SlideShare a Scribd company logo
ROBUST WATERMARKING
     TECHNIQUES
  FOR COLOR IMAGES


       Presented By


       Amit Phadikar


                       1
Introduction

Technologies for Security of Multimedia Data
    Fingerprinting
    Cryptography
    Stegnography
    Watermarking




                                               2
Difference among Fingerprinting,
Cryptography, Steganography
and Watermarking
Fingerprinting uses some kind of hash functions
to create fingerprint, original file remain intact.
Cryptography is about protecting the meaning of
the document.
Steganography is about concealing their very
existence.
Watermarking is about robustness against
possible attacks, Watermark need not be hidden.
                                                      3
Watermarking can be applied to
                  Images
                  Text
                  Audio
                  S/W

Digital Image watermarking
 A Digital Signal or pattern inserted into a digital
 image.
                                                       4
General Framework for Watermarking
Encoding Process


   E(I,S)= Î




                                     5
Decoding Process


      D(J,I)= SI




                   6
Comparator




             7
Applications of image
watermarking
      IPR Protection
      Demonstration of rightful
      ownership
      Authentication
      Labeling for data retrieval
      Covert communication



                                    8
Properties of Digital Watermark
      Perceptually invisible
      Robustness
      Cost
      Capacity
      Recoverable
      Reversible
      Undetectable
      Able to determine the true owner
      High bit rate

                                         9
Attacks on Digital Watermarking

    Lossy Compression
    Geometric Distortions
    Common Signal Processing Operations
          – Linear filtering such as high pass
          and low pass filtering
          – Non-linear filtering such as median
          filtering
          – Addition of a constant offset to the
          pixel values
          – Addition of     Gaussian   and   Non
          Gaussian noise
          – Local exchange of pixels
    Jitter Attack
                                                   10
Work Already Done On This
          Field
   Watermarking domain
         Frequency domain
         Spatial domain


   Frequency domain
          Watermark is embedded in DFT, DCT
        and DWT domain coefficients



                                              11
Representative work
Cox:- DCT
Watermark was a sequence of 1000 random numbers.
Watermark was embedded in the 1000              largest DCT
coefficients. Correlation based non-blind detection were
performed
Xia Boncelet:- DWT
Proposed to add Gaussian noise as watermark in the
middle and high frequency coefficient of DWT. Detection
was correlation based.
FM Boland:-DFT
Embedded the watermark in the phase information in the
discrete Fourier transform domain since the phase
distortion is more sensitive to HVS than magnitude
distortion . There fore it is more robust to tampering when
compared to magnitude distortion.
                                                         12
Spatial Domain
Schyndel, Tirkel, and Osborne :- LSB
Generated a watermark using an m-sequence generator.
The watermark was embedded to the LSB of the original
image. Cross-correlation based detection was proposed.
The watermark, however, was not robust to additive noise.

Bender :- Statistical
Described the patch work algorithm, it chooses randomly n pair of
image point (ai,bi) and increased the ai by one, while decreased the bi
by one. The watermark was detected by comparing the sum of the
difference of ai and bi of the n pairs of the points with 2n provided,
certain statistical propriety like image intensity are uniformly distributed.
The scheme is extremely sensitive to geometric transformation.

                                                                           13
Spatial Domain
P.Bas, J. M. Chassery and B.Macq :- Feature based
Proposed to find feature points and apply Delaunay tessellation to obtain
the triangular sequence. The watermark is right-angled isosceles
triangular sequence generated from a random sequence depending on a
secret key. After applying affined transform and visual mask watermark
sequence is added to the image. Detection is performed by finding
Delaunay tessellation of the test image and wiener filtering to obtain
watermark and then performing correlation.
Ping Wah Wong and Nasir Memon :- Block based
Proposed partitioning both host and binary watermark Image into blocks,
setting LSB’s of each image block to zero, applying hash function (MD5)
to image block. The watermark image block is ex-ored with the output of
the hash function and output is inserted into the LSB of the image block
to form watermarked image block. For extraction reverse steps are
followed. Scheme is reported to detect and report any changes to the
image.
                                                                       14
Convolution Encoding and Decoding
In a general rate R = b/c, b<= c binary convolution encoder (time-invariant and
without feedback) the causal information sequence
           u = u0u1 ………………= u0(0) u0(1) ……. u0(b) u1(0) u1(1)………. u1(b)……..
is encoded as the causal code sequence
            v= v0 v1 ………………= v0(0) v0(1) ……. v0(c) v1(0) v1(1)………. v1(c)………..
                           Where vt = f(ut, ut – 1………….ut - B):


The function f must be a linear function. Furthermore, the parameter B is called the
encoder memory.
                  u = u0u1 ……..


                  v t = ut G   0   + ut- 1G   1   +……. + ut- BG B;




                                                                                   15
Viterbi Decoding
 it estimateS v1 a sequence v that maximizes P(r/ v).
Where r is sequence , Probability p and
the starting and ending state is predetermined to be
the zero-state


Why Viterbi Decoding
•A highly satisfactory bit error performance,
•High speed of operation,
•Ease of implementation,
•Low cost.
•Fixed decoding time.


                                                        16
Quad Tree Region Splitting Image Segmentation
Method



Region Based Image Segmentation
Let R represent the entire image region, then we may view region
based segmentation as a process that partitions R into n sub
regions, R1,R2……..Rn, such that
    n
(a) U Ri=R.             (b) Ri is a connected region, i=1,2………n.
    i=1
(c) Ri ∩Rj=Φ for all i and j, i≠j. (d) P (Ri)=TRUE for i=1,2….n.




                                                                   17
Quad Tree Approach




                                        Quad trees


Advantage of Quad Tree Decomposition
  Small regions represent the presence of critical information of the image and hence
are the good place for the watermark insertion

                                                                                    18
Spatial Domain Watermarking




         watermark insertion   19
watermark detection
                      20
Watermark Insertion Algorithm
   Apply QUAD TREE decomposition on color image I (x, y) and select all 4x4 blocks
   in blue channels.




                    Watermark embedding region

      Repeat (for each selected 4x4 block (H) of blue channel)
      {    Step 1: Compute the average, Imean, minimum, Imin, and
                       maximum, Imax, of the the pixels in H.
           Step 2: Classify each pixel into one of two categories, based
on whether its intensity value is above or below the mean intensity of the block,
i.e., the ijth pixel, bitij is classified depending on its intensity, I, as
                bitij ∈ YH if I >Imean
                bitij ∈ YL if I ≤ Imea
       whereYH and YL are the high and low intensity classes, respectively.
                                                                                21
Step3:           Compute the means, meanL and meanH, for the two
         classes, YL and YH.
    Step 4: Define the contrast value of block H as
           CB = max(Cmin, β(Imax-Imin))
            where β is a constant and Cmin is a constant which defines the minimal
value a pixel's Intensity can be modified.
    Step5: Select a watermark bit (bitw ) randomly depending
on the key value.

    Step 6: Given the value of bitw is 0 or 1, modify the pixels in H according to:
             if bitw = 1,
                    I new = Imax + λ         if I > meanH
                    I new =Imean + λ         if meanL ≤ I < Imean
                    I new =I + δ             otherwise
            if bitw = 0,
                    I new = Imin - λ         if I < meanL
                    I new = Imean - λ        if Imean ≤I < meanH
                    I new = I - δ            otherwise
    Where I new is the new intensity value for the pixel which had original intensity
value I and δ is a random value between 0 and CB and λ is the watermark
strength.
     Step 7: The modified block of pixels, Hnew, is then positioned the watermark
image in the same location as the block, H, of pixels from the original host
image.
    } Until all watermark bits are inserted.
                                                                                     22
     Step 8: Marge red, green and blue channel.
Watermark Extraction Algorithm


 Apply QUAD TREE decomposition on original image I (x, y) and select all 4x4
 blocks in blue channels that passes the homogeneity test, and whose all pixel
 coordinate (X, Y) values lies in the range Xmin +(Xmax- Xmin )/4 <=X<=Xmax -
 (Xmax- Xmin )/4 and Ymin +(Ymax- Ymin )/4 <=Y<=Ymax - (Ymax- Ymin )/4 where
 Xmin, Xmax, Ymin, Ymax are the minimum , maximum coordinate value in X and Y-
 axis of that image.

Repeat{
   Step     1:     take     one    4x4     blocks    of the host    image      and
Corresponding 4x4 block of watermarked Image using the same coordinate value as
of 4x4 block of host image .
    Step2: a watermark bit is decoded by making the comparison of        the two
resultant values:
              If Average w > Averageo, then bit w = 1
              If Average w ≤ Average o, then bit w = 0
 Where Average o and Average w are the averages for the 4x4 blocks of the host
and Corresponding 4x4 block of watermarked Images, respectively.
           } Until all watermark bit are extracted.

The decoded bits are then arranged in order using same key, which was used during
embedding. Then, the encoded watermark is exclusive ored by 128 bit key and then
decoded by viterbi decoding.                                                 23
Results:
  Cmin =15, β=1 and λ=15 and convolution encoding rate R=1/2. Test
 Image LENA.BMP (512X512) ,Watermark is a 50x50 binary bitmap

                  NCC =∑∑ W    ij   W'   ij   /   ∑∑Wij ]   2

                       ij                          ij




        (a)              (b)                                    (c)   (d)

   Fig (a) original or host image (b) watermark image (c)
watermarked images (d) Extracted watermark
                                                                            24
PSNR VS λ

                                                    45
                                                    44




                                             PSNR
                                                    43
                                                    42
                                                    41
                                                    40
                                                         0   5     10    15   20

                                                                   λ



             (e)                                             (f)

Fig (e) watermark embedded region. (f) the variation of PSNR w.r.t. Various values of
λ.




Wiener filtered watermarked image         Median filtered watermarked image
and extracted watermark ,mask(3x3)        and extracted watermark,mask(3x3)
                                                                                   25
Scaled down watermarked image, rescaled image and extracted watermark, scale
down factor=.75




Cropped watermarked image and extracted   Jpeg compressed watermarked image
watermark , mask(444x444)                 and extracted watermark
                                                                         26
Rotated watermarked image, rotation corrected image and extracted
watermark,angle=-17 degree
Table Showing the Normalized Cross correlation values for different operations




Table lists the PSNR between original host image and watermarked image for various
value of λ



                                                                               27
Graphs for different operations showing variation of NCC value against various factors




                                                                                   28
Wavelet Domain Watermarking
 Discrete wavelet Transform (DWT)
 The DWT and IDWT can be mathematically stated as follows




 A signal, x [n] can be decomposed recursively as
and




 the signal x [n] can be reconstructed from its DWT coefficients recursively




  To ensure the IDWT and DWT relationship, the following orthogonality condition on
the filters   and



                                                                                 29
Figure. DWT pyramid decomposition of an image.   30
Figure. Examples of a DWT pyramid decomposition   31
watermark insertion   32
watermark detection
                      33
Watermark Insertion Algorithm
   The host image B (x, y), which is used to embed a watermark is segmented by
   quad tree decomposition to select all 4x4 blocks




                   Watermark embedding region



    B'= [b1, b2…..bM ] = Quadtree (B,T)
    T=20 is the threshold value used by Quadtree and bi denote ith block such that
1=<i<=M and function Quadtree is used for quad tree decomposition of image in
spatial domain.


                                                                              34
The bit embedding strategy is as follows.
   Repeat (for blue component of each selected 4x4 block bi Є B')
{1: perform single scale wavelet transform of block bi .
 2: compute average(C avg ) of all coefficient Ci found in step 1.
             C avg = 1/16 Σ Ci

3: for all coefficients CH Є Ci such that CH > C avg
4: Select a watermark bit (bitw ) randomly depending on the key
     (k2) value from watermark bit sequence (W''' 2N ).
5: Given the value of bitw is 0 or 1, modify all the coefficients ch Є
   CH according to:
    if bitw = 1,
              c'h = ch + λ* ch
   if bitw = 0,
              c'h = ch - λ* ch
   Where c'h is the new value of coefficient in CH which had original Coefficient
  value of ch and λ is the watermark strength
6: perform inverse single scale wavelet transform after
   modification of Coefficient to get modified block b'i.
7: The original block of pixels bi is then replaced by b'i
} Until all watermark bits are inserted.
8: Marge red, green and blue channel to get the watermarked
   image


                                                                            35
Watermark Extraction Algorithm
 Apply quad tree decomposition on original image B (x, y) and select all 4x4 blocks
 that passes the homogeneity test, and whose all pixels (X, Y) lies in the range Xmin
 +(Xmax- Xmin )/4 <= X <= Xmax - (Xmax- Xmin )/4 and Ymin +(Ymax- Ymin )/4 <= Y
 <=Ymax - (Ymax- Ymin )/4   where Xmin, Xmax, Ymin, Ymax are the minimum            ,
 maximum coordinate value in X and Y axis of the image

Repeat {
1: Take one 4x4 blocks (bi) of the host image and Corresponding 4x4 block (b'i) of
watermarked Image using the same coordinate value as of 4x4 block of host
image .
2: perform single level wavelet transform of block bi and b'i to get the Coefficient in
wavelet domain which is defined as
          Ci = WT(bi)
          C'i = WT(b'i),
 where WT denotes single level wavelet transform. Ci and C'i are the vectors of the
same length representing wavelet coefficient
3: compute average of all coefficient C avg of Ci .
4: initialize variable     sum_w=0 and sum_o =0;
5: for j=1:16
             if Ci (j) > C avg
                      sum_w = sum_w + C'i (j);
                       sum_o = sum_o + Ci (j);
              end
   end                                                                            36
6: a watermark bit ( bit w) is decoded by making the
    comparison
          if sum_w < sum_o, then bit w = 0
          if sum_w >= sum_o, bit w = 1
7: find original position (pos) of extracted watermark bit (
    bitw ) using Key (k2) as seed.
8: W2 [pos]= bit w . Where W2 is an array for storing
    extracted Watermark bits.
                     } Until all watermark bit are extracted.

 Then, the encoded watermark is exclusive ored by 128 bit key and then decoded by
viterbi decoding.




                                                                             37
Results:      λ=.3 and convolution encoding rate R=1/2. Test Image kids.tif (512X512)
             ,Watermark is a 50x50 binary bitmap




       (a)                  (b)                   (c)                              (d)
                                                                 PSNR VS λ


                                                        60
                                                        40




                                                 PSNR
                                                        20
                                                        0
                                                             0     0.2       0.4   0.6
                                                                         λ



             (e)                                                 (f)
     Fig (a) original or host image (b) watermark image (c) watermarked images
(d) Extracted watermark (e) watermark embedded region. (f) the variation of
PSNR w.r.t. various values of λ.
                                                                                         38
Wiener filtered watermarked image       Median filtered watermarked image
and extracted watermark,mask(3x3)       and extracted watermark,mask(3x3)




Scaled down watermarked image, rescaled image and extracted watermark,scale down
                                   factor=.75

                                                                            39
Cropped watermarked image and extracted watermark ,mask(444x444)




         Jpeg compressed watermarked image and extracted watermark

                                                                     40
Rotated watermarked image,          rotation   corrected   image    and    extracted
watermark,angle=-10 degree
Table Showing the Normalized Cross correlation values for different operations




Table lists the PSNR between original host image and watermarked image for various
value of λ



                                                                                  41
Wiener Filter                             Median Filter                                Scale Dow n

                                                        1.5                                         1.05
              1.5
                                                          1                                           1




                                                                                             NCC
                1




                                                  NCC
        NCC

              0.5                                       0.5                                         0.95
                0                                                                                    0.9
                                                          0
                    0             5          10                                                            0           0.5          1
                                                              0           5             10
                         Mask Size(N X N)                           Mask Size(N XN)                            Scale Dow n Factor



                           Scale Up                     Rotation in Positive Direction              Rotation in Negative Direction
              1.5                                       1.5                                         1.5
                1                                         1                                           1




                                                  NCC




                                                                                              NCC
        NCC




              0.5                                       0.5                                         0.5
                0                                         0                                           0
                    0     1       2      3    4             0            50            100              0            50            100
                           Scale Up Factor                          Angle in Degree                            Angle in Degree


                                                          Lossy JPEG Com pression
                                                        1.1
                                                        0.9
                                                  NCC




                                                        0.7
                                                        0.5
                                                              0      50          100   150
                                                                          JPEG




Fig Graphs for different operations showing variation of NCC value against various
factors

                                                                                                                                         42
Conclusion and Research Directions
   Both the algorithms are robust to common               image
  processing operations, as shown by the results.
    But none of the techniques proposed so far seems to be
  robust to all possible attacks
   Most of the current methods require the original image at
  watermark recovery this may prove as serious limitation at
  certain moments, as the image may not be accessible
   Very few algorithms deal with the problems associated
  with geometric changes.
   Very few algorithms proposed in the literature consistently
  survive the random bending attacks.
    Bulk of the literature contains linear additive watermarks,
  few algorithms resist the watermark copy attack and
  ambiguity attack.
    Consequently further work needs to be done to improve
  the robustness of algorithms.                                   43
References
[1]    Saraju P. Mohanty, "Digital Watermarking: A Tutorial Review",
    http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohant
    y.p-df
[2] Daniel Gruhl, Walter Bender, and Anthony Lu. Echo hiding. Technical report, In
    Anderson [66], pages 295-315, 1996.
[3] James Greenfield “Digital Watermarking”, www.cs.uct.ac.za/courses-
    /CS400W/NIS/papers99/jgreenfi/watermarking.html
[4] M. Kutter, F. Hartung, “Introduction to Watermarking Techniques”
    in Information Techniques for Steganography and Digital Watermarking,
    S.C. Katzenbeisser et al., Eds. Northwood, MA: Artec House, Dec. 1999,
    pp 97-119
[5] I.J. Cox, M.L. Miller, J.M.G. Linnartz, T. Kalker, “A Review of
    Watermarking Principles and Practices” in Digital Signal Processing
    for Multimedia Systems, K.K. Parhi, T. Nishitani, eds., New York,
    New York, Marcel Dekker, Inc., 1999, pp 461-482
[6]     F.A.P. Petitcolas, “Watermarking Schemes Evaluation” ”, in IEEE
    Signal Processing Magazine, Vol 17, pp 58-64, September 2000.
[7] Chris Shoemaker “Hidden Bits: A Survey of Techniques for Digital
    Watermarking”, http://www.vu.union.edu /~shoemakc /watermarking /
watermarking.html
[8] Ross J. Anderson Fabien A. P. Petitcolas and Markus G. Kuhn. “Attacks on
    copyright marking systems”. Technical report, Information Hiding, Second
    International Workshop, 1998.
                                                                             44
References
[9] Fabien A. P. Petitcolas and Ross J. Anderson. “Evaluation of copyright marking
   systems”. Presented at IEEE Multimedia Systems, 1999.
[10] Bhupendra Verma “Implementation of Digital image watermarking
   techniques”, Mtech thesis submitted to RGPV (Technical university of M.P.).
   JULY 2003.
[11] P. Bas, J. Chassery, and F. Davoine, “Using the Fractal Code to Watermark
   Images”, Proc. IEEE Int. Conf. on Image Processing, vol. I, Oct. 1998, pp.
   469-473.
[12] J. Delaigle, C. De Vleeschouwer, and B. Macq, “Psychovisual Approach to
   DigitalPicture Watermarking,” Journal of Electronic Imaging, vol. 7, no. 3, pp.
   628-640, July 1998.
[13] X. Xia, C. Boncelet and G. Arce, “A Multiresolution Watermark for Digital
   Images”, Proc. IEEE Int. Conf. on Image Processing, vol. I, pp. 548-551. Oct.
   1997.
[14] I.J. Cox, M. L. Miller and A. L. McKellips, “Watermarking as communications
   with side information”, Proceedings of the IEEE, pp. 1127-1141, Jul. 1999.
              [15] I J. Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure Spread
   Spectrum           Watermarking for Multimedia,” IEEE Transactions on Image
   Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
[16] JJK. O’Ruanaidh, W J.Dowling and FM. Boland , “Phase watermarking of
   digital images”,in Proceeding of ICIP’96, Vol 3, pp. 239-242,1996.
[17] M.P. Mitrea, F. Preteux, A. Vlad and N. Rougon, “Spread Spectrum
   Watermarking method for image databases”, Proceedings IASTED international
   conference on signal processing, pattern recognition and application          45
   (SPPRA’02) Crete Greece, 2002, pp 444-449.
References
[18] C.T. Hsu and J.I. Wu, “DCT based watermarking for video”, IEEE
   Transactions on consumer Electronics, Vol. 44,No. 1, pp 206-216, Feb. 1998.
[19] M.P. Mitrea, F. Preteux and A. Vlad, “ Robust Watermarking Method for Color
   still image database”, Proceedings 2002 tyrrhenian International Workshop on
   Digital Communications advanced methods: for multimedia signal Processing (
   IWDC’02) Capri Italy , 2002, pp 311-318
[20] X. Xia, C. Boncelet, and G. Arce, “A Multiresolution Watermark for Digital
   Images,” Proc. IEEE Int. Conf. on Image Processing, vol. I, pp. 548-551. Oct.
   1997.
[21] F. Bartolini, M. Barni, V. Cappellini and A. Piva, “Mask Building for
   Perceptually Hiding Frequency Embedded Watermarks”, Proc. Int. Conf. on
   Image Processing, vol. I, pp. 450-454, Oct. 1998.
[22] M.Kutter, S. K. Bhattachrjee and T. Ebrahimi, “ Toward second Generation
   Watermarking Scheme”, Proc. IEEE Int. Conf. On Image Processing, vol. I,
   1999, pp 320- 323.
[23] C. Podilchuk and W. Zeng, ”Perceptual watermarking of still images”, Proc.
   The First IEEE Signal Processing Society Workshop on Multimedia Signal
   Processing, Princeton, New Jersey, Jun. 1997.
[24] S. Voloshynovskiy F. Deguillaume and T.Pun, “ Multibit digital watermarking
   robust against local nonlinier geometrical distortions”, in IEEE ICIP 2001,
   Thessaloniki, Greece, oct 2001, pp 999-1002.

                                                                              46
References
  [25] C. Y. Lin, M. Wu, J.A.Bloom, I.J.Cox, M.L.Miler and Y.M.Lui, “ Rotation,
    Scale, and Translation Resilient Watermarking for Images”, IEEE transactions
    on image processing, vol 10, no 5, 2001, pp 767-782.
 [26] F. Goffin, J. F. Delaigle, C. De Vleeschouwer, B. Macq and J. J. Quisquater,
    “A low cost perceptive digital picture watermarking method”, The Society for
    Imaging Science and Technology (IS&T) and the International Society for
    Optical Engineering, vol. 3022, pp. 264-277, San Jose, California, U.S.A., Feb.
    1997.
[27] Dong Zheng, J. Zhao and A. E. Saddik, “ RST Invariant Digital Image
    Watermarking Based on Log-Polar Mapping and Phase Correction”, IEEE
    Transc. On circuits and systems for video technology, vol XX, no. Y, September
    20003.
[28] Chun Shien Lu, H. Y. Mark Liao and M.Kutter, “ Denoising and copy attacks
    resilient watermarking by Exploiting Knowledge at Detector”, IEEE Trans. On
    Image Processing, vol. 11, no. 3, March 2002 pp 280-292
[29] G. L. Guelvouit and Stephane Pateux, “ Wide spread spectrum watermarking
    with side information and interference cancellation”, Proc. of SPIE Santa clara
    CA, Jan 2003.
[30] Ching -Tang Hsieh and Yeh-Kuang Wu “ Digital Image Multiresolution
    Watermark Based on Human Visual System Using Error Correcting Code”
    Tamkang Journal of Science and Engineering, Vol. 4, No. 3, pp. 201-208
    (2001)
[31] I.J.Cox, M.L. Miller and A.L. Mckellips, “ Watermarking as communications with
   side information”, Proc. of IEEE, vol 87, no. 7, pp 1127-1141, 1999.          47
References
[32] M.Kutter, F. Jordan and F.Bossen,”Digital watermarking of color images using
   amplitude modulation”, Journal of Electronic Imaging, Vol. 7, No 2, pp.326-
   332, 1998.
[33] S.Walton. “Image authentication for a slippery new age”, In Dr. Dobb’s
   Jurnal, pages 18-26 April 1995.
[34] B.M.Macq and J.J. Quisquater. “Cryptology for digital tv broadcasting”. In
   Proceeding of the IEEE,volume 83,pages 944-957,June 1995.
[35] I. Patas “A method for signature casting on digital images”. In Proceeding of
   the             IEEE            Int.Conf.OnImageProcessingICIP-96.pages215-
   18,Lausanne,Switzerland, pp 16-19 September 1996.
[36] R.B.Wolfgang and E.J.Delp, “A watermark for digital images”, in Proceedings
   of ICIP’96,Vol. 3, pp.215-218,1996.
[37] W. Bender. D. Gruhl. N.Mormoto, and A.Lu, “Techniques for data hiding”,
   IBM Systems Journal , 35(3), pp 313-336, 1996.
[38] P. Davern and M. Scott, “Fractal based image steganography”,in Proceeding
   of First International Workshop on Information Hiding ,pp 273-294,1997.
[39] O.Bruyndonckx,J.J. Quisquater, and B.Macq, “Spacial method for copyright
   labeling of digital images”, in Proceedings of IEEE Nonlinear Signal Processing
   Workshop,pp.456-459,1995.
[40] V. Darmstaedter, J.F.Delaigle, J.J. Quisquater and B. Macq, “Low cost spatial
   watermarking”, Computer and Graphics, Vol.22,No 4,pp.417-424,1998.

                                                                                48
References
[41] G. C. Langelaar, J. C. A. van der Lubbe and R. L. Lagendijk, “Robust labeling
methods for copy protection of images in Storage and Retrieval for Image and
Video Databases”, IS&T/SPIE Proceedings, San Jose, CA, USA, pp. 298-309, Feb.
1997.
[42] G. C. Langelaar, J. C. A. van der Lubbe and J. Biemond, “Copy protection for
multimedia data based on labeling techniques”, In Proc. of 7th Symposium,
Information Theory in Benelux, Enschede, The Netherlands, May. 1996.
[43] C.H. Lee and Y.K. Lee, “An Adaptive Digital Image Watermarking Technique for
Copyright Protection”, In IEEE Transactions on Consumer Electronic, Vol. 45,No. 4,
Nov. 1999.
[44] R. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark,” Proc. IEEE int.
Conf. on Image Processing, vol. II, pp. 86-90, Nov. 1994.
[45] Ping Wah Wong and Nasir Memon, “ Secret and public key image
watermarking schemes for image Authentication and ownership verification” IEEE
transactions on image processing, vol. 10 no. 10, pp 1593-1600, October 2001.
[46] F. Deguillaume, S. Voloshynovskiy and T.Pun, “ Hybrid robust watermarking
resistant against copy attack”, Proc. Of European Signal Processing Conf. France
2002.
[47] P.Bas, J. M. Chassery and B.Macq, “ Geometrically Invariant Watermarking
Using Feature Points”, IEEE Trans. On Image Processing, vol. 11, No. 9, pp 1014-
                                                                               49
1028, 2002.
References
[48] O. Ruanaidh J., F. Boland and C. Dautzenberg, "Watermarking Digital Images
for Copyright Protection", Proceedings of the IEE Conference on Image Processing
and its Applications, Edinburgh, pp. 326-330, 1995.
[49] M. Kutter, “Watermarking resistant to translation, rotation and scaling”, In
Proc. SPIE Int. Symposium on voice, Video and Data Communication, Nov 1998.
[50] Ranjan Bose, Information Theory Coding and Cryptography,Tata McGraw-Hill,
2002.
[51] Chip Fleming “A Tutorial on Convolutional Coding with Viterbi
 Decoding” http://home.netcom.com/~chip.f/viterbi/tutorial.html
[52] R. Johannesson, K. Sh. Zigangirov, “Fundamentals of Convolutional Codes”,
IEEE Press, New York, 1999.
[53] T. Johansson and F. Jönsson, "Improved fast correlation attacks on
stream ciphers via   convolution codes", LNCS 1592, EUROCRYPT'99,
Springer-Verlag, 1999.
[54] Rafael C. Gonzalez, Richard E. Woods and Steven L. Eddins “Digital
Image Proceing Using Matlab” Pearson Education,2005.
[55] C.T.Hsu and J.I.Wu, “ Hidden signatures in images”, in proceedings of ICIP’96,
pp 223- 226, 1996.
                                                                                  50
References
 [56] Saenz, M., Öktem, R., Egiazarian, K. & Delp, E. J., “Color image wavelet
compression using vector morphology”, In: Gabbouj, M. & Kuosmanen, P. (eds). Signal
Processing X Theories and Applications, Proceedings of EUSIPCO 2000,tenth European
Signal Processing Conference, Tampere, Finlands, pp. 115-118, 4-8 September 2000.
[57] S. Mallat, “Multiresolution approximations and wavelet orthonormal bases of
L2(R)," Trans. Amer. Math. Soc., 315, pp 69-87, 1989.
[58] I. Daubechies, “Orthonormal bases of compactly supported wavelets," Comm. on
Pure and Appl. Math. 41, 909-996, pp 1988.
[59] O. Rioul and M. Vetterli, “Wavelets and signal processing," IEEE Signal Processing
Magazine, pp 14-38, 1991.
[60] I. Daubechies, Ten Lectures on Wavelets, (SIAM, Philadelphia, 1992).
[61] P. P. Vaidyanathan, “Multirate Systems and Filter Banks”, Prentice Hall, Englewood
Cliffs, NJ, 1993.
[62] M. Vetterli and J. Kovacevic, “Wavelets and Subband Coding”, Prentice Hall,
Englewood Cliffs, NJ, 1995.
[63] G. Strang and T. Q. Nguyen, “Wavelets and Filter Banks”, Wellesley-Cambridge
Press, Cam- bridge, 1996.
[64] J. Shapiro, “Embedded image coding using zerotrees of wavelet coefficients," IEEE
Trans. On Signal Processing, 41, pp 3445-3462 1993.
[65] Xiang-Gen Xia, Charles G. Boncelet and Gonzalo R. Arce “Wavelet transform based
watermark for digital images, OPTICS EXPRESS”, Vol. 3, No. 12, December 1998
[66] Ross J. Anderson. “Information hiding” first international workshop, vol. 1174 of
                                                                                     51
lecture notes in computer science. Technical report, Isaac Newton Institute, Cambridge,
1996.
Publication
Paper accepted

1) Spatial Domain Robust Image Watermarking Scheme, ADIT Journal of
        Engineering, ISSN 0973-3663, pp 45-50, vol. 2,no. 1, Dec 2005.
                 Co-author(s): Bhupendra Verma, Sanjeev Jain


2) A New Color Image Watermarking Scheme, INFOCOMP Journal of Computer
  Science (INFOCOMP, an International Journal), accepted for publication,
  2006.
                        Co-author(s): Bhupendra Verma, Sanjeev Jain
3) A spatial domain non-oblivious robust image-watermarking scheme, accepted
  in International Conference on Information Security (ICIS), st
   is tanbul, Turkey, 24-26 June
                 Co-author(s): Bhupendra Verma, Sanjeev Jain

                                                                         52
Papers Communicated
1)   Spatial domain robust blind Watermarking scheme for color image, Image and
     Vision Computing (International Journal, Publisher Elsevier)

                                  Co-author(s): Bhupendra Verma, Sanjeev Jain

2)   Quad Tree Region Splitting Approach to Spatial Domain Robust Color Image
     Watermarking, International Journal of Image and Graphics (IJIG), (Publisher
     World Scientific).

                                  Co-author(s): Bhupendra Verma, Sanjeev Jain

3)   Region Splitting Approach to Robust Color Image Watermarking In Wavelet
     Domain, International Journal of Information Technology, (Publisher Computer
     Society of Singapore).
                                  Co-author(s): Bhupendra Verma, Sanjeev Jain
                                                                                  53
THANKS

         54

More Related Content

PPT
robust image watermarking
PDF
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
PDF
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
DOC
Generic lossless visible watermarking—a
PPT
Intro Watermarking
PPTX
Watermarking
robust image watermarking
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Generic lossless visible watermarking—a
Intro Watermarking
Watermarking

What's hot (20)

PDF
International Journal of Engineering Research and Development (IJERD)
PDF
G0523444
PDF
A Review on Robust Digital Watermarking based on different Methods and its Ap...
PDF
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
PDF
F010413438
PDF
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
PDF
50120140506015
PDF
Image Authentication Using Digital Watermarking
PDF
Digital video watermarking scheme using discrete wavelet transform and standa...
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
PDF
A Blind Multiple Watermarks based on Human Visual Characteristics
PDF
Design of digital video watermarking scheme using matlab simulink
PDF
Hybrid Approach for Robust Digital Video Watermarking
PDF
Novel DCT based watermarking scheme for digital images
PDF
Discrete cosine transform
PPTX
DCT based Image Watermarking
PDF
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
PDF
A Video Watermarking Scheme to Hinder Camcorder Piracy
PDF
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
International Journal of Engineering Research and Development (IJERD)
G0523444
A Review on Robust Digital Watermarking based on different Methods and its Ap...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
F010413438
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
50120140506015
Image Authentication Using Digital Watermarking
Digital video watermarking scheme using discrete wavelet transform and standa...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
A Blind Multiple Watermarks based on Human Visual Characteristics
Design of digital video watermarking scheme using matlab simulink
Hybrid Approach for Robust Digital Video Watermarking
Novel DCT based watermarking scheme for digital images
Discrete cosine transform
DCT based Image Watermarking
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A Video Watermarking Scheme to Hinder Camcorder Piracy
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
Ad

Viewers also liked (20)

PPT
Watermarking
PPTX
Watermarkingppt
PPT
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
PPTX
Digitalwatermarking
PPT
Digital Watermarking
PPTX
Digital watermarking
PDF
Multimedia facebook report
PDF
Extended Visual Cryptography Using Watermarking
PPTX
Thủy vân số
PPTX
Multimedia Steganography
PPTX
Multimedia content security in file based environments - sami guirguis
PDF
Digital watermarking on medical images using dwt
PPTX
Naveen 9911103606 major ppt
PDF
A study of image fingerprinting by using visual cryptography
PDF
Reversible Watermarking based on Histogram Shifting Modification:A Review
PPTX
Watermarking
PPTX
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
PPT
Robust Watermarking of Video Streams
PDF
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
PDF
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
Watermarking
Watermarkingppt
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
Digitalwatermarking
Digital Watermarking
Digital watermarking
Multimedia facebook report
Extended Visual Cryptography Using Watermarking
Thủy vân số
Multimedia Steganography
Multimedia content security in file based environments - sami guirguis
Digital watermarking on medical images using dwt
Naveen 9911103606 major ppt
A study of image fingerprinting by using visual cryptography
Reversible Watermarking based on Histogram Shifting Modification:A Review
Watermarking
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
Robust Watermarking of Video Streams
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
Ad

Similar to Robust watermarking technique sppt (20)

PDF
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
PDF
PDF
H3602056060
PDF
International journal of signal and image processing issues vol 2015 - no 1...
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
PDF
DIP-Questions.pdf
PDF
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
PDF
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
PDF
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
PDF
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
PDF
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
PPTX
06 cie552 image_manipulation
PDF
Aw2419401943
PPTX
DIP Lecture 1-8 (Digital Image Processing Presentation.pptx
PDF
Video Compression Basics
PPTX
A blind dual color images watermarking based on IWT and sub-sampling
PDF
It 603
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
H3602056060
International journal of signal and image processing issues vol 2015 - no 1...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
DIP-Questions.pdf
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
International Journal of Engineering Research and Development (IJERD)
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
06 cie552 image_manipulation
Aw2419401943
DIP Lecture 1-8 (Digital Image Processing Presentation.pptx
Video Compression Basics
A blind dual color images watermarking based on IWT and sub-sampling
It 603

Robust watermarking technique sppt

  • 1. ROBUST WATERMARKING TECHNIQUES FOR COLOR IMAGES Presented By Amit Phadikar 1
  • 2. Introduction Technologies for Security of Multimedia Data Fingerprinting Cryptography Stegnography Watermarking 2
  • 3. Difference among Fingerprinting, Cryptography, Steganography and Watermarking Fingerprinting uses some kind of hash functions to create fingerprint, original file remain intact. Cryptography is about protecting the meaning of the document. Steganography is about concealing their very existence. Watermarking is about robustness against possible attacks, Watermark need not be hidden. 3
  • 4. Watermarking can be applied to Images Text Audio S/W Digital Image watermarking A Digital Signal or pattern inserted into a digital image. 4
  • 5. General Framework for Watermarking Encoding Process E(I,S)= Î 5
  • 6. Decoding Process D(J,I)= SI 6
  • 8. Applications of image watermarking IPR Protection Demonstration of rightful ownership Authentication Labeling for data retrieval Covert communication 8
  • 9. Properties of Digital Watermark Perceptually invisible Robustness Cost Capacity Recoverable Reversible Undetectable Able to determine the true owner High bit rate 9
  • 10. Attacks on Digital Watermarking Lossy Compression Geometric Distortions Common Signal Processing Operations – Linear filtering such as high pass and low pass filtering – Non-linear filtering such as median filtering – Addition of a constant offset to the pixel values – Addition of Gaussian and Non Gaussian noise – Local exchange of pixels Jitter Attack 10
  • 11. Work Already Done On This Field Watermarking domain Frequency domain Spatial domain Frequency domain Watermark is embedded in DFT, DCT and DWT domain coefficients 11
  • 12. Representative work Cox:- DCT Watermark was a sequence of 1000 random numbers. Watermark was embedded in the 1000 largest DCT coefficients. Correlation based non-blind detection were performed Xia Boncelet:- DWT Proposed to add Gaussian noise as watermark in the middle and high frequency coefficient of DWT. Detection was correlation based. FM Boland:-DFT Embedded the watermark in the phase information in the discrete Fourier transform domain since the phase distortion is more sensitive to HVS than magnitude distortion . There fore it is more robust to tampering when compared to magnitude distortion. 12
  • 13. Spatial Domain Schyndel, Tirkel, and Osborne :- LSB Generated a watermark using an m-sequence generator. The watermark was embedded to the LSB of the original image. Cross-correlation based detection was proposed. The watermark, however, was not robust to additive noise. Bender :- Statistical Described the patch work algorithm, it chooses randomly n pair of image point (ai,bi) and increased the ai by one, while decreased the bi by one. The watermark was detected by comparing the sum of the difference of ai and bi of the n pairs of the points with 2n provided, certain statistical propriety like image intensity are uniformly distributed. The scheme is extremely sensitive to geometric transformation. 13
  • 14. Spatial Domain P.Bas, J. M. Chassery and B.Macq :- Feature based Proposed to find feature points and apply Delaunay tessellation to obtain the triangular sequence. The watermark is right-angled isosceles triangular sequence generated from a random sequence depending on a secret key. After applying affined transform and visual mask watermark sequence is added to the image. Detection is performed by finding Delaunay tessellation of the test image and wiener filtering to obtain watermark and then performing correlation. Ping Wah Wong and Nasir Memon :- Block based Proposed partitioning both host and binary watermark Image into blocks, setting LSB’s of each image block to zero, applying hash function (MD5) to image block. The watermark image block is ex-ored with the output of the hash function and output is inserted into the LSB of the image block to form watermarked image block. For extraction reverse steps are followed. Scheme is reported to detect and report any changes to the image. 14
  • 15. Convolution Encoding and Decoding In a general rate R = b/c, b<= c binary convolution encoder (time-invariant and without feedback) the causal information sequence u = u0u1 ………………= u0(0) u0(1) ……. u0(b) u1(0) u1(1)………. u1(b)…….. is encoded as the causal code sequence v= v0 v1 ………………= v0(0) v0(1) ……. v0(c) v1(0) v1(1)………. v1(c)……….. Where vt = f(ut, ut – 1………….ut - B): The function f must be a linear function. Furthermore, the parameter B is called the encoder memory. u = u0u1 …….. v t = ut G 0 + ut- 1G 1 +……. + ut- BG B; 15
  • 16. Viterbi Decoding it estimateS v1 a sequence v that maximizes P(r/ v). Where r is sequence , Probability p and the starting and ending state is predetermined to be the zero-state Why Viterbi Decoding •A highly satisfactory bit error performance, •High speed of operation, •Ease of implementation, •Low cost. •Fixed decoding time. 16
  • 17. Quad Tree Region Splitting Image Segmentation Method Region Based Image Segmentation Let R represent the entire image region, then we may view region based segmentation as a process that partitions R into n sub regions, R1,R2……..Rn, such that n (a) U Ri=R. (b) Ri is a connected region, i=1,2………n. i=1 (c) Ri ∩Rj=Φ for all i and j, i≠j. (d) P (Ri)=TRUE for i=1,2….n. 17
  • 18. Quad Tree Approach Quad trees Advantage of Quad Tree Decomposition Small regions represent the presence of critical information of the image and hence are the good place for the watermark insertion 18
  • 19. Spatial Domain Watermarking watermark insertion 19
  • 21. Watermark Insertion Algorithm Apply QUAD TREE decomposition on color image I (x, y) and select all 4x4 blocks in blue channels. Watermark embedding region Repeat (for each selected 4x4 block (H) of blue channel) { Step 1: Compute the average, Imean, minimum, Imin, and maximum, Imax, of the the pixels in H. Step 2: Classify each pixel into one of two categories, based on whether its intensity value is above or below the mean intensity of the block, i.e., the ijth pixel, bitij is classified depending on its intensity, I, as bitij ∈ YH if I >Imean bitij ∈ YL if I ≤ Imea whereYH and YL are the high and low intensity classes, respectively. 21
  • 22. Step3: Compute the means, meanL and meanH, for the two classes, YL and YH. Step 4: Define the contrast value of block H as CB = max(Cmin, β(Imax-Imin)) where β is a constant and Cmin is a constant which defines the minimal value a pixel's Intensity can be modified. Step5: Select a watermark bit (bitw ) randomly depending on the key value. Step 6: Given the value of bitw is 0 or 1, modify the pixels in H according to: if bitw = 1, I new = Imax + λ if I > meanH I new =Imean + λ if meanL ≤ I < Imean I new =I + δ otherwise if bitw = 0, I new = Imin - λ if I < meanL I new = Imean - λ if Imean ≤I < meanH I new = I - δ otherwise Where I new is the new intensity value for the pixel which had original intensity value I and δ is a random value between 0 and CB and λ is the watermark strength. Step 7: The modified block of pixels, Hnew, is then positioned the watermark image in the same location as the block, H, of pixels from the original host image. } Until all watermark bits are inserted. 22 Step 8: Marge red, green and blue channel.
  • 23. Watermark Extraction Algorithm Apply QUAD TREE decomposition on original image I (x, y) and select all 4x4 blocks in blue channels that passes the homogeneity test, and whose all pixel coordinate (X, Y) values lies in the range Xmin +(Xmax- Xmin )/4 <=X<=Xmax - (Xmax- Xmin )/4 and Ymin +(Ymax- Ymin )/4 <=Y<=Ymax - (Ymax- Ymin )/4 where Xmin, Xmax, Ymin, Ymax are the minimum , maximum coordinate value in X and Y- axis of that image. Repeat{ Step 1: take one 4x4 blocks of the host image and Corresponding 4x4 block of watermarked Image using the same coordinate value as of 4x4 block of host image . Step2: a watermark bit is decoded by making the comparison of the two resultant values: If Average w > Averageo, then bit w = 1 If Average w ≤ Average o, then bit w = 0 Where Average o and Average w are the averages for the 4x4 blocks of the host and Corresponding 4x4 block of watermarked Images, respectively. } Until all watermark bit are extracted. The decoded bits are then arranged in order using same key, which was used during embedding. Then, the encoded watermark is exclusive ored by 128 bit key and then decoded by viterbi decoding. 23
  • 24. Results: Cmin =15, β=1 and λ=15 and convolution encoding rate R=1/2. Test Image LENA.BMP (512X512) ,Watermark is a 50x50 binary bitmap NCC =∑∑ W ij W' ij / ∑∑Wij ] 2 ij ij (a) (b) (c) (d) Fig (a) original or host image (b) watermark image (c) watermarked images (d) Extracted watermark 24
  • 25. PSNR VS λ 45 44 PSNR 43 42 41 40 0 5 10 15 20 λ (e) (f) Fig (e) watermark embedded region. (f) the variation of PSNR w.r.t. Various values of λ. Wiener filtered watermarked image Median filtered watermarked image and extracted watermark ,mask(3x3) and extracted watermark,mask(3x3) 25
  • 26. Scaled down watermarked image, rescaled image and extracted watermark, scale down factor=.75 Cropped watermarked image and extracted Jpeg compressed watermarked image watermark , mask(444x444) and extracted watermark 26
  • 27. Rotated watermarked image, rotation corrected image and extracted watermark,angle=-17 degree Table Showing the Normalized Cross correlation values for different operations Table lists the PSNR between original host image and watermarked image for various value of λ 27
  • 28. Graphs for different operations showing variation of NCC value against various factors 28
  • 29. Wavelet Domain Watermarking Discrete wavelet Transform (DWT) The DWT and IDWT can be mathematically stated as follows A signal, x [n] can be decomposed recursively as and the signal x [n] can be reconstructed from its DWT coefficients recursively To ensure the IDWT and DWT relationship, the following orthogonality condition on the filters and 29
  • 30. Figure. DWT pyramid decomposition of an image. 30
  • 31. Figure. Examples of a DWT pyramid decomposition 31
  • 34. Watermark Insertion Algorithm The host image B (x, y), which is used to embed a watermark is segmented by quad tree decomposition to select all 4x4 blocks Watermark embedding region B'= [b1, b2…..bM ] = Quadtree (B,T) T=20 is the threshold value used by Quadtree and bi denote ith block such that 1=<i<=M and function Quadtree is used for quad tree decomposition of image in spatial domain. 34
  • 35. The bit embedding strategy is as follows. Repeat (for blue component of each selected 4x4 block bi Є B') {1: perform single scale wavelet transform of block bi . 2: compute average(C avg ) of all coefficient Ci found in step 1. C avg = 1/16 Σ Ci 3: for all coefficients CH Є Ci such that CH > C avg 4: Select a watermark bit (bitw ) randomly depending on the key (k2) value from watermark bit sequence (W''' 2N ). 5: Given the value of bitw is 0 or 1, modify all the coefficients ch Є CH according to: if bitw = 1, c'h = ch + λ* ch if bitw = 0, c'h = ch - λ* ch Where c'h is the new value of coefficient in CH which had original Coefficient value of ch and λ is the watermark strength 6: perform inverse single scale wavelet transform after modification of Coefficient to get modified block b'i. 7: The original block of pixels bi is then replaced by b'i } Until all watermark bits are inserted. 8: Marge red, green and blue channel to get the watermarked image 35
  • 36. Watermark Extraction Algorithm Apply quad tree decomposition on original image B (x, y) and select all 4x4 blocks that passes the homogeneity test, and whose all pixels (X, Y) lies in the range Xmin +(Xmax- Xmin )/4 <= X <= Xmax - (Xmax- Xmin )/4 and Ymin +(Ymax- Ymin )/4 <= Y <=Ymax - (Ymax- Ymin )/4 where Xmin, Xmax, Ymin, Ymax are the minimum , maximum coordinate value in X and Y axis of the image Repeat { 1: Take one 4x4 blocks (bi) of the host image and Corresponding 4x4 block (b'i) of watermarked Image using the same coordinate value as of 4x4 block of host image . 2: perform single level wavelet transform of block bi and b'i to get the Coefficient in wavelet domain which is defined as Ci = WT(bi) C'i = WT(b'i), where WT denotes single level wavelet transform. Ci and C'i are the vectors of the same length representing wavelet coefficient 3: compute average of all coefficient C avg of Ci . 4: initialize variable sum_w=0 and sum_o =0; 5: for j=1:16 if Ci (j) > C avg sum_w = sum_w + C'i (j); sum_o = sum_o + Ci (j); end end 36
  • 37. 6: a watermark bit ( bit w) is decoded by making the comparison if sum_w < sum_o, then bit w = 0 if sum_w >= sum_o, bit w = 1 7: find original position (pos) of extracted watermark bit ( bitw ) using Key (k2) as seed. 8: W2 [pos]= bit w . Where W2 is an array for storing extracted Watermark bits. } Until all watermark bit are extracted. Then, the encoded watermark is exclusive ored by 128 bit key and then decoded by viterbi decoding. 37
  • 38. Results: λ=.3 and convolution encoding rate R=1/2. Test Image kids.tif (512X512) ,Watermark is a 50x50 binary bitmap (a) (b) (c) (d) PSNR VS λ 60 40 PSNR 20 0 0 0.2 0.4 0.6 λ (e) (f) Fig (a) original or host image (b) watermark image (c) watermarked images (d) Extracted watermark (e) watermark embedded region. (f) the variation of PSNR w.r.t. various values of λ. 38
  • 39. Wiener filtered watermarked image Median filtered watermarked image and extracted watermark,mask(3x3) and extracted watermark,mask(3x3) Scaled down watermarked image, rescaled image and extracted watermark,scale down factor=.75 39
  • 40. Cropped watermarked image and extracted watermark ,mask(444x444) Jpeg compressed watermarked image and extracted watermark 40
  • 41. Rotated watermarked image, rotation corrected image and extracted watermark,angle=-10 degree Table Showing the Normalized Cross correlation values for different operations Table lists the PSNR between original host image and watermarked image for various value of λ 41
  • 42. Wiener Filter Median Filter Scale Dow n 1.5 1.05 1.5 1 1 NCC 1 NCC NCC 0.5 0.5 0.95 0 0.9 0 0 5 10 0 0.5 1 0 5 10 Mask Size(N X N) Mask Size(N XN) Scale Dow n Factor Scale Up Rotation in Positive Direction Rotation in Negative Direction 1.5 1.5 1.5 1 1 1 NCC NCC NCC 0.5 0.5 0.5 0 0 0 0 1 2 3 4 0 50 100 0 50 100 Scale Up Factor Angle in Degree Angle in Degree Lossy JPEG Com pression 1.1 0.9 NCC 0.7 0.5 0 50 100 150 JPEG Fig Graphs for different operations showing variation of NCC value against various factors 42
  • 43. Conclusion and Research Directions Both the algorithms are robust to common image processing operations, as shown by the results. But none of the techniques proposed so far seems to be robust to all possible attacks Most of the current methods require the original image at watermark recovery this may prove as serious limitation at certain moments, as the image may not be accessible Very few algorithms deal with the problems associated with geometric changes. Very few algorithms proposed in the literature consistently survive the random bending attacks. Bulk of the literature contains linear additive watermarks, few algorithms resist the watermark copy attack and ambiguity attack. Consequently further work needs to be done to improve the robustness of algorithms. 43
  • 44. References [1] Saraju P. Mohanty, "Digital Watermarking: A Tutorial Review", http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohant y.p-df [2] Daniel Gruhl, Walter Bender, and Anthony Lu. Echo hiding. Technical report, In Anderson [66], pages 295-315, 1996. [3] James Greenfield “Digital Watermarking”, www.cs.uct.ac.za/courses- /CS400W/NIS/papers99/jgreenfi/watermarking.html [4] M. Kutter, F. Hartung, “Introduction to Watermarking Techniques” in Information Techniques for Steganography and Digital Watermarking, S.C. Katzenbeisser et al., Eds. Northwood, MA: Artec House, Dec. 1999, pp 97-119 [5] I.J. Cox, M.L. Miller, J.M.G. Linnartz, T. Kalker, “A Review of Watermarking Principles and Practices” in Digital Signal Processing for Multimedia Systems, K.K. Parhi, T. Nishitani, eds., New York, New York, Marcel Dekker, Inc., 1999, pp 461-482 [6] F.A.P. Petitcolas, “Watermarking Schemes Evaluation” ”, in IEEE Signal Processing Magazine, Vol 17, pp 58-64, September 2000. [7] Chris Shoemaker “Hidden Bits: A Survey of Techniques for Digital Watermarking”, http://www.vu.union.edu /~shoemakc /watermarking / watermarking.html [8] Ross J. Anderson Fabien A. P. Petitcolas and Markus G. Kuhn. “Attacks on copyright marking systems”. Technical report, Information Hiding, Second International Workshop, 1998. 44
  • 45. References [9] Fabien A. P. Petitcolas and Ross J. Anderson. “Evaluation of copyright marking systems”. Presented at IEEE Multimedia Systems, 1999. [10] Bhupendra Verma “Implementation of Digital image watermarking techniques”, Mtech thesis submitted to RGPV (Technical university of M.P.). JULY 2003. [11] P. Bas, J. Chassery, and F. Davoine, “Using the Fractal Code to Watermark Images”, Proc. IEEE Int. Conf. on Image Processing, vol. I, Oct. 1998, pp. 469-473. [12] J. Delaigle, C. De Vleeschouwer, and B. Macq, “Psychovisual Approach to DigitalPicture Watermarking,” Journal of Electronic Imaging, vol. 7, no. 3, pp. 628-640, July 1998. [13] X. Xia, C. Boncelet and G. Arce, “A Multiresolution Watermark for Digital Images”, Proc. IEEE Int. Conf. on Image Processing, vol. I, pp. 548-551. Oct. 1997. [14] I.J. Cox, M. L. Miller and A. L. McKellips, “Watermarking as communications with side information”, Proceedings of the IEEE, pp. 1127-1141, Jul. 1999. [15] I J. Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997. [16] JJK. O’Ruanaidh, W J.Dowling and FM. Boland , “Phase watermarking of digital images”,in Proceeding of ICIP’96, Vol 3, pp. 239-242,1996. [17] M.P. Mitrea, F. Preteux, A. Vlad and N. Rougon, “Spread Spectrum Watermarking method for image databases”, Proceedings IASTED international conference on signal processing, pattern recognition and application 45 (SPPRA’02) Crete Greece, 2002, pp 444-449.
  • 46. References [18] C.T. Hsu and J.I. Wu, “DCT based watermarking for video”, IEEE Transactions on consumer Electronics, Vol. 44,No. 1, pp 206-216, Feb. 1998. [19] M.P. Mitrea, F. Preteux and A. Vlad, “ Robust Watermarking Method for Color still image database”, Proceedings 2002 tyrrhenian International Workshop on Digital Communications advanced methods: for multimedia signal Processing ( IWDC’02) Capri Italy , 2002, pp 311-318 [20] X. Xia, C. Boncelet, and G. Arce, “A Multiresolution Watermark for Digital Images,” Proc. IEEE Int. Conf. on Image Processing, vol. I, pp. 548-551. Oct. 1997. [21] F. Bartolini, M. Barni, V. Cappellini and A. Piva, “Mask Building for Perceptually Hiding Frequency Embedded Watermarks”, Proc. Int. Conf. on Image Processing, vol. I, pp. 450-454, Oct. 1998. [22] M.Kutter, S. K. Bhattachrjee and T. Ebrahimi, “ Toward second Generation Watermarking Scheme”, Proc. IEEE Int. Conf. On Image Processing, vol. I, 1999, pp 320- 323. [23] C. Podilchuk and W. Zeng, ”Perceptual watermarking of still images”, Proc. The First IEEE Signal Processing Society Workshop on Multimedia Signal Processing, Princeton, New Jersey, Jun. 1997. [24] S. Voloshynovskiy F. Deguillaume and T.Pun, “ Multibit digital watermarking robust against local nonlinier geometrical distortions”, in IEEE ICIP 2001, Thessaloniki, Greece, oct 2001, pp 999-1002. 46
  • 47. References [25] C. Y. Lin, M. Wu, J.A.Bloom, I.J.Cox, M.L.Miler and Y.M.Lui, “ Rotation, Scale, and Translation Resilient Watermarking for Images”, IEEE transactions on image processing, vol 10, no 5, 2001, pp 767-782. [26] F. Goffin, J. F. Delaigle, C. De Vleeschouwer, B. Macq and J. J. Quisquater, “A low cost perceptive digital picture watermarking method”, The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering, vol. 3022, pp. 264-277, San Jose, California, U.S.A., Feb. 1997. [27] Dong Zheng, J. Zhao and A. E. Saddik, “ RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correction”, IEEE Transc. On circuits and systems for video technology, vol XX, no. Y, September 20003. [28] Chun Shien Lu, H. Y. Mark Liao and M.Kutter, “ Denoising and copy attacks resilient watermarking by Exploiting Knowledge at Detector”, IEEE Trans. On Image Processing, vol. 11, no. 3, March 2002 pp 280-292 [29] G. L. Guelvouit and Stephane Pateux, “ Wide spread spectrum watermarking with side information and interference cancellation”, Proc. of SPIE Santa clara CA, Jan 2003. [30] Ching -Tang Hsieh and Yeh-Kuang Wu “ Digital Image Multiresolution Watermark Based on Human Visual System Using Error Correcting Code” Tamkang Journal of Science and Engineering, Vol. 4, No. 3, pp. 201-208 (2001) [31] I.J.Cox, M.L. Miller and A.L. Mckellips, “ Watermarking as communications with side information”, Proc. of IEEE, vol 87, no. 7, pp 1127-1141, 1999. 47
  • 48. References [32] M.Kutter, F. Jordan and F.Bossen,”Digital watermarking of color images using amplitude modulation”, Journal of Electronic Imaging, Vol. 7, No 2, pp.326- 332, 1998. [33] S.Walton. “Image authentication for a slippery new age”, In Dr. Dobb’s Jurnal, pages 18-26 April 1995. [34] B.M.Macq and J.J. Quisquater. “Cryptology for digital tv broadcasting”. In Proceeding of the IEEE,volume 83,pages 944-957,June 1995. [35] I. Patas “A method for signature casting on digital images”. In Proceeding of the IEEE Int.Conf.OnImageProcessingICIP-96.pages215- 18,Lausanne,Switzerland, pp 16-19 September 1996. [36] R.B.Wolfgang and E.J.Delp, “A watermark for digital images”, in Proceedings of ICIP’96,Vol. 3, pp.215-218,1996. [37] W. Bender. D. Gruhl. N.Mormoto, and A.Lu, “Techniques for data hiding”, IBM Systems Journal , 35(3), pp 313-336, 1996. [38] P. Davern and M. Scott, “Fractal based image steganography”,in Proceeding of First International Workshop on Information Hiding ,pp 273-294,1997. [39] O.Bruyndonckx,J.J. Quisquater, and B.Macq, “Spacial method for copyright labeling of digital images”, in Proceedings of IEEE Nonlinear Signal Processing Workshop,pp.456-459,1995. [40] V. Darmstaedter, J.F.Delaigle, J.J. Quisquater and B. Macq, “Low cost spatial watermarking”, Computer and Graphics, Vol.22,No 4,pp.417-424,1998. 48
  • 49. References [41] G. C. Langelaar, J. C. A. van der Lubbe and R. L. Lagendijk, “Robust labeling methods for copy protection of images in Storage and Retrieval for Image and Video Databases”, IS&T/SPIE Proceedings, San Jose, CA, USA, pp. 298-309, Feb. 1997. [42] G. C. Langelaar, J. C. A. van der Lubbe and J. Biemond, “Copy protection for multimedia data based on labeling techniques”, In Proc. of 7th Symposium, Information Theory in Benelux, Enschede, The Netherlands, May. 1996. [43] C.H. Lee and Y.K. Lee, “An Adaptive Digital Image Watermarking Technique for Copyright Protection”, In IEEE Transactions on Consumer Electronic, Vol. 45,No. 4, Nov. 1999. [44] R. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark,” Proc. IEEE int. Conf. on Image Processing, vol. II, pp. 86-90, Nov. 1994. [45] Ping Wah Wong and Nasir Memon, “ Secret and public key image watermarking schemes for image Authentication and ownership verification” IEEE transactions on image processing, vol. 10 no. 10, pp 1593-1600, October 2001. [46] F. Deguillaume, S. Voloshynovskiy and T.Pun, “ Hybrid robust watermarking resistant against copy attack”, Proc. Of European Signal Processing Conf. France 2002. [47] P.Bas, J. M. Chassery and B.Macq, “ Geometrically Invariant Watermarking Using Feature Points”, IEEE Trans. On Image Processing, vol. 11, No. 9, pp 1014- 49 1028, 2002.
  • 50. References [48] O. Ruanaidh J., F. Boland and C. Dautzenberg, "Watermarking Digital Images for Copyright Protection", Proceedings of the IEE Conference on Image Processing and its Applications, Edinburgh, pp. 326-330, 1995. [49] M. Kutter, “Watermarking resistant to translation, rotation and scaling”, In Proc. SPIE Int. Symposium on voice, Video and Data Communication, Nov 1998. [50] Ranjan Bose, Information Theory Coding and Cryptography,Tata McGraw-Hill, 2002. [51] Chip Fleming “A Tutorial on Convolutional Coding with Viterbi Decoding” http://home.netcom.com/~chip.f/viterbi/tutorial.html [52] R. Johannesson, K. Sh. Zigangirov, “Fundamentals of Convolutional Codes”, IEEE Press, New York, 1999. [53] T. Johansson and F. Jönsson, "Improved fast correlation attacks on stream ciphers via convolution codes", LNCS 1592, EUROCRYPT'99, Springer-Verlag, 1999. [54] Rafael C. Gonzalez, Richard E. Woods and Steven L. Eddins “Digital Image Proceing Using Matlab” Pearson Education,2005. [55] C.T.Hsu and J.I.Wu, “ Hidden signatures in images”, in proceedings of ICIP’96, pp 223- 226, 1996. 50
  • 51. References [56] Saenz, M., Öktem, R., Egiazarian, K. & Delp, E. J., “Color image wavelet compression using vector morphology”, In: Gabbouj, M. & Kuosmanen, P. (eds). Signal Processing X Theories and Applications, Proceedings of EUSIPCO 2000,tenth European Signal Processing Conference, Tampere, Finlands, pp. 115-118, 4-8 September 2000. [57] S. Mallat, “Multiresolution approximations and wavelet orthonormal bases of L2(R)," Trans. Amer. Math. Soc., 315, pp 69-87, 1989. [58] I. Daubechies, “Orthonormal bases of compactly supported wavelets," Comm. on Pure and Appl. Math. 41, 909-996, pp 1988. [59] O. Rioul and M. Vetterli, “Wavelets and signal processing," IEEE Signal Processing Magazine, pp 14-38, 1991. [60] I. Daubechies, Ten Lectures on Wavelets, (SIAM, Philadelphia, 1992). [61] P. P. Vaidyanathan, “Multirate Systems and Filter Banks”, Prentice Hall, Englewood Cliffs, NJ, 1993. [62] M. Vetterli and J. Kovacevic, “Wavelets and Subband Coding”, Prentice Hall, Englewood Cliffs, NJ, 1995. [63] G. Strang and T. Q. Nguyen, “Wavelets and Filter Banks”, Wellesley-Cambridge Press, Cam- bridge, 1996. [64] J. Shapiro, “Embedded image coding using zerotrees of wavelet coefficients," IEEE Trans. On Signal Processing, 41, pp 3445-3462 1993. [65] Xiang-Gen Xia, Charles G. Boncelet and Gonzalo R. Arce “Wavelet transform based watermark for digital images, OPTICS EXPRESS”, Vol. 3, No. 12, December 1998 [66] Ross J. Anderson. “Information hiding” first international workshop, vol. 1174 of 51 lecture notes in computer science. Technical report, Isaac Newton Institute, Cambridge, 1996.
  • 52. Publication Paper accepted 1) Spatial Domain Robust Image Watermarking Scheme, ADIT Journal of Engineering, ISSN 0973-3663, pp 45-50, vol. 2,no. 1, Dec 2005. Co-author(s): Bhupendra Verma, Sanjeev Jain 2) A New Color Image Watermarking Scheme, INFOCOMP Journal of Computer Science (INFOCOMP, an International Journal), accepted for publication, 2006. Co-author(s): Bhupendra Verma, Sanjeev Jain 3) A spatial domain non-oblivious robust image-watermarking scheme, accepted in International Conference on Information Security (ICIS), st is tanbul, Turkey, 24-26 June Co-author(s): Bhupendra Verma, Sanjeev Jain 52
  • 53. Papers Communicated 1) Spatial domain robust blind Watermarking scheme for color image, Image and Vision Computing (International Journal, Publisher Elsevier) Co-author(s): Bhupendra Verma, Sanjeev Jain 2) Quad Tree Region Splitting Approach to Spatial Domain Robust Color Image Watermarking, International Journal of Image and Graphics (IJIG), (Publisher World Scientific). Co-author(s): Bhupendra Verma, Sanjeev Jain 3) Region Splitting Approach to Robust Color Image Watermarking In Wavelet Domain, International Journal of Information Technology, (Publisher Computer Society of Singapore). Co-author(s): Bhupendra Verma, Sanjeev Jain 53
  • 54. THANKS 54