Beruflich Dokumente
Kultur Dokumente
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005
Transactions Letters________________________________________________________________
Image Adaptive Watermarking Using Wavelet Domain Singular Value
Decomposition
Paul Bao and Xiaohu Ma
I. INTRODUCTION
Manuscript received April 22, 2003; revised July 27, 2003. This paper was
recommended by Associte Editor E. Izquierdo.
P. Bao is with the School of Computer Engineering, Nanyang Technological
University, 639798 Singapore (e-mail: aspbao@ntu.edu.sg).
X. Ma is with the Department of Computer Science, Xuzhou Normal University, Xuzhou 221004, China (e-mail: maxiaohu@public.xz.js.cn).
Digital Object Identifier 10.1109/TCSVT.2004.836745
In 1997, Xia et al. [2] proposed a multiresolution watermarking method by inserting pseudorandom codes to the
large coefficients at the high- and middle-frequency bands
of the dicrete wavelet transform (DWT) of an image. Their
watermarking method is robust to some common image compressions and halftoning but the detection of the watermark
is dependent on the noise level in an image. Inoue et al.
[3] proposed a watermarking scheme by classifying wavelet
coefficients as insignificant or significant using zerotree and
then embedding a watermark in the location of insignificant
coefficients or in the location of the thresholded significant
coefficients at the coarser scales. Xie et al. [4] proposed a
scheme combining watermarking with wavelet compression by
engraving a watermark in the wavelet coefficients and encoding
the watermarked coefficients using SPIHT compression algorithm. Their method is nonadaptive and may alter the original
frequency correlations of the images. Tsai et al. [5] proposed
a watermarking scheme which utilizes the wavelet domain
image frequency components and the chaotic transformation to
select the location during the watermark embedding. Vehel et
al. [6] presented a digital image watermarking by modifying
certain subsets of the wavelet packet decomposition, determined from a secret key and an image dependent procedure. Hu
et al. [7] proposed a watermarking scheme using pixel-based
scaling, where the scaling factors for the pixel-based method
are adaptively determined by the effect of luminance and
local spatial characteristics. Taskovski et al. [8] presented a
low-resolution content-based watermarking scheme, where the
watermark is embedded in the lowest resolution of three-level
wavelet decomposition incorporated with a visual modeling
of the local image characteristics. Besides the aforementioned
watermarking schemes based on the structural distribution in
wavelet domain for watermark embedding, schemes based on
the human perceptual modeling of the wavelet coefficients were
also proposed. Wei et al. [9] introduced a perceptually based
watermarking technique where the watermark is inserted in the
wavelet coefficients so that watermark noise does not exceed
the just-noticeable difference of each wavelet coefficient. Barni
et al. [10] proposed a watermarking algorithm based on the
masking of the watermark according to the characteristics of
the human visual system (HVS).
In all the previous wavelet-based watermarking schemes, the
watermark bits would be directly embedded in the locations of
the wavelet coefficients determined by the various modeling.
While the watermarks embedded in the wavelet coefficients
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005
97
98
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005
TABLE I
CONSTANT QUANTIZATION STEP d: THE QUALITY OF WATERMARKED IMAGE (PSNR) AND BER OF THE EXTRACTED WATERMARKS CORRESPONDING TO
SEVERAL JPEG COMPRESSIONS, RESPECTIVELY
quantization scheme, a watermarking scheme with high transparency and robustness to JPEG compressions can be obtained.
The method can be described as follows.
for each block
.
1) Calculate the standard deviation
and minimum value
2) Calculate the maximum value
for all the
.
for the block
as
3) Compute the quantization step
(2)
where
is the number of all blocks,
and
are
minimum and maximum quantization step values, respectively, specifiable by user.
Table II gives some comparison results with the basic algorithm
in Section III and Fig. 2 gives the visual examples of the water9 and
36 or 45.
marked images, where
Note from Table II that the BERs increase rapidly as the JPEG
compression ratios. This is because that the watermarking distribution is only adaptive to the standard deviation of each block in
the spatial domain. Thus, the SVs of a more spatially structured
block (larger deviation) would be significantly modified which
may be insignificant in wavelet domain and thus be thresholded.
On the other hand, the SVs of a less spatially structural block
(small deviation) would be slightly modified, which, however,
could be significant in wavelet domain allowing the embedding
of more watermark information. Thus, the aforementioned watermarking distribution scheme would result in a less satisfying
transparency and a poor robustness to compressions.
B. Adaptive Quantization Parameters Based on Wavelet
Domain Modeling
In view of this potential drawback, we propose a set of quantization parameters modeled adaptively to both the deviation and
the expectation of each block within the wavelet domain where
the SVs for the real structures will be largely modified with watermarking whereas that of the nonstructural background will be
slightly modified to ensure a high perceptual quality of watermarked image and a low BER of the detected watermark. The
scheme is detailed as follows.
1) An image is transformed into wavelet subbands. In each of
the subbands, the coefficients are segmented into blocks
and SVDs for each of the blocks are comof size
puted.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005
99
Fig. 1. Visual appearances of the watermarked images obtained by constant quantization steps. (a) Watermark image. (b)(c) Two original images. (b1)(b3)
Watermarked images corresponding to the original image (b) when quantization steps d are set to 9,27, and 54, respectively. (c1)(c3) Watermarked images
corresponding to (c) when d
9, 27, and 54, respectively.
TABLE II
IMAGE ADAPTIVE QUANTIZATION STEP d : THE QUALITY OF WATERMARKED IMAGE (PSNR) AND BER OF THE EXTRACTED WATERMARK CORRESPONDING TO
SEVERAL JPEG COMPRESSION RATIOS, RESPECTIVELY
100
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005
TABLE III
THE QUALITY OF WATERMARKED IMAGE (PSNR) AND BER OF THE EXTRACTED WATERMARK CORRESPONDING TO 40% JPEG COMPRESSION FOR DIFFERENT
VALUES OF PARAMETER c AND c , RESPECTIVELY
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005
101
TABLE IV
COMPARISONS BETWEEN THE PROPOSED METHOD AND WAVELET BASED WATERMARKING SCHEMES ON 512 512 IMAGES: BER OF THE EXTRACTED
WATERMARK CORRESPONDING TO SEVERAL JPEG COMPRESSION RATIOS, RESPECTIVELY
102
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 1, JANUARY 2005
Fig. 4. (a1)(a2) Modified watermarked images. (b1)(b2) Detected watermark images corresponding to the LL band. (c1)(c2) Enlarged detected watermark
images for detecting the malicious modification operation.
REFERENCES
[1] G. L. Friedman, The trustworthy digital camera: restoring credibility to
the photographic image, IEEE Trans. Consumer Electron., vol. 39, pp.
905910, Nov. 1993.
[2] X. Xia, C. G. Bonceletand, and G. R. Arce, A multiresolution watermark for digital images, in Proc. Int. Conf. Image Processing, vol. 1,
Santa Barbara, CA, Oct. 1997, pp. 548551.
[3] T. Inoue, H. Miyazaki, A. Yamamoto, and A. Katsura, A digital watermark based on the wavelet transform and its robustness on image compression, in Proc. Int. Conf. Image Process., vol. 2, Chicago, IL, Oct.
1998, pp. 391395.
[4] L. Xie and G. R. Arce, Joint wavelet compression and authentication
watermarking, in Proc. Int. Conf. Image Process., vol. 2, Chicago, IL,
Oct. 1998, pp. 427431.
[5] M. Tsai, K. Y. Yu, and Y. Z. Chen, Joint wavelet and spatial transformation for digital watermarking, IEEE Trans. Consumer Electron., vol.
46, no. 1, p. 237, Feb. 2000.
[6] J. L. Vehel and J. L. Manoury, Wavelet packet-based digital watermarking, in Proc. 15th Int. Conf. Pattern Recognit., vol. 3, Barcelona,
Spain, Sept. 2000, pp. 413416.
[7] Y. Hu and S. Kwong, Wavelet domain adaptive visible watermarking,
Electron. Lett., vol. 37, no. 20, pp. 12191220, Sep. 2001.
[8] D. Taskovski, S. Bogdanova, and M. Bogdanov, A low resolution content based watermarking of images in wavelet domain, in Proc. 2nd Int.
Symp. Image and Signal Process. Analysis, Pula, Croatia, Jun. 1921,
2001, pp. 604608.
[9] Z. H. Wei, P. Qin, and Y. Q. Fu, Perceptual digital watermark of images
using wavelet transform, IEEE Trans. Consumer Electron., vol. 44, no.
4, pp. 12671272, Nov. 1998.
[10] M. Barni, F. Bartolini, and A. Piva, Improved wavelet-based watermarking through pixel-wise masking, IEEE Trans. Image Processing,
vol. 10, no. 5, pp. 783791, May 2001.
[11] V. I. Gorodetski, L. J. Popyack, and V. Samoilov, SVD-based approach
to transparent embedding data into digital images, in Proc. Int. Workshop, MMM-ACNS, St. Petersburg, Russia, May 2001, pp. 263274.
[12] R. Liu and T. Tan, An SVD-based watermarking scheme for protecting
rightful ownership, IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121128,
Mar. 2002.
[13] B. Chen and G. W. Wornell, Achievable performance of digital watermarking systems, in IEEE Int. Conf. Multimedia Computing and Systems, June 1999, pp. 1318.
[14]
, Quantization index modulation: a class of provably good
methods for digital watermarking and information embedding, IEEE
Trans. Inform. Theory, vol. 47, no. 4, pp. 14231443, May 2001.