Beruflich Dokumente
Kultur Dokumente
Luigi Rosa is with IPIA “R. Zerboni”, Via Paolo della Cella 3, 10139,
Turin, ITALY (phone: +39-320-7214179; e-mail: luigi.rosa@tiscali.it; web
site: http://www.advancedsourcecode.com ).
2
watermark have been recovered. Furthermore, as the transform, on the original gray-scale 512*512 image of Lena,
embedding uses the values of the transformed value in using the following modulation coefficients k1 = 0.00 ,
embedded, the embedding process should be rather adaptive;
storing the majority of the watermark in the larger coefficients. k2 = 0.50 , k3 = 1.25 and k4 = 2.00 we obtain a SNR of
We will introduce a new scheme for M-ary modulation 27.06 dB and a PSNR of 32.37, with no errors on recovered
through the selection of proper indices. Respect to other watermark (Fig. 2). Using a 8-levels CDMA approach and
approaches using CDMA and M-ary modulation [9], [10] our modulation coefficients equal to k1 = 0.00 , k2 = 0.50 ,
algorithm proposes a different scheme for watermark
embedding and detection, with low computational cost and
k3 = 0.92 , k4 = 1.33 , k5 = 1.75 , k6 = 2.17 ,
achieving great robustness against linear and nonlinear attacks. k7 = 2.58 , and k8 = 3.00 we obtain a SNR of 24.13 and a
B. Watermark embedding PSNR of 29.44, with no errors on extracted watermark (Fig.
A multilevel code can be reached grouping n bits of 3). If watermarked image is compressed using JPEG
original watermark and associating to each group one of algorithm, recovered watermark still remains highly visible
(Fig. 4). By introducing other kind of noise such as salt and
L = 2n possible levels. For a 4-levels watermarking scheme pepper noise, Gaussian white noise, multiplicative noise and
( n = 2, L = 4 ) the embedding rule becomes: Poisson noise, the quality of watermark is not significantly
X + k1P if b0 = 0 and b1 = 0 degraded (Fig. 5). The proposed scheme is robust also to
X + k2 P if b0 = 0 and b1 = 1 cropping and other filtering techniques. A Matlab
implementation of the proposed algorithm is available at the
Xe = (2)
X + k3 P if b0 = 1 and b1 = 0 following URL:
X + k4 P if b0 = 1 and b1 = 1 http://www.advancedsourcecode.com/hiddenbits.asp .
e
where X is wavelet coefficient of the cover image, X is
the wavelet coefficient after watermark embedding, P is the IV. CONCLUSION
PN matrix, k1 , k2 , k3 and k4 are the four modulation In this paper we presented a multilevel CDMA algorithm for
wavelet based watermarking. The proposed scheme is robust
indices, b0 and b1 are two consecutive bits of watermark. to most of common filtering attacks, cropping and
Since each impulse of multilevel sequence carries a number of compression. We are currently investigating on the possibility
bits equal to n = log 2 L , the correspondent hiding capacity to optimize the selection of modulation indices through genetic
will be increased by the same factor n . The number of levels algorithm approaches, in order to achieve the optimal
can not be arbitrarily increased, since immunity to noise compromise among visual imperceptibility, capacity and
decreases with a higher number of levels. robustness.
C. Watermark decoding
In CDMA watermarking scheme the detection of binary REFERENCES
valued watermark data depends on the decision variable [1] I.J. Cox, M.L. Miller, J.M.G. Linnartz, T. Kalker, “A Review of
obtained by evaluating the zero-lag cross-covariance function Watermarking Principles and Practices,” Digital Signal Processing for
Multimedia Systems, K.K. Parhi, T. Nishitani, eds., New York, Marcel
between the image coefficient blocks and each code pattern. Dekker, Inc., 1999, pp 461-482.
Using a multilevel coding for modulation indices the [2] J. Dugelay, S. Roche, “A Survey of Current Watermarking Techniques,”
correlation value can't be used to recover input sequence of Information Techniques for Steganography and Digital Watermarking,
S.C. Katzenbeisser et al., Eds. Northwood, MA Artec House, Dec. 1999,
bits since this value is equal for each coding. To solve this
pp 121-145.
problem we used the simple following rule: [3] Luigi Rosa, “DCT-based watermark recovering without resorting to the
[b1, b2 ,K, bn ] i = min
i
( X − ki P ) (3) uncorrupted original image”. Available:
http://www.advancedsourcecode.com/dctwater.asp
[4] R.C. Gonzalez, R.E. Woods, “Digital Image Processing,” Upper Saddle
Where X is the wavelet coefficient matrix of watermarked River, New Jersey, Prentice Hall, Inc., 2002.
image, ki is the modulation coefficient associated to the i-th [5] P. Meerwald, A. Uhl, “A Survey of Wavelet-Domain Watermarking
Algorithms,” EI San Jose, CA, USA, 2001.
sequence, P is the PN matrix and [b1 , b2 ,K, bn ] i is the [6] H. Inoue, A. Miyazaki, T. Katsura “An Image Watermarking Method
Based on the Wavelet Transform,” Kyushu Multimedia System
sequence of bits that has been decoded associated to ki Research Laboratory.
[7] Santi P. Maity, Malay K. Kundu, “A Blind CDMA Image Watermarking
modulation index. Scheme In Wavelet Domain,” International Conference on Image
Processing, vol. 4, Oct. 2004, pp. 2633-2636.
[8] Chris Shoemaker, “Hidden Bits: A Survey of Techniques for Digital
III. RESULTS Watermarking”. Available: http://www.vu.union.edu/~shoemakc/
In this section we present the experimental results. Using a [9] Santi P. Maity, Malay K. Kundu, Tirtha S. Das, “Robust SS
Watermarking With Improved Capacity,” Pattern Recognition Letters,
4-levels CDMA and a single-level discrete 2-D Haar wavelet 2007, vol. 28, pp. 350-356.
3
Fig. 1 Cover image and original 52x19 logical watermark. Fig. 5 Watermarked image using a 4-levels CDMA algorithm and
recovered watermark after cropping and salt and pepper noise.