Final Thesis - 6 March Vikas Saxena

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 182

DIGITAL IMAGE WATERMARKING

Thesis submitted in the fulfillment of the Degree of

Doctor of Philosophy

by

VIKAS SAXENA

Department of Computer Science and Engineering


JAYPEE INSTITUE OF INFORMATION TECHNOLOGY UNIVERSITY
A-10, SECTOR-62, NOIDA, INDIA
October, 2008

JAYPEE INSTITUE OF INFORMATION TECHNOLOGY UNIVERSITY, NOIDA, INDIA


October, 2008
ALL RIGHT RESERVED

SCHOLARS CERTIFICATE
This is to certify that the work reported in the Ph.D. thesis entitled Digital Image
Watermarking submitted at Jaypee Institute of Information Technology University,
Noida, India is an authentic record of my work carried out under the supervision of
Prof. J.P.Gupta. I have not submitted this work elsewhere for any other degree or diploma.

(Vikas Saxena)
Department of Computer Science and Engineering
Jaypee Institute of Information Technology University, Noida, India
October 10, 2008

SUPERVISORS CERTIFICATE
This is to certify that the work reported in the Ph.D. thesis entitled Digital Image
Watermarking submitted by Vikas Saxena at Jaypee Institute of Information
Technology University, Noida, India is a bonafide record of his original work carried out
under my supervision. This work has not been submitted elsewhere for any other degree or
diploma.

(Prof. J. P. Gupta)
Vice Chancellor
Jaypee Institute of Information Technology University, Noida, India
October 10, 2008

TABLE OF CONTENTS

ABSTRACT

Page
No.
vii

ACKNOWLEDGEMENT

ix

LIST OF ACCRONYMS

xi

LIST OF SYMBOLS

xiii

LIST OF FIGURES

xv

LIST OF TABLES

xix

CHAPTER-1
1

INTRODUCTION

1. 1 DATA HIDING BACKGROUND


1.1.1 STEGANOGRAPHY VS. WATERMARKING

1.1.2 CRYPTOGRAPHY VS. WATERMARKING

1.1.3 DIGITAL SIGNATURE VS. WATERMARKING

1. 2 APPLICATION AREAS OF DIGITAL WATERMARKING

1.2.1 COPYRIGHT PROTECTION

1.2.2 COPY PROTECTION

1.2.3 TEMPER DETECTION

1.2.4 BROADCAST MONITORING

1.2.5 FINGERPRINTING

1.2.6 ANNOTATION APPLICATIONS

1. 3 CHARACTERISTICS OF WATERMARKING SCHEMES

10

1. 4 TYPES OF DIGITAL WATERMARKS

11

1. 5 STRUCTURE OF THE THESIS

15

CHAPTER-2
IMAGE WATERMARKING LITERATURE SURVEY
2.1 SPATIAL DOMAIN BASED WATERMARKING SCHEMES

17
18

2.1.1 LSB BASED SCHEMES

18

2.1.2 PATCH WORK BASED SCHEME

18

2.1.3 CORRELATION BASED WATERMARKING SCHEMES

19

2.1.3.1 CORRELATION BASED SCHEMES WITH 1 PN SEQUENCE

19

2.1.3.2 CORRELATION-BASED IMAGE WATERMARKING SCHEMES

19

WITH 2PN SEQUENCES


2.1.3.3 IMAGE WATERMARKING USING PRE-FILTERING

20

2.1.4 CDMA BASED IMAGE WATERMARKING SCHEME

20

2.1.5 OTHER SPATIAL DOMAIN BASED WATERMARKING SCHEMES

21

2.2 TRANSFORMED DOMAIN BASED SCHEMES

22

2.2.1 DFT BASED WATERMARKING SCHEMES

22

2.2.2 DCT BASED WATERMARKING SCHEMES

24

2.2.2.1 THE MIDDLE-BAND COEFFICIENT EXCHANGE SCHEME

26

2.2.2.2 DCT-CDMA BASED IMAGE WATERMARKING

28

2.2.3 DWT BASED WATERMARKING SCHEMES

29

2.2.3.1 CDMA-DWT BASED WATERMARKING SCHEME

30

2.2.3.2 DWT BASED BLIND WATERMARK DETECTION

31

2.2.3.3 DWT BASED NON-BLIND WATERMARK DETECTION

32

2.3 RECENT METHODOLOGIES

33

2.4 PROBLEM STATEMENT FORMULATION

38

2.4.1 JUSTIFICATIONS OF THE PROBLEM STATEMENT CHOSEN

40

CHPATER-3
45

PRELIMINARIES
3.1 IMAGE ENCODING STANDARDS

45

3.1.1 JPEG ENCODING

45

ii

3.1.2 JPEG2000 ENCODING

53

3.2 IMAGE QUALITY MEASURES

56

3.2.1 PEAK SIGNAL TO NOISE RATIO

56

3.2.2 CORRELATION COEFFICIENT

57
58

3.3 TEST DATA

CHAPTER-4
61

WATERMARKING OF GRAY IMAGES


4.1 INTRODUCTION

61

4.2 INCREASING THE ROBUSTNESS OF IMAGE WATERMARKING SCHEMES

62

AGAINST JPEG COMPRESSION


4.3 INCREASING THE ROBUSTNESS OF IMAGE WATERMARKING SCHEME

64

AGAINST HISTOGRAM EQUALIZATION ATTACK


4.4 DEVISING A

COLLUSION ATTACK RESISTANT

WATERMARKING

68

SCHEME FOR IMAGES USING DCT


4.4.1 G, THE POLICY GENERATOR ALGORITHM

72

4.4.2 E, THE WATERMARK EMBEDDING ALGORITHM

72

4.4.3 D, THE WATERMARK DETECTION ALGORITHM

74

4.4.4 PERFORMANCE OF THE PROPOSED SCHEME

76

4.4.4.1 PERFORMANCE AGAINST JPEG COMPRESSION

76

4.4.4.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS

77

4.4.4.3 COMPARATIVE STUDY WITH OTHER MECHANISMS

77
79

4.5 CONCLUSION

CHAPTER-5
WATERMARKING of COLOR IMAGES

81

5.1 INTRODUCTION

81

5.2 PERFORMANCE ANALYSIS OF COLOR CHANNEL FOR DCT BASED

81

IMAGE WATERMARKING SCHEME


5.3 DEVISING AN ICAR WATERMARKING SCHEME FOR COLORED BMP
IMAGES

iii

85

5.3.1 G, THE POLICY GENERATOR ALGORITHM

86

5.3.2 COLOR CHANNEL SELECTION

87

5.3.3 E, THE WATERMARK EMBEDDING ALGORITHM

87

5.3.4 D, THE WATERMARK DETECTION ALGORITHM

88

5.3.5 PERFORMANCE OF THE PROPOSED SCHEME

90

5.3.5.1 PERFORMANCE AGAINST JPEG COMPRESSION

91

5.3.5.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS

92

5.3.5.3 COMPARATIVE STUDY RESULTS WITH OTHER SCHEMES

93
96

5.4 CONCLUSION

CHAPTER-6
WATERMARKING OF JPEG IMAGES

97

6.1 INTRODUCTION

97

6.2 DEVELOPMG AN ICAR WATERMARKING ALGORITHM FOR JPEG

97

IMAGES
6.2.1 G, THE POLICY GENERATOR ALGORITHM
6.2.1.1 COLOR CHANNEL SELECTION

99
100

6.2.2 E, THE WATERMARK EMBEDDING ALGORITHM

100

6.2.3 D, THE WATERMARK DETECTION ALGORITHM

102

6.2.4 PERFORMANCE OF THE PROPOSED SCHEME

104

6.2.4.1 COLOR CHANNEL SELECTION AND PERFORMANCE AGAINST

105

JPEG COMPRESSION
6.2.4.2 PERFORMANCE AGAINST IMAGE MANIPULATIONS

106

6.2.4.3 COMPARATIVE STUDY WITH SIMILAR, STATE-OF-THE-ART


SCHEMES

108

6.3 A DWT BASED WATERMARKING SCHEME FOR JPEG IMAGES


6.3.1 EXPLORATION OF DWT DOMAIN
6.3.1.1 ISSUES IN USING DWT

111
112
112

6.3.2 BACKGROUND OF THE PROPOSED SCHEME

114

6.3.3 DUAL WATERMARKING

115

iv

6.3.4 THE DWT BASED WATERMARKING

115

6.3.4.1 P, THE POLICY

116

6.3.4.2 G, THE POLICY GENERATOR ALGORITHM

116

6.3.4.3 E, THE WATERMARK EMBEDDING ALGORITHM

118

6.3.4.4 D, THE WATERMARK DETECTION ALGORITHM

120

6.3.5 THE DCT BASED WATERMARKING

121

6.3.6 RESULTS

121

6.3.6.1 THE VALUE OF T

122

6.3.6.2 PERFORMANCE AGAINST JPEG COMPRESSION

126

6.3.6.3 PERFORMANCE AGAINST COMMON ATTACKS AND IMAGE

127

MANIPULATIONS
6.3.6.4 COMPARATIVE STUDY WITH DCT BASED SCHEMES

127

6.3.6.5 COMPARATIVE STUDY WITH DWT BASED SCHEMES

129
130

6.4 CONCLUSION

CHAPTER-7
131

RESULTS AND CONCLUSION


7.1 SUMMARY

131

7.2 MAIN CONTRIBUTIONS AND HIGHLIGHTS OF THE RESULTS

131

7.3 FUTURE WORK

132

REFERENCES

135

LIST OF AUTHORS PUBLICATION

147

SYNOPSIS

vi

ABSTRACT
Watermarking has been invoked as a tool for the protection of Intellectual Property Rights
(IPR) of multimedia contents. Because of their digital nature, multimedia documents can be
duplicated, modified, transformed, and diffused very easily. In this context, it is important to
develop a system for copyright protection, protection against duplication, and authentication
of contents. For this, a watermark is embedded into the digital data in such a way that it is
indissolubly tied to the data itself. Later on, such watermark can be extracted to prove
ownership to trace the dissemination of the marked work through the network, or simply to
inform users about the identity of the rights-holder or about the allowed use of data.
This thesis deals the developing the watermarking schemes for digital images stored in both,
spatial and transformed domain. In this thesis we mainly focus on the Discrete Cosine
Transform (DCT) based development. To prove its commercial usability, we take special
care so that at least one attack, having huge financial implications, can be sustained due to
the in-built capacity of the watermarking scheme. Apart from this, since JPEG is the most
commonly used image format over WWW, we pay special attention to robustness against
JPEG compression attack.
Apart from developing watermarking schemes, we also discuss the selection of color channel
to be used to carry the watermark data based on the attack that may occur most commonly on
the watermarked images. We propose to increase the robustness against some attacks by preprocessing the images. In this thesis, we also present a correlation between the performance
of the watermarking scheme against some attacks and the original image characteristics. All
presented watermarking schemes are robust against common image manipulations and
attacks.

vii

viii

ACKNOWLEDGEMENT
I am greatly indebted to my supervisor Prof. J. P. Gupta for his valuable technical guidance
and moral support through out this work. Without his support this thesis would have not been
completed.
I would also like to thank to Prof S.L Maskara, Prof Sanjay Goel and faculty members of the
department who always enlightened me by sharing their research experiences to accomplish
the quality work.
My mother provided me all support I needed to complete this thesis and other family
members specially my wife also helped me a lot in getting me this far.

Vikas Saxena
Department of Computer Science Engineering and Information Technology
Jaypee Institute of Information Technoogy University
Noida, India

ix

LIST OF ACCRONYMS
CC

Correlation Coefficient

CDMA

Code Division Multiple Access

DCT

Discrete Cosine Transform

DFT

Discrete Fourier Transform

DWT

Discrete Wavelet Transform

EBCOT

Embedded Block Coding with Optimized Truncation

EZW

Embedded Zero-tree Wavelet

FFT

Fast Fourier Transform

HH

High-High Band of DWT

HL

High-Low Band of DWT

HVS

Human Visual System

ICAR

Inherently Collusion Attack Resistant

IPR

Intellectual Property Right

JND

Just Noticeable Distortion

JPEG

Joint Photographic Expert Group

LH

Low-High Band of DWT

LL

Low-Low Band of DWT

LSB

Least Significant Bit

MBCE

Middle Band Coefficient Exchange

MSE

Mean Square Error

PN

Pseudo-random noise

PSNR

Peak Signal to Noise ration

PSW

Perceptually Shaped Watermarking

REL

Run Length Encoding

RGB

Red Green Blue

SPIHT

Set Partitioning In Hierarchical Trees

SVD

Singular Value Decomposition

VQ

Vector Quantization

xi

xii

LIST OF SYMBOLS
D

Watermark detection algorithm

Watermark embedding algorithm

FH

High frequency region in an 8 x 8 DCT

FL

Low frequency region in an 8 x 8 DCT

FM

Middle frequency region in an 8 x 8 DCT

Policy generator algorithm

Watermark strength parameter

Policy

Pi

An instance of a policy

JPEG quantization factor

Watermark logo converted into string of 0s and 1s

Sr

A single bit of S

Watermark strength parameter

Watermark logo

Wi

A single bit of the watermark data

Original cover image

Xi

An instance of the cover image

xiii

xiv

LIST OF FIGURES
Figure
No.
1.1

Caption
Watermark on the bank currency note

Page
No.
4

1.2

Various classifications of watermarking

12

1.3

Image watermark embedding scheme

13

1.4

Image watermark detection scheme

13

2.1

FIR Edge Enhancement Pre-Filter

20

2.2

A General Frequency domain based watermarking model as presented


by Cox

23

2.3

Frequency regions in 8 x 8 DCT

27

2.4

JPEG Quantization matrix

28

2.5

1-Scale and 2-Scale 2-Dimensional Discrete Wavelet Transform

30

2.6

The Targeted types of to be developed watermarking schemes

43

3.1

JPEG Compression Scheme

45

3.2

An example sub image

46

3.3

Example sub image after subtracting 128 from each pixel

47

3.4

DCT of sub image shown in Figure 3.3

47

3.5

JPEG Quantization matrix

49

3.6

DCT values after quantization

49

3.7

JPEG Decompression Scheme

51

3.8

DCT values regenerated in decompression

51

3.9 (a)

Sub image pixel values (still shifted down by 128)

51

3.9 (b)

Decompressed sub image pixel values

52

3.10

Error matrix for example sub image

52

3.11

Test images of Lena, Mandrill, Pepper and Barbara (Gray)

58

3.12

Test images of Lena, Mandrill, Pepper and Goldhill (Colored)

59

3.13

Watermark logo used in the proposed schemes

59

xv

4.1 (a)

Extracted watermark logos from test images of Lena, Mandrill and


Pepper by applying DCT based scheme

4.1 (b)

62

Extracted watermark logos from test images of Lena, Mandrill and


Pepper by applying DWT based scheme

4.2 (a)

62

Extracted watermark logos from test images of Lena, Mandrill,


Pepper and Barbara by applying DCT based scheme

4.2 (b)

Extracted watermark logos from test images of Lena, Mandrill,


Pepper and Barbara by applying DWT based scheme

4.3

66
66

Extracted logos from original image (left) and transformed image


(right) of Lena, Mandrill, Pepper and Barbaras (Top to Bottom)
histogram equalized images (By applying DCT based scheme)

4.4

Swapping of 4 pairs to hide 0 or 1 in

conjunction with low

frequency values
4.5

71

Extracted watermark logos after JPEG compression at Q = 20 from


watermarked Lena, Mandrill and Pepper images

4.6

68

77

Extracted watermark logos from Lenas image after Horizontal


flipped, scaled, brightness /contrast adjusted and Noising (Left to
Right, Top to bottom)

4.7

78

Percentage decrease in quality of extracted watermark with respect to


JPEG quality factor

79

5.1

Recovered watermarks for Lena.bmp after jpeg attack at Q = 40

82

5.2

Watermarked test images keeping T = 150

91

5.3

Extracted watermark from watermarked Lena, Mandrill and Pepper


images respectively at T = 150

91

5.4

Recovered logos from attacked images

94

5.5

Extracted logos using proposed scheme from highly compressed


watermarked test images

95

6.1

Watermarked test images generated by keeping T = 150

105

6.2

Extracted watermark logos from watermarked Lena, Mandrill, Pepper


and Goldhill test images respectively at T = 150

xvi

105

6.3

Goldhill test image after hiding the watermark logo and the recovered
logo at T = 100

105

6.4

Extracted logos from attacked watermarked images

109

6.5

Comparison of correlation coefficients at Q = 10

110

6.6

Comparison of correlation coefficients at Q = 5

111

6.7

2-D Haar DWT

113

6.8

An example of 2 consecutive DWT blocks

117

6.9

An example of 2 consecutive DWT blocks

117

6.10

Watermark embedding approach

120

6.11

The watermark logo

122

6.12

Graph of the values shown in Table 6.6

123

6.13

Extracted logos from Lena, Mandrill and Peppers test images

124

6.14

The extracted logos using DWT based method

125

6.15

The extracted logos using DCT based method

126

6.16

Extracted logos from highly compressed JPEG images

126

6.17

Extracted watermark logos after applying common attacks

128

xvii

xviii

LIST OF TABLES
Table
No.
4.1

Caption

Page
No.

PSNR (in decibel) of extracted watermark logo from JPEG


compressed (Q = 20) watermarked image

65

4.2

PSNR of extracted logos from attacked test images

67

4.3

PSNR of extracted watermarks after JPEG compression

77

5.1

PSNR of Extracted watermark from JPEG compressed watermark test


images

82

5.2

PSNR of extracted watermark from attacked watermarked test images

84

5.3

PSNR of extracted watermark logos after JPEG compression

92

5.4

PSNR of extracted watermark logo from watermarked test images


after attacks

5.5

93

PSNR values of extracted logos from highly compressed watermarked


test images using various schemes

95

6.1

SD values of color channels for test images

106

6.2

PSNR and CC of extracted logo by using BLUE channel for all


images

6.3

107

PSNR and CC of extracted logo by using BLUE and GREEN


channels for images

108

6.4

CC of the extracted logos

108

6.5

PSNR of watermarked image and CC of extracted logo for various


values of T

122

6.6

Revised Table 6.5

122

6.7

CC of extracted logos from JPEG2000 attacked images

124

6.8

Decrement in the PSNR values after the application of DCT based


scheme

6.9

125

CC values of the extracted watermark logos recovered by both


recovery methods

125

xix

6.10

CC of extracted logo from highly compressed jpeg image using DCT


based recovery

126

6.11

CC of the extracted watermark logos

128

6.12

Comparison of CC of Extracted logos from JPEG compressed


(Q = 10) watermarked images

6.13

129

Comparison of CC of Extracted logos from JPEG compressed


(Q = 5) watermarked images

129

xx

CHAPTER 1
INTRODUCTION

The growth of high speed computer networks and World Wide Web (WWW) have explored
means of new business, scientific, entertainment and social opportunities in the form of
electronic publishing and advertising, massaging, real-time information delivery, data
sharing, collaboration among computers, product ordering, transaction processing, digital
repositories and libraries, web newspapers and magazines, network video and audio, personal
communication and lots more. The cost effectiveness of selling softwares in the form of
digital images and video sequences by transmission over WWW is greatly enhanced due to
the improvement in technology.
We know that one of the biggest technological events of the last two decades was the
invasion of digital media in an entire range of everyday life aspects. Digital data can be
stored efficiently and with a very high quality, and it can be manipulated very easily using
computers. Furthermore, digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. Digital media offer several
distinct advantages over analog media. The quality of digital audio, images and video
signals are higher than that of their analog counterparts. Editing is easy because one can
access the exact discrete locations that need to be changed. Copying is simple with no loss
of fidelity. A copy of a digital media is identical to the original. With digital multimedia
distribution over World Wide Web, authentications are more threatened than ever due to the
possibility of unlimited copying.

The easy transmission and manipulation of digital data

constitutes a real threat for information creators, and copyright owners want to be
compensated every time their work is used. Furthermore, they want to be sure that their
work is not used in an improper way (e. g. modified without their permission). For digital
data, copyright enforcement and content verification are very difficult tasks. One solution
would be to restrict access to the data using some encryption techniques.

However,

encryption does not provide overall protection. Once the encrypted data are decrypted, they
can be freely distributed or manipulated.
Unauthorized use of data creates several problems. For example, if we visit

http:\\www.

wallpaper.com, we observe that all the wallpaper images are created by the owners, which
are their Intellectual Property Right (IPR). Any user can download the wallpapers. Now,
consider that a user downloads the images and posts those images (either after modifying or
original) on his/her website. Three issues may arise in this situation:
1) How will the owner of wallpaper.com know that there is one more web server on
WWW posting their wallpapers?
2) If the owner knows about this fact, where shall he go to make a complaint?
3) The last but very important issue is that even if first two problems are resolved, how
the owner will prove the ownership on the wallpaper images posted on another
server?
The first issue is related to network technologies and involves issues like web crawler and
pattern matching etc. Second issue is related to the international copyright laws and is
another very tricky issue. This thesis does not deal with these 2 issues. This thesis covers
the third issue, the authentication i.e. how to prove the ownership?
The above problem can be solved by hiding some ownership data into the multimedia data,
which can be extracted later to prove the ownership. This idea is implemented in bank
currency notes embedded with the watermark which is used to check the originality of the
note. The same watermarking concept may be used in multimedia digital contents for
checking the authenticity of the original content.
To begin with a quick background of watermarking, first we present the history of data
hiding and related terminologies.

Then, we will move on to a discussion on the

watermarking, requirements that watermarking system must meet, types of the watermarking,
applications and then various attacks on a watermarking system.

1.1

DATA HIDING BACKGROUND

The solution of the problem discussed above seems to lie in a technique that dates back to
ancient Egypt and Greece: data hiding or steganography. Steganography deals with the
methods of embedding data within a medium (host or cover medium) in an imperceptible
way. All forms of digital data (still images, audio, video, text documents and multimedia
documents) can be used as a cover medium for information hiding.
The history of steganography goes all the way back to the 5th Century. The earliest known
writings about steganography were by the Greek historian Herodotus. The historian relates
how a slave had a message tattooed on his head by Histiaeus who was trying to get a
message to his son-in-law Aristagoras. Once the slaves hair was long enough to cover the
message he was sent to Aristagoras in the city of Miletus [92].
Stegnography has been used in many different ways. The simplest was the use of invisible
inks that a person could use to send a message to another person without anyone else
knowing. Different forms of invisible ink were used to conceal messages. Some of the more
common forms of invisible ink have been lemon juice, milk, and urine to name a few. If
someone wanted to conceal a message, he would simply write a message, using one of these
inks, on a sheet of paper that already had something written on it. The person receiving the
message would then hold the paper over a flame and the transparent message would appear.
Image stegnography was done during the early twentieth century. During the Boer War in
South Africa, the British were using Lord Robert Baden-Powell as a scout. He was scouting
the Boer artillery bases mapping their positions. He took his maps and converted them into
pictures of butterflies with certain markings on the wings that were actually the enemies
positions [92].

During World War II, Nazis introduced a new concept in espionage, which was called the
microdot. This simple device could conceal a full typewritten page within the size of a
common period. A microdot could hold valuable information such as charts, diagrams and
drawings.

Watermark
symbol is
added here to
prove the
originality

Figure 1.1: Watermark on the bank currency note

Thus, stegnography is an area which is, more or less, a Hide-&-Seek game. Some important
data or information is hidden in another medium. The cover medium has no relationship
with the data or information hidden. Data or information which is hidden is not encrypted
also. The key issue in a stegnography system becomes that no one should suspect that a
particular medium is carrying any hidden data or information.
We can extend the stegnography concept for the authentication of digital multimedia data.
Digital multimedia data which has to be protected is now the cover medium and then we can
hide the copyright data into it. In this case, there will be two major requirements as follows:
1) Imperceptibility: After hiding the copyright data, cover medium should not be
affected, and
2) Robustness: No body should be able to remove the data without affecting the cover
medium.

The copyright data may be termed as digital watermark data. This area of application of
stegnography is known as Digital Watermarking.

Therefore, digital watermark is a

message/data/information which is embedded into digital content (audio, video, images or


text) that can be detected or extracted later. Such message/data/information mostly carries
the copyright or ownership information of the content. The process of embedding digital
watermark information into digital content is known digital watermarking.
Before moving further in this discussion, we must first understand the difference of the
digital watermarking with other related terms like stegnography, cryptography and digital
signature.
1.1.1 STEGANOGRAPHY VS WATERMARKING
Watermarking is the subset of Stegnography. In Stegnography, data which is hidden has no
relationship with the cover medium and the requirement from such a system is that no
suspicion should arise that a medium is carrying any hidden data. In watermarking, unlike
stegnography, the data which is hidden has relationship with the cover medium data. Data
hidden is the ownership data of the cover medium and there is no issue like suspecting that a
particular medium is carrying some copyright data.
As the purpose of stegnography is to have a covert communication between two parties i.e.
existence of the communication is unknown to a possible attacker, and a successful attack
shall detect the existence of this communication. On the contrary, watermarking, as opposed
to stegnography, requires a system to be robust against possible attacks. Other requirements
of watermarking are entirely different from stegnography and these are discussed in detail in
Section 1.3.

1.1.2

CRYPTOGRAPHY VS. WATERMARKING

Cryptography can be defined as the processing of information into an unintelligible form


known as encryption, for the purpose of secure transmission. Through the use of a key,
the receiver can decode the encrypted message (the process known as decryption) to retrieve
5

the original message. So, cryptography is about protecting the contents of the message. But
as soon as the data is decrypted, all the in-built security and data is ready to use.
Cryptography "scrambles" a message so that it can not be understood by unauthorized user.
This does not happen in watermarking. Neither the cover medium nor the copyright data
changes its meaning. Rather, copyright data is hidden to give the ownership information of
the medium in which it is hidden.
1.1.3

DIGITAL SIGNATURE VS. WATERMARKING

Digital signatures, like written signatures, are used to provide authentication of the associated
input, usually called a "message. Digital signature is an electronic signature that can be used
to authenticate the identity of the sender of a message or the signer of a document, and
possibly to ensure that the original content of the message or document that has been sent is
unchanged. Digital signatures are easily transportable, cannot be imitated by someone else,
and can be automatically time-stamped. The ability to ensure that the original signed
message arrived means that the sender cannot easily repudiate it later. A digital signature can
be used with any kind of message, whether it is encrypted or not, simply so that the receiver
can be sure of the sender's identity and that the message arrived intact. A digital signature is
apart from the protected message, whereas a digital watermark is inside a multimedia
message. Both, digital signature and watermarking protect integrity and authenticity of a
document. Digital signature system is vulnerable to distortion but a watermark system has to
tolerate a limited distortion level.
So, to conclude, Watermarking is addingownership information in multimedia contents to
prove the authenticity.

This technology embeds a data, an unperceivable digital code,

namely the watermark, carrying information about the copyright status of the work to be
protected. Continuous efforts are being made to device efficient watermarking schema but
techniques proposed so far do not seem to be robust to all possible attacks and multimedia
data processing operations. The sudden increase in watermarking interest is most likely due
to the increase in concern over IPR. Today, digital data security covers such topics as access
control, authentication, and copyright protection for still images, audio, video, and

multimedia products. A pirate tries either to remove a watermark to violate a copyright or to


cast the same watermark, after altering the data, to forge the proof of authenticity. Generally,
the watermarking of still images, video, and audio demonstrate certain common fundamental
concepts.

1. 2

APPLICATION AREAS OF DIGITAL WATERMARKING

Watermarking techniques may be relevant in the following application areas [26]:


1.2.1 COPYRIGHT PROTECTION
The primary use of watermarking is where an organization wishes to assert its ownership of
copyright for digital objects.

This application is of great interest to big media

organizations, and of some interest to other vendors of digital information, such as news and
photo agencies.

These applications require a minimal amount of information to be

embedded, coupled with a high degree of resistance to signal modification (since they may
be subjected to deliberate attack). For example, now a days, a news channel AAJ-TAK is
showing the animals clips (which are already shown on Discovery Channel) by hiding the
Discovery channels logo on the video clips. As per the law, The AAJ-TAK should show the
curtsey-sign and should pay the copyright fee to the Discovery channel.

In such cases,

There is a strong need of watermarking as once the digital data is broadcasted, any body else
can start selling it without paying the IPR value to its owner.

1.2.2 COPY PROTECTION


Watermarking can be used as a strong tool to prevent illegal copying. For example, if an
audio CD has a watermark embedded into it, then any of the system (Hardware like DVD, or
software) can not make a copy of it, and even if it copies, the watermark data will not get
copied to new duplicate audio CD. Now the duplicate CD can be easily found because it
does not have watermark data. Some schemes have attempted to satisfy more complex copy
protection requirements. An early example is the Serial Copy Management System (SCMS),
introduced in the 1980s, which enabled a user to make a single digital audio tape of a
recording they had purchased but prevented the recording of further copies (i.e. second
7

generation) from that first copy. The scheme failed ultimately because not all manufacturers
of consumer equipment were prepared to implement the scheme in their products.
1.2.3

TEMPER DETECTION

In this application area, it is necessary to assure that the origin of a data object is
demonstrated and its integrity is proved. One example of temper detection is photographic
forensic information which may be presented as evidence in the court. Given the ease with
which digital images can be manipulated, there is a need to provide proof that an image has
not been altered. Such a mechanism could be built into a digital camera [29]. For example,
if a cops camera catches an over speeding vehicle then when proving the driver guilty in
front of the judge, the accused may claim that the video presented in the court is tempered
and the car shown in the video does not belong to him. A watermarking system which is
embedded in digital cameras may help to resolve the issue. If somebody tries to temper the
data, the watermark will get destroyed indicating that the data is tempered. In our country, a
well-known example is the Tahalka-Scam.
1.2.4

BROADCAST MONITORING

There are several types of organizations and individuals interested in monitoring the
broadcast of their interest. For example, advertisers want to ensure that they receive the exact
airtime that they have purchased from broadcasting firms. Musicians and actors want to
ensure that they receive accurate royalty payments for broadcasts of their performances and
copyright owners want to ensure that their property is not illegally rebroadcast by pirate
stations. In 1997, a scandal broke out in Japan regarding television advertising. At least two
stations had been routinely overbooking air time. Advertisers were paying for thousands of
commercials that were never aired [16]. The practice had remained largely undetected for
over twenty years because there were no systems in place to monitor the actual broadcast of
advertisements.

This broadcast monitoring can be implemented by putting a unique watermark in each video
or sound clip prior to broadcast. Automated monitoring stations can then receive broadcasts
and look for these watermarks identifying when and where each clip appears.
1.2.5

FINGERPRINTING

If monitoring and owner identification applications place the same watermark in all copies of
the same content, it may create a problem. If out of n number of legal buyers of a content,
one starts selling the contents illegally, it may be very difficult to catch who is redistributing
the contents without permission. Allowing each copy distributed to be customized for each
legal recipient can solve this problem. This capability allows a unique watermark to be
embedded in each individual copy. Now, if the owner finds an illegal copy, he can find out
who is selling his contents by finding the watermark which belongs to only singly legal
buyer. This particular application area is known as fingerprinting.

This is potentially

valuable both as a deterrent to illegal use and as a technological aid to investigation.


1.2.6

ANNOTATION APPLICATIONS

In this applications area, watermarks convey object-specific information (feature tags or


captions) to users of the object. For example, patient identification data can be embedded
into medical images. These applications require relatively large quantities of embedded data.
While there is no need to protect against deliberate tampering. Normal use of the data object
may involve such transformations as image cropping or scaling and will require the use of a
technique that is resistant to those types of modification.
For more details of various watermarking applications, one may refer [20].

1. 3

CHARACTERISTICS OF WATERMARKING SCHEMES

An effective watermarking scheme should have the following characteristics:


1) Imperceptibility: In terms of watermarking, imperceptibility means that after inserting
the watermark data, cover medium should not alter much. In other words, the
presence of the watermark data should not affect the cover medium being protected.
If a watermarking scheme does not ensure this requirement, it may happen that after
inserting a watermark data in a cover medium (say an image), image quality may alter
which the owner of the image will never like that a protecting mechanism modifies
his work.
2) Robustness: Robustness of the watermark data means that the watermark data should
not be destroyed if someone performs the common manipulations as well as
malicious attacks. It is more of a property and also a requirement of watermarking
and its applicability depends on the application area.
3) Fragility: Fragility means that the watermark data is altered or disturbed up to a
certain extent when someone performs the common manipulations & malicious
attacks.

Some application areas like temper detection may require a fragile

watermark to know that some tempering is done with his work. Some application
may require semi-fragility too. The semi-fragile watermark comprises a fragile
watermark component and a robust watermark component i.e. semi-fragile
watermarks are robust to some attacks but fragile to others attacks.
4) Resilient to common signal processing: The watermark should be retrievable even if
common signal processing operations are applied to the watermarked cover medium
data. These operations include digital-to-analog and analog-to-digital conversion (i.e.
taking the printout of an image and then scan it to create another digital copy of the
image), re-sampling, re-quantization (including dithering and recompression), and
common signal enhancements such as image contrast, brightness and color
adjustment, or audio bass and treble adjustment, high pass and low pass filtering,
histogram equalization of an image and format conversion (BMP image to JPEG
image, MPEG movie to WMV movie, mp3 song to mp4 etc.)
10

5) Resilient to common geometric distortions (image and video data): Watermarks in


image and video data should also be immune from geometric image operations such
as rotation, translation, cropping and scaling. This property is not required for audio
watermarking.
6) Robust to subterfuge attacks (collusion and forgery): In addition, the watermark
should be robust to collusion attack. Multiple individuals, who possess a watermarked
copy of the data, may collude their watermark copies to destroy the watermark
presence and can generate a duplicate of the original copy. Further, if a digital
watermark is to be used in litigation, it must be impossible for colluders to combine
their images to generate a different valid watermark.
7) Unambiguousness: Retrieval of the watermark should unambiguously identify the
owner. Furthermore, the accuracy of owner identification should not degrade much
in the case of an attack. The Unzign and Stirmark [97] have shown remarkable
success in removing data embedded by commercially available programs.
Watermarking of watermarked image (re-watermarking) is also a major threat [97].

1.4

TYPES OF DIGITAL WATERMARKS

Prof. S. Mohanty presents a very good classification of watermarking areas in his paper [62].
We can classify the types of watermarking based on the cover medium, embedding domain,
perception and application domain. Figure 1.2 shows the various classifications of
watermarking.
Based on their embedding domain, watermarking schemes can be classified as follows:
1) Spatial Domain: The watermarking system directly alters the main data elements (like
pixels in an image) to hide the watermark data.
2) Transformed Domain: The watermarking system alters the frequency transforms of
data elements to hide the watermark data. This has proved to be more robust than the
spatial domain watermarking.

11

3) Feature Domain: The watermarking system takes into account the region, boundary
and object characteristics. It presents better detection and recovery from attacks.

Figure 1.2: Various classifications of watermarking

Watermarking techniques can also be divided into four categories, according to the type of
document to be watermarked, as follows.
1) Image Watermarking: Figure 1.3 and 1.4 represent the general scheme of an image
watermarking, embedding and decoding (specifically key based, invisible and fragile)

12

system respectively. E represents the watermarking embedding algorithm and D


represents the watermarking decoding algorithm.
2) Other types of watermarking, according to the type of document to be watermarked
are Video Watermarking, Audio Watermarking and Text Watermarking.

Figure 1.3: Image watermark embedding scheme

Figure 1.4: Image watermark detection scheme

According to the human perception, the digital watermarks can be divided into 4 different
types: Visible watermark, Invisible-Robust watermark, Invisible-Fragile watermark, and dual
watermark. Visible watermark is a secondary translucent overlaid into the primary image.
The watermark appears visible to a casual viewer on a careful inspection. The invisiblerobust watermark is embedded in such a way that alternations made to the pixel value are
perceptually not noticed and it can be recovered only with appropriate decoding mechanism.
The fragile watermark is embedded in such a way that any manipulation or modification of
the image would alter or destroy the watermark. Dual watermark is a combination of a
visible and an invisible watermark [8].

13

According to application domain, Source-based watermarks are desirable for ownership


identification or authentication where a unique watermark identifies the owner. A sourcebased watermark could be used for authentication and to determine whether a received image
or other electronic data has been tampered. The watermark could also be destination based
where each distributed copy gets a unique watermark identifying the particular buyer. The
destination based watermark could be used to trace the buyer in the case of illegal reselling.
This is used in fingerprinting. A watermark is said private if only authorized readers can
detect it. In other words, in private watermarking, a mechanism is envisaged that makes it
impossible for unauthorized people to extract the watermark. A watermarking algorithm is
said blind if it does not resort to the comparison between the original non-marked and the
marked document to recover the watermark. Conversely, a watermarking algorithm is said
non-blind if it needs the original data to extract the information contained in the watermark.
The definition of invertible and quasi-invertible is more technical and can be given as
follows [2]:
If E is the Embedding algorithm, D is detection algorithm, C is Comparator function, I is
original cover image, is watermarked image, J is recovered attacked image, S is watermark
signal and S is extracted watermark data, then:
1) E (I, S) =
2) D (J, I) = S or D (J) = S
3) Comparator C:

A watermarking scheme (E, D, C) is invertible if:


1) Inverse mapping E-1 does exist such that E-1 () = (, S) &E (, S) = ;
2) E-1 is computational feasible;

14

3) S is an allowed watermark;
4) and are perceptually similar; and
5) Comparator output C (D (, ), S) = 1
Otherwise the watermarking scheme is non-invertible.
A watermarking scheme (E, D, C) is quasi-invertible if:
1) Properties for invertible watermarking schemes apply;
2) Only difference E (, S) = ; and
3) and perceptually similar.
Otherwise the watermarking scheme is non-quasi-invertible. A Non-invertible scheme can
be quasi-invertible and Non-quasi-invertibility implies non-invertibility.

1.5

STRUCTURE OF THE THESIS

This thesis comprises of the following chapters:


Chapter 2 describes the image watermarking literature survey and problem statement.
Chapter 3 describes the preliminaries (like background of JPEG compression, 2DDCT and
DWT, image quality parameter, some standard watermarking techniques which are used to
compare the performances of the proposed techniques etc and test images data). The
watermarking techniques for gray images have been proposed in Chapter 4.

Chapter 5

describes the proposed watermarking techniques and issues related to colored BMP images.
In Chapter 6, the proposed watermarking techniques for JPEG images have been given.
Finally the summary of results, conclusions and future work is given in Chapter 7 followed
by references, authors publications and synopsis at the end.

15

16

CHAPTER-2
IMAGE WATERMARKING LITERATURE SURVEY

Within the field of watermarking, image watermarking particularly has attracted lot of
attention in the research community. Most of the research work is dedicated to image
watermarking as compared to audio and video. There may be 3 reasons for it. Firstly,
because of ready availability of the test images, secondly because it carries enough
redundant information to provide an opportunity to embed watermarks easily, and lastly,
it may be assumed that any successful image watermarking algorithm may be upgraded
for the video also.
Images are represented/stored in spatial domain as well as in transform domain. The
transform domain image is represented in terms of its frequencies; whereas, in spatial
domain it is represented by pixels. In simple terms, transform domain means the image is
segmented into multiple frequency bands. To transfer an image to its frequency
representation, we can use several reversible transforms like Discrete Cosine Transform
(DCT), Discrete Wavelet Transform (DWT), or Discrete Fourier Transform (DFT). Each
of these transforms has its own characteristics and represents the image in different ways.
Watermarks can be embedded within images by modifying these values, i.e. the
transform domain coefficients. In case of spatial domain, simple watermarks could be
embedded in the images by modifying the pixel values or the Least Significant Bit (LSB)
values. However, more robust watermarks could be embedded in the transform domain of
images by modifying the transform domain coefficients. In 1997 Cox et al. presented a
paper Secure Spread Spectrum Watermarking for Multimedia [19], one of the most
cited paper (cited 2985 times till April 2008 as per Google Scholar search), and after that
most of the research work is based on this work. Even though spatial domain based
techniques can not sustain most of the common attacks like compression, high pass or
low pass filtering etc., researchers present spatial domain based schemes. Firstly, brief

17

introductions of some classical well-known spatial domain based schemes are being
given as follows [19]:

2.1

SPATIAL DOMAIN BASED WATERMARKING SCHEMES

2.1.1

LSB BASED SCHEMES

In their paper, Macq and Quisquater [60] briefly discussed the issue of watermarking
digital images as part of a general survey on cryptography and digital television. The
authors provided a description of a procedure to insert a watermark into the least
significant bits of pixels located in the vicinity of image contours. Since it relies on
modifications of the least significant bits, the watermark is easily destroyed. Further, their
method is restricted to images, in that it seeks to insert the watermark into image regions
that lie on the edge of contours.
Rhoads [79] described a method that adds or subtracts small random quantities from each
pixel. Addition or subtraction is determined by comparing a binary mask of bits with the
LSB of each pixel. If the LSB is equal to the corresponding mask bit, then the random
quantity is added, otherwise it is subtracted. The watermark is subtracted by first
computing the difference between the original and watermarked images and then by
examining the sign of the difference, pixel by pixel, to determine if it corresponds to the
original sequence of additions and subtractions. This method does not make use of
perceptual relevance, but it is proposed that the high frequency noise be prefiltered to
provide some robustness to lowpass filtering. This scheme does not consider the problem
of collusion attacks.

2.1.2

PATCH WORK BASED SCHEMES

Another, well known spatial domain based scheme is patchwork-based technique given
by Bender et al. [7]. They described two watermarking schemes. The first is a statistical
method called patchwork. Patchwork randomly chooses pairs of image points, and
increases the brightness at one point by one unit while correspondingly decreasing the
brightness of another point. The second method is called texture block coding wherein

18

a region of random texture pattern found in the image is copied to an area of the image
with similar texture. Autocorrelation is then used to recover each texture region. The
most significant problem with this scheme is that it is only appropriate for images that
possess large areas of random texture. The scheme could not be used on images of text.
Other Patchwork based algorithm can be found in [110, 124].

2.1.3 CORRELATION BASED WATERMARKING SCHEMES


The most straightforward way to add a watermark to an image in the spatial domain is to
add a pseudorandom noise pattern to the luminance values of its pixels. Many methods
are based on this principle [6, 11, 27, 33-34, 53, 68, 70, 91, 95, 114-117].
2.1.3.1 CORRELATION BASED SCHEMES WITH 1 PN SEQUENCE: A well
known technique for watermark embedding is to exploit the correlation properties of
additive pseudo-random noise patterns as applied to an image [42, 52]. A Pseudo-random
Noise (PN) pattern W (x, y) is added to the cover image I (x, y), according to the
Equation 2.1 given below:
I w ( x, y ) = I ( x, y ) + k * W ( x, y ) (2.1)
In Equation 2.1, k denotes a gain factor and IW the resulting watermarked image.
Increasing k increases the robustness of the watermark at the expense of the quality of the
watermarked image. To retrieve the watermark, the same pseudo-random noise generator
algorithm is seeded with the same key, and the correlation between the noise pattern and
possibly watermarked image is computed. If the correlation exceeds a certain threshold T,
the watermark is detected, and a single bit is set. This method can easily be extended to a
multiple-bit watermark by dividing the image into blocks and performing the above
procedure independently on each block.
2.1.3.2 CORRELATION-BASED IMAGE WATERMARKING SCHEMES WITH
2PN SEQUENCES: This basic algorithm, as given in previous section, can be improved
in a number of ways. First, the notion of a threshold being used for determining a logical
19

1 or 0 can be eliminated by using two separate pseudo-random noise patterns. One


pattern is designated a logical 1 and the other a logical 0. The above procedure is
then performed once for each pattern, and the pattern with the higher resulting correlation
is used. This increases the probability of correct detection, even after the image has been
subject to attack [42, 52].
2.1.3.3 IMAGE WATERMARKING USING PRE-FILTERING: We can further
improve the basic algorithm by pre-filtering the image before applying the watermark. If
we can reduce the correlation between the cover image and the PN sequence, we can
increase the immunity of the watermark to additional noise. By applying the edge
enhancement filter shown below in Figure 2.1, the robustness of the watermark can be
improved with no loss of capacity and very little reduction of image quality [42, 52].

Fedge

1 1 1
1
= 1 10 1
2
1 1 1

Figure 2.1: FIR Edge Enhancement Pre-Filter

2.1.4 CDMA BASED IMAGE WATERMARKING SCHEME


Rather than determining the values of the watermark from blocks in the spatial domain,
we can employ CDMA spread-spectrum schemes to scatter each of the bits randomly
throughout the cover image, thus increasing capacity and improving resistance to
cropping. The watermark is first formatted as a long string rather than a 2D image. For
each value of the watermark, a PN sequence is generated using an independent seed.
These seeds could either be stored or themselves generated through PN methods. The
summation of all of these PN sequences represents the watermark, which is then scaled
and added to the cover image [42, 52].
To detect the watermark, each seed is used to generate its PN sequence which is then
correlated with the entire image. If the correlation is high, that bit in the watermark is set
to 1, otherwise a 0. The process is then repeated for all the values of the watermark.
20

CDMA improves on the robustness of the watermark significantly but it requires more
computation.

2.1.5 OTHER SPATIAL DOMAIN BASED WATERMARKING SCHEMES


In [104], a method that embeds a binary watermark image in the spatial domain is
proposed. A spatial transform that maps each pixel of the watermark image to a pixel of
the host image, is used. Chaotic spread of watermark image pixels in the host image is
achieved by toral automorphisms. For watermark embedding, the intensity of the
selected pixels is modified by an appropriate function that takes into account
neighborhood information in order to achieve watermark robustness to modifications. For
detection, a suitable function is applied on each of the watermarked pixels to determine
the binary digit (0 or 1) that has been embedded. The inverse spatial transform is then
used to reconstruct the binary watermark image.
In the method proposed in [69], the image is split into two random subsets A and B and
the intensity of pixels in A is increased by a constant embedding factor k. Watermark
detection is performed by evaluating the difference of the mean values of the pixels in
subsets A and B. This difference is expected to be equal to k for a watermarked image
and equal to zero for an image that is not watermarked. Hypothesis testing can be used to
decide for the existence of the watermark. The above algorithm is vulnerable to lowpass
operations.

Extensions to above algorithm are proposed in [64]. According to this

paper, the robustness of the method can be increased by grouping pixels so as to form
blocks of certain dimensions to enhance the low pass characteristics of the watermark
signal. Alternatively, one can take advantage of the fact that different embedding factor
can be used for each pixel, to shape appropriately the watermark signal. An optimization
procedure that calculates the appropriate embedding value for each pixel so that the
energy of the watermark signal is concentrated at low frequencies is proposed.
Constraints that ensure that the watermark signal is invisible can be incorporated in the
optimization procedure.

21

In [45] the authors derived analytical expressions for the probabilities P-, P+ of false
negative and false positive watermark detection. Their model assumes an additive
watermark and a correlator-based detection stage. Both, the white watermarks and
watermarks having low pass characteristics, are considered. The host image is treated as
noise, assuming a first order separable autocorrelation function. The probabilities P-, P+
are expressed in terms of the watermark to image power ratio. The authors conclude that
detection error rates are higher for watermarks with low pass characteristics.
In last 12 years, number of publications in this area is increasing very rapidly and no
survey can cover all the presented schemes, but there are some very good survey papers
and interested reader may explore the papers [3, 13, 54, 76]. We are limiting the
discussion of the spatial domain based schemes here.

2.2

TRANSFORMED DOMAIN BASED SCHEMES

As presented in literature, transformed domain based watermarking schemes are more


robust as compared to simple spatial domain watermarking schemes. Such algorithms are
robust against simple image processing operations like low pass filtering, brightness and
contrast adjustment, blurring etc. However, they are difficult to implement and are
computationally more expensive. We can use either of Discrete Fourier Transform
(DFT), Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) but
DCT is the most exploited one. A General transformed domain based scheme, as
presented by Cox, is shown in Figure 2.2. A very good discussion on DCT/DWT/DFT
based watermarking schemes is given in [76].

2.2.1

DFT BASED WATERMARKING SCHEMES

We start from DFT. There are few algorithms that modify these DFT magnitude and
phase coefficients to embed watermarks. Ruanaidh et al. proposed a DFT watermarking
scheme in which watermark is embedded by modifying the phase information within the
DFT. It has been shown that phase based watermarking is robust against image contrast
operation [114]. Later Ruanaidh and Pun showed how Fourier Mellin transform could be

22

used for digital watermarking. Fourier Mellin transform is similar to applying Fourier
Transform to log-polar coordinate system for an image.
This scheme is robust against geometrical attacks [116]. De Rosa et al. proposed a
scheme to insert watermark by directly modifying the mid frequency bands of the DFT
magnitude component [115]. Ram kumar et al. also presented a data hiding scheme based
on DFT, where they modified the magnitude component of the DFT coefficients. Their
simulations suggest that magnitude DFT survives practical compression which can be
attributed to the fact that most practical compression schemes try to maximize the PSNR.
Hence using magnitude DFT is a way to exploit the hole in most practical compression
schemes.

Figure 2.2: A General Frequency domain based watermarking model as presented by Cox [19]

23

The proposed scheme is shown to be resistant to Joint Photographic Expert Group


(JPEG) and (Set Partitioning In Hierarchical Trees) SPIHT compression [68]. Lin et al.
presented a RST resilient watermarking algorithm. In their algorithm, the watermark is
embedded in the magnitude coefficients of the Fourier transform re-sampled by log-polar
mapping. The scheme is, however, not robust against cropping and shows weak
robustness against JPEG compression (Q = 70) [53]. Solachidis and Pitas presented a
novel watermarking scheme. They embed a circularly symmetric watermark in the
magnitude of the DFT domain [8]. Since the watermark is circular in shape with its centre
at image center, it is robust against geometric rotation attacks. The watermark is centered
around the mid frequency region of the DFT magnitude. Neighborhood pixel variance
masking is employed to reduce any visible artifacts. The scheme is computationally not
expensive to recover from rotation. Robustness against cropping, scaling, JPEG
compression, filtering, noise addition and histogram equalization is demonstrated. A
semi-blind watermarking scheme has been proposed by Ganic and Eskicioglu [30]. They
embed circular watermarks with one in the lower frequency while the other is in the
higher frequency.
2.2.2

DCT BASED WATERMARKING SCHEMES

DCT domain watermarking can be classified into Global DCT watermarking and Block
based DCT watermarking. One of the first algorithms presented by Cox et al. [19] used
global DCT approach to embed a robust watermark in the perceptually significant portion
of the Human Visual System (HVS). Embedding in the perceptually significant portion of
the image has its own advantages because most compression schemes remove the
perceptually insignificant portion of the image. In spatial domain it represents the LSB.
However in the frequency domain it represents the high frequency components.
As described in [76], steps in DCT Block Based Watermarking Algorithm are:
1) Segment the image into non-overlapping blocks of 8x8;
2) Apply forward DCT to each of these blocks;
3) Apply some block selection criteria (e.g. HVS);

24

4) Apply coefficient selection criteria (e.g. highest);


5) Embed watermark by modifying the selected coefficients; and
6) Apply inverse DCT transform on each block.
Most DCT based algorithms differ with each other on account of step 3 and 4 i.e. they
differ either in the block selection criteria or coefficient selection criteria. Initially, Koch,
Rindfrey, and Zhao [7] proposed a method for watermarking images. In that method, they
break up an image into 8x8 blocks and compute discrete cosine transform (DCT) of each
of these blocks. A pseudorandom subset of the blocks is chosen and then in each such
block, a triplet of frequencies is selected from one of 18 predetermined triplets and
modified so that their relative strengths encode a 1 or 0 value. The 18 possible triplets
are composed by selection of three out of eight predetermined frequencies within the 8x8
DCT block. The choice of the eight frequencies to be altered within the DCT block is
based on a belief that the middle frequencies have moderate variance, i.e. they have
similar magnitude. This property is used to allow the relative strength of the frequency
triplets to be altered without requiring a modification that would be perceptually
noticeable.
Several DCT based schemes are presented in [8, 17-19, 21, 37, 71, 74, 81, 99, 118].
Using the DCT, an image can easily be split up in pseudo frequency bands so that the
watermark can conveniently be embedded in the most important middle band frequencies.
Furthermore, the sensitivity of the HVS to the DCT based images has been extensively
studied, which resulted in the recommended JPEG quantization Table [112]. These
results can be used for predicting and minimizing the visual impact of the distortion
caused by the watermark. Finally, the block-based DCT is widely used for image and
video compression. By embedding a watermark in the same domain as the compression
scheme used to process the image (in this case in the DCT domain), we can anticipate
lossy compression because we are able to anticipate which DCT coefficients will
be discarded by

the

compression

scheme.

Furthermore, we can exploit the DCT

decomposition to make real-time watermark applications.

25

Further

improvements

for

DCT-domain

correlation-based watermarking systems'

performance could be achieved by using watermark detectors based on generalized


Gaussian model instead of the widely used pure Gaussian assumption [35]. By
performing a theoretical analysis for DCT-domain watermarking methods for images, the
authors in

[35] provided analytical expressions which could be used to measure

beforehand the performance expected for a certain image and to analyze the influence of
the image characteristics and system parameters (e.g. watermark length) on the final
performance. Furthermore, the result of this analysis may help in determining the proper
detection threshold T to obtain a certain false positive rate. The authors in [35] claimed
that by abandoning the pure Gaussian noise assumption, some substantial performance
improvements could be obtained.
In [4], the authors embedded a watermark signal domain by modifying a number of
predefined DCT coefficients. They used a weighting factor to weight the watermark
signal in the spatial domain according to HVS characteristics. In [75] authors embedded
watermark data in DCT Difference (JND) as predicted domain in perceptually meaningful
way and used the Just Noticeable by model reported in [108].
2.2.2.1 THE MIDDLE-BAND COEFFICIENT EXCHANGE SCHEME [42, 52]:
The middle-band frequencies (FM) of an 8x8 DCT block are shown in Figure 2.3. In this
Figure, FL is used to denote the lower frequency components of the block and FH is used
to denote the higher frequency components. FM is chosen as embedding region to
provide additional resistance to lossy compression techniques, while avoiding significant
modification of the cover image. First, 8x8 DCT of an original image is taken. Then, two
locations DCT (u1, v1) and DCT (u2, v2) are chosen from the FM region for comparison of
each 8 x 8 block. These locations are selected based on the recommended JPEG
quantization table shown in Figure 2.4. If two locations are chosen such that they have
identical quantization values, then any scaling of one coefficient will scale the other by
the same factor to preserve their relative strength. It may be observed from Figure 2.4,
that coefficients at location (4, 1) and (3, 2) or (1, 2) and (3, 0) are more suitable
candidates for comparison because their quantization values are equal. The DCT block

26

will encode a 1 if DCT (u1, v1) > DCT (u2, v2); otherwise it will encode a 0. The
coefficients are swapped if the relative size of coefficients does not agree with the bit that
is to be encoded [42, 52].
Thus, instead of embedding any data, this scheme is hiding watermark data by means of
interpreting 0 or 1 with relative values of two fixed locations in middle frequency
region.

FL
FM
FH

Figure 2.3: Frequency regions in 8 x 8 DCT

Swapping of such coefficients will not alter the watermarked image significantly, as it is
generally believed that DCT coefficients of middle frequencies have similar magnitudes.
Further, the robustness of the watermark can be improved by introducing a watermark
strength constant k, such that DCT (u1, v1) DCT (u2, v2) > k. If coefficients do not
meet these criteria, they are modified by the use of random noise to satisfy the relation.
Increasing k thus reduces the chance of detection errors at the expense of additional
image degradation. By increasing k, larger coefficients remain larger even after lot of
compression and thus help in decoding because their relative values decide the decoding
of the watermark data.
While extracting the watermark, again the 8x8 DCT of image in taken in which 1 is
decoded if DCT (u1, v1) > DCT (u2, v2); otherwise a 0 is decoded.

27

Figure 2.4: JPEG Quantization matrix

Limitation of middle-band coefficient exchange scheme: Experimental results show that


Middle-Band Coefficient Exchange is quite efficient against JPEG compression,
Cropping, Noising and other common image manipulation operations. But above scheme
has one serious drawback. If only one pair of coefficient is used (say (4, 1) and (3, 2)) to
hide the watermark data, then it is vulnerable to collusion attack. By analyzing four or
five watermarked copies of an image, one can easily find out that these coefficients
always have a certain pattern and attacker can predict the watermark as well as destroy it.
2.2.2.2 DCT-CDMA BASED IMAGE WATERMARKING [42, 52]: In this
technique authors embedded a PN sequence W into the middle frequencies of the DCT
block. A DCT block can be modulated using the Equation 2.2.
I (u , v) + k * W x , y (u , v), u , v FM
.. (2.2)
I W x , y (u , v) = x , y
Ix, y (u , v),
u , v FM

For each 8 x 8 block of the image, the DCT for the block is first calculated. In that block,
the middle frequency components FM are added to the PN sequence W, multiplied by a
gain factor k. Each block is then inverse-transformed to give the final watermarked image
IW.
The watermarking procedure is made somewhat more adaptive by slightly altering the
embedding process to the method shown in Equation 2.3.

28

I (u , v) * (1 + k * W x , y (u , v)), u , v FM
... (2.3)
I W x , y (u , v) = x , y
Ix, y (u , v),
u , v FM

This slight modification scales the strength of the watermarking based on the size of the
particular coefficients being used. Larger values of k can thus be used for coefficients of
higher magnitude; in effect strengthening the watermark in regions that can afford it;
weakening it in other regions.
For detection, the image is broken up into same 8x8 blocks and a DCT is taken. The same
PN sequence is then compared to the middle frequency values of the transformed block.
If the correlation between the sequences exceeds some threshold T, a 1 is detected for
that block; otherwise a 0 is detected. Again k denotes the strength of the watermarking,
where increasing k increases the robustness of the watermark at the expense of quality.

2.2.3 DWT BASED WATERMARKING SCHEMES


If watermarking techniques can exploit the characteristics of the Human Visual System
(HVS), it is possible to hide watermarks with more energy in an image, which makes
watermarks more robust. From this point of view, the DWT is a very attractive transform,
because it can be used as a computationally efficient version of the frequency models for
the HVS [5]. For instance, it appears that the human eye is less sensitive to noise in high
resolution DWT bands and in the DWT bands having an orientation of 45 (i.e., HH
bands). Furthermore, DWT image and video coding, such as embedded

zero-tree

wavelet (EZW) coding, are included in the upcoming image and video compression
standards, such as JPEG2000 [112]. Thus DWT decomposition can be exploited to
make a real-time watermark application.
Many approaches apply the basic schemes described at the beginning of this section
to the high resolution DWT bands, LH, HH, and HL [35, 40]. A large number of
algorithms operating in the wavelet domain have been proposed till date.

29

Figure 2.5: 1-Scale and 2-Scale 2-Dimensional Discrete Wavelet Transform

2.2.3.1 CDMA-DWT BASED WATERMARKING SCHEME: This scheme is the


most straightforward scheme which is similar to embedding scheme to that used in the
DCT-CDMA scheme. The embedding of a CDMA sequence in the frequency bands is
shown in Equation 2.4.
W + Wi xi , u , v HL, LH
. (2.4)
I W u ,v = i
Wi
u , v LL, HH

where

Wi

denotes the coefficient of the transformed image, xi the bit of the watermark to

be embedded, and a scaling factor. To detect the watermark, same pseudo-random


sequence used in CDMA generation is generated and its correlation is determined with
the two transformed frequency bands. If the correlation exceeds some threshold T, the
watermark is detected.
This can be easily extended to multiple bit messages by embedding multiple watermarks
into the image. In the spatial version, a separate seed is used for each PN sequence,
which are then added to the frequency coefficients. During detection, if the correlation
exceeds T for a particular sequence a 1 is recovered; otherwise a 0. The recovery
process then iterates through the entire PN sequence until all the bits of the watermark
have been recovered.

30

DWT based watermarking schemes follow the same guidelines as DCT based schemes,
i.e. the underlying concept is the same; however, the process to transform the image into
its transform domain varies and hence the resulting coefficients are different. Wavelet
transforms use wavelet filters to transform the image. There are many available filters,
although the most commonly used filters for watermarking are Haar Wavelet Filter,
Daubechies Orthogonal Filters and Daubechies Bi-Orthogonal Filters. Each of these
filters decomposes the image into several frequencies. Single level decomposition gives
four frequency representations of the images. In their paper [76], authors presented a
survey of wavelet based watermarking algorithms. They classify algorithms based on
decoder requirements as Blind Detection or Non-blind Detection. As mentioned earlier
blind detection doesn't require the original image for detecting the watermarks; however,
non-blind detection requires the original image.
2.2.3.2 DWT BASED BLIND WATERMARK DETECTION: Lu et al. [58]
presented a novel watermarking technique called as "Cocktail Watermarking". This
technique embeds dual watermarks which compliment each other. This scheme is
resistant to several attacks, and no matter what type of attack is applied; one of the
watermarks can be detected. Furthermore, they enhance this technique for image
authentication and protection by using the wavelet based Just Noticeable Distortion
(JND) values. Hence this technique achieves copyright protection as well as content
authentication simultaneously. Zhu et al. [126] presented a multi-resolution watermarking
scheme for watermarking video and images. The watermark is embedded in all the high
pass bands in a nested manner at multiple resolutions. This scheme doesn't consider the
HVS aspect; however, Kaewkamnerd and Rao [43-44] improve this scheme by adding
the HVS factor in account. Voyatzis and Pitas [104], who presented the "toral
automorphism" concept, provide a technique to embed binary logo as a watermark which
can be detected using visual models as well as by statistical means. So, in case the image
is degraded too much and the logo is not visible, it can be detected statistically using
correlation. Watermark embedding is based on a chaotic (mixing) system. Original image
is not required for watermark detection. However, the watermark is embedded in spatial
domain by modifying the pixel or luminance values.

31

A similar approach is presented for the wavelet domain [121], where the authors
proposed a watermarking algorithm based on chaotic encryption. Zhao et al.[125]
presented a dual domain watermarking technique for image authentication and image
compression. They used the DCT domain for watermark generation and DWT domain for
watermark insertion. A soft authentication watermark is used for tamper detection and
authentication while a chrominance watermark is added to enhance compression. They
use the orthogonality of DCT-DWT domain for watermarking [125].
2.2.3.3 DWT BASED NON-BLIND WATERMARK DETECTION: This technique
requires the original image for detecting the watermark. Most of the schemes found in
literature use a smaller image as a watermark and hence cannot use correlation based
detectors for detecting the watermark; as a result they rely on the original image for
informed detection. The size of the watermark image (normally a logo) normally is
smaller compared to the host image. Xia et al. presented a wavelet based non-blind
watermarking technique for still images where watermarks are added to all bands except
the approximation band. A multi-resolution based approach with binary watermarks is
presented here [37]. Here, both the watermark logo as well as the host image is
decomposed into sub bands and later embedded. Watermark is subjectively detected by
visual inspection; however, an objective detection is employed by using normalized
correlation. Lu et al. presented another robust watermarking technique based on image
fusion. They embedded a grayscale and binary watermark which is modulated using the
"toral automorphism" described in [106]. Watermark is embedded additively. The
novelty of this technique lies in the use of secret image instead of host image for
watermark extraction and use of image dependent and image independent permutations to
de-correlate the watermark logos [57]. Raval and Rege presented a multiple
watermarking scheme. The authors argued that if the watermark is embedded in the low
frequency components, it is robust against low pass filtering, lossy compression and
geometric distortions. On the other hand, if the watermark is embedded in high frequency
components, it is robust against contrast and brightness adjustment, gamma correction,
histogram equalization and cropping and vice-versa. Thus, to achieve overall robustness

32

against a large number of attacks, the authors proposed to embed multiple watermarks in
low frequency and high frequency bands of DWT [78].
Kundur and Hatzinakos [50] presented image fusion watermarking scheme. They used
salient features of the image to embed the watermark. They used a saliency measure to
identify the watermark strength and later embedded the watermark additively.
Normalized correlation is used to evaluate the robustness of the extracted watermark.
Later the authors proposed another scheme termed as FuseMark [51] which includes
minimum variance fusion for watermark extraction. Here, they propose to use a
watermark image whose size is a factor of the host by 2xy. Tao and Eskicioglu presented
an optimal wavelet based watermarking scheme. They embedded binary logo watermark
in all the four bands. But they embedded the watermarks with variable scaling factor in
different bands. The scaling factor is high for the LL sub band but for the other three
bands it is lower. The quality of the extracted watermark is determined by Similarity
Ratio measurement for objective calculation [100]. Ganic and Eskicioglu inspired by
Raval and Rege [78] proposed a multiple watermarking scheme based on DWT and
Singular Value Decomposition (SVD). They argued that the watermark embedded by
Raval and Rege [78] scheme was visible in some parts of the image especially in the low
frequency areas, which reduced the commercial value of the image. Hence they
generalized their scheme by using all the four sub bands and embedding the watermark in
SVD domain. The core technique is to decompose an image into four sub bands and then
applying SVD to each band. The watermark is actually embedded by modifying the
singular values from SVD [30].

2.3

RECENT METHODOLOGIES

Now-a-days, researchers are focusing on mixing of spatial and transformed domains (i.e.
combinations of DFT, DWT and DCT) concepts and also applying more and more
mathematical and statistical model, and other interdisciplinary approaches in
watermarking: for example use of chaotic theory, fractal image coding etc. In this section
we are presenting the brief of few recent watermarking algorithms.

33

In [103], authors presented a reversible watermarking scheme for the 2D-vector data
(point coordinates), which are used in geographical information related applications. This
reversible watermarking scheme exploits the high correlation among points in the same
polygon in a map and achieves the reversibility of the whole scheme by an 8-point
integer DCT, which ensures that the original 2D-vector data can be watermarked during
the watermark embedding process and then perfectly restored during the watermark
extraction process. In this scheme, author used an efficient highest frequency coefficient
modification technique in the integer DCT domain to modulate the watermark bit 0 or
1, which can be determined during extraction without using any additional information.
To alleviate the visual distortion in the watermarked map caused by the coefficient
modification, they proposed an improved reversible watermarking scheme based on the
original coefficient modification technique. Combined with this improved scheme, the
embedding capacity could be greatly increased while the watermarking distortion is
reduced as compared to the original coefficient modification scheme presented in [103].
In [65], authors presented zero-knowledge watermark detectors. Current detectors are
based on a linear correlation between the asset features and a given secret sequence. This
detection function is susceptible of being attacked by sensitivity attacks for which zeroknowledge does not provide protection. In this work, a new zero-knowledge watermark
detector robust to sensitivity attacks is presented, using the generalized Gaussian
Maximum Likelihood (ML) detector as the basis. The inherent robustness that this
detector presents against sensitivity attacks, together with the security provided by the
zero-knowledge protocol that conceals the keys that could be used to remove the
watermark or to produce forged assets, results in a robust and secure protocol.
Additionally, two new zero-knowledge proofs for modulus and square root calculation
are presented. They serve as building blocks for the zero-knowledge implementation of
the Generalized Gaussian ML detector, and also open new possibilities in the design of
high level protocols.

34

If digital watermarking is to adequately protect content in systems which provide


resolution and quality scalability, then the watermarking algorithms must provide both
resolution and quality scalability. Although there exists a trade off between resolution
and quality scalability, it has been demonstrated that it is possible to achieve both types
by taking advantage of human visual system characteristics to increase quality scalability
without compromising resolution scalability. Watermarking algorithms considering this
problem have been proposed; however, they tend to focus on a single type of scalability,
resolution [96, 120] or quality [12, 98]. Peng et al. [66] considered both types, but their
algorithm deals exclusively with authentication and is not a watermarking algorithm. In
their work [67] authors focused on providing a spread spectrum watermarking algorithm
which had both resolution and quality scalability demonstrated through experimental
testing using the JPEG2000 compression algorithm. To alleviate this trade off, they began
with a non-adaptive resolution scalable algorithm and exploited the contrast sensitivity
and texture masking characteristics of the HVS to construct an HVS adaptive algorithm
that has good quality scalability. Their algorithm is specifically designed to concentrate
on textured regions only, avoiding the visible distortions, which may occur when strength
increases are applied to edges. Furthermore, this texture algorithm is applied in the
wavelet domain but uses only a single resolution for each coefficient to be watermarked.
In their work [126], authors presented a new image adaptive watermarking scheme based
on perceptually shaping watermark block wise. Instead of the global gain factor, a
localized one is used for each block. Watsons DCT-based visual [109] model is adopted
to measure the distortion of each block introduced by watermark, rather than the whole
image. With the given distortion constraint, the maximum output value of linear
correlation detector is derived in one block, which demonstrated the reachable maximum
robustness in a sense. Meanwhile, an EXtended Perceptually Shaped Watermarking (EXPSW) is acquired through making detection value which approaches to upper limit. It is
proved mathematically that EX-PSW outputs higher detection value than Perceptually
Shaped Watermarking (PSW) with the same distortion constraint. Authors used this idea
and also discussed the adjustment strategies of parameters in EX-PSW, which were

35

helpful for improving the local image quality. Experimental results show that scheme
provides very good results both in terms of image transparency and robustness.
In [10], authors presented an Independent Component Analysis (ICA) [40-41] based
watermarking method. This watermarking scheme is domain-independent ICA-based
approach. This approach can be used on images, music or video to embed either a robust
or fragile watermark. In the case of robust watermarking, the method shows high
information rate and robustness against malicious and non-malicious attacks while
inducing low distortion. Another version of this scheme is a fragile watermarking scheme
which shows high sensitivity to tampering attempts while keeping the requirement for
high information rate and low distortion. The improved performance is achieved by
employing a set of statistically independent sources (the independent components) as the
feature space and principled statistical decoding methods.
In [90], authors presented a dual watermarking Scheme. In general, the watermark
embedding process affects the fidelity of the underlying host signal. Fidelity, robustness
and the amount of data which can be embedded without visible artifacts, often conflict.
Most of early watermarking schemes have focused on embedding the watermark
information applying a global power constraint such as the Peak-Signal-to-Noise-Ratio
(PSNR) to satisfy fidelity constraints. But, the PSNR value is reflecting humans visual
system because local image properties such as edges or textures are not considered. The
watermarking systems have been proposed that allowed the embedded signal to be locally
varied in response to the local properties of the corresponding host signal [38, 73, 77].
Authors in their paper [90] neglected the PSNR value and use the fact that all common
lossy image compression schemes are PSNR optimized. They embedded watermark
information by geometrically shifting objects and object borders in a given host image. If
an observer has no original image for comparison, the embedding process is
imperceptible. As a consequence, this approach turns out to be extremely robust to
common image compression. Common lossy image compression is optimized for
maintaining the geometric image structure. Hence, as they demonstrate, the embedded

36

information is not affected by a successive embedding approach in the compression


domain.
Authors in their paper [39] presented an improved invariant wavelet and designed a DCT
based blind watermarking algorithm against Rotation-and Scaling-and Translation (RST)
attacks by exploiting the affined invariance of the invariant wavelet. Surviving geometric
attacks in image watermarking is considered to be of great importance. In the face of
geometrical attacks, all shortcomings of almost all digital watermarking algorithms have
been exposed. Therefore, this paper presents an improved invariant wavelet that is better
than the bilinear interpolation and whose performance is close to of bi-cubic when
scaling factor is very close to 1, and designs a novel blind image watermarking algorithm
based on DCT in the (RST) Xiongs Invariant Wavelet, i.e. RSTXIW domain. The
experiments show that this novel watermarking algorithm is robust against filter, noise
and arbitrary RST geometrical attacks, however, sensitive to local crop attacks.
In their paper [107], authors presented an image watermarking scheme based on 3-D
DCT. A gray-level image is decomposed into a 3-D sub-image sequence by sub sample
of zigzag scanning order that is transformed using block-based 3-D DCT.
Simultaneously, they proved that the distribution of 3-D DCT AC coefficients follows the
generalized Gaussian density function using the distribution relative entropy theory. To
satisfy the balance between the robustness and the imperceptivity, a 3-D HVS model is
improved to adjust the embedding strength. In watermark detecting, the optimum detector
is used to implement the blind detection. It is shown in experiments that the scheme is
strongly robust against various attacks.
In paper [101] proposed digital watermarking scheme uses the properties of DCT and
DWT to achieve almost zero visible distortion in the watermarked images. These
schemes use a unique method for spreading, embedding and extracting the watermark.
Embedding using a linear relation between the transform coefficients of the watermark
and a security matrix has been proposed with satisfactory results.

37

In [59], algorithm is based on multistage Vector Quantization (VQ) that embeds both
robust watermark for copyright protection or ownership verification and fragile
watermark for content authentication or integrity attestation. The method in [122]
combined DCT and VQ to simultaneously embed robust and fragile watermarks.
In their paper [31], two simple dither modulation schemes for a pair of DCT coefficients
are proposed. The first step is to handle the original image using the sub sampling
technique as described in [14]. Then, transform it into DCT domain to obtain four sub
images. By dividing them into two groups, we introduce distinguishing dither modulation
processes in the two coefficient pairs with two robust watermarks. Experimental results
show that the proposed method is blind and robust and through adopting dither
modulation in sub images gained by sub sampling, two independent robust watermarks
can be embedded in the original image.
In the field of color images watermarking, many methods are accomplished by marking
the image luminance, or by processing each color channel separately. Therefore in paper
[55], authors proposed a new DCT domain watermarking expressly devised for RGB
color images based on the diversity technique in communication system. The watermark
is hidden within the data in the same sequence by modifying a subset of the block.
DCT coefficients of each color channel. Detection is based on combination method
which takes into account the information conveyed by three color channels. Even if a
particular channel is severely faded, they are still able to recover a reliable estimated of
transmitted watermark through other propagation channel. Experimental results, as well
as theoretical analysis, are presented to demonstrate the validity of the new approach with
respect to algorithm operating on image luminance only.

2.4

PROBLEM STATEMENT FORMULATION

Since, financial implications of some of the application areas like fingerprinting and
copyright protection are very high and till now no successful algorithm seems to be

38

available to prevent illegal copying of the multimedia contents, the primary goal of this
thesis work is to develop watermarking schemes for images (which are stored in spatial
domain as well as transformed domain) which can sustain the known attacks and various
image manipulation operations. Out of image, audio and video, the image watermarking
was chosen as a goal because any successful image watermarking algorithm may be
extended to video watermarking also. Therefore, to keep the future extension in mind, the
cover medium chosen is an image.
Based on the literature survey presented in Sections 2.1, 2.2 and 2.3, the following issues
were also identified:
ISSUE 1: Till now there in no Generic nature in the watermarking algorithms
available. More precisely, if certain approach is applicable for a gray level image, the
same approach does not work for the other formats of an image.
ISSUE 2: Even if gray color image watermarking algorithms are extended for RGB color
images, the maximum work has been done for BLUE color channel only because human
eyes are less sensitive to detect the changes in BLUE color channel. No attack impact
analysis, i.e, which color channel may be affected by a particular attack, has been
carried out.
In view of the above, our problem statements are as follows:
Problem statement 1: Choose Image Watermarking as a major problem.
Problem statement 2: Identify, for multi-color channel images (True color windows
BMP, uncompressed JPEG), the suitability of a color channel with respect to attack (if
any).
Problem statement 3: Explore the ways such that attack impacts may be minimized
before the watermark embedding process.

39

ISSUE 3: In most of the research papers, once the watermarking scheme is finalized, it is
applied to all test images. Since each image is different and has certain characteristics
and after embedding the watermark data by a particular watermarking scheme, its
performance against a particular attack may not be similar with other image. No study is
conducted to make the embedding scheme based on some image characteristics. Thus, the
next problem statement is:
Problem statement 4: Explore the relationship between the performance of
watermarking scheme and the cover image characteristics itself.
ISSUE 4: Mostly watermarking schemes are developed in a way that first a scheme is
developed based on the extension of earlier presented one and then see its performance
against the common image manipulation and known attack. There are huge financial
implications for watermarking schemes (say fingerprinting), but no scheme has been
developed, which is, by design, resistant to at least one attack which can not be
conducted by an attacker, leading to next problem statement:
Problem statement 5: Embed an inherent nature in the developed watermarking
schemes to guarantee that at least one serious attack having most financial implications
cannot attack on watermarked images.

2.4.1 JUSTIFICATIONS OF THE PROBLEM STATEMENT CHOSEN


While deciding the way to start the development of our watermarking schemes, first we
resolved the ISSUE 4, because this must be dealt first among all the 4 issues listed above.
It is known that the application area having the highest financial implications is
Fingerprinting.

If attacker has access to more than one copy of watermarked image, he/she can predict/
remove the watermark data by colluding them. This is known as Collusion attack.

40

Researchers working on fingerprinting primarily focus on the collusion attack.


Network technology research center, Nanyang Technological University, Singapore
website states that they pay at least equal attention to watermark attacks/counter-attacks
as watermark designs [63]. To facilitate pirate tracing in video distribution applications,
different watermarks carrying distinguishing client information are embedded at source.
If few clients requesting for the same source data get their differently marked versions
together, they may collude to remove or weaken the watermark leading to what is
commonly called collusion attack.
Collusion attacks are powerful attacks because they are capable of achieving their
objective without causing much degradation in visual quality of the attacked data
(sometimes, visual quality may even improve after attack.).
In their paper Multi-bits Fingerprinting for Image [46], authors focused on collusion
attack for fingerprinting application. It has been stated, that in fingerprinting different
copies for each customer can be produced and this point is very helpful for attackers.
Attackers compare several fingerprinting copies and find the location of the embedded
information and destroy it by altering the values in those places where a difference was
detected.
One more work, specially conducted against collusion attack can be found as Collusionresistant watermarking and fingerprinting (US Patent Issued on June 13, 2006) [15].
Interested readers can find more literature based on collusion attack on watermarking
system in [127-131].
Therefore, Collusion attack is the most severe problem for the watermarking application
area having the most financial impact. So while designing a watermark scheme, we
decided that our proposed schemes must be designed in such a way that schemes are
inherently collusion attack resistant. Therefore by this thesis, we are presenting a new
term ICAR (Inherently Collusion Attack Resistant) as a requirement for a
watermarking system.

41

The other 3 issues were taken into account while developing the watermarking schemes.
After this, we had to decide the working domain and approaches of our developments
based on the findings in the literature survey.
Since transformed domain watermarking has been proved better than spatial domain
watermarking, we decided to start with the transformed domain watermarking for gray
level images and then subsequently move further for Colored and JPEG image
watermarking keeping the first issue in mind.
Apart from ICAR nature and resistant to common image manipulations and known
attacks, we primarily focus the JPEG compression attack. This Lossy attack can reduce
the size of an image up to 1% without altering much visual quality of an image.
Therefore, we picked up the classical Middle Band Coefficient Exchange (MBCE)
scheme (refer Section 2.2.2.1) as a base for developing our schemes because this scheme
takes the JPEG quantization table into consideration to hide the watermark data and thus
ensures the robustness against JPEG compression attack.

To move further, we again had to decide the categories of the watermarking application
areas based on Figure 1.2, we are targeting to develop in this thesis work. Thus,
Figure 2.6 is the same as Figure 1.2 but with highlighted types.

42

Figure 2.6: The Targeted types of to be developed watermarking schemes

The first 2 red highlighters are already justified. The last one (destination based) is again
understood as we are focusing ICAR nature in our watermarking schemes to be
developed, which are highly correlated with fingerprinting which comes under the
destination based watermarking.
Among the visible and invisible, we picked up the non-visible watermarking because in
most of the cases, the presence of the watermark or copyright data is to be hidden. The
most crucial decision before us was to decide the choice among fragile versus robust
watermarking. Since in the business, Temper detection have more serious financial

43

implications than the copy or copyright control, we decided to go for fragile


watermarking.
To conclude, it was decided to work on IMAGE WATERMARKING in
TRANSFORMED DOMAIN (more precisely DCT based) to develop an ICAR
watermarking scheme to hide an INVISIBLE watermark data which is FRAGILE in
nature. In addition, the schemes to be developed should be generic in nature i.e. which
could be extended to other images which are stored in spatial domain and transformed
domain.

44

CHPATER-3
PRELIMINARIES

This chapter covers the material which is required to be well understood before coming to
next chapters containing the work contributions. This thesis has given special attention to
JPEG compression of an image because this compression is most commonly used and it
reduces the size of an image very much without noticeable degradation in image quality.
Every image watermarking scheme must survive against JPEG compression attack.
Therefore, first we are giving a brief introduction of JPEG and JPEG2000 image
encoding.

3.1

IMAGE ENCODING STANDARDS

3.1.1

JPEG ENCODING

The JPEG Image Compression is a standard image compression mechanism. Developed


by Joint Photographic Experts Group, JPEG compression is "lossy," because the
compression scheme sacrifices some image quality for a reduction in the image data size.
The JPEG compression scheme [56, 112] is shown in Figure 3.1.

Figure 3.1: JPEG Compression Scheme

First, the source image should be converted from RGB into a different color space called
YCbCr. It has three components Y, Cb and Cr; the Y component represents the
brightness of a pixel, the Cb and Cr components represent the chrominance (split into
45

blue and red components). The YCbCr color space conversion allows greater
compression for the same image quality (or greater image quality for the same
compression). The human eye can see more detail in the Y component (brightness) than
in Cb (blue) and Cr (red). Using this knowledge, encoders can be designed to compress
images more efficiently. The above transformation enables the next step, which is to
reduce the Cb and Cr components (called "downsampling" or "chroma subsampling").
After subsampling, each channel is split into 88 blocks (of pixels). Next, each
component (Y, Cb, Cr) of each 88 block is converted to a frequency-domain
representation, using two-dimensional DCT.
DCT is a widely used transform coding technique which is able to perform decorrelation
of the input signal in a data independent manner. In case of image, we use 2D DCT. For
more details related to 2D DCT, one may refer pp. 206-220 of Fundamentals of
Multimedia [56].
Let us take an example of an 88, 8-bit sub image, as shown in Figure 3.2 below:

Figure 3.2: An example sub image

The next step is to transform the subimage from a positive range to the one which is
centered on zero. For an 8-bit image, each pixel has 256 possible values (0 to 255). To
center on zero, it is necessary to subtract each pixel by half the number of possible
values, i.e. 128. Subtracting 128 from each pixel value yields pixel values in the range
[128,127] resulting in the matrix shown in Figure 3.3.

46

Figure 3.3: Example sub image after subtracting 128 from each pixel

The next step is to take the 2-D DCT which is given by Equation 3.1 below:
------------------ (3.1)

Where,
u is the horizontal spatial frequency, for the integers 0<= u < 8,
v is the vertical spatial frequency, for the integers 0<= v < 8,
is a normalizing function,

g x,y is the pixel value at coordinates (x, y), and


G u,v is the DCT coefficient at coordinates (u, v).
If we perform this transformation on our matrix above given in Figure 3.3 and then round
to the nearest integer, we get a DCT coefficient matrix, which is shown in Figure 3.4.

Figure 3.4: DCT of sub image shown in Figure 3.3

47

It may be observed from Figure 3.4, that the top-left corner value is the largest one. This
is the DC coefficient. The remaining 63 coefficients are called the AC coefficients. The
DCT temporarily increases the bit-depth of the image since the DCT coefficients of an 8bit/component image take up to 11 or 12 bits (depending on fidelity of the DCT
calculation) to store. This may force the codec to temporarily use 16-bit data to hold these
coefficients doubling the formal size of the image representation at this point. The
advantage of the DCT is its tendency to aggregate most of the signal in one corner of the
result, as may be seen above. The quantization step to follow accentuates this effect while
simultaneously reducing the size of the DCT coefficients to 8 bits or less, resulting in a
signal with a large trailing region containing zeros that the entropy stage can simply
throw away. The temporary increase in size, at this stage, is not a performance concern
for most JPEG implementations because typically only a very small part of the image is
stored in full DCT form at any given time during the encoding or decoding process. After
taking the DCT, next step is the quantization.
The human eye is good at seeing small differences in brightness over a relatively large
area, but at the same time it is not so good at distinguishing the exact strength of a high
frequency brightness variation. This fact allows one to get away with greatly reducing the
amount of information in the high frequency components. This is done by simply
dividing each component in the frequency domain by a constant for that component, and
then rounding to the nearest integer. This is the main lossy operation in the whole
process. As a result of this, it is typically the case that many of the higher frequency
components are rounded to zero, and many of the rest become small positive or negative
numbers which take many fewer bits to store.
A common quantization matrix is shown in Figure 3.5.

48

Figure 3.5: JPEG Quantization matrix

The quantized DCT coefficients are computed with the help of the Equation 3.2 given
below:

---------- (3.2)

where A is the unquantized DCT coefficients; Q is the quantization matrix above; and B
is the quantized DCT coefficients. Using this quantization matrix with the DCT
coefficient matrix in Figure 3.4, DCT values after quantization are given in Figure 3.6.

Figure 3.6: DCT values after quantization

For example,
B11 = round (A1, 1 / Q1, 1) = round (-415/16) = round (-25.9376) = - 26.

It may be noted that most of the AC coefficients are now ZERO. After quantization, as
shown in Figure 3.1, entropy encoding is done as follows:

49

Step-1: Zigzag Scan - The resulting matrix after quantization will contain many zeros.
The lower the quality setting, the more zeros will exist in the matrix. By re-ordering the
matrix from the top-left corner into a 64-element vector in a zig-zag pattern, the matrix is
essentially sorted from low-frequency components to high-frequency components. As the
high-frequency components are the most likely to round to zero, one will typically end up
with a run of zeros at the end of the 64-entry vector. This is important for the next step.
Step-2: DPCM on DC component - On a block-by-block basis, the difference in the
average value (across the entire block, the DC component) is encoded as a change from
the previous block's value. This is known as Differential Pulse Code Modulation.
Step-3: Run Length Encoding (RLE) on AC components - On the individual entries in the
64-element vector (the AC components), a Run Length Encoding stores each value along
with the number of zeros preceding it. As the 1x64 vector contains lot of zeros, it is more
efficient to save the non-zero values and then count the number of zeros between these
non-zero values. The RLE stores a skip and a value, where skip is the number of zeros
before this component, and the value is the next non-zero component.
Step-4: Entropy Coding / Huffman Coding - A dictionary is created which represents
commonly used strings of values with a shorter code. More common strings / patterns use
shorter codes (encoded in only a few bits), while less frequently used strings use longer
codes. So long as the dictionary (Huffman Table) is stored in the file, it is an easy matter
to lookup the encoded bit string to recover the original values.
Once image is stored compressed, it needs to be decompressed for viewing. This scheme
of decompression is given in Figure 3.7.

50

Figure 3.7: JPEG Decompression Scheme

While decompressing, we will multiply the stored values (shown in Figure 3.6) with
quantization matrix. Taking the entry-for-entry product with the quantization matrix
results the matrix shown in Figure 3.8.

Figure 3.8: DCT values regenerated in decompression

Taking the inverse DCT of above values results in an image with values (still shifted
down by 128) gives a matrix shown below in Figure 3.9 (a).

Figure 3.9 (a): Sub image pixel values (still shifted down by 128)

Adding 128 to each entry in the above matrix, we get

51

Figure 3.9 (b): Decompressed sub image pixel values

This is the uncompressed subimage and can be compared to the original subimage (refer
Figure 3.2) by taking the difference (original, uncompressed) results in error values:

Figure 3.10: Error matrix for example sub image

with an average absolute error of about 5 values per pixels as shown below:

Higher compression ratio first affects the high-frequency textures in the upper-left corner
of the image, and contrasting lines become fuzzier. The very high compression ratio
severely affects the quality of the image, although the overall colors and image form is
still recognizable. However, the precision of colors suffers less (for a human eye) than the
precision of contours (based on luminance). This justifies the fact that images should be
first transformed in a color model separating the luminance from the chromatic
information before subsampling the chromatic planes (which may also use lower quality
quantization) in order to preserve the precision of the luminance plane with more
information bits.
For example, an uncompressed 24-bit RGB bitmap image (73,242 pixels) would require
219,726 bytes (excluding all other information headers). The full quality image
52

(Q = 100) is encoded at 9 bits per color pixel, the medium quality image (Q = 25) uses 1
bit per color pixel. For most applications, the quality factor should not go below 0.75 bit
per pixel (Q = 12.5), as demonstrated by the low quality image. The image at the lowest
quality uses only 0.13 bit per pixel and displays very poor color. It could only be usable
after subsampling to a much lower display size.
3.1.2

JPEG2000 ENCODING

JPEG 2000 is a wavelet-based image compression standard [113].


Wavelet transform: In DCT, we use a special cosine based transform. If we carry out
analysis based on both sine and cosine, then a concise notation assembles the results into
a complex valued function of real valued frequency. Such decomposition results in very
fine resolution in frequency domain. However, since a sinusoid is theoretically infinite in
extent in time, such a decomposing gives no temporal resolution. Wavelet transform
represents the signal with good resolution both in time and frequency, by using a set of
besis functions called wavelets. There are two types of wavelet transforms: Complex
Wavelet Transform (CWT) and DWT. Since image is a discrete signal, we are moving to
discrete wavelet transform. Haar is the simplest form of the wavelet transform which
forms the average and difference of the sequence of the values. If we repeatedly take
average and difference and keep results for every step, we create a multi-resolution
analysis of the sequence, as shown in Figure 2.5. For image, this would be equivalent to
creating smaller and smaller summary images, one quarter the size for each step, and
keeping track of differences from the average as well. As shown in Figure 2.5, at each
step image is split in four subbands namely LL (low-low), HL (high-low), LH (low-high)
and HH (high-high). The LL subband can be further decomposed to yield yet another
level of decomposition. More details of DWT and Multiresolution analysis can be found
in [56]. In the core of JPEG2000 is the Embedded Block Coding with Optimized
Truncation (EBCOT) algorithm. The basic idea of EBCOT is the partition of each
subband LL, LH, HL, HH produced by above wavelet transform into small blocks called
code blocks.

53

JPEG 2000 requires more decompression time than JPEG and allows more sophisticated
progressive downloads, yet it averages similar compression rates. Unlike JPEG,
JPEG2000 becomes increasingly blurred with higher compression ratios rather than
generating "blocking and ringing" artifacts. At high bit rates, where artifacts become
nearly imperceptible, JPEG 2000 has a small machine-measured fidelity advantage over
JPEG. At lower bit rates (for example, less than 0.25 bits/pixel for gray-scale images),
JPEG2000 has advantage over certain modes of JPEG in a way that artifacts are less
visible and there is almost no blocking. The compression gains over JPEG are attributed
to the use of DWT and a more sophisticated entropy encoding scheme. JPEG2000
decomposes the image into a multiple resolution representation.
The aim of JPEG2000 is not only improved compression performance over JPEG but
also to add features such as scalability and editability. Very low and very high
compression rates are supported in JPEG2000. To handle a very large range of effective
bit rates is one of the strengths of JPEG2000. For example, to reduce the number of bits
for a picture below a certain amount, the advisable thing to do with the first JPEG
standard is to reduce the resolution of the input image before encoding it. That is
unnecessary when using JPEG 2000, because JPEG2000 already does this automatically
through its multiresolution decomposition structure.
In JPEG2000, images have to be transformed from the RGB color space to another color
space using any of the following two transforms [113]:
1) Irreversible Color Transform (ICT) which uses the well known YCBCR color
space. It is called "irreversible" because of the quantization errors it introduces.
2) Reversible Color Transform (RCT) which uses a modified YUV color space that
does not introduce quantization errors, so it is fully reversible.
After color transformation, the image is split into so-called tiles, the rectangular regions
of the image that are transformed and encoded separately. Tiles can be of any size, and
we may consider the whole image as one single tile but all the tiles will have the same

54

size. Dividing the image into tiles is advantageous because the decoder will need less
memory to decode the image and it can opt to decode only selected tiles to achieve a
partial decoding of the image. The disadvantage of this approach is that the quality of the
picture decreases. Using large number of tiles can create a blocking effect similar to the
older JPEG standard. These tiles are then wavelet transformed to an arbitrary depth, in
contrast to JPEG, which uses an 88 block-size DCT. JPEG2000 uses following two
different wavelet transforms:
1) Irreversible: The CDF 9/7 wavelet transform. It is said to be "irreversible"
because it introduces quantization noise that depends on the precision of the
decoder.
2) Reversible: A rounded version of the biorthogonal CDF 5/3 wavelet transform. It
uses only integer coefficients so that the output does not require rounding
(quantization) and therefore, it does not introduce any quantization noise. It is
used in lossless coding.
After the wavelet transform, the coefficients are scalar-quantized to reduce the amount of
bits to represent them at the expense of the loss of quality. The output is a set of integer
numbers which have to be encoded bit-by-bit. The parameter that can be changed to set
the final quality is the quantization step: the greater the step, the greater is the
compression and the loss of quality. With a quantization step that equals 1, no
quantization is performed (it is used in lossless compression).
Above process results in a collection of sub-bands which represent several approximation
scales. A sub-band is a set of coefficients which represent aspects of the image associated
with a certain frequency range as well as a spatial area of the image. The quantized subbands are split further into precincts, the rectangular regions in the wavelet domain. They
are typically selected in a way that the coefficients within them across the sub-bands form
approximately spatial blocks in the (reconstructed) image domain, though this is not a
requirement. Precincts are split further into code blocks. Code blocks are located in a
single sub-band and have equal sizes, except those located at the edges of the image. The

55

encoder has to encode the bits of all quantized coefficients of a code block, starting with
the most significant bits and progressing to less significant bits by a process called
Embedded Block Coding with Optimal Truncation (EBCOT). In this encoding process,
each bit plane of the code block gets encoded in three so-called coding passes, first
encoding bits (and signs) of insignificant coefficients with significant neighbors (i.e. with
1-bit in higher bit planes), then refinement bits of significant coefficients and finally
coefficients without significant neighbors. The three passes are called Significance
Propagation, Magnitude Refinement and Cleanup respectively. Here we are limiting the
discussion of JPEG2000. More details of JPEG2000 can be found in [56, 112-113].

3.2

IMAGE QUALITY MEASURES

Through out this thesis, we have used Peak Signal to Noise Ratio (PSNR) and CrossCorrelation (CC) to measure the quality of the images.
3.2.1

PEAK SIGNAL TO NOISE RATIO

The phrase Peak Signal to Noise Ratio, often abbreviated PSNR, is an engineering term
for the ratio between the maximum possible power of a signal and the power of
corrupting noise that affects the fidelity of its representation. Because many signals have
a very wide dynamic range, PSNR is usually expressed in terms of the logarithmic
decibel scale.
The PSNR is most commonly used as a measure of quality of reconstruction in image
compression etc. It is most easily defined via the Mean Squared Error (MSE). For two
mn monochrome images I (x, y) and K (x, y), where one of the images is considered a
noisy approximation of the other, MSE is defined as:

--------------------------- (3.3)

56

The PSNR in terms of MSE is defined as:


-------------------- (3.4)

Here, MAXI is the maximum pixel value of the image. When the pixels are represented
using 8 bits per sample, value of MAXI is 255. More generally, when samples are
represented using linear PCM with B bits per sample, maximum possible value of MAXI
is 2B-1. For color images with three RGB values per pixel, the definition of PSNR is the
same except the MSE is the sum over all squared value differences divided by image size
and by three. Typical values for the PSNR in image compression are between 30 and
40 dB.
3.2.2

CORRELATION COEFFICIENT (CC)

The correlation coefficient, a concept from statistics, is a measure of how well trends in
the predicted values follow trends in past actual values. It is a measure of how well the
predicted values, from a forecast model, "fit" with the real-life data. The correlation
coefficient is a number between 0 and 1. If there is no relationship between the predicted
values and the actual values, the correlation coefficient is 0 or very low. As the strength
of the relationship between the predicted values and actual values increases, the value of
correlation coefficient also increases. A perfect fit gives a coefficient of 1.0. Thus the
higher value of correlation coefficient is better. It indicates the strength and direction of a
linear relationship between two random variables.
We can use CC calculation to know the distortion level in our extracted watermark from
an attacked watermarked image. If A is the original watermark of size m x n, and B
is the extracted watermark, then, in Matlab, we can compute CC using the built-in
function CORR2 ( ) which computes the correlation coefficient r as given in
Equation 3.5.

57

----------------------------------------- (3.5)

3.3

TEST DATA

For testing the performance of our proposed watermarking schemes for gray and colored
digital images, we are using standard test images available on various test images
databases available on WWW. Figure 3.11 shows the gray level test images of Lena,
Mandrill, Pepper and Barbara. These are gray level images of 256 colors.

Figure 3.11: Test images of Lena, Mandrill, Pepper and Barbara (Courtesy: SPIHT based Image Coding
Incorporating Perceptual Model and Scalability,
http://www.cn.nctu.edutw/faculty/ypl/Students/InChu%20Chen/projrct02/project02.htm)

Figure 3.12 shows the 24 bit true color Windows BMP test images of Lena, Mandrill,
Pepper and goldhill.

58

Figure 3.12: Test images of Lena, Mandrill, Pepper and Goldhill


(Courtesy: Image Processing/Video Codecs/Programming http://www.hlevkin.com)

Figure 3.13 shows the monochrome watermark logo, used in all proposed watermarking
schemes discussed in this thesis.

Figure 3.13: Watermark logo used in the proposed schemes

59

CHAPTER-4
WATERMARKING OF GRAY IMAGES
4.1

INTRODUCTION

Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange


scheme has proven its robustness against those attacks, which anyhow, do not attack on
the perceptual quality of image (Refer Section 2.2.2.1). For example, JPEG compression
reduces the size of image considerably without having much distortion in visual quality.
Therefore, most of the DCT based schemes are robust against JPEG compression attack.
But in most of the research literature available, even if quality of extracted watermark
logo is good enough to prove the ownership, PSNR value of extracted watermark logo is
less.
In this chapter, we have explained how PSNR value of extracted logo from watermarked
image could be increased if watermarked image has been attacked by JPEG compression
attack. Then we developed a watermarking scheme to increase the robustness against
Histogram equalization attack, which attacks on perceptual quality of image.
After developing the watermarking schemes which are robust against JPEG compression
and histogram equalization attack, we developed a watermarking scheme which is
collusion attack resistant by introducing redundancy in Middle Band Coefficient
Exchange scheme. This scheme is not only collusion attack resistant but more robust
against JPEG compression attack as compared to other similar state-of-the-art
watermarking schemes.

61

4.2

INCREASING
THE
ROBUSTNESS
OF
WATERMARKING
SCHEMES
AGAINST
COMPRESSION

IMAGE
JPEG

Two, classical DCT and DWT based watermarking schemes have already been discussed
in Section 2.2.2.1 and 2.2.3.1. We watermarked the images of Lena, Mandrill and Pepper,
which are shown in Figure 3.11, by applying both the schemes. While watermarking the
chosen images, we used a monochrome logo as a copyright data (or watermark), which is
shown in Figure 3.13. Then, watermarked images, obtained by applying the above said
watermarking schemes, were compressed by JPEG low compression (Quality factor,
Q = 20). From the JPEG compressed images, the watermark data was recovered. As it has
already been mentioned that DCT and DWT based watermarking schemes are robust
against JPEG attack, we found that extracted watermark logo is quite detectible to prove
the ownership as shown in Figure 4.1.

(a)

(b)
Figure 4.1 (a): Extracted watermark logos from test images of Lena, Mandrill and Pepper by applying
DCT based scheme
(b): Extracted watermark logos from test images of Lena, Mandrill and Pepper by applying DWT based
schemes

Though, the extracted watermark logos are quite detectible, we can see the presence of
noise in extracted watermark logos and therefore the PSNR values of extracted
watermark logos are less. Therefore, there is a possibility to further improve the quality
of the extracted watermark logos with an increased PSNR value of extracted watermark
logos.

62

To achieve this, we propose to change the image data or image pixel values such that it
has less impact of JPEG compression attack after getting watermarked without loosing
the perceptual quality to a great extent. We thought to change or modify the image such
that the affect after the attack on the watermarked image could be minimized. We tried to
accomplish this by creating the same effect in an image, before watermarking it, which
this image shall have, after it has been attacked. More precisely, if we know that our
watermarked image may have to suffer JPEG compression attack, whatever changes will
be made by JPEG attack in the watermark image, we tried to incorporate those changes in
the pixel values in advance so that changes caused by JPEG compression attack may be
minimized. This led to the preprocessing of the images, i.e., doing some modifications
in the image which are equivalent to the attack before we start watermarking on it, either
by using DCT or DWT based watermarking schemes.
To implement the idea, we decided to analyze the JPEG compression attack on an image
which has been watermarked by DCT and DWT based watermarking schemes. We
proposed three transformation steps before the watermarking of an image, which are as
follows:
1) Take the gray level image which has to be watermarked;
2) Compress it using JPEG scheme; and
3) Convert back the compressed image to gray level image to get the Transformed
Image.
We applied the above 3 transformation steps on our chosen test images. First, we
generated 3 transformed images of Lenas test image by keeping the JPEG quality
factor Q = 20, Q = 40 and Q = 60. Then, in the same way, we generated 3 transformed
images of remaining 2 test images of Mandrill and Pepper also. Then, we watermarked
transformed images as well as original images, using both schemes stated above. So,
total 12 images were watermarked separately by DCT as well as DWT based
watermarking schemes. For each of the 3 test images, 4 copies of it were watermarked
where 1 copy was the original image and other 3 copies were the transformed

63

images, generated by our proposed preprocessing steps. All watermarked images were
then compressed using JPEG low compression (Q = 20). After retrieving the watermark
logos, it was found that the quality of extracted watermark logos from transformed
images was better than the quality of extracted watermark logos from original images.

Table 4.1 summarizes the PSNR values (in decibel) of extracted watermark logos. It may
be observed that for the test image Lena, PSNR values of extracted logos were better
from all 3 transformed images as compared to PSNR value of extracted logo from
original image for both DCT as well as DWT based watermarking schemes. But for the
test images Mandrill and Pepper, only 1 transformed image generated by keeping
Q = 40, gave the batter PSNR value of extracted logo as compared the PSNR value of
extracted logo from their original image for both DCT as well as DWT based
watermarking schemes.

Thus, we conclude that the preprocessing for a certain Q enhances the quality of
extracted logos to some extent and, therefore, to increase the robustness of watermarking
schemes against some well known attacks, we must analyze the attacks characteristics
and its impact on the image and then adjust or preprocess the image in such a manner that
the impact of the attack could be minimized.

4.3

INCREASING
THE
ROBUSTNESS
OF
IMAGE
WATERMARKING SCHEME AGAINST HISTOGRAM
EQUALIZATION ATTACK

In the previous section, we had discussed about the preprocessing of an image to


improve the robustness of DCT and DWT based watermarking schemes against JPEG
compression. We know that transformed domain based watermarking schemes like DCT
and DWT based schemes which were under our consideration in previous section, are
robust against the attacks which do not change the perceptual quality of an image like
JPEG compression attack. We have seen that by our proposed preprocessing, a
watermarked image became more resistant to JPEG compression attack. We decided to

64

see the effectiveness of our proposed idea of preprocessing against those attacks which
alter the image perceptually. So, we focused on the histogram equalization attack. If we
equalize the histogram of an image, it is affected badly. We would now check whether
our proposed idea of preprocessing works in the case of histogram equalization?
Table 4.1: PSNR (in decibel) of extracted watermark logo from JPEG compressed (Q = 20) watermarked
image
Results given by

Results given by watermarking of transformed image.

watermarking of

Lena
Mandrill
Pepper

DCT

31.5694

31.5712

31.5712

31.5742

DWT

30.906

30.924

30.918

30.924

DCT

31.6266

31.6254

31.6284

31.6214

DWT

30.888

30.87

30.894

30.888

DCT

31.5892

31.5878

31.5906

31.5876

DWT

30.598

30.58

30.604

30.598

= 60

Transformed at Q

Image is

Logo if Original

= 40
PSNR of Extracted

Transformed at Q

Image is

Logo if Original

Q = 20
PSNR of Extracted

Transformed using

Image is

Logo if Original

PSNR of Extracted

Transformed

Image is not

Logo if Original

Image

Scheme Used

PSNR of Extracted

original image

We watermarked the images of Lena, Pepper, Mandrill and Barbara, which are shown in
Figure 3.11, by applying both DCT and DWT based watermarking schemes. While
watermarking the chosen images, we used a monochrome logo as a copyright data (or
watermark) which is shown in Figure 3.13. Then, for all watermarked images obtained by
applying the above said watermarking schemes, we equalized their histogram and then
recovered the watermark data from the histogram equalized images. We found that
extracted watermark logos were quite detectible to prove the ownership, as shown in
Figure 4.2, but all were very noisy. We now preprocess the image through the
following proposed 3 transformation steps before watermarking the images:

65

1) Take the gray level image to be watermarked;


2) Adjust the image such that its histogram is equalized to get the Transformed
Image; and
3) Apply watermarking DCT and DWT based schemes to the image obtained in step
2.
We applied the above 3 transformation steps on our chosen test images. We generated
transformed images of Lena, Pepper, Mandrill and Barbara test image.
For each of the 4 test images, 2 copies of it (1 copy of the original image and other
copy of the transformed images generated by our proposed preprocessing steps) were
watermarked by DCT and DWT based watermarking schemes. The histograms of all
watermarked images were then equalized. After retrieving the watermark logos, it was
found that the quality of extracted watermark logos from transformed images was
better than the quality of extracted watermark logos from original images.

(a)

(b)
Figure 4.2 (a): Extracted watermark logos from test images of Lena, Mandrill, Pepper and Barbara by
applying DCT based scheme
(b): Extracted watermark logos from test images of Lena, Mandrill, Pepper and Barbara by applying
DWT based schemes

Table 4.2 summarizes the PSNR values (in decibel) of extracted watermark logos. It may
be observed that, the watermark logos, extracted from watermarked transformed

66

images have PSNR values slightly better then the PSNR values of extracted logos
retrieved by watermarked original image.

Even if, PSNR values were increased

slightly, considerable improvement in perceptual quality was observed. Figure 4.3 shows
the extracted logos from histogram equalized attacked watermarked images. Logos at left
sides are recovered form attacked watermarked original image, whereas logos at right
side in the figure are recovered logos form watermarked transformed images. We can
easily find that quality of extracted watermark logos from transformed images is better
for all the 4 test images.
Table 4.2: PSNR of extracted log from attacked test images

PSNR (DB)
Watermarking
scheme used

PSNR of Extracted
Logos from Original

Images
Lena
Pepper
Mandrill

Barbara

Image

PSNR of Extracted Logos


from Transformed Image

DCT

26.43

26.446

DWT

25.79

25.81

DCT

26.378

26.412

DWT

25.245

25.251

DCT

26.454

26.498

DWT

25.887

25.912

DCT

26.122

26.156

DWT

25.567

25.58

67

Figure 4.3: Extracted logos from original image (left) and transformed image (right) of Lena,
Mandrill, Pepper and Barbaras (Top to Bottom) histogram equalized images (By applying DCT based
scheme)

Therefore, we conclude that preprocessing the images to minimize the impact of


histogram equalization attack, made the test images more robust against said attack if
DCT and DWT watermarking schemes were used. This favors our statement made in the
previous section that we must analyze the attacks characteristics and its impact on the
image and then adjust or preprocess the image in such a manner that the impact of the
attack could be minimized.

4.4

DEVISING
A
COLLUSION
ATTACK
RESISTANT
WATERMARKING SCHEME FOR IMAGES USING DCT

After developing a technique to make DCT and DWT based watermarking schemes
(discussed in Section 2.2.2.1 and 2.2.3.1) more robust against JPEG compression and
histogram equalization attacks, we considered a malicious attack, the collusion attack
which was discussed in Section 2.4.1. Seeing the financial implications of this attack, we
propose a new term or benchmark for watermarking schemes, the ICAR i.e.

68

Inherently Collusion Attack Resistant. We recommend that any watermarking


algorithm, by definition, must be collusion attack resistant in nature. A watermarking
scheme must be first ICAR and then it should focus on other common image
manipulations and malicious attacks. Henceforth, all watermarking schemes that we are
present are ICAR in nature.
The classical Middile Band Coefficient Exchange (MBCE) scheme , A DCT based
scheme discussed in Section 2.2.2.1, is known to be robust against common image
manipulations and JPEG compression attack. But this scheme, however, cannot sustain
collusion attack. If, any attacker takes more than one copy of a watermarked image, then
by analyzing the patterns of block DCT coefficients, attacker can easily predict the
watermark location and watermark data.
Our aim is to develop an ICAR watermarking scheme which can sustain other common
image manipulations and known attacks also over the existing MBCE scheme which is
not capable of sustaining collusion attack. For developing the new ICAR scheme, the
following 2 issues were kept in mind:
1) If only one pair is used to hide the watermark data, it might happen that by an
attack or by any image manipulation, values of this pair are modified. So, instead
to exchanging only one pair of coefficients from FM region, we should exchange
more than one pair of the coefficient i.e. introduce some redundancy; and
2) To achieve ICAR nature in watermarking scheme, we must ensure that every
copy of watermarked image has a different pattern of hiding watermark data so
that attacker can not conclude the location and content of watermark data even
after analyzing many copies of watermarked image.
Issue no.1 is resolved as follow:
There are 22 coefficients in the FM region in an 8 x 8 DCT block. Out of these 22
coefficients, we can form 17 pairs having nearly the same values in their corresponding

69

JPEG quantization table. Therefore, to introduce redundancy in MBCE scheme, we had a


choice to exchange the n pairs where the value of n ranges from 1 to 11(as there are
total 22 coefficients). We can not disturb or modify all 22 coefficients as it will affect the
image perceptibility. We conducted some experiment on this issue and found that if we
modify the values of 8 coefficients (i.e. 4 pairs are exchanged), no much degradation in
the image perceptibility is recorded. Accordingly, we decided to set the value of n
equal to 4.
Issue no. 2 is simply resolved by choosing the combination of 4 pairs randomly in each
watermarked image.
MBCE scheme exchanges 1 pair of coefficient from FM region to hide 1 or 0. For
example, if coefficients at (3,2) and (2,3) are decided to hide the watermark data, this
scheme sets DCT (3,2) > DCT (2,3) to interpret 1 and set DCT (3,2) < DCT (2,3) to
interpret 0 by exchanging the coefficient values. While decoding the watermark data,
MBCE scheme takes 8 x 8 DCT of watermarked image and by looking the relative
strength of the coefficients at these locations, it decodes the 1 or 0 to reconstruct the
watermark data. The proposed ICAR scheme exchanges 4 pairs which indicates that
either 0 or 1 is hidden in the block.
One such combination of 4 pairs may be taken as:
{(5,1) and (4,2), (6,3) and (5,4), (5,2) and (4,3), (3,2) and (2,3)}.
A scheme is robust if it is able to recover watermark data even if most of the middle band
conefficients are attacked. To achieve this, we need to develop some dependencies on
low frequecny coefficients also. In Figure 2.3 and Figure 2.4, values present at location
(0,1) and (1,0) in 8x8 block DCT are low frequency coefficients of an image and attacker
can not change the values at these locations because it will affect the image badly.

70

Figure 4.4: Swapping of 4 pairs to hide 0 or 1 in conjunction with low frequency values

We developed a scheme

of exchanging 4 middle-band coefficient pairs in strong

correlation with low frequency coefficients such that even if attacker successfully
attacks on 3 pairs, only 1 pair of coefficient will decode the watermark data correctly.
Swapping criteria of the proposed scheme is illustrated in Figure 4.4.
More details of encoding and decoding process are given in Section 4.4.2 and 4.4.3.
The proposed watermarking scheme can be defined as a 7-tuple (X, W, P, K, G, E, D),
where
1) X denotes the set of instances Xi, of a particular gray level image, (If N copies of
an image are to be watermarked, then 0 i N);
2) W denotes the monochrome watermark logo;
3) P denotes the set of policies Pi, 0 i N;
4) K denotes the watermark strength parameter;
5) G denotes the policy generator algorithm G: Xi Pi, where each Xi will have a
unique Pi, i.e. a different policy to hide the watermark data;
6) E denotes the watermark embedding algorithm, E: Xi x W x Pi Xi;

71

7) D denotes the watermark detection algorithm, D: Xi x Pi W, where W


represents extracted watermark.
Out of these 7 tuples, last 3 tuples are algorithms as discussed below:
4.4.1

G, THE POLICY GENERATOR ALGORITHM

To watermark each copy Xi of an image X differently, we need a different watermarking


policy. Here Policy means that for every copy of the image, there will be unique
combination of 4 pairs of middle band coefficients. To generate a policy, we simply take
8 x 8 DCT of the input image Xi and randomly select 4 pairs out of 17 pairs of middle
band region. So, number of policies that can be generated are 17C 4 = 2380 which means
that 2380 copies of a single image can be watermarked such that no two watermarked
images have same policy. This step ensures that attacker can not conclude the location of
watermark data by colluding many watermarked copies of an image. This also depicts
that our proposed scheme is an ICAR scheme.
4.4.2

E, THE WATERMARK EMBEDDING ALGORITHM

In this algorithm, each 8 x 8 DCT block of an image is used to hide a single bit of
watermark logo. This algorithm is given as below:
1. Repeat steps 2 to 13 for i = 1..n;
// where n is the number of copies of a single image to be watermarked //

2. INPUT (Xi);
3. Take 8 x 8 block DCT of Xi;
4. INPUT (W);
5. Convert W into a string S = (Sj | Sj = {0, 1}, for j = 1..length of the watermark);
6. Let L = STRING_LENGTH (S);
// where L is the length of watermark data. If L=1000, then first 1000 DCT block of Xi are used //

72

7. Pi = CALL (G);
// Each Pi shall be stored in an authors database for the detection purpose in future. Let the Pi,
for chosen Xi, be {(5,2) and (4,3), (6,3) and (5,4), (5,1) and (4,2), (3,2) and (2,3)} //

8. Repeat steps 9 to12 for r = 1..L;


9. Read Sr;
10. If Sr = 0
If (DCT (0, 1) > DCT (1, 0))
Swap the DCT coefficients from chosen Pi such that coefficients at
(5,2), (6,3), (5,1) and (3,2) become larger than (4,3), (5,4), (4,2)
and (2,3) respectively;
If (DCT (0, 1) <= DCT (1, 0))
Swap the DCT coefficients from chosen Pi such that coefficients at
(5,2), (6,3), (5,1) and (3,2) become smaller than (4,3), (5,4), (4,2)
and (2,3) respectively;
Else If Sr =1
If (DCT (0, 1) <= DCT (1, 0))
Swap the DCT coefficients from chosen Pi such that coefficients at
(5,2), (6,3), (5,1) and (3,2) become larger than (4,3), (5,4) ,(4,2)
and (2,3) respectively;
If (DCT (0, 1) > DCT (1, 0))
Swap the DCT coefficients from chosen Pi such that coefficients at
(5,2), (6,3), (5,1) and (3,2) become smaller than (4,3), (5,4), (4,2)
and (2,3) respectively;
End;
11. For all swapped coefficients pairs repeat the step 12;
12. If (DCT (u1, v1) DCT (u2, v2) > K)
If (DCT (u1, v1) > DCT (u2, v2))
DCT (u1, v1) = DCT (u1, v1) + K/2;

73

DCT (u2, v2) = DCT (u2, v2) - K/2;


Else
DCT (u1, v1) = DCT (u1, v1) - K/2;
DCT (u2, v2) = DCT (u2, v2) + K/2;
End;
// Like Classical MBCE scheme (Section 2.2.2.1), robustness of the watermark can be improved
by using a watermark strength constant K such that for all 4 chosen pairs,
DCT (u1, v1) DCT (u2, v2) > K. If coefficients do not meet these criteria, they should be
modified by using some random noise to satisfy the relation. Increasing K thus reduces the
chance of detection errors at the expense of additional image degradation. This ensures that
larger coefficients remains larger even after image manipulations because coefficients relative
values will decide the decoding of the watermark data //

13. Take IDCT to reconstruct Xi;


14. End.
4.4.3

D, THE WATERMARK DETECTION ALGORITHM

We decode 1 and 0 based on the swapping criteria shown in Figure 4.4. The
detection algorithm steps are as follows:
1. INPUT (Xi);
// Xi is the attacked copy of a watermarked image //

2. Take 8 x 8 block DCT of Xi;


3. For each Pi in authors database, repeat the steps 4;
// If initially 10 copies were watermarked, then out of 10 policies, for 1 policy, watermark will be
recovered correctly. To explain further steps, we are assuming that now algorithm is in a loop
where Pi is {(5,2) and (4,3), (6,3) and (5,4), (5,1) and (4,2), (3,2) and (2,3)}, which was used to
watermark this particular Xi //

4. Repeat the steps 5 for j = 1.L;


74

// L is the length of watermark data. A single bit will be recovered form one 8x8 DCT block //

5. Take jth DCT block to form jth bit of watermark as follows:


If (DCT (1, 2) > DCT (2, 1))
If (DCT (5, 2) > DCT (4, 3))
T1 = 1; else T1 = 0;
If (DCT (5, 1) > DCT (4, 2))
T2 = 1; else T2 = 0;
If (DCT (6, 3) > DCT (5, 4))
T3 = 1; else T3 = 0;
If (DCT (3, 2) > DCT (2, 3))
T4 = 1; else T4 = 0;
If (T1 + T2 + T3 + T4 > 1)
Decode 0;
Else decode 1;
Else If (DCT (1, 2) <= DCT (2, 1))
If (DCT (5, 2) > DCT (4, 3))
P1 = 1; else P1 = 0;
If (DCT (5, 1) > DCT (4, 2))
P2 =1; else P2 = 0;
If (DCT (6, 3) > DCT (5, 4))
P3 = 1; else P3 = 0;
If (DCT (3, 2) > DCT (2, 3))
P4 = 1; else P4 = 0;
If (P1 + P2 + P3 + P4 > 1)
Decode 1;
Else decode 0;
End;
6. Store W, the recovered watermark;
7. End.

75

Even if three pairs are attacked to confuse the decoder, only one pair in conjunction with
the relationship between DCT (1, 2) and DCT (2, 1), enables us the detection of 1 or
0. That is why the line (T1 + T2 + T3 + T4 > 1) is written. If there is no change in
watermarked image, all values will remain unaffected and we can set the condition
(T1 + T2 + T3 + T4 > 3).
4.4.4 PERFORMANCE OF THE PROPOSED SCHEME
To incorporate the ICAR nature, we have introduced redundancy and randomness in
classical MBCE scheme. Because of this attacker has no mechanism to conduct pattern
analysis to find out the location of the watermark data. Therefore we can say that the
proposed schemes design ensures that pattern analysis by colluding many watermarked
copies is not possible and thus the scheme is ICAR. Now, in order to check that injecting
the ICAR nature in the scheme did not degrade the performance against common image
manipulations and known attacks, we tested our scheme on 3 well known test images of
Lena, Mandrill and Pepper of size 512 x 512 and 256 colors in Windows BMP format as
shown in Figure 3.11. We generated the watermarked copies at various watermark
strength constant K. Values of K were chosen from 10 to 50, and then for all
watermarked copies, watermark logos were recovered. Obviously, for higher values of K,
the quality of extracted watermark logos were fine but the quality of watermarked image
itself, was affected much. On the other hand, for the lower values of K, the watermarked
image generated were of finer quality but the quality of extracted watermark logos from
such images was poor. This is an obvious Imperceptibility versus Robustness trade-off.
It was observed that, the value K = 20 was the best value under the circumstances. For
this value of K, the recovery was good without losing much image quality. So, further
tests were conducted by using K = 20.
4.4.4.1 PERFORMANCE AGAINST JPEG COMPRESSION: All watermarked test
images were compressed using JPEG scheme at various JPEG quality factors. Even with
quality factor, Q = 20 (9.1 % of original size, JPEG Low compression), extracted logos
were quite detectible. Table 4.3 summarizes the PSNR values of extracted watermark

76

logos from JPEG compressed watermarked images. Figure 4.5 shows the extracted
watermark logos from JPEG compressed watermarked test images. It may be observed
from both the specified table and the figure that our proposed scheme is capable of
sustaining JPEG compression attack and even at Q = 20, the recovery of the watermark
logo is quite efficient.
4.4.4.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS: All
watermarked test images were then tested against Horizontal flip, Scaling,
Brightness / Contrast (both - 20 to + 20) adjustment and Noising. Our scheme sustained
all above image manipulations. Figure 4.6 shows the extracted watermark logos
recovered by the test image of Lena, which had undergone all the above stated attacks.
Same results were found for other 2 test images also.
Table 4.3: PSNR of extracted watermarks after JPEG compression

PSNR (DB)
Quality

Lena

factor

Image

Watermarked Image

Watermarked Image

80

23.724

23.736

23.73

60

23.715

23.7315

23.724

40

23.6955

23.7285

23.706

30

23.697

23.724

23.7075

20

23.6775

23.7195

23.6925

Watermarked Mandrill

Pepper

Figure 4.5: Extracted watermark logos after JPEG compression at Q = 20 from watermarked Lena,
Mandrill and Pepper images

4.4.4.3 COMPARATIVE STUDY WITH OTHER MECHANISMS: We compared


the performance of the proposed scheme for the JPEG compression with other similar

77

state-of-the-art methodologies which are well known for their robustness against JPEG
compressions. Schemes chosen were as follows:
Scheme-A: Correlation based Schemes with 1 PN sequence (Section 2.1.3.1)
Scheme-B: Correlation based Schemes with 2 PN sequence (Section 2.1.3.2)
Scheme-C: DCT Domain based Scheme (Section 2.2.2.1)
Scheme-D: DWT Based Scheme. (Section 2.2.3.1)
Watermarked images, obtained by proposed scheme as well as by other four schemes
(Scheme-A to Scheme-D) were then compressed at various JPEG quality factors. We
named our proposed scheme as Scheme-E. As all the above said watermarking schemes
were robust against the JPEG compression attack, we evaluated them at different scale.
All schemes were evaluated for how rapidly the scheme would start losing its robustness
as the JPEG quality factors goes down. It was observed that up to Q = 40, performance of
all watermarking schemes were approximately equal but for lower values of JPEG quality
factor (Q < 40), our scheme showed more resistant as compared to scheme-A and
scheme-B. The percentage decrease in quality of extracted watermark with respect to
JPEG quality factors were compared as shown in Figure 4.7. It may be observed that
performance of proposed scheme is better then Scheme A and Scheme B for low JPEG
compression. Proposed scheme loses its performance as compared to DCT and DWT
based schemes because we are increasing robustness against collusion attack (by making
it ICAR) at the expanse of quality (by introducing redundancy).

Figure 4.6: Extracted watermark logos from Lenas image after Horizontal flipped, scaled,
brightness /contrast adjusted and Noising (Left to Right, Top to bottom)

78

120
100
Schema-A

80

Schema-B

60

Schema-C
Schema-D

40

Schema-E

20
0
Q80

Q60

Q40

Q30

Q20

Figure 4.7: Percentage decrease in quality of extracted watermark with respect to JPEG quality factor

So, even after introducing redundancy in classical MBCS scheme to fight against
collusion attack, quality of recovered watermark does not decrease very much as
compared to Scheme-C and Scheme-D and better than Scheme-A and Scheme-B. We,
therefore, conclude that our proposed ICAR watermarking scheme is quite robust against
JPEG compression and common image manipulations for watermarking of gray BMP
images.

4.5

CONCLUSION

To summarize this chapter, we can say that if DCT and DWT based watermarking
schemes discussed in Section 2.2.2.1 and 2.2.3.1 are to be used for the watermarking of a
gray BMP image, then the image becomes more resistant to JPEG compression attack if
we transform the original image to JPEG image at certain JPEG quality factor and then
convert it back to gray level image. Similarly, if we preprocess the image in such a way
that its histogram is equalized, then also an image become more resistant to histogram
equalization attack for the same watermarking schemes. So, a modification in the image
such that the affect after the attack on the watermarked image could be minimized,
increases the robustness of schemes for DCT and DWT based watermarking schemes.
Then, we developed a DCT based ICAR watermarking scheme which was very robust
against JPEG compression attack and other common image manipulations.

79

80

CHAPTER-5
WATERMARKING OF COLOR IMAGES

5.1

INTRODUCTION

After satisfactorily developing the watermarking schemes for gray level images, we
focused on developing the watermarking schemes for the color images. The proposed
ICAR watermarking scheme given in the previous chapter was chosen as a base as it has
already proved its resistance to JPEG compression attack and other common image
manipulations and performed at par with other state-of-the-art watermarking schemes. In
this chapter, we conducted a study to find out the suitability of color channel
(Red/Green/Blue) to hide the watermark data while using the DCT based watermarking
scheme. We present an ICAR watermarking schemes for true colored BMP images.

5.2

PERFORMANCE ANALYSIS OF COLOR CHANNEL FOR


DCT BASED IMAGE WATERMARKING SCHEME

Initially, the suitability of color channel to hide a monochromatic watermark in a 24-bit


color Windows BMP image while using classical MBCE watermarking scheme, was
examined as MBCE scheme is the base scheme used to develop the proposed ICAR
watermarking schemes.
Four well known 24 bit colored test images of Lena, Pepper, Mandrill and Monarch
(Size 512 x 512 pixels), shown in Figure 3.12 were taken. The watermark logo used is
shown in Figure 3.13. Then, the watermark logo was embedded in these 4 test images
using the MBCE watermarking scheme. To analyze the performance of Red, Green and
Blue channels, the watermark was embedded separately in R, G and B channels one by
one. So, total 4 images were watermarked and each of these images ware watermarked
thrice.

81

Table 5.1: PSNR of Extracted watermark from JPEG compressed watermark test images

LENA.BMP
JPEG Compression Q = 20

PEPPER.BMP

Q = 40

Q = 60

Q = 80

Q = 20

Q = 40

Q = 60

Q = 80

RED

3.8138

5.86586

9.38713

13.737

4.44446 6.12934

11.3841

14.9055

GREEN

6.2285

10.8642

14.1634

17.8173 6.48408 10.3018

13.9941

15.7327

BLUE

3.78458 4.45904

7.00983

14.0586 4.0144

7.27842

13.686

MANDRILL.BMP
JPEG Compression Q = 20

Q = 40

4.59762

MONARCH.BMP

Q = 60

Q = 80

Q = 20

Q = 40

Q = 60

Q = 80

RED

4.58561 6.09133

13.5342

17.9727 4.18767 6.06572

10.7443

15.4762

GREEN

7.3024

14.3188

18.4186

20.1702 4.88113 10.393

13.274

16.1883

BLUE

4.00899 4.72608

11.0469

17.8341 3.78916 4.38603

7.24002

13.9242

RED (PSNR-5.86)

GREEN(PSNR -10.86)

BLUE(PSNR -4.45)

Figure 5.1: Recovered watermarks for Lena.bmp after jpeg attack at Q = 40

After watermarking the test images in all three color channels, we compressed all 12
watermarked images using JPEG compression at 4 JPEG quality factors (Q = 80, 60, 40,
and 20) and then recovered the watermark logos from JPEG compressed images. We
calculated the PSNR values of all these 12 x 4 = 48 extracted watermark logos. Table 5.1
summarizes their PSNR values. The recovered watermark logos from all 3 Lenas test
images, if they were JPEG compressed at Q = 40, are shown in Figure 5.1. It was
observed that for all test images, quality of extracted watermark logo was better, if
watermark is embedded in GREEN channel for all JPEG quality factors. This can be
justified as follows:
JPEG uses the YCbCr color model. While converting from BMP to JPEG, following
color transformation occurs:
Y =
Cb =

0.299 x R

+0.587 x G

+ 0.114 x B

128

- 0.168 x R

- 0.331 x G

+ 0.500 x B

Cr = 128

+ 0.500 x R

- 0.419 x G

- 0.081 x B

82

--------- (5.1)

Where Y' is the luminance component and Cb and Cr are the blue and red chrominance
components. Y'CbCr is not an absolute color space. It is a way of encoding RGB
information and the actual color displayed depends on the actual RGB colorants used to
display the signal. It is clear from Equations 5.1 that G is multiplied by relatively larger
coefficient and thus green channel should carry the watermark data for the better
recovery if images are JPEG compressed after the watermarking using the MBCE
scheme.
Now to further validate the concept of preprocessing introduced in previous chapter,
color channels of all test images were histogram equalized one at a time, i.e., Lena image
had now 3 copies where in one copy only red channel is equalized, in another copy only
green channel is equalized and in the third copy only blue channel is equalized leading to
12 test images to be watermarked. The watermark logo was embedded in the histogram
equalized color channel for all 12 test images. We performed the following attacks on the
watermarked images:
1) JPEG Attack (low JPEG compression with Q = 20);
2) Noise Attack (adding 10% Gaussian noise in the watermarked images); and
3) Histogram Equalization (equalizing the histogram of the watermarked images).
The watermark logos were recovered from the attacked images and their PSNR values
were calculated. Table 5.2 summarizes the PSNR values of watermark logos recovered. It
may be observed from Table 5.2 that for all cases if a color channel of the image was
HISTOGRAM EQUALIZED before embedding the watermark, recovery of watermark is
better i.e. PSNR values are higher. Therefore, our proposed idea of preprocessing
worked well for colored BMP images also. It may be further observed that the difference
in the PSNR values of recovered logos from original image and equalized image are high
in the case of histogram equalization attack because our preprocessing step is itself the
histogram equalization. These results further prove that a modification in the image such
that the effect after the attack on the watermarked image could be minimized, increases
the robustness against that attack for colored images watermarking algorithm.

83

It is, therefore, concluded that to decide the color channel to carry the watermark data, we
will have to analyze the characteristics of attack itself. If there is high probability that
watermark image may undergo JPEG compression, we should select the GREEN channel
because while converting to JPEG format, green channels data has higher impact as
compared to other color channels data.
Table 5.2: PSNR of extracted watermark from attacked watermarked test images

(12.5%)

Noise

3.89485

17.4944

6.87319

Equalized

4.7334

15.6074

5.13784

4.706

19.4657

7.05068

Original

6.2285

15.7285

5.25512

4.50915

14.7932

6.72312

6.8358

18.7032

5.37656

6.9542

16.9559

7.69791

Original

3.78205 16.8769

4.96932

3.70676

15.503

6.7605

Equalized

4.1447

5.41004

4.1985

18.6343

8.12838

(12.5%)

Noise

on

Jpeg Q20

(12.5%)

Noise

on

Equalizati

MONARCH.BMP
Equalizati

23.0387

Histogram

Jpeg Q20

Attack
Original

4.58561 17.1942

8.9886

4.18767

16.9726

7.712

Equalized

5.2266

16.7228

9.36638

4.7169

18.1131

7.86498

Original

7.3024

17.4885

9.2963

4.88113

16.3554

7.65961

11.1118 21.6698

9.81065

6.9542

21.0406

8.14772

Original

4.00899 16.7143

8.75787

3.78916

14.483

7.48674

Equalized

4.3586

8.86063

4.3045

20.213

8.39899

GREEN Equalized
BLUE

on

4.9277

Color

RED

Equalizati

3.85853 15.5867

MANDRILL.BMP
Channel

Histogram

Jpeg Q20

(12.5%)

Noise

on

Original

GREEN Equalized
BLUE

PEPPER.BMP

Histogram

RED

Attack

Equalizati

Channel

Histogram

Color

Jpeg Q20

LENA.BMP

18.3073

84

It is also clear from Table 5.2 that for attacks other than JPEG Compression, performance
of color channels for all images had no fixed pattern which means that robustness may
depend upon the attack characteristics as well as image characteristics also.
Therefore, the goal for the further development was not only to develop an ICAR
watermarking scheme but also to find out some relationship between the performances of
our proposed schemes with the image characteristics itself.

5.3

DEVISING AN ICAR WATERMARKING SCHEME FOR


COLORED BMP IMAGES

In the previous chapter, we have proposed an ICAR scheme for watermarking gray level
image. Results indicated that this scheme was not only an ICAR scheme but also very
robust to JPEG compression attack and other common image manipulations. Therefore,
we decided to extend the same approach for colored BMP images also. In the earlier
proposed ICAR scheme, we have introduced redundancy in swapping and made the
swapping criterion dependent on low frequency coefficient. To further improve the
robustness, we propose a new swapping criterion with the assurance that no two
watermarked copies of an image have same policy of watermarking. An attacker may
attack on large number of middle band coefficients but if image has to remain
perceptually unchanged, the average value (Av) of all middle band coefficients (total 22
in numbers) will not modify to a great extent. So, unlike the previous scheme where we
swapped 4 pairs, we swapped 4 middle band coefficients (not pair) with the Av value.
Details of this swapping mechanism are described in Section 5.3.3.
The proposed watermarking scheme can be defined as a 7-tuple (X, W, P, T, G, E, D)
where:
1) X denotes the set of instances Xi of a particular gray level image, (If N copies of
an image are to be watermarked, then 0 i N);
2) W denotes the monochrome watermark logo;
3) P denotes the set of policies Pi, 0 i N;
85

4) T is the watermark strength parameter;


5) G denotes the policy generator algorithm G: Xi Pi, where each Xi will have a
unique Pi, i.e. a different policy to hide the watermark data.
6) E denotes the watermark embedding algorithm, E: Xi x W x Pi Xi;
7) D denotes the watermark detection algorithm, D: Xi x Pi W, where W
represents extracted watermark.
The parameter T is analogous to K of classical MBCE scheme. In classical MBCE
scheme, relative strength of 2 coefficients value of FM region decides the decoding of
1 or 0. If the relative strength of 2 values has to decide the decoding of 0 or 1,
then larger value should remain larger even after image manipulations. So, we adjust
these values in such a way that the difference between the 2 values becomes larger than a
certain threshold value. We name this threshold value as Watermark Strength
Parameter because this value decides the robustness of watermark data. Certainly, it has
an impact on the image perceptibly. So, we have to decide this threshold value in such a
way that our image does not loose its quality much.
Out of these 7 tuples, last 3 tuples are algorithms which are discussed below:
5.3.1 G, THE POLICY GENERATOR ALGORITHM
Similar to our earlier proposed ICAR watermarking scheme for the gray image
watermarking, we had to watermark each copy Xi of an image X differently. Therefore,
we need a different watermarking policy for each copy of the image to be watermarked.
Here Policy means that for every copy of the image, there will be unique combination
of 4 middle band coefficients. To generate a policy, we simply take 8 x 8 DCT of the
input image Xi and randomly select 4 coefficients out of 22 middle band coefficient of
FM region from any of the red, green or blue color channel. So, numbers of policies that
can be generated are 22C 4 = 7315 which means that 7315 copies of a single image can be
watermarked such that no two watermarked images have same policy. This step ensures
that attacker can not conclude the location of watermark data by colluding many

86

watermarked copies of an image. This also depicts that our proposed scheme is an ICAR
scheme.
5.3.2 COLOR CHANNEL SELECTION
Up to the development of this approach, we used only BLUE color channel to hide the
watermark data. Bossen et al. [9] have stated that the watermarks should be embedded
mainly in the BLUE color channel of an image. The human eye is least sensitive to
change in BLUE channel. However, the suitability of color channel to hide the watermark
data is dependent on the image itself and therefore, we have discussed some interesting
results related to this issue in the Chapter 6. In this section, we are using BLUE channel
to hide the watermark data.
5.3.3

E, THE WATERMARK EMBEDDING ALGORITHM

In this algorithm, each 8x8 DCT block of an image is used to hide a single bit of
watermark logo. Our embedding algorithm is based on averaging the coefficients of FM
region. We can fight against collusion attack by swapping more than one pair but if
attacker is ready to loose some quality, he/she can disturb all the coefficients in FM
region. Therefore, even if we introduce redundancy with randomness, our watermark data
may still be attacked. So, we propose that an attacker cannot alter the image such that the
average of coefficients of FM region changes much. Accordingly, we are hiding 1 or
0 by using relative value of a coefficients and the average Av of coefficients of FM
region. This algorithm is given as below:
1. Repeat steps 2 to 11 for i = 1..n;
// where n is the number of copies of a single image to be watermarked //

2. INPUT (Xi);
3. Take 8x8 block DCT of Xi;
4. INPUT (W);
5. Convert W into a string S = (Sj | Sj = {0,1}, for j = 1..length of the watermark);

87

6. Let L = STRING_LENGTH (S);


// L is the length of watermark data. If L = 1000, then first 1000 DCT block of Xi are used //

7. Pi = CALL (G);
// Each generated Pi shall be stored in an authors database for the detection purpose in future.
Let the Pi for chosen Xi be, Pi = {(5,1), (4,2), (6,3) and (5,4)} in BLUE channel //

8. Calculate the average Av of remaining 18 middle band coefficients.


9. Repeat steps 10 to11 for r = 1..L;
10. Read Sr;
// Now like classical MBCE scheme, relative strength of average Av and chosen 4 coefficients
in step 7 will interpret 0 or 1 of watermark data. To hide 0, for all 4 chosen coefficients
in step 7, we assigned the value of coefficients which is T less than the average Av. To hide
1, for all 4 chosen coefficients in step 7, we assigned the value of coefficients which is T
greater than the average Av //

If (Sr = 0)
DCT (5, 1) = Av - T;
DCT (4, 2) = Av - T;
DCT (5, 4) = Av - T;
DCT (6, 3) = Av - T;
Else
DCT (5, 1) = Av + T;
DCT (4, 2) = Av + T;
DCT (5, 4) = Av + T;
DCT (6, 3) = Av + T;
End;
11. Take IDCT to reconstruct Xi;
12. End.
5.3.4

D, THE WATERMARK DETECTION ALGORITHM

Watermark extraction is the reverse procedure of watermark embedding. To extract the


watermark from the watermarked image, we calculated the average Av in the same way
as in embedding algorithm. Owner should have a record of all policies used to watermark
88

the image. Based on policies, owner of the image can recover watermark using
following rules:
1) If at least 1 out of 4 chosen coefficients are less than average, Interpret 0; and
2) If at least 1 out of 4 chosen coefficients are greater than average, interpret 1.
The detection algorithm steps are as follows:
1. INPUT (Xi);
// Xi is the attacked copy of a watermarked image //

2. Take 8x8 block DCT of Xi and calculate Av;


3. For all Pi in authors database, repeat the steps 4;
// If initially 10 copies were watermarked, then out of 10 policies, for 1 policy, watermark will be
recovered correctly. To explain further steps, we are assuming that now algorithm is in a loop
where Pi is {(5,1) (4,2) (5,4) and ( 6,3)}, which was used to watermarked this particular Xi //

4. Repeat the steps 5 for j = 1.L;


// L is the length of watermark data. A single bit will be recovered form one 8x8 DCT block//

5. Take jth DCT block to form jth bit of watermark as follows:


If (DCT (5, 1) <= Av)
T1 = 1;
Else

T1 = 0;

If (DCT (4, 2) <= Av)


T2 = 1;
Else

T2 = 0;

If (DCT (5, 4) <= Av)


T3 = 1;
Else

T3 = 0;

If (DCT (6, 3) <= Av)


T4 = 1;
Else

T4 = 0;

If ( T1 + T2 + T3 + T4 >= 1)

89

Decode 0
If (DCT (5, 1) > Av)
P1 = 1;
Else

P1 = 0;

If (DCT (4, 2) > Av)


P2 = 1;
Else

P2 = 0;

If (DCT (5, 4) > Av)


P3 = 1;
Else

P3 = 0;

If (DCT (6, 3) > Av)


P4 = 1;
Else

P4 = 0;

If ( P1 + P2 + P3 + P4 >= 1)
Decode 1
End;
6. Store W, the recovered watermark;
7. End.
It may be observed from both the algorithms that even if attacker alters the values of the
coefficient of FM region, if Av is not changed much, then we can recover the
watermark data correctly and attacker cannot aim to attack the image in such a manner
which modifies Av.

5.3.5 PERFORMANCE OF THE PROPOSED SCHEME


Our proposed scheme does not need any testing to check whether or not it is robust
against the collusion attack, as it is designed in such a way that the attacker can not
analyze the pattern by colluding many watermarked copies. We needed to check the
performance of the proposed scheme against the JPEG compression and other common
image manipulations and known attacks. For this, we tested our scheme on 3 test images

90

Lena, Mandrill and Pepper of size 512 x 512 in Windows 24 bit BMP format, shown in
Figure 3.12.
Firstly, we chose an appropriate value of T which affects least the image quality as well
as optimizes the recovery of watermark data. Our experiments suggested that if we were
hiding the watermark using T = 150, there was approximately no loss in the perceptual
quality of the images and recovered watermark logos were of very fine quality.
Figure 5.2 shows the watermarked test images after hiding watermark logo by keeping
T = 150. It may be seen that, images are not disturbed at all. Figure 5.3 shows the
extracted watermark logos from these watermarked copies of Lena, Mandrill and Pepper
without performing any attack or manipulations on the watermarked images. This fixed
up the value of T = 150 for further tests.

Figure 5.2: Watermarked test images keeping T = 150

Figure 5.3: Extracted watermark from watermarked Lena, Mandrill and Pepper images respectively at
T = 150

5.3.5.1 PERFORMANCE AGAINST JPEG COMPRESSION: We applied JPEG


compression on watermarked images (generated by keeping T = 150) at different JPEG
quality parameters Q and then recovered the watermark logos. Table 5.3 summarizes the

91

PSNR of extracted watermark logos. It may be observed from Table 5.3 that even at
Q = 20, quality of extracted watermark is very fine and logos are quite detectible.
5.3.5.2 PERFORMANCE AGAINST COMMON IMAGE MANIPULATIONS: We
performed the following attacks on the watermarked test images:
Attack-1: Equalize the Histogram;
Attack-2: Apply uniform scaling (Zoom);
Attack-3: Adjust the brightness to +40 and contrast to +25;
Attack-4: Adjust the hue and saturation to +10 each;
Attack-5: Add 10 % Gaussian noise; and
Attack-6: Blur the image using Gaussian blur with 1 pixel radius.
Table 5.3: PSNR of extracted watermark logos after JPEG compression

PSNR (DB)
Lena

Mandrill

Pepper

Quality Watermarked Watermarked Watermarked


factor

with T = 150

with T = 150

with T = 150

Q = 80

39.9987

37.0185

39.9987

Q = 60

39.9987

34.98135

39.9987

Q = 40

24.57225

14.51025

25.20285

Q = 20

21.92385

12.26715

21.3678

Then, we recovered the watermark logos from attacked images and calculated the PSNR
value of watermark logos. Table 5.4 summarizes the PSNR values of extracted logos
recovered from all test images. Our proposed scheme sustained all the attacks and the
quality of the extracted watermark logos is quite good. Figure 5.4 shows the recovered
logos from attacked images.

92

Table 5.4: PSNR of extracted watermark logo from watermarked test images after attacks

Gaussian
Blur

Gaussian
Noise

HueSaturation

BrightnessContrast
Adjustment

Zoom

Equalization

Histogram

PSNR (DB)

Lena

34.67

34.67

34.67

34.67

34.67

34.67

Mandrill

28.06

28.04

28.04

28.04

28.04

28.04

Pepper

32.25

32.07

30.78

32.48

31.78

31.10

5.3.5.3 COMPARATIVE STUDY RESULTS WITH OTHER SCHEMES:

We

compared our scheme against JPEG compression with other similar and state-of-the-art
methodologies which are well known for their robustness against JPEG compressions.
The chosen schemes are as follows:
Scheme-A: Correlation based Schemes with 2 PN sequence (Section 2.1.3.2)
Scheme-B: Classical MBCE Scheme (Section 2.2.2.1)
Scheme-C: Scheme proposed in Section 4.4 is also based on Middle Band Coefficient
Exchange (MBCE) scheme and ICAR in nature. So, we decided to compare the
performance of our scheme with this scheme also. This scheme swaps 4 pairs of
coefficients in FM region in correlation with low band coefficients. We are naming this
scheme as Scheme-C.
Then, we re-implemented the chosen schemes for the colored images and hid the
watermark data in BLUE channel.
Scheme-D: We are naming our proposed scheme as Scheme-D.
It is observed that all the above schemes are robust against JPEG compression attack but
if we compress the watermark images by very low quality factors (less then Q = 20), our
proposed scheme outperforms the other schemes. We compressed the watermarked test

93

images by keeping JPEG quality factor Q = 15, 10, and 5. No scheme, other than the
proposed one, was able to extract the detectible watermark logos.

Figure 5.4: Recovered logos from attacked images

Table 5.5 summarizes the PSNR values of extracted logos from highly compressed
watermark test images using various schemes. Figure 5.5 shows the recovered watermark
logos from highly compressed watermarked images using our proposed scheme. It may
be observed that recovered logos are quite detectible and proposed scheme is more
efficient than the other chosen schemes.

94

Table 5.5: PSNR values of extracted logos from highly compressed watermarked test images using various
schemes

PSNR (DB)
JPEG
Quality

Lena

Factors

Mandrill

Pepper

Schemes

Scheme-A

Scheme-B

Scheme-C

Scheme-D

Test Images /

Q = 15 8.723

7.89

8.12

Q = 10 7.67

7.12

7.988

Q = 05 4.5

4.324

4.657

Q = 15 4.222

4.587

3.987

Q = 10 3.45

3.87

3.95

Q = 05 2.32

2.2

1.97

Q = 15 4.323

4.565

4.33

Q = 10 4.11

4.249

4.12

Q = 05 2.234

2.229

2.1

Q = 15 16.305

10.845

13.335

Q = 10 15.585

10.62

12.885

Q = 05 14.13

10.29

11.4

Mandrill

Pepper

Lena

JPEG Q Factor
Q = 15

Q = 10

Q = 05

Figure 5.5: Extracted logos using proposed scheme from highly compressed watermarked test images

95

Results indicate that proposed scheme recovers the watermark even from an attacked
image which is compressed up to Q = 5 quality factor of JPEG (i.e. after 95 - 99% size
reduction).
This proves that the proposed scheme is not only an ICAR scheme but also very robust to
JPEG compression. In addition to this, the proposed scheme is resisting common image
manipulations like cropping, scaling, flipping, histogram equalization, brightnesscontrast adjustment, Hue-saturation alteration, Gaussian noise and Gaussian blur.

5.4

CONCLUSION

In this chapter, we have discussed the watermarking of the colored images. Since a
colored image has R, G and B color channel, firstly we presented a study to find the
suitability of a color channel to carry the watermark data with respect to the robustness
against an attack. It was found that if an image has to undergo JPEG compression attack,
then the watermark data should be hidden in GREEN color channel to ensure the best
recovery of the watermark logo. Then, we presented an ICAR watermarking scheme
based on the average of the FM coefficients. Results indicted that the proposed scheme
is very robust against JPEG compression and common image manipulations and better
then other similar state-of-the-art schemes.

96

CHAPTER-6
WATERMARKING OF JPEG IMAGES

6.1

INTRODUCTION

In the Chapter 4, we have discussed that we can improve the robustness of DCT and
DWT based watermarking schemes against some well known attacks by preprocessing
the images. Since, Fingerprinting is the most crucial demand of today, we developed an
ICAR scheme for the watermarking of gray level images also. We further expanded our
scope for the colored images watermarking in Chapter 5 and developed an ICAR scheme
for watermarking of 24-bit colored BMP images. Since, most of the images present on
World Wide Web are in JPEG format, which is a highly compressed image format and
store the images in the transformed domain, i.e. store the frequencies not the pixels
values, we decided to develop an ICAR watermarking scheme for JPEG images. We also
explored a relationship between the robustness and some of the image characteristics.

6.2

DEVELOPMG AN ICAR WATERMARKING ALGORITHM


FOR JPEG IMAGES

Most of the images present on WWW are in the Joint Photographic Experts Group
(JPEG) format where as relatively less work is found for watermarking the JPEG images.
Therefore, we decided to extend our earlier proposed ICAR schemes for the
watermarking of JPEG images also. In our earlier proposed ICAR schemes, we inserted
the ICAR nature in by introducing redundancy in the coefficients swapping of FM region.
We also made the swapping criteria dependent on some very robust data elements (in the
scheme presented in Section 4.4, it was the relative value of low frequency coefficient
and in the scheme presented in 5.3, it was the average value of all middle band
coefficients) so that decoding algorithm may perform a good recovery of the watermark
data. But as it may be observed that we deployed the coefficients of FM region which
were generated by taking the 8 x 8 DCT of pixels values. So, to continue the same
97

approach for the JPEG images, we needed to use coefficients belonging to FM region.
More pricelessly, JPEG image format does not store the pixels actual value but it stores
the image in frequency domain. So, we need to convert the JPEG image into spatial
domain and then take 8x8 block DCT on its color channels to get the FM region.
To inject the ICAR nature, we need to introduce redundancy in coefficient swapping.
Since JPEG is a very high compressed format, we know that as soon as we convert this
spatial domain image into JPEG format, lots of its coefficients will be changed. This
would create problem in recovering the watermark data by only considering the relative
strengths of coefficients of FM region. We must, therefore, provide extra robustness by
involving some coefficients whose value does not change much during the conversion of
spatial domain to frequency domain and vise versa. To resolve this issue, we decided to
take the advantage of JPEG compression-decompression scheme itself. In an 8x8 DCT
block, large value of the top-left corner is called the DC coefficient. The remaining 63
coefficients are called the AC coefficients. This DC coefficient is the major dominating
value while decompressing. This DC value alone can regenerate the best approximated
image by taking the IDCT. If this value is altered, then image is largely affected. So we
decided to take the contribution of this DC coefficient apart from coefficients from FM
region to interpret the watermark data to make our scheme robust. We have seen that in
our earlier scheme, we developed a swapping criteria based on the average of all 22
coefficients of FM region by claiming that it was difficult for any attacker or for any
image manipulation to alter this value significantly if the image has to remain
perceptually similar. Therefore, for our newly proposed watermarking scheme for JPEG
images, we interpreted the watermark data in FM region based on the average of 22
coefficients from FM region and the DC coefficient. More details of the watermark
embedding algorithms are described in Section 6.2.3. To ensure ICAR property, liker our
earlier proposed schemes, we watermarked each copy of a single JPEG image with a
different policy.
The proposed watermarking scheme can be defined as a 7-tuple (X, W, P, T, G, E, D)
where:

98

1. X denotes the set of instances Xi, of a particular JPEG image, (If N copies of
an image are to be watermarked, then 0 i N);
2. W denotes the monochrome watermark logo;
3. P denotes the set of policies Pi, 0 i N;
4. T is the watermark strength parameter;
5. G denotes the policy generator algorithm G: Xi Pi, where
Each Xi will have a unique Pi, i.e. a different policy to hide the watermark
data;
6. E denotes the watermark embedding algorithm, E: Xi x W x Pi Xi;
7. D denotes the watermark detection algorithm, D: Xi x Pi W, where W
represents the extracted watermark.

The parameter T is analogous to K of classical MBCE scheme. In classical MBCE


scheme, relative strength of two coefficients value of FM region decides the decoding of
1 or 0. If the relative strength of two values has to decide the decoding of 0 or 1,
then larger value should remain larger even after image manipulations. So, we adjust
these values in such a way that the difference between the two values becomes larger
than a certain threshold value. We name this threshold value as Watermark Strength
Parameter because this value decides the robustness of watermark data. Certainly, it has
an impact on the image perceptibly. So, we need to decide this threshold value in such a
way that our image does not loose its quality much. The value of T may differ for each
image.
Out of these 7 tuples, last 3 tuples are algorithms, which are discussed below:
6.2.1 G, THE POLICY GENERATOR ALGORITHM
Similar to our earlier proposed ICAR watermarking scheme for the gray image
watermarking and colored image watermarking, we need to watermark each copy Xi of
an JPEG image X differently. Therefore, we need a different watermarking policy for

99

each copy of the image to be watermarked. Here Policy means that, for every copy of
the image, there will be unique combination of 4 middle band coefficients. First we had
to convert the source JPEG image into its equivalent true colored 24-bit BMP image.
Then, to generate a policy, we simply take 8 x 8 DCT of a chosen color channel of the
input image Xi and randomly select 4 coefficients out of 22 middle band coefficient of
FM region from any of the red, green or blue color channel. So, numbers of policies that
can be generated are

22

C 4 = 7315 which means that 7315 copies of a single image can be

watermarked such that no two watermarked images have same policy. This step ensures
that attacker can not conclude the location of watermark data by colluding many
watermarked copies of an image. This also depicts that our proposed scheme is an ICAR
scheme. Policy generator algorithm also returns the color channel to be used to carry the
watermark.
6.2.1.1 COLOR CHANNEL SELECTION: Bossen et al. [9] have stated that the
watermarks should be embedded mainly in the BLUE color channel of an image because
human eye is least sensitive to change in BLUE channel. However, the suitability of color
channel to hide the watermark data depends on the image itself. The color channel which
should be used can be found on the basis of the amount of the color present in the image
or on the basis of histogram of each color channel (i.e. color with spreader histogram
should be given priority). We also know that for few images, BLUE channel may not
give the optimum results. We, therefore propose that the color channel with the lowest
Standard Deviation (SD) should be selected. More details of this finding and result
related to this issue are given in the Section 6.2.4.1.
6.2.2

E, THE WATERMARK EMBEDDING ALGORITHM

In this algorithm, each 8x8 DCT block of an image is used to hide a single bit of
watermark logo. Our embedding algorithm is based on averaging the coefficients of FM
region and the DC coefficient. As we know that attacker cannot alter this average (Av)
of coefficients of FM region and the DC coefficient badly as it will heavily impact the
quality of image, we are hiding 1 or 0 by using the relative values of four coefficients
with this Av.

100

This algorithm is given as follows:

1. Repeat steps 2 to13 for i = 1..n;


// where n is the number of copies of a single image to be watermarked //

2. INPUT (Xi);
3. Convert the Xi into its equivalent spatial domain 24-bit colored image;
4. Take 8 x 8 block DCT of Xi;
5. INPUT (W);
6. Convert W into a string S = (Sj | Sj = {0,1}, for j = 1..length of the watermark);
7. Let L = STRING_LENGTH (S);
// L is the length of watermark data. If L = 1000, then first 1000 DCT block of Xi are used //

8. Pi = CALL (G);
// Each generated Pi shall be stored in an authors database for the detection purpose in future.
Let the Pi for chosen Xi be, Pi = {(5,1), (4,2), (6,3) and (5,4)} in the chosen color channel //

9. Calculate the average Av of remaining 18 middle band coefficients and DC


coefficient.
Av = (DCT (0, 0) + Sum (22 Middle band coefficients) - Sum (4 chosen
coefficients chosen by Pi)) / 19.
10. Repeat steps 11 to13 for r = 1..L;
11. Read Sr;
// Now like classical MBCE scheme, relative strength of average Av and chosen 4 coefficients
in step 7 will interpret 0 or 1 of watermark data. To hide 0 for all 4 chosen coefficients
in step 7, we assigned the value of coefficients which is T less than the average Av. To hide
1, for all 4 chosen coefficients in step 7, we assigned the value of coefficients which is T
greater than the average Av //

If (Sr = 0)
DCT (5, 1) = Av - T;
DCT (4, 2) = Av - T;
DCT (5, 4) = Av - T;
101

DCT (6, 3) = Av - T;
Else
DCT (5, 1) = Av + T;
DCT (4, 2) = Av + T;
DCT (5, 4) = Av + T;
DCT (6, 3) = Av + T;
End;
12. Take IDCT to reconstruct Xi;
13. Convert Xi back to its JPEG format;
14. End.
6.2.3

D, THE WATERMARK DETECTION ALGORITHM

Watermark extraction is the reverse procedure of watermark embedding. To extract the


watermark from the watermarked JPEG image, first we convert it into its equivalent 24
bit colored images and then calculate the average Av in a same way, as in embedding
algorithm. Owner has a record of all policies used to watermark the images. Based on
policies; owner of the image can recover watermark using following rule:
1) If at least 1 out of 4 chosen coefficients are less then Av, Interpret 0; and
2) If at least 1 out of 4 chosen coefficients are greater then Av, interpret 1.
The detection algorithm steps are as follows:
1. INPUT (Xi);
// Xi is the attacked copy of a watermarked image//

2. Convert Xi into its equivalent 24 bit colored image;


3. Take 8x8 block DCT of Xi and calculate Av;
4. For all Pi stored in authors database, repeat the steps 5;
// If initially 10 copies were watermarked, then out of 10 policies, for 1 policy, watermark will be
recovered correctly. To explain further steps, we are assuming that now algorithm is in a loop
where Pi is {(5, 1) (4, 2) (5, 4) and (6, 3)}, which was used to watermarked this particular Xi //

102

5. Repeat the steps 5 for j = 1.L;


// L is the length of watermark data. A single bit will be recovered form one 8x8 DCT block.//

Take jth DCT block to form jth bit of watermark as follows:


If (DCT (5, 1) < = Av)
T1 = 1;
Else

T1 = 0;

If (DCT (4, 2) < = Av)


T2 = 1;
Else T2 = 0;
If (DCT (5, 4) < = Av)
T3 = 1;
Else T3 = 0;
If (DCT (6, 3) < = Av)
T4 = 1;
Else T4 = 0;
If ( T1 + T2 + T3 + T4 > = 1 )
Decode 0
If (DCT (5, 1) > Av)
P1 = 1;
Else P1 = 0;
If (DCT (4, 2) > Av)
P2 = 1;
Else P2 = 0;
If (DCT (5, 4) > Av)
P3 = 1;
Else P3 = 0;
If (DCT (6, 3) > Av)
P4 = 1;
Else P4 = 0;
If ( P1 + P2 + P3 + P4 > = 1)

103

Decode 1;
End;
6. Store W, the recovered watermark;
7. End.
It may be observed from both the algorithms that even if attacker alters the values of the
coefficient of FM region, if Av is not changed much, then we can recover the
watermark data correctly and attacker cannot aim to attack the image in such a manner
which modifies the Av.
6.2.4

PERFORMANCE OF THE PROPOSED SCHEME

Our proposed scheme does not need any testing to check whether or not it is robust
against the collusion attack as it is designed in such a way that the attacker can not
analyze the pattern by colluding many watermarked copies. We needed to check the
performance of the proposed scheme against the JPEG compression and other common
image manipulations and known attacks. We have tested our scheme on four JPEG test
images of Lena, Mandrill, Pepper and Goldhill shown in Figure 3.12 and watermark logo
is shown in Figure 3.13. We measured the image quality in terms of Peak Signal to Noise
Ratio (PSNR) and Correlation Coefficient (CC).
Firstly, we choose an appropriate value of T which affects least the image quality as
well as optimizes the recovery of the watermark data. Based on our earlier experiences
discussed in Section 5.3.5, we embedded the watermark logo in test images by keeping
T = 150 (in blue color channel) and then recovered watermark logos. Our experiments
suggested that in Lena, Mandrill and Pepper test images, there was, almost no loss in the
perceptual quality of the images (as shown in Figure 6.1) and recovered watermark logos
were of very fine quality. Figure 6.2 shows the watermark logos obtained from Lena,
Mandrill, Pepper and Goldhill. It was observed that for Goldhill test image, recovery was
not good. Therefore, we continued to experiment the same process for the Goldhill test
image at various values of T and we found that at T = 100, Goldhill test image was giving
the best recovered logo without much loosing its perceptibility.

104

Figure 6.3 shows the

goldhill test image after the watermark logo was embedded and the recovered logo.
Therefore, considering the imperceptibility versus Robustness trade-off, we fixed up
the value of T = 150 for the further tests for Lena, Mandrill, and Pepper JPEG test
images, and T = 100 for the Goldhill test image.

Figure 6.1: Watermarked test images generated by keeping T = 150

Figure 6.2: Extracted watermark logos from watermarked Lena, Mandrill, Pepper and Goldhill test
images respectively at T = 150

Figure 6.3: Goldhill test image after hiding the watermark logo and the recovered logo at T = 100

6.2.4.1 COLOR CHANNEL SELECTION AND PERFORMANCE AGAINST


JPEG COMPRESSION: Standard deviation (SD) depicts the spread of the frequency
values in a range. If the histogram of a chosen color channel of a particular image has less
spread, the image has less number of frequencies of the chosen color channel. Since, it is
the color channel i.e. the particular color frequencies that actually carry the watermark
data, we conclude that SD must play an important role. To explore the relationship

105

between the selection of a color channel to carry the watermark data and the efficiency of
recovery, we decided to experiment on SD of all three color channels. Table 6.1 shows
the standard deviation of all three color channels for test images.
Table 6.1: SD values of color channels for test images

Lena

Mandrill Pepper

Goldhill

R channel

49.05 55.5

45.17

56.6

G channel

52.88 47.78

75.05

54

B channel

34.06 61.7

44.29

61

First, we hid the watermark data in the BLUE channel of all four test images. Then, we
compressed watermarked images using JPEG technique at various quality factors and
then recovered the watermark logos. We calculated the PSNR and CC values of extracted
logo. Table 6.2 summarizes the results. It was found that extracted watermark from
Mandrill and Goldhill test images were having poor values of PSNR and CC. Therefore,
for these two images, we repeated the above process by using GREEN Channel. The
qualities of the extracted watermark logos from these two images were improved.
Therefore, we have related the performance of our scheme with color channel selection.
As, it may be observed from the Table 6.1 that for Lenas and Peppers test images,
BLUE channel have lesser SD, whereas for Mandrills and Goldhills images, GREEN
channel has lesser SD. So it was concluded that lesser the SD better is the recovery of the
watermark data. This fixed up the BLUE channel for Lenas and Peppers watermarking
and GREEN channel for rest two images. It is clear from Table 6.2 and Table 6.3 that
after using GREEN channel for Mandrills and Goldhills images, performance was
increased. It may be further observed from Table 6.3 that our proposed scheme is quite
robust against JPEG compression.
6.2.4.2 PERFORMANCE AGAINST IMAGE MANIPULATIONS: We performed
the following attacks on the watermarked test images:

106

Attack-1: Equalize the Histogram;


Attack-2: Add 10 % Uniform noise;
Attack-3: Adjust the brightness to + 40 and contrast to + 25;
Attack-4: Adjust the hue and saturation to + 10 each;
Attack-5: Flip Horizontal; and
Attack-6: Apply uniform scaling (Zoom).
Our proposed scheme sustained all the attacks and qualities of extracted watermark logos
were very fine. Table 6.4 summarizes the CC of extracted logos from all test images.
Figure 6.4 shows the recovered logos from attacked images.

Table 6.2: PSNR and CC of extracted logo by using BLUE channel for all images

JPEG
Quality
Factor

Lena
PSNR 20.898

Q = 60
Q = 40
Q = 20

Mandrill Pepper Goldhill


10.53

24.876

12.53

84.78

51.8

90.55

54.8

PSNR 21.672

9.756

25.412

12.11

86.25

46.11

91.16

48.54

PSNR 19.597

9.27

23.508

9.88

41

88.95

45.76

CC
CC
CC

82.59

107

Table 6.3: PSNR and CC of extracted logo by using BLUE and GREEN channels for images

JPEG

Lena

Mandrill

Pepper

Goldhill

Quality

(BLUE), (GREEN) (BLUE) (GREEN)

Factor

T = 150

T = 150

T = 150

T = 100

PSNR

20.898

21.06

24.876

22.31

CC

84.78

85.12

90.55

91.45

PSNR

21.672

20.682

25.412

23.32

CC

86.25

84.98

91.16

92.56

PSNR

19.597

20.682

23.508

21.43

CC

82.59

84.97

88.95

91.45

6.2.4.3 COMPARATIVE

STUDY

Q = 60
Q = 40
Q = 20

WITH

SIMILAR,

STATE-OF-THE-ART

SCHEMES: We compared the performance of the proposed scheme against JPEG


compression with other similar schemes which are DCT based and well-known for their
robustness against JPEG compression.
Table 6.4: CC of the extracted logos

Lena

Mandrill

Pepper

Goldhill

(BLUE),

(GREEN),

(BLUE),

(GREEN),

T = 150

T = 150

T = 150

T = 100

Histogram Equalization

83.82

82.15

84.04

81.30

Uniform Noise (10%)

57.97

80.64

58.37

79.75

81.05

77.13

80.69

76.25

each)

86.09

85.62

86.35

85.65

Horizontal Flip

97.01

96.98

96.56

96.36

Uniform scaling

92.31

91.67

92.41

92.27

Test Images /Attacks

Brightness (+ 40) & Contrast


(+ 25)
Hue and saturation adjust (10

108

Figure 6.4: Extracted logos from attacked watermarked images

The schemes chosen were:


Scheme-A: Correlation based Scheme (Section 2.1.3.1)
Scheme-B: The Classical Middle Band coefficient exchange scheme (Section 2.2.2.1)
Scheme-C: Collusion attack resistant watermarking scheme (Section 4.4): Scheme
proposed in Section 4.4 is also based on MBCE scheme and ICAR in nature. This scheme
swaps 4 pairs of coefficients in FM region in correlation with low band coefficients. We
are naming this scheme as Scheme-C.
Scheme-D: We named our proposed scheme as Scheme-D.
We re-implemented the first three chosen schemes ideas for JPEG colored images. In
their work A Novel DCT-based Approach for Secure Color Image Watermarking [7]
author have compared their proposed scheme against JPEG compression with Tsai [102],
cox [19], Fridrich [28] and Koch [48] approaches but they have given the results only up
to JPEG Quality factor Q = 20. Therefore, we compared our proposed scheme for very

109

less JPEG quality factors such as Q = 5 and Q = 10. Most of the schemes started loosing
their efficiency at these quality factors.
We conclude that all the above schemes were very robust against JPEG compression
attack but if we compressed the watermark images at very low quality factors (less than
Q = 20), our proposed scheme outperformed the other schemes. No scheme, other than
the proposed one, was able to extract the detectible watermark logo at Q = 10 and 5.
Figure 6.5 shows the graph of CC values of recovered logos obtained from JPEG
compressed (at Q = 10) images which were watermarked using various schemes.
Figure 6.6 shows the graph of CC values obtained from JPEG compressed (at Q = 5)
images.
Therefore, the proposed scheme is not only an ICAR scheme but also enhances the
performance. Results indicate that the proposed scheme recovers the watermark even
from highly attacked images which are compressed up to Q = 5 quality factor of JPEG
(i.e. after 95-99% size reduction). In addition to this, the proposed scheme is resisting
common image manipulations like cropping, scaling, flipping, histogram equalization,
brightness- contrast adjustment, hue-saturation alteration and Gaussian noise.

100
90
80
70
60
50
40
30
20
10
0

Scheme-A
Scheme-B
Scheme-C
Scheme-D

Lena
(Blue)

Mandrill
( Green)

peper
(Blue)

Goldhill
(Green)

Figure 6.5: Comparison of correlation coefficients at Q = 10

110

90
80
70
60
50
40
30
20
10
0

Scheme-A
Scheme-B
Scheme-C
Scheme-D

Lena
(Blue)

Mandrill (
Green)

peper
(Blue)

Goldhill
(Green)

Figure 6.6: Comparison of correlation coefficients at Q = 5

6.3

A DWT BASED WATERMARKING SCHEME FOR JPEG


IMAGES

During the development of the above schemes, popularity of JPEG2000 image


compression/encoding increased. JPEG2000 is a wavelet-based image compression
standard. This standard has also been created by the Joint Photographic Experts Group
committee in the year 2000 with the intention of superseeding their original DCT based
JPEG standard (created in the year 1991). The standardized filename extension for
JPEG2000 image is .jp2. JPEG 2000 has a much more significant advantage over certain
modes of JPEG in that the artifacts are less visible and there is almost no blocking. The
compression gains over JPEG are attributed to the use of DWT and a more sophisticated
entropy encoding scheme.
Since .jp2 format is new upcoming image format and very less watermarking efforts have
been presented against this format conversion in the literature, we need to focus this
attack because BMP and JPEG images may have to undergo .jp2 image format
conversion/compression. To ensure that our watermarked images do not lose their
robustness against JPEG2000 format conversion attack, we further develop a
watermarking scheme which can sustain JPEG2000 format conversion attack also.

111

6.3.1 EXPLORATION OF DWT DOMAIN


Till now, all of our proposed watermarking schemes are DCT based, and therefore, very
robust against JPEG compression attack because JPEG encodes the images using DCT.
Both, DCT and DWT encode (or compress) the image very differently. Since JPEG2000
encodes the image using DWT, a DCT based scheme may not be fruitful if we are
targeting .jp2 conversion attack resistant nature in our watermarking scheme. Our earlier
results of preprocessing (Sections 4.2) also supported this fact. So, we decided to
explore DWT domain for the watermarking of JPEG images.
6.3.1.1 ISSUES IN USING DWT: Because of their inherent multi-resolution nature,
wavelet-coding schemes are especially suitable for applications where scalability is
important. The use of DWT is gaining popularity in signal processing, image
compression and watermarking. DWT gives extremely good results in the case of lossless
compression. But DWT has a serious issue when it comes to comparison with DCT for
the watermarking purposes. We cannot assume lossless manipulation in images; both in
watermark embedding and while the image is being attacked. In watermarking, one has to
ensure

that

the

watermark

data

is

recoverable

even

from

highly

destroyed/manipulated/compressed/lossy cover image. Now, while using DCT domain, in


most of the cases, we take 8 x 8 DCT and thus have hundreds of DCT blocks. In each
DCT block, there are FL, FM and FH regions, as shown in Figure 2.3. We cannot use FH
because any manipulation operation will attack first on FH. FL has the major dominating
coefficient to recreate the image. If we use FL to hide the watermark data, cover image
perceptibility will be affected seriously. Therefore, we use FM region, or since, there are
so many FL regions, we can work out to devise a watermarking scheme that takes FL
region also into consideration without changing FL coefficient values.
On the other hand, DWT takes the complete image into consideration as shown in
Figure 6.7 and breaks it into four parts, namely LL, HL, LH, and HH region. This policy
may have several advantages but for watermarking, it has a very serious issue. Like DCT
blocks, we should not use HH region. LL region coefficients can also not be altered much
because these will heavily affect the image perceptibility (LL coefficients will alone

112

generate a very good approximated image and we cannot alter these coefficients much).
HL and LH coefficients may be altered seriously by any image manipulation operation.
Unlike DCT based transformation (where there are so many FM regions to hide the
watermark data), there is only one LL region in DWT. Therefore, we have very less space
to hide the watermark data. Either we disturb heavily DWT coefficients and thus affect
the image perceptibility while hiding watermark data or to preserve to image quality, hide
watermark data in those regions which are less susceptible to get modified by image
manipulation operations and thus affecting the robustness of the watermarking scheme.
We thus conclude that if we use DWT for watermarking purpose, Imperceptibility vs.
Robustness balance is the new challenge for us. More precisely, the classical CDMADWT based scheme as given in Section 2.2.3.1, a highly referred scheme which is very
robust against JPEG compression, affects the image quality up to a great extent. On the
other hand, if sub-band based technique [36] does not affect the image perceptibility after
hiding the watermark data, we may recover the watermark data from JPEG compressed
image only up to compression ratio 10-15 (Q = 70 approx). So, both the above wellknown schemes do not have a good balance in Imperceptibility vs. Robustness tradeoff.

Figure 6.7: 2-D Haar DWT

113

Therefore, in this section, our target is to develop a watermarking scheme which is:
1) ICAR in nature (because it ensures the maximum coverage of financial
implications.)
2) JPEG2000 attack resilient (because it is upcoming DWT based image format).
3) Being a DWT based scheme, achieve a good balance in Imperceptibility vs.
Robustness trade-off, as most of the DWT based watermarking scheme do not
satisfy much of this quality.

We decided to explore Haar DWT for watermarking purposes because CDMA-DWT


[42][52] and Sub-band based scheme [36] used Haar DWT and in both these schemes,
use of Haar DWT has shown its robustness against JPEG compression as well as
image imperceptibility separately.
6.3.2 BACKGROUND OF THE PROPOSED SCHEME
We used a monochrome logo as a watermark data which we first converted into a string
of 0s and 1s. Now, we needed to hide 0 and 1, in our JPEG image, which we
converted into its equivalent RGB image. As we have said above that a single DWT
block of the image does not give us enough space to hide the data, we planned to take 8 x
8 DWT on a specified color channel of JPEG so that we have a large number of DWT
blocks and thus have enough opportunities to hide the watermark data. We used color
channel with lesser Standard Deviation (SD) (as discussed in Section 6.2). We inherited
the idea of classical MBCE scheme i.e. instead of actually embedding any data, we
interpret 0 or 1 by using the relative strength of two values. We claim that the
average value of all coefficients of a single LL region is less susceptible to
modification because LL coefficients are the major dominating coefficients and one
cannot change all coefficients much. Even if some of these have been altered after one
pass of coding and decoding (Taking DWT and then IDWT), the altered coefficients will
again try to get their original value (if we are not changing the perceptual quality of the
image). Therefore, Average of all LL coefficients may provide us a good robustness.
114

Even if it is slightly modified, it is very less probable that relative values of Averages
of two consecutive LL blocks get modified. So we decided to hide 0 or 1 by using
the relative value of average of LL coefficients of two consecutive 8x8 DWT blocks.
6.3.3

DUAL WATERMARKING

Both DCT and DWT encode the image very differently. Since DWT based watermarking
scheme provides coverage against DWT based attack, our watermarking scheme may not
give good result against DCT transformation based attacks as in the case of JPEG
compression. Since we have a very robust DCT based scheme in hand (proposed in
Section 6.2), we decided to watermark the images using both schemes, one after another,
to ensure the maximum coverage against attacks.
So, first we watermark an image (I) using a DWT based approach to generate a
watermarked copy (I) and the on I, we again apply a DCT based scheme, presented in
Section 6.2, to generate a final watermarked copy I.
6.3.4 THE DWT BASED WATERMARKING
In our proposed dual watermarking, the DWT based watermarking scheme for JPEG
images is defined as a 7-tuple (X, W, P, T, G, E, D) where:
1. X denotes the set of instances Xi, of a particular JPEG image, (If N copies of
an image are to be watermarked, then 0 i N);
2. W denotes the monochrome watermark logo;
3. P denotes the set of policies Pi, 0 i N;
4. T is the watermark strength parameter.
5. G denotes the policy generator algorithm G: Xi Pi, where each Xi will have
a unique Pi, i.e. a different policy to hide the watermark data. This ensures the
ICAR nature;
6. E denotes the watermark embedding algorithm, E: Xi x W x Pi Xi

7. D denotes the watermark detection algorithm, D: Xi x Pi W, Where W


represents the extracted watermark.

115

6.3.4.1 P, THE POLICY: P is a set of policies Pi, where each Pi belongs to a unique Xi,
the instance of an image. A Pi is generated by G and is of the form (Starting block (r,s),
offset, color

channel). For example, for Lena test image which we used in our

experiments, Pi is (starting block (0,0), offset (1), Blue).

6.3.4.2 G, THE POLICY GENERATOR ALGORITHM: Similar to our earlier


proposed ICAR watermarking scheme for the gray image watermarking and colored
image watermarking, we need to watermark each copy Xi of a JPEG image X differently
to ensure the ICAR nature. Policy generator algorithm is called by E, after taking 8 x 8
DWT of the image. Since average of two consecutive LL blocks have to interpret 0 or
1, G ensures that no two copies of the same original image use the same pattern. So, G
achieves this by providing E, the calling routine, a starting block (which is chosen
randomly) and an offset. E can start grouping of 2 consecutive blocks using this data. For
example, consider an image of size 80 x 80. There will be 100, 8 x 8 DWT blocks in each
color channel as shown in Figure 6.8 and 6.9. If G returns the starting block (0,0) and
offset 1 in a specific color channel, then the blocks to be chosen to hide the watermark
data are shown in Figure 6.8. If G returns the starting block (5,5) and offset 2, then blocks
to be chosen to hide the watermark data are shown in Figure 6.9.
We assume the circular queue of the DWT blocks. If our source image is of 512 x 512
size, then there are 4096, 8 x 8 DWT blocks. Using G, we can generate thousands of
policies which ensure that no two watermarked copies will share same way to hide the
watermark data. The overhead of this G is that the author / owner has to record all
policies in his / her database to use in the decoding phase. This depicts that our proposed
scheme is an ICAR scheme.

116

These first 2 blocks


will hide first bit

These 2 consecutives blocks


will hide second bit

Figure 6.8: An example of 2 consecutive DWT blocks

These 2 blocks, having


offset 2, will hide first bit

(5, 5)
block

These 2 blocks will


hide second bit

Figure 6.9: An example of 2 consecutive DWT blocks

117

Policy generator algorithm also returns the color channel to be used to carry the
watermark data. As discussed in the Section 6.2.4.1, we used the color channel with
lesser Standard Deviation (SD) to hide the watermark data.

6.3.4.3 E, THE WATERMARK EMBEDDING ALGORITHM: To explain the


embedding algorithm, we assume that G returns the DWT (0, 0) block as starting block
with offset as 1. A simple watermark embedding approach is shown in Figure 6.10.
Embedding algorithm steps are as follows:
1. Repeat steps 2 to12 for i = 1..n;
// where n is the number of copies of a single image X to be watermarked//
2. INPUT (Xi);
// Xi is the instance of X.

3. Convert the Xi into its equivalent spatial domain 24-bit colored image;
4. Take 8 x 8 block DWT of Xi;
5. INPUT (W);
6. Convert W into a string S = (Sj | Sj = {0,1}, for j = 1..length of the watermark);
7. Let L = STRING_LENGTH (S);
// L is the length of watermark data. If L = 1000, then first 2000 DWT block of Xi are used to hide
the watermark data //

8. Pi = CALL (G);
// Each Pi shall be stored in an authors database for the detection purpose in future. Let the Pi,
for chosen Xi, be Pi = {DWT (0, 0), Offset (1), BLUE} which is shown in Figure 6.8 //

9. Repeat steps 10 to 12 for r = 1..L;


10. Read Sr;
// Based on Pi, the average AV1 and AV2 of 2 chosen DWT blocks is calculated as follows: //

AV1 = (Sum of all LL coefficients of DWT (0, 0))/16;


AV2 = (Sum of all LL coefficients of DWT (0, 1))/16;
If (Sr = 0)
If (AV1 - AV2 > 0)
v = (AV1 - AV2) / 16;

118

Subtract v from all coefficients of DWT (0, 0);


Add v in all coefficients of DWT (0, 1);
End;
// Now relative value of AV1 and AV2 reflects the watermark bit. To further increase the
robustness, we adjust the LL coefficients values such that difference of AV1 and AV2 become at
least T, the watermark strength parameter //

Subtract T / 2 from all LL coefficients of DWT (0, 0);


Add T / 2 in all LL coefficients of DWT (0, 1);
Else If (Sr = 1)
If (AV1 - AV2 < = 0)
v = (AV2 - AV1) / 16;
Subtract v from all coefficients of DWT (0, 1);
Add v in all coefficients of DWT (0, 0);
End;
// Now relative value of AV1 and AV2 reflects the watermark bit. To further increase the
robustness, we adjust the LL coefficients values such that difference of AV1and AV2 become at
least T, the watermark strength parameter //

Subtract T / 2 from all L coefficients of DWT (0, 1);


Add T / 2 in all LL coefficients of DWT (0, 0);
End;
11. Take IDWT to reconstruct Xi;
12. Convert Xi back to its JPEG format;
13. End.

119

Generated using G

LL

LL

Divide image in 8x8 block

2 Consecutive
8x8 blocks will
hide a single
bit 0 or 1

Take average of
these 16 coefficients

Take average of
these 16 coefficients

(AV1)

(AV2)

Adjust AV1 and AV2 (By changing LL coefficients little bit) such that their relative values reflect
the watermark bits 0 or 1.

If AV1 > AV2 => 1 else 0.

Now consider next 2 consecutive blocks to hide next bit and so on


So, 1000 watermark bits will be hidden using 2000 consecutive 8 x 8 DWT blocks. Then IDWT will be taken.
After then, image will be dual watermarked using DCT based watermarking scheme presented in Section 6.2.
Figure 6.10: Watermark embedding approach

6.3.4.4 D,

THE

WATERMARK

DETECTION

ALGORITHM:

Watermark

extraction is the reverse procedure of watermark embedding. To extract the watermark


from the watermarked JPEG image, first we converted it into its equivalent 24 bit colored
images, took 8 x 8 DWT and then calculated the average AV of consecutive blocks
based on policies stored in authors database.
The detection algorithm steps are as follows:

120

1. INPUT (Xi);
// Xi is the attacked copy of a watermarked image //

2. Convert Xi into its equivalent 24 bit colored image;


3. Take 8 x 8 block DWT of Xi for the specific color channel;
// Based on Pi, author knows which color channel was used to hide the watermark data for a
specific image //

4. Repeat step 5 to step 7 for each Pi;


5. Based on each Pi, group the DWT blocks in pairs;
6. For i = 1 to 2 * (L-1) repeat step 7;
// L is the length of W //

7. For each pair (AV1, AV2) of DWT blocks;


If (AV 1 > AV2)
Decode 1;
Else Decode 0;

8. Reconstruct W, the extracted watermark;


9. End.

6.3.5 THE DCT BASED WATERMARKING


After hiding the watermark logo using DWT based watermarking presented above, we
dual watermarked the images using DCT based watermarking presented in Section 6.2.

6.3.6 RESULTS
We applied the proposed dual watermarking scheme on three standard JPEG test images
of Lena, Mandrill and Pepper. In this section, we used a different watermark logo, which
is shown in Figure 6.11.

121

Figure 6.11: The watermark logo

6.3.6.1 THE VALUE OF T: Our proposed DWT based scheme takes a watermark
strength parameter as an input. This T itself tries to balance the Imperceptibility versus
Robustness trade-off. To decide the optimal value of this parameter, we hid the
watermark data in test images at various values of T and then calculated the PSNR values
of the watermarked images. Some of those values (which will lead us to a final value) are
shown in Table 6.5. After this, the watermark data was recovered and the quality of the
watermark data was measured using Correlation Coefficient.
Table 6.5: PSNR of watermarked image and CC of extracted logo for various values of T

Lena
T

PSNR of

(LL
Band)

Mandrill
CC of

color channel recovered logo

PSNR of
color
channel

Pepper
PSNR of

CC of
recovered logo

color
channel

CC of recovered
logo

500

30.23

64.36

31.2844

51.8

31.3257

56.49

600

28.65

71.88

29.7187

60.29

29.7521

63.19

700

27.32

74.7

28.3907

64.5

28.4188

65.76

Table 6.6: Revised Table 6.5

Lena

Mandrill

Pepper

T = 500

T = 600

T = 700

PSNR

75.575

71.625

68.3

CC

64.36

71.88

74.7

PSNR

78.211

74.29675

70.97675

CC

51.8

60.29

64.5

PSNR

78.31425

74.38025

71.047

CC

56.49

63.19

65.76

122

90
80
70
60

T=500

50

T=600

40

T=700

30
20
10
0
PSNR

CC
Lena

PSNR

CC

Mandrill

PSNR

CC
Pepper

Figure 6.12: Graph of the values shown in Table 6.6

Table 6.5 represents the above results. It is obvious that for the higher values of T, the
PSNR values of the watermarked images decrease but at the same time, the CC of the
extracted logos increase. To decide the value of T, we first brought the values of PSNR
data in the range of CC data, by multiplying by 2.5 and then reproduced the Table 6.6.

Figure 6.12 shows the graph of the values shown in Table 6.6. It may be observed that
series for T = 600 is always lying between the series of T = 500 and T = 700. It means
that value T = 600 is the best value, under the Imperceptibility versus robustness trade
off. Similarly for other values of T, if PSNR value is good, CC value is poor and viceversa.

We conducted further tests by using T = 600 for all test images. It may be noted that our
target was to embed the JPEG2000 attack resistant nature using DWT based embedding
without loosing the robustness against those attacks which our DCT based scheme could
sustain. Therefore, first we hid the watermark logo using DWT based scheme, and then
checked its robustness against JPEG2000 attack. As presented in Table 6.6, the quality of
the watermarked image did not decrease considerably. We converted the watermarked

123

JPEG images (without applying DCT based scheme) to JPEG2000 format. Then, we
recovered the watermark logos from these watermarked images (which are converted to
JPEG2000 format). Table 6.7 represents the CC coefficients of extracted logos.
Figure 6.13 shows the extracted logos from JPEG2000 converted watermarked Lena,
mandrill and Peppers test images.

Table 6.7: CC of extracted logos from JPEG2000 attacked images

Test Image

CC

Lena

67.71

Mandrill

55.45

Pepper

58.94

Figure 6.13: Extracted logos from Lena, Mandrill and Peppers test images

It may be observed from Table 6.7 and Figure 6.13 that our proposed DWT based
watermarking scheme is capable of sustaining JPEG2000 format conversion attack.
In order to implement the dual watermarking scheme, we further applied the DCT based
scheme on the watermarked images which were generated by applying DWT based
scheme. Now we had to check the effect on the image perceptibility as well as robustness
against JPEG2000 format conversion attack. Table 6.8 shows the decrement in the PSNR
values after the application of DCT based scheme. Though decrement is natural, it is not
perceptually visible in the PSNR values. It is a compromise with the image quality to
make the watermarked images very robust against more DCT based attacks, which we
will present later in this section.

124

Table 6.8: Decrement in the PSNR values after the application of DCT based scheme

PSNR if only DWT

PSNR if both DWT &

based scheme is applied DCT based scheme are


applied
Lena

25.69

25.23

Mandrill

25.83

24.97

Pepper

24.15

23.76

After applying dual watermarking scheme, we again conducted the JPEG2000 format
conversion attack on the watermarked images. Now we had a choice. We could recover
the watermark logos either by applying DWT based recovery or by applying DCT based
recovery. Table 6.9 shows the CC values of the extracted watermark logos recovered by
both recovery methods which clearly indicate that DCT based recovery gave better
results.
Figure 6.14 shows the extracted logos using DWT based method and Figure 6.15 shows
the extracted logos using DWT based method.
Table 6.9: CC values of the extracted watermark logos recovered by both recovery methods

CC if DWT based

CC if DCT based

recovery is applied

recovery is applied

Lena

64.7

91.56

Mandrill

52.14

44.1

Pepper

57.4

88.35

Figure 6.14: Extracted logos using DWT based method

125

Figure 6.15: Extracted logos using DCT based method

6.3.6.2 PERFORMANCE AGAINST JPEG COMPRESSION: We have seen in the


previous section that our proposed DCT based scheme is very robust against JPEG
compression attack. We need to check the robustness of the dual watermarking scheme
presented in this section against JPEG compression. We compressed all test images after
applying dual watermark at very low JPEG quality factor Q = 20, 10 and 5 and recovered
the watermark logos using DCT based recovery. Our proposed dual watermarking
sustained this attack very strongly even at Q = 5. Table 6.10 shows the CC of the
extracted logos. Figure 6.16 shows the extracted logos.
Table 6.10: CC of extracted logo from highly compressed jpeg image using DCT based recovery

Q = 20

Q = 10

Q=5

Lena

94.39

77.36

76.5

Mandrill

55.95

60.73

57.24

Pepper

92.63

80.35

76.37

Q = 20 Q = 10 Q = 5
Lena
Mandrill
Pepper
Figure 6.16: Extracted logos from highly compressed JPEG images

126

6.3.6.3 PERFORMANCE AGAINST COMMON ATTACKS AND IMAGE


MANIPULATIONS: Since we know that transform domain based schemes are very
robust against those attacks which can reduce the size but not the perceptual quality, we
conducted some attacks on our dual watermarked images, which change the perceptual
quality of an image too. The attacks are as follows:
Attack 1: Adding uniform noise (10%),
Attack 2: Adding Gaussian noise (10 %),
Attack 3: Equalizing histogram,
Attack 4: Applying uniform scaling,
Attack 5: Adjusting brightness (+ 40) and contrast (+ 25),
Attack 6: Horizontal flipping, and
Attack 7: Adjustment of hue and saturation (+ 10 each).
Table 6.11 shows the CC of the extracted watermark logos and Figure 6.17 shows the
extracted watermark logos. It may be observed that the proposed dual watermarking
scheme sustained all the above mentioned attacks.
6.3.6.4 COMPARATIVE STUDY WITH DCT BASED SCHEMES: We compared
the performance of the proposed scheme against JPEG compression with other similar
schemes which are DCT based and well known for their robustness against JPEG
compression. We re-implemented these schemes for JPEG images. Schemes chosen
were:
Scheme-A: Correlation based scheme (Section 2.1.3.1)
Scheme-B: The classical Middle Band Coefficient Exchange scheme (Section 2.2.2.1)
Scheme-C: Collusion attack resistant watermarking scheme (Section 4.4): Scheme
proposed in Section 4.4 is also based on MBCE scheme and ICAR in nature. This scheme
swaps 4 pairs of coefficients in FM region in correlation with low band coefficients. We
are naming this scheme as Scheme-C.
Scheme-D: The scheme presented in Section 6.2.
Scheme E: The proposed dual scheme in this section.

127

Table 6.11: CC of the extracted watermark logos

Attacks

Lena

Mandrill

Pepper

Adding uniform noise (10%)

80.6

52.39

84.83

Adding Gaussian noise (10 %)

56.8

47.42

74.56

Equalizing histogram

91.45

52.42

92.73

Applying uniform scaling

91.56

53.67

93.11

Adjusting brightness (+ 40) and contrast (+ 25)

87.3

53.95

89.12

Horizontal flipping

90.46

51.68

92.12

Adjustment of hue and saturation (+ 10 each)

93.75

56.78

92.87

Figure 6.17: Extracted watermark logos after applying common attacks

128

We watermarked the test images by using all chosen watermarking schemes and then
conducted very low JPEG compression (up to Q = 5, whereas most of the research papers
presented results only up to Q = 20). Then we calculated the CC of the extracted logos. It
may be observed from Table 6.12 and 6.13 that Scheme-E performs better than SchemeA, B and C. As compared to scheme-D, Scheme-E did not lower the performance but at
some point (Lenas image at both Q = 5 and 10, and Peppers image at Q = 5) improves
the CC of the extracted logos.

6.3.6.5

COMPARATIVE STUDY WITH DWT BASED SCHEMES: As compared

to Classical CDMA-DWT based schemes presented in Section 2.2.3.1, our scheme


outperforms in the quality of the watermarked image (refer Table 6.8).
Table 6.12: Comparison of CC of Extracted logos from JPEG compressed (Q = 10) watermarked images

Lena

Mandrill

Pepper

Scheme-A

5.6

6.5

4.5

Scheme-B

4.5

6.7

6.5

Scheme-C

12.23

12.65

11.65

Scheme-D

71.12

74.53

84.28

Scheme-E

77.36

60.73

80.35

Table 6.13: Comparison of CC of Extracted logos from JPEG compressed (Q = 5) watermarked images

Lena

Mandrill

Pepper

Scheme-A

3.98

5.34

3.40

Scheme-B

3.47

5.02

4.98

Scheme-C

10.59

11.21

10.24

Scheme-D

72.32

72.33

75.04

Scheme-E

76.5

57.24

76.37

129

Sub-band filtering based watermarking scheme [36] is very good in preserving the
perceptual quality of the watermark images but when it come to the robustness against
JPEG compression, authors presented results only up to the compression ratio 10 to 15
whereas our proposed watermarking scheme can decode the watermark data up to the
quality factor Q = 5 (refer Table 6.13) i.e. the compression ratio 2 to 3.
It further proves that our proposed scheme has achieved a very good balance in
imperceptibility versus robustness tradeoff while using DWT based watermarking
scheme.

6.4

CONCLUSION

In this chapter, we provided 2 watermarking schemes for watermarking the JPEG images.
The first scheme is DCT based and the other one is a dual watermarking scheme having a
DWT based watermarking as a component. Both schemes are very robust especially
against JPEG compression and other common image manipulation and attacks. Both
schemes also achieve a very good balance in Image-imperceptibility vs. robustness
trade-off and are ICAR in nature.

130

CHAPTER 7
RESULTS & CONCLUSIONS

7.1

SUMMARY

This research was taken up with an objective of developing watermarking algorithms for
images. We felt that it is essential to first ensure that all the developed watermarking
schemes are resistant to at least one attack having the most financial implications to
establish a high demand in the commercial market. Therefore, we chose collusion attack
resistant nature to be embedded in all developed watermarking schemes. Finding the
results reported in literatures, we started to develop the watermarking schemes by
choosing classical Middle Band Coefficients Exchange scheme as a base because this
scheme was very robust against JPEG compression attack. Chapter 4 discusses the
development of watermarking algorithm for Gray scale images and preprocessing of
the images to add robustness against JPEG compression and histogram equalization
attack. Chapter 5 presented a watermarking algorithm for colored BMP images and a
study to find the appropriate color channels to carry the watermark data to improve the
robustness of the watermarking scheme. In both chapters, the watermarking algorithms
are DCT based. After then, we presented a DCT based and a dual (DWT + DCT) based
watermarking schemes in Chapter 6 for JPEG images.

7.2

MAIN CONTRIBUTIONS AND HIGHLIGHTS OF THE


RESULTS

The proposed watermarking schemes have the following characteristics:


1) These are ICAR in nature. This was achieved by introducing randomness and
redundancy in the coefficients exchange criterion in FM region of block DCT and
DWT.

131

2) These are very robust against JPEG compression (even up to JPEG quality factor
Q = 5, compression ratio up to 98 %) and outperform other existing state-of-theart watermarking schemes.
3) These are very robust against common image manipulations and known attacks.
4) We introduced the concept of preprocessing i.e. minimizing the attack impact
before watermarking of the image so that some known attack can not disturb the
watermarked images very heavily and thus perform better recovery of the
watermark data.
5) We established that if we want to increase the robustness against JPEG
compression, the watermark data should be hidden in the GREEN color channel
(not in BLUE color channel, as reported in most of the research papers even if
poor sensitivity of the eye to the BLUE color channel).
6) We have also correlated image characteristic and watermarking scheme
robustness against some attacks. It was found that for multicolored image, if
watermark data is hidden in the color channel having the lowest Standard
Deviation, then the performance against JPEG compression and other common
attacks increases.

7.3

FUTURE WORK
1) Considering the huge financial aspects of the watermarking application areas,
apart from ICAR, more characteristics against some attacks like forgery attack or
multiple watermarking can be embedded.
2) Further studies may be conducted to know the attack impacts on the images and
then watermarking schemes to be developed so that those impacts could be
minimized before the start of watermarking so that a better recovery of the
copyright data could be performed.
3) A watermarking scheme may have some relationship with the image on which it
is going to apply. Performance of the watermarking scheme or selection of the
watermarking scheme or at least few input parameters of the watermarking
scheme must be related to image characteristics.
132

4) More wavelet transforms should be examined for embedding of the watermark


data and robustness against JPEG2000 format conversion.
5) All presented watermarking schemes may be coupled with some special
Geometrical attack resistant watermarking schemes and thus developing
watermarking schemes to ensure maximum converge against malicious attacks.

133

134

REFERENCES
[1] Ahmidi N., Safa R., A Novel DCT-based Approach for Secure Color Image
Watermarking, Proc. Int. Conf. on Information Technology: Coding and
Computing (ITCC04), page 709, IEEE, 2004.
[2] Amon P., Signal-Processing Attacks on Watermarks.
www.lnt. de/~su/seminar/ws98/slides/kempf. pdf.
[3] Arnold M., Schmucker M., Wolthusen S.D., Techniques and application of Digital
Watermarking and Content Protection, Eds. Northwood, Artech House, 2003.
[4] Barni M., Bartolini F., Cappellini V., Piva A., A DCT-domain system for robust
image watermarking, Signal Processing, vol. 6, no. 3 , pp. 357-372, May 1998.
[5] Barni M., Bartolini F., Cappellini V., Lippi A., Piva A., "A DWT-based technique for
spatio-frequency masking of digital signatures", Proc. SPIE/IS&T Int. Conf.
Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, pp.
31-39, Jan. 25-27, 1999.
[6] Bender W., Gruhl D., Morimoto N., "Techniques for data hiding", Proc. SPIE,
Storage and Retrieval for Image and Video Databases III, vol. 2420, San Jose, CA,
pp. 165-173, Feb. 1995.
[7] Bender W., Gruhl D., Morimoto N., Techniques for data hiding, Proc. SPIE, vol.
2420, page 40, Feb. 1995.
[8] Boland F.M., Ruanaidh J.J.K., Dautzenberg C., "Watermarking digital images for
copyright protection", Proc. IEE Int. Conf. on Image Processing and Its
Applications, Edinburgh, U.K., pp. 326-330, July 1995.
[9] Bossen F., Kutter M., Jordan F., Digital signature of color images using amplihlde
modulation, Proc. of SPlE storage and retrieval for image and video databases, San
lose, USA, vol. 3022-5, pp. 518-526, Feb. 1997.
[10] Bounkong S., Toch B., Saad D., Lowe D., ICA for watermarking digital images,
The Journal of Machine Learning Research, vol. 4, Publisher: MIT Press, Dec. 2003.
[11] Caronni, "Assuring ownership rights for digital images", Proc. Reliable IT Systems,
VIS '95, Germany, pp. 251-263, 1995.
[12] Chen T.P.C., Chen T., Progressive image watermarking, Proc. IEEE Int. Conf.
on Multimedia and Expo, pp. 10251028, July 2000.

135

[13] Christian R., Dugelay J.L., A Survey of Watermarking Algorithms for Image
Authentication, EURASIP Journal on Applied Signal Processing, Volume 2002,
Issue 6, pp. 613-621, 2002.
[14] Chu W.C., DCT-based image watermarking using subsampling, IEEE
Transactions on Multimedia, vol. 5, no. 1, pp. 34-38, June 2005.
[15] Collusion-resistant watermarking and fingerprinting, US Patent Issued on June 13,
2006.
http://www.patentstorm.us/patents/7062653.html
[16] Cox I. J., Miller M., Bloom J., Digital Watermarking: Principles and Practice,
Morgan Kaufmann, ISBN-10: 1558607145, Oct. 2001.
[17] Cox I.J., Kilian J., Leighton T., Shamoon T., "A secure, robust watermark for
multimedia, Workshop on Information Hiding, Newton Institute, Univ. of
Cambridge, May 1996.
http://www.adastral.ucl.ac.uk/~icox/#Anchor-Watermarking-14210.
[18] Cox I.J., Kilian J., Leighton T., Shamoon T., "Secure spread spectrum watermarking
for multimedia, NEC Research Institute, Princeton, NJ, Tech. Rep. 95-10, 1995.
[19] Cox I.J., Kilian J., Leighton T., Shamoon T., Secure spread spectrum
watermarking for multimedia, IEEE Transactions on Image Processing, vol. 6, no.
12, pp. 1673-1687, 1997.
[20] Cox I.J., Matt L. et al., Watermarking applications and their properties, Proc. Int.
Conf. on Information Technology, Las Vegas, pp. 6-10, 2000.
[21] Cox I.J., Miller M., "A review of watermarking and the importance of perceptual
modeling", Proc. SPIE Electronic Imaging '97, Storage and Retrieval for Image and
Video Databases V, San Jose, CA, vol. 3016, pp. 92-99, Feb. 1997.
[22] Craver S. et al., Can Invisible Watermarks Resolve Rightful Ownership?, IBM
Research Report, RC205209, July 1996.
[23] Craver S. et al., Resolving Rightful Ownerships with Invisible Watermarking
Techniques: Limitations, Attacks and Implications, IEEE Journal on Selected
Areas in Communications, vol. 16, no. 4, pp. 573-586, May 1998.
[24] Digimark (DMRC). http://www.digimarc.com
[25]

Fotopoulos V., Skodras1 A.N., JPEG2000 PARAMETERS AGAINST


WATERMARKING, 14th Int. Conf. on IEEE Digital Signal Processing, vol. 2, pp.
713- 716, 2002.

136

[26] Fred M., Gordon W., Alan E. B., Opportunities for Watermarking Standards,
Communications of the ACM, vol. 41, no. 7, July 1998.
[27] Fridrich J., "Robust bit extraction from images", Proc. IEEE ICMCS'99 Conference.
vol. 2, pp. 536-540, Florence, Italy, June 7-11, 1999.
[28] Fridrich J., Combing low-frequency and spread spectrum watermarking, SPIE
Symposium on Optical Science Engineering and Instrumentation, San Diego, USA,
pp. 2-12, July 1998.
[29] Friedman G., The trustworthy digital camera, IEEE Transactions on Consumer
Electronics, vol. 39, no. 4, pp. 93-103, Nov 1993.
http://www. cl. cam. ac. uk/~fapp2/steganography/bibliography/043125. html
[30] Ganic E., Eskicioglu A. M., "Robust digital watermarking: Robust DWT-SVD
domain image watermarking: embedding data in all frequencies", Proc. of the 2004
multimedia and security workshop on Multimedia and Security, pp. 166-174, Sep.
2004.
[31] Gu F., Lu Z.M., Pan J.S., Multipurpose image watermarking in DCT domain using
subsampling, IEEE Int. Symposium on Circuits and Systems, vol. 5, pp. 44174420, May 2005.
[32] Gupta A., Saxena V., Srivastava M.C, Gupta J.P., Towards Achieving the Higher
Compression of Images Using Standard JPEG Scheme", [Accepted for publication
in International Journal of Tomography & Statistics, ISSN 0972-9976 , June 2008
issue], Editor and reviewers comments received.
[33] Hanjalic A., Langelaar G.C., Roosmalen P.V., Biemond J., Lagendijk R.L., Image
and Video Databases: Restoration, Watermarking and Retrieval, Advances in
Image Communications, vol. 8, New York, Elsevier Science, 2000.
[34] Hartung F., Girod B., "Digital watermarking of raw and compressed video", Proc.
SPIE 2952: Digital Compression Technologies and Systems for Video
Communication, pp. 205-213, Oct. 1996.
[35] Hernndez J.R., Amado M., Gonzalez F.P., "DCT-Domain watermarking techniques
for still images: Detector performance analysis and a new structure", IEEE
Transactions of Image Processing, vol. 9, pp. 55-68, Jan. 2000.
[36] Hsia S.C., Jou I.C., High robust watermarking technique using sub-band filtering,
Proc. 10th International Multimedia Modeling Conference, pp. 72- 78, Jan 2004.
[37] Hsu C.T., Wu J.L., "Hidden signatures in images", Proc. ICIP-96, IEEE Int. Conf.
on Image Processing, vol. 3, Lausanne, Switzerland, pp. 223-226, Sept. 16-19, 1996.
http://citeseer.ist.psu.edu/mohanty99digital.htm

137

[38] Huang D., Liu J., Huang J., Liu H. A DWT-based Image Watermarking Algorithm,
Proc. IEEE Int. Conf. on Multimedia and Expo, pp. 313-316, Aug. 2001.
[39] Huang X.Y., Tan M.S., Luo Y., Lin D.Z., An image digital watermarking based on
DCT in invariant wavelet domain, IEEE Int. Conf. on Wavelet Analysis and
Pattern Recognition, vol. 1, pp. 458-463, Nov 2007.
[40] Hyvarinen A., Karhunen J, Oja E., Independent Component Analysis, WileyInterscience, 2001.
[41] Hyvarinen A., Oja E., A fast fixed-point algorithm for independent component
analysis, Neural Computation, 9(7), pp. 1483-1492, 1997.
[42] Johnson N., Katezenbeisser S., A Survey of Steganographic Techniques, Eds.
Northwood, MA:Artec House, 43, 1999.
[43] Kaewkamnerd N., Rao K.R., "Multiresolution based image adaptive watermarking
scheme", EUSIPCO, Tampere, Finland, Sept. 2000.
http://www.ee.uta.edu/dip/paperfEUSIPCO water.pdf
[44] Kaewkamnerd N., Rao K.R., "Wavelet based image adaptive watermarking
scheme", IEE Electronics Letters, vol. 36, pp. 312-313, Feb. 2000.
[45] Kalker T., Linnartz J.P., Depovere G., On the reliability of detecting electronic
watermarks in digital images, Proc. EUSIPCO98, vol. 1, pp. 13-16, 1998.
[46] Kim W., Lee S.H., Jang H.W., Kim J., Multi-bits Fingerprinting for Image, SIP
2003, pp 152-155, 2003.
http://www.actapress.com/PaperInfo.aspx?PaperID=15683
[47] Koch E., Zhao J., "Towards robust and hidden image copyright labeling", Proc.
IEEE Workshop on Non-Linear Signal and Image Processing, Neos Marmaras,
Thessaloniki, Greece, pp. 452-455, June 1995.
[48] Koch E., Zhao J., Towards robust and hidden image copyright labeling, IEEE Int.
Workshop on Non- Linear Signal and Image Processing, Neos Marmaras, Greece,
pp. 452-455, June 1995.
[49] Kumari B.P., Rallabandi V.P.S., Modified patchwork-based watermarking scheme
for satellite imagery, Signal Processing, vol. 88, Issue 4, Publisher: Elsevier NorthHolland, Inc, pp. 891-904, April 2008.
[50] Kundur D., Hatzinakos D., "A robust digital image watermarking scheme using
wavelet-based fusion", Proc. ICIP 97, IEEE Int. Conf. on Image Processing, Santa
Barbara, CA, pp. 544-547, Oct. 1997.

138

[51] Kundur D., Hatzinakos D., Towards Robust Logo Watermarking using
Multiresolution Image Fusion", IEEE Transactions on Multimedia, vol. 6, no. 1, pp.
185-198, Feb. 2004.
[52] Langelaar G., Setyawan I., Lagendijk R.L., Watermarking Digital Image and Video
Data, IEEE Signal Processing Magazine, vol. 17, pp. 20-43, Sep. 2000.
[53] Langelaar G.C., Lubbe J.C.A., Lagendijk R.L., "Robust labeling methods for copy
protection of images", Proc. SPIE Electronic Imaging '97, Storage and Retrieval for
Image and Video Databases V, San Jose, CA, pp. 298-309, Feb. 1997.
[54] Langelaar, Setyawan G.C., Lagendijk I., Watermarking digital image and video
data : A state-of-the-art overview, vol. 17, Issue 5., pp. 20-46, Sep. 2000.
[55] Li X., Xue X., Improved robust watermarking in DCT domain for color images,
Proc. IEEE Int. Conf. on Advanced Information Networking and Applications,
IEEE-AINA 2004, vol. 1, pp. 53 58, 2004.
[56] Li. Z., Drew M.S., Fundamentals of Multimedia, Eastern Economy Edition, First
edition, PHI, 2004.
[57] Lu C. S., Huang S.K., Sze C.J., Liao H.Y., "A new watermarking technique for
multimedia protection", Multimedia Image and Video Processing, Eds. Boca Raton,
FL: CRC, pp 507-530, 2001.
[58] Lu C.S., Liao H.Y., Huang M., Sze S.K., Combined Watermarking for Images
Authentication and Protection", Proc. 1st IEEE Int. Conf. on Multimedia and Expo,
vol. 3, no. 30, pp. 1415 1418, Aug. 2000.
[59] Lu Z.M., Xu D.G., Sun S.H., Multipurpose image watermarking algorithm based
on multistage vector quantization, IEEE Transactions on Image Processing, vol.
14, pp. 822-831, 2005.
[60] Macq B.M., Quisquater J.J., Cryptology for digital TV broadcasting, Proceedings
of IEEE, ISSN: 0018-9219, vol. 83, pp. 944-957, June 1995.
[61] Mohanty S.P. et al., A Dual Watermarking Technique for Images, Proc. 7th ACM
Int. Conf. on Multimedia, ACM-MM99, Part 2, Orlando, USA, pp. 49-51, Oct.
1999.
[62] Mohanty S.P., "Digital Watermarking: A Tutorial Review",
http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf
[63] Home Page: Network Technology research Center, Nanyang Technological
University, Singapore. http://www.ntu.edu.sg/ntrc/research.htm

139

[64] Nikolaidis N., Pitas I., Robust image watermarking in the spatial domain, Signal
Processing, vol.66, no. 3, pp. 385-403, May 98.
[65] Pastoriza J.R.T., Gonzle F.P., Zero-knowledge watermark detector robust to
sensitivity attacks, Proc. 8th ACM workshop on Multimedia and Security, pp. 97107, Sept. 2006.
[66] Peng C., Deng R.H., Wu Y., Shao W., A Flexible and scalable authentication
scheme for jpeg2000 image code streams, Proc. 11th ACM Int. Conf. on
Multimedia, pp. 433-441, ACM Press, 2003.
[67] Piper A., Naini R.S., Mertins A., Resolution and quality scalable spread spectrum
image watermarking, Proc. 7th ACM workshop on Multimedia and Security, pp.
79-90, Aug. 2005.
[68] Pitas I., "A method for signature casting on digital images", Proc. IEEE Int. Conf. on
Image Processing, ICIP-96, vol. 3, Lausanne, Switzerland, pp. 215-218, Sept. 15-17,
1996.
[69] Pitas I., A Method for Watermark Casting in Digital Images, IEEE Transactions
on Circuits and Systems on Video Technology, vol. 8, no.6, pp. 775-780, October
1998.
[70] Pitas I., Kaskalis T.H., "Applying signatures on digital images", Proc. IEEE
Workshop on Nonlinear Signal and Image Processing, Neos Marmaras,
Thessaloniki, Greece, pp. 460-463, June 20-22, 1995.
[71] Piva A., Barni M., Bartolini F., Cappellini V., "DCT-based watermark recovering
without resorting to the uncorrupted original image", Proc. IEEE Int. Conf. on
Image Processing, ICIP 97, Santa Barbara, CA, pp. 520-527, Oct. 1997.
[72] Piva A., Barni M., Bartolini F., Cappellini V., Threshold Selection for Correlationbased Watermark Detection, Proc. COST 254 Workshop on Intelligent
Communications, L'Aquila, Italy, pp. 67-72, June 1998.
[73] Podilchuk C. I., Zeng W., Image Adaptive Watermarking Using Visual Models,
IEEE Journal of Selected Areas in Communication, pp. 1998, 525-539, May 1998.
[74] Podilchuk C., Zeng W., "Perceptual watermarking of still images", Proc. IEEE 1st
Workshop on Multimedia Signal Processing, Princeton, NJ, pp. 363-368, June 2325, 1997.
[75] Podilchuk C., Zeng W., Image-Adaptive Watermarking Using Visual Models,
IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525-539,
May 1998.

140

[76] Potdar et al., A survey of digital image watermarking techniques, Proc. 3rd IEEE
Int. Conf. on Industrial Informatics, Frontier Technologies for the Future of Industry
and Business, pp. 709-716, Perth, WA, Aug. 2005.
[77] Prfrock D., Schlauweg M., Mller E., Video Watermarking by Using Geometric
Warping without Visible Artifacts, Proc. 8th Workshop on Information Hiding, pp.
99-104, July 2006.
[78] Raval M.S., Rege P.P., "Discrete Wavelet Transform Based Multiple Watermarking
Scheme", Proc. Int. Conf. on Convergent Technologies for Asia-Pacific Region,
TENCON 2003, vol. 3, pp. 935 - 938, Oct. 2003.
[79] Rhoads G.B., Indentification/authentication coding method and apparatus, World
Intellectual Property Organization, vol. IPO WO 95/14289, 1995.
[80] Robustness: JPEG2000 compression.
http://www.cosy.sbg.ac.at/~pmeerw/Watermarking/attack_jpeg2000.html
[81] Ruanaidh J.J.K.O., Dowling W.J., Boland F.M., "Watermarking digital images for
copyright protection", Proc. IEE Vision, Image, and Signal Processing, vol. 143, no.
4, pp. 250-256, Aug. 1996.
[82] Safranek R., Perceptually based prequantization for image compression, Proc.
SPIE Conf. on Human Vision, Visual Processing and Digital Display V, 1994.
[83] Saxena V. et al., Performance Analysis of Color Channel for DCT Based Image
Watermarking Scheme, International Journal of Security and its Applications.
ISSN: 1738-9976, vol. 1, no. 2, pp. 41-46, Oct 2007.
http://www.sersc.org/journals/IJSIA/vol1_no2_2007.php
[84] Saxena Vikas, Gupta J.P, A Novel Watermarking Scheme for JPEG Images, to
appear in WSEAS Transaction on Signal Processing (June 2009 issue), ISSN: 17905022, Editor and reviewers comments received-Accepted.
[85] Saxena V., Gupta J.P., A Novel Collusion Attack Resistant Watermarking Scheme
for Color Images, IAENG International Journal of Computer Science, vol. 34, no.
2, ISSN: 1819-656X, pp. 171-177, Dec. 2007.
http://www.iaeng.org/IJCS/issues_v34/issue_2/index.html
[86] Saxena V., Gupta J.P., Collusion Attack Resistant Watermarking Scheme for
Images Using DCT, Published in the Proc. 15th IEEE Int. Conf. on Signal
Processing and Communication Applications, Turkey, June 2007.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4298551&arnumber=4298813
&count=322&index=261

141

[87] Saxena V., Gupta J.P., DWT-DCT based dual watermarking scheme for JPEG
images, Communicated to ACM-SIGGRAPH.
[88] Saxena V., Gupta J.P., Towards Increasing the Robustness of Image
Watermarking Scheme Against JPEG Compression, Proc. IAENG Int. Conf. on
Imaging Engineering, Hong Kong, vol. 2, ISBN: 978-988-98671-7-1, publisher:
Newswood Ltd, pp. 1903-1906, Mar., 2007.
[89] Saxena V., Gupta J.P., Towards Increasing the Robustness of Image Watermarking
Scheme Against Histogram Equalization Attack, Published in the Proc. 15th IEEE
Int. Conf. on Signal Processing and Communication Applications, Turkey, June
2007.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4298551&arnumber=4298829
&count=322&index=277
[90] Schlauweg M., Prfrock D., Zeibich B., Mller E., Dual watermarking for
protection of rightful ownership and secure image authentication, Proc. 4th ACM
Int. workshop on Contents protection and security, MCPS '06, Publisher: ACM , pp.
59-66, Oct. 2006.
[91] Schyndel R.G.V., Tirkel A.Z., Osborne C.F., "A digital watermark", Proc. IEEE Int.
Conf. on Image Processing, Austin, TX, vol. 2, pp. 86-90, Nov. 1994.
[92] Sellars, Duncan, Introduction to Stegnography.
http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html
[93] Shoemaker C., Hidden bits: A survey of techniques for digital watermarking
http://www.vu.union.edu/~shoemakc/ watermarking/watermarking.html
[95] Smith J.R., Comiskey B.O., "Modulation and information hiding in images", Proc.
Information Hiding, University of Cambridge, U.K., pp. 204-213, Nov. 1994.
[96] Steinder S.I.M., Amer., Progressively authenticated transmission, Proc. ACMMILCOM, pp. 641645, Nov. 1999.
[97] StirMark - Watermarking robustness testing.
http://www.petitcolas.net/fabien/watermarking/stirmark/
[98] Su P.C., Wang H.J.M., Kuo C.C.J., An Integrated Approach to Image
Watermarking and JPEG-2000 Compression, Journal of Signal Processing,vol.1,
no. 27, pp. 35-53, 2001.
[99] Tao B., Dickinson B., "Adaptive watermarking in the DCT domain", IEEE Int. Conf.
on Acoustics, Speech and Signal Processing, pp. 20-46, Apr.1997.

142

[100] Tao P., Eskicioglu A.M., A Robust Multiple Watermarking Scheme in the Discrete
Wavelet Transform Domain, Symposium on Internet Multimedia Management
Systems V, Philadelphia, PA, pp. 134-144, 2004.
[101] Tripathi S., Jain R.C., Gayatri V., Novel DCT and DWT based Watermarking
Techniques for Digital Images Pattern Recognition, 18th IEEE Int. Conf. on Pattern
Recognition, vol. 4, pp. 358-361, 2006.
[102] Tsai C.S., Chang C.C., Chen T.S., Chen M.H., Distributed multimedia databases:
Techniques and Applications, Technical Report of National Chung Chang
University, and National Taichung Institute of Technology, Taiwan, pp. 120-122,
2001.
[103] Voigt M., Yang B., Busch C., Reversible watermarking of 2D-vector data, Proc.
ACM Workshop on Multimedia and Security, pp. 160-165, Sep. 2004.
[104] Voyatzis G. and Pitas I., Digital Image Watermarking using Mixing Systems,
Computer & Graphics, Elsevier, vol. 22, no. 4, pp. 405-416, 1998.
[105] Voyatzis G., Nikolaidis N., Pitas I., Digital watermarking: an overview, Proc. 9th
European Signal Processing Conf. on Theories and Applications: Eusipco-98,
Rhodes, Greece, pp. 9 -12, Sep. 1998.
[106] Voyatzis G., Pitas I., "Digital Image Watermarking using Mixing Systems",
Computer Graphics, Elsevier, vol. 22, no. 4, pp. 405-416, August 1998.
[107] Wang J., et al., Image Watermarking Scheme Based on 3-D DCT, Proc. 1st IEEE
Conf. on Industrial Electronics and Applications, 2006, pp. 1- 6, May 2006.
[108] Watson A.B., DCT Quantization Matrices Visually Optimized for Individual
Images, Proc. Human Vision, Visual Processing, and Digital Display IV,
Bellingham, WA, SPIE, pp. 202-216, Feb. 1992.
[109] Watson B., DCT quantization matrices optimized for individual images, Human
Vision, Visual Processing, and Digital Display IV, SPIE-1913, pp. 202-216, 1993.
[110] Weng S.W., Zhao Y., Pan J.S., Reversible watermarking based on improved
patchwork algorithm and symmetric modulo operation, Lecture Notes in Computer
Science on Knowledge-based Intelligent Information and Engineering Systems,
Springer, Berlin/Heidelberg, vol. 3684, 2002.
[111] What is digital signature?
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211953,00.html
[112] Wikipedia-JPEG. http://www.jpeg.org

143

[113] Wikipedia-JPEG2000. http://www.en.wikipedia.org/wiki/JPEG2000


[114] Wolfgang R.B., Delp E.J., "A watermarking technique for digital imagery: Further
studies", Proc. Int. Conf. on. Imaging Science, Systems and Technology, Las Vegas,
NV, vol. 3, pp. 112-118, June 1997.
[115] Wolfgang R.B., Delp E.J., "Fragile watermarking using the VW2D watermark",
Proc. Electronic Imaging '99, San Jose, CA, vol. 3657, pp. 204-213, Jan. 25-27,
1999.
[116] Wolfgang R.B., Delp E.J., "Overview of image security techniques with
applications in multimedia systems", Proc. SPIE Conf. on Multimedia Networks:
Security, Displays, Terminals, and Gateways, Dallas, TX, vol. 3228, pp. 297-308,
Nov. 2-5, 1997.
[117] Wolfgang R.B., Delp E.J., "A watermark for digital images", Proc. IEEE Int. Conf.
on Image Processing, Lausanne, Switzerland, vol. 3, pp. 219-222, Sep. 1996.
[118] Wolfgang R.B., Podilchuk C.I., Delp E.J., "Perceptual watermarks for digital
images and video", Proc. IEEE, vol. 87, pp. 1108-1126, July 1999.
[119] Xia X.G., Boncelet C.G., Arce G.R., "A multiresolution watermark For digital
images", Proc. IEEE Int. Conf. on Image Processing, Santa Barbara, CA, pp. 548551, Oct. 1997.
[120] Xia X.G., Boncelet C.G., Arce G.R., Wavelet transform based watermark for
digital images, Optics Express, no. 3, pp. 497511, Dec. 1998.
[121] Xiao W., Ji Z., Zhang J., Wu W., "A watermarking algorithm based on chaotic
encryption", Proc. IEEE Region 10 Conf. on Computers, Communications, Control
and Power Engineering TENCON, vol. 1, pp. 545-548, Oct. 2002.
[122] Xing W., Lu Z.M., Multipurpose image watermarking based on vector
quantization in DCT domain, Proc. 5th International Symposium on Test and
Measurement (ISTM2003), Shenzhen, China, pp. 2057-2061, 2003.
[123] Yang B. et al., Reversible image watermarking by histogram modification for
integer DCT coefficients, Proc. IEEE 6th workshop on Multimedia Signal
Processing, pp. 143-146, Oct. 2004.
[124] Yeo K., Kim H.J., Generalized patchwork algorithm for image watermarking,
Multimedia Systems, Springer, Berlin-Heidelberg, vol. 9, pp. 261-265, 2003.
[125] Zhao Y., Campisi P., Kundur D., "Dual Domain Watermarking for Authentication
and Compression of Cultural Heritage Images", IEEE Transactions on Image
Processing, vol. 13, no. 3, pp. 430-448, Mar. 2004.

144

[126] Zhu X., Gao Y., Zhu Y., Image-adaptive watermarking based on perceptually
shaping watermark blockwise, Proc. ACM Symposium on Information, computer
and communications Security, ASIACCS '06, pp. 175-181, Mar. 2006.
[127] Funda Ergun et.al., "A Note on the Limits of Collusion-Resistant Watermarks ",
Lecture Notes in Computer Science, Springer, vol. 1592/1999, pp. 140-149, Jan
1999.
[128] Lemma, Aweke N., van der Veen, Michiel, "Deterring watermark collusion attacks
using signal processing techniques", Security, Steganography, and Watermarking of
Multimedia Contents IX, Proceedings of the SPIE, vol. 6505, pp. 65050M, 2007.
[129] F.T. Leighton, Watermarking process resilient to collusion attacks, United States
Patent 5664018. http://www.freepatentsonline.com/5664018.html
[130] M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu, Collusion Resistant Fingerprinting
for Multimedia, IEEE Signal Processing Magazine, Special Issue on Digital Rights
Management, pp.15-27, 2004.
[131] W. Trappe, M. Wu, Z. Jane Wang and K. J. Ray Liu, Anti-collusion fingerprinting
for Multimedia, IEEE Trans. on Signal Processing, vol. 51, pp. 1069-1087, 2003.

145

146

LIST OF AUTHORS PUBLICATIONS


[1] Saxena Vikas, Gupta J.P, A Novel Watermarking Scheme for JPEG Images, to
appear in WSEAS Transaction on Signal Processing (June 2009 issue), ISSN: 17905022, Editor and reviewers comments received-Accepted.
[2] Saxena V. et al., Performance Analysis of Color Channel for DCT Based Image
Watermarking Scheme, International Journal of Security and its Applications.
ISSN: 1738-9976, vol. 1, no. 2, pp. 41-46, Oct 2007.
http://www.sersc.org/journals/IJSIA/vol1_no2_2007.php
[3] Saxena V., Gupta J.P., A Novel Collusion Attack Resistant Watermarking Scheme
for Color Images, IAENG International Journal of Computer Science, vol. 34, no.
2, ISSN: 1819-656X, pp. 171-177, Dec. 2007.
http://www.iaeng.org/IJCS/issues_v34/issue_2/index.html
[4] Gupta A., Saxena V., Srivastava M.C, Gupta J.P., Towards Achieving the Higher
Compression of Images Using Standard JPEG Scheme", [Accepted for publication
in International Journal of Tomography & Statistics, ISSN 0972-9976 , June 2008
issue], Editor and reviewers comments received.
[5] Saxena V., Gupta J.P., Collusion Attack Resistant Watermarking Scheme for Images
Using DCT, Published in the Proc. 15th IEEE Int. Conf. on Signal Processing and
Communication Applications, Turkey, pp.1-4, June 2007.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4298551&arnumber=4298813
&count=322&index=261
[6] Saxena V., Gupta J.P., Towards Increasing the Robustness of Image Watermarking
Scheme Against JPEG Compression, Proc. IAENG Int. Conf. on Imaging
Engineering, Hong Kong, vol. 2, ISBN: 978-988-98671-7-1, publisher: Newswood
Ltd, pp. 1903-1906, Mar., 2007.
[7] Saxena V., Gupta J.P., Towards Increasing the Robustness of Image Watermarking
Scheme Against Histogram Equalization Attack, Published in the Proc. 15th IEEE
Int. Conf. on Signal Processing and Communication Applications, Turkey, pp. 1-4
June 2007.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4298551&arnumber=4298829
&count=322&index=277

147

148

SYNOPSIS
One of the biggest technological events of the last two decades was the invasion of digital
media in an entire range of everyday life aspects. Digital data can be stored efficiently and
with a very high quality, and it can be manipulated very easily using computers.
Furthermore, digital data can be transmitted in a fast and inexpensive way through data
communication networks without losing quality.
advantages over analog media.

Digital media offer several distinct

The quality of digital audio, images and video signals are

better than that of their analog counterparts. Editing is easy because one can access the exact
discrete locations that need to be changed. Copying is simple with no loss of fidelity and a
copy of a digital media is identical to the original. With digital multimedia distribution over
World Wide Web, Intellectual Property Right (IPR) are more threatened than ever due to the
possibility of unlimited copying .

One solution would be to restrict access to the data using

some encryption technique. However encryption does not provide overall protection. Once
the encrypted data are decrypted, they can be freely distributed or manipulated. The above
problem can be solved by hiding some ownership data into the multimedia data, which can be
extracted later to prove the ownership. This idea is implemented in bank currency notes. In
bank currency notes, a watermark is embedded which is used to check the originality of the
note.

The same watermarking concept may be used in multimedia digital contents for

checking the authenticity of the original content.

So, A Watermarking is adding an

ownership information in multimedia contents to prove the authenticity.

This

technology embeds a data, an unperceivable digital code, namely the watermark, carrying
information about the copyright status of the work to be protected.

Continuous efforts are

being made to device an efficient watermarking schema but techniques proposed so far do
not seem to be robust to all possible attacks and multimedia data processing operations.
Considering the enormous financial implications of copyright protection, there is a need to
establish a globally accepted watermarking technique. The sudden increase in watermarking
interest is most likely due to the increase in concern over IPR. Today, digital data security
covers such topics as access control, authentication, and copyright protection for still images,
audio, video, and multimedia products.

A pirate tries either to remove a watermark to

Synopsis-1

violate a copyright or to cast the same watermark, after altering the data, to forge the proof of
authenticity.

Generally, the watermarking of still image, video, and audio demonstrate

certain common fundamental concepts. Numerous watermarking applications reported in the


literature depend on the services we wish to support. Thus watermarking techniques may be
relevant in various application areas including Copyright protection, Copy protection,
Temper detection, Fingerprinting etc .
Based on their embedding domain, watermarking schemes can be classified either as Spatial
Domain (The watermarking system directly alters the main data elements, like pixels in an
image, to hide the watermark data) or Transformed Domain (the watermarking system alters
the frequency transforms of data elements to hide the watermark data). The latter has proved
to be more robust than the spatial domain watermarking.
To transfer an image to its frequency representation, one can use several reversible
transforms like Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), or
Discrete Fourier Transform (DFT). Each of these transforms has its own characteristics and
represents the image in different ways. Watermarks can be embedded within images by
modifying these values, i.e. the transform domain coefficients. In case of spatial domain,
simple watermarks could be embedded in the images by modifying the pixel values or the
least significant bit (LSB) values. However, more robust watermarks could be embedded in
the transform domain of images by modifying the transform domain coefficients. In 1997
Cox et.al presented a paper Secure Spread Spectrum Watermarking for Multimedia , one of
the most cited paper (cited 2985 times till April 2008 as per Google Scholar search), and
after that most of the research efforts are based on this work. Even though spatial domain
based techniques can not sustain most of the common attacks like compression, high pass or
low pass filtering etc., researchers present spatial domain based techniques too.
Since, financial implications of some of the application areas like fingerprinting and
copyright protection are very high and till now no successful algorithm seem to be available
to prevent illegal copying of the multimedia contents, the primary goal of this thesis work is
chosen to develop watermarking schemes for images (which are stored in spatial domain as
Synopsis-2

well as transformed domain) which can sustain the known attacks and various image
manipulation operations. This thesis resolves the following issues:
ISSUE 1: Till now there in no Generic nature in the watermarking algorithms available.
More precisely, if certain approach is applicable for a gray level image, the same approach
does not work for the other formats of an image.
ISSUE 2: Even if gray color image watermarking algorithms are extended for RGB color
images, the maximum work has been done for BLUE color channel only because human eyes
are less sensitive to detect the changes in BLUE color channel. No attack impact analysis,
i.e, which color channel may be affected by a particular attack, has been carried out.
Therefore, apart from choosing digital Image Watermarking as a major problem, we have
chosen to identify the suitability of a color channel with respect to attack (if any) for multicolor channel images (True color windows BMP, uncompressed JPEG). We also decided to
explore the ways such that attack impacts may be minimized before the watermark
embedding process.
ISSUE 3: In most of the research papers, once the watermarking scheme is finalized, it is
applied to all test images. Since each image is different and has certain characteristics and
after embedding the watermark data by a particular watermarking scheme, its performance
against a particular attack may not be similar with other image. No study is conducted to
make the embedding scheme based on some image characteristics.
Therefore we have decided to explore the relationship between the performance of
watermarking scheme and the cover image characteristics itself.
ISSUE 4: Mostly watermarking schemes are developed in a way that first a scheme is
developed based on the extension of earlier presented one and then check its performance
against the common image manipulations and known attacks. There are huge financial
implications of watermarking schemes (say fingerprinting), but no scheme has been
Synopsis-3

developed, which is, by design, resistant to at least one attack, to ensure that, a particular
attack (having most financial issues) cannot be conducted by an attacker.
Therefore we decided to design watermarking schemes such that an inherent nature in can be
embedded to guarantee that at least one serious attack having most financial implications
cannot be conducted on watermarked images.
If owner identification applications place the same watermark in all copies of the same
content, then it may create a problem. If out of n number of legal buyer of content, one starts
to sell the contents illegally, it may be very difficult to know who is redistributing the
contents without permission. Allowing each copy distributed to be customized for each legal
recipient can solve this problem. This capability allows a unique watermark to be embedded
in each individual copy.

Now if owner finds an illegal copy, he/she can find out who is

selling his contents by finding the watermark, which uniquely belongs to a singly legal buyer.
This particular application area is known as fingerprinting and thus has numerous financial
implications. The most serious attack for fingerprinting is the collusion attack. If attacker
has access to more than one copy of watermarked image, he/she can predict/ remove the
watermark data by colluding them. Researchers working on fingerprinting primarily focus
on the collusion attack.
So, while designing a watermark scheme, we decided that our proposed schemes must be
designed in such a way that schemes are inherently collusion attack resistant. Therefore this
thesis presents a new term ICAR (Inherently Collusion Attack Resistant) as a requirement
for a watermarking system. The other 3 issues are taken into account while developing the
watermarking schemes.
The first chapter is devoted to the introduction of the watermarking area. Data hiding
background is represented and the related terminologies are explained.

Then various

application areas of watermarking are represented and what may the key requirements of a
successful watermarking system are discussed. Since watermarking can be classified on

Synopsis-4

various parameters, the various types of watermarking are represented based on different
classifications. The chapter-wise organization of the thesis is described.
The purpose of chapter-2 is to provide an overview of the existing watermarking techniques
and related emerging issues and then problem statement formulation based on the current
demand of the technology. In this chapter, apart from giving more emphasis only to those
papers, which are related to this thesis work, care has been taken to cover more and more
upcoming concepts. After then the shortcomings and the opportunities for the research work
are identified and based on those the research issues are developed by giving proper
justifications.
Chapter 3 describes the concepts like JPEG compression, which are the preliminaries
requirements. We are using Peak Signal to Noise ratio (PSNR) and Correlation coefficient
(CC) to measure the quality of the watermarked images and the extracted watermark logo,
which are also described in this chapter. Finally the test images (both stored in spatial and
transformed domain, gray and full colored) used in this thesis are given.
Our research work description starts from chapter 4. This chapter deals the watermarking of
the gray images. To start with, initially we focus how we can increase the robustness of the
well-known DCT and DWT based watermarking algorithms against some specific attacks.
We present a new concept of preprocessing to increase the PSNR value of extracted logo
from watermarked image if watermarked image has been attacked by JPEG compression
attack. Preprocessing steps change or modify the original image such that, the affect after the
attack on the watermarked image could be minimized. We tried to accomplish this by
creating the same effect in an image, before watermarking it, which this image shall have,
after it has been attacked. It is found that preprocessing steps increase the robustness of the
watermarking scheme. Since DCT based schemes are robust against those attacks, which do
not alter the perceptual quality of the image, we tested the proposed concept in the case of
such attack, which has serious impact on the perceptual quality of the image. Therefore, we
have extended the same hypothesis to increase the robustness against Histogram
equalization attack, which attacks on perceptual quality of the image. Our results favor the
Synopsis-5

proposed hypothesis and show the importance of the attack impact analysis to increase the
performance of the watermarking algorithms. After this, a watermarking scheme for gray
level images is developed which is ICAR in nature as well as very robust against common
image manipulation and attack (specially JPEG compression attack). The proposed scheme
is developed over the classical middle-band coefficient exchange scheme to inherit its
robustness against JPEG compression because this scheme takes the advantage of Human
Visual System (HVS).

We achieve ICAR nature using randomness and redundancy in

coefficient exchange criterion. Apart from this, coefficient exchange criterion is develop to
be dependent on low frequency coefficients to provide extra robustness because we know that
any kind of attack or image manipulation can not alter the low frequency coefficients as this
will have a serious impact on the image quality. Results indicate that, this scheme is, not
only collusion attack resistant and resistant to common image manipulations and attacks, but
more robust against JPEG compression attack as compared to other similar, state-of-art,
watermarking schemes.
Chapter-5 deals with the watermarking of colored images. Colored images contain three
color channel (red, green and blue), and human eyes are least sensitive to detect the changes
in blue color channel and therefore most of the research work is based on hiding the
watermark data in blue color channel. We propose that the suitability of the color channel is
also dependent on the attack, the watermarked images have to undergo. For this we use 4 test
images in Windows 24-bit image format and analyze the robustness against JPEG
compression attack by hiding the watermark data in all color channels. Results indicate that
there is a strong connection between the color channel selection and the robustness against
certain attack.

It is found that for DCT based watermarking scheme, if we hide the

watermark data in green channel, the robustness against the JPEG compression increases.
The idea of preprocessing (proposed in previous chapter for gray level images) is also
verified for color images. We then developed an ICAR watermarking scheme for colored
images also, based on the scheme developed in chapter-4. We discovered that even after
some serious attacks, one cannot change the average of all middle band coefficients of 8x8
DCT. We used this fact in hiding the watermark data. Again, being an ICAR scheme, this
scheme is collusion attack resistant as well as very robust to common image manipulation.
Synopsis-6

We have tested test images against uniform scaling, brightness adjustment, Gaussion
blurring, Hue and saturation along with malicious attack like histogram equalization and
adding Gaussion noise. The proposed watermarking scheme sustains all attacks. In case of
performance against JPEG compression, proposed scheme outperforms other similar
watermarking schemes by giving very good results even at JPEG quality factor Q=5
(Compression ratio 98% and more), whereas other state-of-art watermarking schemes start
loosing its robustness below the JPEG quality factor Q=20.
Chapter-6 describes the watermarking of JPEG image. Since, most of the images present on
World Wide Web are in JPEG format, which is a highly compressed image format and stores
the images in the transformed domain, we developed an ICAR watermarking scheme for
JPEG images also.
Since JPEG is a very high compressed format, we know that while processing and storing a
JPEG image, lot of its coefficients will change their values and thus recovery of the
watermark data is difficult if only the relative strengths of coefficients of middle band regions
are considered. Therefore, we provide extra robustness (by involving some coefficients
whose values dont changes much) by incorporating the large value at the top-left corner, the
DC coefficient in 8x8 block DCT. This DC coefficient is the major dominating value while
decompressing. This DC value alone can regenerate a very good approximated image by
taking the IDCT. If this value is altered, the image is largely affected. We hide the
watermark data based on DC coefficient. Proposed scheme is not only an ICAR scheme, but
also enhances the performance. Results indicated that, the proposed scheme recovers the
watermark even from highly attacked images which are compressed up to quality factor Q=5
of JPEG. In addition to this, the proposed scheme is resisting common image manipulations
like cropping, scaling, flipping, histogram equalization, brightness- contrast adjustment, Huesaturation alteration and Gaussion noise. In this chapter, we also explore a relationship
between the robustness and some image characteristics.

We experiment the standard

deviation of an image and related this measure with the performance of the watermarking
scheme.

Synopsis-7

After successfully developing the ICAR watermarking schemes for gray, colored BMP image
and JPEG images using DCT, we explored the DWT. The basic need behind this is the
upcoming JPEG2000 format. This image format stores the image using wavelet transform.
Any of the image watermarked using our proposed algorithm may have to undergo
JPEG2000 format conversion also, therefore to make the watermark embedding liner to the
possible attack, we decided to use the DWT as embedding domain.

A DWT based

watermarking scheme may not sustain those attacks which a DCT based scheme can sustain
very well (like JPEG compression), therefore we used the idea of Dual Watermarking, ie
embedding the watermark using both DWT and DCT to increase to number of possible
attacks which our watermarking scheme could sustain.

Like our earlier proposed

watermarking schemes, apart from ICAR in nature, the proposed DWT based watermarking
scheme is very robust against .jp2 conversion attack (JPEG2000 format), JPEG compression,
and other common image manipulations and attacks.
In Chapter-7, summary of the results and goal achieved, are given in detail. Future work of
research work is also discussed. In the end, a list of all publications referred is given.
Keywords: Intellectual Property Right, Digital Image Watermarking, Collusion attack,
Discrete Cosine Transform, Discrete Wavelet Transform, Haar wavelet, JPEG image
encoding, Peak Signal to Noise Ratio, Correlation coefficient, JPEG2000 image
encoding.

Synopsis-8

You might also like