Professional Documents
Culture Documents
A Dual Voltage-Frequency VLSI Chip For Image Watermarking in DCT Domain
A Dual Voltage-Frequency VLSI Chip For Image Watermarking in DCT Domain
Y, MONTH 2006 1
Abstract— In this paper, we present a new VLSI architecture and parallelism for high performance using minimal power.
that can insert invisible or visible watermarks in images in the The supply voltage levels and frequency ranges are matched
DCT domain. Several low power design techniques such as dual to contain the power consumption of the chip. The architecture
voltages, dual frequency and clock gating have been incorporated
in the architecture to reduce the power consumption. The supply uses a decentralized controller mechanism in which each
voltage levels and the operating frequencies are chosen such that module has its own controller to facilitate implementations
there is a throughput and bandwidth match between low and of above low power and high performance features.
high operating frequency modules. The proposed architecture
exploits pipelining and parallelism extensively in order to achieve
high performance. A prototype VLSI chip has been designed II. DCT D OMAIN WATERMARKING A LGORITHM
and verified using various Cadence and Synopsys tools based on
TSMC 0.25µ technology with 1.4M transistors and 0.3mW of The invisible watermarking algorithm proposed in [6] and
average dynamic power. the visible watermarking algorithm proposed in [7], [8] are
used in the VLSI chip implementation. The various notations
Index Terms— discrete cosine transformation, visible and in-
visible watermarking, dual voltages, dual frequency, low power used in the description of the algorithms are given in Table I.
design, spread spectrum communication, still digital camera.
TABLE I
C. Modifications to Algorithms for Hardware Implementation
N OTATIONS USED IN THE D ESCRIPTION OF THE A LGORITHM
The two watermarking algorithms discussed above are
modified with the goals of (i) efficient implementation, (ii)
I : Original (or host) image (a grayscale image)
W : Watermark image (a grayscale image) better performance, and (iii) reduced chip area without com-
IW : Watermarked image promising on the overall quality obtainable from the original
CI : DCT transformed original image algorithms.
CW : DCT transformed watermark image
CIW : DCT transformed watermarked image As per the original invisible algorithm, the 1000 largest AC-
(m, n) : A pixel location DCT coefficients need to be selected from a total of NI × NI
NI × NI : Original image dimension elements, which could degrade the performance of the chip.
NW × NW : Watermark image dimension
NB × NB : Dimension of a block ¡ ¢
So, we consider three largest AC-DCT ³coefficients ´ of a NB ×
NI ×NI
N OIB : Number of original image blocks NNI ×N I NB block and the process is repeated NB ×NB times as,
¡B ×N B ¢
N OW B : Number of watermark image blocks NNW ×N W
B ×NB
ik : th
k block of the original image I cIW k (m, n) = cI k (m, n) + α ∗ wk (m, n) , (8)
wk : kth block of the watermark image W
where, (m, n) corresponds to the three largest AC-DCT values
cI k : kth block of the transformed original image CI
cW k : kth block of the transformed watermark image CW (three neighboring lowest frequency) for k th block. The water-
cIW k : kth block of transformed watermarked image CIW mark block wk is constructed from the random numbers. This
αk : Scaling factor for kth block (for host image scaling) block-by-block processing will be very suitable for pipeline
βk : Embedding factor for kth block (for watermark scaling) processing, for example, when a stage of pipeline handle one
cI k (0, 0) : DC-DCT coefficient of the kth block DCT block cI k
cI max (0, 0) : Maximum of DC-DCT coefficients block, its previous stage of the pipeline can handle a new
cI white (0, 0) : DC-DCT coefficient of a block with all white pixels block, thus greatly improving overall throughput.
µDC Ik : Mean gray value of original image block The edge detection task performed using the Sobel operator
µDC I : Mean gray value of the original image I
µDC Imax : Maximum of mean gray value of any ik
in the visible watermarking algorithm, is replaced by a DCT
µDC Iwhite : Mean gray value of a image block with all white pixels domain technique for better efficiency in terms of hardware
µ∗ DC Ik : Normalized µDC Ik design. The first step in edge detection involves the summation
µ∗ DC I : Normalized µDC I of the absolute values of all the AC-DCT coefficients in each
µAC Ik : Mean of the AC-DCT coefficients of a ik
σAC Ik : Variance of AC-DCT coefficients of a ik
block.
¯ ¯ P P
σAC Imax Maximum variance of AC-DCT coefficients of any ik ¯µAC I ¯ = 1
n |cI k (m, n)|
: (9)
σ ∗ AC Ik : Normalized σAC Ik k NB ×NB m
¯ ¯
αmax , αmin The maximum and minimum value of αk ¯ ¯ =
¯¢ of the above values is µAC Imax
: The ¡¯maximum
βmax , βmin : The maximum and minimum value of βk ¯ ¯
α : A scaling factor used for invisible watermark insertion ¯M ax ¯µAC Ik¯ . A block ¯ is declared as an edge block if
Iwhite : Gray value corresponding to pure white pixel ¯µAC I ¯ > τ ¯µAC I ¯; τ is a threshold constant.
k max
In Eqn. 2, the normalization is performed using the
cI max (0, 0), the maximum ³ of cI k (0,
´ 0). The determination of
cI max (0, 0) out of the NNBI ×N×NI
values of cI k s can slow
(iv) The mean and the variance of the AC-DCT coefficients B
for each block are calculated using the following equations. down the insertion process. So, to improve the performance
P P of the VLSI chip, we use cI white (0, 0) for normalization :
1
µAC Ik = NB ×N cI k (m, n) µDC I cI k (0,0)
1
B
P m
Pn © ª2 (4) µ∗ DC Ik = µDC I
k
= cI white (0,0) . (10)
σAC Ik = NB ×NB m n cI k (m, n) − µAC Ik white
αk = σ ∗ AC Ik £exp −(µ©∗ DC Ik − µ∗ DC I )2 ª¤ . (6) It is evident from the above equation that the factor σAC Imax
1 ∗ ∗ 2
βk = σ∗ AC I
1 − exp −(µ DC I k
− µ DC I ) basically serves as a constant scaling factor. So, we remove
k
the constant factor and redefine the equations as follows.
The edge blocks are determined and the αk and βk values for © ª
αkc = σAC Ik exp
£ −(µ©∗ DC Ik − µ∗ DC I )2 ª¤
edge blocks are taken to be αmax and βmin , respectively. (12)
βkc = σAC1 I 1 − exp −(µ∗ DC Ik − µ∗ DC I )2
(vi) The DCT coefficients CW for all the blocks of the k
watermark image are calculated. where, the αkc and βkc values are current values of αk and
(vii) The visible watermark is inserted in the host images βk , respectively. Then, the αkc and βkc values are scaled to
block-by-block and watermarked image block is obtained. the range (αmin , αmax ) and (βmin , βmax ), respectively. The
above equations contain exponentials, which can be approxi-
cIW k (m, n) = αk ∗ cI k (m, n) + βk ∗ cW k (m, n) (7) mated using Taylor series.
MOHANTY, RANGANATHAN, AND BALAKRISHNAN: A DUAL VOLTAGE-FREQUENCY VLSI CHIP FOR IMAGE WATERMARKING IN DCT DOMAIN 3
III. P ROPOSED VLSI A RCHITECTURE block. This sub-module operates on a single DCT 4 × 4 image
The architecture for the proposed chip is shown in Fig. 1. block at a time. The summation values are passed on to the
second sub-module called Max-Finder which determines their
Original Image Watermark Image
maximum. The result of this sub-module is then passed onto
Invisible Watermarking
DCT Module
Visible Watermarking
DCT Module
the third sub-module called the detector.
Accumulator Max−Finder Detector
τ
Edge Detection Perceptual Analyzer
Module Module AC−DCT Max ( µACI k )
Adder Comparator Multiplier
Random Number Coefficients
Generation Module
α min
Scaling
and α max Flips− flops Flip−flops Comparator
Embedding
β
Factor min
Module βmax Edge or
Latch Latch Latch
enable µ enable enable Nonedge block
ACI k
Both the DCTX and DCTY modules have similar architecture DC−Mean
DC−DCT Right
[9], [10] and operate on a 4 × 4 block, but differ in their input Coefficients
Adder Flip−Flops Latch
shift by 8
µ DC
I
of five modules as shown in Fig. 1. Divider Latch Adder Latch Adder Subtractor Latch Adder Latch Divider
1) DCT Module: The architecture of the DCT module is the Constant Constant
same as the one discussed in the previous subsection. There Max−Finder Max −Finder
sel sel
are two DCT modules for computing simultaneously the DCT
Shifter MUX Latch Adder Divider Adder Latch MUX Shifter
of the original image and the watermark image. Divider
2) The Edge Detection Module: The edge detection module Constant Constant Constant Constant
vdd1 vdd2
Edge Detection Module
Image Watermarked
DCT Perceptual Analyzer Module Watermark DCT domain
X
α Image
Scaling and Embedding Factor Module
I/V Image Watermarking busy
DCT Visible Watermark Insertion
Y enable
Invisible Watermark Insertion reset Chip
Slower Clock clk1 done
clk2
Normal Clock
efficients, to take into account the positive as well as negative schemes found to be approximately same (in the range of
AC-DCT coefficients. 24 − 28dB for visible watermarking and in the range of
The chip is implemented with dual voltage and dual fre- 32 − 35dB for invisible watermarking); further proving the
quency supplies. The single supply voltage level converter correctness of the proposed chip. We carried out extensive
described in [16] is used in this implementation. The voltage simulation with various image data and presented one of the
level converter was designed as a standard cell and added to the visible watermarked images in Fig. 8. The test images of size
existing standard cell library. The output of the DCT module 256 × 256 are borrowed from [7], [8] for the simulations.
is connected to the voltage level converters to step up the
voltage. The delay caused by the voltage level converter is VI. C ONCLUSIONS
added with the clock period of the faster clock. The overall We presented the VLSI architecture of a watermarking chip
chip layout consists of two separate voltage islands, such and its implementation using 0.25µ technology. The chip is
as low voltage and high voltage. The low voltage and the capable of inserting both visible and invisible watermarks
high voltage island layouts are generated separately. When the into an image. Dual voltage, clock gating and dual frequency
final layout combining the two islands is generated the power techniques were used in this design for low power optimization
supplies for the two islands are given from a common power along with a certain degree of pipelining and parallelism.
ring. Later, the connection to low voltage island is deleted The architecture developed in this design is the first hardware
and a separate connection is given from low voltage Vdd pin. design with the capability to perform both visible and invisible
Silicon Ensemble joins the two power rings, low and high watermarking in the DCT domain.
together and in Virtuoso, they are separated.
R EFERENCES
V. E XPERIMENTAL R ESULTS [1] F. Mintzer, G. Braudaway, and M. Yeung, “Effective and Ineffective
Digital Watermarks,” in Proceedings of the IEEE International Confer-
Each module in the chip was tested individually with ence on Image Processing, 1997, vol. 3, pp. 9–12.
Nanosim. Typically, the length of netlist files were more than [2] N. J. Mathai, D. Kundur, and A. Sheikholeslami, “Hardware Implemen-
few hundred thousands of lines. A perl script takes two files tation Perspectives of Digital Video Watermarking Algortithms,” IEEE
Trans on Signal Processing, vol. 51, no. 4, pp. 925–938, April 2003.
as input; the netlist file and a file containing the input for [3] T. H. Tsai and C. Y. Lu, “A Systems Level Design for Embedded
the circuit alongwith a list of input and output pins. The Watermark Technique using DSC Systems,” in Proceedings of the
script converts the netlist file into a EPIC VECTOR file and IEEE International Workshop on Intelligent Signal Processing and
Communication Systems, 2001.
EPIC DIGITAL VECTOR file as required by Nanosim. All the [4] A. Garimella, et. al., “VLSI Impementation of Online Digital Water-
node numbers are also changed to corresponding node names marking Techniques with Difference Encoding for the 8-bit Gray Scale
as used in layout for easy identification of the waveforms. Images,” in Proc of the Intl Conf on VLSI Design, 2003, pp. 283–288.
[5] L. D. Strycker, et. al., “Implementation of a Real-Time Digital
The chip was estimated to operate at a dual frequency of Watermarking Process for Broadcast Monitoring on Trimedia VLIW
280M Hz and 70M Hz and at a dual voltage of 1.5V and Processor,” IEE Proceedings on Vision, Image and Signal Processing,
2.5V consuming 0.3mW of average power. vol. 147, no. 4, pp. 371–376, Aug 2000.
[6] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread
Spectrum Watermarking for Multimedia,” IEEE Transactions on Image
Processing, vol. 6, no. 12, pp. 1673–1687, Dec 1997.
[7] S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, “A DCT
Domain Visible Watermarking Technique for Images,” in Proc of the
IEEE International Conf on Multimedia and Expo, 2000, pp. 1029–1032.
[8] S. P. Mohanty, “Digital Watermarking of Images,” Thesis, Electrical
Engineering, Indian Institute of Science, Bangalore, India, 1999.
[9] M. Kaul, R. Vemuri, S. Govindarajan, and I. Ouaiss, “An Automated
Temporal Partitioning and Loop Fission approach for FPGA Based
Reconfigurable Synthesis of DSP Applications,” in Proceedings of the
IEEE/ACM Design Automation Conference, 1999, pp. 616–622.
[10] S. Govindarajan, I. Ouaiss, M. Kaul, V.Srinivasan, and R. Vemuri, “An
Effective Design Systems for Dynamically Reconfigurable Architec-
tures,” in Proceedings of the Sixth Annual IEEE Symposium on Field-
(a) Original [7], [8] (b) Watermarked
Programmable Custom Computing Machines, 1998, pp. 312–313.
[11] J. B. Sulistyo and D. S. Ha, “Developing Standard Cells for TSMC
Fig. 8. Original and Watermarked Lena Image
0.25µm Technology under MOSIS DEEP Rules,” Technical Report,
Electrical and Computer Engineering, Virginia Tech, 2002.
We compared the values of scaling (αk ) and embedding [12] P. J. Ashenden, The Designer’s Guide to VHDL, Morgan Kaufmann
(βk ) factors for hardware and software schemes to verify Publishers, San Francisco, CA, 1995.
[13] K. Miller, Assembly Language Introduction to Computer Architecture:
whether the proposed chip produces results as effective as that Using the Intel Pentium, Oxford University Press, 1999.
of the software implementations. It is observed that values of [14] N. H. E. Weste and K. Eshraghian, Principles of CMOS VLSI Design :
scaling and embedding factors obtained from the chip and that A Systems Perspective, Addison Wesley, Boston, MA, USA, 1999.
[15] V. P. Nelson, H. T. Nagle, J. D. Irwin, and B. D. Caroll, Digial Logic
from the softwares are approximately the same. Further, as Analysis and Design, Prentice Hall, New Jersey, USA, 1995.
suggested by [2], [8], we calculated the signal-to-noise ratio [16] R. Puri, et. al.s, “Pushing ASIC Performance in a Power Envelope,” in
(SN R) of the watermarked images. We then compared the Proceedings of the Design Automation Conference, 2003, pp. 788–793.
[17] S. P. Mohanty, N. Ranganathan, and R. K. Namballa, “A VLSI
SN R of the watermarked images obtained using the proposed Architecture for Visible Watermarking in a Secure Still Digital Camera
chip with that of the watermarked images obtained using the (S2 DC) Design,” IEEE Transactions on Very Large Scale Integration
software schemes. The SN R in both hardware and software Systems (TVLSI), Vol. 13, No. 7, July 2005, pp. 808-818.