Professional Documents
Culture Documents
Tsai Lin Watermarking
Tsai Lin Watermarking
Tsai Lin Watermarking
6 JUNE 2008
1426
SUMMARY In this study, we propose a complete architecture based on prevent pirates but also recognize copyright of multimedia
digital watermarking techniques to solve the issue of copyright protection data. Digital contents embedded with visible watermarks
and authentication for digital contents. We apply visible and semi-fragile
will overlay recognizable but unobtrusive copyrights pat-
watermarks as dual watermarks where visible watermarking is used to es-
tablish the copyright protection and semi-fragile watermarking authenti- terns identifying its ownership. Therefore, a useful visible
cates and verifies the integrity of the watermarked image. In order to get watermarking technique should remain details of contents
the best tradeoff between the embedding energy of watermark and the per- and ensure embedded patterns difficult or even impossible
ceptual translucence for visible watermark, the composite coefficients us- to be removed, and no one could use watermarked data ille-
ing global and local characteristics of the host and watermark images in the
discrete wavelet transform (DWT) domain is considered with Human Vi-
gally. Watermark removal, at a minimum, should be more
sion System (HVS) models. To achieve the optimum noise reduction of the costly and labor intensive than purchasing rights to use the
visibility thresholds for HVS in DWT domain, the contrast-sensitive func- digital data.
tion (CSF) and noise visible function (NVF) of perceptual model is applied For content authentication and integrity verification,
which characterizes the global and local image properties and identifies
fragile (or semi-fragile) watermarks are used because they
texture and edge regions to determine the optimal watermark locations and
strength at the watermark embedding stage. In addition, the perceptual are fragile to certain alterations and modifications of the au-
weights according to the basis function amplitudes of DWT coefficients is thenticated multimedia. Semi-fragile watermarks are more
fine tuned for the best quality of perceptual translucence in the design of the practical than fragile watermarks, since they are robust to
proposed watermarking algorithm. Furthermore, the semi-fragile water- some mild modifications such as JPEG compression and
mark can detect and localize malicious attack effectively yet tolerate mild
modifications such as JPEG compression and channel additive white Gaus-
channel AWGN (additive white Gaussian noise) causing
sian noise (AWGN). From the experimental results, our proposed technique by exchange and storage but fragile to malicious attacks
not only improves the PSNR values and visual quality than other algorithms like image cropping which crops objects from a source and
but also preserves the visibility of the watermark visible under various sig- pastes them onto a target.
nal processing and advanced image recovery attacks.
The goal of this paper is to propose a novel scheme
key words: HVS, semi-fragile watermarking, tamper detection, visible wa-
termarking for copyright protection and authentication of color images
by using visible watermark and semi-fragile watermark with
1. Introduction HVS models. For copyright protection, we present a differ-
ential visible watermarking algorithm based on noise reduc-
We are now in an era of knowledge-based economy. At the tion and HVS model to get the best tradeoff between the
core of such an economy, intellectual property becomes the embedding energy of watermark and the perceptual translu-
critical issue we concerned. Intellectual property acts like cence for visible watermark. The collaboration of CSF and
real property and surrounds us in nearly everything we do. NVF for HVS models is leveraged with the noise reduc-
Books, music, digital multimedia, and any kind of arts actu- tion of the visibility thresholds for HVS in DWT domain.
ally belong to the authors who made it, and the authors have The perceptual weights is fine tuned for watermark embed-
the rights to restrict access to intellectual property [1]. ding which results significant improvement over the water-
Because of the advantages of digital media and rapid marked images by CSF only algorithms regarding the image
development of digital signal processing, a variety of multi- quality, translucence and robustness of the watermarking.
media contents have been digitalized and easily distributed For authentication and verifying the integrity of the water-
or duplicated without any reduction in quality through both marked images, we applied a semi-fragile watermark algo-
authorized and unauthorized distribution channels. Digital rithm which can detect and localize malicious attack and
watermarking [2] has been extensively studied and regarded the order of embedding is visible watermark first and semi-
as a potentially effective means for protecting copyright of fragile watermark next.
digital media in recent years, Visible watermarking schemes The rest of this paper is organized as follows. Related
protect copyrights in a more active method. They not only works about visible watermarking and image authentication
will be introduced briefly in Sect. 2. The details of the al-
Manuscript received June 4, 2007. gorithm will be explained in Sect. 3. Section 4 will show
Manuscript revised October 16, 2007. the experiments results with discussion and conclusion is in
†
The authors are with Institute of Information Management,
National Chiao Tung University, Taiwan, R.O.C. Sect. 5, respectively.
a) E-mail: mjtsai@cc.nctu.edu.tw
DOI: 10.1093/ietfec/e91–a.6.1426
Copyright
c 2008 The Institute of Electronics, Information and Communication Engineers
TSAI and LIN: WAVELET BASED MULTIPURPOSE COLOR IMAGE WATERMARKING BY USING DUAL WATERMARKS
1427
w(i, j)
NVF(i, j) = (4)
w(i, j) + σ2x
where w(i, j) = γ[η(γ)]γ r(i, 1j)2−γ and σ2x is the global
variance of host image. η(γ) = Γ(3/γ)/Γ(1/γ), Γ(t) =
∞ −u t−1
0
e u du (gamma function) and r(i, j) = x(i, j)−x(i,
σx
j)
. γ
Fig. 3 A five-level DWT structure. rλ (βλ ) values for each level λ are is the shape parameter and r(i, j) is determined by the local
indicated at the center of each band. mean and the local variance. For most of real images, the
shape parameter is in the range 0.3 ≤ γ ≤ 1. In our scheme,
the estimated shape parameter for γ = 0.65 and width of
the distortion in mid-frequency regions and sensitivity falls window is 1.
off as the frequency value drifts on both sides. The square
function (3) in [3] is applied to approximate the effect of 3.3 Detection Thresholds for DTW Coefficients
CSF masking. The adequate modulation rate βλ for each
subband is determined by: In order to further improve the HVS model for better im-
λ 2 age quality, the knowledge of detection thresholds for DWT
(7.20 − r )
βλ = 0.01 + (3) coefficients should be also studied. A.B. Watson, et al. [13]
7.202 proposed a mathematical model for DWT noise detection
where λ denotes the decomposed level and βλ s for each thresholds which is a function of level, orientation, and dis-
subband are shown in Fig. 2 where the level 3 has the play visual resolution. The model is given by
smallest rate for modulation. In addition,rλ represents the
log Yλ,θ = log a + k(log fλ − log gθ f0 )2 (5)
wavelet coefficient CSF of the perceptual importance weight
as shown in Fig. 3. It is apparent that rλ s have the highest where a is the minimum threshold occurs at spatial fre-
values at level 3 and the values falls off for level 1, 2, 4 and quency gθ f0 , fλ is the spatial frequency of decomposition
5 in Fig. 3. level λ, and gθ shifts the minimum by an amount that is a
function of orientation. Table 1 shows the basis function
3.2 NVF (Noise Visibility Function) amplitudes for a 5-level DWT. In this study, we use Aλ,θ in-
dicating the basis function amplitudes, λ as DWT level, and
Many schemes embedded the watermark as random noise in θ as orientation.
the whole host image with the same strength regardless of
the local properties of the host image, so the visible artifacts 3.4 Visible Watermarking Embedding Algorithm
are easy taken placed at flat regions. S. Voloshynovskiy et
al. [11] presented a stochastic approach based on the com- The complete design of the visible watermarking algorithm
putation of a NVF (Noise Visibility Function) that charac- is summarized as following and the flow chart is shown in
terizes the local image properties and identifies texture and Fig. 4:
edge regions. Accordingly, when the local variance is small,
the image is flat, and a large enough variance indicates the (1) The host color image is converted in the color space do-
presence of edges or highly texture areas. Because human main from RGB to YCrCb.
eyes are sensitive to changes in flat than edges regions of (2) By using Bi9/7 filter from [13], compute the 5-level 2-
the image, ones can increase the energy of watermark in the D wavelet coefficients of Y component from host color
edges and high textured areas of the image, and reducing it image and grayscale watermark image. If the width of
in smooth regions in similar peak-signal noise rate (PSNR). watermark is not the same as the one of the host image,
This allows us to determine the optimal watermark locations it should be proportionally scaled to the host image.
and strength for the watermark embedding stage. Therefore, (3) Modify the DWT coefficients of the host image by using
this concept from NVF can be used to develop a simple im- the following equation
age dependent HVS model. Yi, j = αλ,θ × Xi, j + (1 − NVFi, j ) × S i, j × βλ,θ (6)
They developed three such NVF Functions and we
adopt the NVF Function with Stationary GG (Generalized Note: (i, j) indicates the spatial location. X and S are
Gaussian) Model in this study. The formula is as following: the decomposed wavelet coefficients of the host image
IEICE TRANS. FUNDAMENTALS, VOL.E91–A, NO.6 JUNE 2008
1430
Ar (k1 ) :
y
and the watermark image. NVF is defined in formula
(4) and the relationship of αλ,θ and βλ,θ is defined in (3) =
1 1 x
(mod r) (7)
where αλ,θ = 1 − βλ,θ . Qnum + k1 Qnum + k1 + 1 y
(4) Inverse transform the DWT coefficients of the host im- W(i, j) = (x
+ y
) mod 2 (8)
age to obtain a watermarked image (Y component).
(4) We use K2 as random seed to create two-dimensional
pseudo-random array location(i, j) ∈ {1, 2, 3}, 1 ≤ i ≤
3.5 Semi-Fragile Watermark Generation and Embedding r, 1 ≤ j ≤ c to determine the watermark embedding
Algorithm location corresponding to {LH2 , HL2 , HH2 }.
(5) The binary watermark is embedded into the visible wa-
It is difficult to develop a visible watermarking algorithm termarked image by using simple odd-even quantiza-
that can avoid any attack by expensive human labors, es- tion. We define odd-even quantization function in for-
pecially while the texture content of the host image is not mula (9), (10), (11), (12), (13) as the function f in Step
complicated. In order to detect such kind of tampering and (6). The formula performs quantization on X(i, j) into
verify the integrity of the visible watermarked images, we odd-even region according the binary watermark W. q2
modified the image authentication (semi-fragile watermark) is the quantization parameter. (i, j) indicates the spatial
algorithm from [19] into the proposed visible watermarked location. X is the decomposed wavelet coefficients of
image as a dual watermarking scheme for our complete ar- the visible watermarked image.
chitecture.
The semi-fragile watermark embedding procedures are y(i, j) = f (x(i, j), W, q2 ) (9)
as following and the flow chart of semi-fragile watermarking x∈R W ∈ {0, 1} q2 ∈ Z +
is shown in Fig. 5. 0 x(i, j)/q2 is even
I= (10)
1 x(i, j)/q2 i odd
(1) Select parameters: K1 and K2 are the private keys of the
scheme. q1 and q2 are the quantization parameter. Note: ·denotes the floor function.
(2) Select the Y (Luminance) component from visible wa-
termarked image and compute the 2-level 2-D wavelet x(i, j)/q2 ×q2 +q2 /2+ xr if I = b
y(i, j) = (11)
coefficients of it, r × c is the size of LL2 . y
+ xr if I b
⎧
(3) In order to get high security watermark (pseudo random ⎪
⎪ x(i, j)/q2 − 1 × q2 + q2 /2 if
⎪
⎪
⎪
number), we refer to [22]’s chaotic system called toral ⎪
⎪ x ∈ [x(i, j)/q2 × q2 , x(i, j)/q2
⎪
⎪
⎪
automorphisms as chaotic map. Map Qnum = LL2 /q1
⎨ ×q2 + q2 /2]
y =⎪ ⎪ (12)
and K1 as controlling parameter. Using Eqs. (7), (8), we ⎪
⎪
⎪ x(i, j)/q2 + 1 × q2 + q2 /2 if
obtain the binary watermark W(i, j) ∈ {0, 1}, 1 ≤ i ≤ r, ⎪
⎪
⎪ x ∈ [x(i, j)/q2 × q2 + q2 /2,
⎪
⎪
⎩
1 ≤ j ≤ c. x(i, j)/q2 × q2 + q2 ]
TSAI and LIN: WAVELET BASED MULTIPURPOSE COLOR IMAGE WATERMARKING BY USING DUAL WATERMARKS
1431
Fig. 6 The flow chart of authentication and tamper detection algorithm approach. Fig. 7 NCTU logo.
xr = sgn(x(i, j))(|x(i, j)| mod 2) (13) tamper detection matrix indicates the pixels that were
tampered.
(6) Perform quantization on wavelet coefficients as follows
FOR i =1 to r T = W
− W (15)
FOR j =1 to c
SWITCH location(i, j) (7) Since the algorithm is designed to be semi-fragile water-
CASE 1: HL2 (i, j) = f (HL2 (i, j),W(i, j), q2 ) marking scheme which would want to be robust to mild
CASE 2: LH2 (i, j) = f (LH2 (i, j),W(i, j), q2 ) modifications in all cases, it is inevitable that we can not
CASE 3: HH2 (i, j) = f (HH2 (i, j),W(i, j), q2 ) detect all malicious attack in pixel-wise. However, for
(7) Inverse transform the DWT coefficients of the Y com- practical cases such as removal visible watermark using
ponent. The Y component with visible and semi-fragile neighbor pixels and image cropping which crops objects
watermark is converted in the color space domain from from a source and pastes them onto a target, the mali-
YCrCB to RGB. cious attacks always be applied in a certain region in
the watermarked image. That is to say, we assume tam-
per pixels are always continues. Therefore, for a certain
3.6 Semi-Fragile Watermark Authentication and Tamper tamper detection matrix element T (i, j), if the number
Detection Algorithm of tampered neighboring element for T (i, j) is greater
than a given threshold, we regard T (i, j) as a tampered
Figure 6 shows the flow chart of watermark detection one. The summary of such post-processing operation of
scheme, which is similar to the part of semi-fragile water- tamper detection matrix is shown as following formula
mark embedding. The tamper detection procedure as fol- (16):
lows:
⎧
L
(1) Select parameters: K1 and K2 are the private keys of the ⎪
⎪
⎪
L
⎪
⎪
⎪ 1, T (i + k, j + l) > β
scheme. q1 and q2 are the quantization parameter. The ⎪
⎪
⎨
T
= ⎪
⎪
k=−L l=−L
L
(16)
value of K1 , K2 , q1 and q2 are the same in embedding ⎪
⎪
⎪
L
⎪
⎪
⎪ T (i + k, j + l) ≤ β
and extraction processes. ⎩ 0,
(2) The obtained visible watermarked image is converted in k=−L l=−L
the color space domain from RGB to YCrCb.
Note: L as width of window, β as threshold.
(3) Select the Y (Luminance) component and compute the
(8) According to the DWT decomposition of the water-
2-level 2-D wavelet coefficients of it, r × c is the size of
marked image, the size of tamper detection matrix is
LL2 .
r × c, which is about 1/16 of the watermarked image.
(4) Use K1 and K2 to create two-dimensional pseudo-
Thus one element in the matrix indicates a correspond-
random arrays; W
(i, j) ∈ {0, 1}, 1 ≤ i ≤ r, 1 ≤ j ≤ c
ing 4 × 4 block in the watermarking image. Finally,
and location(i, j) ∈ {1, 2, 3}, 1 ≤ i ≤ r, 1 ≤ j ≤ c.
we rescale the tamper detection matrix to have the same
(5) According to the location(i, j), we find the sub-band and
size of the watermarked image and obtain the tamper
the quantized coefficient, defined as u(i, j). The extract
detection image.
watermark may be obtained by the following formula
(14):
W , then T =0. It means the visible watermarked image tested by using the commonly available color images from
was not tampered. Otherwise, the ‘1’ element in the USC image database [23]. Because the evaluation standards
IEICE TRANS. FUNDAMENTALS, VOL.E91–A, NO.6 JUNE 2008
1432
Fig. 9 The visual comparison of close-ups for images from Fig. 8. (a),
(d), (e) are close-ups of the original images. (b), (e), (h) are close-ups of
the watermarked images by the method of [3]. (c), (f), (i) are close-ups of
the watermarked images by the proposed algorithm.
From Figs. 8(b) (c), (e) (f) and (h) (i) image pairs, the pro-
Fig. 8 Original images of (a) Lena (d) Lake (g) Peppers. (b), (e), (h) posed method has the closest luminance and chrominance
are watermarked images by the method of [3]. (c), (f), (i) are watermarked maintenance compared with the original ones which are
images by the proposed algorithm.
shown clearly from the photos even the difference is some-
times identified subjectively. The watermarked images by
for visible watermarking system are absent, we would com- using [3] have more bright effect in the unmarked areas. On
pare our algorithm with previously proposed ones. To make the other hand, translucence effect is one of requirements
the fair comparison with other visible watermarking consid- for an effective visible watermarking algorithm. The results
ering HVS, the simulation of [3] is highly addressed here. from our proposed method have better translucence effect
Since the CSF based visible watermark technique from than the method of [3] to make photos look more natural
[3] has shown better performance than the methods from since the watermarked images by using [3] affect the details
[11] and AiS Watermark Pictures Protector [24], we com- of the host (original) image more, especially in Figs. 8(b),
pared the results by [3] with the proposed approach and the (e), (h).
performance of 512 × 512 colors images. In the Huang and To further compare the details from the watermarked
Tang’s method [3], they didn’t describe the value of two images, Fig. 9 demonstrates some of close-ups for compar-
thresholds used to classify the blocks of each subband, so ison. Figures 9(a), (d), (g) are the close-ups from original
we choose T1 = 1 and T2 = 350 to match the PSNR values images in Fig. 8. Figures 9(b), (e), (h) are the close-ups
in [3] during the comparison. from the watermarked images by using [3]’s method. Fig-
One grayscale watermark of logo image is embedded ures 9(c), (f), (i) are the close-ups from the watermarked
for illustration in Fig. 7 NCTU logo (school logo). The per- images by using the proposed technique. It is very clear that
formance of 512 × 512 experimental images is tabulated in the watermark’s edges and thin lines are blurred in those im-
Table 2 for comparison purpose and Fig. 8 shows the orig- ages by using the method of [3]. In addition, the watermark
inal host images of “Lena,” “Lake” and “Peppers” respec- patterns in our proposed method still have sharp edge and
tively. Figures 8(b), (e), (h) are the watermarked images the logo watermark is evidently embedded. For the text pat-
by [3] and Figs. 8(c), (f), (i) are watermarked images by the tern, the text of character A in our results is with sharper
proposed approach. The performance analysis can be cate- edge than the ones in Figs. 9(b), (h). Besides, the outlines in
gorized as following. our results are clearer than those from method of [3].
TSAI and LIN: WAVELET BASED MULTIPURPOSE COLOR IMAGE WATERMARKING BY USING DUAL WATERMARKS
1433
Table 4 PSNR summary of watermarked color images before and after Table 5 PSNR summary of watermarked color images before and after
Median Filter. Gaussian Filter.
Fig. 18 Dual watermarked images of (a) Lena (d) Lake (g) Peppers re-
spectively. (b), (e), (h) are tampered dual watermarked images with water-
mark removal attack. (c), (f), (i) are images after tampering detection.
5. Conclusion
dual watermarked images, we applied a semi-fragile water- [16] D. Kundur and D. Hatzinakos, “Digital watermarking for tell-
mark algorithm which can detect and localize malicious at- tale tamper proofing and authentication,” Proc. IEEE, vol.87, no.7,
tack effectively yet tolerate mild modifications such as JPEG pp.1167–1180, July 1999.
[17] H.P. Alexandre and K.W. Rabab, “Wavelet-based digital watermark-
compression and channel additive white Gaussian noise ing for image,” IEEE Canadian Conference on Electrical and Com-
(AWGN). In addition, the experimental results demonstrate puter Engineering, vol.I, pp.879–884, 2002.
the proposed visible watermarking scheme has achieved [18] H. Yuan and X.P. Zhang, “A multiscale fragile watermarking based
high PSNR values with better visual fidelity and robustness on the Gaussian mixture model in the wavelet domain,” Proc.
to attacks than other schemes and the semi-fragile water- 2004 Int. Conf. on Acoustics, Speech and Signal Processing, vol.3,
pp.413–416, Montreal, QC, Canada, May 2004.
marking scheme has the capability to verify the integrity of
[19] K. Ding, C. He, L.G. Jiang, and H.X. Wang, “Wavelet-based semi-
the images. fragile watermarking with tamper detection,” IEICE Trans. Funda-
mentals, vol.E88-A, no.3, pp.787–790, March 2005.
Acknowledgments [20] J.L. Mannos and D.J. Sakrison, “The effects of a visual fidelity cri-
terion on the encoding of images,” IEEE Trans. Inf. Theory, vol.20,
no.4, pp.525–536, July 1974.
This work was supported by the National Science Council in [21] S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun, “A
Taiwan, Republic of China, under NSC95-2416-H009-027 stochastic approach to content adaptive digital image watermark-
and NSC96-2416-H009-015. ing,” Proc. 3rd Int. Workshop Information Hiding, pp.211–236,
Dresden, Germany, Sept. 1999.
[22] M.J. Tsai, K.Y. Yu, and Y.Z. Chen, “Joint wavelet and spatial trans-
References formation for digital watermarking,” IEEE Trans. Consum. Elec-
tron., vol.46, no.1, pp.241–245, Feb. 2000.
[1] World Intellectual Property Organization (WIPO), http://www. [23] USC SIPI–The USC-SIPI Image Database [Online]:http://sipi.usc.
wipo.int/ edu/services/database/Database.html
[2] I.J. Cox, J. Kilian, J., F.T. Leighton, and T. Shamoon, “Secure spread [24] AiS Watermark Pictures Protector: http://www.watermarker.com
spectrum watermarking for multimedia,” IEEE Trans. Image Pro- [25] JPEG 2000 compression, [Online]: http://www.ece.uvic.ca/
cess., vol.6, no.12, pp.1673–1687, Dec. 1997. mdadams/hasper/˜
[3] B.B. Huang and S.X. Tang, “A contrast-sensitive visible watermark- [26] StirMark, [Online]: http://www.petitcolas.net/fabien/software/Stir
ing scheme,” IEEE Multimed., vol.13, no.2, pp.60–66, April-June MarkBench mark 4 0 129.zip
2006. [27] M. Bertalmio, V. Caselles, and C. Ballester, “Image inpainting,”
[4] G.W. Braudaway, K.A. Magerlein, and F.C. Mintzer, “Protect- SIGGRAPH 2000, pp.417–424, Aug. 2000.
ing publicly-available images with a visible image watermark,” [28] C.-H. Huang and J.-L. Wu, “Attacking visible watermarking,” IEEE
Proc. Conf. Optical Security and Counterfeit Deterrence Techniques, Trans. Multimed., vol.6, no.1, pp.16–30, Feb. 2004.
SPIE, pp.126–132, 1996. [29] S.C. Pei and Y.C. Zeng, “A novel image recovery algorithm for vis-
[5] J. Meng and S.-F. Chang, “Embedding visible video watermarks in ible watermarked image,” IEEE Trans. Information Forensics and
the compressed domain,” Proc. ICIP, vol.1, pp.474–477, Oct. 1998. Security, vol.1, no.4, pp.543–550, Dec. 2006.
[6] S.P. Mohanty, K.R. Ramakrishnan, and M.S. Kankanhalli, “A dual
watermarking technique for image,” Proc. 7th ACM Int. Multimedia
Conf., vol.2, pp.49–51, Oct./Nov. 1999.
[7] P.-M. Chen, “A visible watermarking mechanism using a statistic Min-Jen Tsai received the B.S. degree
approach,” Proc. 5th Int. Conf. Signal Processing, vol.2, pp.910– in Electrical Engineering from National Taiwan
913, 2000. University in 1987, the M.S. degree in Industrial
[8] Y. Hu and S. Kwong, “Wavelet domain adaptive visiblewatermark- Engineering and Operations Research from Uni-
ing,” Electron. Lett., vol.37, no.20, pp.1219–1220, Sept. 2001. versity of California at Berkeley in 1991, the En-
[9] Y. Hu and S. Kwong, “An image fusion-based visible watermarking gineer and Ph.D. degrees in Electrical Engineer-
algorithm,” Proc. 2003 Int’l Symp. Circuits and Systems, pp.25–28, ing from University of California at Los Ange-
IEEE Press, 2003. les in 1993 and 1996, respectively. From 1996
[10] L. Yong, L.Z. Cheng, Y. Wu, and Z.H. Xu, “Translucent digital wa- to 1997, he was a senior researcher at America
termark based on wavelets and error-correct code,” Chinese J. of Online Inc. In 1997, he joined the Institute of
Computers, vol.27, no.11, pp.1533–1539, Nov. 2004. Information Management at the National Chiao
[11] A.P. Beegan, L.R. Iyer, and A.E. Bell, “Design and evaluation of Tung University in Taiwan and is currently an associate professor. His re-
perceptual masks for wavelet image compression,” Proc. 10th IEEE search interests include multimedia system and applications, digital foren-
Digital Signal Processing Workshop, pp.88–93, IEEE CS Press, sic, digital watermarking and authentication, web services, enterprise com-
2002. puting for electronic commerce. Dr. Tsai is a member of IEEE, ACM, and
[12] D. Levický and P. Foriš, “Human visual system models in digi- Eta Kappa Nu.
tal image watermarking,” Radioengineering, vol.13, no.4, pp.38–43,
2004. Chih-Wen Lin has received B.S. degree in
[13] A.B. Watson, G.Y. Yang, J.A. Solomon, and J. Villasenor, “Visibility Industrial Education from National Taiwan Nor-
of wavelet quantization noise,” IEEE Trans. Image Process., vol.6, mal University in 2004, the M.S. degree in Insti-
no.8, pp.1164–1175, 1997. tute of Information Management at the National
[14] Ö. Ekici, B. Sankur, B. Coşkun, U. Nazi, and M. Akcay, “Compar- Chiao Tung University in the year 2007. He cur-
ative evaluation of semifragile watermarking algorithms,” J. Elec- rently serves in the Telecommunication Labora-
tronic Imaging, vol.13, no.1, pp.209–216, 2004. tory of Chunghwa Telecom Co. Ltd.
[15] C. Fei, D. Kundur, and R. Kwong, “Analysis and design of secure
watermark-based authentication systems,” IEEE Trans. Information
Forensics and Security, vol.1, no.1, pp.43–55, March 2006.