Sie sind auf Seite 1von 9

JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 205

Watermarking Ancient Documents Based on


the Selection of the Best Base of Wavelet
Packets and a Convolutional ECC
Mohamed Neji Maatouk, Anis kricha and Najoua Essoukri Ben Amara

Abstract—A digital library of ancient documents makes the information accessible for everyone via the web and permits
conserving, preserving and enhancing the value of the cultural and scientific heritage. Nevertheless, with a digital form, these
types of documents are threatened to be hacked, modified or even diffused illegally. As a consequence, we risk losing the
intellectual property of these documents. To curb these frauds, watermarking represents a promising method to protect these
images. In this context, our work makes part of protecting essentially ancient documents. In this paper, we have proposed a
method of watermarking ancient documents, which is based on the wavelet packet transform and on a convolutional error
correcting code. The insertion is performed in the coefficients of maximum amplitude being in the best basis decomposition,
according to an entropy criterion. This method proves noticeable signature invisibility and robustness against attacks of type to
signal processing attacks (noise, filter and compression) as a first contribution to watermarking ancient documents.

Index Terms—Ancient documents, Best base of Wavelet packets, Error correcting code, Watermarking.

——————————  ——————————

1 INTRODUCTION

W atermarking documents is a technique derived


from steganography [4]. It refers to inserting an
amount of data called signature, mark or even wa-
and their resistance to attack decreases against JPEG
compression, median filtering and Gaussian noise [9, 12].
This weakness is caused by different specification of
termark in a digital content. these documents. In fact, these images often present de-
The basic criteria for this technique are the invisibility faults that can be related to ancient documents mainly
of the signature by the human eye and the robustness to due to archiving conditions like ink splash (Fig. 1.a),
various transformations such as in geometry (rotation, dampness (Fig. 1.b), folding (Fig. 1.c), ink fading (Fig.
cropping, translation and scaling), compression, noising, 1.d), back’s visibility from the front and others linked to
filtering….To insert the mark, several domains are used acquisition conditions like weak contrast and lighting
(spatial, frequency and multi-resolution), as well as data variation (Fig. 1.e) [22, 23]. These specificities make the
carrier points are determined. watermarking task difficult at two levels: the choice of
According to the literature, many researches about the insertion domain and selecting the signature carrier
standard [9, 12] and medical images have been realized points.
[5, 20], but as far as we know, there is no work that has
been realized on watermarking ancient document images,
despite their considerable importance. Within our group
and in the collaboration of the National Library of Tunis
[3], we have engaged a wide-ranging action of digitizing
ancient documents (compression, segmentation, and in-
dexation) and we have been concerned with a primary
contribution of watermarking images of ancient docu- a
a b c
(a) (b) (c)
ments in a multiresolution domain. 
As a first phase, we have tested some watermarking
algorithms on our images such as [9, 12]. According to the
experimental results, we have noticed that the classical
algorithms of watermarking have not been adapted to the
images of ancient documents. In fact, we have always
noted that our watermarked images losing their qualities  
d
(d) e
(e)

———————————————— Fig. 1. Examples of problems that are intrinsic to ancient documents:


 M.N. Maatouk is with the Faculty of Sciences in Monastir. (a) Splash due to ink acidity; (b) Splash due to dampness; (c) Folding
 A. Kricha is with the National Engineering School in Monastir.
 N.Essoukri. Ben Amara is with the National Engineering School in Sousse. problem; (d) Visible back from the front; and (e) Ink fading.

© 2011 Journal of Computing Press, NY, USA, ISSN 2151-9617


http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 206

The choice of signature carrier points is decisive for the


performance of a watermarking algorithm. For the case of Originalimage
Watermarked
the wavelet transform, these points are chose in sub- image
bands of high frequency. For watermarking images of Waveletpackets
ancient documents, we always confront a major problem decomposition
Stages :1+2+3
of confusing this signature carrier points with the noisy
points which are among the major problems of the images Selectingthe Signature
of ancient documents. best base extracted
In [10], we have proposed an approach based on using
Selectingthe
the Discrete Wavelet Transformation (DWT). The water- Viterbi
carrierpoints
mark is inserted into detail sub-bands at third-level de- Decoder
composition. It has been noted that this approach of- Watermark
Insertion Decision
fers an average invisibility and it is not sufficiently robust
Convolutional basedona
against the median filtering, Gaussian noise and JPEG Watermarked correlation
compression of images in ancient documents. To remedy code
image
these insufficiencies, we have proposed, as a first task, an
(a) (b)
additive approach based on the Wavelet Packet Decom-
position (WPD) [13]. In fact, the choice of this transforma-
tion is based on its advantages like the possibility of se- Fig. 2. Block diagram of the proposed watermarking approach:
lecting a best base of sub-bands which provides a location (a) Insertion phase; (b) Detection phase
in the higher frequencies much better than wavelets [14]. L of decomposition, each sub-band (the approximations
Yet, another advantage is that the concept of human visu- and details) is itself decomposed into four sub-bands (ap-
al model is also applied in this transformation in order to proximation and three details) in level L+1, which is not
increase the invisibility of the signature [9]. In fact, we can the case for DWT where the sub-band of approximation is
integrate more information without distinguishing the only decomposed in high levels.
change of the original image. However, in [13] the expe-
rimental results have shown the advantages of our ap- 2.1.2 Selecting the Best Base
proach for invisibility and robustness against attacks such To get a better decomposition base, we have to search all
as JPEG compression with 60% quality factor, median the best adapted coefficient of approximations and details
filtering and adding noise like salt and pepper, but it has to significantly represent the signal. The literature shows
not been not completely robust in the presence of a Gaus- that the choice of the selection of this base must be used
sian noise and a JPEG compression of quality factor high- according to an additive criterion [6]. A criterion C is ad-
er than 60%. To improve these results, we propose in this ditive if C(A1  A2)  C(A1)  C(A2) where A1 and A2
paper to use a convolutional code for coding the signa- are two disjoint sub-bases [25].
ture which will be integrated in the coefficients of maxi- Into the domain compression, Coifman and Wicker-
mum amplitude being in the best base decomposition, hauser [6] have used an entropic criterion. In the context
according to an entropy criterion. of the classification of EEG signals, two criteria have been
This paper is structured as follows. First, in section 2, proposed: the Euclidean distance measure as a first crite-
we present our approach: an insertion phase and a detec- rion [24] and the second is named Fisher [25]. For the
tion phase. Then, the experimental results are detailed in domain watermarking, Vehel and Manoury [14] have
section 3. Finally, section 4 provides the conclusion and proposed using the energetic criterion. For our approach,
prospects. based on our studies, we have opted for a criterion of en-
tropy type.
2 WATERMARKING SCHEMA The idea is to calculate the binary tree of WPD and to
construct a tree in which each node contains the entropic
The main goal of our work has been to develop a water- value for the corresponding packet. The obtained tree for
marking schema for protecting the ownership of images this application is called an entropic tree.
of ancient documents to the signal processing attacks. This criterion is defined by (1):
Total diagrams of our approch are presented by Fig. 2. N ,M
E    C (i, j ) log(C (i, j ))
2.1 Insertion Phase i, j (1)
In this section, we explain the main stages of our devel-
oped algorithm which allows us to obtain a good robust-
where C (i, j )  x(i, j )
2 2
x(i, j )
ness. These steps are detailed as follows:
x(i, j ) corresponds to the coefficients of the node of each
2.1.1 Image Wavelet Packet Decomposition sub-band of MxN size.
As the criterion is an additive function, we can really
The WPT provides additional information that DWT. work on the tree of WPD in a local way. When selecting
In fact, it can decompose a given signal upon a great the best base, we are just conserving the tree nodes which
number of sous-bands: redundant base. Indeed, for level have minimized the criterion as follows. Our strategy for
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 207

selecting this base is to run through the entropic tree of a 2.1.3 Selecting the Signature Carrier Points
letter decomposition level N-1 towards the 0 level, we Choosing the signature carrier points is very important
compare the entropy value of a father node with entropy and influences intensively the degree of robustness of a
values of its four sons. We detail this strategy by the fol- watermarking method. Literature has proved that the
lowing algorithm: choice of signature insertion coefficients depends on the
insertion domain. In the spatial domain, the Harris Cor-
If (Entropy (father) > Sum_Entropy (sons)) ner Detector, which is based on the local auto-correlation
Keep_sons () function of a signal that measures the local changes of the
Entropy (father)  Sum_Entropy (sons) signal with patches shifted by a small amount in different
else directions [26], has been used in the majority of algo-
Select_father () rithms in order to detect the carrier points [2]. In the fre-
level  level+1 quency domain, the signature has been integrated within
the coefficients of medium frequencies of discrete Fourier
with: transform [18] or discrete cosine transform [11]. These
function Entropy: calculates the entropic value of a coefficients represent the contour of an image. Also, in the
node multiresolution domain based on the DWT, the signature
function Sum_ Entropy: calculates the sum of entropic has been sometimes added to the sub-bands of approxi-
values of four sons nodes mation [12, 9] and most of the time the sub-bands of de-
procedure Keep_sons: allows to keep the four sons tails [1].
nodes As we are watermarking ancient documents which
procedure Select_father: selects only the father node. admit essentially a text and/or a well-contrasted draw-
ing, we propose inserting the signature into the points
It is well known that the entropy varies proportionally which represent the contours of the image in a sub-band.
to the noise. Since we treat images of ancient documents Indeed, according to [19], there exists a sleek function ω in
which are generally noisy, it will be smarter to insert the such a way that: 
signature into the less noisy zones. Consequently, in this  1 ( x, y )   ( x, y ) x ,  2 ( x, y )   ( x, y ) y and
paper, we have tried to determine the sub-band of wave- 
let packet carrying the signature based on the minimum
  (t )dt  0 , where  ( x, y)  2 ( x, y )
1
and have one
entropy criterion.

Fig. 3 shows an example of selecting a better entropic
base of an image of ancient documents (fig. 4.a) after de- null moments and a compact support. Wavelet transform
composing them into WPD at level 2. The terminal nodes of f ( x, y )  L2 ( R 2 ) at scale s can be written as a mul-
of the second tree represent the carrier nodes of the signa- tiscale differential operator:
ture (fig. 3.b).
From the experimental results, we can conclude that W21j f ( x, y)   f 21j ( x, y)  
 2    2 j ( f  w j )( x, y) (2)
W j f ( x, y)   f  2 ( x, y)  2
 2   2 j


where 2 j ( x, y )  2 j (  x,  y ), k  1, 2 and  denotes
k k

the gradient.
The modulus of this gradient vector is proportional to
the wavelet transform (3).
(a) 2 2
Mf 2 j ( x, y )  W21j f ( x, y )  W22j f ( x, y ) (3)
Then, the local maximum of the wavelet transform
Mf 2i ( x, y ) at point ( xk , yk ) can be calculated by
solving the partial differential at both x and y directions
Mf 2i ( x, y )  0 [10, 19]. These points of which the
(b) 
signature will be inserted are called carrier points.
Fig. 3. Exemple of selecting the entropic best base of wavelet
packets: (a) entropic tree of WPD; (b) Best base of entropic tree. 2.1.4 Coding the Signature
We have exploited an ECC used in data transmission in
our watermarking algorithm to increase the level of ro-
the insertion in sub-bands of low entropy value does not
bustness. The usefulness of an ECC for a watermarking
influence the quality of the watermarked image and of-
algorithm is to insert data in a redundant way. In fact,
fers a remarkable robustness agiant attacks. The results
this redundancy will be exploited in detecting and cor-
are illustrated in Table 1.
recting the erroneous bits in order to reconstruct the in-
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 208

serted data in the detection phase. Many watermarking a decision is calculated by a correlation between the orig-
algorithms of standard and medical image have used dif- inal signature and the decoded one to determine the level
ferent ECC [8, 16, 7, 20]. In general, choosing a coder for a of robustness. We have noticed, after different tests, that
watermarking algorithm is based on experimental heads. the minimal correlation value should be higher than 0.5 to
According to the main experiments conducted on the im- guarantee the existence of the inserted signature. This
ages of ancient documents, it has been shown that the decision is defined by (5).
convolutional code offers the best results at the level of
invisibility and robustness in relation to attacks. In fact, 1 if correlation(S,Soriginal )>0.5
Decision=  (5)
this coder has a great capacity of correcting and detecting
the erroneous bits of the inserted signature. 0 if not
In this paper, a convolutional code of memory order m
is supported [17]. For this class of code, each sequence of S : decoded signature, Soriginal : inserted signature
n bits in the encoder output depends not only on the se-
quence of k binary elements present at its input but also
on m sequences which were present previously. Such a 3 EXPERIMENTATIONS AND RESULTS
code is called systematic if the k bits of information In this section, we describe the main experiments con-
present at the input of the encoder are actually issued, ducted and the main results obtained. First, we will
which is to be found intact in the sequence of n binary present the metrics used in evaluating our approach.
elements in the encoder output. The yield on code is de- Then, we will present our different results of our ap-
fined by the ratio k/n with n>k, where C(n, k, m) is the proach developed at the best base stability, invisibility
notation of this code. and robustness to attacks applied on the watermarked
ancient image. Finally, we will make a comparison of our
2.1.5 Inserting the Signature
approach with some watermarking algorithms of stan-
The signature insertion in each node is realized in accor- dard images in order to prove the importance of our con-
dance with (4): tribution for watermarking ancient documents.
 X  *Wi * sign( Xi ) if Xi is a carrier point
Yi   i (4) 3.1 Metrics Evaluation
 Xi else In order to evaluate the performance of our approach, we
with Yi : watermarked image packet coefficient have used metrics most known in the field watermarking:
the PSNR (Peak Signal to Noise Ratio) for the evaluation
X i : original packet coefficient of the insertion phase and the correlation for the evalua-
W : watermark tion of the detection phase.
 : signature force parameter PSNR

The parameter  is a factor of a good compromise be- The PSNR is used to evaluate the watermark invisibility
tween invisibility and better robustness. Indeed, when the after the insertion phase. It is based on the Mean Square
value of  is high the robustness increases and invisibili- Error (MSE). It is expressed in decibels and is defined by
ty decreases. Conversely, when  is small, the robust- (6).
ness decreases and the invisibility increases. This value 2
X max
will be determined experimentally. PSNR  10 log10 ( )
MSE
2.1.6 Reconstructing the Watermarked Image 255 2 (6)
=10 log10 ( )
After inserting the signature, the image is reconstructed MSE
by an inverse WPT. 1
2.2 Detection Phase
where MSE =  ( I m ,n  I m' ,n ) 2
M  N m ,n
In this phase, the three first steps of insertion scheme are where I(m,n) is the reference image and I'(m, n) is the
used as the starting steps to extract a signature S which watermarked image. The two images are of size M * N.
will thereafter be decoded.
Among the techniques for decoding convolutional Correlation
codes we can mention the sequential, Viterbi and syn-
To evaluate the degree of resistance of a watermarking
drome decodings. In general, decoding in the family code
algorithm, we must to calculate the similarity between the
consists in searching the binary sequence that can be the
original signature and the detected signature. For this, a
most likely received sequence in the trellis or tree coding.
correlation function is used (7). The value of this function
The application of this decoding rule is very complicated
varies between 0 and 1.
when there is a large number of a possible sequence. It is
due to this complexity that we have conceived of search-
ing the most likely sequence using the Viterbi decoding
algorithm [21].
After the extraction phase and the signature decoding,
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 209

( A mn  A)(Bmn  B) ancient documents. According to the experimental re-


sults, we have noticed that only the convolutional codes
Corr( A, B)  m n
(7) are efficient in detecting and correcting many erroneous
( A mn  A)2 (Bmn  B)2 bits.
m n m n In the insertion phase, we have encoded the water-
where A and B correspond to the average values of the mark with a systematic convolutional ECC C (2, 1, 4) ½
coefficients of the two matrices A and B. performance to add it to the points on the best basis of
wavelet packets of an image from ancient documents.
3.2 Experimentations After coding, the length of the output sequence is twice
The different tests have been conducted upon gray level the input sequence without any significant influence on
noisy images of size 512x512 extracted from our test data- the image size.
base of 100 images. Fig. 4 shows four examples of images For decoding, we have used the Viterbi algorithm in
extracted from our test base in which we are going to illu- the detection phase in order to properly decode the ex-
strate the recorded results. We have kept, as a signature, a tracted signature [21]. The decoder used is a Maximum
binary image (32x16) which contains the first letters of the Likelihood decoding algorithm of not only hard input but
“Bibliothèque Nationale de Tunis”: BNT (Fig. 4.e) [3]. The also hard output. This technique searches for the path
main experiments conducted after the implementation of whose likelihood is maximal starting from the trellis of
our approach are detailed in following section. the chosen convolutional code.

3.2.3 Best Base Stability


The primary step of our approach is the selection of the
best base of wavelet packet carrying data, which should
be robust against attacks. So, this base must necessarily be
stable after the attack of the watermarked image. We con-
(a) (b) sider that a base will be stable if it confirms the following
condition:
Let S  {si }, i  [1..N ] and S  {si }, i  [1..N ] ,
' ' '

S is stable if  k as sk  S and sk  S
'

with S : base of the original image of N nodes,


S’: base of the attacked watermarked image of N’
nodes.
(c) (d)
Thus, the necessary condition to say that a S base is
stable is when it exists one of selected nodes by S which is
(e) 
selected by S’ after a given attack.
Fig. 5 shows the percentage of the number of the detected
Fig. 4. Examples of our base images stemming from ancient nodes for several attacks compared with the inserted
documents (the National Library of Tunis); and nodes. The curves of this study have shown that the per-
(e) Watermark. centage value varies between 50 and 100 for our test im-
ages. These experimental results prove that the best base
3.2.1 Choosing the parameters of the wavelet stability condition is respected for our approach against
packet transformation different attacks. This stability allows us to guarantee the
To decompose the image, we have to fix the decomposi- best results especially for the resistance against attacks to
tion level, the wavelet familly, and its order. Thus, we our approach. We will illustrate these results in the fol-
have carried out an empirical study to determine the cha- lowing section.
racteristics. Amongst the wavelet family, we have made
the choice between the Daubechies, the Coiflet and the 3.2.4 Results
Biorthogonales families, which are the most used ones The performances of a watermarking procedure are tribu-
and have a more exact reconstruction. The choice should tary to a good compromise between robustness and invi-
respect the compromise between invisibility and robust- sibility. For this, the choice of the force value  is crucial.
ness. Based on the characteristics of WPD and convolutional
This study shows that the level-3 decomposition, with code, we have firstly studied the invisibility of the signa-
the Daubechies family of order 1, provides the best com- ture in relation to the inserting force. Fig. 6 shows that the
promise between the robustness of the procedure of wa- quality of the original image is preserved by our algo-
termarking and the invisibility of the signature [13]. rithm for a value of  between 0 and 80. We always have
a little degradation of the watermarked image compared
3.2.2 Encoding / Decoding watermark with the original one, and the value of PSNR varies from
We have evaluated the performance of many correcting 70db to 30db.
codes (Hamming, BCH, Reed-solomon and convolution- Secondly, we have studied the robustness of the signa-
al) to determine the best code which improves the invisi- ture in relation to the inserting force. The robustness per-
bility and the robustness of the images stemming from formance against adding noise, JPEG compression and
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 210

1 1
Img 1 0.8
0.8
Img 2
Img 1

detection
Img 3 0.6

detection
0.6
Img 2
Img 4
0.4 0.4 Img 3
Img 4
0.2 0.2

0 0
0 50 100 0 50 100
Force parameter Force parameter 
a b
(b)
(a)
1

0.8
Img 1

detection
0.6 Img 2
Img 3
0.4
Img 4
0.2

0
0 50 100
Force parameter 

(c)
C

Fig. 5. Percentage of the number of detected nodes for several Fig. 7. Experiment results against adding Salt and Pepper noise attack
attacks: (a) 3x3 median filter; (b) 12% Gaussian noise; (c) Salt with density of: (a) 0.002; (b) 0.005; and (c) 0.01.
and Pepper noise with density of 0.01; and (d) JPEG
compression with 20 quality factor.
1 1
80 Img 1
0.8 Img 2 0.8
Img 1
70 Img 1
Img 3 Img 2
detection

0.6

detec tion
Img 2 0.6
Img 4 Img 3
60 Img 3
PSNR

0.4 0.4 Img 4


Img 4
50 0.2 0.2

40 0 0
0 20 40 60 80 100 0 20 40 60 80 100
30 Force parameter Force parameter 
0 20 40 60 80 100
Force parameter
ab
(b) 
(a)
Fig. 6. Evolution of PSNR according to the inserting force of four
Fig. 8. Experiment results against adding Gaussian noise attached of:
images in Fig. 4.
(a) 10 varaiance; and (b) 12 variance.

filtering has been tested on several images.


In our experiment, we have added two types of noise 1

in watermarked images. The first is a Salt and Pepper 0.8


noise with density of 0.002, 0.005 and 0.01, and the second Img 1
0.6
detection

is a 10% and 12% Gaussian noise. Fig. 7 and Fig. 8 dem- Img 2
onstrate that a new scheme has great robustness to these 0.4
Img 3
Img 4
attacks.
0.2
The median filter is one of the most used steps in the
preprocessing phase of our images that have a very poor 0
0 50 100
quality. Our algorithm shows its robustness against the Force parameter
3x3 median filter for our test images for a value of


 greater or equal than 40 (Fig. 9).


As an interpretation of Fig. 10, we note that our ap- Fig. 9. Experiment results against 3x3 median filter attack.
proach is very robust facing the JPEG compression with
90% to 20% quality factor, but not so resistant face to 10% Fig. 11 proves that the signature is successfully recov-
quality factor. ered from all sub-bands of the best entropic basis of
According to Fig. 6, we have noted that even with a wavelet packets of our four attacked test images. Values
large value of  , we always have a little degradation of which are displayed below each image in this figure
the watermarked image compared with the original one, indicate the value of the correlation between the signature
which means good signature invisibility. According to extracted and inserted.
Fig. 7, Fig. 8, Fig, 9 and Fig, 10, we note that a value of 
equal to 45 gives a value of PSNR of about 37dB (Fig. 11)
with a degree of correlation varying between 0.95 and 1.
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 211

1 1 TABLE 1
0.8 Img 1 0.8
COMPARISON OF THE PROPOSED METHOD WITH OTHER METHODS
Img 2 Img 1

detection
detection

0.6 0.6 Img 2


Img 3
0.4 Img 4 0.4 Img 3
Img 4
0.2 0.2

0 0
0 50 100 0 50 100
Force parameter  Force parameter

(a)
a (b)
b
1 1

0.8 0.8
Img 1
detection
detection

0.6 Img 2 0.6


Img 1
Img 3
0.4 0.4 Img 2
Img 4
Img 3
0.2 0.2
Img 4
0 0
0 50 100 0 50 100
Force parameter  Force parameter 
(c)
c (d)
d 
Fig. 10. Experiment results against JPEG compression attack with:
(a) 90% quality factor; (b) 50% quality factor; (c) 20% quality factor;
and (d) 10% quality factor.

3.2.5 Comparison with other methods


To show the efficiency of our approach in the case of an-
cient documents images, we have compared it with other
methods proposed in [12] and [9] on the same image (Fig.
has shown a noticeable invisibility.
4.d). It can be observed that the superiority of robustness of
Moreover, the geometric attacks (cropping, rotation,
our proposed method with different types of attacks.
scale and translation) are very important for these
In other respects, we have already made another compari-
son with the method in [10] based on the DWT that we have types of documents. For this reason, other tasks are
developed as a first contribution to the watermarking of an- being carried out to test the robustness of the devel-
cient documents. The results have shown the contribution of oped approach against these attacks.
WPT versus DWT and the importance of the entropy crite- As a prospect, we also propose to develop a blind
rion for selecting the best decomposition base carrying the algorithm. In fact, the detection type of our approach,
signature. To show the importance of exploiting the convo- which refers to the original image, does not adapt well
lutional code in order to increase the rate of robustness, we to the field of watermarking images from ancient doc-
have compared our new watermarking scheme with our un- uments because the database of the National Library of
coded approach proposed in [13]. The results are figured in Tunis is very wide, which may cause a considerable
Table 1. loss of time in researching documents or a confusion of
images.

4 CONCLUSION
In this paper, we have proposed an approach for
additive watermarking of images of ancient docu-
ments stemming from the BNT. A specific signature
carrying the BNT initials has been inserted into points
of interest of a better basis for the WPD. To keep the
same quality of the original image and have a better
robustness of the chosen signature, we have deter-
mined the parameters of the transformation into wave-
let packets and exploited the convolutional ECC with
the Viterbi decoding used in coding the signature. Our
approach has proved that the watermark is still robust
under several attacks such as compression, salt and
pepper noise, Gaussian noise, and median filter, and
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 212

Fig. 11. Examples of images of watermarked ancient documents and detected signature of these attacked images with
α = 45.
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 4, APRIL 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 213
[20] A.K. Salwa, N. Elsheimy, A.S. Tolba, F.M. Abdelkader, and M.
Elhindy, “Wavelet Packets-Based Blind Watermarking for Medi-
cal Image Management," The Open Biomed Engineering Journal,
REFERENCES vol. 4, pp. 93–98, Mar. 2010.
[21] A.J. Viterbi, “Error Bounds for Convolutional Codes and an
Asymptotically Optimum Decoding Algorithm," IEEE Trans.
[1] M. Barni, F. Bartolini, V. Cappellini, A. Lippi, and A. Piva, “A Information Theory, vol. 13, no. 2, pp. 260-269, Apr. 1967.
Dwt-based Technique for Spatio-frequency Masking of Digital [22] L. Likforman-Sulem, A. Zahour, and B. Taconet, “Text Line
Signatures," Proc International Society for optical engineering Segmentation of Historical Documents: a Survey," International
(SPIE), Security and Watermarking of Multimedia Contents I Journal on Document Analysis and Recognition, Vol.9, no. 2, pp.
(SWMCI’99), pp. 31-39, 1999. 123-138, Apr. 2007.
[2] P. Bas, J.M. Chassery and B. Macq, “Méthode de Tatouage Fon- [23] A. Kricha, A.G. Lasmar, and N. E. Ben Amara, “Exploration des
dée sur le Contenu," Signal Processing (Traitement du Signal), Ondelettes en Prétraitement des Documents Anciens," Proc. In-
vol. 19, no. 1, pp. 11-18, 2002. ternational Francophone about the Written and the Document.
[3] http://www.bnt.nat.tn. (International Francophone sur l'Ecrit et le Document)
[4] R.V. Schyndel, A. Tirkel, and C. Osborne, “A Digital Dater- (CIFED’06), pp. 157-162, Nov. 2006.
mark,” Proc. IEEE International Conf. Image Processing, pp. 86– [24] N. Saito, “Local Feature Extraction and Its Applications Using a
90, Nov. 1994. Library of Bases," Ph.D dissertation, Dep. of Mathematics, Yale
[5] C. Chemak, J.C. Lapayre, and M.S. Bouhlel, “A New Scheme of Univ., New Haven, 1994.
Image Watermarking Based on 5/3 Wavelet Decomposition and [25] D. Vautrin, X. Artusi, M-F. Lucas, and D. Farina, “ A Novel
Turbo-code," WSEAS Transactions on Biology and Biomedicine, Criterion of Wavelet Packet Best Basis Selection for Signal Clas-
vol. 4, no. 4, pp. 45-52, Apr. 2007. sification With Application to Brain–Computer Interfaces," IEEE
[6] R.R. Coifman, M.V. Wickerhauser, “Entropy Based Algorithms Trans. Biomedical Engineering, vol. 56, no. 11, pp. 2734-2738,
for Best Basis Selection," IEEE Trans. Information Theory, vol. Nov. 2009.
38, no. 2, pp. 713-719, Mar. 1992. [26] C. Harris, M.J. Stephens, “A Combined Corner and Edge Detec-
[7] C.T. Hsieh and Y.K. Wu, “ Digital Image Multiresolution Wa- tor," Proc. Alvey Vision Conference, pp. 147–152, 1988.
termark Based on Human Visual System Using Error Correcting
Code," Tamkang Journal of Science and Engineering, Vol. 4, No. Mohamed Neji Maatouk. is a PhD candidate student at the Depart-
3, pp. 201-208, 2001. ment of Department of Electrical Engineering in National engineering
[8] H. Zhu, W.A. Clarke, and H.C. Ferreira, “Watermarking for School in Sfax, University of Sfax, Tunisia.He received a Computing
JPEG Image Using Error Correction Coding," SAIEE AFRICA diploma from Faculty of Sciences in Monastir, University of Monastir,
Research Journal, vol. 99, no. 4, pp. 98-103, Dec. 2004. Tunisia. He is working as assistant in the Department of Computing
[9] C. Jin, L. Pan, and S. Ting, “A Blind Watermarking Scheme in Faculty of Sciences in Monastir, University of Monastir, Tunisia.
Based on Visual Model for Copyright Security," Proc. Multime- His research interests are in the areas of image processing (water-
dia Content Analysis and Mining (MCAM’07), pp. 454–463, marking).
Jun. 2007.
[10] A. Kricha, S. Brini, and N.E. Ben Amara, “Contribution au Ta- Anis Kricha. is a PhD candidate student at the Department of Elec-
touage Des Documents Anciens," Proc. Electrotechnic and Au- trical Engineering in National engineering School in Tunis, University
tomatic Tunisian Days (Journées Tunisiennes de l'Electrotechni- El Manar, Tunisia. He received an Electrical Engineer diploma from
que et Automatique (JTEA’08)), May. 2008. National engineering School in Tunis, University El Manar, Tunisia.
[11] M. Lee, M. Horng, and B. Chang, “A DC-based Approach to Ro- He is working as assistant in the Department of Electrical Engineer-
bust Watermarking with Hamming-Code," Proc. International ing in National engineering School in Monastir, University of Monas-
Conf. Intelligent Information Hiding and Multimedia Signal tir, Tunisia. His research interests are in the areas of image
Processing (IIHMSP’07), vol. 2, pp. 369–372, Nov. 2007. processing.
[12] C. Lin, J. Pan, and B. Liao, “Parity Modulation Based Water-
Najoua Essoukri Ben Amara. received the B.Sc., M.S., Ph.D. and
marking Resisting to Cropping," Proc. Innovative Computing,
HDR degrees in Electrical Engineering, Signal Processing, System
Information and Control, (ICICIC’07), pp. 294, Sep. 2007.
Analysis and Pattern Recognition from the National School of Engi-
[13] M.N. Maatouk, O. Jedidi, and N.E. Ben Amara, “Watermarking neers of Tunis, University El Manar, Tunisia, in 1985, 1986, 1999,
Ancient Documents Based on Wavelet Packets," Proc. Interna- 2004 respectively. From 1985 to 1989, she was a researcher at the
tional Society for optical engineering (SPIE) Conf. Document Regional Institute of Informatics Sciences and Telecommunications,
Recognition and Retrieval XVI (DRR), pp. 7238-7247, Jan. 2009, Tunis, Tunisia. In September 1989, she joined the Electrical Engi-
doi:10.1117/12807790. neering Department of the National School of Engineers of Monastir,
[14] J.L. Vehel, A. Manoury, “Wavelet Packet Based Digital Water- University of Monastir, Tunisia, as an assistant professor. She be-
marking," Proc. IEEE. International Conf. Pattern Recognition, comes a senior lecturer in July 2004 and a Professor in October
(ICPR'00), vol. 3, pp. 413-416, 2000. 2009 in Electrical Engineering at the National School of Engineers of
[15] Y. Meyer, R.R. Coifman, and M.V. Wikerhauser, “Wavelet Sousse-ENISo, University of Sousse, Tunisia. Since July 2008, she
Analysis and Signal Processing," Proc. wavelets and their Appli- is the Director of the ENISo. Her research interests include mainly
cations, Boston, pp. 153–178, 1992. pattern recognition applied to Arabic documents, ancient image
[16] J.K. Joseph, T. Pun, “Rotation Scale and Translation Invariant processing, compression, watermarking, segmentation, biometric
Spread Spectrum Digital Image Watermarking, Signal and the use of stochastic models and hybrid approaches in the
Processing," vol. 66, no.3, pp. 303-317, May. 1998. above domains.
[17] R. Johannesson, K.S. Zigangirov, “Fundamentals of Convolu-
tional Coding," IEEE Trans. Information Theory, vol. 46, no. 3,
pp. 1178-1179, May. 2000.
[18] R. Ridzon, D. Levicky, “Robust Digital Watermarking Bbased on
the Log-polar Mapping," Radio engineering, vol. 16, no. 4, pp.
78-81, 2007.
[19] T. Luo, G. Xing, and L. Shi, “Mutual Information Based Water-
marking Detection in Wavelet Domain for Copyright Protec-
tion," Proc. IEEE Asia-Pacific Trusted Infrastructure Technolo-
gies Conference (APTC’08), pp. 113-119, Oct. 2008.

Das könnte Ihnen auch gefallen