Professional Documents
Culture Documents
Robert Harrison
Computer Science Department
Georgia State University
Atlanta, Georgia, USA 30303
rharrison@cs.gsu.edu
Abstract 1. Introduction
Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
difficult. All of the test images are grayscale. (also asymmetric marking or private), in which the wa-
In this paper, the next section will cover the back- termark is embedded in the original host, and is inten-
ground and digital watermarking principles, section 3 tionally visible to the human observer. The original data
will cover wavelets, and then section 4 will discuss the is required for watermark extraction [1] [2]. The blind
method used. Section 5 presents results, and section 6 watermark has many more applications than the visible
concludes the paper. watermark. The subject of this paper is a blind water-
mark.
2. Digital Watermarking There are various watermarking applications for
images, as listed below [2] [5] [7].
2.1. Definition • Copyright protection is probably the most com-
mon use of watermarks today. Copyright owner
According to Hartung and Kutter, a digital water- information is embedded in the image in order to
mark is “a digital code unremovably, robustly, and im- prevent others from alleging ownership of the im-
perceptibly embedded in the host data and typically age.
contains information about origin, status, and/or des-
tination of the data” [2]. It is a form of steganogra- • The fingerprint embeds information about the le-
phy, because it hides the embedded data, often without gal receiver in the image. This involves embedding
the knowledge of the viewer or user. Since the purpose a different watermark into each distributed image
of steganography is the secret communication between and allows the owner to locate and monitor pirated
two persons, the watermark can be considered to have images that are illegally obtained.
been successfully attacked if its existence is determined.
When contrasting with steganography, watermarks add • Prevention of unauthorized copying is accom-
the property of robustness, which is the ability to with- plished by embedding information about how of-
stand most common attacks [1]. Attacks usually include ten an image can be legally copied. An ironic ex-
two types: removing the watermark and rendering the ample in which the use of a watermark might have
watermark undetectable [3]. Attack categorization may prevented the wholesale pilfering of an image is in
include (but are not limited to) [3] [4] [5]: the ubiquitous “Lena” image, which has been used
without the original owner’s permission.
• Adding noise such as Gaussian.
• In an image authentication application the intent
• Using linear filtering such as low-pass filtering. is to detect modifications to the data. The charac-
teristics of the image, such as its edges, are em-
• Compressing the image, such as JPEG does. bedded and compared with the current images for
differences.
• Applying transforms such as translation, rotation
and scaling.
2.3. Requirements
• Permuting the original signal by rerecording or
recapturing so that extracting the watermark is Obviously, an implicit requirement for a blind wa-
nearly impossible. termark is that it is invisible to the naked eye and should
look indistinguishable from the original. There are also
Even though the rise in popularity as a research other requirements for successful watermarking tech-
topic does not appear to have begun until the early niques. Literature lists the following common require-
1990’s, the watermark has a long and distinguished his- ments: robustness, imperceptible to statistical methods,
tory. The oldest watermarked paper has been dated back recovery with or without the original data, extraction or
to the 13th century when papermaking artisans needed verification of a given watermark, security issues and
to protect their provenance [6]. The analogy can be seen use of keys, speed, and capacity [1] [2] [4] [7].
to today’s watermarks; only the media is different. How can each of these requirements be scored and
evaluated? The ideal would be to gather a large sam-
2.2. Types and Applications ple of people to view the original host image, the wa-
termark, the host image containing the embedded wa-
There are two main types of watermarks. A blind termark, and the extracted watermark under excellent
(or public) watermark is invisible, and is extracted circumstances (good lighting, no distractions, etc.) be-
“blindly” without knowledge of the original host im- cause evaluation of the watermark involves the subjec-
age or the watermark itself. The second is non-blind tive judgment of the distortion introduced through the
588
Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
process. (In general, there is a trade-off between wa- regions allow us to increase the robustness of our
termark robustness, watermark perceptibility and water- watermark, at little to no additional impact on image
mark payload) [8]. However, since this was not possi- quality [10]. The fact that the DWT is a multi-scale
ble for the paper, the Peak Signal-to-Noise Ratio was analysis can be used to the watermarking algorithm’s
utilized. The quality of an N × M host image ( f (x, y)) benefit. Multi-resolution is the process of taking a
is compared to the image containing the watermark filter’s output and putting through another pair of
(g(x, y)) using the formula, analysis filters. The first approximation will be used
as a “seed” image and recursively apply the DWT a
max pixel value second and third time (or however many times it is
PSNR(g, f ) = 20 × log10
∑x,y ( f (x,y)−g(x,y))
2
necessary to perform to find all of the areas of interest)
size
[9]. See [14] for more background on wavelets, and
[13] for wavelet history.
2.4. Watermarking Techniques
589
Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
• “Circuit” - 272 x 280 pixels horizontal and vertical details is found, and if that corre-
lation exceeds a threshold (the mean of the correlation),
• “Dog on Porch” - 256 x 256 pixels [9] a pixel in the watermark is located. yi is a candidate
• “Eight Coins” - 242 x 308 pixels pixel of the watermark and M is the length of the water-
mark.
• “Filopodia” - 640 x 480 pixels (thanks to Dr. Vin- 1
cent Rehder at Georgia State University)
z= ∑ Wi∗ × yi [12]
M 1,M
• “France” - 672 x 496 pixels (a converted Power- Finally the extracted watermark is written and the
Point slide [15]) PSNR is calculated.
590
Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
Table 1. Watermark Embedding Table 3. Sample Data for Watermark Extraction
591
Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.
techniques,“ Proceedings of the IEEE, Volume 87, Issue
Table 5. Watermark Extraction with Noise 7, 1999, pages 1079-1107.
Salt and [3] Darko Kirovski and Fabian A. P. Petitcolas, “Blind Pat-
Speckle Gaussian Pepper tern Matching Attack on Watermarking Systems,” IEEE
Average Average Average Transactions on Signal Processing, Volume 51, Number
Wavelet PSNR PSNR PSNR 4, 2003, pages 1045-1053.
Haar 6.074 6.077 6.066 [4] F. A. P. Petitcolas, “Watermarking Schemes Evaluation”
Daubechies 5.858 5.859 5.866 IEEE Signal Processing Magazine, Volume 17, Septem-
Daubechies 32 5.938 5.938 5.938 ber 2000. pages 58-64.
Bior 2.2 5.988 5.988 5.983 [5] F. Hartung and M. Kutter, Stefan Katzenbeisser and Fa-
bien A. P. Petitcolas, editors, Information Hiding Tech-
Bior 5.5 5.929 5.929 5.930
niques for Steganography and Digital Watermarking,
Symlets 8 5.933 5.934 5.934 Artech House, 2000.
Coiflets 4 5.936 5.936 5.936 [6] J. Weiner and K. Mirkes, Watermarking, Inst. Paper
Rev. Bior 6.8 5.942 5.942 5.941 Chemistry, Appleton, WI, 1972.
[7] Juergen Seitz, Digital Watermarking for Digital Media,
Information Science Publishing, 2005.
[8] Neil F. Johnson, Zoran Duric, and Sushil Jajodia, In-
6. Conclusions formation Hiding : Steganography and Watermarking -
Attacks and Countermeasures (Advances in Information
Our study shows that watermarking with the Haar Security, Volume 1) (Advances in Information Security),
wavelet outperforms the other watermarking transforms Kluwer Academic Publishers, Norwell, MA, 2006.
[9] Michael Weeks, Digital Signal Processing Using MAT-
tested, with 2 dB for embedding watermarks (Table
LAB and Wavelets, Infinity Science Press, 2006.
I), 6-7 dB for embedding with noise (Table II), and is
[10] G. Langelaar, I. Setyawan, and R. L. Lagendijk, “Wa-
slightly better (about 3%) than other transforms tested termarking Digital Image and Video Data,” IEEE Sig-
for watermark extraction (examples in Table III, aver- nal Processing Magazine, Number 17, September 2000,
ages in Table IV) and watermark extraction with noise pages 20-43.
(Table V). [11] MATLAB Documentation, Image Processing Toolbox
The Discrete Wavelet Transform has historically User’s Guide, Release 14, The MathWorks, Inc. 3 Apple
shown its suitability for watermarking applications. It Hill Drive, Natick, MA 01760-2098, 2006.
effectively allows the embedding of a watermark at [12] H. Inoue, A. Miyazaki and T. Katsura, “An image water-
higher level frequencies, which are not as visible to the marking method based on the wavelet transform,” ICIP
99. Proceedings. 1999 International Conference on Im-
human eye, via the access to the wavelet coefficients in
age Processing, (1), 1999, pages 296-300.
the HL and LH detail sub-bands. However, not much
[13] Stephane Jaffard, Yves Meyer and Robert D. Ryan,
attention has been given to which wavelet may be pre- Wavelets Tools for Science and Technology, Society for
ferred. For both the impact on the original image and Industrial and Applied Mathematics (SIAM), 2001.
for the recovery of the embedded watermark, the Haar [14] Stephane Mallat, “A Theory for Multiresolution Sig-
wavelet, both visually and objectively by measured by nal Decomposition: The Wavelet Representation,” IEEE
PSNR, outperforms the other families tested. This re- Pattern Analysis and Machine Intelligence, Volume 11,
mains true when three types of noise are added, includ- Number 7, 1989, pages 674-693.
ing Gaussian, speckled and salt and pepper, as well as [15] Some test images are from: E.R. Vrscay, F. Men-
when the watermarked image remains uncorrupted. In divil, H. Kunze, D. La Torre, S.K. Alexander,
almost every situation the Haar wavelet repeatedly out- and Bruno Forte, “Waterloo Repertoire GreySet
(1 and 2)”, Waterloo Fractal Coding and Analy-
performs the others. Therefore, the size, type and com-
sis Group website, Accessed October 2007, Uni-
plexity of the image, and the introduction of noise does
versity of Waterloo, Waterloo, Ontario, Canada,
not seem to change the advantage that the simple, but http://links.uwaterloo.ca/greyset1.ba-
effective, Haar Wavelet displays for this watermarking se.html and http://links.uwaterloo.ca/-
application. greyset2.base.html.
References
[1] F. A. P. Petitcolas, R.J. Anderson, R. J. and M. G. Kuhn,
“Information hiding - A survey,” Proceedings of the
IEEE, Volume 87, Issue 7, 1999, pages 1062-1078.
[2] F. Hartung and M. Kutter, “Multimedia watermarking
592
Authorized licensed use limited to: CHONGQING UNIVERSITY. Downloaded on March 21, 2009 at 02:00 from IEEE Xplore. Restrictions apply.