Wavelet Image PSNR Image PSNR


Wavelet PSNR PSNR PSNR Haar Barbara 6.11 Frog 6.11
Haar 25.5674 25.1307 28.1656 Daubechies 5.82 5.81
Daubechies 23.2076 17.1497 26.3296 Daubechies 32 5.94 5.94
Daubechies 32 20.0191 20.8266 26.9422 Bior 2.2 6.02 6.04
Bior 2.2 23.5340 18.0592 27.8657 Bior 5.5 5.92 5.92
Bior 5.5 24.3510 19.0025 26.4089 Symlets 8 5.93 5.93
Symlets 8 23.7301 18.2345 26.5825 Coiflets 4 5.93 5.94
Coiflets 4 23.8802 18.5406 26.7399 Rev. Bior 6.8 5.94 5.95
Rev. Bior 6.8 23.7707 18.9390 26.5306 Haar Box 6.10 Lena 6.11
All 23.5075 17.1497 28.1656 Daubechies 5.87 5.80
Daubechies 32 5.94 5.94
Bior 2.2 5.98 6.03
Bior 5.5 5.93 5.92
Table 2. Watermark Embedding with Noise Symlets 8 5.93 5.93
Salt and Coiflets 4 5.93 5.94
Speckle Gaussian Pepper Rev. Bior 6.8 5.94 5.95
Average Average Average Haar Camera- 6.06 Mandrill 6.11
Wavelet PSNR PSNR PSNR Daubechies man 5.86 5.82
Haar 25.56 25.57 25.65 Daubechies 32 5.94 5.94
Daubechies 18.15 18.02 16.73 Bior 2.2 5.98 6.02
Daubechies 32 19.56 19.40 18.22 Bior 5.5 5.93 5.92
Bior 2.2 20.06 19.93 18.71 Symlets 8 5.94 5.93
Bior 5.5 18.83 18.72 17.54 Coiflets 4 5.94 5.94
Symlets 8 19.08 18.96 17.78 Rev. Bior 6.8 5.94 5.94
Coiflets 4 19.19 19.08 17.89 Haar Cell 6.01 Moon 6.11
Rev. Bior 6.8 19.20 19.08 17.91 Daubechies 5.88 5.82
Daubechies 32 5.94 5.93
Bior 2.2 5.97 6.04
Bior 5.5 5.93 5.91
speckled. The third displays data for a small sample Symlets 8 5.94 5.93
of the images for the watermark recovery process. The Coiflets 4 5.94 5.93
fourth table examines the watermark extraction results, Rev. Bior 6.8 5.94 5.94
without noise, and the fifth table adds noise into the
amalgamation. PSNR values at least 25 dB are, theo-
retically, the least perceptible to the human eye.
Table 4. Watermark Extraction
First, the watermark is embedded in the original
image. No noise is introduced into the image. To sim- Average Minimum Maximum
ulate effects of such innocent problems such as trans- Wavelet PSNR PSNR PSNR
mission errors, or perhaps alterations of the image for Haar 6.094 6.056 6.109
other more nefarious reasons, three types of noise are
Daubechies 5.832 5.796 5.895
then independently applied to the image to simulate im-
Daubechies 32 5.938 5.933 5.944
age corruption. The Gaussian white noise added had a
Bior 2.2 6.010 5.970 6.040
zero mean noise with 0.01 variance. The salt and pepper
Bior 5.5 5.924 5.912 5.932
noise had noise density of 0.04, affecting approximately
Symlets 8 5.930 5.924 5.939
4% of the pixels. Lastly, the speckle added multiplica-
tive noise that is uniformly distributed random noise Coiflets 4 5.935 5.931 5.939
with mean 0 and variance 0.04. Then the watermark is Rev. Bior 6.8 5.943 5.937 5.951
extracted from the noisy image. The results are shown All 5.95 5.932 5.968
in the tables.

591

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
techniques,“ Proceedings of the IEEE, Volume 87, Issue
Table 5. Watermark Extraction with Noise 7, 1999, pages 1079-1107.
Salt and [3] Darko Kirovski and Fabian A. P. Petitcolas, “Blind Pat-
Speckle Gaussian Pepper tern Matching Attack on Watermarking Systems,” IEEE
Average Average Average Transactions on Signal Processing, Volume 51, Number
Wavelet PSNR PSNR PSNR 4, 2003, pages 1045-1053.
Haar 6.074 6.077 6.066 [4] F. A. P. Petitcolas, “Watermarking Schemes Evaluation”
Daubechies 5.858 5.859 5.866 IEEE Signal Processing Magazine, Volume 17, Septem-
Daubechies 32 5.938 5.938 5.938 ber 2000. pages 58-64.
Bior 2.2 5.988 5.988 5.983 [5] F. Hartung and M. Kutter, Stefan Katzenbeisser and Fa-
bien A. P. Petitcolas, editors, Information Hiding Tech-
Bior 5.5 5.929 5.929 5.930
niques for Steganography and Digital Watermarking,
Symlets 8 5.933 5.934 5.934 Artech House, 2000.
Coiflets 4 5.936 5.936 5.936 [6] J. Weiner and K. Mirkes, Watermarking, Inst. Paper
Rev. Bior 6.8 5.942 5.942 5.941 Chemistry, Appleton, WI, 1972.
[7] Juergen Seitz, Digital Watermarking for Digital Media,
Information Science Publishing, 2005.
[8] Neil F. Johnson, Zoran Duric, and Sushil Jajodia, In-
6. Conclusions formation Hiding : Steganography and Watermarking -
Attacks and Countermeasures (Advances in Information
Our study shows that watermarking with the Haar Security, Volume 1) (Advances in Information Security),
wavelet outperforms the other watermarking transforms Kluwer Academic Publishers, Norwell, MA, 2006.
[9] Michael Weeks, Digital Signal Processing Using MAT-
tested, with 2 dB for embedding watermarks (Table
LAB and Wavelets, Infinity Science Press, 2006.
I), 6-7 dB for embedding with noise (Table II), and is
[10] G. Langelaar, I. Setyawan, and R. L. Lagendijk, “Wa-
slightly better (about 3%) than other transforms tested termarking Digital Image and Video Data,” IEEE Sig-
for watermark extraction (examples in Table III, aver- nal Processing Magazine, Number 17, September 2000,
ages in Table IV) and watermark extraction with noise pages 20-43.
(Table V). [11] MATLAB Documentation, Image Processing Toolbox
The Discrete Wavelet Transform has historically User’s Guide, Release 14, The MathWorks, Inc. 3 Apple
shown its suitability for watermarking applications. It Hill Drive, Natick, MA 01760-2098, 2006.
effectively allows the embedding of a watermark at [12] H. Inoue, A. Miyazaki and T. Katsura, “An image water-
higher level frequencies, which are not as visible to the marking method based on the wavelet transform,” ICIP
99. Proceedings. 1999 International Conference on Im-
human eye, via the access to the wavelet coefficients in
age Processing, (1), 1999, pages 296-300.
the HL and LH detail sub-bands. However, not much
[13] Stephane Jaffard, Yves Meyer and Robert D. Ryan,
attention has been given to which wavelet may be pre- Wavelets Tools for Science and Technology, Society for
ferred. For both the impact on the original image and Industrial and Applied Mathematics (SIAM), 2001.
for the recovery of the embedded watermark, the Haar [14] Stephane Mallat, “A Theory for Multiresolution Sig-
wavelet, both visually and objectively by measured by nal Decomposition: The Wavelet Representation,” IEEE
PSNR, outperforms the other families tested. This re- Pattern Analysis and Machine Intelligence, Volume 11,
mains true when three types of noise are added, includ- Number 7, 1989, pages 674-693.
ing Gaussian, speckled and salt and pepper, as well as [15] Some test images are from: E.R. Vrscay, F. Men-
when the watermarked image remains uncorrupted. In divil, H. Kunze, D. La Torre, S.K. Alexander,
almost every situation the Haar wavelet repeatedly out- and Bruno Forte, “Waterloo Repertoire GreySet
(1 and 2)”, Waterloo Fractal Coding and Analy-
performs the others. Therefore, the size, type and com-
sis Group website, Accessed October 2007, Uni-
plexity of the image, and the introduction of noise does
versity of Waterloo, Waterloo, Ontario, Canada,
not seem to change the advantage that the simple, but http://links.uwaterloo.ca/greyset1.ba-
effective, Haar Wavelet displays for this watermarking se.html and http://links.uwaterloo.ca/-
application. greyset2.base.html.

References
[1] F. A. P. Petitcolas, R.J. Anderson, R. J. and M. G. Kuhn,
“Information hiding - A survey,” Proceedings of the
IEEE, Volume 87, Issue 7, 1999, pages 1062-1078.
[2] F. Hartung and M. Kutter, “Multimedia watermarking

592

Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.

You might also like