Professional Documents
Culture Documents
Algorithm (TIWA) :: Watermarking Multi-Message Watermarking Optimum Complete Complementary
Algorithm (TIWA) :: Watermarking Multi-Message Watermarking Optimum Complete Complementary
n
(1)
authentication [4,5,6]. The marking framework applies M
940
XI =W (D Cii 'X2 = w c12 (6) WT W +W , W T W + W (10)
W=X1 +X2 =W( Cll1 1C+W 2C2 Then, the encoding and decoding process will follow up
11 12 (7) the single user procedure with a unique difference that
W= W(®Rll+W(®R12 =WDA-_W several users now are accessible to the host images with
different keys to extract their watermark. The decoding
The comparison between the TIWA and the process of user one and two are mathematically
conventional techniques is essential to evaluate the represented by equation (11), (12) and (13), (14)
efficiency of the proposed technique. Two points are taken respectively with an indication of the orthogonality
into account, the robustness against different attacks and property effect.
the security against the hacking processes. The robustness X1 = WT @ CII X2 = WT
X-(Cx W(C I)C12 (1
of the TIWA algorithm using the JND and DCT W X1+X2 =W,1 X @+
= C W2 XC2 C,+W1 C XY2 DCY2 + W2'C22 DC2 (12)
embedding to a variety of attacks is discussed in section 6. WJ= (WF R1+ W R,2)+W2® (C2®(DC±1+C22(DC2) =1W(DA+W2(DZero
On the other hand, the security is enhanced compared to =
wi
the conventional technique due to the complexity of the
TIWA verification procedure. Obviously, the hacker needs X1 = WT ( C21' X2 = WT 3 C22 (13)
to know the host image pair, the user private key as well as = X1 + X2 C21 (C2)WU'g
= W20R + C® 1 f C21 + W2 & C22) C22 + WU& C12fr C22 (14)
the decoding procedure. This is considered difficult as the = (W2 &)R21 + W2 &)R22) + W1 (i (Cll @f C21 + C12ff) C22) = W2 E) A + W, E) Zero
host images could be hardly recognized as they are not
similar or related to each other and the encoding process is
not reversible. V. EXPERIMENTAL RESULTS
Reference
Watermark
In this section, the robustness of the proposed TIWA
algorithm for single and multi user compared to the
conventional technique takes place. The simulation process
uses two host images namely, 'Trees' and 'Bonemarr' from
the MATLAB toolbox of size 256 by 256, one watermark
'the Mathworks logo' for single user supported with a
second one 'Circles' for multi user both of size 55 by 55.
For the encoding process, the simulation results utilize two
sets each set having a pair of optimum arrays of size 10 by
10. The single user simulation uses one set of arrays while
the multi user case uses both sets.
Beginning with the single user simulation, the TIWA
algorithm is compared to the conventional technique in case
of both embeddings under the noise and the JPEG
compression attacks. Two types of noises are studied; the
uniformly distributed random noise and the Gaussian noise.
Different levels of each type of noise are applied separately
r lg. i Ilie blOCK aiagram O0 mne multi-message IIWA. to the host image and the watermark is extracted and
evaluated. The root mean square error RMS is used as a
IV. THE MULTI-MESSAGE TIWA ALGORITHM quality measure of the extracted watermark against the
reference watermark. For both TIWA and conventional
In this section, the TIWA is developed to support multi techniques the RMS error is displayed versus the SNR to
user motivated by the optimum arrays sets orthogonal differentiate between their robustness.
property. As previously displayed, the optimum arrays sets Figure (4) compares between them using both
have a vanishing cross correlation sum between the embedding algorithms under the effect of Gaussian noise
respective arrays in each set. This explains that no multiple and uniformly distributed random noise in part (a) and (b)
access interference MAI will exist if different sets are respectively. Then, the quality of the extracted watermark
assigned to encode different users information. using DCT embedding case under 0.01 SNR of uniformly
The multi-user TIWA, demonstrated by the block distributed random is shown in figure (5). Discussing the
diagram of figure (3), is almost similar to the single user noise attack, the TIWA algorithm shows an enhancement of
TIWA procedure except an additional step in the encoding approximately 1Odb in both of the JND and DCT
frame work. For more clarification, we will take an embedding. On the other hand, the quality of the extracted
example of two users and two sets each having two arrays watermark using TIWA is much better than the
CII, C12 and C21, C22. Now, each user will encode its conventional technique under the same noise level.
watermark according to the single user procedure. Next, Second, different levels of the JPEG compression are
the first and second part of equation (8) & (9) are added studied and the quality of the extracted watermark using
respectively to obtain the final frames WT, W1T in equation the TIWA case is compared to the conventional case. This
(10), used as input to the embedding process. The order is comparison takes place in figure (6) part (a) using the JND
essential in the summation process as the orthogonality embedding under 1% JPEG compression and part (b) the
takes place between the respective arrays only. DCT embedding under 10%. These figures show the
W = W (DC11,W = W (DC12 (8) remarkable quality of the extracted watermark using
W = W2 ( C21 ,W W
W C2, (9) TIWA under different levels of JPEG compared to
941
conventional technique. Finally, the multi-user simulations TIWA due to the irreversible encoding-decoding process
are discussed under the noise attacks with an only as well as the importance of knowing both unrelated-host
difference as it is differentiating between the multi-user, images.
and single user which is needed to investigate the MAI
effect. 10
e-f f o Multimessage TIWA
X t X X IX X X X X X 0 Single user TIWA
10
10
(a) (b) 10
10 12 14 16 18 20 22 24 26 28 30
Fig. 4 Comparison of the Performance of the TIWA algorithm SNR(db)
with the conventional techniques; JND embedding in red lines Fig. 7 Comparison between multi user TIWA and single user
and DCT embedding in blue lines. a) Effect of Gaussian noise. TIWA under the effect of uniformly distributed random noise
b) Effect of uniformly distributed random noise. (magenta lines) and the effect of the Gaussian noise (black lines).
REFERENCES
[1] H. D. Luke, "Sets Of One And Higher Dimensional
Welti Codes And Complementary Codes," IEEE
Trans on Aerospace and Electronic Systems, Vol.
Fig.5 Comparison between the extracted watermark using TIWA
AES21 , No.2, pp.170-1 79, March 1985.
algorithm in the left side and the conventional technique in the
right side for SNR of 0.01 of uniformly distributed random noise. [2] N. Suehiroand M. Hatori, "N-Shift Cross-Orthogonal
Sequences," IEEE Transactions on Information
Theory, Vol 34, No. 1, pp. 143-146, January 1988.
[3] T. E. Hall, C. F. Osborne and A. Z. Tirkel, "Families
Of Matrices With Good Auto and Cross-Correlation"
Department of Mathematics and Statistics, Monash
(a) University, Australia, 2000.
[4] F.Y. Duan and I. King, "A Short Summary Of Digital
Watermarking Techniques For Multimedia Data,"
Report # CUHK4176/97E., Department of Computer
Science & Engineering, The Chinese University of
Hong Kong.,1997.
[5] F. Perez-Gonzalez and J. R. Hernandez, "A Tutorial on
(b) Digital Watermarking" Dept of Communication
Fig. 6 Quality comparison between the extracted watermark of Technologies, University of Vigo , Spain , TIC-96-
the conventional (right side) and TIWA technique (left side) 0500-CJO-10 Project, 2000.
under different levels of JPEG compression. a) 1% for the JND [6] A. Z. Tirkel, N. Mee and C. F. Osborne, "A Digital
embedding. b) 10% for the DCT embedding. Watermark" IEEE International Conference Image
Figure (7) displays the uniformly distributed random Processing, volume 2, pages 86-90, Nov. 1994.
noise and the Gaussian noise case of study in part (a) and [7] E. Koch and J. Zhao, "Towards Robust and Hidden
(b) respectively. Obviously, the multi-user case has a Image Copyright Labeling," Proceedings IEEE
vanishing MAI causing a nearly superimposed Workshop on Nonlinear Signal and Image Processing,
performance in both multi and single user case. pp 452-455, Neos Marmaras, Greece, June 20-22,
1995.
VI. CONCLUSIONS [8] Thrasyvoulos N. Pappas, and Robert J. Safran
"Perceptual Criteria for Image Quality Evaluation,"
In this paper, the twin image watermarking algorithm BellLabs TechnicalJournal, March1999.
TIWA for single and multi-user was introduced. The new [9] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon,
technique adopted a new optimum encoding framework "Secure Spread Spectrum Watermarking For
applied on the watermark. The TIWA algorithm enhanced Multimedia" IEEE Transaction on image processing,
the robustness and security of the existing marking 1997 .
techniques. The TIWA was shown to develop the noise [10] R. Van Schyndel, A.Z. Tirkel, I. D. Svalbe, T.E. Hall,
immunity by an amount of 10 dB keeping a noticeable C.F. Osborne, "Algebraic Construction of a New
extracted watermark. In addition, under higher levels of Class of Quasi-Orthogonal Arrays in
JPEG compression the TIWA provides a better quality of Steganography," SPIE Security and Watermarking of
extracted watermark than the conventional technique. On Multimedia Contents, San Jose, USA, Vol 3657,
the other hand, the hacking process is more difficult using pp.354-364, January, 1999.
942